{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T06:45:27Z","timestamp":1764053127645,"version":"3.41.2"},"reference-count":59,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2005,9,1]],"date-time":"2005-09-01T00:00:00Z","timestamp":1125532800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005,9,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>To propose a model of a privacy\u2010enhanced catalogue search system (PECSS) in an attempt to address privacy threats to consumers, who search for products and services on the world wide web.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The model extends an agent\u2010based architecture for electronic catalogue mediation by supplementing it with a privacy enhancement mechanism. This mechanism introduces fake queries into the original stream of user queries, in an attempt to reduce the similarity between the actual interests of users (\u201cinternal user profile\u201d) and the interests as observed by potential eavesdroppers on the web (\u201cexternal user profile\u201d). A prototype was constructed to demonstrate the feasibility and effectiveness of the model.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The evaluation of the model indicates that, by generating five fake queries per each original user query, the user's profile is hidden most effectively from any potential eavesdropper. Future research is needed to identify the optimal glossary of fake queries for various clients. The model also should be tested against various attacks perpetrated against the mixed stream of original and fake queries (i.e. statistical clustering).<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The model's feasibility was evaluated through a prototype. It was not empirically tested against various statistical methods used by intruders to reveal the original queries.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>A useful architecture for electronic commerce providers, internet service providers (ISP) and individual clients who are concerned with their privacy and wish to minimize their dependencies on third\u2010party security providers.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The contribution of the PECSS model stems from the fact that, as the internet gradually transforms into a non\u2010free service, anonymous browsing cannot be employed any more to protect consumers' privacy, and therefore other approaches should be explored. Moreover, unlike other approaches, our model does not rely on the honesty of any third mediators and proxies that are also exposed to the interests of the client. In addition, the proposed model is scalable as it is installed on the user's computer.<\/jats:p><\/jats:sec>","DOI":"10.1108\/10662240510615164","type":"journal-article","created":{"date-parts":[[2007,1,15]],"date-time":"2007-01-15T19:47:46Z","timestamp":1168890466000},"page":"378-399","source":"Crossref","is-referenced-by-count":17,"title":["Enhancing customer privacy while searching for products and services on the world wide web"],"prefix":"10.1108","volume":"15","author":[{"given":"Yuval","family":"Elovici","sequence":"first","affiliation":[]},{"given":"Chanan","family":"Glezer","sequence":"additional","affiliation":[]},{"given":"Bracha","family":"Shapira","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2021010520015080700_b1","unstructured":"Baldwin, D. and Yadav, S.B. (1995), \u201cThe process of research investigation in artificial intelligence: a unified view\u201d, IEEE Transactions on Systems, Man, and Cybernetics, Vol. 25 No. 5, pp. 852\u201061."},{"key":"key2021010520015080700_b3","doi-asserted-by":"crossref","unstructured":"Berthold, O. and Langos, J. (2002), \u201cDummy traffic against long\u2010term intersection attacks\u201d, Proceedings of Privacy\u2010Enhancing Technologies Workshop (PET 2002), San Francisco, CA, available at: http:\/\/page.mi.fu\u2010berlin.de\/ \u223c\u2009berthold\/publ\/BeLa_02.pdf.","DOI":"10.1007\/3-540-36467-6_9"},{"key":"key2021010520015080700_b4","unstructured":"Boza, E. (1999), \u201cTrust and concern in consumers' perceptions of marketing information management practices\u201d, Journal of Interactive Marketing, Vol. 13 No. 1, pp. 5\u201024."},{"key":"key2021010520015080700_b6","doi-asserted-by":"crossref","unstructured":"Chaum, D. (1981), \u201cUntraceable electronic mail, return addresses, and digital pseudonyms\u201d, Communications of the ACM, Vol. 24 No. 2, pp. 84\u20108.","DOI":"10.1145\/358549.358563"},{"key":"key2021010520015080700_b9","unstructured":"Claessens, J., Preneel, B. and Vandewalle, J. (1999), \u201cSolutions for anonymous communication on the internet\u201d, Proceedings of the 1999 IEEE International Carnahan Conference on Security Technology, pp. 298\u2010303."},{"key":"key2021010520015080700_b8","unstructured":"Claessens, J., Diaz, C., Goemans, C., Preneel, B., Vandewalle, J. and Dumortier, J. (2003), \u201cRevocable anonymous access to the internet\u201d, Internet Research, Vol. 13 No. 4, pp. 242\u201058."},{"key":"key2021010520015080700_b10","unstructured":"Culnan, M.J. (1999), \u201cGeorgetown internet privacy policy survey: report to the federal trade commission\u201d, available at: www.msb.edu\/faculty\/cuinanm\/gippshome.html."},{"key":"key2021010520015080700_b12","doi-asserted-by":"crossref","unstructured":"Danish, S. and Gannon, P. (1998), Building Database\u2010Driven Catalogues, McGraw\u2010Hill, New York, NY.","DOI":"10.1145\/306101.306103"},{"key":"key2021010520015080700_b13","unstructured":"Driscoll, M., Roberts, C., Lyons, E., Jain, J. and Nuckols, J. (1997), \u201cSecure online payment systems\u201d, available at: http:\/\/mba.vanderbilt.edu\/student\/mba98\/Jeffrey.nuckols\/secure onlinepayment\/securepayments frames.html."},{"key":"key2021010520015080700_b14","unstructured":"Elovici, Y. and Glezer, C. (2004), \u201cAnonymity enhancing technologies (AET): opportunities and threats\u201d, Journal of Information Warfare, Vol. 3 No. 3, pp. 49\u201062."},{"key":"key2021010520015080700_b15","doi-asserted-by":"crossref","unstructured":"Elovici, Y., Shapira, B. and Meshiach, A. (2002), \u201cA new privacy model for hiding group interests while accessing the web\u201d, 9th ACM Conference on Computer and Communication Security.","DOI":"10.1145\/644527.644534"},{"key":"key2021010520015080700_b16","unstructured":"Ernst & Young (1999), \u201cSecond annual internet shopping survey\u201d, available at: www.ey.com\/industry\/consumer\/intemetshopping."},{"key":"key2021010520015080700_b18","unstructured":"Fischer\u2010H\u00fcbner, S. and Thomas, D. (2000), \u201cPrivacy and security at risk in the global information society\u201d, in Loade, B. (Ed.), Cybercrime, Routledge, London."},{"key":"key2021010520015080700_b20","unstructured":"Gabber, E., Gibbons, P.B., Kristol, D.M., Matias, Y. and Mayer, A. (1999), \u201cOn secure and pseudonymous client\u2010relationships with multiple servers\u201d, ACM Transactions on Information and System Security, Vol. 2 No. 4, pp. 390\u2010415."},{"key":"key2021010520015080700_b21","doi-asserted-by":"crossref","unstructured":"Genesereth, M.R. and Ketchpel, S.P. (1994), \u201cSoftware agents\u201d, Communications of the ACM, Vol. 37 No. 7, pp. 53\u20108.","DOI":"10.1145\/176789.176794"},{"key":"key2021010520015080700_b22","unstructured":"Giladi, R. and Shoval, P. (1994), \u201cAn architecture of an intelligent system for routing user requests in a network of heterogeneous databases\u201d, Journal of Intelligent Information Systems, Vol. 4 No. 3, pp. 205\u201019."},{"key":"key2021010520015080700_b23","unstructured":"Glezer, C. and Yadav, S.B. (2001), \u201cA conceptual model of an intelligent catalogue search system (ICSS)\u201d, Journal of Organizational Computing and Electronic Commerce, Vol. 11 No. 1, pp. 31\u201046."},{"key":"key2021010520015080700_b24","unstructured":"Goldberg, I. and Shostack, A. (1999), \u201cThe freedom network 1.0 architecture and protocols\u201d, White Paper, available at: www.zeroknowledge.com\/."},{"key":"key2021010520015080700_b25","unstructured":"Goldschlag, D.M., Reed, M.G. and Syverson, P.F. (1996), \u201cHiding routing information\u201d, in Anderson, R. (Ed.), Information Hiding, Springer\u2010Verlag, New York, NY, pp. 137\u201050."},{"key":"key2021010520015080700_b26","unstructured":"Goldschlag, D.M., Reed, M.G. and Syverson, P.F. (1999), \u201cOnion routing for anonymous and private internet connections\u201d, Communications of the ACM, Vol. 42 No. 2, pp. 39\u201041."},{"key":"key2021010520015080700_b27","unstructured":"Goodwin, C. (1991), \u201cPrivacy: recognition of a consumer right\u201d, Journal of Public Policy & Marketing, Vol. 12, pp. 106\u201019."},{"key":"key2021010520015080700_b28","unstructured":"Hanani, U., Shapira, B. and Shoval, P. (2001), \u201cInformation filtering: overview of issues, research and systems\u201d, User Modeling and User\u2010adapted Interaction, Vol. 11, pp. 203\u201059."},{"key":"key2021010520015080700_b29","unstructured":"Hes, R. and Borking, J. (1998), Privacy Enhancing Technologies: The Path to Anonymity, Registratiekamer, The Hague."},{"key":"key2021010520015080700_b30","unstructured":"Hoffman, D.L., Novak, T.P. and Peralta, M.A. (1999), \u201cInformation privacy in the marketspace: implications for the commercial uses of anonymity on the web\u201d, The Information Society An International Journal, Vol. 15 No. 2, pp. 129\u201039."},{"key":"key2021010520015080700_b31","unstructured":"Jupiter (2002), \u201cOnline privacy: managing complexity to realize marketing benefits\u201d, report by Jupiter Research, available at: www.researchandmarkets.com\/reportinfo.asp?report_id=3453&cat_id=105."},{"key":"key2021010520015080700_b32","unstructured":"Konstan, A., Bradley, N.M., Malts, D., Herlocker, J.L., Gordon, L.R. and Riedl, J. (1997), \u201cGroupLens: applying collaborative filtering to Usenet news\u201d, Communications of the ACM, Vol. 40 No. 3, pp. 77\u201087."},{"key":"key2021010520015080700_b33","doi-asserted-by":"crossref","unstructured":"Kuflik, T., Shapira, B., Elovici, Y. and Meshiech, A. (2003), \u201cPrivacy preservation improvement by learning optimal profile generation rate\u201d, Proceedings of the 9th International Conference on User Modeling (UM 2003).","DOI":"10.1007\/3-540-44963-9_23"},{"key":"key2021010520015080700_b35","unstructured":"Maes, P., Guttman, R.H. and Moukas, A.G. (1999), \u201cAgents that buy and sell\u201d, Communications of the ACM, Vol. 42 No. 3, pp. 81\u201091."},{"key":"key2021010520015080700_b37","doi-asserted-by":"crossref","unstructured":"Milne, G.R. (2000), \u201cPrivacy and ethical issues in database\/interactive marketing and public policy: a research framework and overview of the special issue\u201d, Journal of Public Policy & Marketing, Vol. 19, pp. 1\u20106.","DOI":"10.1509\/jppm.19.1.1.16934"},{"key":"key2021010520015080700_b38","unstructured":"Miyazaki, A.D. and Fernandez, A. (2001), \u201cConsumer perceptions of privacy and security risks for online shopping\u201d, The Journal of Consumer Affairs, Vol. 35 No. 1, pp. 27\u201044."},{"key":"key2021010520015080700_b36","unstructured":"Morita, M. and Shinoda, Y. (1994), \u201cInformation filtering based on user behavior analysis and best match retrieval\u201d, Proceedings of the 17th Annual International ACM\u2010SIGIR Conference on Research and Development in Information Retrieval, Dublin, pp. 272\u201081."},{"key":"key2021010520015080700_b39","unstructured":"Newell, A. (1982), \u201cThe knowledge level\u201d, Artificial Intelligence, Vol. 18 No. 1, pp. 82\u2010127."},{"key":"key2021010520015080700_b40","unstructured":"Oard, D.W. (1997), \u201cThe state\u2010of\u2010the\u2010art in text filtering\u201d, User Modeling and User\u2010Adapted Interaction, Vol. 7 No. 3, pp. 141\u201078."},{"key":"key2021010520015080700_b41","unstructured":"P3P (2002), \u201cPlatform for privacy preferences\u201d, available at: W3c.org, P3P 1.0."},{"key":"key2021010520015080700_b42","unstructured":"Patrick, S. and Kenny, A.S. (2003), \u201cFrom privacy legislation to interface design: implementing information privacy in human\u2010computer interfaces\u201d, in Dingledine, R. (Ed.), Privacy\u2010Enhancing Technologies, Springer\u2010Verlag, Heidelberg, pp. 107\u201024."},{"key":"key2021010520015080700_b44","unstructured":"Reiter, M.K. and Rubin, A.D. (1998), \u201cCrowds: anonymity for web transactions\u201d, ACM Transactions on Information and System Security, Vol. 1 No. 1, pp. 66\u201092."},{"key":"key2021010520015080700_b45","unstructured":"Reiter, M.K. and Rubin, A.D. (1999), \u201cAnonymous web transactions with crowds\u201d, Communications of the ACM, Vol. 42 No. 2, pp. 66\u201092."},{"key":"key2021010520015080700_b46","unstructured":"Rennhard, M., Rafaeli, S., Mathy, L., Plattner, B. and Hutchison, D. (2004), \u201cTowards pseudonymous e\u2010commerce\u201d, Electronic Commerce Research Journal, Vol. 4 Nos 1\/2, pp. 83\u2010111."},{"key":"key2021010520015080700_b47","unstructured":"Russell, S.J. and Norvig, P. (1995), Artificial Intelligence: Modern Approach, Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2021010520015080700_b51","unstructured":"Segev, A., Wan, D. and Beam, C. (1995), \u201cDesigning electronic product catalogs for business value, results of the CommerceNet Pilot\u201d, The Fisher Center for Information Technology & Management, Haas School of Business, University of California Berkeley, Berkeley, CA, available at: http:\/\/haas.berkeley.edu\/ \u223c\u2009citm\/cat\u2010proj.html."},{"key":"key2021010520015080700_b49","unstructured":"Sellars, D. (1999), An Introduction to Steganography, University of Capetown, Capetown."},{"key":"key2021010520015080700_b50","unstructured":"Senicar, V., Jerman\u2010Blazic, B. and Klobucar, T. (2003), \u201cPrivacy\u2010enhancing technologies \u2013 approaches and developments\u201d, Computer Standards & Interfaces, Vol. 25, pp. 147\u201058."},{"key":"key2021010520015080700_b53","unstructured":"Shapira, B., Shoval, P. and Hanani, U. (1999), \u201cExperimentation with an information\u2010filtering system that combines cognitive and sociological filtering integrated with user stereotypes\u201d, Decision Support Systems, Vol. 27, pp. 5\u201024."},{"key":"key2021010520015080700_b52","unstructured":"Shapira, B., Hanani, U., Raveh, A. and Shoval, P. (1997), \u201cInformation filtering: a new two\u2010phase model using stereotypic user\u2010profiling\u201d, Journal of Intelligent Information Systems, Vol. 8, pp. 155\u201065."},{"key":"key2021010520015080700_b54","unstructured":"Shoval, P. (1996), \u201cPrinciples, procedures and rules in an expert system for information retrieval\u201d, Information Processing & Management, Vol. 21 No. 6, pp. 475\u201087."},{"key":"key2021010520015080700_b56","unstructured":"Syverson, P.F., Goldschlag, D.M. and Reed, M.G. (1997), \u201cAnonymous connections and onion routing\u201d, Proceedings of the 18th Annual Symposium on Security and Privacy, IEEE CS Press, Oakland, CA, pp. 44\u201054."},{"key":"key2021010520015080700_b58","unstructured":"Thomas, G., Thompson, G.R., Chung, C., Barkmeyer, E., Carter, F., Templeton, M., Fox, S. and Hartman, B. (1990), \u201cHeterogeneous distributed systems for production use\u201d, ACM Computing Surveys, Vol. 22 No. 3, pp. 237\u201066."},{"key":"key2021010520015080700_b59","unstructured":"Turban, E., Lee, J., King, D., Warkentin, M. and Chung, M.C. (2002), Electronic Commerce, Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2021010520015080700_frd1","doi-asserted-by":"crossref","unstructured":"Benassi, P. (1999), \u201cTRUSTe: an online privacy seal program\u201d, Communications of the ACM, Vol. 42 No. 2, pp. 56\u20109.","DOI":"10.1145\/293411.293461"},{"key":"key2021010520015080700_frd2","unstructured":"Camp, J. (1999), \u201cWeb security and privacy: an American perspective\u201d, The Information Society, Vol. 15, pp. 249\u201056."},{"key":"key2021010520015080700_frd3","unstructured":"Camp, L.J. and Osorio, C. (2002), \u201cPrivacy\u2010enhancing technologies for internet commerce\u201d, KSG Working Paper, No. RWP02\u2010033, available at: http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=329282."},{"key":"key2021010520015080700_frd4","unstructured":"Culnan, M.J. and Armstrong, P.K. (1999), \u201cInformation privacy concerns, procedural fairness and impersonal trust: an empirical investigation\u201d, Organization Science, Vol. 10 No. 1, pp. 104\u201015."},{"key":"key2021010520015080700_frd5","unstructured":"Fischer\u2010H\u00fcbner, S. (2001), Privacy\u2010Enhancing Technologies (PET), Karlstad University Division for Information Technology, Karlstad."},{"key":"key2021010520015080700_frd6","unstructured":"Frakes, W.B. and Baeza\u2010Yates, R. (1992), Information Retrieval, Data Structures and Algorithms, Prentice\u2010Hall, Englewood Cliffs, NJ."},{"key":"key2021010520015080700_frd7","unstructured":"Lincke, L.M. and Schmid, B. (1997), \u201cArchitecture and business potential of mediating electronic product catalogs\u201d, Proceedings of the AIS 1997 Americas Conference, Indianapolis, IN."},{"key":"key2021010520015080700_frd8","unstructured":"Poore, R.S. (1999), \u201cAnonymity, privacy, and security\u201d, The Journal of Information Systems Security, pp. 17\u201020."},{"key":"key2021010520015080700_frd9","unstructured":"Salton, G. and Buckley, C. (1988), \u201cTerm\u2010weighting approaches in automatic text retrieval\u201d, Information Processing and Management, Vol. 24 No. 5, pp. 513\u201023."},{"key":"key2021010520015080700_frd10","unstructured":"Solomon, D. (1999), \u201cTrails of personal info compromise net shoppers' privacy: web sites sometimes use, give away your particulars\u201d, USA Today, McLean, VA, p. 20\u201003B."},{"key":"key2021010520015080700_frd11","doi-asserted-by":"crossref","unstructured":"Teltzrow, M. and Kobsa, A. (2004), \u201cImpacts of user privacy preferences on personalized systems: a comparative study\u201d, in Karat, C.\u2010M., Blom, J. and Karat, J. (Eds), Designing Personalized User Experiences for e\u2010Commerce, Kluwer Academic Publishers, Dordrecht.","DOI":"10.1007\/1-4020-2148-8_17"}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240510615164\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240510615164\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:40:05Z","timestamp":1753400405000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/15\/4\/378-399\/176606"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9,1]]},"references-count":59,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2005,9,1]]}},"alternative-id":["10.1108\/10662240510615164"],"URL":"https:\/\/doi.org\/10.1108\/10662240510615164","relation":{},"ISSN":["1066-2243"],"issn-type":[{"type":"print","value":"1066-2243"}],"subject":[],"published":{"date-parts":[[2005,9,1]]}}}