Abstract
Today, many online companies are gathering information and assembling sophisticated databases that know a great deal of information about many people, generally without the knowledge of those people. Such endeavor has resulted in the unprecedented attrition of individual’s right to informational self-determination. On the one hand, Consumers are powerless to prevent the unauthorized dissemination of their personal information, and on the other, they are excluded from its profitable commercial exchange. This paper focuses on developing knowledge-empowered agent information system for privacy payoff as a means of rewarding consumers for sharing their personal information with online businesses. The design of this system is driven by the following argument: if consumers’ personal information is a valuable asset, should they not be entitled to benefit from their asset as well? The proposed information system is a multi-agent system where several agents employ various knowledge and requirements for personal information valuation and interaction capabilities that most users cannot do on their own. The agents in the information system bear the responsibility of working on behalf of consumers to categorize their personal data objects, report to consumers on online businesses’ trust and reputation, determine the value of their compensation using risk-based financial models, and finally negotiate for a payoff value in return for the dissemination of users’ information. The details of the system as well as a proof-of-concept implementation using JADE (Java Agent Development Environment) are presented here.
Similar content being viewed by others
References
Acquisti A, Grossklags J (2005) Privacy and rationality in individual decision making. IEEE Secur Priv 3: 26–33
Bakshi G, Carr P, Wu L (2006) Stochastic risk premiums, stochastic skewness in currency options, and stochastic discount factors in international economies. J Financial Econ 87(1): 132–156
Bhaskar R, Laxman S, Smith A, Thakurat A (2010) Discovering frequent patterns in sensitive data KDD’10, July 25–28, 2010, Washington, DC, USA
Bo An, Sim KS, Tang LG, Mia CY, Shen ZQ, Cheng DJ (2008) Negotiation agents’ decision making using Markov chains. Stud Comput Intell 89: 3–23
Cao L, He T (2009) Developing actionable trading agents. Knowl Inf Syst 18: 183–198
Cavoukian A, (2009) Privacy as a negative externality: the solution privacy by design. WEIS Workshop on the Economics of Information Security in London, UK
Chellappa R, Sin RG (2005) Personalization versus privacy: an empirical examination of the online consumer’s dilemma. Inf Technol Manag 6: 2–3
Chouk I, Perrien J, Nantel J (2007) Consumer trust towards an unfamiliar web merchant: role of third parties. EMAC 2007 (European Marketing Academy). Available at http://www.chairerbc.com/chairerbc/fr/confscig.asp
Clinebell JM, Kahl DR, Stevens J (1994) Time series properties of the equity risk premium. J Financial Res XVII(1)
Cline J (2003) Website privacy seal: are they worth it? Available at http://www.computerworld.com/s/article/81041/Web_site_privacy_seals_Are_they_worth_it_
Danthine JP, Donalaon IB (2002) Intermediate financial theory, 1st edn. Pearson Education, New Jersey
Desmarais C, Shen X, Shirmohammadi S, Cameron A, Goerganas ND, Kerr I (2007) PLUTO—a privacy control protocol for e-commerce communities. In: Proceeding IEEE conference on enterprise computing, e-commerce and e-services, Tokyo, Japan
Dighton JA (2003). Market solutions to privacy problems? Chapter 6 in digital anonymity and the law—tensions and dimensions. T.M.C. Asser Press, Harvard Business School, The Hague
FIPA specification http://www.fipa.org/
Gkoulalas-Divanis A, Verykios VS (2009) Hiding sensitive knowledge without side effects. Knowl Inf Syst 20: 263–299
Gideon J, Egelman S, Cranor L, Acquisti A (2006) Power strips, prophylactics, and privacy, oh my! Symposium on usable privacy and security SOUPS, PA, USA
Hann I-H, Hui KL, Lee TS, Png IPL (2003)The value of online information privacy: an empirical investigation. AEI-Brookings joint center for regulatory studies
Holger B, Ram′on H, Sascha O, Roberto C (2007) Trust-based Service Provider Selection in Open Environments SAC’07 March 1115, 2007, Seoul, Korea
Hui KL, Tan BCY, Goh CY (2006) Online information disclosure: motivators and measurements. ACM Trans Intern Technol 6(4): 415–441
Huberman AB, Ader E, Fine LR (2005) Valuating privacy. IEEE Secur Priv 3(5): 22–25
Hussin AR, Macaulay L, Keeling K (2007) The importance ranking of trust attributes in e-commerce website. 11th Pacific-Asia conference on information systems
Keke C, Ling L (2010) Geometric data perturbation for privacy preserving outsource data mining knowledge and Information systems Published Online 23, November 2010 http://www.springerlink.com/content/e2132015k666x24k/
Kim DJ, Ferin DL, Rao HR (2008) A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents. Decis Support Syst 44: 544–564
Krause A, Horvitz E (2008) A utility-theoretic approach to privacy and personalization. In: Proceedings of the twenty-third AAAI conference on artificial intelligence
Larose R (2004) Promoting I-safety: the effects of consumer information and privacy seals on risk assessment and online privacy behavior. International Communication Association, New Orleans Sheraton, New Orleans. Available at http://www.allacademic.com/meta/p113099_index.html
Laudon KC (1996) Markets and privacy. Commun ACM 39(9): 92–104
Lioudakis GL, Koutsoloukas EA, Delaas Nl, Tselikas N, Kapellaki S, Preaerakos GN, Kaklamani DI, Venieris IS (2007) A middleware architecture for privacy protection. Comput Netw 51: 4679–4696
Liu K, Terzi E (2009) A framework for computing the privacy scores of users in online social networks. Ninth IEEE international conference on data mining, ICDM.2009.21
Mcsherry F (2010) Privacy integrated queries: an extensible platform for preserving data analysis. Commun ACM 53(9): 89–97
Meinert DB, Peterson D, Criswell J, Crossland MD (2003) Would regulation of web site privacy policy statements increase consumer trust? Inf Sci 9:123–142. URL: http://inform.nu/Articles/Vol9/v9p123-142Meinert82.pdf
Pennington R, Wilcox HD, Grover V (2003) The role of system trust in business-to consumer transactions. J Manag Inf Syst 20(3): 197–226
Piolle G, Demazeau Y, Caelen J (2007) Privacy management in user-centred multi-agent systems. ESAW 2006, Springer LNAI 4457, pp 354–367
Preibush S (2005) Implementing privacy negotiation techniques in e-commerce. In: Proceedings of the seventh IEEE international conference on e-commerce technology
Prins C (2006) When personal data, behavior and virtual identities become a commodity: would a property rights approach matter? SCRIPT-ed 3(4)
Ratnasingam P, Pavlou PA (2003) Technology trust in Internet based inter organizational electronic commerce. J Electron Comm Organ 1(1): 17–41
Ribaric S, Hrkac T (2008) TeMS-a multi-agent system for temporally rich domains. Knowl Inform Syst 15: 1–30
Ross S (2004) Stochastic processes. Wiley, New York, chap 8, (2nd edn, pp 366–381, 1995)
Sakuma J, Kobayashi S (2010) Large-scale k-means clustering with user-centric privacy-preservation. Knowl Inf Syst 25: 253–279
Sha W (2009) Types of structural assurance and their relationships with trusting intentions in business-to-consumer e-commerce. Electron Markets 19: 43–54
Schlager C, Pernul G (2008) Trust modeling in e-commerce through fuzzy cognitive maps. The third international conference on availability, reliability and security ARES 2008
Skylogiannis T, Anotniou G, Bassiliades N, Governatori G, Bikakis A (2007) DR-NEGOTIATE—a system for automated agent negotiation with defeasible logic-based strategies. Data Knowl Eng 63(2): 362–380
Sensoy M, Yulom P (2009) Evolving service semantics cooperatively: a consumer-driven approach. Auton Agents Multi-Agent Syst 18: 526–555
Spiekermann S (2001) Online information search with electronic agents: drivers, impediments, and privacy issues. http://edoc.hu-berlin.de/dissertationen/spiekermann-sarah-2001-11-22/PDF/Spiekermann.pdf
Syverson P (2003) The paradoxical value of privacy. 2nd Annual workshop on economics and information security (WEIS 2003)
Su SYW, Huang C, Hammer J (2000) A replicable web-based negotiation server for e-commerce. In: Proceedings 33rd Hawaii international conference on system sciences
Tang Z, Hu J, Smith MD (2008) Protecting online privacy: self-regulation, mandatory standards, or caveat emptor. J Manag Inf Syst 24(4): 153–173
Taylor CR (2004) Consumer privacy and the market for customer information. RAND J Econ 35(4): 631–650
Taylor H (2003) Most people are privacy pragmatists, who, while concerned about privacy, will sometimes trade it off for other benefits. The Harris Poll, 17
Yang B, Nakagawa H, Sato I, Sakuma J (2010) Collusion resistant privacy-preserving data Mining KDD’10, July 25–28, 2010, Washington, DC, USA
Yassine A, Shirmohammadi S (2009) An intelligent agent-based framework for privacy payoff negotiation in virtual environments. In: Proceedings of IEEE workshop on computational intelligence in virtual environments. Proceedings of IEEE symposium series on computational intelligence, Nashville, TN, USA
Yassine A, Shirmohammadi S (2008) A business privacy model for virtual communities. Int J Web Based Commun 5(2)
Yassine A, Shirmohammadi S (2009) Measuring users’ privacy payoff using intelligent agents IEEE computational intelligence society, international conference on computational intelligence for measurements systems and applications, CIMSA09
Yassine A, Shirmohammadi S (2008) Privacy and the market for private data: a negotiation model to capitalize on private data. In: Proceedings of ACS/IEEE international conference on computer systems and applications, Doha, Qatar, March 31–April 4 2008, pp 669–678
Yu T, Zhang Y, Lin KJ (2006). Modeling and measuring privacy risks in QoS web services. In: Proceeding of the 8th IEEE international conference on e-commerce technology and the 3rd IEEE international conference on enterprise computing, e-commerce, and e-services, 4 p
W3C (2005) The platform for privacy preferences 1.1 (P3P1.1) Specification. W3C working draft 4 http://www.w3.org/TR/2005/WD-P3P11-20050104/
Xin W, Xiaojun S, Nicolas DG (2006) A fuzzy logic based intelligent negotiation agent (FINA) in e-commerce. IEEE CCECE/CCGEI, Ottawa, May 2006
Zhang H (2005) Trust-promoting seals in electronic markets: impact of online shopping decisions. J Inf Technol Appl. Available at http://www.allbusiness.com/jitta/journal-information-technology-theory-application/11499500-1.html
Zhang R, Tran T (2011) An information gain-based approach for recommending useful product reviews. Knowl Inf Syst 26: 419–434
Zhuang Y, Fong S, Shi M (2008) Knowledge-empowered automated negotiation system for e-commerce. Knowl Inf Syst 17: 167–191
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yassine, A., Shirehjini, A.A.N., Shirmohammadi, S. et al. Knowledge-empowered agent information system for privacy payoff in eCommerce. Knowl Inf Syst 32, 445–473 (2012). https://doi.org/10.1007/s10115-011-0415-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10115-011-0415-3