{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T19:38:36Z","timestamp":1726083516028},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030449063"},{"type":"electronic","value":"9783030449070"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-44907-0_5","type":"book-chapter","created":{"date-parts":[[2020,5,6]],"date-time":"2020-05-06T09:04:57Z","timestamp":1588755897000},"page":"87-115","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards Ubiquitous Privacy Decision Support: Machine Prediction of Privacy Decisions in IoT"],"prefix":"10.1007","author":[{"given":"Hosub","family":"Lee","sequence":"first","affiliation":[]},{"given":"Alfred","family":"Kobsa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,7]]},"reference":[{"key":"5_CR1","unstructured":"Abadi, M., Agarwal, A., Barham, P., Brevdo, E., Chen, Z., Citro, C., Corrado, G.S., Davis, A., Dean, J., Devin, M., et\u00a0al.: Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv preprint \narXiv:1603.04467\n\n (2016)"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Acquisti, A., Grossklags, J.: Privacy attitudes and privacy behavior. In: Economics of Information Security, pp. 165\u2013178. Springer (2004)","DOI":"10.1007\/1-4020-8090-5_13"},{"issue":"15","key":"5_CR3","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.compeleceng.2016.02.020","volume":"52","author":"JM Batalla","year":"2016","unstructured":"Batalla, J.M., Gajewski, M., Latoszek, W., Krawiec, P., Mavromoustakis, C.X., Mastorakis, G.: ID-based service-oriented communications for unified access to IoT. Comput. Electr. Eng. 52, 98\u2013113 (2016)","journal-title":"Comput. Electr. Eng."},{"issue":"1","key":"5_CR5","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/s11257-016-9174-x","volume":"26","author":"J Beel","year":"2016","unstructured":"Beel, J., Breitinger, C., Langer, S., Lommatzsch, A., Gipp, B.: Towards reproducibility in recommender-systems research. User Model. User-Adap. Inter. 26(1), 69\u2013101 (2016)","journal-title":"User Model. User-Adap. Inter."},{"issue":"4","key":"5_CR6","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1111\/j.1467-8640.2010.00366.x","volume":"26","author":"Y Bengio","year":"2010","unstructured":"Bengio, Y., Delalleau, O., Simard, C.: Decision trees do not generalize to new variations. Comput. Intell. 26(4), 449\u2013467 (2010)","journal-title":"Comput. Intell."},{"issue":"7","key":"5_CR7","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1007\/s00779-010-0346-0","volume":"15","author":"M Benisch","year":"2011","unstructured":"Benisch, M., Kelley, P.G., Sadeh, N., Cranor, L.F.: Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. Pers. Ubiquit. Comput. 15(7), 679\u2013694 (2011)","journal-title":"Pers. Ubiquit. Comput."},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.pmcj.2015.01.006","volume":"25","author":"I Bilogrevic","year":"2016","unstructured":"Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., Hubaux, J.P.: A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive Mob. Comput. 25, 125\u2013142 (2016)","journal-title":"Pervasive Mob. Comput."},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Burel, G., Saif, H., Alani, H.: Semantic wide and deep learning for detecting crisis-information categories on social media. In: International Semantic Web Conference, pp. 138\u2013155. Springer (2017)","DOI":"10.1007\/978-3-319-68288-4_9"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Cheng, H.T., Koc, L., Harmsen, J., Shaked, T., Chandra, T., Aradhye, H., Anderson, G., Corrado, G., Chai, W., Ispir, M., et\u00a0al.: Wide and deep learning for recommender systems. In: Proceedings of the 1st Workshop on Deep Learning for Recommender Systems, pp. 7\u201310. ACM (2016)","DOI":"10.1145\/2988450.2988454"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Chow, R., Egelman, S., Kannavara, R., Lee, H., Misra, S., Wang, E.: HCI in business: a collaboration with academia in IoT privacy. In: International Conference on HCI in Business, pp. 679\u2013687. Springer (2015)","DOI":"10.1007\/978-3-319-20895-4_63"},{"issue":"11","key":"5_CR12","doi-asserted-by":"publisher","first-page":"1928","DOI":"10.1016\/j.jss.2011.06.073","volume":"84","author":"D Christin","year":"2011","unstructured":"Christin, D., Reinhardt, A., Kanhere, S.S., Hollick, M.: A survey on privacy in mobile participatory sensing applications. J. Syst. Softw. 84(11), 1928\u20131946 (2011)","journal-title":"J. Syst. Softw."},{"key":"5_CR13","first-page":"620","volume":"2007","author":"K Connelly","year":"2007","unstructured":"Connelly, K., Khalil, A., Liu, Y.: Do I do what I say?: Observed versus stated privacy preferences. Hum. Comput. Interact. 2007, 620\u2013623 (2007)","journal-title":"Hum. Comput. Interact."},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proceedings of the 19th international conference on World Wide Web, pp. 351\u2013360. ACM (2010)","DOI":"10.1145\/1772690.1772727"},{"issue":"4","key":"5_CR15","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1080\/019722498128700","volume":"14","author":"C Hine","year":"1998","unstructured":"Hine, C.: Privacy in the marketplace. Inform. Soc. 14(4), 253\u2013262 (1998)","journal-title":"Inform. Soc."},{"issue":"3","key":"5_CR16","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1198\/106186006X133933","volume":"15","author":"T Hothorn","year":"2006","unstructured":"Hothorn, T., Hornik, K., Zeileis, A.: Unbiased recursive partitioning: a conditional inference framework. J. Comput. Graph. Stat. 15(3), 651\u2013674 (2006)","journal-title":"J. Comput. Graph. Stat."},{"issue":"8","key":"5_CR17","first-page":"34","volume":"3","author":"Z Huang","year":"1997","unstructured":"Huang, Z.: A fast clustering algorithm to cluster very large categorical data sets in data mining. DMKD 3(8), 34\u201339 (1997)","journal-title":"DMKD"},{"issue":"3","key":"5_CR18","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1023\/A:1009769707641","volume":"2","author":"Z Huang","year":"1998","unstructured":"Huang, Z.: Extensions to the k-means algorithm for clustering large data sets with categorical values. Data Min. Knowl. Disc. 2(3), 283\u2013304 (1998)","journal-title":"Data Min. Knowl. Disc."},{"issue":"1","key":"5_CR19","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.ijhcs.2005.04.019","volume":"63","author":"C Jensen","year":"2005","unstructured":"Jensen, C., Potts, C., Jensen, C.: Privacy practices of Internet users: self-reports versus observed behavior. Int. J. Hum. Comput. Stud. 63(1), 203\u2013227 (2005)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Karayev, S., Trentacoste, M., Han, H., Agarwala, A., Darrell, T., Hertzmann, A., Winnemoeller, H.: Recognizing image style. arXiv preprint \narXiv:1311.3715\n\n (2013)","DOI":"10.5244\/C.28.122"},{"key":"5_CR21","unstructured":"Khatibloo, F.: It\u2019s Here! Forrester\u2019s Consumer Privacy Segmentation. Available at \nhttps:\/\/go.forrester.com\/blogs\/its-here-forresters-consumer-privacy-segmentation\/\n\n. 15 Dec 2016"},{"issue":"12","key":"5_CR22","doi-asserted-by":"publisher","first-page":"1144","DOI":"10.1016\/j.ijhcs.2013.06.003","volume":"71","author":"BP Knijnenburg","year":"2013","unstructured":"Knijnenburg, B.P., Kobsa, A., Jin, H.: Dimensionality of information disclosure behavior. Int. J. Hum. Comput. Stud. 71(12), 1144\u20131162 (2013)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"5_CR23","volume-title":"Privacy indexes: a survey of Westin\u2019s studies","author":"P Kumaraguru","year":"2005","unstructured":"Kumaraguru, P., Cranor, L.F.: Privacy indexes: a survey of Westin\u2019s studies. Carnegie Mellon University, Pittsburgh, PA (2005)"},{"key":"5_CR24","unstructured":"Lankton, N., McKnight, D., Tripp, J.: Privacy management strategies: an exploratory cluster analysis. In: Proceedings of the 22nd Americas Conference on Information Systems (AMCIS 2016), pp. 1\u201310 (2016)"},{"key":"5_CR25","unstructured":"Lee, H., Kobsa, A.: Understanding user privacy in Internet of Things environments. In: Internet of Things (WF-IoT), 2016 IEEE 3rd World Forum on, pp. 407\u2013412. IEEE (2016)"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Lee, H., Kobsa, A.: Privacy preference modeling and prediction in a simulated campuswide IoT environment. In: Pervasive Computing and Communications (PerCom), 2017 IEEE International Conference on, pp. 276\u2013285. IEEE (2017)","DOI":"10.1109\/PERCOM.2017.7917874"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Lee, H., Upright, C., Eliuk, S., Kobsa, A.: Personalized object recognition for augmenting human memory. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, pp. 1054\u20131061. ACM (2016)","DOI":"10.1145\/2968219.2968568"},{"issue":"2","key":"5_CR28","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1515\/popets-2017-0019","volume":"2017","author":"Y Li","year":"2017","unstructured":"Li, Y., Kobsa, A., Knijnenburg, B.P., Nguyen, C., et al.: Cross-cultural privacy prediction. Proc. Priv. Enhancing Technol. 2017(2), 113\u2013132 (2017)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"5_CR29","unstructured":"Lin, J., Liu, B., Sadeh, N., Hong, J.I.: Modeling users\u2019 mobile app privacy preferences: restoring usability in a sea of permission settings. In: Proceedings of the 10th Symposium on Usable Privacy and Security (SOUPS 2014), pp. 199\u2013212 (2014)"},{"key":"5_CR30","unstructured":"Liu, B., Andersen, M.S., Schaub, F., Almuhimedi, H., Zhang, S., Sadeh, N., Acquisti, A., Agarwal, Y.: Follow my recommendations: a personalized privacy assistant for mobile app permissions. In: Proceedings of the 12th Symposium on Usable Privacy and Security (SOUPS 2016), pp. 27\u201341 (2016)"},{"issue":"2","key":"5_CR31","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/MNET.2019.1800254","volume":"33","author":"Y Liu","year":"2019","unstructured":"Liu, Y., Yang, C., Jiang, L., Xie, S., Zhang, Y.: Intelligent edge computing for IoT-based energy management in smart cities. IEEE Netw. 33(2), 111\u2013117 (2019)","journal-title":"IEEE Netw."},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Madhulatha, T.S.: An overview on clustering methods. arXiv preprint \narXiv:1205.1117\n\n (2012)","DOI":"10.9790\/3021-0204719725"},{"issue":"7","key":"5_CR33","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1109\/MCOM.2018.1700600","volume":"56","author":"CX Mavromoustakis","year":"2018","unstructured":"Mavromoustakis, C.X., Batalla, J.M., Mastorakis, G., Markakis, E., Pallis, E.: Socially oriented edge computing for energy awareness in IoT architectures. IEEE Commun. Mag. 56(7), 139\u2013145 (2018)","journal-title":"IEEE Commun. Mag."},{"key":"5_CR34","unstructured":"Naeini, P.E., Bhagavatula, S., Habib, H., Degeling, M., Bauer, L., Cranor, L., Sadeh, N.: Privacy Expectations and preferences in an IoT world. In: Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS 2017), pp. 399\u2013412 (2017)"},{"issue":"1","key":"5_CR35","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","volume":"41","author":"PA Norberg","year":"2007","unstructured":"Norberg, P.A., Horne, D.R., Horne, D.A.: The privacy paradox: personal information disclosure intentions versus behaviors. J. Consum. Aff. 41(1), 100\u2013126 (2007)","journal-title":"J. Consum. Aff."},{"issue":"10","key":"5_CR36","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","volume":"22","author":"SJ Pan","year":"2010","unstructured":"Pan, S.J., Yang, Q.: A survey on transfer learning. IEEE Trans. Knowl. Data Eng. 22(10), 1345\u20131359 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"5_CR37","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MITP.2015.34","volume":"17","author":"C Perera","year":"2015","unstructured":"Perera, C., Ranjan, R., Wang, L., Khan, S.U., Zomaya, A.Y.: Big data privacy in the Internet of Things era. IT Prof. 17(3), 32\u201339 (2015)","journal-title":"IT Prof."},{"key":"5_CR38","unstructured":"Roever, C., Raabe, N., Luebke, K., Ligges, U., Szepannek, G., Zentgraf, M.: Package klaR. Available at \nhttps:\/\/cran.r-project.org\/web\/packages\/klaR\/klaR.pdf\/\n\n. 20 Feb 2015"},{"issue":"6","key":"5_CR39","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s00779-008-0214-3","volume":"13","author":"N Sadeh","year":"2009","unstructured":"Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P., Prabaker, M., Rao, J.: Understanding and capturing people\u2019s privacy policies in a mobile social networking application. Pers. Ubiquit. Comput. 13(6), 401\u2013412 (2009)","journal-title":"Pers. Ubiquit. Comput."},{"key":"5_CR40","doi-asserted-by":"crossref","unstructured":"Shehab, M., Cheek, G., Touati, H., Squicciarini, A.C., Cheng, P.C.: User centric policy management in online social networks. In: Policies for Distributed Systems and Networks (POLICY), 2010 IEEE International Symposium on, pp. 9\u201313. IEEE (2010)","DOI":"10.1109\/POLICY.2010.10"},{"key":"5_CR41","doi-asserted-by":"crossref","unstructured":"Shehab, M., Touati, H.: Semi-supervised policy recommendation for online social networks. In: Advances in Social Networks Analysis and Mining (ASONAM), 2012 IEEE\/ACM International Conference on, pp. 360\u2013367. IEEE (2012)","DOI":"10.1109\/ASONAM.2012.66"},{"key":"5_CR42","doi-asserted-by":"crossref","unstructured":"Shi, S., Zhang, M., Lu, H., Liu, Y., Ma, S.: Wide and deep learning in job recommendation: an empirical study. In: Asia Information Retrieval Symposium, pp. 112\u2013124. Springer (2017)","DOI":"10.1007\/978-3-319-70145-5_9"},{"key":"5_CR43","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146\u2013164 (2015)","journal-title":"Comput. Netw."},{"key":"5_CR44","doi-asserted-by":"crossref","unstructured":"Sinha, A., Li, Y., Bauer, L.: What you want is not what you get: predicting sharing policies for text-based content on facebook. In: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, pp. 13\u201324. ACM (2013)","DOI":"10.1145\/2517312.2517317"},{"key":"5_CR45","doi-asserted-by":"crossref","unstructured":"Spyromitros-Xioufis, E., Petkos, G., Papadopoulos, S., Heyman, R., Kompatsiaris, Y.: Perceived versus actual predictability of personal information in social networks. In: International Conference on Internet Science, pp. 133\u2013147. Springer (2016)","DOI":"10.1007\/978-3-319-45982-0_13"},{"key":"5_CR46","unstructured":"Therneau, T.M., Atkinson, E.J., et al.: An Introduction to Recursive Partitioning Using the RPART Routines. Tech. rep, Mayo Foundation (1997)"}],"container-title":["Internet of Things","Convergence of Artificial Intelligence and the Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-44907-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,6]],"date-time":"2020-05-06T09:09:15Z","timestamp":1588756155000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-44907-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030449063","9783030449070"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-44907-0_5","relation":{},"ISSN":["2199-1073","2199-1081"],"issn-type":[{"type":"print","value":"2199-1073"},{"type":"electronic","value":"2199-1081"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"7 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}