<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A User Experience Model for Privacy and Context Aware Over-the-Top (OT T) TV Recommendations</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Allan Hammershøj Mediathand Copenhagen</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Denmark allan@mediathand.com</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Henning Olesen Aalborg University Copenhagen Copenhagen</institution>
          ,
          <country country="DK">Denmark</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Sokol Kosta Aalborg University Copenhagen Copenhagen</institution>
          ,
          <country country="DK">Denmark</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Valentino Servizi Technical University of Denmark Kgs. Lyngby</institution>
          ,
          <country country="DK">Denmark</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Conventional recommender systems provide personalized recommendations by collecting and retaining user data, relying on a centralized architecture. Hence, user privacy is undermined by the volume of information required to support the personalized experience. In this work, we propose a User Experience model which allows the privacy of a user to be preserved by means of a decentralized architecture, enabling the Service Provider to ofer recommendations without the need of storing individual user data. We advance the current state of the art by: i) Proposing a model of User Experience (UEx) suitable for Persona-based recommendations; ii) Presenting a UEx collection model which enhances the user privacy towards the service provider while keeping the quality of her preferences predictions; and iii) Assessing the existence of the Persona profiles, which are needed for generating and addressing the recommendations. We perform several experiments using a real-world complete dataset from a medium-sized service provider, composed of more than 14,000 unique users and 33,000 content titles collected over a period of two years. We show that our architecture, in combination with our UEx model, achieves the same or better results, compared to state-of-the-art systems, in terms of rating prediction accuracy, without sacrificing user's privacy.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>INTRODUCTION</title>
      <p>In the early days, broadcast television was a one-to-many
relationship. The signal traveled one-way from the content provider
towards the consumer, and so did the contents. User privacy was
Copyright © CIKM 2018 for the individual papers by the papers'
authors. Copyright © CIKM 2018 for the volume as a collection
by its editors. This volume and its papers are published under
at the highest possible level, since the user was anonymously and
passively connected to the network.</p>
      <p>
        With the introduction of an Internet-based "return path" for
voting or rating of programs, initially in Digital Video Broadcast
set-top-boxes, and later with Over-the-Top (OTT) TV [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], a
completely diferent scenario has been set in terms of personalization
and privacy. As IP-based services are taking over, almost any
network today assigns an IP address to each node [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], and once the
connection is established, the network allows bidirectional
communication between each and every pair of nodes (e.g. between user
and service provider).
      </p>
      <p>
        By removing the constraint of one-way communication and
assigning a unique address to each node of the network, service
providers can easily collect detailed information from each node to
build user profiles, and the level of personalization of the service
theoretically has no limit [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]. In the best case scenario, users are
only in control of the data collected actively, while information
collected passively, such as user preferences and consumption
patterns for example, seem to be out of their control. OTT TV services
are defined as providers of the content that is usually associated
with traditional broadcast television, but over the Internet. While
this may sound suspiciously like IPTV (and they do share similar
underlying technologies), it is in fact not the same thing: with IPTV
customers pay the Internet Service Providers (ISPs) for the service,
but with OTT TV the ISPs simply provide access to the Internet
and, thereby, to the desired OTT TV service (which represents a
diferent entity). Compared to broadcast TV, the common practice
of OTT providers of gathering information about the content users
consume raises the issue that personalization comes at the cost of
privacy, causing concerns for the users, which are being exposed
to over-disclosure of their personal data and viewing habits [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ].
      </p>
      <p>
        Many countries are pushing towards the concepts of privacy by
design and privacy by default, in particular in the European Union
(EU), driven by the General Data Protection Regulation (GDPR) law,
which strongly highlights the concepts of linkability and personal
data [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        Inspired by these GDPR principles, and focusing on a solution
that could ethically improve the “status quo”, we here present the
following contributions:
(1) We design a mathematical User Experience Model that allows a
Service Provider to collect User Experience in a privacy-aware
system that keeps personal information under the user’s control within
her domain and a sanitized database within the Service Provider’s
domain.
(2) We validate the User Experience Model, which is used for user
classification, by computing a type of rating based on weighted
predictions with a many-fold comparative experiment, testing various
similarity metrics and prediction algorithms.
(3) We perform extensive experiments using a real-world full
dataset from a medium-sized service provider, composed of more
than 14,000 unique users and 33,000 content titles collected over a
period of two years. We use the Root Mean Squared Error (RMSE)
to compare the performance of our solution with state of the art
algorithms such as the FunkSVD, which is the winner of the popular
Netflix competition, ItemItem and PearsMean [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]; We further apply
the Lenskit tool [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], which includes the three algorithms, to our
dataset as a benchmark for the algorithm we propose. Not only the
Service Providers, but in particular the Content Providers (CP) have
access to sensitive user data. The (CP) has access to the personal
information of its paying customers; therefore, she can also link
them to any k-anonymous data set maintained by the partnering
Service Provider (SP), which the CP could access, probably by
contract. In order to avoid this linkability hazard, we will prove that
our solution raises the anonymity shield on the user consumption
at the SP level and hence also at the CP level.
      </p>
      <p>
        The results show that our User Experience Model achieves the
same or better results, compared to state-of-the-art systems, while
ofering the potential for drastically increasing the user privacy.
It enables Service Providers to accurately classify users’ tastes by
storing only a fraction of the users consumption data and thereby
reducing drastically the linkability hazard. Moreover, we show how
clustering techniques applied to the User Experience Model of
an OTT TV user base leads to the description of distinct Persona
profiles, defined as homogeneous groups of individuals whose
consumption patterns and motivation can be represented as a set of
statements derived from quantitative measures [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>The concept of Persona is necessary for the anonymous user
classification according to Persona profiles. Service personalization
can then be made using the Persona profile to which a user belongs
when accessing the service.</p>
      <p>Our solution aims at assisting providers in fulfilling the
obligations enforced by law. A privacy-enhanced design of the
recommender system can provide a competitive advantage in at least two
aspects for providers: i) Lower expected costs for implementing
future system updates in order to comply with new regulatory
restrictions; and ii) Lower risks for privacy litigations, such as the
case settled by Netflix for $9 million in favor of its customers 1.
2</p>
    </sec>
    <sec id="sec-2">
      <title>RELATED WORK</title>
      <p>In this section, we present the related work of the privacy and
context-aware Recommender Systems, providing also the
technological and regulatory background of the privacy problem which
we define as follows:</p>
      <p>How can we enable OTT TV providers to drastically
enhance their users privacy by augmenting existing
technologies, protocols as well as recommender systems?
1Case No. 11-cv-00379 (U.S. District Court for the Northern District of California)
The intuition behind our solution is that a provider can satisfy
the privacy of individual users by providing recommendations to
groups of users with similar characteristics. The solution is based
on the concept of Persona and Locked Persona Profiles . Succeeding
in solving this challenge is not only beneficial for the users, but
also convenient for the service providers. We provide a solution by
breaking such a problem into the following research questions:
• How to turn the passive collection of consumption data
identified by the ontology User &lt;-&gt; consumes &lt;-&gt; content,
into a model of User Experience (UEx)?
• How to collect consumption patterns while avoiding the
linkability to the related personal records?
• How to provide Persona profiles from such a model of User</p>
      <p>Experience?
• Do Persona profiles exist in the OTT TV context?
2.1</p>
    </sec>
    <sec id="sec-3">
      <title>Background</title>
      <p>
        Digital Rights Management (DRM) technology has been specified,
designed, and implemented in order to fight piracy. As such,
satisfying DRM sets a minimum level of possible privacy for the user.
Yang et al. [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ] describe an approach resting on the allocation of
an anonymity UserID for authentication, which allows anonymous
access to DRM protected contents. In [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], Intertrust supplies OTT
TV Service Providers with a DRM Service named Express Play (EP),
which relies on an architecture that allows anonymous access to the
licenses necessary to decrypt the contents delivered via a Content
Delivery Network (CDN), by use of bearer token technology. This
demonstrates that it is possible for a user to access DRM-protected
content while keeping her anonymity.
      </p>
      <p>
        In order to provide a personalized recommendation to any
anonymous user accessing DRM protected contents, the design approach
theorized by Cooper et al. [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] seems extremely relevant. According
to [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], there are three questions that the Persona approach attempts
to address. With a slight adaptation to the goal of this project these
can be stated as follows: i) What diferent sorts of people are
using OTT TV services? ii) How do their needs and behaviors vary?
iii) What ranges of behavior and contexts need to be explored?
Adapting their example to the OTT TV service, we might identify:
i) Frequency of access to the service; ii) Whether the user likes or
dislikes the consumed contents; iii) The motivation for accessing
the service, e.g. information, education, or entertainment.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], Hussain et al. introduce the concept of Locked Persona
Profiles (LPP) , which can be “used to generate a set of unlinkable
proofs of ownership” while accessing a service. Locked Persona
Profiles are perfectly compatible with both the need of protecting
users’ privacy and the need to protect operators from misuse threats
such as piracy. Furthermore, Locked Persona Profiles would allow
the user to access the service without being linked, thus giving the
individual control over her personal information with no chance
for the Service Provider (SP) to access this information without the
user’s knowledge or consent [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>
        A Recommender System usually needs to collect some amount
of personal information about the user in order to provide the
recommendation. This includes attributes, preferences, contact lists,
among others [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. Context information is not a part of the user
profile, but may also need to be protected, e.g. the user’s current
location. Kim Cameron’s first and second law of identity [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]
emphasizes user control and minimal disclosure, and the OAuth 2.0
framework [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] can help to put the user in control. OAuth 2.0
allows the user to grant restricted access to her personal information
towards a Service Provider and defines a protocol for securing
application access to her protected resources, such as identity attributes,
through Application Programming Interfaces (APIs) [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
      <p>
        Several methods have been proposed in the past for reducing
linkability – here defined as the possibility of discovering a
relationship between a user’s consumption records or between a user’s
consumption and her identity [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. k-anonymity occurs when
“every tuple in the microdata table released is indistinguishably related to
no fewer than k respondents” [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. This can be achieved by removing
identifiable information from the dataset. Crowd Blending relies on
storing records about a group of similar users as a unique entity [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
Diferential Privacy relies on storing similar consumptions of
diferent users by the same perturbed record [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Zero-Knowledge relies
on representing the consumption of the whole user population by
storing only a sample [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. This approach is particularly
interesting for two reasons: It seems to be more efective than the other
techniques mentioned, and the cluster analysis necessary to
exploit possible Persona profiles on a Zero-Knowledge dataset could
be carried out directly, because the sampling happens beforehand.
Therefore, the stored data do not need further sampling.
2.2
      </p>
    </sec>
    <sec id="sec-4">
      <title>User Experience</title>
      <p>User Experience (UEx) is very important for the service providers.
Considering the specificity of the OTT TV application field, the
User Experience should be exploited to provide users with good
recommendations about linear or Video on Demand (VoD) media
contents. Therefore, the interest is not the User Experience for OTT
TV service itself, but rather the User Experience about the content
available in the Electronic Program Guide (EPG).</p>
      <p>
        As such, service providers define several metrics related to User
Experience:
Service Consumption. In order to have any experience with the
media content, users need to consume the content [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
Context of consumption. The context in which the interaction
with the service happens contributes to the experience about the
content consumed in such a context [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
      </p>
      <p>
        Subjective Perceived Value. A positive or negative experience
results from the contribution of multiple drivers [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
Usage Cycles. The experience might be determined by cycles of
interactions [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ], and the next cycle might be influenced by the
quality of the content itself, based for example on the personal
experience [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] or on the experience of other individuals [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ].
User Behavior Frequency. In [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], based on a data set provided
by BBC, evidence has been presented about each user repeated
access to a small amount of items compared to the total amount of
available items.
2.3
      </p>
    </sec>
    <sec id="sec-5">
      <title>Privacy enhanced recommender systems</title>
      <p>
        According to the review presented in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], privacy concerns are
mainly related to: (1) an attacker which correlates obfuscated data
about user with data from other publicly-accessible databases in
order to link users with the sensitive information, or (2) an attacker
using partial information obtained e.g. by colluding with some users
in the network, to attempt reverse engineering the entire dataset.
      </p>
      <p>
        The main solutions described in the literature to preserve
privacy are the following. (1) “Privacy preserving approach based on
peer to peer techniques using users’ communities” with
recommendations generated on the client side without involving the server [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
(2) “Centralized recommender systems by adding uncertainty to the
data by using a randomized perturbation” [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], where such a
perturbation could be achieved using e.g. diferential privacy [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. (3)
“Storing user’s profiles on their own side and running the recommender
system in distributed manner without relying on any server” [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
(4) Hybrid recommender system that uses secure two-party
protocols and public key infrastructure. (5) “Agent based middleware for
private recommendations service” [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] presenting good performance
in terms of Mean Average Error but also tuning issues in order to
get a good coverage on the largest part of the user’s population.
However, most of the solutions focused on protecting users from
external security attacks rather than reducing their exposure towards
the service provider.
3
      </p>
    </sec>
    <sec id="sec-6">
      <title>OUR USER EXPERIENCE MODEL</title>
      <p>The first step towards achieving the architecture described in the
previous section is to understand who is consuming what, when,
where, and whether she liked what has been consumed (or not). Our
dataset consists of more than 700,000 ZAP events, representing the
fact that a user taps on a content, 14,000 unique users, and 33,000
content titles collected over a period of two years by a medium-size
OTT TV provider.</p>
      <p>We define the User Experience Model (UEx) as a tensor:
U Ex : C1m1 ⊗ C2m2 ⊗ · · · ⊗ Ckmk ⊗ Pmp 7→ IRm1+m2+···+mk +mp (1)
where each of the Cxmy represents a vectorial space of the xth
context in which the user zaps into media contents, and Pmp
represents the vectorial space of the media contents that she zaps;
m1, m2, · · · , mk , mp are the dimensions of each vectorial space.</p>
      <p>
        In a traditional recommender system users may provide ratings,
and Latent Semantic Analysis (LSA) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] using the Term Frequency
Inverse Document Frequency (TFIDF) matrix can be applied to
the contents’ descriptions. Instead of ratings, we propose to use
a similar approach for the TV broadcasting scenario, where the
representation of contexts and TV program weights for each user
act as "ratings" in the User Experience model, and we introduce the
concepts of Zap Frequency Inverse Context Frequency (ZFICF) and
Zap Frequency Inverse Program Frequency (ZFIPF). The diference
is that while ratings are collected actively, our User Experience
is computed from the passive collection of the zaps into contents,
which define the components of the User Experience. Further details
are given in the following.
3.1
      </p>
    </sec>
    <sec id="sec-7">
      <title>The User Experience as a vector</title>
      <p>Linearizing the tensor defined in Eq. (1), we obtain the User
Experience matrix presented in Eq. (2). The matrix consists of the Zap
Frequency Inverse Context Frequency, one slice for each context,
and the Zap Frequency Inverse Program Frequency (last slice). Each
slice, except the last one, represents one of the k possible contexts
of consumption, while the last slice represents the TV programs</p>
      <p>U Ex(1) Z F ICF1,1,1 · · · Z F ICF1,1,m1 · · ·
©­ U Ex(2) ®ª® = ­­© Z F ICF2,1,1 · · · Z F ICF2,1,m1 · · ·
­­­ ... ®® ­­ ... . . . ... ...
« U Ex(n) ¬ « Z F ICFn,1,1 · · · Z F ICFn,1,m1 · · ·</p>
      <p>· · ·
· · ·
. . .</p>
      <p>Z F ICFn,k,1 · · · Z F ICFn,k,mk</p>
      <p>Equation 2: Linearized representation of the tensor described in Eq. (1). It is composed of slices corresponding to each of the
ifve features, i.e. the four contexts (i) Time of Day, (ii) Time of Week, (iii) Time of Month, and (iv) Time of Year, see Eq. (3),
plus one (v) concerning the TV-Programs consumed by the user, see Eq. (4). Each row maps the ith user experience UEx(i).
Therefore, just by looking at the distances between the users represented, this model allows measuring the similarity between
their experiences against the TV-Program consumed within the contexts.
consumed. Within each slice, except the last one, each column
represents the mth split of the kth context, while each column of the</p>
      <p>k
last slice represents one of the TV titles (or programs).</p>
      <p>Each row represents the experience of the ith user in the time
span of her interest. However, it could also represent the experience
of the ith component of a cluster (Persona) in the time span of
Service Provider interest. Therefore, the experience of each user
can be collected as a vector having the same representation of one
row of the matrix. This vector would be the summary of the User
Experience and could be easily collected by the Service Provider
and be put under the user’s control by using OAuth 2.0 on the
zapsto-contents. Besides, if the users mapped in this way are arranged
in clusters, each cluster would represent homogeneous experiences.</p>
      <p>If such homogeneous groups exist, they allow for user classification
as well as a “set of statements” derived from the measures, fitting to
the definition of a Persona.</p>
    </sec>
    <sec id="sec-8">
      <title>3.2 User Experience Components</title>
      <p>In this subsection we elaborate on the meaning and the nature
of the User Experience components, and discuss the concepts of
Z F ICF and Z F I P F .
3.2.1 Zap Frequency Inverse Context Frequency. The Zap Frequency
Inverse Context Frequency relates to the first m1 + m2 + · · · + mk
components of the User Experience tensor defined in Eq. (1). We
define the Zap Frequency Inverse Context Frequency (ZFICF) for
user i on the context segment j of context k as:</p>
      <p>Z F ICFi jk =</p>
      <p>Zi jk
T ot Zik
· log T ot Ck , where:</p>
      <p>ACi jk
(3)
• i indicates the ith user, where i = 1, ..., n;
• the kth context can refer alternatively to Time of Day, Time
of Week, Time of Month, Time of Year, or Device (D), i.e. k
= 1, ..., 5.
• j indicates the jth segment of the kth context, j = 1, ..., mk .</p>
      <p>The kth context is divided into a total number of segments
equal to T ot Ck = mk . For example, Time of Day could be
divided in 24 segments, thus mT imeof Day = 24, one per
hour; but it could also be divided in 2 segments as day and
night, in such case mT imeof Day = 2.</p>
      <p>The first factor of Eq. (3) is the Zap Frequency (ZF) recorded for the
user i in segment j of context, where Zi jk represents the amount
of zaps recorded during the time span of interest, and T ot Zik =
ACik = card j | Zi jk , 0, ∀j ϵ [1, mk ]
Ímj=k1 Zi jk is the total amount of zaps recorded for user i in context
k during the (same) time span.</p>
      <p>The second factor is the Inverse Context Frequency (ICF) recorded
for user i in context k, where T ot Ck = mk , as already mentioned,
is the total number of segments composing the context k; and
indicates the number
of segments within the context k, in which the ith user zapped at
least once.
3.2.2 Zap Frequency Inverse Program Frequency. The Zap Frequency
Inverse Program Frequency (ZFIPF) relates to the last mp
components of the User Experience tensor defined in Eq. 1. It is similarly
defined by the following equation:</p>
      <p>Zi j
Z F I P Fi j = T ot Zi · log APi</p>
      <p>T ot P
, where:
(4)
• i denotes the ith user, where i = 1, ..., n;
• the jth element indicates the jth TV program, where j = 1,
..., mp . The total amount of TV programs available on the
EPG is T ot P = mp .</p>
      <p>The first factor of Eq. (4) is the Zap Frequency (ZF) for the ith
user on the jth program, where Zi j represents the amount of zaps
recorded during the time span of interest for user i on the TV
program j, and T ot Zi = Ímj=p1 Zi j is the total amount of zaps of
user i within the (same) time span.</p>
      <p>The second factor represents the Inverse Program Frequency
(I P Fi ) for user i in the time span of her interest, where T ot P
is the total amount of TV programs available on the EPG, and
APi = card j | Zi j , 0, ∀j ϵ 1, mp indicates the number of
programs for which user i zapped at least once within the (same)
timespan.</p>
      <p>It is important to note that the ZFIPF over a large interval of time
relies on the grouping of the items, especially in environment where,
for example, TV series or news programs might recur continuously.
If the grouping is not done properly, then the measure will be
afected by a large error.</p>
    </sec>
    <sec id="sec-9">
      <title>4 EVALUATION</title>
      <p>
        In this section, we provide several experiments that prove the
existence of Persona profiles based on User Experience. They can be
efectively computed using a Zero-Knowledge Consumption Data
Base (DB), which we define as a collection of data sampled on-line
from the user consumption feedback in such a way that only a
portion having size below 10% of the consumption data is retained
and stored in the DB in order to fulfill the definition provided for
Zero-Knowledge in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>As the results of these experiments, we show and validate that:
i) User Experience is efective for classifying a user according to
such Persona profiles; ii) Zap Frequency Inverse Program Frequency
predictions computed by looking for similar users from a sample of
the dataset are reasonably accurate;. Finally, we provide an example
of Persona profile, obtained by clustering a sample of the dataset,
according to the definition stated in the introduction.</p>
      <p>We use a real-world dataset, provided by a Media Company,
which provides both Video On Demand and Linear TV on behalf of
a Content Provider2. The data can be represented in a minimalistic
and generic way by the following: &lt;contractId, contentId, deviceId,
deviceType, zap_timestamp&gt;, where: contractId is the ID assigned to
the contract by the Content Provider, e.g. at the start of subscription,
in order to authenticate the user, referring to one or possibly more
users active with the same contract; contentId is the ID assigned to
the media content by the Content Provider, e.g. the TV Network;
deviceId is the ID of the user’s device authenticated while accessing
the content, this is also used in combination with the contractId to
identify a single user (userId); deviceType identifies e.g. Mobile, PC
or TV; and zap_timestamp is the timestamp determining when the
user switches the TV channel (it is an attribute of the ontology user
- zaps into - content).</p>
      <p>At this stage, for the purpose of organizing users in homogeneous
groups, it is necessary selecting data about any user consuming
contents alone and filter out data about any user consuming
contents together with other individuals, because while the first group
represents a clean signal we want to analyze, the second is afected
by noise. Therefore, since it seems reasonable to consider mobile
and tablet devices as personal and separate them from PCs and
TVs, which are considered social devices. Distinguishing these
devices based on the screen size3, from the full dataset we restrict
the data only to mobile devices and only keep the following
information: &lt;userId, contentId, contentTitle, zap_timestamp&gt;. The
resulting dataset is composed of 743975 Zaps4, 14518 Users, and
33357 Content titles consumed over 2 years.
4.1</p>
    </sec>
    <sec id="sec-10">
      <title>Persona classification and rating prediction</title>
      <p>
        The purpose of this experiment is to verify the consistency of the
User Experience modeled in Eq. 1 by predicting 90% of the users’
preferences employing only 10% of them for the computation.
Succeeding in such a challenging purpose will demonstrate that Service
Providers could serve recommendations by maintaining only 10%
of the data currently retained about the users consumption. The
experiment consists in two steps: i) Testing the consistency of
our solution by predicting the Zap Frequency Inverse Program
Frequency (ZFIPF) and measuring the RMSE. We use 90% of the dataset
to find target users and 10% for computing the prediction. ii) Testing
the consistency of the User Experience Model by applying three
2Data provided by Mediathand, company based in Denmark, which operates the OTT
TV service on behalf of Glenten.
3We assume that the chance of a user watching some content together with others is
directly proportional to the screen size.
4Event recorded when a user taps into a content.
popular algorithms implemented within the last updated version
of Lenskit [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], to the ZFIPF computed on the whole same dataset.
4.1.1 Nearest Neighbor Mean, User Experience classification after
SVD using Cosine and Chebyshev metrics (setup and execution). In
order to compute the User Experience vector for each user from the
zaps recorded in the dataset, in particular for computing Z F ICFi jk ,
we have set up each context, where: i) Time of Day context is
divided in 4 segments: Morning, Noon, Evening, Night; ii) Time
of Week context is divided in 3 segments: Week Days, Saturday
and Sunday; iii) Time of Month context is divided in 2 segments:
Far From Pay Check and Close To Pay Check (which has been
considered at the end of the month); iv) Time of Year context is
divided in 4 segments: Spring, Summer, Autumn, Winter.
      </p>
      <p>
        Moreover, in order to avoid the Cold Start Problem (CSP) related
to Users [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] while generating User Experience from the dataset, the
Minimum Zap Threshold (MZT) for collecting both the Model User
Sample (MUS) and the Target User Sample (TUS) has been set to 25
zaps after a number of preliminary experiments. As for the Cold
Start Problem related to Contents [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], for collecting the Target
Content Sample (TCS) we set the MZT to 1000 zaps. After applying
Singular Value Decomposition (SVD) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], for User classification we
look for max 4 Nearest Neighbors (KNN) comparing the results
obtained by using Chebyshev and Cosine metrics.
      </p>
      <p>
        The User is represented by her User Experience Vector which is
a row of the matrix in Eq. 2. Thus, we classify each User belonging
to the Target Users Sample represented as in Eq. 2 against each of
the relevant users belonging to Model Users Sample represented as
in Eq. 2. Each random sample counts 10% of the population from
which it has been extracted [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]. To make predictions with target a
relevant amount of users having Z F I P F , 0 at least for one element
of the Target Contents Sample (TCS). Therefore, when collecting
Target Users Sample make sure to avoid any overlapping with
Model Users Sample (MUS) adopted for computing the predictions.
The experiment has been repeated 600 times (600-fold) and each
of the times every sample (TCS, TUS, MUS) has been randomly
collected again from the whole dataset, first splitting the MUS from
the rest of the data.
      </p>
      <p>
        The user classification and the ZFIPF prediction have been
accomplished by the following steps. i) Compute the User
Experience vector for each user of both the Target Users Sample and the
Model User Sample. ii) Store the Zap Frequency Inverse Program
Frequency (ZFIPF) regarding each media content within the TCS
from the User Experience Vector (UEV) of each user belonging
to the Target Users Sample in a new array (NA) and then set to
zero the ZFIPF within the UEV origin. iii) For each user belonging
to Target Users Sample, compute the K-Nearest Neighbor
belonging to Model Users Sample having the relevant Zap Frequency
Inverse Program Frequency not-null, using all the mentioned
metrics. iv) For each metric, compute a Zap Frequency Inverse Program
Frequency as mean of the values available from KNN. v) Compute
the Root Mean Squared Error (RMSE) of each prediction from the
NA. The random prediction has been generated using the range
Z F I P F ∈ [0, max (NA)] instead of Z F I P F ∈ [0, ∞], therefore it is
more accurate.
4.1.2 Lenskit Experiment. Lenskit is a very popular and efective
tool developed by the Grouplens from the Minnesota University [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>PearsMean</p>
      <p>Item</p>
      <p>FunkSVD</p>
      <p>NN-MEAN SVDcos NN-MEAN SVDcheb
RANDOM
It encapsulates several recommender systems algorithms such as
ItemItem, PearsMean and FunkSVD. In particular, these have been
taken into account for this experiment. The experiment was run on
the ZFIPF computed using the whole dataset and provided in the
same format of the Movielens ratings. The setup of the experiment
is pretty straightforward and involves the selection of the ratings
domain, which we set in the range Z F I P F ∈ [0, max (NA)]. The
precision has been set as maximum resulting from ZFIPF. Through
some preliminary experiment we found the parameters ensuring the
lowest RMSE. For example, the amount of features for FunkSVD,
which is set to 40 by default, performs very poorly, while at 10
seems to achieve the best performance. Lenskit completes a 5-fold
validation on the whole dataset. The RMSE results of the experiment
are around 0, 4 and are presented in Figure 1.
4.1.3 Experiment Outcome (Figure 1). We aim at proving the
consistency of the User Experience Model by comparing RMSE resulting
from the experiment run with Lensikit against the results harvested
using our solution. From the cross-validation based on the same
dataset, it is possible to notice as a first result that the model
predictions outperform the random assignment and are aligned to the
state of the art algorithms provided by Lenskit. Moreover, from
these results we can notice that the similarity metrics used for
classification do not influence the RMSE, they all yield closely the same
results. However, we chose Chebyshev, because e.g. compared to
Cosine it could identify clusters where users are closer to a normal
distribution.
4.2</p>
    </sec>
    <sec id="sec-11">
      <title>Persona profiles from Zero-Knowledge DB</title>
      <p>This experiment aims to finding distinct Persona Profiles. Using
mostly the same set up of the previous experiments, therefore, a
sample of users having 10% of the whole population’s size, this
experiment should take into account the following challenges: i) Which
clustering algorithm is the best fit for finding distinct groups of
similar users? ii) How to choose the amount of clusters in order to
avoid over-fitting?</p>
      <p>
        To choose between k-means [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] and hierarchical clustering [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ],
we perform a qualitative analysis of the Model Users Sample plotted
after Singular Value Decomposition, choosing the first and the
third main eigenvectors of the eigenbasis as latent dimensions (see
Figure 2). From these results, we conclude that the second algorithm
seems to be the right choice, since Shape, Density, and Size of
the potential clusters seem irregular [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. About the estimation of
the amount of clusters, in order to avoid over-fitting it is possible
to rely on a selection of algorithms for cross-validation, such as
Calinski-Harabasz (CalHar) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and Davies-Bouldin (DavBou) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
In particular, these two methods have been used to restrict the
interval of probable amount clusters from [
        <xref ref-type="bibr" rid="ref1">1, 60</xref>
        ] to [
        <xref ref-type="bibr" rid="ref2">2, 30</xref>
        ] and the
latter interval has been used for setting up the final experiments
carried out using Davies-Bouldin.
4.2.1 MUS clusters estimation. It is a starting point in the
description of Persona profiles according to the definition provided in the
Sec. 2.1. Moreover, thanks to this experiment, we converge towards
the most probable amount of clusters in order to provide the top list
of contents for each cluster as well as Time of Day, Time of Week,
Time of Month and Time of Year, as features to characterize Persona
profiles from the Model Users Sample which here is representing
the Zero-Knowledge Consumption DB . The results of Algorithm 1
are presented in Table 1.
4.2.2 Experiment Conclusion. As we can notice from Fig 2, some
clusters could be merged or discarded towards the best compromise.
Perhaps a thorough cluster analysis would reduce the amount of
relevant clusters to the minimum algorithmic estimation.
Nevertheless, since the sampling applied to obtain the Model Users Sample is
simulating the Zero-Knowledge Consumption DB, irrelevant
clusters might represent important seeds for new clusters and new
Pesona profiles could grow from there. Therefore, we considered
relevant keeping clusters below 2% of the total population as seeds
for potential new Persona profiles.
5
      </p>
    </sec>
    <sec id="sec-12">
      <title>CONCLUSIONS AND FUTURE DIRECTIONS</title>
      <p>Our analysis and experiments have shed light upon significant
additions to the solution of the problem as formulated and the following
statements are an attempt of summarizing these contributions: (a) It
is possible to provide Persona-based recommendations for OTT TV,
because apparently homogeneous group of users exist. (b) Based
Name Size Persona profile
Clust. 6 59% Addicted to News Content . Mainly active during the EveningToD, Mostly during the week, never SaturdayToW and slightly more during SummerToY .
Clust. 2 17,6% News is first, then fitness Content . Mainly active during Evening (less at Night and Noon)ToD, Mostly during week, never SaturdayToW .
Clust. 9 5,9% sPlaigsshitolynamteoarebofaurt fSrpoomrtPNayewCsh, eTcaklTenotMS,hSouwmamnedrCanards,AIunttuermenstTeodYin Crime, some times cartoons (perhaps for intertaining her children)Content .
Clust. 1 4,5% PMaasisniolynaatcetiavbeoduutrCinygcltihnegEavnednIinntger(nesetveedriant FNoiogthbta)TlloCDonMteonsttl.yMdauirnilnygatchteivweedeukr,insgomMeotrinminesg ianntdhEevweeneinkgen(sdoTmoeWt,i mfaersfraotmNiPgahyt)TCohDec,kFTaro MfroanmdPdauyrcinhgecWkTionMtearTnodYSummerToY .
Clust. 7 4% Passionate about Cooking and Drama, Interested in News and CrimeContent . Mainly active during Morning and Evening (never at Noon)ToD.</p>
      <p>Mostly during the week, never SaturdayToW , Far from Pay CheckToM and AutumnToY
Clust. 8 2,25% Passionate about Fitnes and Interested in Sport News and NewsContent . Mainly active at Noon, never at NightToD. Mostly Active in Winter, Never during Spring.ToY .
Clust. 3, 4, 5, 10, 12, 13 &lt; 1, 8% Seed Clusters
Algorithm 1: It samples from the dataset and it computes the
User Experience matrix (see Eq. 2). Then, after dimensionality
reduction using Singular Value Decomposition, it estimates the
amount of clusters and it detects the clusters using hierarchical
clustering. Finally, for each cluster it returns the measures on
the features necessary for providing the Persona profiles.
1 function DetectPersonaProfiles ;</p>
      <p>Input : Dat aset , M ZT = 25 , S ampl inдCoe f f icient = 0.1 ,</p>
      <p>M eanMin = 0.05 , S t DevMax = 1 ,
Simil ar ityM et r ic = Chebyshev ,
Clust er s Est imat ionM et hod = Dav Bou ,</p>
      <p>Clust er inдT ech = H ier ar chicalClust er inд;
Output : P er sona(Clust er Size , T O PCont ent s List ,
mean(Z F I C FT oD ) , mean(Z F I C FT oW ) ,
mean(Z F I C FT oM ) , mean(Z F I C FT oY ))
2 MUS = Sampling(M ZT , S ampl inдCoe f f icient, Dat aset );
3 Zaps = CollectZaps( Dataset, MUS);
4 Z F I C Fi jk = zficf(Zaps);
5 Z F I P Fip = zfipf(Zaps);
6 User Experience =</p>
      <p>H or izont alConcat enat e (Z F I C Fi jk, Z F I P Fip );
7 [U,V,S] = SingularValueDecomposition(User Experience);
8 ClustersAmount = ClustersEstimationMethod(U, SimilarityMetric);
9 Clusters = ClusteringTech(U, ClustersAmount, SimilarityMetric);
10 for Cluster ∈ Clusters do
11 return Clust er Size = 100∗ccoouunnttEElleemmeenntt((MClUuSst) er ) ,</p>
      <p>T opCont ent s List =
{Cont ent s | mean(Z F I P FCont ent ) &gt; M eanMin &amp;
S t Dev (Z F I P FCont ent ) &lt; S t DevMax },
mean(Z F I C FT oD ), mean(Z F I C FT oW ),
mean(Z F I C FT oM ), mean(Z F I C FT oY );
12 end
on the ontology represented by the dataset, it is possible to define a
model of User Experience that can be collected and updated by the
Service Provider in samples (as e.g. the Model Users Sample) which
no longer would be linkable to users. Therefore, it would be possible
for the Service Provider to collect a privacy-aware Zero-Knowledge
Consumption DB. In particular: i) We defined a mathematical
representation of User Experience suitable for the specific application
ifeld, which has been implemented and tested thoroughly with
dimensionality reduction and hierarchical clustering.
ii) We showed that, in this application field, Personalization-based
on Persona-profiles is possible, homogeneous groups of users exist,
and familiar clustering techniques can distinguish between users
with diferent interests even when close to each other, such as those
preferring sports Vs. fitness.
iii) We demonstrate that the quality of prediction of a popular
Recommender Systems such as FunkSVD, where the user privacy
represents a huge issue, is comparable with our predictions, where
we potentially can keep the privacy at ZK-level since we need only
10% of the user data constantly stored on the service provider side
and this would make extremely dificult linking any user to such
data set.</p>
    </sec>
    <sec id="sec-13">
      <title>5.1 Future Work</title>
      <p>
        Further work should also be prioritized towards the following focus
areas. i) Data sampling. It is a very critical component of both
Recommender System and Privacy enhanced architecture. More
sophisticated and efective options, such as the smart sampling
presented by Google [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ], could be investigated. ii) Recommender
System. We will extend the current work by designing and
implementing an efective Persona based Recommender System
architecture. Indeed, the recommender system evaluation through the
computation of “precision” and “recall”, starting from the results
presented in this project is quite a straightforward application from
the list of top programs of each user on a Target Users Sample and
the lists of top programs derived from each Persona profile detected
within a MUS. However, the filtering criteria, necessary to improve
the recommendation, represents a critical work, the progress of
which should be measured looking e.g. at diversity and/or
serendipity. iii) Persona Management. Persona life-cycle [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] in the User
Domain difers from the Service Provider domain. For example,
from the SP’s perspective, Persona may exist and cease to exist at
any time. Nonetheless, when they cease to exist they could also
resurrect to serve another user. Persona may appear as seeds within
the working User Experience sample and grow, then mature and
become dominant in some context and it could become strategic
as solution of cold start problems concerning new users. From the
user’s perspective, alternative Persona could be used to access the
same service in diferent contexts and always get the best
recommendation "Privacy and Ethically Enhanced".
      </p>
    </sec>
    <sec id="sec-14">
      <title>ACKNOWLEDGMENTS</title>
      <p>The authors would like to acknowledge the help provided by
Hossain Ahmad and Naoufal Medouri.
0.15 -0.2</p>
      <p>-0.1
-0.15
-0.05</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>David</given-names>
            <surname>Arthur</surname>
          </string-name>
          and
          <string-name>
            <given-names>Sergei</given-names>
            <surname>Vassilvitskii</surname>
          </string-name>
          .
          <year>2007</year>
          .
          <article-title>K-Means++: the Advantages of Careful Seeding</article-title>
          .
          <source>Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms 8</source>
          (
          <year>2007</year>
          ),
          <fpage>1027</fpage>
          -
          <lpage>1025</lpage>
          . DOI:http://dx.doi.org/10.1145/1283383. 1283494
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>T</given-names>
            <surname>Caliński</surname>
          </string-name>
          and
          <string-name>
            <given-names>J</given-names>
            <surname>Harabasz</surname>
          </string-name>
          .
          <year>1974</year>
          .
          <article-title>A dendrite method for cluster analysis</article-title>
          .
          <source>Communications in Statistics-theory and Methods</source>
          <volume>3</volume>
          ,
          <issue>1</issue>
          (
          <year>1974</year>
          ),
          <fpage>1</fpage>
          -
          <lpage>27</lpage>
          . DOI:http: //dx.doi.org/10.1080/03610917408548446
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Michal</given-names>
            <surname>Campr</surname>
          </string-name>
          and
          <string-name>
            <given-names>Karel</given-names>
            <surname>Ježek</surname>
          </string-name>
          .
          <year>2015</year>
          .
          <article-title>Comparing Semantic Models for Evaluating Automatic Document Summarization</article-title>
          . Springer International Publishing, Cham,
          <fpage>252</fpage>
          -
          <lpage>260</lpage>
          . DOI:http://dx.doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -24033-6_
          <fpage>29</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>V</given-names>
            <surname>Ciriani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S De</given-names>
            <surname>Capitani di Vimercati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S</given-names>
            <surname>Foresti</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P</given-names>
            <surname>Samarati</surname>
          </string-name>
          .
          <year>2007</year>
          . KAnonymity. Springer US.
          <volume>36</volume>
          pages. http://spdp.di.unimi.it/papers/k-Anonymity. pdf
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Alan</given-names>
            <surname>Cooper</surname>
          </string-name>
          .
          <year>2004</year>
          .
          <article-title>The Inmates Are Running the Asylum</article-title>
          .
          <source>Sams Publishing</source>
          .
          <volume>288</volume>
          pages. DOI:http://dx.doi.org/10.1007/978-3-
          <fpage>322</fpage>
          -99786-9{_}
          <fpage>1</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Alan</given-names>
            <surname>Cooper</surname>
          </string-name>
          , Robert Reimann, and
          <string-name>
            <given-names>David</given-names>
            <surname>Cronin</surname>
          </string-name>
          .
          <year>2007</year>
          .
          <article-title>About Face 3: The essentials of interaction design</article-title>
          .
          <source>Vol</source>
          .
          <volume>3</volume>
          . Wiley Publishing.
          <volume>610</volume>
          pages. DOI: http://dx.doi.org/10.1057/palgrave.ivs.9500066
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>D L</given-names>
            <surname>Davies</surname>
          </string-name>
          and
          <string-name>
            <given-names>D W</given-names>
            <surname>Bouldin</surname>
          </string-name>
          .
          <year>1979</year>
          .
          <article-title>A cluster separation measure</article-title>
          .
          <source>IEEE transactions on pattern analysis and machine intelligence 1</source>
          ,
          <issue>2</issue>
          (
          <year>1979</year>
          ),
          <fpage>224</fpage>
          -
          <lpage>227</lpage>
          . DOI: http://dx.doi.org/10.1109/TPAMI.
          <year>1979</year>
          .4766909
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Michael</surname>
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Ekstrand</surname>
          </string-name>
          , Michael Ludwig, Joseph A.
          <string-name>
            <surname>Konstan</surname>
          </string-name>
          , and John T. Riedl.
          <year>2011</year>
          .
          <article-title>Rethinking the recommender research ecosystem</article-title>
          .
          <source>Proceedings of the iffth ACM conference on Recommender systems - RecSys '11</source>
          (
          <year>2011</year>
          ),
          <fpage>133</fpage>
          . DOI: http://dx.doi.org/10.1145/2043932.2043958
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Ahmed</surname>
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Elmisery</surname>
            and
            <given-names>Dmitri</given-names>
          </string-name>
          <string-name>
            <surname>Botvich</surname>
          </string-name>
          .
          <year>2011</year>
          .
          <article-title>An agent based middleware for privacy aware recommender systems in IPTV networks</article-title>
          .
          <source>Smart Innovation, Systems and Technologies 10 SIST</source>
          (
          <year>2011</year>
          ),
          <fpage>821</fpage>
          -
          <lpage>832</lpage>
          . DOI:http://dx.doi.org/10.1007/ 978-3-
          <fpage>642</fpage>
          -22194-1_
          <fpage>81</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>European</given-names>
            <surname>Union</surname>
          </string-name>
          .
          <year>2016</year>
          .
          <article-title>Regulation 2016/679 of the European Parliament and the Council of the European Union</article-title>
          .
          <source>Oficial Journal of the European Union</source>
          (
          <year>2016</year>
          ).
          <source>Retrieved</source>
          <year>2016</year>
          -
          <volume>12</volume>
          -17 from http://eur-lex.europa.eu/legal-content/en/TXT/?uri= CELEX%
          <fpage>3A32016R0679</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>ExpressPlay. 2017. Key</given-names>
            <surname>Storage - ExpressPlay.</surname>
          </string-name>
          (
          <year>2017</year>
          ).
          <source>Retrieved</source>
          <year>2017</year>
          -
          <volume>04</volume>
          -26 from https://www.expressplay.com/developer/key-storage/
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Arik</surname>
            <given-names>Friedman</given-names>
          </string-name>
          , Shlomo Berkovsky, and Mohamed Ali Kaafar.
          <year>2016</year>
          .
          <article-title>A diferential privacy framework for matrix factorization recommender systems</article-title>
          .
          <source>User Modeling and User-Adapted Interaction 26</source>
          ,
          <issue>5</issue>
          (
          <issue>12</issue>
          <year>2016</year>
          ),
          <fpage>425</fpage>
          -
          <lpage>458</lpage>
          . DOI:http://dx.doi.org/10. 1007/s11257-016-9177-7
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Johannes</surname>
            <given-names>Gehrke</given-names>
          </string-name>
          , Michael Hay, Edward Lui, and
          <string-name>
            <given-names>Rafael</given-names>
            <surname>Pass</surname>
          </string-name>
          .
          <year>2012</year>
          . CrowdBlending Privacy. (
          <year>2012</year>
          ),
          <fpage>479</fpage>
          -
          <lpage>496</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Johannes</surname>
            <given-names>Gehrke</given-names>
          </string-name>
          , Edward Lui, and
          <string-name>
            <given-names>Rafael</given-names>
            <surname>Pass</surname>
          </string-name>
          .
          <year>2011</year>
          .
          <article-title>Towards privacy for social networks: A zero-knowledge based definition of privacy</article-title>
          .
          <source>Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 6597 LNCS</source>
          (
          <year>2011</year>
          ),
          <fpage>432</fpage>
          -
          <lpage>449</lpage>
          . DOI:http: //dx.doi.org/10.1007/978-3-
          <fpage>642</fpage>
          -19571-6{_}
          <fpage>26</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Ilsa</surname>
            <given-names>Godlovitch</given-names>
          </string-name>
          , Bas Kotterink,
          <string-name>
            <surname>J. Scott Marcus</surname>
          </string-name>
          , Pieter Nooren, Jop Esmeijer, and
          <string-name>
            <given-names>Arnold</given-names>
            <surname>Roosendaal</surname>
          </string-name>
          .
          <year>2015</year>
          .
          <article-title>Over-The-Top players (OTTs): Market dynamics and policy challenges</article-title>
          .
          <source>European Union</source>
          .
          <volume>137</volume>
          pages. DOI:http://dx.doi.org/10.2861/ 706687
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>M.</given-names>
            <surname>Hussain</surname>
          </string-name>
          and
          <string-name>
            <given-names>D. B.</given-names>
            <surname>Skillicorn</surname>
          </string-name>
          .
          <year>2011</year>
          .
          <article-title>Mitigating the linkability problem in anonymous reputation management</article-title>
          .
          <source>Journal of Internet Services and Applications 2</source>
          ,
          <issue>1</issue>
          (
          <year>2011</year>
          ),
          <fpage>47</fpage>
          -
          <lpage>65</lpage>
          . DOI:http://dx.doi.org/10.1007/s13174-011-0020-4
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>B. Michael</given-names>
            <surname>Jones</surname>
          </string-name>
          and
          <string-name>
            <given-names>Dick</given-names>
            <surname>Hardt</surname>
          </string-name>
          .
          <year>2012</year>
          .
          <article-title>The OAuth 2.0 Authorization Framework</article-title>
          . (
          <year>2012</year>
          ),
          <fpage>1</fpage>
          -
          <lpage>76</lpage>
          . Retrieved 2016-
          <volume>12</volume>
          -17 from https://tools.ietf.org/html/rfc6750
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Dmytro</surname>
            <given-names>Karamshuk</given-names>
          </string-name>
          , Nishanth Sastry, Mustafa Al-Bassam,
          <string-name>
            <given-names>Andrew</given-names>
            <surname>Secker</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Jigna</given-names>
            <surname>Chandaria</surname>
          </string-name>
          .
          <year>2016</year>
          .
          <article-title>Take-away TV: Recharging Work commutes with predictive preloading of catch-Up TV content</article-title>
          .
          <source>IEEE Journal on Selected Areas in Communications 34</source>
          ,
          <issue>8</issue>
          (
          <year>2016</year>
          ),
          <fpage>2091</fpage>
          -
          <lpage>2101</lpage>
          . DOI:http://dx.doi.org/10.1109/JSAC.
          <year>2016</year>
          .2577298
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>Fionn</given-names>
            <surname>Murtagh</surname>
          </string-name>
          and
          <string-name>
            <given-names>Pedro</given-names>
            <surname>Contreras</surname>
          </string-name>
          .
          <year>2012</year>
          .
          <article-title>Algorithms for hierarchical clustering: An overview</article-title>
          .
          <source>Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery</source>
          <volume>2</volume>
          ,
          <issue>1</issue>
          (
          <year>2012</year>
          ),
          <fpage>86</fpage>
          -
          <lpage>97</lpage>
          . DOI:http://dx.doi.org/10.1002/widm.53
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Arun</surname>
            <given-names>Nanda</given-names>
          </string-name>
          , Andre Durand, Bill Barnes, Carl Ellison, Caspar Bowden, Craig Burton, James Governor,
          <string-name>
            <given-names>Jamie</given-names>
            <surname>Lewis</surname>
          </string-name>
          , John Shewchuk, Luke Razzell, Marc Canter, Mark Wahl, Mike Jones, Phil Becker, Radovan Janocek, Ravi Pandya, Robert Scoble, and Scott C Lem.
          <year>2005</year>
          .
          <article-title>The Laws of Identity</article-title>
          . (
          <year>2005</year>
          ),
          <fpage>13</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>Jakob</given-names>
            <surname>Nielsen</surname>
          </string-name>
          and
          <string-name>
            <given-names>Don</given-names>
            <surname>Norman</surname>
          </string-name>
          .
          <year>2015</year>
          .
          <article-title>The Definition of User Experience</article-title>
          .
          <article-title>(</article-title>
          <year>2015</year>
          ).
          <source>Retrieved</source>
          <year>2016</year>
          -
          <volume>12</volume>
          -17 from http://www.nngroup.
          <article-title>com/ about-user-experience-definition</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Henning</surname>
            <given-names>Olesen</given-names>
          </string-name>
          , Josef Noll, and
          <string-name>
            <given-names>Marlo</given-names>
            <surname>Hofman</surname>
          </string-name>
          .
          <year>2009</year>
          .
          <article-title>User profiles, personalization and privacy</article-title>
          .
          <source>Outlook, Wireless World Research Forum</source>
          <volume>3</volume>
          (
          <year>2009</year>
          ),
          <fpage>1</fpage>
          -
          <lpage>38</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Francesco</surname>
            <given-names>Ricci</given-names>
          </string-name>
          , Lior Rokach, and
          <string-name>
            <given-names>Bracha</given-names>
            <surname>Shapira</surname>
          </string-name>
          .
          <year>2015</year>
          .
          <article-title>Recommender systems handbook</article-title>
          . Springer. 1003 pages.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>Alistair</given-names>
            <surname>Sutclife</surname>
          </string-name>
          .
          <year>2009</year>
          .
          <article-title>Designing for User Engagement: Aesthetic and Attractive User Interfaces</article-title>
          . Vol.
          <volume>2</volume>
          . Morgan and Claypool. 1-55 pages. DOI:http://dx.doi.org/ 10.2200/S00210ED1V01Y200910HCI005
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>David</given-names>
            <surname>Sward</surname>
          </string-name>
          and
          <string-name>
            <given-names>Gavin</given-names>
            <surname>Macarthur</surname>
          </string-name>
          .
          <year>2007</year>
          .
          <article-title>Making User Experience a Business Strategy</article-title>
          .
          <article-title>Towards a UX Manifesto 2</article-title>
          ,
          <year>September 2007</year>
          (
          <year>2007</year>
          ),
          <fpage>35</fpage>
          -
          <lpage>42</lpage>
          . DOI:http: //dx.doi.org/10.1183/09031936.00022308
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>The</given-names>
            <surname>European Commission</surname>
          </string-name>
          .
          <year>2011</year>
          .
          <article-title>SPECIAL EUROBAROMETER 359 Attitudes on Data Protection and Electronic Identity in the European Union</article-title>
          . (
          <year>2011</year>
          ),
          <fpage>330</fpage>
          . Retrieved 2016-
          <volume>12</volume>
          -17 from http://ec.europa.eu/public_opinion/index_en.htm
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Julie</surname>
            <given-names>R</given-names>
          </string-name>
          <string-name>
            <surname>Williamson and Stephen Brewster</surname>
          </string-name>
          .
          <year>2012</year>
          .
          <article-title>A performative perspective on UX</article-title>
          .
          <source>Communications in Mobile Computing</source>
          <volume>1</volume>
          ,
          <issue>1</issue>
          (
          <year>2012</year>
          ),
          <article-title>3</article-title>
          . DOI:http://dx.doi.org/ 10.1186/
          <fpage>2192</fpage>
          -1121-1-3
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>Jen</given-names>
            <surname>Ho</surname>
          </string-name>
          <string-name>
            <surname>Yang</surname>
          </string-name>
          , Chih Cheng Hsueh, and Chung Hsuan Sun.
          <year>2010</year>
          .
          <article-title>An eficient and lfexible authentication scheme with user anonymity for Digital Right Management</article-title>
          .
          <source>Proceedings - 4th International Conference on Genetic and Evolutionary Computing</source>
          ,
          <string-name>
            <surname>ICGEC</surname>
          </string-name>
          <year>2010</year>
          (
          <year>2010</year>
          ),
          <fpage>630</fpage>
          -
          <lpage>633</lpage>
          . DOI:http://dx.doi.org/10.1109/ICGEC.
          <year>2010</year>
          .161
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>Celal</given-names>
            <surname>Ziftci</surname>
          </string-name>
          and
          <string-name>
            <given-names>Ben</given-names>
            <surname>Greenberg</surname>
          </string-name>
          .
          <year>2015</year>
          .
          <article-title>GTAC 2015: Statistical Data Sampling</article-title>
          . (
          <year>2015</year>
          ).
          <source>Retrieved</source>
          <year>2016</year>
          -
          <volume>12</volume>
          -15 from https://www.youtube.com/watch? v=cXi1Jo5V7UM
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>