{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:38:10Z","timestamp":1725557890938},"publisher-location":"Berlin, Heidelberg","reference-count":43,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540206101"},{"type":"electronic","value":"9783540409564"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-40956-4_12","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T15:02:02Z","timestamp":1277218922000},"page":"177-188","source":"Crossref","is-referenced-by-count":11,"title":["A Component Architecture for Dynamically Managing Privacy Constraints in Personalized Web-Based Systems"],"prefix":"10.1007","author":[{"given":"Alfred","family":"Kobsa","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1023\/A:1026505626690","volume":"10","author":"A. Corbett","year":"2000","unstructured":"Corbett, A., McLaughlin, M., Scarpinatto, K.C.: Modeling Student Knowledge: Cognitive Tutors in High School and College. User Modeling and User-Adapted Interaction\u00a010, 81\u2013108 (2000)","journal-title":"User Modeling and User-Adapted Interaction"},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1023\/A:1026553509852","volume":"10","author":"L. Strachan","year":"2000","unstructured":"Strachan, L., Anderson, J., Sneesby, M., Evans, M.: Minimalist User Modelling in a Complex Commercial Software System. User Modeling and User-Adapted Interaction\u00a010, 109\u2013146 (2000)","journal-title":"User Modeling and User-Adapted Interaction"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1023\/A:1026521931194","volume":"10","author":"F. Linton","year":"2000","unstructured":"Linton, F., Schaefer, H.-P.: Recommender Systems for Learning: Building User and Expert Models through Long-Term Observation of Application Use. User Modeling and User-Adapted Interaction\u00a010, 181\u2013208 (2000)","journal-title":"User Modeling and User-Adapted Interaction"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1023\/A:1026501525781","volume":"10","author":"D. Billsus","year":"2000","unstructured":"Billsus, D., Pazzani, M.J.: User Modeling for Adaptive News Access. User Modeling and User-Adapted Interaction\u00a010, 147\u2013180 (2000)","journal-title":"User Modeling and User-Adapted Interaction"},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1023\/A:1015047002796","volume":"12","author":"S. Keates","year":"2002","unstructured":"Keates, S., Langdon, P., Clarkson, P., Robinson, P.: User Models and User Physical Capability. User Modeling and User-Adapted Interaction\u00a012, 139\u2013169 (2002)","journal-title":"User Modeling and User-Adapted Interaction"},{"key":"12_CR6","unstructured":"Kobsa, A.: Adapting Web Information to Disabled and Elderly Users (invited talk). Web- Net-99, Honolulu, HI (1999), http:\/\/www.ics.uci.edu\/~kobsa\/papers\/1999-webnet99-kobsa.pdf"},{"key":"12_CR7","volume-title":"The One to One Future: Building Relationships One Customer at a Time","author":"D. Peppers","year":"1993","unstructured":"Peppers, D., Rogers, M.: The One to One Future: Building Relationships One Customer at a Time. Currency Doubleday, New York (1993)"},{"key":"12_CR8","volume-title":"Enterprise One to One: Tools for Competing in the Interactive Age","author":"D. Peppers","year":"1997","unstructured":"Peppers, D., Rogers, M.: Enterprise One to One: Tools for Competing in the Interactive Age. Currency Doubleday, New York (1997)"},{"key":"12_CR9","unstructured":"Forrester Research: The Privacy Best Practise. Cambridge, MA (September 1999)"},{"key":"12_CR10","unstructured":"Hof, R., Green, H., Himmelstein, L.: Now it\u2019s YOUR WEB. Business Week October 5, pp. 68\u201375 (1998)"},{"key":"12_CR11","unstructured":"Personalization & Privacy Survey. Personalization Consortium (2000), http:\/\/www.personalization.org\/SurveyResults.pdf"},{"key":"12_CR12","unstructured":"Thompson, M.: Registered Visitors Are a Portal\u2019s Best Friend. The Industry Standard, June 7 (1999), http:\/\/www.thestandard.net"},{"key":"12_CR13","unstructured":"Brand Conversion. ICONOCAST (1999), http:\/\/www.iconocast.com\/issue\/1999102102.html"},{"key":"12_CR14","unstructured":"Recommender Systems in E-Commerce (2000), http:\/\/www.cs.umn.edu\/Research\/GroupLens\/slides-2.pdf"},{"key":"12_CR15","unstructured":"Cooperstein, D., Delhagen, K., Aber, A., Levin, K.: Making Net Shoppers Loyal. Forrester Research, Cambridge, MA (June 1999)"},{"key":"12_CR16","volume-title":"The One to One Fieldbook","author":"D. Peppers","year":"1999","unstructured":"Peppers, D., Rogers, M., Dorf, B.: The One to One Fieldbook. Currency Doubleday, New York (1999)"},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1017\/S0269888901000108","volume":"16","author":"A. Kobsa","year":"2001","unstructured":"Kobsa, A., Koenemann, J., Pohl, W.: Personalized Hypermedia Presentation Techniques for Improving Customer Relationships. The Knowledge Engineering Review\u00a016, 111\u2013155 (2001), http:\/\/www.ics.uci.edu\/~kobsa\/papers\/2001-KER-kobsa.pdf","journal-title":"The Knowledge Engineering Review"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Teltzrow, M., Kobsa, A.: Impacts of User Privacy Preferences on Personalized Systems - a Comparative Study. In: CHI-2003 Workshop Designing Personalized User Experiences for eCommerce: Theory, Methods, and Research, Fort Lauderdale, FL (2003), http:\/\/www.ics.uci.edu\/~kobsa\/papers\/2003-CHI-teltzrow-kobsa.pdf","DOI":"10.1007\/1-4020-2148-8_17"},{"key":"12_CR19","unstructured":"Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd Generation ECommerce: Privacy Preferences versus Actual Behavior. In: EC 2001: Third ACM Conference on Electronic Commerce, Tampa, FL, pp. 38\u201347 (2001), http:\/\/doi.acm.org\/10.1145\/501158.501163"},{"key":"12_CR20","unstructured":"A Collection and Systematization of International Privacy Laws, with Special Consideration of Internationally Operating Personalized Websites (2002), http:\/\/www.ics.uci.edu\/~kobsa\/privacy"},{"key":"12_CR21","unstructured":"Teleservices Data Protection Law (Article 3 of the Law on the Legal Requirements for Electronic Business Dealings of 14 December 2001). German Federal Law Gazette 1, 3721 (2001), http:\/\/www.iid.de\/iukdg\/aktuelles\/fassung_tdg_eng.pdf"},{"key":"12_CR22","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1023\/A:1011187500863","volume":"11","author":"A. Kobsa","year":"2001","unstructured":"Kobsa, A.: Generic User Modeling Systems. User Modeling and User-Adapted Interaction\u00a011, 49\u201363 (2001), http:\/\/www.ics.uci.edu\/~kobsa\/papers\/2001-UMUAI-kobsa.pdf","journal-title":"User Modeling and User-Adapted Interaction"},{"key":"12_CR23","unstructured":"EU: Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of such Data. Official Journal of the European Communities (1995) 31ff (October 1995), http:\/\/158.169.50.95:10080\/legal\/en\/dataprot\/directiv\/directiv.html.7"},{"key":"12_CR24","first-page":"19","volume":"4","author":"P. Brusilivsky","year":"2000","unstructured":"Brusilivsky, P.: Adaptive and Intelligent Technologies for Web-based Education. KI\u00a04, 19\u201325 (2000), http:\/\/www2.sis.pitt.edu\/~peterb\/papers\/KI-review.html","journal-title":"KI"},{"key":"12_CR25","unstructured":"EU: Directive 2002\/58\/EC of the European Parliament and of the Council Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector (2002), http:\/\/register.consilium.eu.int\/pdf\/en\/02\/st03\/03636en2.pdf"},{"key":"12_CR26","unstructured":"D\u00e9cret no 99-200 du 17 mars 1999 d\u00e9finissant les cat\u00e9gories de moyens et de prestations de cryptologie dispens\u00e9es de toute formalit\u00e9 pr\u00e9alable. Le Journal officiel de la R\u00e9publique fran\u00e7aise (1999), http:\/\/www.legifrance.gouv.fr\/WAspad\/UnTexteDeJorf?numjo=PRMX9903477D"},{"key":"12_CR27","unstructured":"Self-Regulatory Principles for Online Preference Marketing by Network Advisers. Network Advertising Initiative (2000), http:\/\/www.networkadvertising.org\/images\/NAI_Principles.pdf"},{"key":"12_CR28","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-017-0377-2","volume-title":"Security and Privacy in User Modeling","author":"J. Schreck","year":"2003","unstructured":"Schreck, J.: Security and Privacy in User Modeling. Kluwer Academic Publishers, Dordrecht (2003), http:\/\/www.security-and-privacy-in-user-modeling.info"},{"key":"12_CR29","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/767193.767196","volume":"3","author":"A. Kobsa","year":"2003","unstructured":"Kobsa, A., Schreck, J.: Privacy through Pseudonymity in User-Adaptive Systems. ACM Transactions on Internet Technology\u00a03, 149\u2013183 (2003), http:\/\/www.ics.usi.edu\/~kobsa\/papers\/2003-TOIT-kobsa.pdf","journal-title":"ACM Transactions on Internet Technology"},{"key":"12_CR30","unstructured":"GVU\u2019s 10th WWW User Survey. Graphics, Visualization and Usability Lab, Georgia Tech (1998), http:\/\/www.cc.gatech.edu\/gvu\/user_surveys\/survey-1998-10\/"},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic Databases. In: 28th International Conference on Very Large Databases, Hong Kong, China (2002), http:\/\/www.vldb.org\/conf\/2002\/S05P02.pdf","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"12_CR32","unstructured":"Enterprise Privacy Architecture: Securing Returns on E-Business (2002), http:\/\/www-1.ibm.com\/services\/files\/epaexecbrief.pdf"},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Karjoth, G., Schunter, M., Waidner, M.: Privacy-Enabled Services for Enterprises. In: International Workshop on Trust and Privacy in Digital Business (Trustbus 2002), Aix-en- Provence, France, pp. 483\u2013487 (2002)","DOI":"10.1109\/DEXA.2002.1045944"},{"key":"12_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/3-540-36467-6_6","volume-title":"Privacy Enhancing Technologies","author":"G. Karjoth","year":"2003","unstructured":"Karjoth, G., Schunter, M., Waidner, M.: Platform for Enterprise Privacy Practices: Privacy-enabled Management of Customer Data. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 69\u201384. Springer, Heidelberg (2003)"},{"key":"12_CR35","doi-asserted-by":"crossref","unstructured":"Karjoth, G., Schunter, M.: A Privacy Policy Model for Enterprises. In: 15th Computer Security Foundations Workshop (CSFW 2002), Cape Breton, Nova Scotia, Canada, pp. 271\u2013281 (2002)","DOI":"10.1109\/CSFW.2002.1021821"},{"key":"12_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45150-1","volume-title":"IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms","author":"S. Fischer-H\u00fcbner","year":"2001","unstructured":"Fischer-H\u00fcbner, S.: IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms. LNCS, vol.\u00a01958. Springer, Heidelberg (2001)"},{"key":"12_CR37","volume-title":"Component Software: Beyond Object-Oriented Programming","author":"C. Szyperski","year":"1998","unstructured":"Szyperski, C.: Component Software: Beyond Object-Oriented Programming. Addison-Wesley, Reading (1998)"},{"key":"12_CR38","volume-title":"Component Based Software Engineering: Putting the Pieces Together","author":"G.T. Heineman","year":"2001","unstructured":"Heineman, G.T., Councill, W.T.: Component Based Software Engineering: Putting the Pieces Together. Addison-Wesley, Reading (2001)"},{"key":"12_CR39","unstructured":"Liu, C.: Redundant Arrays of Independent Components. School of Information and Computer Science, Irvine, CA. University of California, Berkeley (2002)"},{"key":"12_CR40","doi-asserted-by":"crossref","unstructured":"Liu, C., Richardson, D.J.: Research Directions in RAICs. ACM SIGSOFT Software Engineering Notes\u00a027 (2002)","DOI":"10.1145\/638574.638586"},{"key":"12_CR41","series-title":"School of Information and Computer Science","volume-title":"The RAIC Architectural Style","author":"C. Liu","year":"2002","unstructured":"Liu, C., Richardson, D.J.: The RAIC Architectural Style. School of Information and Computer Science, Irvine, CA. University of California, Berkeley (2002)"},{"key":"12_CR42","unstructured":"A P3P Preference Exchange Language 1.0 (APPEL1.0): W3C Working Draft April 15 (2002), http:\/\/www.w3.org\/TR\/P3P-preferences"},{"key":"12_CR43","unstructured":"The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. W3C Recommendation April 16 (2002), http:\/\/www.w3.org\/TR\/P3P\/"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-40956-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T05:37:14Z","timestamp":1559194634000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-40956-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540206101","9783540409564"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-40956-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}