Ferramentas Pessoais
Você está aqui: Página Inicial Disciplinas Disciplinas do Programa Optativas Sistemas Distribuídos e Redes CCO-129-1 - Tópicos em Sistemas Distribuídos e Redes: Privacidade e Personalização na Web

CCO-129-1 - Tópicos em Sistemas Distribuídos e Redes: Privacidade e Personalização na Web

Quantidade de créditos: 8
Total de horas de aulas teóricas: 60
Total de horas de aulas de exercícios, seminários ou estudos dirigidos: 60

Objetivo:

Capacitar os alunos na análise de ferramentas relativas à privacidade e personalização de serviços oferecidos por Sistemas na Web, bem como na proposta e implementação de ferramentas propostas na literatura ou modificações das mesmas.

Ementa:

1 - Conceitos de Privacidade e Personalização.
Serão apresentados os conceitos, importância e conflitos entre a Privacidade e a Personalização na Web.
2 - Mecanismos de Personalização.
Serão apresentados os mecanismos de personalização disponíveis em serviços Web, como cookies, web bugs, clickstream, data mining.
3 - Legislação sobre Privacidade.
Serão apresentados as Políticas de Privacidade, bem como as leis de proteção de privacidade e os certificados ou selos de privacidade.
4 - Mecanismos para Proteção da Privacidade.
Serão apresentados os mecanismos existentes sobre privacidade, como criptografia, anonimato, pseudônimos, mascaras, entre outros.
5 - Novos mecanismos de proteção de privacidade, visando atender à personalização exigida pelo serviço.

Bibliografia:

1 - Montgomery, A. L., Faloutsos, C., (2000), “Using Clickstream Data to Identify World Wide Web Browsing Trends”, GSIA Working Paper.
2 - Bucklin R. E., Lattin J. M., Ansari A., Bell D., Coupey E., Gupta S., Little J. D. C., Mela C., Montgomery A., Steckel J., “Choice and the Internet: from Clickstream to Research Stream”, U.C. Berkeley 5th Invitational Choice Symposium, Mareting Letters, 13(3), 245 -258, Last Revised February 10, 2002.
3 - Montgomery, A. L., Li, S., (2004) Srinivasan, K., Liechty, J. C., “Modeling ONline Browsing and Path Analysis Using Clickstream Data”, Marketing Science, Vol 23, No. 4, p579-595.
4 - Cavoukian, A. Data mining: Staking a claim on your privacy. Technical report, Information and Privacy Commissioner/Ontario, January 1998. http://www.ipc.on.ca/english/pubpres/papers/datamine.htm.
5 - Kristol, D., Montulli L., “HTTP State Management Mechanism”. Bell Laboratories, Lucent Technologies. Epinions.com, Inc. October 2000. RFC 2965. http://www.ietf.org/rfc/rfc2965.txt
6 - Ishitani, L., Almeida, V., and Meira Jr., W. “Masks: Bringing anonymity and personalization together”. IEEE Security & Privacy Magazine, 1(3):18–23, may/june 2003.
7 - Cambridge dictionary, com consulta sobre personalização com a palavra personalize http://dictionary.cambridge.org/define.asp?key=59039&dict=CALD
8 - Kobsa, A. (2001). Tailoring privacy to user’s needs. Proc. Of 8th International Conference on User Modeling. http://www.ics.uci.edu/~kobsa/papers/2001-UM01-kobsa.pdf.
9 - Cookie Central, http://www.cookiecentral.com/, visitado em 06 de setembro de 2005.
10 - Kristol, D., Montulli L., “HTTP State Management Mechanism”. Bell Laboratories, Lucent Technologies. Epinions.com, Inc. October 2000. RFC 2965. http://www.ietf.org/rfc/rfc2965.txt
11 - Montgomery, A. L., “Using Clickstream Data to Predict WWW Usage”, WebShop 2003, University of Maryland, June 13, 2003.
12 - Fernandes, C. H. “A Privacidade na Sociedade da Informação”. http://www.linux.ime.usp.br/~carloshf/0302-mac339/fase2/node2.html. Acessado 8 de setembro de 2005.
13 - Cambridge Dictionary, com consulta sobre personalização com a palavra privacy http://dictionary.cambridge.org/define.asp?key=62973&dict=CALD
14 - Privacilla.org, http://www.privacilla.org, Acessado em julho de 2005.
15 - Cranor, L. F., (2003) “’I Didn’t Buy it for Myself’ Privacy and Ecommerce Personalization”, WPES’03 (Washington DC, USA, October 30, 2003), AT&T Labs-Research.
16 - Teltzrow, M. and A. Kobsa (2004) “Communication of Privacy and Personalization in E-Business”. Proceedings of the Workshop “WHOLES: A Multiple View of Individual Privacy in a Networked World”, Stockholm, Sweden. http://www.ics.uci.edu/~kobsa/papers/2004-WHOLES-kobsa.pdf
17 - Jutla, D., Bodorik P., (2003) “A Client-Side Model for Electronic Privacy”. 16th Bled eCommerce Conference and Transformation (Bled, Slovenia, June 9, 2003)
18 - Ishitani, L. “Uma Arquitetura para Controle de Privacidade na Web”. Departamento de Ciência da Computação, Universidade Federal de Minas Gerais. Dezembro de 2003.
19 - Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., and Reagle, J. “The P Platform for Privacy Preferences 1.0 (P3P1.0) Specification”. World Wide Web Consortium Recommendation, April 2002. http://www.w3.org/TR/P3P/. Acessado em 8 de setembro de 2005.
20 - Kobsa, A. and Teltzrow, M. (2005). “Contextualized Communication of Privacy Practices and Personalization Benefits: Impacts on Users’ Data Sharing and Purchase Behavior”. To appear in D. Martin and A. Serjantov, eds: Privacy Enhancing Technologies: Fourth International Workshop, PET 2004, Toronto, Canada. Springer LNCS 3424, 329-343. http://www.ics.uci.edu/~kobsa/papers/2005-PET-kobsa.pdf
21 - Shubina, A. M., Smith S. W. “Using caching for browsing anonymity”. Dartmouth Computer Science Technical Report TR2003-470. July 29, 2003
22 - Pfitzmann, A., Köhntopp, M. “Anonymity, unobservability, and pseudonymity - a proposal for terminology”. In Designing Privacy Enhancing Technologies: Proceedings of the International Workshop on the Design Issues in Anonymity and Observability, volume 2009, pages 1-9. Springer-Verlag, July 2000.
23 - Anonymizer, Inc. (2004) “Anonymizer Enterprise Network Privacy/Security Appliance”. Technology Overview. www.anonymizer.com
24 - Reiter, M. K. and Rubin, A. D. (1997) “Crowds: Anonymity for Web Transactions”. AT&T Labs – Research. avirubin.com/crowds.pdf
25 - Chaum, D. “Untraceable electronic mail, return addresses and digital pseudonyms”. Communications of the ACM, 24(2):84{88, February 1981.
26 - Goldberg, I. and Shostack, A. “Freedom network 1.0 architecture and protocols”, October 2001.
27 - Berthold, O., Federrath, H. and Kopsell, S. “Web MIXes: A system for anonymous and unobservable Internet access”. Lecture Notes in Computer Science, 2009 2001.
28 - Freedman, M. J. and Morris, R. “Tarzan: A peer-to-peer anonymizing network layer”. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington, D.C., November 2002.
29 - Gabber, E., Gibbons, P. E., Matias, Y. and Mayer, A. (1997) “How to Make Personalized Web Browsing Simple, Secure, and Anonymous”. Bell Laboratiories, Lucent Technologies. http://www.bell-labs.com/project/lpwa/papers.html
30 - Goldberg, I., Wagner, D. and Brewer, E. “Privacy-enhancing technologies for the internet”. Compcon’97.
31 - Rocha, B. G., Almeida, V. A. F., Ishitani, L. and Meira Jr., W. (2002) “Disclosing Users’ Data in an Environment that Preserves Privacy” – Dept. of Computer Science Universidade Federal de Minas Gerais. Belo Horizonte, Minas Gerais, Brazil. Workshop On Privacy In The Electronic Society. http://delivery.acm.org/10.1145/650000/644535/p71-rocha.pdf?key1=644535&key2=3106597801&coll=portal&dl=ACM&CFID=23116750&CFTOKEN=69109158
[32] Internet World Stats. http://www.internetworldstats.com/emarketing.htm. Acessado em 13 de setembro de 2005.
33 - Xing, S. and Paris, B.-P. “Mapping the Growth of the Internet”. The 12th International Conference, 2003.
34 - Ishitani, L. “Uma Arquitetura para Controle de Privacidade na Web”. Tese de Doutorado. Departamento de Ciência da Computação, Universidade Federal de Minas Gerais.
35 - Open Directory Project. http://dmoz.org.
36 - Open Source Initiative OSI. http://www.opensource.org/
37 - Cranor, L. F., Byers, S., and Kormann, D. “An Analysis of P3P Deployment on Commercial, Government, and Children’s Web Sites as of May 2003”. Technical Report prepared for the 14 May 2003 Federal Trade Commission Workshop on Technologies for Protecting Personal Information. AT&T Labs-Research and Florham Park, NJ. http://www.research.att.com/projects/p3p/
38 - Stufflebeam, W., Antón, A. I., He, Q., and Jain, N. “Specifying Privacy Policies with P3P and EPAL: Lessons Learned”. 3rd ACM Workshop on Privacy in the Electronic Society (WPES’04), NCSU Tech Report#TR-2004-19, 17 June 2004. http://theprivacyplace.org/papers/TR-2004-19.pdf
39 - Crocker, D., and P. Overell, P. “Augmented BNF for Syntax Specifications: ABNF”. Internet Mail Consortium. Demon Internet Ltd. November 1997.
40 - AT&T Privacy Bird. http://www.privacybird.com. Acessado em agosto de 2005.
41 - Cranor, L. F., Arjula, M., and Guduru, P. “Use of a P3P User Agent by Early Adopters”. Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society (WPES’02), November 21, 2002, Washington, DC, USA.
42 - Bittar, C. A. “Os direitos da personalidade”. São Paulo: Revista dos Tribunais, 1992. p. 64.
43 - Han, J., Kamber, M. “Data Mining: Concepts and Techniques”. Simon Fraser University. Academic Press, A Harcourt Science and Technology Company. 2001.
44 - Robinson, N., and Shapcott, M. “Data Mining Information Visualisation – Beyond Charts and Graphs”. Proceedings of the Sixth International Conference on Information Visualisation (IV’02).
45 - Zhang, D., and Zhou, L. “Discovering Golden Nuggets: Data Mining in Financial Application”. IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews. November 2004.
46 - Ishitani,L. “Uma Arquitetura para Controle de Privacidade na Web”. Tese de doutorado. Departamento de Ciência da Computação,Universidade Federal de Minas Gerais. Dezembro de 2003.
47 - Culnan, M.J. “How did you get my name? An exploratory investigation of consumer attitudes toward secondary information use”. MIS Quarterly 17, 3 (1993), 341–363.
48 - Doherty, S. “Keeping data private”. Network Computing (June 25, 2001), 83–91.
49 - United States Department of Commerce News. www.census.gov/mrts/www/current.html.
50 - Urban, G.L., Sultan, F., and Qualls, W.J. “Placing trust at the center of your Internet strategy”. MIT Sloan Management Review 42 1 (2000), 39-48.
51 - Wang, H., Lee, M.K.O., and Wang, C. “Consumer privacy concerns about Internet marketing”. Commun. ACM 41, 3 (Mar. 1998), 63–70.
52 - Friedman, B., Khan Jr., P. H., and Howe, D. C. “Trust online”. Communications of the ACM. December, 2000.
53 - Department of Commerce. “Discussion Draft; Elements of Effective Self- Regulation for Protection of Privacy”. (Jan. 23, 1998). www.ecommerce.gov/staff.htm.
54 - Moores, T. T., and Dhillon, G.. “Do privacy seals in e-commerce really work?”. Communications of the ACM. December, 2003.
55 - Benassi, P. “TRUSTe: an online privacy seal program”. Communications of the ACM. February 1999.
56 - Nissenbaum, H. “Accountability in a computerized society”. Sci. Engin. Ethics 2 (1996), 25–42.
57 - Moores, T. “Do consumers understand the role of privacy seals in e-commerce?”. Communications of the ACM. March, 2005.
58 - Trust in the wired Américas. Cheskin Research (July, 2000). www.cheskin.com/think/pressreleases/fprivreport.pdf
59 - Ackerman, M. S., and Cranor, L. F. “Privacy critics – safeguarding users’ personal data. Web Techniques, September 1999”. http://www.webtechniques.com/archives/1999/09/ackerman.
60 - Roy Morgan Research: Privacy and the Community. Prepared for the Office of the
Federal Privacy Commissioner, http://www.privacy.gov.au/publications/rcommunity.html. (2001)
61 - Department for Trade and Industry: Informing Consumers About E-Commerce.
Conducted by MORI, London: DTI,, http://www.mori.com/polls/2001/pdf/dti-ecommerce.pdf. (2001)
62 - Gartner G2: Privacy and Security: The Hidden Growth Strategy. Vol. (August 2001)
63 - Teltzrow, M., Kobsa, A.: Impacts of User Privacy Preferences on Personalized Systems - a Comparative Study. In: CHI-2003 Workshop "Designing Personalized User Experiences for eCommerce: Theory, Methods, and Research" (2003). Fort Lauderdale, FL.
64 - P3P Dashboard Report. October (2003), http://www.ey.com/global/Content.nsf/US/AABS_-_TSRS_-_Library
65 - Cranor, L. F. and Reidenberg, J. R. “Can User Agents Accurately Represent Privacy Notices?”. 30th Research Conference on Communication, Information and Internet Policy, Alexandria, VA (2002), http://intel.si.umich.edu/tprc/archive-searchabstract. cfm?PaperID=65.
66 - Paesani, L. M. “Direito e Internet: Liberdade de Informação, Privacidade e Responsabilidade Civil”. 2ª Edição. Editora Atlas – 2003.
67 - Kobsa, A. “Personalized Hypermedia and International Privacy”. Communications of the ACM. May, 2002.
68 - Federal Trade Commission. “Privacy online: Fair information practices in the electronic marketplace”. July 30, 2004.
69 - Federal Trade Commission. “The Fair Credit Reporting Act”. July 30, 2004.
70 - Clarke, R. “The digital persona and its application to data surveillance”. The Information Society, 10(2), june 1994. http://www.anu.edu.au/people/Roger.Clarke/DV/DigPersona.html.

Ações do documento