{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:20:53Z","timestamp":1778343653233,"version":"3.51.4"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,2,18]],"date-time":"2024-02-18T00:00:00Z","timestamp":1708214400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,2,18]],"date-time":"2024-02-18T00:00:00Z","timestamp":1708214400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100006256","name":"Universit\u00e0 degli Studi dell\u2019Aquila","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100006256","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2024,5]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Protecting privacy and ethics of citizens is among the core concerns raised by an increasingly digital society. Profiling users is common practice for software applications triggering the need for users, also enforced by laws, to manage privacy settings properly. Users need to properly manage these settings to protect personally identifiable information and express personal ethical preferences. This has shown to be very difficult for several concurrent reasons. However, profiling technologies can also empower users in their interaction with the digital world by reflecting personal ethical preferences and allowing for automatizing\/assisting users in privacy settings. In this way, if properly reflecting users\u2019 preferences, privacy profiling can become a key enabler for a trustworthy digital society. We focus on characterizing\/collecting users\u2019 privacy preferences and contribute a step in this direction through an empirical study on an existing dataset collected from the fitness domain. We aim to understand which set of questions is more appropriate to differentiate users according to their privacy preferences. The results reveal that a compact set of semantic-driven questions (about domain-independent privacy preferences) helps distinguish users better than a complex domain-dependent one. Based on the outcome, we implement a recommender system to provide users with suitable recommendations related to privacy choices. We then show that the proposed recommender system provides relevant settings to users, obtaining high accuracy.\n<\/jats:p>","DOI":"10.1007\/s10515-024-00415-2","type":"journal-article","created":{"date-parts":[[2024,2,18]],"date-time":"2024-02-18T06:02:11Z","timestamp":1708236131000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Leveraging privacy profiles to empower users in the digital society"],"prefix":"10.1007","volume":"31","author":[{"given":"Davide","family":"Di Ruscio","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Paola","family":"Inverardi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Patrizio","family":"Migliarini","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Phuong T.","family":"Nguyen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,2,18]]},"reference":[{"key":"415_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.: Neighborhood-based collaborative filtering. In: Recommender Systems: The Textbook. Springer, Cham, pp. 29\u201370 (2016). ISBN 978-3-319-29659-3","DOI":"10.1007\/978-3-319-29659-3_2"},{"key":"415_CR2","unstructured":"Alfieri, C., Inverardi, P., Migliarini, P., Palmiero, M.: Exosoul: ethical profiling in the digital world. In: HHAI2022\u2014Volume 354 of Frontiers in Artificial Intelligence and Applications. IOS Press. 10.3233\/FAIA220194. ISBN print: 978-1-64368-308-9, ISBN online: 978-1-64368-309-6 (2022)"},{"key":"415_CR3","doi-asserted-by":"crossref","unstructured":"Alfieri, C., Donati, D., Gozzano, S., Greco, L., Segala, M.: Ethical preferences in the digital world: the exosoul questionnaire. In: HHAI2023\u2014Volume 368 of Frontiers in Artificial Intelligence and Applications. IOS Press. 10.3233\/FAIA230092 (2023)","DOI":"10.3233\/FAIA230092"},{"issue":"4","key":"415_CR4","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1093\/sw\/21.4.338","volume":"21","author":"CR Atherton","year":"1976","unstructured":"Atherton, C.R.: Group techniques for program planning: a guide to nominal group and Delphi processes. Soc. Work 21(4), 338 (1976). https:\/\/doi.org\/10.1093\/sw\/21.4.338. (ISSN 0037-8046)","journal-title":"Soc. Work"},{"key":"415_CR5","doi-asserted-by":"publisher","first-page":"62011","DOI":"10.1109\/ACCESS.2019.2916203","volume":"7","author":"M Autili","year":"2019","unstructured":"Autili, M., Ruscio, D.D., Inverardi, P., Pelliccione, P., Tivoli, M.: A software exoskeleton to protect and support citizen\u2019s ethics and privacy in the digital world. IEEE Access 7, 62011\u201362021 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2916203","journal-title":"IEEE Access"},{"issue":"7","key":"415_CR6","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1016\/j.tele.2017.04.013","volume":"34","author":"S Barth","year":"2017","unstructured":"Barth, S., de Jong, M.D.: The privacy paradox\u2014investigating discrepancies between expressed privacy concerns and actual online behavior\u2014a systematic literature review. Telemat. Inform. 34(7), 1038\u20131058 (2017). https:\/\/doi.org\/10.1016\/j.tele.2017.04.013. (ISSN 0736-5853)","journal-title":"Telemat. Inform."},{"key":"415_CR7","doi-asserted-by":"crossref","unstructured":"Bhatia, J., Breaux, T.D., Reidenberg, J.R., Norton, T.B.: A theory of vagueness and privacy risk perception. In: 2016 IEEE 24th International Requirements Engineering Conference (RE). IEEE, pp. 26\u201335 (2016)","DOI":"10.1109\/RE.2016.20"},{"key":"415_CR8","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198538493.001.0001","volume-title":"Neural Networks for Pattern Recognition","author":"CM Bishop","year":"1995","unstructured":"Bishop, C.M.: Neural Networks for Pattern Recognition. Oxford University Press, Inc., New York (1995). (ISBN 0-19-853864-2)"},{"key":"415_CR9","doi-asserted-by":"publisher","first-page":"2583","DOI":"10.1021\/cr00024a001","volume":"93","author":"JA Burns","year":"1993","unstructured":"Burns, J.A., Whitesides, G.M.: Feed-forward neural networks in chemistry: mathematical systems for classification and pattern recognition. Chem. Rev. 93, 2583\u20132601 (1993)","journal-title":"Chem. Rev."},{"key":"415_CR10","doi-asserted-by":"crossref","unstructured":"Colnago, J., Feng, Y., Palanivel, T., Pearman, S., Ung, M., Acquisti, A., Cranor, L.F., Sadeh, N.: Informing the design of a personalized privacy assistant for the internet of things. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1\u201313 (2020)","DOI":"10.1145\/3313831.3376389"},{"issue":"7","key":"415_CR11","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/3538639","volume":"65","author":"LF Cranor","year":"2022","unstructured":"Cranor, L.F.: Cookie monster. Commun. ACM 65(7), 30\u201332 (2022). https:\/\/doi.org\/10.1145\/3538639. (ISSN 0001-0782)","journal-title":"Commun. ACM"},{"issue":"3","key":"415_CR12","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/3581764","volume":"66","author":"LF Cranor","year":"2023","unstructured":"Cranor, L.F., Habib, H.: Metrics for success: why and how to evaluate privacy choice usability. Commun. ACM 66(3), 35\u201337 (2023). https:\/\/doi.org\/10.1145\/3581764. (ISSN 0001-0782)","journal-title":"Commun. ACM"},{"key":"415_CR13","doi-asserted-by":"publisher","unstructured":"Dupree, J.L., Devries, R., Berry, D.M., Lank, E.: Privacy personas: clustering users via attitudes and behaviors toward security practices. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI \u201916, New York, NY, USA. Association for Computing Machinery, pp. 5228\u20135239 (2016). ISBN 9781450333627. https:\/\/doi.org\/10.1145\/2858036.2858214","DOI":"10.1145\/2858036.2858214"},{"key":"415_CR14","doi-asserted-by":"crossref","unstructured":"Emami-Naeini, P., Agarwal, Y., Cranor, L.F., Hibshi, H.: Ask the experts: What should be on an iot privacy and security label? In: 2020 IEEE Symposium on Security and Privacy (SP). IEEE, pp. 447\u2013464 (2020)","DOI":"10.1109\/SP40000.2020.00043"},{"key":"415_CR15","unstructured":"Ester, M., Kriegel, H.-P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, KDD\u201996. AAAI Press, pp. 226\u2013231 (1996)"},{"issue":"8","key":"415_CR16","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27(8), 861\u2013874 (2006). https:\/\/doi.org\/10.1016\/j.patrec.2005.10.010","journal-title":"Pattern Recogn. Lett."},{"key":"415_CR17","doi-asserted-by":"crossref","unstructured":"Fernquist, J., F\u00e4ngstr\u00f6m, T., Kaati, L.: Iot data profiles: the routines of your life reveals who you are. In: 2017 European Intelligence and Security Informatics Conference (EISIC). IEEE, pp. 61\u201367 (2017)","DOI":"10.1109\/EISIC.2017.17"},{"key":"415_CR18","doi-asserted-by":"publisher","DOI":"10.4324\/9780203451519","volume-title":"An Introduction to Neural Networks","author":"K Gurney","year":"1997","unstructured":"Gurney, K.: An Introduction to Neural Networks. Taylor and Francis, Inc., USA (1997). (ISBN 1857286731)"},{"key":"415_CR19","doi-asserted-by":"publisher","unstructured":"Habib, H., Li, M., Young, E., Cranor, L.: \u201cokay, whatever\u201d: an evaluation of cookie consent interfaces. In: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, CHI \u201922, New York, NY, USA (2022). Association for Computing Machinery. ISBN 9781450391573. https:\/\/doi.org\/10.1145\/3491102.3501985","DOI":"10.1145\/3491102.3501985"},{"key":"415_CR20","first-page":"261","volume":"49","author":"CJ Hoofnagle","year":"2014","unstructured":"Hoofnagle, C.J., Urban, J.M.: Alan Westin\u2019s privacy homo economicus. Wake For. L. Rev. 49, 261 (2014)","journal-title":"Wake For. L. Rev."},{"key":"415_CR21","doi-asserted-by":"publisher","unstructured":"Inverardi, P., Migliarini, P., Massimiliano, P.: Systematic review on privacy categorization. arXiv preprint: arXiv:2307.03652 (2023a). https:\/\/doi.org\/10.48550\/arXiv.2307.03652","DOI":"10.48550\/arXiv.2307.03652"},{"key":"415_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100574","volume":"49","author":"P Inverardi","year":"2023","unstructured":"Inverardi, P., Migliarini, P., Palmiero, M.: Systematic review on privacy categorisation. Comput. Sci. Rev. 49, 100574 (2023b). https:\/\/doi.org\/10.1016\/j.cosrev.2023.100574. (ISSN 1574-0137)","journal-title":"Comput. Sci. Rev."},{"key":"415_CR23","doi-asserted-by":"crossref","unstructured":"Jensen, C., Potts, C.: Privacy policies as decision-making tools: an evaluation of online privacy notices. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 471\u2013478 (2004)","DOI":"10.1145\/985692.985752"},{"key":"415_CR24","doi-asserted-by":"publisher","DOI":"10.1002\/9780470316801","volume-title":"Finding Groups in Data: An Introduction to Cluster Analysis","author":"L Kaufman","year":"1990","unstructured":"Kaufman, L., Rousseeuw, P.J.: Finding Groups in Data: An Introduction to Cluster Analysis. Wiley, New York (1990a). https:\/\/doi.org\/10.1002\/9780470316801 . (ISBN 978-0-47187876-6)"},{"key":"415_CR25","doi-asserted-by":"publisher","DOI":"10.1002\/9780470316801","volume-title":"Finding Groups in Data: An Introduction to Cluster Analysis","author":"L Kaufman","year":"1990","unstructured":"Kaufman, L., Rousseeuw, P.J.: Finding Groups in Data: An Introduction to Cluster Analysis. Wiley, New York (1990b). (ISBN 978-0-47031680-1)"},{"key":"415_CR26","unstructured":"Kohavi, R.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: Proceedings of the 14th International Joint Conference on Artificial Intelligence\u2014Volume 2, IJCAI\u201995, San Francisco, CA, USA. Morgan Kaufmann Publishers Inc., pp. 1137\u20131143 (1995). ISBN 1-55860-363-8"},{"key":"415_CR27","unstructured":"Kumaraguru, P., Cranor, L.F.: Privacy indexes: a survey of Westin\u2019s studies. Technical report CMU-ISRI-5-138. Institute for Software Research International, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, Dezember (2005)"},{"key":"415_CR28","doi-asserted-by":"publisher","unstructured":"Lee, H., Kobsa, A.: Understanding user privacy in internet of things environments. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), pp. 407\u2013412 (2016). https:\/\/doi.org\/10.1109\/WF-IoT.2016.7845392","DOI":"10.1109\/WF-IoT.2016.7845392"},{"key":"415_CR29","unstructured":"Lin, J., Liu, B., Sadeh, N., Hong, J.I.: Modeling users\u2019 mobile app privacy preferences: restoring usability in a sea of permission settings. In: 10th Symposium On Usable Privacy and Security (SOUPS 2014), pp. 199\u2013212 (2014)"},{"key":"415_CR30","doi-asserted-by":"publisher","unstructured":"Liu, B.: Can machine learning help people configure their mobile app privacy settings? 1 (2020). https:\/\/doi.org\/10.1184\/R1\/11591340.v1. https:\/\/kilthub.cmu.edu\/articles\/thesis\/Can_Machine_Learning_Help_People_Configure_Their_Mobile_App_Privacy_Settings_\/11591340","DOI":"10.1184\/R1\/11591340.v1"},{"key":"415_CR31","doi-asserted-by":"publisher","unstructured":"Liu, Y., Li, Z., Xiong, H., Gao, X., Wu, J.: Understanding of internal clustering validation measures. In: Proceedings of the 2010 IEEE International Conference on Data Mining, ICDM \u201910, USA. IEEE Computer Society, pp. 911\u2013916 (2010). ISBN 9780769542560. https:\/\/doi.org\/10.1109\/ICDM.2010.35","DOI":"10.1109\/ICDM.2010.35"},{"key":"415_CR32","unstructured":"Liu, B., Andersen, M.S., Schaub, F., Almuhimedi, H., Zhang, S., Sadeh, N., Acquisti, A., Agarwal, Y.: Follow my recommendations: a personalized privacy assistant for mobile app permissions. In: Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security, SOUPS \u201916. USENIX Association, pp. 27\u201341 (2016). ISBN 978-1-931971-31-7. Event-place: Denver, CO, USA"},{"issue":"2","key":"415_CR33","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s10515-019-00254-6","volume":"26","author":"Z Liu","year":"2019","unstructured":"Liu, Z., Xia, X., Lo, D., Grundy, J.C.: Automatic, highly accurate app permission recommendation. Autom. Softw. Eng. 26(2), 241\u2013274 (2019). https:\/\/doi.org\/10.1007\/s10515-019-00254-6","journal-title":"Autom. Softw. Eng."},{"issue":"1","key":"415_CR34","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1038\/s41928-020-00534-0","volume":"4","author":"BB Lockee","year":"2021","unstructured":"Lockee, B.B.: Online education in the post-covid era. Nat. Electron. 4(1), 5\u20136 (2021). https:\/\/doi.org\/10.1038\/s41928-020-00534-0. (ISSN 2520-1131)","journal-title":"Nat. Electron."},{"key":"415_CR35","first-page":"543","volume":"4","author":"AM McDonald","year":"2008","unstructured":"McDonald, A.M., Cranor, L.F.: The cost of reading privacy policies. Isjlp 4, 543 (2008)","journal-title":"Isjlp"},{"key":"415_CR36","doi-asserted-by":"crossref","unstructured":"McDonald, A.M., Reeder, R.W., Kelley, P.G., Cranor, L.F.: A comparative study of online privacy policies and formats. In: International Symposium on Privacy Enhancing Technologies Symposium. Springer, pp. 37\u201355 (2009)","DOI":"10.1007\/978-3-642-03168-7_3"},{"key":"415_CR37","unstructured":"McKinsey: How COVID-19 has pushed companies over the technology tipping point\u2014and transformed business forever (2020). https:\/\/mck.co\/3trP4OV"},{"issue":"3","key":"415_CR38","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1002\/dir.20009","volume":"18","author":"GR Milne","year":"2004","unstructured":"Milne, G.R., Culnan, M.J.: Strategies for reducing online privacy risks: why consumers read (or don\u2019t read) online privacy notices. J. Interact. Mark. 18(3), 15\u201329 (2004)","journal-title":"J. Interact. Mark."},{"key":"415_CR39","doi-asserted-by":"publisher","DOI":"10.1145\/3439726","author":"S Minaee","year":"2021","unstructured":"Minaee, S., Kalchbrenner, N., Cambria, E., Nikzad, N., Chenaghlu, M., Gao, J.: Deep learning-based text classification: a comprehensive review. ACM Comput. Surv. (2021). https:\/\/doi.org\/10.1145\/3439726. (ISSN 0360-0300)","journal-title":"ACM Comput. Surv."},{"key":"415_CR40","doi-asserted-by":"publisher","unstructured":"Nguyen, P.T., Di Rocco, J., Di Ruscio, D., Pierantonio, A., Iovino, L.: Automated classification of metamodel repositories: a machine learning approach. In: 2019 ACM\/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems (MODELS), pp. 272\u2013282 (2019). https:\/\/doi.org\/10.1109\/MODELS.2019.00011","DOI":"10.1109\/MODELS.2019.00011"},{"key":"415_CR41","doi-asserted-by":"publisher","unstructured":"Noia, T.D., Ostuni, V.C.: Recommender systems and linked open data. In: Faber, W., Paschke, A. (eds.) Reasoning Web. Web Logic Rules\u201411th International Summer School 2015, Berlin, Germany, July 31\u2013August 4, 2015, Tutorial Lectures, Volume 9203 of Lecture Notes in Computer Science. Springer, pp. 88\u2013113 (2015). https:\/\/doi.org\/10.1007\/978-3-319-21768-0_4","DOI":"10.1007\/978-3-319-21768-0_4"},{"issue":"1","key":"415_CR42","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1080\/1369118X.2018.1486870","volume":"23","author":"JA Obar","year":"2020","unstructured":"Obar, J.A., Oeldorf-Hirsch, A.: The biggest lie on the internet: ignoring the privacy policies and terms of service policies of social networking services. Inf. Commun. Soc. 23(1), 128\u2013147 (2020)","journal-title":"Inf. Commun. Soc."},{"key":"415_CR43","doi-asserted-by":"publisher","unstructured":"OECD: OECD Digital Economy Outlook 2020 (2020). https:\/\/doi.org\/10.1787\/bb167041-en. https:\/\/www.oecd-ilibrary.org\/content\/publication\/bb167041-en","DOI":"10.1787\/bb167041-en"},{"issue":"2, Part 2","key":"415_CR44","doi-asserted-by":"publisher","first-page":"3336","DOI":"10.1016\/j.eswa.2008.01.039","volume":"36","author":"H-S Park","year":"2009","unstructured":"Park, H.-S., Jun, C.-H.: A simple and fast algorithm for k-medoids clustering. Expert Syst. Appl. 36(2, Part 2), 3336\u20133341 (2009). https:\/\/doi.org\/10.1016\/j.eswa.2008.01.039. (ISSN 0957-4174)","journal-title":"Expert Syst. Appl."},{"key":"415_CR45","unstructured":"Parliament and the Council of the European Union, T. E.: EU general data protection regulation (GDPR)\u2014regulation EU 2016\/679 of the European Parliament and of the Council of 27 April 2016. Official Journal of the European Union (2016)"},{"key":"415_CR46","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-540-68825-9_22","volume-title":"Advances in Artificial Intelligence","author":"M Qin","year":"2008","unstructured":"Qin, M., Buffett, S., Fleming, M.W.: Predicting user preferences via similarity-based clustering. In: Bergler, S. (ed.) Advances in Artificial Intelligence, pp. 222\u2013233. Springer, Berlin (2008) . (ISBN 978-3-540-68825-9)"},{"key":"415_CR47","unstructured":"Redmiles, E.M., Acar, Y., Fahl, S., Mazurek, M.L.: A summary of survey methodology best practices for security and privacy researchers. Technical report (2017)"},{"key":"415_CR48","first-page":"39","volume":"30","author":"JR Reidenberg","year":"2015","unstructured":"Reidenberg, J.R., Breaux, T., Cranor, L.F., French, B., Grannis, A., Graves, J.T., Liu, F., McDonald, A., Norton, T.B., Ramanath, R.: Disagreeable privacy policies: mismatches between meaning and users\u2019 understanding. Berkeley Tech. LJ 30, 39 (2015)","journal-title":"Berkeley Tech. LJ"},{"key":"415_CR49","unstructured":"Sadeh, N., Liu, B., Das, A., Degeling, M., Schaub, F.: Personalized privacy assistant, Mar. 23 (2021). US Patent 10,956,586"},{"issue":"3","key":"415_CR50","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/s11257-019-09246-3","volume":"30","author":"OR Sanchez","year":"2020","unstructured":"Sanchez, O.R., Torre, I., He, Y., Knijnenburg, B.P.: A recommendation approach for user privacy preferences in the fitness domain. User Model. User-Adapt. Interact. 30(3), 513\u2013565 (2020). https:\/\/doi.org\/10.1007\/s11257-019-09246-3. (ISSN 1573-1391)","journal-title":"User Model. User-Adapt. Interact."},{"issue":"1","key":"415_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10515-023-00387-9","volume":"30","author":"P Sangaroonsilp","year":"2023","unstructured":"Sangaroonsilp, P., Choetkiertikul, M., Dam, H.K., Ghose, A.: An empirical study of automated privacy requirements classification in issue reports. Autom. Softw. Eng. 30(1), 1 (2023). https:\/\/doi.org\/10.1007\/s10515-023-00387-9","journal-title":"Autom. Softw. Eng."},{"key":"415_CR52","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-540-72079-9_9","volume-title":"The Adaptive Web","author":"JB Schafer","year":"2007","unstructured":"Schafer, J.B., Frankowski, D., Herlocker, J., Sen, S.: The Adaptive Web, pp. 291\u2013324. Springer, Berlin (2007). (ISBN 978-3-540-72078-2)"},{"issue":"7","key":"415_CR53","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1093\/jamia\/ocz010","volume":"26","author":"CE Schairer","year":"2019","unstructured":"Schairer, C.E., Cheung, C., Kseniya Rubanovich, C., Cho, M., Cranor, L.F., Bloss, C.S.: Disposition toward privacy and information disclosure in the context of emerging health technologies. J. Am. Med. Inform. Assoc. 26(7), 610\u2013619 (2019). https:\/\/doi.org\/10.1093\/jamia\/ocz010. (ISSN 1527-974X)","journal-title":"J. Am. Med. Inform. Assoc."},{"issue":"10","key":"415_CR54","doi-asserted-by":"publisher","first-page":"2032","DOI":"10.1109\/TSE.2019.2941936","volume":"47","author":"GL Scoccia","year":"2021","unstructured":"Scoccia, G.L., Malavolta, I., Autili, M., Di Salle, A., Inverardi, P.: Enhancing trustability of android applications via user-centric flexible permissions. IEEE Trans. Softw. Eng. 47(10), 2032\u20132051 (2021). https:\/\/doi.org\/10.1109\/TSE.2019.2941936","journal-title":"IEEE Trans. Softw. Eng."},{"key":"415_CR55","unstructured":"Service, E.P.R.: The rise of digital health technologies during the pandemic. Technical report, European Parliamentary Research Service (2021). https:\/\/www.europarl.europa.eu\/RegData\/etudes\/BRIE\/2021\/690548\/EPRS_BRI(2021)690548_EN.pdf"},{"key":"415_CR56","unstructured":"Urban, J.M., Hoofnagle, C.J.: The privacy pragmatic as privacy vulnerable. In: Symposium on Usable Privacy and Security (SOUPS 2014) Workshop on Privacy Personas and Segmentation (PPS) (2014)"},{"key":"415_CR57","unstructured":"Westin, A.F.: Bibliography of surveys of the U.S. public, 1970\u20132003 (2003). https:\/\/web.archive.org\/web\/20051224000944\/. http:\/\/www.privacyexchange.org\/iss\/surveys\/surveybibliography603.pdf"},{"key":"415_CR58","doi-asserted-by":"crossref","unstructured":"Wilson, S., Cranshaw, J., Sadeh, N., Acquisti, A., Cranor, L.F., Springfield, J., Jeong, S.Y., Balasubramanian, A.: Privacy manipulation and acclimation in a location sharing application. In: Proceedings of the 2013 ACM International Joint Cnference on Pervasive and Ubiquitous Computing, pp. 549\u2013558 (2013)","DOI":"10.1145\/2493432.2493436"},{"issue":"1","key":"415_CR59","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/S0169-2070(97)00044-7","volume":"14","author":"G Zhang","year":"1998","unstructured":"Zhang, G., Eddy Patuwo, B., Hu, M.Y.: Forecasting with artificial neural networks: the state of the art. Int. J. Forecast. 14(1), 35\u201362 (1998)","journal-title":"Int. J. Forecast."},{"issue":"3","key":"415_CR60","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s10462-004-0751-8","volume":"22","author":"X Zhu","year":"2004","unstructured":"Zhu, X., Wu, X.: Class noise vs. attribute noise: a quantitative study of their impacts. Artif. Intell. Rev. 22(3), 177\u2013210 (2004). (ISSN 0269-2821)","journal-title":"Artif. Intell. Rev."}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-024-00415-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10515-024-00415-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-024-00415-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T13:19:35Z","timestamp":1714396775000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10515-024-00415-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,18]]},"references-count":60,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,5]]}},"alternative-id":["415"],"URL":"https:\/\/doi.org\/10.1007\/s10515-024-00415-2","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"value":"0928-8910","type":"print"},{"value":"1573-7535","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,18]]},"assertion":[{"value":"10 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All the authors declare that they have no conflict of interest. Furthermore, they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"16"}}