{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T06:06:51Z","timestamp":1775282811933,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642353109","type":"print"},{"value":"9783642353116","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35311-6_23","type":"book-chapter","created":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T07:32:28Z","timestamp":1354606348000},"page":"309-322","source":"Crossref","is-referenced-by-count":14,"title":["Privacy Auctions for Recommender Systems"],"prefix":"10.1007","author":[{"given":"Pranav","family":"Dandekar","sequence":"first","affiliation":[]},{"given":"Nadia","family":"Fawaz","sequence":"additional","affiliation":[]},{"given":"Stratis","family":"Ioannidis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust De-anonymization of Large Sparse Datasets. In: IEEE Symposium on Security and Privacy, pp. 111\u2013125 (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"23_CR2","unstructured":"Netflix Privacy Litigation, http:\/\/www.videoprivacyclass.com"},{"key":"23_CR3","unstructured":"Mello, J.P.: Facebook hit with lawsuit alleging privacy wrongs. PCWorld (May 18, 2012)"},{"key":"23_CR4","unstructured":"Ribeiro, J.: Google faces class-action lawsuits over new privacy policy. PCWorld (March 22, 2012)"},{"key":"23_CR5","unstructured":"Joseph, J., King, J., Hoofnagle, C.J., Bleakley, A., Hennessy, M.: Americans reject tailored advertising and three activities that enable it (2009), http:\/\/ssrn.com\/abstract=1478214"},{"key":"23_CR6","unstructured":"Mayer, J., Narayanan, A., Stamm, S.: Do not track: A universal third-party web tracking opt out. IETF Internet-Draft (March 7, 2011)"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Ghosh, A., Roth, A.: Selling privacy at auction. In: Proc. ACM EC, pp. 199\u2013208 (2011)","DOI":"10.1145\/1993574.1993605"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C. Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating Noise to Sensitivity in Private Data Analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol.\u00a03876, pp. 265\u2013284. Springer, Heidelberg (2006)"},{"key":"23_CR9","first-page":"285","volume-title":"Proceedings of the 10th International Conference on World Wide Web, WWW 2001","author":"B. Sarwar","year":"2001","unstructured":"Sarwar, B., Karypis, G., Konstan, J., Riedl, J.: Item-based collaborative filtering recommendation algorithms. In: Proceedings of the 10th International Conference on World Wide Web, WWW 2001, pp. 285\u2013295. ACM, New York (2001)"},{"issue":"1","key":"23_CR10","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MIC.2003.1167344","volume":"7","author":"G. Linden","year":"2003","unstructured":"Linden, G., Smith, B., York, J.: Amazon.com recommendations: item-to-item collaborative filtering. Internet Computing\u00a07(1), 76\u201380 (2003)","journal-title":"Internet Computing"},{"key":"23_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Singer, Y.: Budget feasible mechanisms. In: Proc. FOCS (2010)","DOI":"10.1109\/FOCS.2010.78"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Dandekar, P., Fawaz, N., Ioannidis, S.: Privacy auctions for recommender systems. CoRR abs\/1111.2885 (2012)","DOI":"10.1007\/978-3-642-35311-6_23"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Korolova, A., Kenthapadi, K., Mishra, N., Ntoulas, A.: Releasing search queries and clicks privately. In: WWW (2009)","DOI":"10.1145\/1526709.1526733"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"McSherry, F., Mironov, I.: Differentially private recommender systems: building privacy into the net. In: Proc. ACM KDD, pp. 627\u2013636 (2009)","DOI":"10.1145\/1557019.1557090"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: Proc. FOCS (2007)","DOI":"10.1109\/FOCS.2007.66"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Nissim, K., Smorodinsky, R., Tennenholtz, M.: Approximately optimal mechanism design via differential privacy (2010)","DOI":"10.2139\/ssrn.2017224"},{"key":"23_CR18","unstructured":"Xiao, D.: Is privacy compatible with truthfulness? Technical Report 2011\/005, Cryptology ePrint Archive (2011)"},{"key":"23_CR19","unstructured":"Chen, Y., Chong, S., Kash, I.A., Moran, T., Vadhan, S.P.: Truthful mechanisms for agents that value privacy. CoRR abs\/1111.5472 (2011)"},{"key":"23_CR20","series-title":"LNCS","first-page":"379","volume-title":"WINE 2012","author":"K. Ligett","year":"2012","unstructured":"Ligett, K., Roth, A.: Take it or Leave it: Running a Survey when Privacy Comes at a Cost. In: Goldberg, P.W., Guo, M. (eds.) WINE 2012. LNCS, vol.\u00a07695, pp. 379\u2013392. Springer, Heidelberg (2012)"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Roth, A., Schoenebeck, G.: Conducting truthful surveys, cheaply. In: Proceedings of the 13th ACM Conference on Electronic Commerce, EC 2012, pp. 826\u2013843. ACM, New York (2012)","DOI":"10.1145\/2229012.2229076"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Fleischer, L., Lyu, Y.H.: Approximately optimal auctions for selling privacy when costs are correlated with data. CoRR abs\/1204.4031 (2012)","DOI":"10.1145\/2229012.2229054"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.: The Elements of Statistical Learning, 2nd edn. Springer (2009)","DOI":"10.1007\/978-0-387-84858-7"}],"container-title":["Lecture Notes in Computer Science","Internet and Network Economics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35311-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,6]],"date-time":"2019-07-06T14:17:13Z","timestamp":1562422633000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35311-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642353109","9783642353116"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35311-6_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}