User Profiling Based on the Identities of Information Sources

Authors

  • Jacek Małyszko Uniwersytet Ekonomiczny w Poznaniu
  • Dawid Węckowski Uniwersytet Ekonomiczny w Poznaniu

DOI:

https://doi.org/10.18559/SOEP.2017.12.6

Keywords:

Personal profile, Customer profile, Identity, Enterprise identity, Single Sign-On (SSO), Virtual Private LAN Service (VPLS)

Abstract

Along with the increased activity of people on the web, more and more information about them can be gathered based on the analysis of which web pages they visit, what data about themselves they put on the web and who they make contact with. Such information can be used to build so-called virtual identities of web users. Th is article presents the results of research on the problem of building an initial user identity in a situation, when the information about the user is limited very much, i.e. in the early stages of interaction with the system. A solution to this problem is proposed, in which the initial identities are constructed and based on the identity of information sources, which have been declared by the users as relevant to their information needs. Th e conducted experiment revealed that such identities of information sources can be used to build initial user identities.

Downloads

Download data is not yet available.

References

Camenisch, J., Fischer-Hübner, S., Rannenberg, K. (ed)., 2011, Privacy and Identity Management for Life, Springer, Berlin Heidelberg.

Cameron, K., 2005, The Laws of Identity, http://msdn.microsoft .com/en-us/library/ ms996456.aspx [dostęp 14.08.2013].

Clarke, R., Dissidentity, 2008, w: Identity in the Information Society, Springer, https://link.springer.com/article/10.1007%2Fs12394-009-0013-7 [dostęp 11.12.2017].

Gilbert, C., Upatising, L., 2013, Formal Analysis of BrowserID/Mozilla Persona, http:// www.stanford.edu/~lazau/BrowserIDPersona.pdf [dostęp 20.11.2013].

Hammer-Lahav, E., 2011, The OAuth 1.0 Protocol, http://tools.ietf.org/html/rfc5849 [dostęp 21.11.2013].

Higgins, 2013, PDS Vision. http://wiki.eclipse.org/PDS_Vision [dostęp 14.11.2013].

Hodges, J., Philpott, R., Maler, E., 2005, Glossary for the OASIS Security Assertion Markup Language (SAML) V2.0, http://docs.oasis-open.org/security/saml/v2.0/ saml-glossary-2.0-os.pdf [dostęp 5.11.2013].

Identity Commons, 2013, http://www.idcommons.org/ [dostęp 12.08.2013].

Identity Commons. Identity Landscape, 2012, http://wiki.idcommons.net/Identity_ Landscape [dostęp 12.08.2013].

Kantara Initiative, 2013, http://kantarainitiative.org/ [dostęp 12.08.2013].

Kubicek, H., 2010, Introduction: Conceptual Framework and Research Design for a Comparative Analysis of National eID Management Systems in Selected European Countries, Identity in the Information Society, vol. 3, iss. 1, s. 5-26, Springer, Berlin Heidelberg.

Miorandi, M. Sicari, S., De Pellegrini, F. Chlamtac, I, 2012, Internet of Things: Vision, Applications and Research Challenges, Ad Hoc Networks, vol. 10, iss. 7, s. 1497- 1516.

Nabeth. T., 2009, Identity of Identity, in: Rannenberg, K., Royer, D., Deuker, A. (eds.), The Future of Identity in the Information Society: Challenges and Opportunities, Springer, Berlin Heidelberg, s. 19-69.

OpenID Community, OpenID Authentication 2.0 - Final, 2007, http://openid.net/ specs/openid-authentication-2_0.html [dostęp 20.11.2013].

OpenID Foundation. Work Groups of OpenID Foundation, 2013, http://openid.net/ wg/ [dostęp 12.08.2013].

Personal Inc., 2013, Personal system, https://www.personal.com/ [dostęp 12.08.2013].

Ragouzis, N., Hughes, J., Philpott, R., Maler, E., 2006, Security Assertion Markup Language (SAML) V2.0 Technical Overview, http://www.oasis-open.org/committees/ documents.php?wg_abbrev=security [dostęp 20.11.2013].

Rajasekaran, H. et al., 2010, SWIFT White Paper. SWIFT Identity Architecture, http:// www-wordpress.sit.fraunhofer.de/ist-swift /wp-content/uploads/sites/10/2013/10/ Whitepaper-SWIFT_Identity_Architecture.pdf [dostęp 14.11.2013].

Rannenberg, K., Royer, D., Deuker, A. (eds.), 2009, The Future of Identity in the Information Society: Challenges and Opportunities, Springer, Berlin Heidelberg.

Rich, E., User Modeling via Stereotypes, 1979, Cognitive Science, vol. 3, iss. 4, s. 329- 354.

Rundle, M., Maler, E., Nadalin, A., Reed, D., Thibeau, D., 2010, The Open Identity Trust Framework Model, http://openidentityexchange.org/sites/default/fi les/the- -open-identity-trust-framework-model-2010-03.pdf [dostęp 14.08.2013].

Scerri, S., Gimenez, R., Herman, F., Bourimi, M., Thiel, S., 2011, Digital. Me towards an Integrated Personal Information Sphere, in: Proceedings on the Federated Social Web Summit, W3C.

Schein, A., Popescul, A., Ungar, L.H., Pennock, D.M., 2002, Methods and Metrics for Cold-start Recommendations, Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, New York, NY, s. 253-260.

Story, H., Corlosquet, S., 2011, Web 1.0. Web Identification and Discovery, http://www. w3.org/2005/Incubator/webid/spec [dostęp 20.11.2013].

Węckowski, D.G., Małyszko, J., Abramowicz, W., 2012, Zarządzanie tożsamością w internecie przyszłości, w: Jurek, W. (red.), Matematyka i informatyka na usługach ekonomii. Informatyka ekonomiczna, Zeszyty Naukowe, nr 239, Wydawnictwo Uniwersytetu Ekonomicznego w Poznaniu, s. 9-19.

Węckowski, D.G., Schmidt P., 2014, Evolution of Wikipedia-based Virtual Identities, Journal of Systems Integration, vol. 5, iss. 3, s. 67-77.

Downloads

Published

31-12-2017

Issue

Section

Articles

How to Cite

Małyszko, Jacek, and Dawid Węckowski. 2017. “User Profiling Based on the Identities of Information Sources”. DEMO 5 (12): 79-91. https://doi.org/10.18559/SOEP.2017.12.6.

Share

Similar Articles

21-30 of 56

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)