通过面具营销实现个性化

Moritz Strasser, A. Zugenmaier
{"title":"通过面具营销实现个性化","authors":"Moritz Strasser, A. Zugenmaier","doi":"10.1109/HICSS.2003.1174582","DOIUrl":null,"url":null,"abstract":"Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are exploited to generate a profile of interests of the users. Marketing measures like advertisements in form of banners or product presentation are tailored according to these profiles. This kind of customizing suffers from insufficient information about the current interests of the users: the profiles are only a collection of past actions of the users. Additionally, sometimes personalization is seen an invasion of privacy and often unsolicited advertisements unrelated to the users' real interests are cited as an example of the nuisances of 1-to-1 marketing. This shows the dilemma that 1-to-1 marketing faces: The users feel they already offer too much information about themselves. Currently, users solve this dilemma by disabling all technical means that enable user profiling, e.g. by disabling cookies in their Web browsers, using anonymity services, and providing fake identities to Web sites. We propose an approach based on peer-to-peer networks to allow marketing to a specific target group while preserving the privacy of users, we call it mask-marketing. In this concept a user assumes the identity of a mask representing his or her intentions. E.g., a user buying a Christmas present will use the \"Christmas shopping\" identity, afterwards the same user may use an \"engineering\" mask for an information search relating to his work. The users are able to present their preferences and intentions without these being attributable to their true identity. The masks, which are technically realized by sharing cookies, are distributed and updated using a peer-to-peer networking approach. This permits use of a mask by several different users. All actions performed by different users under the identity of one mask contribute to the profile of this mask. Creation and distribution don't require a central service. This is an advantage since the sensitive profile data is not concentrated in a central entity in the network, which could be viewed by privacy sensitive users with suspicion.","PeriodicalId":159242,"journal":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Personalization through mask marketing\",\"authors\":\"Moritz Strasser, A. Zugenmaier\",\"doi\":\"10.1109/HICSS.2003.1174582\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are exploited to generate a profile of interests of the users. Marketing measures like advertisements in form of banners or product presentation are tailored according to these profiles. This kind of customizing suffers from insufficient information about the current interests of the users: the profiles are only a collection of past actions of the users. Additionally, sometimes personalization is seen an invasion of privacy and often unsolicited advertisements unrelated to the users' real interests are cited as an example of the nuisances of 1-to-1 marketing. This shows the dilemma that 1-to-1 marketing faces: The users feel they already offer too much information about themselves. Currently, users solve this dilemma by disabling all technical means that enable user profiling, e.g. by disabling cookies in their Web browsers, using anonymity services, and providing fake identities to Web sites. We propose an approach based on peer-to-peer networks to allow marketing to a specific target group while preserving the privacy of users, we call it mask-marketing. In this concept a user assumes the identity of a mask representing his or her intentions. E.g., a user buying a Christmas present will use the \\\"Christmas shopping\\\" identity, afterwards the same user may use an \\\"engineering\\\" mask for an information search relating to his work. The users are able to present their preferences and intentions without these being attributable to their true identity. The masks, which are technically realized by sharing cookies, are distributed and updated using a peer-to-peer networking approach. This permits use of a mask by several different users. All actions performed by different users under the identity of one mask contribute to the profile of this mask. Creation and distribution don't require a central service. This is an advantage since the sensitive profile data is not concentrated in a central entity in the network, which could be viewed by privacy sensitive users with suspicion.\",\"PeriodicalId\":159242,\"journal\":{\"name\":\"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-02-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HICSS.2003.1174582\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HICSS.2003.1174582","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

定制营销,即所谓的1对1营销,通常被视为电子商务的灵丹妙药。用户配置文件,例如记录用户访问的每个站点的点击流,被用来生成用户兴趣的配置文件。营销措施,如横幅广告或产品展示形式,是根据这些配置文件量身定制的。这种自定义的缺点是缺乏关于用户当前兴趣的信息:配置文件只是用户过去行为的集合。此外,个性化有时被视为侵犯隐私,与用户实际兴趣无关的未经请求的广告经常被视为1对1营销的一个令人讨厌的例子。这显示了1对1营销面临的困境:用户觉得他们已经提供了太多关于自己的信息。目前,用户通过禁用所有启用用户分析的技术手段来解决这个困境,例如,通过禁用Web浏览器中的cookie,使用匿名服务,以及向Web站点提供虚假身份。我们提出了一种基于点对点网络的方法,允许对特定目标群体进行营销,同时保护用户的隐私,我们称之为“面具营销”。在这个概念中,用户假设一个面具的身份代表他或她的意图。例如,购买圣诞礼物的用户将使用“圣诞购物”身份,随后同一用户可以使用“工程”掩码进行与其工作相关的信息搜索。用户可以展示他们的偏好和意图,而无需将这些归因于他们的真实身份。掩码在技术上是通过共享cookie实现的,使用点对点网络方法进行分发和更新。这允许多个不同的用户使用一个掩码。不同用户在同一掩码下所做的所有动作都将生成该掩码的配置文件。创建和分发不需要中央服务。这是一个优势,因为敏感的个人资料数据不会集中在网络中的中心实体中,这可能会被隐私敏感的用户怀疑地查看。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Personalization through mask marketing
Customized marketing, so called 1-to-1 marketing, is often viewed as the panacea of e-commerce. User profiles, such as click streams logging every site the user accesses, are exploited to generate a profile of interests of the users. Marketing measures like advertisements in form of banners or product presentation are tailored according to these profiles. This kind of customizing suffers from insufficient information about the current interests of the users: the profiles are only a collection of past actions of the users. Additionally, sometimes personalization is seen an invasion of privacy and often unsolicited advertisements unrelated to the users' real interests are cited as an example of the nuisances of 1-to-1 marketing. This shows the dilemma that 1-to-1 marketing faces: The users feel they already offer too much information about themselves. Currently, users solve this dilemma by disabling all technical means that enable user profiling, e.g. by disabling cookies in their Web browsers, using anonymity services, and providing fake identities to Web sites. We propose an approach based on peer-to-peer networks to allow marketing to a specific target group while preserving the privacy of users, we call it mask-marketing. In this concept a user assumes the identity of a mask representing his or her intentions. E.g., a user buying a Christmas present will use the "Christmas shopping" identity, afterwards the same user may use an "engineering" mask for an information search relating to his work. The users are able to present their preferences and intentions without these being attributable to their true identity. The masks, which are technically realized by sharing cookies, are distributed and updated using a peer-to-peer networking approach. This permits use of a mask by several different users. All actions performed by different users under the identity of one mask contribute to the profile of this mask. Creation and distribution don't require a central service. This is an advantage since the sensitive profile data is not concentrated in a central entity in the network, which could be viewed by privacy sensitive users with suspicion.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信