Harnessing Big Personal Data, with Scrutable User Modelling for Privacy and Control.
Judy KayPublished in: ACM Multimedia (2015)
Keyphrases
- personal data
- user modelling
- personal information
- privacy preserving
- privacy protection
- service providers
- privacy concerns
- protection mechanisms
- user model
- identity theft
- data privacy
- data protection
- data collection
- information retrieval systems
- third party
- private data
- private information
- privacy policies
- data management
- raw data
- web content
- database
- recommender systems
- information systems
- information retrieval