You are here: Resources > FIDIS Deliverables > Profiling > D7.2: Descriptive analysis and inventory of profiling practices > 

D7.2: Descriptive analysis and inventory of profiling practices

Glossary:  Foreword




Agre, P.E. (1999), “The Architecture of Identity: Embedding Privacy in Market Institutions”, in 2 Info. Comm. And Soc’ y 1 (Spring). To be downloaded at:

Agre, P. E. (2001), “Beyond the Mirror World: Privacy and the Representational Practices of Computing.”, 29-62, in Technology and Privacy: The New Landscape, edited by P. E. Agre and M. Rotenberg. Cambridge, Massachusetts: MIT.

Agre, P.E. and Rotenberg, M. (2001), Technology and Privacy: The New Landscape. Cambridge, Massachusetts: MIT.

Andre E., Klesen M., Gebhard O., Rist T. (2000), “Exploiting Models of Personality and Emotions to Control the Behavior of Animated Interactive Agents”, in Fourth International Conference on Autonomous Agents, pp. 3-7, Barcelona.

Angehrn, Albert A. (2004), Designing Intelligent Agents for Virtual Communities; INSEAD CALT Report 11-2004.

Armstrong, S. J. (1970), “How to Avoid Exploratory Research”, Journal of Advertising Research 4, p. 27-30.

Beenen, G., Ling, K., Wang, Xiaoqing, Chang, K., Frankowski, D., Resnick, P. and Kraut R.E. (2004), “Using Social Psychology to Motivate Contributions to Online Communities”, in Proceedings of ACM CSCW 2004 Conference on Computer Supported Cooperative Work, Chicago, IL. 2004.

Berendt, B., Günther, O., Spiekermann, S. (2005), “Privacy in E-Commerce: Stated Preferences vs. Actual Behavior”, in Communication of the ACM (CACM), vol 48, no.3, 2005.

Berry, M. J. A. and Linoff G. (1997), Data mining techniques: for marketing, sales, and customer support. New York.

Blanchard, A., Markus A.L. (2002), “Sense of Virtual Community-Maintaining the Experience of Belonging”, in 35th Annual Hawaii International Conference on System Sciences (HICSS’02)-Volume 8.

Bock, G.W., and Kim, Y.G. (2003), “Exploring the Influence of Rewards on Attitudes Towards Knowledge Sharing”, in Advanced Topics of Information Resources Management, (2), IDEA Group Publishing, PA.

Bonnet, M. (2001), “Personalization of Web Services: Opportunities and Challenges”, in Ariadne, 22 June 2001, Issue 28. To be downloaded at:

Bruha, I. (2000), “From machine learning to knowledge discovery: survey of preprocessing and postprocessing”, in Intelligent Data Analysis 4: 363-374.

Brusilovsky, P. (1999), “Adaptive and Intelligent Technologies for Web-based Education”, in C.Rollinger and C.Peylo (eds.) Kunstliche Intelligenz, Special Issue on Intelligent Systems and Teleteaching.

Brusilovsky, P., (2001) “Adaptive Hypermedia”, User Modeling and User- Adapted Interaction.

Calenda, D. (2004), “Social Implications of online personalization”, Paper presented at the international expert meeting ‘Issues of online personalisation’, 5 March 2004, Oxford Internet Institute.

Camp,L.Jean (2003), Identity in Digital Government, A Report of the 2003 Civic Scenario Workshop, Kennedy School of Government, Harvard University.

Canhoto, Ana and Backhouse, James (2004), ‘Constructing categories, Constructing signs - analysing differences in Suspicious Transaction Reporting practice’. Information Systems Integrity Group, London School of Economics, London.

Chaitin, G.J. (1990), Information, Randomness and Incompleteness.

Chaitin, G.J. (1992), Algorithmic Information Theory. Cambridge: Cambridge University Press.

Chaitin, G.J. (1999), The Unknowable. Heidelberg: Springer Verlag.

Chan, C. and B. Lewis (2002), “A basic primer on data mining.”, in Information Systems Management 19(4): 56-60.

Chan, Calvin M. L., Bhandar, Mamata, Oh, Lih-Bin, Chan, Hock-Chuan (2004), “Recognition and Participation in a Virtual Community: A Case Study”, in Proceedings of the 37th HICSS Conference, Hawaii, 2004.

Chung, H. M. and Grey P. (1999), “Special edition: Data mining”, in Journal of Management Information Systems 16(1), 11-16.

Cialdini, R. B., & Sagarin, B. J. (2005), “Interpersonal influence”, in T. Brock & M. Green (Eds.), Persuasion: Psychological insights and perspectives (pp. 143-169). Newbury Park, CA: Sage Press.

Clarke, R. (1994), “The Digital Persona and its Application to Data Surveillance”, The Information Society 10 (2).

Cothrel, Joseph and Williams, Ruth (1999), “On-Line Communities: Helping Them Form and Grow”, in Journal of Knowledge Management 3 (1) March, 54-65.

Crabtree, Barry and Soltysiak, S. (1998), “Identifying and Tracking Changing Interests”, in International Journal on Digital Libraries, Vol. 2, No. 1, pp 38-53.

Crossley, M., Kings N.J., Scott J.R. (2003), “Profiles - Analysis and Behaviour”, BT Technology Journal, vol 21, nr.1, Januari 2003.

Custers, Bart (2004), The Power of Knowledge. Ethical, Legal, and Technological Aspects of Data Mining and Group Profiling in Epideminology. Nijmegen: Wolf Legal Publishers.

Darlinski J., Wissen ist Macht. To be downloaded at

De Croock, M.B.M., Paas, F.G.W.C., Schlanbusch, H., & van Merriënboer, J.J.G. (2002), ADAPT-IT: Instructional Design (ID) tools for training design and evaluation”, in Educational Technology, Research and Development, 50(4), 47-58.

Diogene (2002), Survey on Methods and Standards for Student Modelling; Diogene project, September 2002. To be downloaded at:

Dolog, P. and Nejdl, W. (2003), “Challenges and benefits of the semantic web for user modeling”. Paper presented at the International Workshop on Adaptive Hypermedia and Adaptive Web-based Systems (AH 2003), 20-24 May, Budapest, Hungary.

Dolog, Peter and Nejdl, W. (2003), “Personalisation in Elena: How to cope with personalisation in distributed eLearning Networks”, in Proceedings of International Conference on Worldwide Coherent Workforce, Satisfied Users - New Services For Scientific Information, Oldenburg, Germany, September 2003.

“Durant M. v Financial Services Authority Case” (2003), EWCA, Civ 1746, Court of Appeal (Civil Division), 8th December 2003. <> and <>

Enos L. (2001), “Deal Afoot to Destroy Toysmart Database”, in E-Commerce Times, January 10, 2001.

Erickson, T., Halverson, C., Kellogg, W. A., Laff, M. and Wolf, T. (2002), “Social Translucence: Designing Social Infrastructures that Make Collective Activity Visible.”, Communications of the ACM (Special issue on Community, ed. J. Preece), Vol. 45, No. 4, p. 40-44.

European Parliament and of the Council, (1995), “Directive 95/46 of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of individuals with regard to the processing of personal data and on the free movement of such data”, in Official Journal L281/31, 1995.

Fabris, P. (1998), “Advanced navigation”, in CIO Magazine, 50-55.

Fayyad U. et al.(1996), Advances in knowledge discovery and data mining.

Fayyad, U., Djorgovski, S. G. et al. (1996), “From digitized images to on-line catalogs: data mining a sky survey.”, in AI magazine 17(2), 51-66.

Fayyad, U., Piatetsky-Shapiro G., et al. (1996), “From data mining to knowledge discovery in databases.”, in AI magazine 17(3), 37-54.

Fayyad, U., Piatetsky-Shapiro G., et al. (1996), “The KDD process for extracting useful knowledge from volumes of data.”, in Communications of the ACM (11): 27-34.

Fink, J., Kobsa, A. (2000), “A Review and Analysis of Commercial User Modeling Servers for Personalization on the World Wide Web”, in User Modeling and User Adapted Interaction, Special Issue on Deployed User Modeling, 10, p.204-209.

Fischer G. (2001), “User Modeling in Human-Computer Interaction”, in User Modeling and User Adaptive Interaction, Kluwer Academic Publishers, vol. 11, 1-2, 65-86.

FIDIS (2005), Del 2.2 Cases, stories and Scenarios WP 2, FIDIS Project.

FIDIS (2005), Del 2.3 Models of identity WP2, FIDIS Project.

Funsten, D. M. (1998), “Helping your customers behave themselves.”, in Bank Marketing 30(10): 22-27.

Hall, Hazel (2001); “Social exchange for knowledge exchange”. Managing knowledge: conversations and critiques, University of Leicester Management Centre, 10-11 April 2001.

Hand, D. J. (1998), “Data mining: statistics and more?” in The American Statistician 52(2), 112-118.

Hand, D. J., H. Manila, et al. (2001), Principles of data mining. Cambridge, MA, MIT Press.

Hoare C.A.R.(1969), Communications of the ACM, 12, nr. 10,

Hardy Q. (2004), “Data of reckoning”, in Forbes, 173, 151-153.

Heckmann, D., Schwartz, T., Brandherm, B., Schmitz, M. and Von Wilamowitz-Moellendorff, M. (2005), “GUMO - The General User Model Ontology”, to appear in Proceedings of UM 2005: International Conference on User Modeling, July 24 -30, 2005, Edinburgh, UK.

Hildebrandt, M. (2005), “Privacy and Identity: a reply to Archard’s The value of Privacy”, in Privacy and the criminal law, Antwerp Oxford: Intersentia 2005 (to be published).

Hildebrandt, M. (2005), “Are profiles justiciable?”. Paper presented at the Conference Is Knowledge justiciable? Essen, Germany 21-23 March 2005.

Hudson, B. (2005), “Secrets of the Self”, in Privacy and the criminal law. Antwerp Oxford: Intersentia (to be published).

Humby, C., T. Hunt, et al. (2003), Scoring points: how Tesco is winning customer loyalty. London, Kogan Page.

Ihde, Don (1993), Philosophy of Technology: an Introduction. New York: Paragon House.

IMS (2001), “IMS Learner Information Packaging Information Model Specification; Final Specification,Version 1.0”, in IMS Global Learning Consortium, March 2001. To be downloaded at:

Jackson, J. (2002), “Data mining: a conceptual overview.”, in Communications of the Association for Information Systems 8: 267-296.

Jøsang A., Patton M.,(2003), “User Interface Requirements for Authentication of Communication”, in ACM International Conference Proceeding Series, Proceedings of the Fourth Australian user interface conference on User interfaces 2003 - Volume 18, Adelaide Australia,

Karampiperis P., D. Sampson (2004), “Adaptive Learning Object Selection in Intelligent Learning Systems”, in Journal of Interactive Learning Research, Special Issue on Computational Intelligence in Web-Based Education, vol. 15(4),

Kay, J, (2000), “User modeling for adaptation, in User Interfaces for All”, in Stephanidis (ed), C, Salvendy, G, (General Editor), Human Factors Series. Lawrence Erlbaum Associates, 271—294.

Kinshuk, Taiyu Lin (2004), “Cognitive profiling towards formal adaptive technologies in web-based learning communities”, in International Journal of Web Based Communities, Vol. 1, No. 1, 2004 103.

Kobsa, A., Koenemann, J., and Pohl, W., (2000), Personalized hypermedia presentation techniques for improving online customer relationships”, in The Knowledge Engineering Review, 16, 111-155.

Koh Joon and Young-Gul Kim (2003), “Sense of Virtual Community: A Conceptual Framework and Empirical Validation”, in International Journal of Electronic Commerce, Volume 8, Number 2, Winter 2003-4, 75. To be downloaded at:

Kuner C., Barcelo R., Baker S., Greenwald E.(2000), An Analysis of International Electronic and Digital Signature Implementation Initiatives, A Study Prepared for the Internet Law & Policy Forum (ILPF), September. To be downloaded at: <>

Lenzen, R. (2004), “Customer Analytics: It’s all about behavior”, In DM Review.

Lessig L. (1999), Code and other laws of cyberspace. New York: Basic Books.

Levi, M. and Wall, David S. (2004), “Technologies, Security, and Privacy in the Post-9/11 European Information Society”, in Journal of Law and Society 31 (2), 194-220.

Manago, M. and M. Auriol (1996). "Mining for OR.", ORMS Today Special Issue: 28-32.

Nabeth, T., Angehrn, A.A. and R. Balakrishnan (2004), “Integrating ‘Context’ in e-Learning Systems Design”, in IEEE International Conference on Advanced Learning Technologies (ICALT 2004), Joensuu, Finland.

Nash, K. (2001), “Casinos hit jackpot with customer data”, in

Mably, K. (2000), Privacy vs. Personalization. Cyber Dialogue Inc. To be downloaded at: <>

Mackenzie Mechanizing Proof. Computing, Risk, and Trust. Cambridge, Mass.: MIT, 2001.

Majchrzak, Ann, Ronald, E. Rice, Nelson, King, Arvind Malhotra; Sulin Ba (2003), “Computer-Mediated Inter-Organizational Knowledge-Sharing: Insights from a Virtual Team Innovating Using a Collaborative Tool”, in Information Resources Management Journal, Vol. 13, No. 1.

Mobasher, B., Cooley, R., Srivastava, J. (2000), “Automatic Personalization Based on Web Usage Mining. Web Usage mining can help improve the scalability, accuracy, and flexibility of recommender systems”, in Communications of the ACM, Association for Computing Machinery, August 2000, 142 – 151.

Möller, J. and Florax, B.J. (2002), “Kreditwirtschaftliche Scoringverfahren”, in Multimedia und Recht (12), 806-811, München.

O’Looney, J. (2002), “Personalization of Government Internet Services”.  To be downloaded at:

Paternoster, C. & Searby, S. (2002), “Personalise or Perish?”, White Paper in BT Exact Technologies.

Peacock, P. R. (1998), “Data mining in marketing: part 1.”, in Marketing Management 6(4), 8-18.

Peppers, D. and M. Rogers (1999). Enterprise one to one: tools for competing in the interactive age. New York, Currency Publishing Company.

Petri, Dr. T. B., (2003), “Sind Scoringwerte rechtswidrig?”, Datenschutz und Datensicherheit (27), p. 631-636, Wiesbaden.

Penrose, R.(1989), The Emperor’s New Mind.

Penrose, R.(1994), Shadows of the Mind.

Piatetsky-Shapiro, G. (2000), “Knowledge discovery in databases: 10 years after.”, in SIGKDD Explorations 1(2): 59-61.

Prins, J.E.J. (2004), “The Propertization of Personal Data and Identities”, Electronic Journal of Comparative Law, 8.3.

Pohl W. (1997). “LaboUr - Machine Learning for User Modeling”. Proc. of the Seventh International Conference on Human-Computer Interaction. Amsterdam: Elsevier.

Razmerita, L. (2004), “User modeling and personalization of the Knowledge Management Systems”, book chapter in Adaptable and Adaptive Hypermedia, edited by Sherry Chen and George Magoulas, published by Idea Group Publishing.

Razmerita, L., Angehrn, A.A. and A. Maedche (2003), “Ontology based user modeling for Knowledge Management Systems”, in Proceedings of the 9th International Conference on User Modeling, Pittsburgh, USA, Springer-Verlag,

Razmerita, L., Angehrn, A.A. and Nabeth, T. (2003), “On the role of user models and user modeling in Knowledge Management Systems”, Proceedings of the 10th International Conference on Human-Computer Interaction, Crete, Greece, Vol. 2, 450-456.

Reed, D., P. (1999), “That Sneaky Exponential: Beyond Metcalfe’s Law to the Power of Community Building”, Context Magazine, spring.

Rheingold, Howard (1993), The virtual community: Homesteading on the electronic frontier.

Ridings, Catherine and David Gefen (2004), “Virtual Community Attraction:Why People Hang Out Online”, Journal of Computer-Mediated Communication 10 (1), Article 4, November. To be downloaded at :

Riedl J. (2004), “Recommender System for Personalization”. Paper presented at the international expert meeting ‘Issues of online personalisation’, 5 March 2004, Oxford Internet Institute.

RetailWeek (2003). “Solutions CRM: Profile shopping”. Retail Week, 22.

Roda, C., Angehrn, A.A., Nabeth, T. and L. Razmerita (2003), “Using Conversational Agents to Support the Adoption of Knowledge Sharing Practices; Interacting with Computers”, Special Issue on Intelligence & Interaction in Community-based Systems; Elsevier, Vol. 15, Issue 1, 57-89, January.

Rogers Everett M. (1995), Diffusion of Innovations (Fourth Edition).

Shahabi C., Chen Y. (2003), Web Information Personalization: Challenges and Approaches 2003.

Sharratt, M; Usoro, A. (2003), “Understanding Knowledge-Sharing in Online Communities of Practice”, Electronic Journal of Knowledge Management, 1(2), December.

Shearin Sybil, Henry Lieberman (2001), “Intelligent Profiling by Example”, ACM Conference on Intelligent User Interfaces, Santa Fe, NM, January 2001.

Smyth B., Cotter P., (2000), “A Personalized television listings service. Association for Computing Machinery. Communications of the ACM, August 2000, vol. 43, 8 107 – 111.

Stephanidis, C. (2001), “Adaptive Techniques for Universal Access”, in User Modeling and User-Adapted Interaction, Kluwer Academic Publishers, vol.11, 159-179.

Priest G., Routley, Norman (eds.) (1989), Paraconsistent Logic. Essays on the Inconsistent. München: Philosophia Verlag.

Thibaut, J. W., & Kelley, H. H. (1959), The social psychology of groups. New York: Wiley.

TILT – Tilburg Institute for Law, Technology, and Society (2004), Research report ‘Issues of Online Personalization in Commercial and Public Service Delivery’. Tilburg University, June 04.

Tung, L., Tan, P., Chia, P, Koh, Y. and Yeo, H. (2001), “An Empirical Investigation of Virtual Communities and Trust”, in Proceedings of the 22nd International Conference on Information Systems, 2001, 307-320.

Turow, J., Feldman, L., and Meltzer, K.. (2005). "Open to Exploitation. American Shoppers Online and Offline." Annenberg Public Policy Center of the University of Pennsylvania. To be downloaded at:

Van Barneveld, J. (2003), User Interfaces for Personalizes Information Systems. State of the Art.

Van Brakel, J. (1999), "Telematic Life Forms.", in Techné: Journal of the Society for Philosophy and Technology 4 (3).

Vedder, Anton (1997), “Privatization, information, technology and privacy: Reconsidering the social responsibilities of private organizations”. Business Ethics: Principles and Practice. Sunderland: Business Education Publishers Ltd, 215-226.

Vedder, Anton (1999), “KDD: The Challenge to individualism”, in Ethics and Information Technology, 1, 4, 275-281.

Vedder, Anton (2001), “KDD, privacy, individuality and fairness”. In: R. Spinello and H. Tavani (eds.) (2001), Readings in Cyberethics.

Vedder, A.H. & Wachbroit, R.S. (2003), “Reliability of information on the Internet: Some distinctions”, in Ethics and Information Technology, 5, 211-215.

Warntjen, M. and Kissler, D.(2002), Forum und Recht (2).

Wasko, M. and Faraj, S. (2000), “It is What One Does’: Why People Participate and Help Others in Electronic Communities of Practice.”, in Journal of Strategic Information Systems, 9, 155-173.



Glossary:  fidis-wp7-del7.2.profiling_practices_03.sxw  
10 / 10