Scrutable Mobile Client-side Personalization

Full Text (PDF, 428KB), PP.25-33

Views: 0 Downloads: 0

Author(s)

Muhammad Asif 1,*

1. Department of Computer and Information Science, IDI, Norwegian University of Science and Technology, Trondheim, Norway

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2015.05.04

Received: 10 May 2014 / Revised: 21 Oct. 2014 / Accepted: 14 Jan. 2015 / Published: 8 Apr. 2015

Index Terms

Mobile Services, Personalization, User Model, Scrutability, Privacy

Abstract

Personalization has become an essential feature of mobile services of different domains. On the other hand, users have conflicting needs of personalized experience and privacy. This leads to the question of how to maximize the user’s experience of personalized mobile services while keeping privacy. One possible solution is to provide user’s control of their personal data by keeping their user model on their personal mobile devices. In this way, a user can scrutinize the data while sharing with service providers depending on her/his requirements. The client-side personalization approach can shift the control of privacy to the users and can involve them in personalization process. Transparency and user control can increase the user’s trust. In this paper, we have proposed a solution with the objective of scrutable client-side personalization while keeping the user in control of both privacy and personalization process.

Cite This Paper

Muhammad Asif, "Scrutable Mobile Client-side Personalization", International Journal of Information Technology and Computer Science(IJITCS), vol.7, no.5, pp.25-33, 2015. DOI:10.5815/ijitcs.2015.05.04

Reference

[1]Asif, M. and J. Krogstie, Taxonomy of Personalization in Mobile Services, in Proceedings of the 10th IADIS International Conference e-Society 2012, ISBN: 978-972-8939-67-02012: Berlin, Germany.

[2]Loeb, S. and E. Panagos. Information filtering and personalization: Context, serendipity and group profile effects. 2011. IEEE.

[3]Berkovsky, S. Decentralized mediation of user models for a better personalization. 2006. Springer.

[4]Toch, E., Y. Wang, and L.F. Cranor, Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems. User Modeling and User-Adapted Interaction, 2012: p. 1-18.

[5]Kay, J. Scrutable adaptation: because we can and must. in Adaptive hypermedia and adaptive web-based systems. 2006. Springer.

[6]Panayiotou, C. and G. Samaras, mPERSONA: personalized portals for the wireless user: An agent approach. Mobile Networks and Applications, 2004. 9(6): p. 663-677.

[7]Kay, J., The um toolkit for cooperative user modelling. User Modeling and User-Adapted Interaction, 1994. 4(3): p. 149-196.

[8]El-Arini, K., et al. Transparent user models for personalization. in Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining. 2012. ACM.

[9]Asif, M. and J. Krogstie, Research Issues in Personalization of Mobile Services. International Journal of Information Engineering and Electronic Business 2012. 4(4).

[10]Jong-Hyuk, R. and J. Seunghun. Personalized advertisement recommendation system based on user profile in the smart phone. in Advanced Communication Technology (ICACT), 2012 14th International Conference on. 2012.

[11]Lee, J.S. and U. Chandra. Mobile phone-to-phone personal context sharing. 2009. IEEE. 

[12]Adomavicius, G. and A. Tuzhilin, Personalization technologies: a process-oriented perspective. Communications of the ACM, 2005. 48(10): p. 83-90.

[13]Hull, R., et al., Improving user experience through rule-based service customization. International Journal of Cooperative Information Systems, 2005. 14(04): p. 469-502.

[14]Hardt, M. and S. Nath. Privacy-aware personalization for mobile advertising. in Proceedings of the 2012 ACM conference on Computer and communications security. 2012. ACM.

[15]Kay, J., B. Kummerfeld, and P. Lauder. Managing private user models and shared personas. in Workshop on User Modeling in Ubiquitous Computing, pp. 1–11. Pittsburgh, PA (2003).

[16]Dickinson, I., et al., User profiling with privacy: A framework for adaptive information agents. Intelligent information agents, 2003: p. 123-151.

[17]Gerber, S., et al., PersonisJ: Mobile, Client-Side User Modelling. . 2010, Springer Berlin / Heidelberg. p. 111-122.

[18]Agostini, A., et al., Towards highly adaptive services for mobile computing. Mobile information systems, 2005: p. 121-134.

[19]Coroama, V. and M. Langheinrich. Personalized vehicle insurance rates-a case for client-side personalization in ubiquitous computing. in in Ubiquitous Computing. Workshop on Privacy-Enhanced Personalization. CHI 2006. 2006. Citeseer.

[20]Kobsa, A., Privacy-enhanced personalization. Communications of the ACM, 2007. 50(8): p. 24-33.

[21]Cassel, L. and U. Wolz. Client side personalization. in DELOS Workshop: Personalisation and Recommender Systems in Digital Libraries. 2001. Citeseer.

[22]Sundar, S.S. and S.S. Marathe, Personalization versus customization: The importance of agency, privacy, and power usage. Human Communication Research, 2010. 36(3): p. 298-322.

[23]Germanakos, P., et al. Innovative Personalization Issues for Providing User-Centric mGovernment Services. in Proceedings of the Second European Conference on Mobile Government (Euro mGov 2006), Brighton, August. 2006.

[24]Petersen, F., G. Bartolomeo, and M. Pluke, Personalization and user profile management. International Journal of Interactive Mobile Technologies, 2008. 2(4): p. 25-29.

[25]Junior, P.T.A. and L.V.L. Filgueiras. User modeling with personas. 2005. ACM.

[26]Zhang, X. and H. Han, An empirical testing of user stereotypes of information retrieval systems. Information Processing & Management, 2005. 41(3): p. 651-664.

[27]Rich, E., User modeling via stereotypes. Cognitive science, 1979. 3(4): p. 329-354.

[28]Kuflik, T., B. Shapira, and P. Shoval, Stereotype based versus personal based filtering rules in information filtering systems. Journal of the American Society for Information Science and Technology, 2003. 54(3): p. 243-250.

[29]Wagner, M., et al. A roadmap to advanced personalization of mobile services. Proc. Cooperative Information Systems, 2002.

[30]Kelley, P.G., et al. User-controllable learning of security and privacy policies. in Proceedings of the 1st ACM workshop on Workshop on AISec. 2008. ACM.

[31]Mitseva, A., M. Imine, and N.R. Prasad. Context-aware privacy protection with profile management. in Proceedings of the 4th international workshop on Wireless mobile applications and services on WLAN hotspots. 2006. ACM.