Skip to main content
Log in

Knowledge-empowered agent information system for privacy payoff in eCommerce

  • Regular Paper
  • Published:
Knowledge and Information Systems Aims and scope Submit manuscript

Abstract

Today, many online companies are gathering information and assembling sophisticated databases that know a great deal of information about many people, generally without the knowledge of those people. Such endeavor has resulted in the unprecedented attrition of individual’s right to informational self-determination. On the one hand, Consumers are powerless to prevent the unauthorized dissemination of their personal information, and on the other, they are excluded from its profitable commercial exchange. This paper focuses on developing knowledge-empowered agent information system for privacy payoff as a means of rewarding consumers for sharing their personal information with online businesses. The design of this system is driven by the following argument: if consumers’ personal information is a valuable asset, should they not be entitled to benefit from their asset as well? The proposed information system is a multi-agent system where several agents employ various knowledge and requirements for personal information valuation and interaction capabilities that most users cannot do on their own. The agents in the information system bear the responsibility of working on behalf of consumers to categorize their personal data objects, report to consumers on online businesses’ trust and reputation, determine the value of their compensation using risk-based financial models, and finally negotiate for a payoff value in return for the dissemination of users’ information. The details of the system as well as a proof-of-concept implementation using JADE (Java Agent Development Environment) are presented here.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Acquisti A, Grossklags J (2005) Privacy and rationality in individual decision making. IEEE Secur Priv 3: 26–33

    Google Scholar 

  2. Bakshi G, Carr P, Wu L (2006) Stochastic risk premiums, stochastic skewness in currency options, and stochastic discount factors in international economies. J Financial Econ 87(1): 132–156

    Article  Google Scholar 

  3. Bhaskar R, Laxman S, Smith A, Thakurat A (2010) Discovering frequent patterns in sensitive data KDD’10, July 25–28, 2010, Washington, DC, USA

  4. Bo An, Sim KS, Tang LG, Mia CY, Shen ZQ, Cheng DJ (2008) Negotiation agents’ decision making using Markov chains. Stud Comput Intell 89: 3–23

    Article  Google Scholar 

  5. Cao L, He T (2009) Developing actionable trading agents. Knowl Inf Syst 18: 183–198

    Article  Google Scholar 

  6. Cavoukian A, (2009) Privacy as a negative externality: the solution privacy by design. WEIS Workshop on the Economics of Information Security in London, UK

  7. Chellappa R, Sin RG (2005) Personalization versus privacy: an empirical examination of the online consumer’s dilemma. Inf Technol Manag 6: 2–3

    Article  Google Scholar 

  8. Chouk I, Perrien J, Nantel J (2007) Consumer trust towards an unfamiliar web merchant: role of third parties. EMAC 2007 (European Marketing Academy). Available at http://www.chairerbc.com/chairerbc/fr/confscig.asp

  9. Clinebell JM, Kahl DR, Stevens J (1994) Time series properties of the equity risk premium. J Financial Res XVII(1)

  10. Cline J (2003) Website privacy seal: are they worth it? Available at http://www.computerworld.com/s/article/81041/Web_site_privacy_seals_Are_they_worth_it_

  11. Danthine JP, Donalaon IB (2002) Intermediate financial theory, 1st edn. Pearson Education, New Jersey

  12. Desmarais C, Shen X, Shirmohammadi S, Cameron A, Goerganas ND, Kerr I (2007) PLUTO—a privacy control protocol for e-commerce communities. In: Proceeding IEEE conference on enterprise computing, e-commerce and e-services, Tokyo, Japan

  13. Dighton JA (2003). Market solutions to privacy problems? Chapter 6 in digital anonymity and the law—tensions and dimensions. T.M.C. Asser Press, Harvard Business School, The Hague

  14. FIPA specification http://www.fipa.org/

  15. Gkoulalas-Divanis A, Verykios VS (2009) Hiding sensitive knowledge without side effects. Knowl Inf Syst 20: 263–299

    Article  Google Scholar 

  16. Gideon J, Egelman S, Cranor L, Acquisti A (2006) Power strips, prophylactics, and privacy, oh my! Symposium on usable privacy and security SOUPS, PA, USA

  17. Hann I-H, Hui KL, Lee TS, Png IPL (2003)The value of online information privacy: an empirical investigation. AEI-Brookings joint center for regulatory studies

  18. Holger B, Ram′on H, Sascha O, Roberto C (2007) Trust-based Service Provider Selection in Open Environments SAC’07 March 1115, 2007, Seoul, Korea

  19. Hui KL, Tan BCY, Goh CY (2006) Online information disclosure: motivators and measurements. ACM Trans Intern Technol 6(4): 415–441

    Article  Google Scholar 

  20. Huberman AB, Ader E, Fine LR (2005) Valuating privacy. IEEE Secur Priv 3(5): 22–25

    Article  Google Scholar 

  21. Hussin AR, Macaulay L, Keeling K (2007) The importance ranking of trust attributes in e-commerce website. 11th Pacific-Asia conference on information systems

  22. Keke C, Ling L (2010) Geometric data perturbation for privacy preserving outsource data mining knowledge and Information systems Published Online 23, November 2010 http://www.springerlink.com/content/e2132015k666x24k/

  23. Kim DJ, Ferin DL, Rao HR (2008) A trust-based consumer decision-making model in electronic commerce: the role of trust, perceived risk, and their antecedents. Decis Support Syst 44: 544–564

    Article  Google Scholar 

  24. Krause A, Horvitz E (2008) A utility-theoretic approach to privacy and personalization. In: Proceedings of the twenty-third AAAI conference on artificial intelligence

  25. Larose R (2004) Promoting I-safety: the effects of consumer information and privacy seals on risk assessment and online privacy behavior. International Communication Association, New Orleans Sheraton, New Orleans. Available at http://www.allacademic.com/meta/p113099_index.html

  26. Laudon KC (1996) Markets and privacy. Commun ACM 39(9): 92–104

    Article  Google Scholar 

  27. Lioudakis GL, Koutsoloukas EA, Delaas Nl, Tselikas N, Kapellaki S, Preaerakos GN, Kaklamani DI, Venieris IS (2007) A middleware architecture for privacy protection. Comput Netw 51: 4679–4696

    Article  MATH  Google Scholar 

  28. Liu K, Terzi E (2009) A framework for computing the privacy scores of users in online social networks. Ninth IEEE international conference on data mining, ICDM.2009.21

  29. Mcsherry F (2010) Privacy integrated queries: an extensible platform for preserving data analysis. Commun ACM 53(9): 89–97

    Article  Google Scholar 

  30. Meinert DB, Peterson D, Criswell J, Crossland MD (2003) Would regulation of web site privacy policy statements increase consumer trust? Inf Sci 9:123–142. URL: http://inform.nu/Articles/Vol9/v9p123-142Meinert82.pdf

    Google Scholar 

  31. Pennington R, Wilcox HD, Grover V (2003) The role of system trust in business-to consumer transactions. J Manag Inf Syst 20(3): 197–226

    Google Scholar 

  32. Piolle G, Demazeau Y, Caelen J (2007) Privacy management in user-centred multi-agent systems. ESAW 2006, Springer LNAI 4457, pp 354–367

  33. Preibush S (2005) Implementing privacy negotiation techniques in e-commerce. In: Proceedings of the seventh IEEE international conference on e-commerce technology

  34. Prins C (2006) When personal data, behavior and virtual identities become a commodity: would a property rights approach matter? SCRIPT-ed 3(4)

  35. Ratnasingam P, Pavlou PA (2003) Technology trust in Internet based inter organizational electronic commerce. J Electron Comm Organ 1(1): 17–41

    Article  Google Scholar 

  36. Ribaric S, Hrkac T (2008) TeMS-a multi-agent system for temporally rich domains. Knowl Inform Syst 15: 1–30

    Article  Google Scholar 

  37. Ross S (2004) Stochastic processes. Wiley, New York, chap 8, (2nd edn, pp 366–381, 1995)

  38. Sakuma J, Kobayashi S (2010) Large-scale k-means clustering with user-centric privacy-preservation. Knowl Inf Syst 25: 253–279

    Article  Google Scholar 

  39. Sha W (2009) Types of structural assurance and their relationships with trusting intentions in business-to-consumer e-commerce. Electron Markets 19: 43–54

    Article  Google Scholar 

  40. Schlager C, Pernul G (2008) Trust modeling in e-commerce through fuzzy cognitive maps. The third international conference on availability, reliability and security ARES 2008

  41. Skylogiannis T, Anotniou G, Bassiliades N, Governatori G, Bikakis A (2007) DR-NEGOTIATE—a system for automated agent negotiation with defeasible logic-based strategies. Data Knowl Eng 63(2): 362–380

    Article  Google Scholar 

  42. Sensoy M, Yulom P (2009) Evolving service semantics cooperatively: a consumer-driven approach. Auton Agents Multi-Agent Syst 18: 526–555

    Article  Google Scholar 

  43. Spiekermann S (2001) Online information search with electronic agents: drivers, impediments, and privacy issues. http://edoc.hu-berlin.de/dissertationen/spiekermann-sarah-2001-11-22/PDF/Spiekermann.pdf

  44. Syverson P (2003) The paradoxical value of privacy. 2nd Annual workshop on economics and information security (WEIS 2003)

  45. Su SYW, Huang C, Hammer J (2000) A replicable web-based negotiation server for e-commerce. In: Proceedings 33rd Hawaii international conference on system sciences

  46. Tang Z, Hu J, Smith MD (2008) Protecting online privacy: self-regulation, mandatory standards, or caveat emptor. J Manag Inf Syst 24(4): 153–173

    Article  Google Scholar 

  47. Taylor CR (2004) Consumer privacy and the market for customer information. RAND J Econ 35(4): 631–650

    Article  Google Scholar 

  48. Taylor H (2003) Most people are privacy pragmatists, who, while concerned about privacy, will sometimes trade it off for other benefits. The Harris Poll, 17

  49. Yang B, Nakagawa H, Sato I, Sakuma J (2010) Collusion resistant privacy-preserving data Mining KDD’10, July 25–28, 2010, Washington, DC, USA

  50. Yassine A, Shirmohammadi S (2009) An intelligent agent-based framework for privacy payoff negotiation in virtual environments. In: Proceedings of IEEE workshop on computational intelligence in virtual environments. Proceedings of IEEE symposium series on computational intelligence, Nashville, TN, USA

  51. Yassine A, Shirmohammadi S (2008) A business privacy model for virtual communities. Int J Web Based Commun 5(2)

  52. Yassine A, Shirmohammadi S (2009) Measuring users’ privacy payoff using intelligent agents IEEE computational intelligence society, international conference on computational intelligence for measurements systems and applications, CIMSA09

  53. Yassine A, Shirmohammadi S (2008) Privacy and the market for private data: a negotiation model to capitalize on private data. In: Proceedings of ACS/IEEE international conference on computer systems and applications, Doha, Qatar, March 31–April 4 2008, pp 669–678

  54. Yu T, Zhang Y, Lin KJ (2006). Modeling and measuring privacy risks in QoS web services. In: Proceeding of the 8th IEEE international conference on e-commerce technology and the 3rd IEEE international conference on enterprise computing, e-commerce, and e-services, 4 p

  55. W3C (2005) The platform for privacy preferences 1.1 (P3P1.1) Specification. W3C working draft 4 http://www.w3.org/TR/2005/WD-P3P11-20050104/

  56. Xin W, Xiaojun S, Nicolas DG (2006) A fuzzy logic based intelligent negotiation agent (FINA) in e-commerce. IEEE CCECE/CCGEI, Ottawa, May 2006

  57. Zhang H (2005) Trust-promoting seals in electronic markets: impact of online shopping decisions. J Inf Technol Appl. Available at http://www.allbusiness.com/jitta/journal-information-technology-theory-application/11499500-1.html

  58. Zhang R, Tran T (2011) An information gain-based approach for recommending useful product reviews. Knowl Inf Syst 26: 419–434

    Article  Google Scholar 

  59. Zhuang Y, Fong S, Shi M (2008) Knowledge-empowered automated negotiation system for e-commerce. Knowl Inf Syst 17: 167–191

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdulsalam Yassine.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yassine, A., Shirehjini, A.A.N., Shirmohammadi, S. et al. Knowledge-empowered agent information system for privacy payoff in eCommerce. Knowl Inf Syst 32, 445–473 (2012). https://doi.org/10.1007/s10115-011-0415-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10115-011-0415-3

Keywords

Navigation