Personalization through mask marketing

Moritz Strasser, A. Zugenmaier
{"title":"Personalization through mask marketing","authors":"Moritz Strasser, A. Zugenmaier","doi":"10.1109/HICSS.2003.1174582","DOIUrl":null,"url":null,"abstract":"Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are exploited to generate a profile of interests of the users. Marketing measures like advertisements in form of banners or product presentation are tailored according to these profiles. This kind of customizing suffers from insufficient information about the current interests of the users: the profiles are only a collection of past actions of the users. Additionally, sometimes personalization is seen an invasion of privacy and often unsolicited advertisements unrelated to the users' real interests are cited as an example of the nuisances of 1-to-1 marketing. This shows the dilemma that 1-to-1 marketing faces: The users feel they already offer too much information about themselves. Currently, users solve this dilemma by disabling all technical means that enable user profiling, e.g. by disabling cookies in their Web browsers, using anonymity services, and providing fake identities to Web sites. We propose an approach based on peer-to-peer networks to allow marketing to a specific target group while preserving the privacy of users, we call it mask-marketing. In this concept a user assumes the identity of a mask representing his or her intentions. E.g., a user buying a Christmas present will use the \"Christmas shopping\" identity, afterwards the same user may use an \"engineering\" mask for an information search relating to his work. The users are able to present their preferences and intentions without these being attributable to their true identity. The masks, which are technically realized by sharing cookies, are distributed and updated using a peer-to-peer networking approach. This permits use of a mask by several different users. All actions performed by different users under the identity of one mask contribute to the profile of this mask. Creation and distribution don't require a central service. This is an advantage since the sensitive profile data is not concentrated in a central entity in the network, which could be viewed by privacy sensitive users with suspicion.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HICSS.2003.1174582","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are exploited to generate a profile of interests of the users. Marketing measures like advertisements in form of banners or product presentation are tailored according to these profiles. This kind of customizing suffers from insufficient information about the current interests of the users: the profiles are only a collection of past actions of the users. Additionally, sometimes personalization is seen an invasion of privacy and often unsolicited advertisements unrelated to the users' real interests are cited as an example of the nuisances of 1-to-1 marketing. This shows the dilemma that 1-to-1 marketing faces: The users feel they already offer too much information about themselves. Currently, users solve this dilemma by disabling all technical means that enable user profiling, e.g. by disabling cookies in their Web browsers, using anonymity services, and providing fake identities to Web sites. We propose an approach based on peer-to-peer networks to allow marketing to a specific target group while preserving the privacy of users, we call it mask-marketing. In this concept a user assumes the identity of a mask representing his or her intentions. E.g., a user buying a Christmas present will use the "Christmas shopping" identity, afterwards the same user may use an "engineering" mask for an information search relating to his work. The users are able to present their preferences and intentions without these being attributable to their true identity. The masks, which are technically realized by sharing cookies, are distributed and updated using a peer-to-peer networking approach. This permits use of a mask by several different users. All actions performed by different users under the identity of one mask contribute to the profile of this mask. Creation and distribution don't require a central service. This is an advantage since the sensitive profile data is not concentrated in a central entity in the network, which could be viewed by privacy sensitive users with suspicion.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
通过面具营销实现个性化
定制营销,即所谓的1对1营销,通常被视为电子商务的灵丹妙药。用户配置文件,例如记录用户访问的每个站点的点击流,被用来生成用户兴趣的配置文件。营销措施,如横幅广告或产品展示形式,是根据这些配置文件量身定制的。这种自定义的缺点是缺乏关于用户当前兴趣的信息:配置文件只是用户过去行为的集合。此外,个性化有时被视为侵犯隐私,与用户实际兴趣无关的未经请求的广告经常被视为1对1营销的一个令人讨厌的例子。这显示了1对1营销面临的困境:用户觉得他们已经提供了太多关于自己的信息。目前,用户通过禁用所有启用用户分析的技术手段来解决这个困境,例如,通过禁用Web浏览器中的cookie,使用匿名服务,以及向Web站点提供虚假身份。我们提出了一种基于点对点网络的方法,允许对特定目标群体进行营销,同时保护用户的隐私,我们称之为“面具营销”。在这个概念中,用户假设一个面具的身份代表他或她的意图。例如,购买圣诞礼物的用户将使用“圣诞购物”身份,随后同一用户可以使用“工程”掩码进行与其工作相关的信息搜索。用户可以展示他们的偏好和意图,而无需将这些归因于他们的真实身份。掩码在技术上是通过共享cookie实现的,使用点对点网络方法进行分发和更新。这允许多个不同的用户使用一个掩码。不同用户在同一掩码下所做的所有动作都将生成该掩码的配置文件。创建和分发不需要中央服务。这是一个优势,因为敏感的个人资料数据不会集中在网络中的中心实体中,这可能会被隐私敏感的用户怀疑地查看。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
No more shadow boxing with online music piracy: strategic business models to enhance revenues Balancing safety against performance: tradeoffs in Internet security The transitional role of institutional trust in online interorganizational relationships The development and proliferation of consensus security configuration benchmarks for systems connected to the Internet Multi-criteria task assignment in workflow management systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1