Online citations, reference lists, and bibliographies.

Do You Trust Your Recommendations? An Exploration Of Security And Privacy Issues In Recommender Systems

S. K. Lam, D. Frankowski, J. Riedl
Published 2006 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Recommender systems are widely used to help deal with the problem of information overload. However, recommenders raise serious privacy and security issues. The personal information collected by recommenders raises the risk of unwanted exposure of that information. Also, malicious users can bias or sabotage the recommendations that are provided to other users. This paper raises important research questions in three topics relating to exposure and bias in recommender systems: the value and risks of the preference information shared with a recommender, the effectiveness of shilling attacks designed to bias a recommender, and the issues involved in distributed or peer-to-peer recommenders. The goal of the paper is to bring these questions to the attention of the information and communication security community, to invite their expertise in addressing them.
This paper references
10.1109/4236.978368
Protecting Free Expression Online with Freenet
Ian Clarke (2002)
10.1145/1010614.1010618
PocketLens: Toward a personal recommender system
Bradley N. Miller (2004)
10.1142/S0218488502001648
k-Anonymity: A Model for Protecting Privacy
L. Sweeney (2002)
10.1145/502716.502737
Getting to know you: learning new user preferences in recommender systems
A. Rashid (2002)
10.1145/371920.372071
Item-based collaborative filtering recommendation algorithms
B. Sarwar (2001)
Privacy-enhanced collaborative filtering
S. Berkovsky (2005)
Identifying Attack Models for Secure Recommendation
R. Burke (2004)
10.1007/3-540-45748-8_24
The Sybil Attack
John R. Douceur (2002)
10.1007/3-540-44963-9_24
Interfaces for Eliciting New User Preferences in Recommender Systems
Sean M. McNee (2003)
10.1111/J.1430-9134.2001.00173.X
The Social Cost of Cheap Pseudonyms
E. Friedman (2001)
10.1145/1014052.1014097
TiVo: making show recommendations using a distributed collaborative filtering architecture
K. Ali (2004)
Privacy , Shilling , and The Value of Information in Recommender Systems
S. K. Lam (2005)
10.1145/564376.564419
Collaborative filtering with privacy via factor analysis
J. Canny (2002)
10.21236/ada439541
Application of Dimensionality Reduction in Recommender System - A Case Study
B. Sarwar (2000)
10.1145/775152.775242
The Eigentrust algorithm for reputation management in P2P networks
S. Kamvar (2003)
10.1007/3-540-39200-9_18
CAPTCHA: Using Hard AI Problems for Security
L. V. Ahn (2003)
10.1145/192844.192905
GroupLens: an open architecture for collaborative filtering of netnews
P. Resnick (1994)
10.1007/3-540-44963-9
User Modeling 2003
Peter Brusilovsky (2003)
10.1109/TKDE.2005.99
Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions
Gediminas Adomavicius (2005)
10.1007/978-1-4302-0366-7_11
User interface
R. Jacob (2002)
10.1145/352871.352889
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
Chrysanthos Dellarocas (2000)
10.1109/ICDM.2003.1250993
Privacy-preserving collaborative filtering using randomized perturbation techniques
H. Polat (2003)
10.1145/502585.502627
Evaluation of Item-Based Top-N Recommendation Algorithms
G. Karypis (2001)
Collaborative Filtering by Personality Diagnosis: A Hybrid Memory and Model-Based Approach
D. Pennock (2000)
10.1145/974121.974131
State-of-the-art in privacy preserving data mining
V. Verykios (2004)
10.1145/1111449.1111476
Is trust robust?: an analysis of trust-based recommendation
J. O'Donovan (2006)
10.1145/988672.988726
Shilling recommender systems for fun and profit
S. K. Lam (2004)
10.1145/336992.336995
Privacy in e-commerce: examining user scenarios and privacy preferences
M. Ackerman (1999)
10.1109/4236.968832
Privacy Risks in Recommender Systems
Naren Ramakrishnan (2001)
10.1145/383059.383071
Chord: A scalable peer-to-peer lookup service for internet applications
I. Stoica (2001)



This paper is referenced by
A Hybrid Recommender System for Context-Aware Recommendations of Restaurants
Adrian Kristoffer Tvete (2016)
Towards effective research-paper recommender systems and user modeling based on mind maps
Joeran Beel (2015)
10.1007/978-1-4899-7637-6_8
Evaluating Recommender Systems
A. Gunawardana (2015)
Recommender systems for e-shops
Chris Anderson (2011)
3PS - Online Privacy through Group Identities
Pol Mac Aonghusa (2018)
10.1145/3041760
BLC: Private Matrix Factorization Recommenders via Automatic Group Learning
Alessandro Checco (2017)
10.1109/ICICCT.2018.8473355
Onboard Entertainment Services using Raspberry Pi with Recommendation Engine
Wasudeo Rahane (2018)
10.1007/s10462-012-9364-9
Shilling attacks against recommender systems: a comprehensive survey
Ihsan Gunes (2012)
10.3929/ETHZ-A-010813282
Leveraging Mobile and Internet of Things Technologies to Enhance Products with Digital Services
Runhua Xu (2016)
Chapter 1 Introduction to Recommender Systems Handbook
F. Ricci (2010)
10.1007/s00500-019-04605-z
Feature selection by using privacy-preserving of recommendation systems based on collaborative filtering and mutual trust in social networks
Somayeh Moghaddam Zadeh Kashani (2020)
10.1007/s11257-011-9115-7
Evaluating recommender systems from the user’s perspective: survey of the state of the art
P. Pu (2011)
10.1109/AXMEDIS.2008.21
Evaluating Recommender Systems
Z. Zaier (2008)
10.1007/978-981-15-1304-6_9
Towards Privacy-preserving Recommender System with Blockchains
Abdullah Al Omar (2019)
10.1007/978-3-642-16567-2_5
Achieving Optimal Privacy in Trust-Aware Social Recommender Systems
Nima Dokoohaki (2010)
10.1007/s11042-019-08464-6
S-box design based on optimize LFT parameter selection: a practical approach in recommendation system domain
Saira Beg (2020)
10.1016/j.eswa.2011.11.037
The impact of data obfuscation on the accuracy of collaborative filtering
Shlomo Berkovsky (2012)
10.1016/j.im.2014.04.003
The ethical and social implications of personalization technologies for e-learning
H. Ashman (2014)
10.1007/978-3-030-22479-0_9
When and where do you want to hide? Recommendation of location privacy preferences with local differential privacy
Maho Asada (2019)
10.1145/1877766.1877771
Dependable filtering: Philosophy and realizations
Matteo Dell'Amico (2010)
10.3929/ETHZ-A-010561395
A Novel Recommender System in IoT
Remo M. Frey (2015)
10.1109/ELELTECH.2017.8074988
Cognitive learning recommendation system in Indian context
Amirag Gulati (2017)
Design & Analysis on Robust Defense Algorithm against Sybil Attack Using Information Level
Giseop Noh (2008)
Chapter 8 Developer Profiles for Recommendation Systems
A. Ying (2015)
Recommender Systems: Between Acceptance and Refusal
T. Neumayr (2012)
Modèle multi-agents pour le filtrage collaboratif de l'information
Zied Zaïer (2010)
10.1504/IJBIDM.2016.076433
A locality centred recommendation system combining CNM clustering technique with fuzzy preference tree-based ranking algorithm
J SharonMoses (2016)
10.1109/IRI49571.2020.00057
Latent Feature Modelling for Recommender Systems
Abdullah Alhejaili (2020)
User Factors in Recommender Systems: Case Studies in e-Commerce, News Recommending, and e-Learning
J. Leino (2014)
10.3929/ETHZ-A-010536995
Towards Understanding the Impact of Personality Traits on Mobile App Adoption - A Scalable Approach
Runhua Xu (2015)
10.1007/978-3-319-90059-9_5
A Survey on the Scalability of Recommender Systems for Social Networks
Christos Sardianos (2018)
Lines in Secure and Robust Recommender Systems
Neil J. Hurley (2007)
See more
Semantic Scholar Logo Some data provided by SemanticScholar