Title | An approach to Privacy on Recommended Systems |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Luma, Artan, Abazi, Blerton, Aliu, Azir |
Conference Name | 2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) |
Keywords | Companies, data privacy, data protection, Europe, expert systems, Expert Systems and Privacy, Facebook, History, Human Behavior, human factors, Internet, online companies, privacy, privacy protection techniques, pubcrawl, recommended systems, recommender systems, referral systems, Scalability, security, social networking (online), social networks, user privacy, user security, users personal information, website |
Abstract | Recommended systems are very popular nowadays. They are used online to help a user get the desired product quickly. Recommended Systems are found on almost every website, especially big companies such as Facebook, eBay, Amazon, NetFlix, and others. In specific cases, these systems help the user find a book, movie, article, product of his or her preference, and are also used on social networks to meet friends who share similar interests in different fields. These companies use referral systems because they bring amazing benefits in a very fast time. To generate more accurate recommendations, recommended systems are based on the user's personal information, eg: different ratings, history observation, personal profiles, etc. Use of these systems is very necessary but the way this information is received, and the privacy of this information is almost constantly ignored. Many users are unaware of how their information is received and how it is used. This paper will discuss how recommended systems work in different online companies and how safe they are to use without compromising their privacy. Given the widespread use of these systems, an important issue has arisen regarding user privacy and security. Collecting personal information from recommended systems increases the risk of unwanted exposure to that information. As a result of this paper, the reader will be aware of the functioning of Recommended systems, the way they receive and use their information, and will also discuss privacy protection techniques against Recommended systems. |
DOI | 10.1109/ISMSIT.2019.8932805 |
Citation Key | luma_approach_2019 |