Warriors B2G1 Free
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Visit our stores


    Recently Viewed clear list


    Q&A | May 11, 2015

    Heidi Pitlor: IMG Powell’s Q&A: Heidi Pitlor



    Describe your latest book. My novel, The Daylight Marriage, is about a wife and mother who goes missing one day. The narrative alternates between... Continue »
    1. $17.47 Sale Hardcover add to wish list

      The Daylight Marriage

      Heidi Pitlor 9781616203689

    spacer
Qualifying orders ship free.
$108.50
New Trade Paper
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
25 Remote Warehouse Graphics- User Interface

Human-Computer Interaction #2: Security and Privacy in User Modeling

by

Human-Computer Interaction #2: Security and Privacy in User Modeling Cover

 

Synopses & Reviews

Publisher Comments:

With a Foreword by Alfred Kobsa.

The research on user modeling has developed a broad range of elaborated algorithms and techniques to support user adaptive applications with information about their users. Several empirical studies demonstrate their benefits in areas like education and training, online help for complex software, dynamic information delivery, etc. The main obstacles to wide-spread use of such systems have always been users' objections and to some extent laws regarding the usage of person-related data.

This book offers a comprehensive analysis of security requirements for user modeling systems proceeding from requirements of general information systems and taking into account particular issues of user modeling. Solutions for these requirements are discussed in several ways. Existing solutions in user modeling systems are matched with these requirements. Solutions with a drawback to user modeling are displayed and weighed. New solutions for secrecy and integrity are developed and combined to a reference architecture for security in user modeling.

Based on the solutions for encryption, authentication, and authorization, methods for empowering the user to define and enforce his individual requirements towards privacy and anonymity are described in detail.

The reference architecture can serve as a default architecture for many user adaptive systems. It offers a modular approach that can adapt to different user requirements and protection goals.

Synopsis:

With a Foreword by Alfred Kobsa. The research on user modeling has developed a broad range of elaborated algorithms and techniques to support user adaptive applications with information about their users. Several empirical studies demonstrate their benefits in areas like education and training, online help for complex software, dynamic information delivery, etc. The main obstacles to wide-spread use of such systems have always been users' objections and to some extent laws regarding the usage of person-related data. This book offers a comprehensive analysis of security requirements for user modeling systems proceeding from requirements of general information systems and taking into account particular issues of user modeling. Solutions for these requirements are discussed in several ways. Existing solutions in user modeling systems are matched with these requirements. Solutions with a drawback to user modeling are displayed and weighed. New solutions for secrecy and integrity are developed and combined to a reference architecture for security in user modeling. Based on the solutions for encryption, authentication, and authorization, methods for empowering the user to define and enforce his individual requirements towards privacy and anonymity are described in detail. The reference architecture can serve as a default architecture for many user adaptive systems. It offers a modular approach that can adapt to different user requirements and protection goals.

Product Details

ISBN:
9789048162239
Author:
Schreck, J.
Publisher:
Springer
Location:
Dordrecht
Subject:
User Interfaces
Subject:
User Interfaces and Human Computer Interaction
Subject:
Theory of computation
Subject:
Management of Computing and Information Systems
Subject:
Data Structures, Cryptology and Information Theory
Subject:
Legal Aspects of Computing Offers a comprehensive analysis of security requirements for user modeling systems proceeding from requirements of general information systems and taking into account particular issues of user modeling
Subject:
Graphics-User Interface
Subject:
Legal Aspects of Computing
Subject:
Computer Science
Subject:
Language, literature and biography
Subject:
Information Theory
Subject:
Information Systems
Subject:
Data structures (Computer scienc
Subject:
Computers_xLaw and legislation
Copyright:
Edition Description:
1st Edition. Softcover version of original hardcover edition 2003
Series:
Human–Computer Interaction Series
Series Volume:
2
Publication Date:
20110729
Binding:
TRADE PAPER
Language:
English
Pages:
231
Dimensions:
240 x 160 mm

Related Subjects

Computers and Internet » Computers Reference » General
Computers and Internet » Graphics » User Interface
Computers and Internet » Internet » Information
Computers and Internet » Personal Computers » General
Science and Mathematics » Botany » General

Human-Computer Interaction #2: Security and Privacy in User Modeling New Trade Paper
0 stars - 0 reviews
$108.50 In Stock
Product details 231 pages Springer - English 9789048162239 Reviews:
"Synopsis" by , With a Foreword by Alfred Kobsa. The research on user modeling has developed a broad range of elaborated algorithms and techniques to support user adaptive applications with information about their users. Several empirical studies demonstrate their benefits in areas like education and training, online help for complex software, dynamic information delivery, etc. The main obstacles to wide-spread use of such systems have always been users' objections and to some extent laws regarding the usage of person-related data. This book offers a comprehensive analysis of security requirements for user modeling systems proceeding from requirements of general information systems and taking into account particular issues of user modeling. Solutions for these requirements are discussed in several ways. Existing solutions in user modeling systems are matched with these requirements. Solutions with a drawback to user modeling are displayed and weighed. New solutions for secrecy and integrity are developed and combined to a reference architecture for security in user modeling. Based on the solutions for encryption, authentication, and authorization, methods for empowering the user to define and enforce his individual requirements towards privacy and anonymity are described in detail. The reference architecture can serve as a default architecture for many user adaptive systems. It offers a modular approach that can adapt to different user requirements and protection goals.
spacer
spacer
  • back to top

FOLLOW US ON...

     
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.