[go: up one dir, main page]

Skip to main content

Community Support and Identity Management

  • Chapter
ECSCW 2001

Abstract

Computer based community support systems can provide powerful support in direct exchange of information and in finding people for information exchange. Such ap?plications usually make use of information about the user (user profile information) for personalization and for supporting contact management. As in real life, a user will interact with different communities (community support applications) hosted by different provid?ers. With the current approach users have to provide and update information about their identity and interests for each community independently. That results in cold-start problems with new community support applications and in inconvenience for the user. In this paper we discuss user-centric identity management for community support applications and concentrate on a platform for using user profiles in more than one application. We also propose mechanisms to address privacy issues in this framework.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

eBook
USD 15.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  • Ackerman, M.S.; Cranor, L.F. and Reagle, J. (1999): ‘Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences’, Proc. ACM Conference on Electronic Commerce, Nov. 1999.

    Google Scholar 

  • APPEL (2000): ‘A P3P Preference Exchange Language’, W3C Working Draft, 2000.

    Google Scholar 

  • Chaum, D. (1985): ‘Security Without Identification: Transaction Systems to Make Big Brother Obsolete’, Communication of the ACM, Vol. 28,No. 10, Oct. 1985, pp. 1030–1044.

    Article  Google Scholar 

  • Chaum, D. (1981): ‘Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms’, Communications of the ACM, Vol. 24,No. 2, Feb. 1981, pp. 84–88.

    Article  Google Scholar 

  • Churchill, E. and Bly, S. (1999): ‘Virtual Environments at Work: ongoing use of MUDs in the Workplace’, Proc. Intl. Joint Conf. On Work Activities Coordination and Collaboration, 1999, pp.99–108.

    Google Scholar 

  • Clarke, R. (1999): ‘Internet Privacy Concern Confirm the Case for Intervention’, Communications of the ACM, Vol. 42,No. 2, Feb. 1999, pp. 60–67.

    Article  Google Scholar 

  • Cranor, L.F. (1999): ‘Agents of Choice: Tools that Facilitate Notice and Choice about Web Site Data Practices’, Proc. 21st Intl. Conf. on Privacy and Personal Data Protection, Sep. 1999, Hong Kong, China.

    Google Scholar 

  • Damker, H.; Pordesch, U. and Reichenbach, M. (1999); ‘Personal Reachability and Security Management — Negotiation of Multilateral Security’, in: Müller, G. and Rannenberg, K. (eds): Multilateral Security in Communications — Technology, Infrastructure, Economy; Proc, Multilat?eral Security in Communications, Jul. 1999, Stuttgart, Addison-Wesley-Longman, pp. 95–111.

    Google Scholar 

  • Donath, J.S. (1998): ‘Identity and deception in the virtual community’, in: Kollock, P. and Smith, M. (eds.): Communities in Cyberspace, London: Routledge, 1998.

    Google Scholar 

  • Fujimura, K.; Nakajima Y. and Sekine, J. (1999): ‘XML Ticket: Generalized Digital Ticket Definition Language’, Proc. W3C Signed XML Workshop, Apr. 1999.

    Google Scholar 

  • Grasso, A.; Koch, M. and Rancati, A. (1999): ‘Augmenting Recommender Systems by Embedding Interfaces into Practices’, Proc. Intl. Conf. On Supporting Group Work (GROUP’99), Phoenix, AZ, Nov. 1999.

    Google Scholar 

  • Howes, T.; Smith, M. and Dawson, F. (1998): ‘MIME Content-Type for Directory Information (vCARD Specification)’, RFC2425, Sep. 1998

    Google Scholar 

  • Koch, M. and Lacher, M.S. (2000): ‘Integrating Community Services — A Common Infrastructure Proposal’, Proc. Knowledge-Based Intelligent Engineering Systems and Allied Technologies, Brighton, UK, Sep. 2000, pp. 56–59.

    Google Scholar 

  • Koch, M. and Lacher, M.S. (2001): ‘The Comovie Movie Recommender — An Interoperable Community Support Application’, Proc. HCI International 2001 — 9th Intl. Conf. on Human-Computer Interaction, New Orleans, LA, Aug. 2001.

    Google Scholar 

  • Koch, M.; Lacher, M.S. and Wörndl, W. (2001): ‘Das CommunityItemsTool — Interoperable Unterstützung von Interessens-Communities in der Praxis’, Proc. Liechtensteini-sches Wirtschaftsinformatiksymposiun — Informationsmanagement — Herausforderung und Perspektiven, May 2001.

    Google Scholar 

  • Köhntopp, M. and Bertold, O. (2000): ‘Identity Management Based on P3P’, Proc. Workshop on Design Issues in Anonymity and Unobservability, Jul. 2000, Berkeley, CA.

    Google Scholar 

  • Mulligan, D. and Schwartz, A.: ‘Your place or mine? Privacy Concerns and Solutions for Server and Client-side Storage of Personal Information’, Proc. Computers, Freedom and Privacy, Apr. 2000, Toronto, ON, Canada.

    Google Scholar 

  • Mynatt, E.D.; Adler, A.; Ito, M. and Oday, V.L. (1997): ‘Design for Network Communities’, Proc. ACM SIGCH1 Conf. On Human Factors in Computer Systems, 1997.

    Google Scholar 

  • Reiter, M.K. and Rubin, A.D. (1997): ‘Crowds: Anonymity for Web Transactions’, Technical Report 97-15, DIMACS, Aug. 1997.

    Google Scholar 

  • Resnick, P.; lacovou, N.; Suchak, M.; Bergstrom, P. and Riedl, J. (1994): ‘GroupLens: An Open Architecture for Collaborative Filtering of Netnews’, Proc. Intl. Conf. On Computer Supported Cooperative Work, Chapel Hill, NC, 1994.

    Google Scholar 

  • P3P (2000): The Platform for Privacy Preferences 1.0 (P3P1.0) Specification’, W3C Candidate Recommendation, Dec. 2000.

    Google Scholar 

  • Sandhu, R. and Samarati, P. (1994): ‘Access Control: Principles and Practice’, IEEE Communications Magazine, Vol. 32,No. 9, Sep. 1994, pp. 40–48.

    Article  Google Scholar 

  • Webster (1988): ‘Webster’s New World Dictionary of American English’, Third College Edition, Cleveland: Webster’s New World, 1988.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Kluwer Academic Publishers

About this chapter

Cite this chapter

Koch, M., Wörndl, W. (2001). Community Support and Identity Management. In: Prinz, W., Jarke, M., Rogers, Y., Schmidt, K., Wulf, V. (eds) ECSCW 2001. Springer, Dordrecht. https://doi.org/10.1007/0-306-48019-0_17

Download citation

  • DOI: https://doi.org/10.1007/0-306-48019-0_17

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-0-7923-7162-5

  • Online ISBN: 978-0-306-48019-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics