2007
Data Preparation for User Profiling from Traffic Log
KUMPOŠT, MarekZákladní údaje
Originální název
Data Preparation for User Profiling from Traffic Log
Název česky
Příprava dat pro profilování
Autoři
KUMPOŠT, Marek (203 Česká republika, garant)
Vydání
Los Alamitos, CA, USA, Proceedings of The International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE 2007), od s. 89-94, 6 s. 2007
Nakladatel
IEEE Computer Society
Další údaje
Jazyk
angličtina
Typ výsledku
Stať ve sborníku
Obor
10201 Computer sciences, information science, bioinformatics
Stát vydavatele
Česká republika
Utajení
není předmětem státního či obchodního tajemství
Kód RIV
RIV/00216224:14330/07:00032428
Organizační jednotka
Fakulta informatiky
ISBN
0-7695-2989-5
Klíčová slova anglicky
user profiling; data mining; traffic log; privacy protection; user profiles
Příznaky
Mezinárodní význam, Recenzováno
Změněno: 25. 6. 2009 11:29, RNDr. Marek Kumpošt, Ph.D.
V originále
User profiling is a technique that services use to provide customizable content to their users. These services operate with a user profile that reflects users' behaviour in the past. Profiling gives us some evidence about users' behaviour (information about their interests and social background). Instead of requiring users to state their interests, a service could learn this information from users' past activities. The main question is how much private information can be derived from context information that is related to an individual. The second question is to what extent a behaviour pattern can be used to pinpoint an individual among others.
Česky
User profiling is a technique that services use to provide customizable content to their users. These services operate with a user profile that reflects users' behaviour in the past. Profiling gives us some evidence about users' behaviour (information about their interests and social background). Instead of requiring users to state their interests, a service could learn this information from users' past activities. The main question is how much private information can be derived from context information that is related to an individual. The second question is to what extent a behaviour pattern can be used to pinpoint an individual among others.