Abstract
The paper focuses on security measures in the context of interactive TV (iTV), leaving out the field of social TV and concentrating on all two-way communication between user/viewer and infrastructure or content providers. It aims at introducing architecture for regulating all kinds of interactions and data streams within an iTV environment, including the different parties and their individual interests. By modeling this kind of organizational infrastructure, the authors follow the intention of finding best compromises between the partly opposing interests. While the user is in need of preserving his privacy, the scenario provider as well as the content provider together with the advertisers is dependent on valuable consumer information about content and general product information. In this respect, the proposed outline of the scenario considers all ways and directions of data flows, ranging from user information in the shape of TV content recommendations or tailored product information according to given consumption preferences up to all aspects of data protection. The latter appears highly important according to the different participants in the scenario, all having their own interests and thus forming heterogeneous relationships between the different single and corporate actors. The article emphasizes an alternate perspective on iTV compared to simple digital TV on the one and internet technology on the other hand. It gives a dense description of privacy concerns, economic interests, organizational necessities and approaches to programming solutions, presenting alongside the latest inventions and standards in terms of data protection features, e.g. operating with anonymized snapshots helping not only to hide the user’s identity but also to create profile clusters. One of the main suggestions outlined here is to strengthen the consumer’s role, thus accepting his dominant position in bringing iTV to success. The conclusion to be proposed lies in two key aspects: it is as well necessary to refer to the organizational structure as a model of interest relations as to combine the structure with innovative data protection mechanisms. Because the whole scenario deeply depends on trust and reputation, it is a need to put the user/viewer into control of the origins of data processing. This can only be achieved by a special kind of smartcard with far reaching impacts linked to the snapshot method. Furthermore, the authors give hints on how to enhance the attractiveness of the back channel in order to stimulate the data flow.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Notes
Special devices allowing interpersonal messages to all viewers of the same program, e.g. to find contact partners.
For further definitions of iTV trying to describe different stages of interactivity, see for instance Hachmeister and Zabel [9, pp. 148–150].
See Hachmeister and Zabel [9, pp. 148–150], differentiating between personally and temporarily offered services.
Information about potential customers, their behavior and preferences has become one of the most important assets within the information society (cf. [13, p. 113]).
The so-called tailored advertisements on the basis of behavioral targeting (BT) still only exist for different sorts of web services like Google or Amazon. They all have in common using ‘deep packet inspection’, i.e. searching for all user generated data by looking at the data stream between service and browser providers. Flash cookies are used to diminish the danger of losing tracking by those users changing their IP adressess frequently. See also as an example the homepages of two big companies providing solutions for personalized advertising: Phorm, see http://www.phorm.com, and AudienceScience, see http://www.audiencescience.com.
It is obvious that they all closely belong to the sphere of marketing, embodying three out of the four decisive categories of modern marketing (also commonly known as the four ‘Ps’, product, prize, place—i.e. distribution—and promotion policy). Recommendation systems serve as a product surplus. In the case of fee reductions, the customer is confronted with a highly distinguished prize policy. And finally all aspects of data protection are closely connected to the sphere of distribution, the way TV programs and other media services are transported and how the whole access process is conducted.
See, e.g., two main internationally operating agencies working on empirical results for sociodemographic tendencies in modern societies: SINUS Sociovision, http://www.sociovision.de and SIGMA, http://www.sigma-online.com.
See more closely, e.g., Moores [23, p. 214] (concerning the relationship between consumer culture and media usage), Charlton [6, p. 91] (leisure and media usage), Stevenson [41] (to convincing parallels between sociodemographic facts and media usage). The sociodemographic parameters serve as a substitute for all the complex influence factors that can neither be fully depicted nor generalized (cf. e.g. [42]).
“Generally, companies have virtually free rein to use data in the US for business purposes without their customers’ knowledge or consent” [43, p. 6].
Soft skills in this sense comprise reputation building. Only in case of being successful in persuasion that any service can guarantee highest standards in privacy protection, like it is mostly the case with online banking, the provider might earn the customer’s trust (cf. [26, p. 25]). An effective step towards trust building is to license the own service or at least certain general methods by independent authorities as supervised and trustworthy (cf. [7, p. 3]). Such certificates, like the ones by the Intelligence and Security Committee (ISC) of the UK, help building up reputation.
References
Abercrombie, N., Longhurst, B.: Audiences: A Sociological Theory of Performance and Imagination. Sage, London (1998)
Ardissono, L., Gena, C., Torasso, P., Bellifemine, F., Difino, A., Negro, B.: User modeling and recommendation techniques for personal electronic program guides. In: Ardissono, L. (ed.) Personalized Digital Television, vol. 6 of Human–Computer Interaction Series, pp. 3–26. Kluwer Academic Publisher, Dordrecht (2004). ISBN 1402021631
Berkovsky, S., Kuflik, T., Ricci, F.: Enhancing privacy while preserving the accuracy of collaborative filtering (2006). http://www.inf.unibz.it/~ricci/papers/ECAI-CF-privacy-v9.pdf. Accessed 05 November 2009
Büschkes, R., Kesdogan, D.: Privacy enhanced intrusion detection. In: Müller, G., Rannenberg, K. (eds.) Multilateral Security in Communications, vol. 3: Information Security, pp. 187–204. Addison-Wesley, München (1999). ISBN 3827313600
Büttner, K.: Content-based versus collaborative filtering (2005). http://www.is-frankfurt.de/uploads/down417.pdf. Accessed 06 October 2009
Charlton, M.: Massenkommunikation aus der Sicht der Masse: ein handlungstheoretischer Ansatz. In: Hasebrink, U., Krotz, F. (eds.) Die Zuschauer als Fernsehregisseure? Zum Verständnis individueller Nutzungs- und Rezeptionsmuster, 1st edn., pp. 76–93. Nomos, Baden-Baden (1996)
Cissée, R., Albayrak, S.: An agent based approach for privacy preserving recommender systems (2007). http://www.dai-labor.de/fileadmin/files/publications/AAMAS_2007_DRAFT.pdf. Accessed 10 October 2009
Haas, A.: Medienmenüs. Der Zusammenhang zwischen Mediennutzung, SINUS-Milieus und Soziodemographie. Fischer, München (2007)
Hachmeister, L., Zabel, C.: Das interaktive Fernsehen und seine Zuschauer. In: zu Salm, C. (ed.) Zaubermaschine interaktives Fernsehen? pp. 145–169. Gabler, Wiesbaden (2004). ISBN 3409126376
Hagel, J., Singer, M.: Net Value: Der Weg des digitalen Kunden. Gabler, Wiesbaden (2000). ISBN 9783409115391
Hansell, S.: An icon says they’re watching you. New York Times, March 19th (2009)
Hess, J., Becker, T., Hauptmeier, H.: TV 2010—Mission Complete? Buhl Data Service, Neunkirchen (2006)
Karsten, R.: Rechtliche Rahmenbedingungen einer international genutzten Internetpräsenz. GRIN Verlag, München (2003)
Klahold, A.: Empfehlungssysteme: Recommender Systems: Grundlagen, Konzepte und Lösungen. Studium, 1st edn. Vieweg + Teubner, Wiesbaden (2009). ISBN 9783834805683. http://www.gbv.de/dms/weimar/toc/57161891X_toc.pdf
Krason, A., Mayr, M., Schipperges, M.: The modern upper middle classes in Western and Central Eastern Europe: cross-cultural targeting in the case of Bank Austria Creditanstalt. In: ESOMAR (ed.) Proceedings of the 56th ESOMAR Conference ‘Excellence in Consumer Insights’, pp. 13–37. ESOMAR, Madrid (2003)
Kruth, W.: Grundlagen der Informationstechnik: Kompaktwissen für Datenschutz- und Security-Management, 3rd edn. Datakontext, Heidelberg (2009). ISBN 9783895775451. http://www.gbv.de/dms/ilmenau/toc/593493753.PDF
Lassmann, W.: Wirtschaftsinformatik: Nachschlagewerk für Studium und Praxis. Wiesbaden, Gabler (2006). ISBN 9783834991522. http://dx.doi.org/10.1007/978-3-8349-9152-2
Maybury M., Greiff W., Boykin S., Ponte J., McHenry C., Ferro L.: Personalcasting: tailored broadcast news. In: Ardissono, L. (ed.) Personalized Digital Television, vol. 6 of Human–Computer Interaction Series, pp. 177–202. Kluwer Academic Publisher, Dordrecht (2004). ISBN 1402021631
McLeod, J.M., Sotirovic, M., Holbert, R.L.: Values as sociotronic judgements influencing communication patterns. Commun. Res. 25(5), 453–485 (1998)
McQuail, D.: Audience analysis. Sage, London (1997)
Metzger, J.: Erfahrungen mit der MedienNutzerTypologie bei der Programmplanung und -positionierung im Fernsehen. In: Oehmichen, E., Ridder, C.-M. (eds.) Die Medien-Nutzer-Typologie, vol. 17 of Schriftenreihe Media Perspektiven, pp. 299–302. Nomos, Baden-Baden (2003). ISBN 3832900292
Min, W.-H., Cheong, Y.-G.: An interactive-content technique based approach to generating personalized advertisement for privacy protection. In: Smith, M.J., Salvendy, G. (eds.): Human Interface and the Management of Information: Designing Information Environments; Symposium on Human Interface 2009. Part II, pp. 185–191. Springer, Berlin (2009). ISBN 978-3-642-02558-7. doi:10.1007/978-3-642-02559-4_21
Moores, S.: Broadcasting and its audiences. In: Mackay, H. (ed.): Consumption and Everyday Life. Culture, Media and Identities, vol. 5, pp. 213-258. Sage, London (1997)
Morley, D.: Television, Audiences, and Cultural Studies. Sage, London (1992)
Morris, S., Smith-Chaigneau, A.: Interactive TV Standards: (a guide to MHP, OCAP, and JavaTV). Elsevier/Focal Press, Amsterdam (2005). ISBN 0240806662. http://www.loc.gov/catdir/toc/ecip057/2005001355.html, http://www.loc.gov/catdir/enhancements/fy0621/2005001355-d.html
Müller, E.: Datenschutz als Verbraucherschutz. In: Bäumler, H., von Mutius, A. (eds.) Datenschutz als Wettbewerbsvorteil, DuD-Fachbeiträge, pp. 20–26. Vieweg, Braunschweig (2002). ISBN 3528057939
National Advertising Initiative. Opt out of behavioral advertising (2009). http://www.networkadvertising.org
Oehmichen, E.: Medienübergreifende Nutzungsmuster: Struktur- und Funktionsverschiebungen; eine Analyse auf Basis der ARD/ZDF-Onlinestudien 2008 und 2003. Media Perspektiven 8, 394–409 (2008)
Pei, Q., Fan, K., Dai, J., Ma, J.: An intelligent digital content protection framework between home network receiver devices. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) Computational Intelligence and Security, vol. 4456 of Lecture Notes in Computer Science. Lecture Notes in Artificial Intelligence, pp. 750–758. Springer, Berlin (2007). ISBN 9783540743767
De Pessemier, T., Deryckere, T., Vanhecke, K., Martens, L.: Proposed architecture and algorithm for personalized advertising on IDTV and mobile devices. IEEE Trans. Consum. Electron. 54(2), 709–713 (2008)
Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.33.pdf, April 2010.
Potonniée, O.: A decentralized privacy-enabling TV personalization framework (2004). http://www.csd.abdn.ac.uk/~jmasthof/EuroITV04/P07.pdf. Accessed 01 November 2009
Ramirez, D.: Converged video network security (2005). http://america.liderdigital.com/documentos/Converged_Video_Network_Security_Lucent.pdf. Accessed 29 September 2009
Ramirez, D.: IPTV Security: Protecting High-Value Digital Contents. Wiley, Chichester (2008). ISBN 9780470519240. http://www.gbv.de/dms/ilmenau/toc/545980429.PDF
Schirmer, N.: Qualitative Bewertung von Werbung im Umfeld iTV (interactive Television): Bestandsaufnahme, Analyse und Perspektiven des deutschen Marktes, vol. 3 of BiTS-Forschung. Projektverl. Bochum (2006). ISBN 3897331411
Schmid, N.: iTV-Werbung: Chancen und Herausforderungen. VDM, Saarbrücken (2007). ISBN 9783865507426. http://deposit.d-nb.de/cgi-bin/dokserv?id=2915700&prov=M&dok_var=1&dok_ext=htm
Schwenke, M.C.: Individualisierung und Datenschutz: Rechtskonformer Umgang mit personenbezogenen Daten im Kontext der Individualisierung: Univ., 1st edn. DuD-Fachbeiträge. Deutscher Univ.-Verl., Wiesbaden (2006). ISBN 3835003941
Sencar, H.T., Ramkumar, M., Akansu, A.N.: Data Hiding Fundamentals and Applications: Content Security in Digital Media. Elsevier Academic Press, Amsterdam (2004). ISBN 0120471442. http://www.zentralblatt-math.org/zmath/en/search/?an=1074.68517
Sheth, J.N., Raju, P.S.: Sequential and cyclical nature of information processing models in repetitive choice behavior. Adv. Consum. Res. 1(1), 348–358 (1974). http://www.acrwebsite.org/volumes/display.asp?id=5664. Accessed 01 October 2009
Smyth, B., Cotter, P.: A personalized television listings service. Commun. ACM 43(8):107–111 (2000). ISSN 0001-0782. doi:10.1145/345124.345161
Stevenson, N.: Understanding Media Cultures: Social Theory and Mass Communication. Sage, London (1995)
Stipp, H.: Wird der Computer die traditionellen Medien ersetzen? Media Perspektiven 2, 78–82 (1998)
Turow, J., King, J., Hoofnagle, C.J., Bleakley, A., Hennessy, M.: Americans Reject Tailored Advertising and Three Activities that Enable it. SSRN eLibrary (2009)
van Setten, M., Tokmakoff, A., van Vliet, H.: Designing personalized information systems—a personal media center (2001). http://www.di.unito.it/~liliana/UM01/vanSetten.pdf. Accessed 10 October 2009
Ware, H.S.: Holly Sanders Ware. NEW YORK POST, p. 37, July 10 2009
Witt, B.C.: IT-Sicherheit kompakt und verständlich: eine praxisorientierte Einführung, 1st edn. Vieweg, Wiesbaden (2006). ISBN 9783834801401. http://www.gbv.de/dms/goettingen/505540649.pdf
Wolf, G., Pfitzmann, A.: Empowering users to set their protection goals. In: Müller, G., Rannenberg, K. (eds.) Multilateral Security in Communications, vol. 3: Information Security, pp. 113–135. Addison-Wesley, München (1999). ISBN 3827313600
Zhou, Y., Cheng, H., Jeffrey, X.Y.: Graph clustering based on structural/attribute similarities. PVLDB 2(1), 718–729 (2009)
Zhu, M., Zhang, M., Chen, X., Zhang, D., Huang, Z.: A hierarchial key distribution scheme for conditional access system in DTV broadcasting. In: Wang, Y., Cheung, Y.M., Liu, H. (eds.) Computational Intelligence and Security, vol. 4456 of Lecture Notes in Computer Science. Lecture Notes in Artificial Intelligence, pp. 839–846. Springer, Berlin (2007). ISBN 9783540743767
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Abou-Tair, D.I., Köster, I. & Höfke, K. Security and privacy requirements in interactive TV. Multimedia Systems 17, 393–408 (2011). https://doi.org/10.1007/s00530-010-0221-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-010-0221-x