An agent‐based privacy‐enhancing model

Hsu‐Hui Lee (Department of Computer Science, San José State University, San José, California, USA)
Mark Stamp (Department of Computer Science, San José State University, San José, California, USA)

Information Management & Computer Security

ISSN: 0968-5227

Publication date: 18 July 2008

Abstract

Purpose

The purpose of this paper is to discuss a privacy‐enhancing model, which is designed to help web users protect their private information. The model employs a collection of software agents. Privacy‐related decisions are made based on Platform for Privacy Preferences Project (P3P) information collected by the agents.

Design/methodology/approach

Based on P3P information collected and user preferences, the software agents play a role in the decision‐making process. This paper presents the design of the agent‐based privacy‐enhancing model and considers the benefits and utility of such an approach.

Findings

It is argued that the approach is feasible and it provides an effective solution to the usability limitations associated with P3P.

Research limitations/implications

The paper focuses primarily on usability issues related to P3P. Consequently, some of the ancillary security‐related issues that arise are not covered in detail. Also the paper does not cover the development of an appropriate ontology in significant detail.

Practical implications

Based on this analysis and extensive testing of the prototype, it is believed that the privacy‐enhancing model presented provides a sound basis for privacy protection on the web. While the emphasis here is on resolving the usability problems associated with P3P, a few straightforward enhancements to the implementation would make it a genuinely practical tool.

Originality/value

The usability of the P3P framework is generally considered its weak point. The paper provides a practical solution to this usability problem. One is not aware of any comparable work.

Keywords

Citation

Lee, H. and Stamp, M. (2008), "An agent‐based privacy‐enhancing model", Information Management & Computer Security, Vol. 16 No. 3, pp. 305-319. https://doi.org/10.1108/09685220810893234

Publisher

:

Emerald Group Publishing Limited

Copyright © 2008, Emerald Group Publishing Limited

To read the full version of this content please select one of the options below

You may be able to access this content by logging in via Shibboleth, Open Athens or with your Emerald account.
To rent this content from Deepdyve, please click the button.
If you think you should have access to this content, click the button to contact our support team.