{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T08:41:28Z","timestamp":1774428088743,"version":"3.50.1"},"reference-count":39,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10,1]]},"abstract":"<p>Due to the rapid growth of the internet in conjunction with the information overload problem the use of recommender systems has started to become necessary for both e-businesses and customers. However there are other factors such as privacy and trust that make customers suspicious. This paper gives an overview of recommendation systems, the benefits that both the business and the customers have and an explanation of the challenges, which if faced can make the personalization process better for both parties. Moreover an outline of current studies is given along with an overview of Amazon's recommendations in order to clarify that the use of recommender systems is beneficial for an e-business in many ways and also for a valuable customer of such business.<\/p>","DOI":"10.4018\/ijeei.2013100103","type":"journal-article","created":{"date-parts":[[2014,5,8]],"date-time":"2014-05-08T19:38:49Z","timestamp":1399577929000},"page":"32-46","source":"Crossref","is-referenced-by-count":12,"title":["Recommender Systems"],"prefix":"10.4018","volume":"4","author":[{"given":"Nikolaos","family":"Polatidis","sequence":"first","affiliation":[{"name":"Department of Applied Informatics, University of Macedonia, Thessaloniki, Greece"}]},{"given":"Christos K.","family":"Georgiadis","sequence":"additional","affiliation":[{"name":"Department of Applied Informatics, University of Macedonia, Thessaloniki, Greece"}]}],"member":"2432","reference":[{"key":"ijeei.2013100103-0","doi-asserted-by":"crossref","unstructured":"Benats, G., Bandara, A., Yu, Y., Colin, J.-N., & Nuseibeh, B. (2011). PrimAndroid: Privacy policy modelling and analysis for Android applications. In Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2011) (pp. 129-132). Washington, DC: IEEE.","DOI":"10.1109\/POLICY.2011.25"},{"key":"ijeei.2013100103-1","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-005-5879-y"},{"key":"ijeei.2013100103-2","unstructured":"ChoiceStream personalization survey: Consumer trends and perceptions, (2008). Retrieved October 21, 2013, from http:\/\/www.choicestream.com\/pdf\/ChoiceStream_ 2008_Personalization_Survey.pdf"},{"key":"ijeei.2013100103-3","author":"D.Cooperstain","year":"1999","journal-title":"Making net shoppers loyal"},{"key":"ijeei.2013100103-4","author":"D.Davidson","year":"2012","journal-title":"MoRePriv: Mobile OS support for application personalization and privacy"},{"key":"ijeei.2013100103-5","author":"D. F.Ferraiolo","year":"2003","journal-title":"Role-based access control"},{"key":"ijeei.2013100103-6","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1080.0974"},{"key":"ijeei.2013100103-7","author":"B. J.Fogg","year":"2003","journal-title":"Persuasive technology: Using computers to change what we think and do"},{"key":"ijeei.2013100103-8","doi-asserted-by":"crossref","unstructured":"Gundecha, P., & Liu, H. (2012). Mining social media: A brief introduction. Tutorials in operations research.","DOI":"10.1287\/educ.1120.0105"},{"key":"ijeei.2013100103-9","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-010-0092-x"},{"key":"ijeei.2013100103-10","doi-asserted-by":"publisher","DOI":"10.1145\/2428556.2428573"},{"key":"ijeei.2013100103-11","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511763113"},{"key":"ijeei.2013100103-12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-4555-4_12"},{"key":"ijeei.2013100103-13","doi-asserted-by":"publisher","DOI":"10.4018\/jeei.2011010103"},{"key":"ijeei.2013100103-14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72079-9_21"},{"key":"ijeei.2013100103-15","doi-asserted-by":"crossref","unstructured":"Kobsa, A., & Teltzrow, M. (2005). Contextualized communication of privacy practices and personalization benefits: Impacts on users' data sharing and purchase behavior. In D. Martin & A. Serjantov, (Eds.), Proceedings of the 4th International Workshop Privacy Enhancing Technologies (PET 2004), Toronto, Canada.","DOI":"10.1007\/11423409_21"},{"key":"ijeei.2013100103-16","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-011-9112-x"},{"key":"ijeei.2013100103-17","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-011-9272-4"},{"key":"ijeei.2013100103-18","author":"H.Liu","year":"2004","journal-title":"InterestMap: Harvesting social network profiles for recommendations"},{"key":"ijeei.2013100103-19","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2009.00334.x"},{"key":"ijeei.2013100103-20","unstructured":"Machanavajjhala, A., Korolova, A., & Sarma, A. D. (2010). On the (im)possibility of preserving utility and privacy in personalized social recommendations. ArXiv: 1004.5600v1 [cs.DS]. 30 April 2010. Retrieved October, 20, 2013, from http:\/\/http:\/\/arxiv.org\/pdf\/1004.5600v1.pdf"},{"key":"ijeei.2013100103-21","unstructured":"Mangalindan, J. P. (2012). Amazon's recommendations secrets. Retrieved October 21, 2013, from http:\/\/tech.fortune.cnn.com\/2012\/07\/30\/amazon-5\/"},{"key":"ijeei.2013100103-22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2009.10.005"},{"key":"ijeei.2013100103-23","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-011-0412-2"},{"key":"ijeei.2013100103-24","doi-asserted-by":"crossref","unstructured":"Paireekreng, W., & Wong, K. (2010). Mobile content personalization using intelligent user profile approach. In Proceedings of Third International Conference on Knowledge Discovery and Data Mining (WKDD 10) (pp. 241-244). Washington, DC: IEEE.","DOI":"10.1109\/WKDD.2010.119"},{"key":"ijeei.2013100103-25","unstructured":"Park, D. H., Kim, H. K., Choi, Y., & Kim, J. K. (2001). A review and classification of recommender systems research. In Proceedings of the International Conference on Social Science and Humanity (IPEDR vol.5, pp. 290-294) IACSIT Press Singapore."},{"key":"ijeei.2013100103-26","doi-asserted-by":"crossref","unstructured":"Pavlou, P. A. (n.d.). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce 7(3), 101-134.","DOI":"10.1080\/10864415.2003.11044275"},{"key":"ijeei.2013100103-27","doi-asserted-by":"crossref","unstructured":"Polatidis, N., & Georgiadis, C. K. (2013). Mobile recommender systems: An overview of technologies and challenges. In IEEE Proceedings of the Second International Conference on Informatics and Applications (ICIA 2013) (pp. 282-287). Washington, DC: IEEE.","DOI":"10.1109\/ICoIA.2013.6650270"},{"key":"ijeei.2013100103-28","doi-asserted-by":"publisher","DOI":"10.5121\/ijdps.2012.3507"},{"key":"ijeei.2013100103-29","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222250405"},{"key":"ijeei.2013100103-30","doi-asserted-by":"publisher","DOI":"10.3727\/109830511X12978702284390"},{"key":"ijeei.2013100103-31","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-85820-3"},{"key":"ijeei.2013100103-32","unstructured":"Riemer, K., & Totz, C. (2001). The many faces of personalization \u2013 An integrated economic overview of mass customization and personalization. In Proceedings of the World Congress of Mass Customization and Personalization (MCPC 2001)."},{"key":"ijeei.2013100103-33","doi-asserted-by":"publisher","DOI":"10.1002\/dir.10033"},{"key":"ijeei.2013100103-34","doi-asserted-by":"crossref","unstructured":"Shyong, K., Lam, T., Frankowski, D., & Riedl, J. (2006). Do you trust your recommendations? An exploration of security and privacy issues in recommender systems. In Proceedings of the International Conference on Emerging Trends in Information and Communication Security (ETRICS) (LNCS 3995, pp. 14-29).","DOI":"10.1007\/11766155_2"},{"key":"ijeei.2013100103-35","unstructured":"Turow, J. (2003). Americans and online privacy: The system is broke. Aneenberg Public Policy Center, University of Pennnsylvania. Retrieved October 21, 2013, from http:\/\/www.securitymanagement.com\/archive\/library\/Anneberg_privacy1003.pdf"},{"key":"ijeei.2013100103-36","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.71.3.143"},{"key":"ijeei.2013100103-37","unstructured":"Wu, L.-L., Joung, Y.-J., & Chiang, T.-E. (2011). Recommendation systems and sales concentration: The moderating effects of consumers' product awareness and acceptance to recommendations. In Proceedings of the HICSS (pp. 1-10). Washington, DC: IEEE."},{"key":"ijeei.2013100103-38","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.2005.69.4.133"}],"container-title":["International Journal of E-Entrepreneurship and Innovation"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=106898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:40:03Z","timestamp":1654130403000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijeei.2013100103"}},"subtitle":["The Importance of Personalization in E-Business Environments"],"short-title":[],"issued":{"date-parts":[[2013,10,1]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijeei.2013100103","relation":{},"ISSN":["1947-8585","1947-8593"],"issn-type":[{"value":"1947-8585","type":"print"},{"value":"1947-8593","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,1]]}}}