D 2007

Data Preparation for User Profiling from Traffic Log

KUMPOŠT, Marek

Základní údaje

Originální název

Data Preparation for User Profiling from Traffic Log

Název česky

Příprava dat pro profilování

Autoři

KUMPOŠT, Marek (203 Česká republika, garant)

Vydání

Los Alamitos, CA, USA, Proceedings of The International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE 2007), od s. 89-94, 6 s. 2007

Nakladatel

IEEE Computer Society

Další údaje

Jazyk

angličtina

Typ výsledku

Stať ve sborníku

Obor

10201 Computer sciences, information science, bioinformatics

Stát vydavatele

Česká republika

Utajení

není předmětem státního či obchodního tajemství

Kód RIV

RIV/00216224:14330/07:00032428

Organizační jednotka

Fakulta informatiky

ISBN

0-7695-2989-5

Klíčová slova anglicky

user profiling; data mining; traffic log; privacy protection; user profiles

Příznaky

Mezinárodní význam, Recenzováno
Změněno: 25. 6. 2009 11:29, RNDr. Marek Kumpošt, Ph.D.

Anotace

V originále

User profiling is a technique that services use to provide customizable content to their users. These services operate with a user profile that reflects users' behaviour in the past. Profiling gives us some evidence about users' behaviour (information about their interests and social background). Instead of requiring users to state their interests, a service could learn this information from users' past activities. The main question is how much private information can be derived from context information that is related to an individual. The second question is to what extent a behaviour pattern can be used to pinpoint an individual among others.

Česky

User profiling is a technique that services use to provide customizable content to their users. These services operate with a user profile that reflects users' behaviour in the past. Profiling gives us some evidence about users' behaviour (information about their interests and social background). Instead of requiring users to state their interests, a service could learn this information from users' past activities. The main question is how much private information can be derived from context information that is related to an individual. The second question is to what extent a behaviour pattern can be used to pinpoint an individual among others.