{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:53:18Z","timestamp":1767084798758,"version":"3.37.3"},"reference-count":95,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,1,15]],"date-time":"2022-01-15T00:00:00Z","timestamp":1642204800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,1,15]],"date-time":"2022-01-15T00:00:00Z","timestamp":1642204800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Auton Agent Multi-Agent Syst"],"published-print":{"date-parts":[[2022,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Multiuser Privacy (MP) concerns the protection of personal information in situations where such information is co-owned by multiple users. MP is particularly problematic in collaborative platforms such as online social networks (OSN). In fact, too often OSN users experience privacy violations due to conflicts generated by other users sharing content that involves them without their permission. Previous studies show that in most cases MP conflicts could be avoided, and are mainly due to the difficulty for the uploader to select appropriate sharing policies. For this reason, we present ELVIRA, the first fully explainable personal assistant that collaborates with other ELVIRA agents to identify the optimal sharing policy for a collectively owned content. An extensive evaluation of this agent through software simulations and two user studies suggests that ELVIRA, thanks to its properties of being role-agnostic, adaptive, explainable and both utility- and value-driven, would be more successful at supporting MP than other approaches presented in the literature in terms of (i) trade-off between generated utility and promotion of moral values, and (ii) users\u2019 satisfaction of the explained recommended output.<\/jats:p>","DOI":"10.1007\/s10458-021-09543-5","type":"journal-article","created":{"date-parts":[[2022,1,15]],"date-time":"2022-01-15T08:02:50Z","timestamp":1642233770000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["An explainable assistant for multiuser privacy"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2098-3943","authenticated-orcid":false,"given":"Francesca","family":"Mosca","sequence":"first","affiliation":[]},{"given":"Jose","family":"Such","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,15]]},"reference":[{"issue":"8","key":"9543_CR1","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/3208039","volume":"61","author":"J Such","year":"2018","unstructured":"Such, J., & Criado, N. (2018). Multiparty privacy in social media. Communications of the ACM, 61(8), 74\u201381.","journal-title":"Communications of the ACM"},{"key":"9543_CR2","doi-asserted-by":"crossref","unstructured":"Besmer, A., & Lipford, H. R. (2010). Moving beyond untagging: Photo privacy in a tagged world. In CHI (pp. 1563\u20131572). ACM.","DOI":"10.1145\/1753326.1753560"},{"issue":"6","key":"9543_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3360498","volume":"52","author":"M Humbert","year":"2019","unstructured":"Humbert, M., Trubert, B., & Huguenin, K. (2019). A survey on interdependent privacy. ACM Computing Surveys, 52(6), 1.","journal-title":"ACM Computing Surveys"},{"key":"9543_CR4","doi-asserted-by":"crossref","unstructured":"Wisniewski, P., Lipford, H., & Wilson, D. (2012). Fighting for my space: Coping mechanisms for SNS boundary regulation. In CHI (pp. 609\u2013618). ACM.","DOI":"10.1145\/2207676.2207761"},{"key":"9543_CR5","doi-asserted-by":"crossref","unstructured":"Such, J., Porter, J., Preibusch, S., & Joinson, A. (2017). Photo privacy conflicts in social media: A large-scale empirical study. In CHI (pp. 3821\u20133832). ACM.","DOI":"10.1145\/3025453.3025668"},{"issue":"3","key":"9543_CR6","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MC.2016.83","volume":"49","author":"G Misra","year":"2016","unstructured":"Misra, G., & Such, J. (2016). How socially aware are social media privacy controls? IEEE Computer, 49(3), 96\u201399.","journal-title":"IEEE Computer"},{"issue":"2","key":"9543_CR7","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MIC.2014.107","volume":"19","author":"K Liang","year":"2014","unstructured":"Liang, K., Liu, J. K., Lu, R., & Wong, D. S. (2014). Privacy concerns for photo sharing in online social networks. IEEE Internet Computing, 19(2), 58\u201363.","journal-title":"IEEE Internet Computing"},{"issue":"1","key":"9543_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3146025","volume":"51","author":"F Paci","year":"2018","unstructured":"Paci, F., Squicciarini, A., & Zannone, N. (2018). Survey on access control for community-centered collaborative systems. ACM Computing Surveys, 51(1), 1\u201338.","journal-title":"ACM Computing Surveys"},{"key":"9543_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.artint.2018.07.007","volume":"267","author":"T Miller","year":"2018","unstructured":"Miller, T. (2018). Explanation in artificial intelligence: Insights from the social sciences. Artificial Intelligence, 267, 1\u201338.","journal-title":"Artificial Intelligence"},{"issue":"CSCW1","key":"9543_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3449127","volume":"5","author":"M Cherubini","year":"2021","unstructured":"Cherubini, M., Niksirat, K., Boldi, M.-O., Keopraseuth, H., Such, J., & Huguenin, K. (2021). When forcing collaboration is the most sensible choice: Desirability of precautionary and dissuasive mechanisms to manage multiparty privacy conflicts. Proceedings of the ACM on Human-Computer Interaction, 5(CSCW1), 1\u201336.","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"key":"9543_CR11","doi-asserted-by":"crossref","unstructured":"Lampinen, A., Lehtinen, V., Lehmuskallio, A., & Tamminen, S. (2011). We\u2019re in it together: Interpersonal management of disclosure in social network services. In CHI (pp. 3217\u20133226). ACM.","DOI":"10.1145\/1978942.1979420"},{"issue":"6221","key":"9543_CR12","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.aaa1465","volume":"347","author":"A Acquisti","year":"2015","unstructured":"Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509\u2013514.","journal-title":"Science"},{"key":"9543_CR13","doi-asserted-by":"crossref","unstructured":"Such, J. (2017). Privacy and autonomous systems. In Proceedings of the 26th international joint conference on artificial intelligence (IJCAI) (pp. 4761\u20134767).","DOI":"10.24963\/ijcai.2017\/663"},{"issue":"2","key":"9543_CR14","first-page":"109","volume":"25","author":"H Krasnova","year":"2010","unstructured":"Krasnova, H., Spiekermann, S., Koroleva, K., & Hildebrand, T. (2010). Online social networks: Why we disclose. JIT, 25(2), 109\u2013125.","journal-title":"JIT"},{"key":"9543_CR15","unstructured":"Mosca, F. (2020). Value-aligned and explainable agents for collective decision making: Privacy application: Doctoral consortium. In Proceedings of the 19th international conference on autonomous agents and multiagent systems (AAMAS 2020)."},{"key":"9543_CR16","unstructured":"Mosca, F., Such, J. M., & McBurney, P. (2020). Towards a value-driven explainable agent for collective privacy. In Proceedings of the 19th international conference on autonomous agents and multiagent systems."},{"issue":"4","key":"9543_CR17","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1162\/DAED_a_00113","volume":"140","author":"H Nissenbaum","year":"2011","unstructured":"Nissenbaum, H. (2011). A contextual approach to privacy online. Daedalus, 140(4), 32\u201348.","journal-title":"Daedalus"},{"key":"9543_CR18","doi-asserted-by":"crossref","unstructured":"Winikoff, M. (2017). Towards trusting autonomous systems. In International workshop on engineering multi-agent systems (pp. 3\u201320). Springer","DOI":"10.1007\/978-3-319-91899-0_1"},{"key":"9543_CR19","doi-asserted-by":"crossref","unstructured":"Cranefield, S., Oren, N., & Vasconcelos, W. W. (2018). Accountability for practical reasoning agents. In International conference on agreement technologies (pp. 33\u201348). Springer","DOI":"10.1007\/978-3-030-17294-7_3"},{"key":"9543_CR20","doi-asserted-by":"crossref","unstructured":"Dignum, V. (2019). Responsible artificial intelligence: How to develop and use AI in a responsible way. Springer.","DOI":"10.1007\/978-3-030-30371-6"},{"key":"9543_CR21","unstructured":"Mosca, F., & Such, J. (2021). ELVIRA: An explainable agent for value and utility-driven multiuser privacy. In Proceedings of the 20th international conference on autonomous agents and multiagent systems (AAMAS)."},{"issue":"2","key":"9543_CR22","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s10796-013-9453-6","volume":"16","author":"R Fogues","year":"2014","unstructured":"Fogues, R., Such, J., Espinosa, A., & Garcia-Fornes, A. (2014). Bff: A tool for eliciting tie strength and user communities in social networking services. Information Systems Frontiers, 16(2), 225\u2013237.","journal-title":"Information Systems Frontiers"},{"issue":"1","key":"9543_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2821512","volume":"11","author":"J Such","year":"2016","unstructured":"Such, J., & Rovatsos, M. (2016). Privacy policy negotiation in social media. ACM TAAS, 11(1), 1\u201329.","journal-title":"ACM TAAS"},{"issue":"7","key":"9543_CR24","first-page":"1851","volume":"28","author":"J Such","year":"2016","unstructured":"Such, J., & Criado, N. (2016). Resolving multi-party privacy conflicts in social media. IEEE TKDE, 28(7), 1851\u20131863.","journal-title":"IEEE TKDE"},{"key":"9543_CR25","doi-asserted-by":"crossref","unstructured":"Ilia, P., Polakis, I., Athanasopoulos, E., Maggi, F., & Ioannidis, S. (2015). Face\/off: Preventing privacy leakage from photos in social networks. In CCS (pp. 781\u2013792). ACM Press","DOI":"10.1145\/2810103.2813603"},{"key":"9543_CR26","doi-asserted-by":"crossref","unstructured":"Ramokapane, K. M., Misra, G., Such, J., & Preibusch, S. (2021). Truth or dare: Understanding and predicting how users lie and provide untruthful data online. In Proceedings of the 2021 CHI conference on human factors in computing systems (pp. 1\u201315).","DOI":"10.1145\/3411764.3445625"},{"issue":"1","key":"9543_CR27","doi-asserted-by":"publisher","first-page":"11","DOI":"10.9707\/2307-0919.1116","volume":"2","author":"SH Schwartz","year":"2012","unstructured":"Schwartz, S. H. (2012). An overview of the Schwartz theory of basic values. Online Readings in Psychology and Culture, 2(1), 11.","journal-title":"Online Readings in Psychology and Culture"},{"issue":"290","key":"9543_CR28","first-page":"261","volume":"259","author":"SH Schwartz","year":"2003","unstructured":"Schwartz, S. H. (2003). A proposal for measuring value orientations across nations. Questionnaire Package of the European Social Survey, 259(290), 261.","journal-title":"Questionnaire Package of the European Social Survey"},{"key":"9543_CR29","unstructured":"Rokeach, M. (1973). The nature of human values. Free Press."},{"issue":"10","key":"9543_CR30","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1177\/0146167203254602","volume":"29","author":"A Bardi","year":"2003","unstructured":"Bardi, A., & Schwartz, S. H. (2003). Values and behavior: Strength and structure of relations. Personality and Social Psychology Bulletin, 29(10), 1207\u20131220.","journal-title":"Personality and Social Psychology Bulletin"},{"issue":"10\u201315","key":"9543_CR31","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1016\/j.artint.2007.04.009","volume":"171","author":"K Atkinson","year":"2007","unstructured":"Atkinson, K., & Bench-Capon, T. (2007). Practical reasoning as presumptive argumentation using action based alternating transition systems. Artificial Intelligence, 171(10\u201315), 855\u2013874.","journal-title":"Artificial Intelligence"},{"key":"9543_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.artint.2017.09.002","volume":"254","author":"K Atkinson","year":"2018","unstructured":"Atkinson, K., & Bench-Capon, T. (2018). Taking account of the actions of others in value-based reasoning. Artificial Intelligence, 254, 1\u201320.","journal-title":"Artificial Intelligence"},{"key":"9543_CR33","doi-asserted-by":"crossref","unstructured":"Chander, A., & Srinivasan, R. (2018). Evaluating explanations by cognitive value. In International cross-domain conference for machine learning and knowledge extraction (pp. 314\u2013328). Springer","DOI":"10.1007\/978-3-319-99740-7_23"},{"key":"9543_CR34","doi-asserted-by":"crossref","unstructured":"Langley, P. (2019). Explainable, normative, and justified agency. In Proceedings of the AAAI conference on artificial intelligence (Vol. 33, pp. 9775\u20139779).","DOI":"10.1609\/aaai.v33i01.33019775"},{"key":"9543_CR35","doi-asserted-by":"crossref","unstructured":"Mosca, F., Sarkadi, \u015e., Such, J. M., & McBurney, P. (2020). Agent EXPRI: Licence to explain. In International workshop on explainable, transparent autonomous agents and multi-agent systems (pp. 21\u201338). Cham: Springer.","DOI":"10.1007\/978-3-030-51924-7_2"},{"key":"9543_CR36","unstructured":"Tessier, C., Chaudron, L., & M\u00fcller, H.-J. (2006). Conflicting agents: Conflict management in multi-agent systems (Vol. 1). Springer."},{"key":"9543_CR37","doi-asserted-by":"crossref","unstructured":"Mancini, C., Rogers, Y., Bandara, A. K., Coe, T., Jedrzejczyk, L., Joinson, A. N., Price, B. A., Thomas, K., & Nuseibeh, B. (2010). Contravision: Exploring users\u2019 reactions to futuristic technology. In Proceedings of the SIGCHI conference on human factors in computing systems (pp. 153\u2013162).","DOI":"10.1145\/1753326.1753350"},{"issue":"1","key":"9543_CR38","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/3038920","volume":"24","author":"R Fogues","year":"2017","unstructured":"Fogues, R., Murukannaiah, P., Such, J., & Singh, M. (2017). Sharing policies in multiuser privacy scenarios: Incorporating context, preferences, and arguments in decision making. ACM TOCHI, 24(1), 5\u20131529.","journal-title":"ACM TOCHI"},{"key":"9543_CR39","unstructured":"Hoffman, R. R., Mueller, S. T., Klein, G., & Litman, J. (2018). Metrics for explainable AI: Challenges and prospects. arXiv preprint arXiv:1812.04608"},{"key":"9543_CR40","doi-asserted-by":"crossref","unstructured":"Mason, W., & Suri, S. (2012). Conducting behavioral research on amazon\u2019s mechanical turk. Behavior Research Methods, 44(1), 1\u201323.","DOI":"10.3758\/s13428-011-0124-6"},{"issue":"4","key":"9543_CR41","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.3758\/s13428-013-0434-y","volume":"46","author":"E Peer","year":"2014","unstructured":"Peer, E., Vosgerau, J., & Acquisti, A. (2014). Reputation as a sufficient condition for data quality on amazon mechanical turk. Behavior Research Methods, 46(4), 1023\u20131031.","journal-title":"Behavior Research Methods"},{"issue":"1","key":"9543_CR42","doi-asserted-by":"publisher","first-page":"400","DOI":"10.3758\/s13428-015-0578-z","volume":"48","author":"DJ Hauser","year":"2016","unstructured":"Hauser, D. J., & Schwarz, N. (2016). Attentive turkers: Mturk participants perform better on online attention checks than do subject pool participants. Behavior Research Methods, 48(1), 400\u2013407.","journal-title":"Behavior Research Methods"},{"issue":"1","key":"9543_CR43","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/s11002-018-9448-7","volume":"29","author":"LJ Paas","year":"2018","unstructured":"Paas, L. J., & Morren, M. (2018). Please do not answer if you are reading this: Respondent attention in online panels. Marketing Letters, 29(1), 13\u201321.","journal-title":"Marketing Letters"},{"key":"9543_CR44","doi-asserted-by":"crossref","unstructured":"Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users\u2019 information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336\u2013355.","DOI":"10.1287\/isre.1040.0032"},{"issue":"5439","key":"9543_CR45","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"AL Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si, A. L., & Albert, R. (1999). Emergence of scaling in random networks. Science, 286(5439), 509\u2013512.","journal-title":"Science"},{"key":"9543_CR46","doi-asserted-by":"crossref","unstructured":"Mislove, A., Marcon, M., Gummadi, K. P., Druschel, P., & Bhattacharjee, B. (2007). Measurement and analysis of online social networks. In ICM (pp. 29\u201342). ACM","DOI":"10.1145\/1298306.1298311"},{"key":"9543_CR47","doi-asserted-by":"crossref","unstructured":"Viswanath, B., Mislove, A., Cha, M., & Gummadi, K. P. (2009). On the evolution of user interaction in Facebook. In Proceedings of the 2nd ACM workshop on online social networks (pp. 37\u201342). ACM.","DOI":"10.1145\/1592665.1592675"},{"key":"9543_CR48","unstructured":"Leskovec, J., & Mcauley, J. J. (2012). Learning to discover social circles in ego networks. In NIPS (pp. 539\u2013547)."},{"key":"9543_CR49","doi-asserted-by":"crossref","unstructured":"Terry, G., Hayfield, N., Clarke, V., & Braun, V. (2017). Thematic analysis. In: The Sage handbook of qualitative research in psychology (pp. 17\u201337). Sage.","DOI":"10.4135\/9781526405555.n2"},{"issue":"5","key":"9543_CR50","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1080\/10447318.2014.1001300","volume":"31","author":"R Fogues","year":"2015","unstructured":"Fogues, R., Such, J., Espinosa, A., & Garcia-Fornes, A. (2015). Open challenges in relationship-based privacy mechanisms for social network services. International Journal of Human-Computer Interaction, 31(5), 350\u2013370.","journal-title":"International Journal of Human-Computer Interaction"},{"key":"9543_CR51","doi-asserted-by":"crossref","unstructured":"Johnson, M., Egelman, S., & Bellovin, S. M. (2012). Facebook and privacy: It\u2019s complicated. In Proceedings of the eighth symposium on usable privacy and security (pp. 1\u201315).","DOI":"10.1145\/2335356.2335369"},{"issue":"1","key":"9543_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2983644","volume":"11","author":"A Squicciarini","year":"2017","unstructured":"Squicciarini, A., Caragea, C., & Balakavi, R. (2017). Toward automated online photo privacy. ACM Transactions on the Web (TWEB), 11(1), 1\u201329.","journal-title":"ACM Transactions on the Web (TWEB)"},{"key":"9543_CR53","doi-asserted-by":"crossref","unstructured":"Zerr, S., Siersdorfer, S., Hare, J., & Demidova, E. (2012). Privacy-aware image classification and search. In Proceedings of the 35th international ACM SIGIR conference on research and development in information retrieval (pp. 35\u201344).","DOI":"10.1145\/2348283.2348292"},{"issue":"8","key":"9543_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0202540","volume":"13","author":"R Fogues","year":"2018","unstructured":"Fogues, R., Such, J., Espinosa, A., & Garcia-Fornes, A. (2018). Tie and tag: A study of tie strength and tags for photo sharing. PLoS ONE, 13(8), 1\u201322.","journal-title":"PLoS ONE"},{"key":"9543_CR55","doi-asserted-by":"crossref","unstructured":"Reinhardt, D., Engelmann, F., & Hollick, M. (2015). Can i help you setting your privacy? A survey-based exploration of users\u2019 attitudes towards privacy suggestions. In Proceedings of the 13th international conference on advances in mobile computing and multimedia (pp. 347\u2013356).","DOI":"10.1145\/2837126.2837130"},{"key":"9543_CR56","doi-asserted-by":"crossref","unstructured":"Shehab, M., & Touati, H. (2012). Semi-supervised policy recommendation for online social networks. In 2012 IEEE\/ACM international conference on advances in social networks analysis and mining (pp. 360\u2013367). IEEE","DOI":"10.1109\/ASONAM.2012.66"},{"key":"9543_CR57","doi-asserted-by":"publisher","unstructured":"Misra, G., Such, J., & Balogun, H. (2016). Non-sharing communities? An empirical study of community detection for access control decisions. In 2016 IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM) (pp. 49\u201356). https:\/\/doi.org\/10.1109\/ASONAM.2016.7752212","DOI":"10.1109\/ASONAM.2016.7752212"},{"key":"9543_CR58","doi-asserted-by":"crossref","unstructured":"Amershi, S., Fogarty, J., & Weld, D. (2012). Regroup: Interactive machine learning for on-demand group creation in social networks. In Proceedings of the SIGCHI conference on human factors in computing systems (pp. 21\u201330).","DOI":"10.1145\/2207676.2207680"},{"key":"9543_CR59","doi-asserted-by":"crossref","unstructured":"Misra, G., Such, J., & Balogun, H. (2016). Improve-identifying minimal profile vectors for similarity based access control. In IEEE Trustcom (pp. 868\u2013875).","DOI":"10.1109\/TrustCom.2016.0150"},{"issue":"1","key":"9543_CR60","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1109\/TKDE.2014.2320729","volume":"27","author":"AC Squicciarini","year":"2014","unstructured":"Squicciarini, A. C., Lin, D., Sundareswaran, S., & Wede, J. (2014). Privacy policy inference of user-uploaded images on content sharing sites. IEEE Transactions on Knowledge and Data Engineering, 27(1), 193\u2013206.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"9543_CR61","doi-asserted-by":"crossref","unstructured":"Albertini, D. A., Carminati, B., & Ferrari, E. (2016). Privacy settings recommender for online social network. In 2016 IEEE 2nd international conference on collaboration and internet computing (CIC) (pp. 514\u2013521). IEEE.","DOI":"10.1109\/CIC.2016.079"},{"key":"9543_CR62","doi-asserted-by":"crossref","unstructured":"Li, Q., Li, J., Wang, H., & Ginjala, A. (2011). Semantics-enhanced privacy recommendation for social networking sites. In 2011 IEEE 10th international conference on trust, security and privacy in computing and communications (pp. 226\u2013233). IEEE.","DOI":"10.1109\/TrustCom.2011.31"},{"issue":"1","key":"9543_CR63","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10458-020-09488-1","volume":"35","author":"AC Kurtan","year":"2021","unstructured":"Kurtan, A. C., & Yolum, P. (2021). Assisting humans in privacy management: An agent-based approach. Autonomous Agents and Multi-Agent Systems, 35(1), 1\u201333.","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"key":"9543_CR64","doi-asserted-by":"crossref","unstructured":"Kepez, B., & Yolum, P. (2016). Learning privacy rules cooperatively in online social networks. In Proceedings of the 1st international workshop on AI for privacy and security (pp. 1\u20134).","DOI":"10.1145\/2970030.2970036"},{"issue":"6","key":"9543_CR65","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MIC.2017.4180831","volume":"21","author":"G Misra","year":"2017","unstructured":"Misra, G., & Such, J. (2017). Pacman: Personal agent for access control in social media. IEEE Internet Computing, 21(6), 18\u201326.","journal-title":"IEEE Internet Computing"},{"key":"9543_CR66","doi-asserted-by":"crossref","unstructured":"Misra, G., & Such, J. (2017). React: Recommending access control decisions to social media users. In IEEE\/ACM international conference on advances in social networks analysis and mining (ASONAM) (pp. 421\u2013426).","DOI":"10.1145\/3110025.3110073"},{"key":"9543_CR67","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.ins.2015.07.013","volume":"325","author":"N Criado","year":"2015","unstructured":"Criado, N., & Such, J. (2015). Implicit contextual integrity in online social networks. Information Sciences, 325, 48\u201369.","journal-title":"Information Sciences"},{"key":"9543_CR68","unstructured":"Ruiz-Dolz, R., Alemany, J., Heras, S., & Garc\u00eda-Fornes, A. (2019). Automatic generation of explanations to prevent privacy violations."},{"key":"9543_CR69","doi-asserted-by":"crossref","unstructured":"Hu, H., Ahn, G. J., & Jorgensen, J. (2011). Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In ACSAC (pp. 103\u2013112). ACM.","DOI":"10.1145\/2076732.2076747"},{"key":"9543_CR70","doi-asserted-by":"crossref","unstructured":"Zhong, H., Squicciarini, A., & Miller, D. (2018). Toward automated multiparty privacy conflict detection. In Proceedings of the 27th ACM international conference on information and knowledge management (pp. 1811\u20131814).","DOI":"10.1145\/3269206.3269329"},{"key":"9543_CR71","doi-asserted-by":"crossref","unstructured":"Thomas, K., Grier, C., & Nicol, D. (2010). Unfriendly: Multi-party privacy risks in social networks. In PET (pp. 236\u2013252). Springer.","DOI":"10.1007\/978-3-642-14527-8_14"},{"key":"9543_CR72","doi-asserted-by":"crossref","unstructured":"Carminati, B., & Ferrari, E. (2011). Collaborative access control in on-line social networks. In CollaborateCom (pp. 231\u2013240). IEEE","DOI":"10.4108\/icst.collaboratecom.2011.247109"},{"issue":"7","key":"9543_CR73","doi-asserted-by":"publisher","first-page":"1614","DOI":"10.1109\/TKDE.2012.97","volume":"25","author":"H Hu","year":"2012","unstructured":"Hu, H., Ahn, G.-J., & Jorgensen, J. (2012). Multiparty access control for online social networks: Model and mechanisms. IEEE Transactions on Knowledge and Data Engineering, 25(7), 1614\u20131627.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"9543_CR74","doi-asserted-by":"crossref","unstructured":"Ratikan, A., & Shikida, M. (2014). Privacy protection based privacy conflict detection and solution in online social networks. In International conference on human aspects of information security, privacy, and trust (pp. 433\u2013445). Springer.","DOI":"10.1007\/978-3-319-07620-1_38"},{"key":"9543_CR75","first-page":"3767","volume":"10","author":"NP Shetty","year":"2020","unstructured":"Shetty, N. P., Muniyal, B., & Mowla, S. (2020). Policy resolution of shared data in online social networks. International Journal of Electrical& Computer Engineering, 10, 3767.","journal-title":"International Journal of Electrical & Computer Engineering"},{"key":"9543_CR76","doi-asserted-by":"publisher","first-page":"91311","DOI":"10.1109\/ACCESS.2020.2994408","volume":"8","author":"G Akkuzu","year":"2020","unstructured":"Akkuzu, G., Aziz, B., & Adda, M. (2020). Towards consensus-based group decision making for co-owned data sharing in online social networks. IEEE Access, 8, 91311\u201391325.","journal-title":"IEEE Access"},{"issue":"1","key":"9543_CR77","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TIFS.2018.2840488","volume":"14","author":"L Xu","year":"2018","unstructured":"Xu, L., Jiang, C., He, N., Han, Z., & Benslimane, A. (2018). Trust-based collaborative privacy management in online social networks. IEEE Transactions on Information Forensics and Security, 14(1), 48\u201360.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"9543_CR78","doi-asserted-by":"crossref","unstructured":"Squicciarini, A., Shehab, M., & Paci, F. (2009). Collective privacy management in social networks. In WWW (pp. 521\u2013530). ACM.","DOI":"10.1145\/1526709.1526780"},{"key":"9543_CR79","doi-asserted-by":"crossref","unstructured":"Ulusoy, O., & Yolum, P. (2020). Agents for preserving privacy: Learning and decision making collaboratively. In Multi-agent systems and agreement technologies (pp. 116\u2013131). Springer.","DOI":"10.1007\/978-3-030-66412-1_8"},{"key":"9543_CR80","unstructured":"Rajtmajer, S., Squicciarini, A., Griffin, C., Karumanchi, S., & Tyagi, A. (2016). Constrained social-energy minimization for multi-party sharing in online social networks. In Proceedings of the international conference on autonomous agents & multiagent systems (AAMAS) (pp. 680\u2013688)."},{"key":"9543_CR81","doi-asserted-by":"crossref","unstructured":"Rajtmajer, S., Squicciarini, A., Such, J., Semonsen, J., & Belmonte, A. (2017). An ultimatum game model for the evolution of privacy in jointly managed content. In GAMESEC (pp. 112\u2013130). Springer.","DOI":"10.1007\/978-3-319-68711-7_7"},{"issue":"6","key":"9543_CR82","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MIC.2017.4180836","volume":"21","author":"R Fogues","year":"2017","unstructured":"Fogues, R., Murukannaiah, P., Such, J., & Singh, M. (2017). Sosharp: Recommending sharing policies in multiuser privacy scenarios. IEEE Internet Computing, 21(6), 28\u201336.","journal-title":"IEEE Internet Computing"},{"key":"9543_CR83","unstructured":"Ruiz-Dolz, R., Heras, S., Alemany, J., & Garc\u00eda-Fornes, A. (2019). Towards an argumentation system for assisting users with privacy management in online social networks. In CMNA@ PERSUASIVE (pp. 17\u201328)."},{"issue":"3","key":"9543_CR84","first-page":"27","volume":"17","author":"N K\u00f6kciyan","year":"2017","unstructured":"K\u00f6kciyan, N., Yaglikci, N., & Yolum, P. (2017). An argumentation approach for resolving privacy disputes in online social networks. ACM TOIT, 17(3), 27.","journal-title":"ACM TOIT"},{"key":"9543_CR85","doi-asserted-by":"crossref","unstructured":"Mester, Y., K\u00f6kciyan, N., & Yolum, P. (2015). Negotiating privacy constraints in online social networks. In International workshop on multiagent foundations of social computing (pp. 112\u2013129). Springer.","DOI":"10.1007\/978-3-319-24804-2_8"},{"issue":"4","key":"9543_CR86","first-page":"42","volume":"18","author":"D Kekulluoglu","year":"2018","unstructured":"Kekulluoglu, D., K\u00f6kciyan, N., & Yolum, P. (2018). Preserving privacy as social responsibility in online social networks. ACM TOIT, 18(4), 42.","journal-title":"ACM TOIT"},{"key":"9543_CR87","unstructured":"Mosca, F., Such, J., & McBurney, P. (2019). Value-driven collaborative privacy decision making. In AAAI PAL symposium."},{"key":"9543_CR88","unstructured":"Ajmeri, N., Guo, H., Murukannaiah, P. K., & Singh, M. P. (2020). Elessar: Ethics in norm-aware agents. In Proceedings of the international conference on autonomous agents and multi-agent systems (AAMAS) (pp. 16\u201324)."},{"key":"9543_CR89","doi-asserted-by":"crossref","unstructured":"Calikli, G., Law, M., Bandara, A. K., Russo, A., Dickens, L., Price, B. A., Stuart, A., Levine, M., & Nuseibeh, B. (2016). Privacy dynamics: Learning privacy norms for social software. In 2016 IEEE\/ACM 11th international symposium on software engineering for adaptive and self-managing systems (SEAMS) (pp. 47\u201356). IEEE.","DOI":"10.1145\/2897053.2897063"},{"key":"9543_CR90","doi-asserted-by":"crossref","unstructured":"Ulusoy, O., & Yolum, P. (2020). Norm-based access control. In Proceedings of the 25th ACM symposium on access control models and technologies (pp. 35\u201346).","DOI":"10.1145\/3381991.3395601"},{"key":"9543_CR91","doi-asserted-by":"crossref","unstructured":"Beato, F., & Peeters, R. (2014). Collaborative joint content sharing for online social networks. In 2014 IEEE international conference on pervasive computing and communication workshops (PERCOM WORKSHOPS) (pp. 616\u2013621). IEEE.","DOI":"10.1109\/PerComW.2014.6815277"},{"key":"9543_CR92","doi-asserted-by":"crossref","unstructured":"Olteanu, A.-M., Huguenin, K., Dacosta, I., & Hubaux, J.-P. (2018). Consensual and privacy-preserving sharing of multi-subject and interdependent data. In Proceedings of the 25th network and distributed system security symposium (NDSS) (pp. 1\u201316). Internet Society.","DOI":"10.14722\/ndss.2018.23002"},{"key":"9543_CR93","doi-asserted-by":"crossref","unstructured":"Vishwamitra, N., Li, Y., Wang, K., Hu, H., Caine, K., & Ahn, G.J. (2017). Towards pii-based multiparty access control for photo sharing in online social networks. In SACMAT (pp. 155\u2013166). ACM.","DOI":"10.1145\/3078861.3078875"},{"key":"9543_CR94","unstructured":"Ramokapane, K. M., Rashid, A., & Such, J. M. (2017). \u201cI feel stupid I can\u2019t delete\u2026\u201d: A study of users\u2019 cloud deletion practices and coping strategies. In Thirteenth symposium on usable privacy and security (SOUPS 2017) (pp. 241\u2013256)."},{"key":"9543_CR95","doi-asserted-by":"crossref","unstructured":"Abdi, N., Zhan, X., Ramokapane, K. M., & Such, J. (2021). Privacy norms for smart home personal assistants. In Proceedings of the 2021 CHI conference on human factors in computing systems (pp. 1\u201314).","DOI":"10.1145\/3411764.3445122"}],"container-title":["Autonomous Agents and Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-021-09543-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10458-021-09543-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-021-09543-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T05:08:10Z","timestamp":1651208890000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10458-021-09543-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,15]]},"references-count":95,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["9543"],"URL":"https:\/\/doi.org\/10.1007\/s10458-021-09543-5","relation":{},"ISSN":["1387-2532","1573-7454"],"issn-type":[{"type":"print","value":"1387-2532"},{"type":"electronic","value":"1573-7454"}],"subject":[],"published":{"date-parts":[[2022,1,15]]},"assertion":[{"value":"24 December 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"10"}}