Knowledge-empowered agent information system for privacy payoff in eCommerce

被引:9
|
作者
Yassine, Abdulsalam [1 ]
Shirehjini, Ali Asghar Nazari [1 ]
Shirmohammadi, Shervin [1 ]
Tran, Thomas T. [1 ]
机构
[1] Univ Ottawa, Sch Informat Technol & Engn SITE, Distributed & Collaborat Virtual Environm Res, Ottawa, ON, Canada
关键词
Knowledge; Information system; Agents; Privacy; eCommerce; NEGOTIATION; TRUST; MARKET; MODEL;
D O I
10.1007/s10115-011-0415-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today, many online companies are gathering information and assembling sophisticated databases that know a great deal of information about many people, generally without the knowledge of those people. Such endeavor has resulted in the unprecedented attrition of individual's right to informational self-determination. On the one hand, Consumers are powerless to prevent the unauthorized dissemination of their personal information, and on the other, they are excluded from its profitable commercial exchange. This paper focuses on developing knowledge-empowered agent information system for privacy payoff as a means of rewarding consumers for sharing their personal information with online businesses. The design of this system is driven by the following argument: if consumers' personal information is a valuable asset, should they not be entitled to benefit from their asset as well? The proposed information system is a multi-agent system where several agents employ various knowledge and requirements for personal information valuation and interaction capabilities that most users cannot do on their own. The agents in the information system bear the responsibility of working on behalf of consumers to categorize their personal data objects, report to consumers on online businesses' trust and reputation, determine the value of their compensation using risk-based financial models, and finally negotiate for a payoff value in return for the dissemination of users' information. The details of the system as well as a proof-of-concept implementation using JADE (Java Agent Development Environment) are presented here.
引用
收藏
页码:445 / 473
页数:29
相关论文
共 50 条
  • [21] Information and knowledge exchange in a multi-agent system for stock trading
    Luo, Y
    Davis, DN
    Liu, KC
    2001 ENTERPRISE NETWORKING, APPLICATIONS AND SERVICES CONFERENCE PROCEEDINGS: ENTNET(AT)SUPERCOMM2001, 2001, : 47 - 55
  • [22] Knowledge power: Intellectual property, information, and privacy
    Hosein, Ian
    INFORMATION SOCIETY, 2006, 22 (05): : 367 - 368
  • [23] Knowledge power: Intellectual property, information, and privacy
    Valauskas, EJ
    JOURNAL OF ACADEMIC LIBRARIANSHIP, 2005, 31 (02): : 168 - 169
  • [24] Information agent system
    Kamimura, R
    Kamimura, T
    IC-AI'2001: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOLS I-III, 2001, : 1329 - 1334
  • [25] Multi-agent based cooperative information system using knowledge level
    Kang, SH
    Park, SS
    COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 2000, : 264 - 267
  • [26] Exploiting multi-agent interactions for identifying the best-payoff information source
    Seo, YW
    Sycara, K
    2005 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON INTELLIGENT AGENT TECHNOLOGY, PROCEEDINGS, 2005, : 344 - 350
  • [27] Effective 'ageing in place': empowered by visualisable information presented by a clinical information system
    Yu, Ping
    McMillan, Margaret
    AUSTRALASIAN JOURNAL ON AGEING, 2006, 25 (03) : 167 - 167
  • [28] Developing and validating a common body of knowledge for information privacy
    Lavranou, Rena
    Tsohou, Aggeliki
    INFORMATION AND COMPUTER SECURITY, 2019, 26 (05) : 668 - 686
  • [29] A multi-agent system empowered by federated learning and genetic programming
    Gomes, Luis
    Ribeiro, Bruno
    Lezama, Fernando
    Vale, Zita
    2023 31ST SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, SIU, 2023,
  • [30] A mobile agent system providing offer privacy
    Yao, M
    Henricksen, M
    Maitland, G
    Foo, E
    Dawson, E
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 301 - 312