4.6 Article

On content-based recommendation and user privacy in social-tagging systems

期刊

COMPUTER STANDARDS & INTERFACES
卷 41, 期 -, 页码 17-27

出版社

ELSEVIER
DOI: 10.1016/j.csi.2015.01.004

关键词

Information privacy; Privacy-enhancing technology; Privacy risk; Recommendation system; Tag forgery

资金

  1. Spanish Government [TEC2010-20572-C02-02, TEC2013-47665-C4-1-R]
  2. Juan de la Cierva postdoctoral fellowship from the Spanish Ministry of Science and Innovation [JCI-2009-05259]

向作者/读者索取更多资源

Recommendation systems and content-filtering approaches based on annotations and ratings essentially rely on users expressing their preferences and interests through their actions, in order to provide personalised content. This activity, in which users engage collectively, has been named social tagging, and it is one of the most popular opportunities for users to engage online, and although it has opened new possibilities for application interoperability on the semantic web, it is also posing new privacy threats. In fact, it consists in describing online or offline resources by using free-text labels, i.e., tags, thereby exposing a user's profile and activity to privacy attacks. As a result, users may wish to adopt a privacy-enhancing strategy in order not to reveal their interests completely. Tag forgery is a privacy-enhancing technology consisting in generating tags for categories or resources that do not reflect the user's actual preferences too accurately. By modifying their profile, tag forgery may have a negative impact on the quality of the recommendation system, thus protecting user privacy to a certain extent but at the expenses of utility loss. The impact of tag forgery on content-based recommendation isconsequently investigated in a real-world application scenario where different forgery strategies are evaluated, and the resulting loss in utility is measured and compared. (C) 2015 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据