CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Privacy and Reputation in Context Aware e-Learning

Published on January 2014 by R. Jayashree, A. Christy
National Conference on Future Computing 2014
Foundation of Computer Science USA
NCFC2014 - Number 1
January 2014
Authors: R. Jayashree, A. Christy
819daed8-7698-480e-bbac-0727a4afab5f

R. Jayashree, A. Christy . Privacy and Reputation in Context Aware e-Learning. National Conference on Future Computing 2014. NCFC2014, 1 (January 2014), 27-31.

@article{
author = { R. Jayashree, A. Christy },
title = { Privacy and Reputation in Context Aware e-Learning },
journal = { National Conference on Future Computing 2014 },
issue_date = { January 2014 },
volume = { NCFC2014 },
number = { 1 },
month = { January },
year = { 2014 },
issn = 0975-8887,
pages = { 27-31 },
numpages = 5,
url = { /proceedings/ncfc2014/number1/14793-1407/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Future Computing 2014
%A R. Jayashree
%A A. Christy
%T Privacy and Reputation in Context Aware e-Learning
%J National Conference on Future Computing 2014
%@ 0975-8887
%V NCFC2014
%N 1
%P 27-31
%D 2014
%I International Journal of Computer Applications
Abstract

Contextualization is a paradigm for building intelligent systems that can better predict and anticipate the needs of users, and act more efficiently in response to their behaviour. Privacy and legal protection rights are a major challenge that needs to be tackled when capturing and using contextual data for recommendation. The privacy of learners can be protected through identity management. Participants can hold multiple identities or can adopt new pseudonymous personas. A pseudonymous actor needs a privacy-preserving mechanism for the transfer or merger of their reputation across their multiple pseudonyms. A reliable and trustworthy mechanism for reputation transfer (RT) from one persona to another is required. Such a reputation transfer model must preserve privacy and prevent link ability of learners' identities and personas. In this paper, we present an identity management-based solution to privacy and a privacy-preserving reputation management (RM) system which allows secure transfer of reputation. This paper includes the online rating calculation method for reputation management.

References
  1. Katrien Verbert, Member, Nikos Manouselis, Xavier Ochoa, Martin Wolpers, Hendrik Drachsler, Ivana Bosnic, and Erik Duval, "Context-Aware Recommender Systems for Learning: A Survey and Future Challenges," IEEE Transaction on Learning technologies, Vol. 5, No. 4, Oct-Dec 2012.
  2. Dey, G. Abowd, and D. Salber, "A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications," HumAN-Computer Interaction, vol. 16, pp. 97-166, Dec. 2001.
  3. G. Adomavicius and A. Tuzhilin, "Context-Aware Recommender Systems," Recommender Systems Handbook: A Complete Guide for Research Scientists and Practitioners, L. Rokach, B. Shapira, P. Kantor, and F. Ricci, eds. , pp. 217-250, Springer, 2011.
  4. Z. Yu, X. Zhou, D. Zhang, C. -Y. Chin, X. Wang, and J. Men, "Supporting Context-Aware Media Recommendations for Smart Phones," IEEE Pervasive Computing, vol. 5, no. 3, pp. 68-75, July- Sept. 2006.
  5. R. Bader, E. Neufeld, W. Woerndl, and V. Prinz, "Context-Aware POI Recommendations in an Automotive Scenario Using Multi- Criteria Decision Making Methods," Proc. Workshop Context- Awareness in Retrieval and Recommendation, pp. 23-30, 2011.
  6. H. -S. Park, J. -O. Yoo, and S. -B. Cho, "A Context-Aware Music Recommendation System Using Fuzzy Bayesian Networks with Utility Theory," Fuzzy Systems and Knowledge Discovery, L. Wang, L. Jiao, G. Shi, X. Li, and J. Liu, eds. , vol. 4223, pp. 970-979, Springer, 2006.
  7. M. Van Setten, S. Pokraev, and J. Koolwaaij, "Context-aware Recommendations in the Mobile Tourist Application COMPASS," Adaptive Hypermedia and Adaptive Web Based Systems, pp. 235-244, Aug. 2004.
  8. Z. Yujie and W. Licai, "Some Challenges for Context-aware Recommender Systems," Proc. Fifth Int'l Conf. Computer Science and Education (ICCSE), pp. 362-365, 2010.
  9. G. Adomavicius, A. Tuzhilin, and E. W. Luca, "Context-Awareness in Recommender Systems: Research Workshop and Movie Recommendation Challenge Categories and Subject Descriptors," Human Factors, pp. 60558-60558, 2010.
  10. "Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data," Official J. L 281 of 23. 11. 1995, pp. 31-39.
  11. P. Lonsdale, C. Barber, M. Sharples, and T. N. Arvantis, "A Context-Awareness Architecture for Facilitating Mobile Learning," Learning with Mobile Devices Research and Development, J. Attewell and C. Savil-Smith, eds. , pp. 79-85, Learning and Skills Development Agency, 2004.
  12. S. Gurses and R. Vuorikari, "Privacy Issues and Data Protection in Technology Enhanced Learning," Proc. First Workshop Data Sets for Technology Enhanced Learning, http://homes. esat. kuleuven. be/ ~sguerses/talks. html, 2011.
  13. Mohd Anwar and Jim Greer. "Facilitating Trust in Privacy-Preserving E-Learning Environments," IEEE Transaction on Learning technologies, VOL. 5, NO. 1, JAN-MAR 2012.
  14. M. Anwar, J. Greer, and C. Brooks, "Privacy Enhanced Personalization in E-Learning," Proc. Int'l Conf. Privacy, Security, and Trust, 2006.
  15. K. Borcea, H. Donker, E. Franz, A. Pfitzmann, and H. Wahrig, "Towards Privacy-Aware eLearning," Proc. Privacy Enhancing Technologies, pp. 167-178, 2005.
  16. R. E. Leenes, "User-Centric Identity Management as an Indispensable Tool for Privacy Protection," Int'l J. Intellectual Property Management, vol. 2, no. 4, pp. 345-371, 2008.
  17. J. Mason and P. Lefrere, "Trust, Collaboration, and Organisational Transformation," Int'l J. Training and Development, vol. 7, no. 4, pp. 259-271, 2003.
  18. C. Haythornthwaite, "Facilitating Collaboration in Online Learning," J. Asynchronous Learning Networks, vol. 10, no. 1, pp. 7-23, 2006.
  19. J. Allan and N. Lawless, "Stress Caused by Online Collaboration in E-learning: A Developing Model," Education and Training, vol. 45, nos. 8/9, pp. 564-572, 2003.
  20. S. Patil and A. Kobsa, "Privacy in Collaboration: Managing Impression," Proc. First Int'l Conf. Online Communities and Social Computing, 2005.
  21. L. Lilien and B. K. Bhargava, "A Scheme for Privacy-preserving Data Dissemination," IEEE Trans. Systems, Man, and Cybernetics, vol. 36, no. 3, pp. 503-506, May 2006.
  22. M. Hansen, A. Schwartz, and A. Cooper, "Privacy and Identity Management," IEEE Security and Privacy, vol. 6, no. 2, pp. 38-45, Mar. /Apr. 2008.
  23. P. Briggs, B. Simpson, and A. D. Angeli, "Personalisation and Trust: A Reciprocal Relationship?" Designing Personalized User Experiences in eCommerce, pp. 39-55, Kluwer Academic, 2004.
  24. J. L. Steel, "Interpersonal Correlates of Trust and Self-Disclosure," Psychological Reports, vol. 68, pp. 1319-1320, 1991 B. Friedman, P. H. Kahn Jr. , and D. C. Howe, "Trust Online," Comm. ACM, vol. 43, no. 12, pp. 34-40, 2000.
  25. W. Nejdl, D. Olmedilla, and M. Winslett, "Peertrust: Automated Trust Negotiation for Peers on the Semantic Web," Proc. 30th Workshop Secure Data Management in a Connected World (SDM '04), pp. 118-132, 2004.
  26. T. Yu and M. Winslett, "Policy Migration for Sensitive Credentials in Trust Negotiation," Proc. ACM Workshop Privacy in the Electronic
  27. Soc. (WPES '03), pp. 9-20, 2003.
  28. S. Marsh, "Formalising Trust as a Computational Concept," PhD dissertation, Univ. of Stirling, 1994.
  29. J. Golbeck and J. Hendler, "Accuracy of Metrics for Inferring Trust and Reputation in Semantic Web-Based Social Networks," Proc. Eng. Knowledge in the Age of the SemanticWeb, 2004.
  30. Thomson Reuters, "The World University Rankings," http://www. timeshighereducation. co. uk/world-university-rankings/2012-13/world-ranking
Index Terms

Computer Science
Information Sciences

Keywords

Reputation-ranking Method Ranking Using Bayesian Approximation Trust And Reputation Relationship.