{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T16:42:47Z","timestamp":1725986567642},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319903118"},{"type":"electronic","value":"9783319903125"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-90312-5_13","type":"book-chapter","created":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T07:45:53Z","timestamp":1533023153000},"page":"187-197","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards an ILP Approach for Learning Privacy Heuristics from Users\u2019 Regrets"],"prefix":"10.1007","author":[{"given":"Nicol\u00e1s Emilio D\u00edaz","family":"Ferreyra","sequence":"first","affiliation":[]},{"given":"Rene","family":"Meis","sequence":"additional","affiliation":[]},{"given":"Maritta","family":"Heisel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,1]]},"reference":[{"unstructured":"Athakravi, D., Broda, K., Russo, A.: Predicate invention in inductive logic programming. In: OASIcs-OpenAccess Series in Informatics, vol. 28. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik (2012)","key":"13_CR1"},{"doi-asserted-by":"crossref","unstructured":"Calikli, G., Law, M., Bandara, A.K., Russo, A., Dickens, L., Price, B.A., Stuart, A., Levine, M., Nuseibeh, B.: Privacy dynamics: learning privacy norms for social software. In: Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-managing Systems, May 2016, pp. 47\u201356. ACM, New York (2016)","key":"13_CR2","DOI":"10.1145\/2897053.2897063"},{"key":"13_CR3","first-page":"58","volume":"2012","author":"C Diaz","year":"2012","unstructured":"Diaz, C., G\u00fcrses, S.: Understanding the landscape of privacy technologies (extended abstract). In: Proceedings of the Information Security Summit, ISS, May 2012, pp. 58\u201363 (2012)","journal-title":"In: Proceedings of the Information Security Summit, ISS, May"},{"doi-asserted-by":"crossref","unstructured":"D\u00edaz Ferreyra, N.E., Sch\u00e4wel, J., Heisel, M., Meske, C.: Addressing self-disclosure in social media: an instructional awareness approach. In: Proceedings of the 2nd ACS\/IEEE International Workshop on Online Social Networks Technologies (OSNT), December 2016. ACS\/IEEE, Washington\/Piscataway (2016)","key":"13_CR4","DOI":"10.1109\/AICCSA.2016.7945815"},{"key":"13_CR5","first-page":"83","volume-title":"Lecture Notes in Computer Science","author":"N. E. D\u00edaz Ferreyra","year":"2017","unstructured":"Diaz Ferreyra, N. E., Meis, R., Heisel, M.: Online self-disclosure: from users\u2019 regrets to instructional awareness. In: International Cross-Domain Conference for Machine Learning and Knowledge Extraction. Springer, 2017, pp. 83\u2013102 D\u00edaz Ferreyra, N.E., Meis, R., Heisel, M.: Online self-disclosure: from users\u2019 regrets to instructional awareness. In: Proceedings of the IFIP International Cross-Domain Conference (CD-MAKE) (August 2017) (accepted for publication)"},{"doi-asserted-by":"crossref","unstructured":"Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proceedings of the 19th International Conference on World Wide Web, WWW \u201910, pp. 351\u2013360. ACM, New York (2010). http:\/\/doi.acm.org\/10.1145\/1772690.1772727","key":"13_CR6","DOI":"10.1145\/1772690.1772727"},{"issue":"3","key":"13_CR7","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/BF03037227","volume":"13","author":"S Muggleton","year":"1995","unstructured":"Muggleton, S.: Inverse entailment and progol. New Gener. Comput. 13(3), 245\u2013286 (1995)","journal-title":"New Gener. Comput."},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1016\/0743-1066(94)90035-3","volume":"19","author":"S Muggleton","year":"1994","unstructured":"Muggleton, S., De Raedt, L.: Inductive logic programming: theory and methods. J. Log. Program. 19, 629\u2013679 (1994)","journal-title":"J. Log. Program."},{"key":"13_CR9","volume-title":"Relational Data Mining, pp. 160\u2013188","author":"SH Muggleton","year":"2001","unstructured":"Muggleton, S.H., Firth, J.: CProgol4.4: a tutorial introduction. In: Dzeroski, S., Lavrac, N. (eds.) Relational Data Mining, pp. 160\u2013188, Springer, Berlin (2001). http:\/\/www.doc.ic.ac.uk\/~shm\/Papers\/progtuttheo.pdf"},{"key":"13_CR10","first-page":"119","volume":"79","author":"H Nissenbaum","year":"2004","unstructured":"Nissenbaum, H.: Privacy as contextual integrity. Wash. L. Rev. 79, 119 (2004)","journal-title":"Wash. L. Rev."},{"key":"13_CR11","volume-title":"An Introduction to Progol","author":"S Roberts","year":"1997","unstructured":"Roberts, S.: An Introduction to Progol. Department of Computer Science, University of York, Heslington, York (1997)"},{"issue":"1","key":"13_CR12","first-page":"166","volume":"25","author":"AF Westin","year":"1968","unstructured":"Westin, A.F.: Privacy and freedom. Wash. Lee L. Rev. 25(1), 166 (1968)","journal-title":"Wash. Lee L. Rev."}],"container-title":["Lecture Notes in Social Networks","Network Intelligence Meets User Centered Social Media Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-90312-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,7]],"date-time":"2020-11-07T01:52:14Z","timestamp":1604713934000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-90312-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319903118","9783319903125"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-90312-5_13","relation":{},"ISSN":["2190-5428","2190-5436"],"issn-type":[{"type":"print","value":"2190-5428"},{"type":"electronic","value":"2190-5436"}],"subject":[],"published":{"date-parts":[[2018]]}}}