{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T12:35:50Z","timestamp":1763037350658,"version":"3.37.3"},"reference-count":81,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T00:00:00Z","timestamp":1570838400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T00:00:00Z","timestamp":1570838400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["User Model User-Adap Inter"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s11257-019-09246-3","type":"journal-article","created":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T14:03:38Z","timestamp":1570889018000},"page":"513-565","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["A recommendation approach for user privacy preferences in the fitness domain"],"prefix":"10.1007","volume":"30","author":[{"given":"Odnan Ref","family":"Sanchez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1159-2833","authenticated-orcid":false,"given":"Ilaria","family":"Torre","sequence":"additional","affiliation":[]},{"given":"Yangyang","family":"He","sequence":"additional","affiliation":[]},{"given":"Bart P.","family":"Knijnenburg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,12]]},"reference":[{"key":"9246_CR1","doi-asserted-by":"crossref","first-page":"632","DOI":"10.1016\/j.procs.2018.05.062","volume":"132","author":"B Abhigna","year":"2018","unstructured":"Abhigna, B., Soni, N., Dixit, S.: Crowdsourcing\u2014a step towards advanced machine learning. Proc. Comput. Sci. 132, 632\u2013642 (2018)","journal-title":"Proc. Comput. Sci."},{"issue":"6221","key":"9246_CR2","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.aaa1465","volume":"347","author":"A Acquisti","year":"2015","unstructured":"Acquisti, A., Brandimarte, L., Loewenstein, G.: Privacy and human behavior in the age of information. Science 347(6221), 509\u2013514 (2015)","journal-title":"Science"},{"key":"9246_CR3","doi-asserted-by":"crossref","unstructured":"Agarwal, Y., Hall, M.: Protectmyprivacy: detecting and mitigating privacy leaks on IOS devices using crowdsourcing. In: Proceeding of the 11th Annual International Conference on Mobile Systems, Applications, and Services, pp. 97\u2013110. ACM (2013)","DOI":"10.1145\/2462456.2464460"},{"key":"9246_CR4","doi-asserted-by":"crossref","unstructured":"Almuhimedi, H., Schaub, F., Sadeh, N., Adjerid, I., Acquisti, A., Gluck, J., Cranor, L.F., Agarwal, Y.: Your location has been shared 5398 times!: A field study on mobile app privacy nudging. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 787\u2013796. ACM (2015)","DOI":"10.1145\/2702123.2702210"},{"key":"9246_CR5","unstructured":"Assad, M., Carmichael, D., Kay, J., Kummerfeld, B.: Giving users control over location privacy. In: Workshop on Ubicomp Privacy (2007)"},{"key":"9246_CR6","doi-asserted-by":"crossref","unstructured":"Bahirat, P., He, Y., Menon, A., Knijnenburg, B.: A data-driven approach to developing iot privacy-setting interfaces. In: 23rd International Conference on Intelligent User Interfaces, pp. 165\u2013176. ACM (2018)","DOI":"10.1145\/3172944.3172982"},{"key":"9246_CR7","doi-asserted-by":"crossref","unstructured":"Bellotti, V., Sellen, A.: Design for privacy in ubiquitous computing environments. In: Proceedings of the Third European Conference on Computer-Supported Cooperative Work, 13\u201317 September 1993, Milan, Italy ECSCW\u201993, pp. 77\u201392. Springer (1993)","DOI":"10.1007\/978-94-011-2094-4_6"},{"key":"9246_CR8","doi-asserted-by":"crossref","unstructured":"Beresford, A.R., Rice, A., Skehin, N., Sohan, R.: Mockdroid: trading privacy for application functionality on smartphones. In: Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, pp. 49\u201354. ACM (2011)","DOI":"10.1145\/2184489.2184500"},{"key":"9246_CR9","unstructured":"Brank, J., Grobelnik, M., Mladeni\u0107, D.: A survey of ontology evaluation techniques. In Proceedings of the conference on data mining and data warehouses (SiKDD 2005). Ljubljana, Slovenia, pp. 166\u2013170 (2005)"},{"key":"9246_CR10","volume-title":"Privacy and Security in Ubiquitous Personalized Applications","author":"A Brar","year":"2004","unstructured":"Brar, A., Kay, J.: Privacy and Security in Ubiquitous Personalized Applications. University of Sydney, School of Information Technologies, Sydney (2004)"},{"issue":"2","key":"9246_CR11","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1177\/0165551513509564","volume":"40","author":"F Carmagnola","year":"2014","unstructured":"Carmagnola, F., Osborne, F., Torre, I.: Escaping the big brother: an empirical study on factors influencing identification and information leakage on the web. J. Inf. Sci. 40(2), 180\u2013197 (2014)","journal-title":"J. Inf. Sci."},{"key":"9246_CR12","unstructured":"Chakraborty, S., Shen, C., Raghavan, K.R., Shoukry, Y., Millar, M., Srivastava, M.B.: ipshield: A framework for enforcing context-aware privacy. In: NSDI, pp. 143\u2013156 (2014)"},{"issue":"1","key":"9246_CR13","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s00357-001-0004-3","volume":"18","author":"A Chaturvedi","year":"2001","unstructured":"Chaturvedi, A., Green, P.E., Caroll, J.D.: $$K$$-modes clustering. J. Classif. 18(1), 35\u201355 (2001)","journal-title":"J. Classif."},{"key":"9246_CR14","doi-asserted-by":"crossref","unstructured":"Chaudhry, A., Crowcroft, J., Howard, H., Madhavapeddy, A., Mortier, R., Haddadi, H., McAuley, D.: Personal data: thinking inside the box. In: Proceedings of The Fifth Decennial Aarhus Conference on Critical Alternatives, pp. 29\u201332. Aarhus University Press (2015)","DOI":"10.7146\/aahcc.v1i1.21312"},{"issue":"5","key":"9246_CR15","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1111\/j.1365-2575.2012.00402.x","volume":"23","author":"S Conger","year":"2013","unstructured":"Conger, S., Pratt, J.H., Loch, K.D.: Personal information privacy and emerging technologies. Inf. Syst. J. 23(5), 401\u2013417 (2013). https:\/\/doi.org\/10.1111\/j.1365-2575.2012.00402.x","journal-title":"Inf. Syst. J."},{"issue":"1","key":"9246_CR16","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev, T., Hart, P.: An extended privacy calculus model for e-commerce transactions. Inf. Syst. Res. 17(1), 61\u201380 (2006)","journal-title":"Inf. Syst. Res."},{"key":"9246_CR17","unstructured":"Egele, M., Kruegel, C., Kirda, E., Vigna, G.: Pios: Detecting privacy leaks in ios applications. In: NDSS, pp. 177\u2013183 (2011)"},{"key":"9246_CR18","doi-asserted-by":"crossref","unstructured":"Elluri, L., Joshi, K.P., et\u00a0al.: A knowledge representation of cloud data controls for EU GDPR compliance. In: 11th IEEE International Conference on Cloud Computing (CLOUD) (2018)","DOI":"10.1109\/SERVICES.2018.00036"},{"key":"9246_CR19","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1\u201314. ACM (2012)","DOI":"10.1145\/2335356.2335360"},{"key":"9246_CR20","first-page":"10","volume":"14","author":"H Fu","year":"2014","unstructured":"Fu, H., Yang, Y., Shingte, N., Lindqvist, J., Gruteser, M.: A field study of run-time location access disclosures on android smartphones. Proc. Usable Secur. 14, 10 (2014)","journal-title":"Proc. Usable Secur."},{"key":"9246_CR21","unstructured":"Google\/Ipsos, U.: How people discover, use, and stay engaged with apps, pp. 1\u201315 (2016). https:\/\/www.thinkwithgoogle.com\/data\/smartphone-users-discover-apps-browsing\/"},{"key":"9246_CR22","doi-asserted-by":"crossref","unstructured":"He, Y., Bahirat, P., Menon, A., Knijnenburg, B.P.: A data driven approach to designing for privacy in household iot. ACM Trans. Interact. Intell. Syst. 10(1) (2019)","DOI":"10.1145\/3241378"},{"issue":"5","key":"9246_CR23","first-page":"1","volume":"1","author":"H Hlomani","year":"2014","unstructured":"Hlomani, H., Stacey, D.: Approaches, methods, metrics, measures, and subjectivity in ontology evaluation: a survey. Semant. Web J. 1(5), 1\u201311 (2014)","journal-title":"Semant. Web J."},{"issue":"1","key":"9246_CR24","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1015044207315","volume":"13","author":"EJ Johnson","year":"2002","unstructured":"Johnson, E.J., Bellman, S., Lohse, G.L.: Defaults, framing and privacy: why opting in-opting out. Market. Lett. 13(1), 5\u201315 (2002)","journal-title":"Market. Lett."},{"key":"9246_CR25","unstructured":"Joosse, M., Lohse, M., Evers, V.: Crowdsourcing culture in HRI: Lessons learned from quantitative and qualitative data collections. In: 3rd International Workshop on Culture Aware Robotics at ICSR, vol.\u00a015 (2015)"},{"key":"9246_CR26","unstructured":"Kay, J., Kummerfeld, B.: Scrutability, user control and privacy for distributed personalization. In: Proceedings of the CHI2006 Workshop on Privacy-Enhanced Personalization, pp. 21\u201322 (2006)"},{"key":"9246_CR27","doi-asserted-by":"crossref","unstructured":"Kay, J., Kummerfeld, B., Lauder, P.: Personis: a server for user models. In: International Conference on Adaptive Hypermedia and Adaptive Web-Based Systems, pp. 203\u2013212. Springer (2002)","DOI":"10.1007\/3-540-47952-X_22"},{"key":"9246_CR28","doi-asserted-by":"crossref","unstructured":"Kelley, P., Consolvo, S., Cranor, L., Jung, J., Sadeh, N., Wetherall, D.: A conundrum of permissions: installing applications on an android smartphone. In: International conference on Financial Cryptography and Data Security, Springer, Berlin, Heidelberg, pp. 68\u201379 (2012)","DOI":"10.1007\/978-3-642-34638-5_6"},{"key":"9246_CR29","doi-asserted-by":"crossref","unstructured":"Knijnenburg, B., Raybourn, E., Cherry, D., Wilkinson, D., Sivakumar, S., Sloan, H.: Death to the privacy calculus? (2017). Available at SSRN: http:\/\/dx.doi.org\/10.2139\/ssrn.2923806","DOI":"10.2139\/ssrn.2923806"},{"key":"9246_CR30","unstructured":"Knijnenburg, B.P.: Information disclosure profiles for segmentation and recommendation. In: SOUPS2014 Workshop on Privacy Personas and Segmentation (2014)"},{"key":"9246_CR31","unstructured":"Knijnenburg, B.P.: A user-tailored approach to privacy decision support. Ph.D. Thesis, University of California, Irvine (2015). http:\/\/search.proquest.com\/docview\/1725139739\/abstract"},{"issue":"4","key":"9246_CR32","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MSP.2017.3151331","volume":"15","author":"BP Knijnenburg","year":"2017","unstructured":"Knijnenburg, B.P.: Privacy? I can\u2019t even! Making a case for user-tailored privacy. IEEE Secur. Privacy 15(4), 62\u201367 (2017)","journal-title":"IEEE Secur. Privacy"},{"key":"9246_CR33","unstructured":"Knijnenburg, B.P., Jin, H.: The persuasive effect of privacy recommendations. In: Twelth Annual Workshop on HCI Research in MIS, Milan (2013). http:\/\/aisel.aisnet.org\/sighci2013\/16"},{"key":"9246_CR34","doi-asserted-by":"crossref","unstructured":"Knijnenburg, B.P., Kobsa, A.: Helping users with information disclosure decisions: potential for adaptation. In: Proceedings of the 2013 International Conference on Intelligent User Interfaces, pp. 407\u2013416. ACM (2013)","DOI":"10.1145\/2449396.2449448"},{"key":"9246_CR35","unstructured":"Knijnenburg, B.P., Kobsa, A., Jin, H.: Counteracting the negative effect of form auto-completion on the privacy calculus. In: ICIS 2013 Proceedings, Milan (2013)"},{"issue":"12","key":"9246_CR36","doi-asserted-by":"publisher","first-page":"1144","DOI":"10.1016\/j.ijhcs.2013.06.003","volume":"71","author":"BP Knijnenburg","year":"2013","unstructured":"Knijnenburg, B.P., Kobsa, A., Jin, H.: Dimensionality of information disclosure behavior. Int. J. Hum. Comput. Stud. 71(12), 1144\u20131162 (2013). https:\/\/doi.org\/10.1016\/j.ijhcs.2013.06.003","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"9246_CR37","doi-asserted-by":"crossref","unstructured":"Kobsa, A.: Tailoring privacy to users\u2019 needs. In: International Conference on User Modeling, pp. 301\u2013313. Springer (2001)","DOI":"10.1007\/3-540-44566-8_52"},{"issue":"6","key":"9246_CR38","first-page":"90","volume":"1","author":"TM Kodinariya","year":"2013","unstructured":"Kodinariya, T.M., Makwana, P.R.: Review on determining number of cluster in $$k$$-means clustering. Int. J. 1(6), 90\u201395 (2013)","journal-title":"Int. J."},{"key":"9246_CR39","unstructured":"Kurtz, C., Semmann, M., Schulz, W.: Towards a framework for information privacy in complex service ecosystems. In: ICIS 2018 Proceedings (2018). https:\/\/aisel.aisnet.org\/icis2018\/bridging\/Presentations\/7"},{"key":"9246_CR40","doi-asserted-by":"crossref","unstructured":"Lee, H., Kobsa, A.: Understanding user privacy in internet of things environments. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), pp. 407\u2013412. IEEE (2016)","DOI":"10.1109\/WF-IoT.2016.7845392"},{"key":"9246_CR41","doi-asserted-by":"crossref","unstructured":"Lee, H., Kobsa, A.: Privacy preference modeling and prediction in a simulated campuswide iot environment. In: IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 276\u2013285. IEEE (2017)","DOI":"10.1109\/PERCOM.2017.7917874"},{"issue":"2","key":"9246_CR42","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1515\/popets-2017-0019","volume":"2017","author":"Y Li","year":"2017","unstructured":"Li, Y., Kobsa, A., Knijnenburg, B.P., Nguyen, M.C.: Cross-cultural privacy prediction. Proc. Privacy Enhanc. Technol. 2017(2), 113\u2013132 (2017)","journal-title":"Proc. Privacy Enhanc. Technol."},{"key":"9246_CR43","unstructured":"Lin, J., Liu, B., Sadeh, N., Hong, J.I.: Modeling users\u2019 mobile app privacy preferences: restoring usability in a sea of permission settings. In proceedings of the 10th Symposium On Usable Privacy and Security (SOUPS), pp. 199\u2013212 (2014)"},{"key":"9246_CR44","unstructured":"Liu, B., Andersen, M.S., Schaub, F., Almuhimedi, H., Zhang, S., Sadeh, N., Acquisti, A., Agarwal, Y.: Follow my recommendations: A personalized privacy assistant for mobile app permissions. In: Twelfth Symposium on Usable Privacy and Security, pp. 26\u201341 (2016)"},{"key":"9246_CR45","doi-asserted-by":"crossref","unstructured":"Liu, B., Lin, J., Sadeh, N.: Reconciling mobile app privacy and usability on smartphones: Could user privacy profiles help? In: Proceedings of the 23rd International Conference on World Wide Web, pp. 201\u2013212. ACM (2014b)","DOI":"10.1145\/2566486.2568035"},{"key":"9246_CR46","doi-asserted-by":"publisher","unstructured":"Madejski, M., Johnson, M., Bellovin, S.: A study of privacy settings errors in an online social network. In: Fourth International Workshop on Security and Social Networking, SECSOC \u201912, pp. 340\u2013345. Lugano (2012). https:\/\/doi.org\/10.1109\/PerComW.2012.6197507","DOI":"10.1109\/PerComW.2012.6197507"},{"issue":"4","key":"9246_CR47","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","volume":"15","author":"NK Malhotra","year":"2004","unstructured":"Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet users\u2019 information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf. Syst. Res. 15(4), 336\u2013355 (2004)","journal-title":"Inf. Syst. Res."},{"key":"9246_CR48","unstructured":"Noy, N.F., McGuinness, D.L., et\u00a0al.: Ontology development 101: a guide to creating your first ontology. Stanford Knowledge Systems Laboratory Technical Report KSL-01-05 and Stanford Medical Informatics Technical Report SMI-2001-0880, March 2001 (2001) http:\/\/www.ksl.stanford.edu\/people\/dlm\/papers\/ontology-tutorial-noy-mcguinness.pdf"},{"key":"9246_CR49","doi-asserted-by":"crossref","unstructured":"Palmirani, M., Martoni, M., Rossi, A., Bartolini, C., Robaldo, L.: Pronto: privacy ontology for legal reasoning. In: International Conference on Electronic Government and the Information Systems Perspective, pp. 139\u2013152. Springer (2018)","DOI":"10.1007\/978-3-319-98349-3_11"},{"key":"9246_CR50","unstructured":"Pandit, H., Lewis, D.: Modelling provenance for GDPR compliance using linked open data vocabularies. In: 5th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2017), CEUR 1951 (2017). http:\/\/ceur-ws.org\/Vol-1951\/#paper-06"},{"key":"9246_CR51","doi-asserted-by":"crossref","unstructured":"Pandit, H.J., Fatema, K., O\u2019Sullivan, D., Lewis, D.: Gdprtext-gdpr as a linked data resource. In: European Semantic Web Conference, pp. 481\u2013495. Springer (2018)","DOI":"10.1007\/978-3-319-93417-4_31"},{"issue":"2","key":"9246_CR52","first-page":"256","volume":"6","author":"TR Patil","year":"2013","unstructured":"Patil, T.R., Sherekar, S.: Performance analysis of naive bayes and j48 classification algorithm for data classification. Int. J. Comput. Sci. Appl. 6(2), 256\u2013261 (2013)","journal-title":"Int. J. Comput. Sci. Appl."},{"issue":"12","key":"9246_CR53","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MC.2016.366","volume":"49","author":"C Perera","year":"2016","unstructured":"Perera, C., Liu, C., Ranjan, R., Wang, L., Zomaya, A.Y.: Privacy-knowledge modeling for the internet of things: a look back. Computer 49(12), 60\u201368 (2016)","journal-title":"Computer"},{"key":"9246_CR54","doi-asserted-by":"crossref","unstructured":"Raber, F., Kr\u00fcger, A.: Deriving privacy settings for location sharing: Are context factors always the best choice? In: 2018 IEEE Symposium on Privacy-Aware Computing (PAC), pp. 86\u201394. IEEE (2018)","DOI":"10.1109\/PAC.2018.00015"},{"issue":"6","key":"9246_CR55","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1109\/TSMC.2015.2460691","volume":"46","author":"D Rafailidis","year":"2016","unstructured":"Rafailidis, D., Nanopoulos, A.: Modeling users preference dynamics and side information in recommender systems. IEEE Trans. Syst. Man Cybern. Syst. 46(6), 782\u2013792 (2016)","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"9246_CR56","doi-asserted-by":"crossref","unstructured":"Sacco, O., Breslin, J.G.: Ppo & ppm 2.0: extending the privacy preference framework to provide finer-grained access control for the web of data. In: Proceedings of the 8th International Conference on Semantic Systems, pp. 80\u201387 (2012)","DOI":"10.1145\/2362499.2362511"},{"key":"9246_CR57","doi-asserted-by":"crossref","unstructured":"Sanchez, O., Torre, I., Knijnenburg, B.: Semantic-based privacy settings negotiation and management. In: Future Generation Computer Systems (2019). (Under publication)","DOI":"10.1016\/j.future.2019.10.024"},{"issue":"6","key":"9246_CR58","doi-asserted-by":"crossref","first-page":"1145","DOI":"10.1016\/j.respol.2016.02.003","volume":"45","author":"B Schemmann","year":"2016","unstructured":"Schemmann, B., Herrmann, A.M., Chappin, M.M., Heimeriks, G.J.: Crowdsourcing ideas: involving ordinary users in the ideation phase of new product development. Res. Policy 45(6), 1145\u20131154 (2016)","journal-title":"Res. Policy"},{"issue":"2","key":"9246_CR59","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MIC.2018.112102519","volume":"22","author":"S Sharma","year":"2018","unstructured":"Sharma, S., Chen, K., Sheth, A.: Toward practical privacy-preserving analytics for iot and cloud-based healthcare systems. IEEE Internet Comput. 22(2), 42\u201351 (2018)","journal-title":"IEEE Internet Comput."},{"key":"9246_CR60","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.physa.2017.01.087","volume":"475","author":"C Si","year":"2017","unstructured":"Si, C., Jiao, L., Wu, J., Zhao, J.: A group evolving-based framework with perturbations for link prediction. Physica A 475, 117\u2013128 (2017)","journal-title":"Physica A"},{"issue":"2","key":"9246_CR61","doi-asserted-by":"crossref","first-page":"167","DOI":"10.2307\/249477","volume":"20","author":"HJ Smith","year":"1996","unstructured":"Smith, H.J., Milberg, S.J., Burke, S.J.: Information privacy: measuring individuals\u2019 concerns about organizational practices. MIS Quarterly: Management Information Systems 20(2), 167\u2013196 (1996)","journal-title":"MIS Quarterly: Management Information Systems"},{"issue":"4","key":"9246_CR62","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.25300\/MISQ\/2013\/37.4.07","volume":"37","author":"J Sutanto","year":"2013","unstructured":"Sutanto, J., Palme, E., Tan, C.H., Phang, C.W.: Addressing the personalization-privacy paradox: an empirical assessment from a field experiment on smartphone users. Mis Quart. 37(4), 1141\u20131164 (2013)","journal-title":"Mis Quart."},{"key":"9246_CR63","unstructured":"The European Parliament and the Council of the European Union: Regulation (EU) 2016\/679 of the European Parliament and of the Council. Official Journal of the European Union, p. 1:88 (2016)"},{"key":"9246_CR64","doi-asserted-by":"crossref","unstructured":"Torre, I., Adorni, G., Koceva, F., Sanchez, O.: Preventing disclosure of personal data in iot networks. In: 12th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS), pp. 389\u2013396. IEEE (2016a)","DOI":"10.1109\/SITIS.2016.68"},{"key":"9246_CR65","doi-asserted-by":"crossref","unstructured":"Torre, I., Koceva, F., Sanchez, O.R., Adorni, G.: Fitness trackers and wearable devices: How to prevent inference risks? In: Proceedings of the 11th EAI International Conference on Body Area Networks, pp. 125\u2013131. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) (2016b)","DOI":"10.4108\/eai.15-12-2016.2267791"},{"key":"9246_CR66","doi-asserted-by":"crossref","unstructured":"Torre, I., Koceva, F., Sanchez, O.R., Adorni, G.: A framework for personal data protection in the iot. In: 11th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 384\u2013391. IEEE (2016c)","DOI":"10.1109\/ICITST.2016.7856735"},{"issue":"2","key":"9246_CR67","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/s00779-017-1068-3","volume":"22","author":"I Torre","year":"2018","unstructured":"Torre, I., Sanchez, O.R., Koceva, F., Adorni, G.: Supporting users to take informed decisions on privacy settings of personal devices. Pers. Ubiquit. Comput. 22(2), 345\u2013364 (2018)","journal-title":"Pers. Ubiquit. Comput."},{"key":"9246_CR68","unstructured":"Tsai, L., Wijesekera, P., Reardon, J., Reyes, I., Egelman, S., Wagner, D., Good, N., Chen, J.W.: Turtle guard: helping android users apply contextual privacy preferences. In: Symposium on Usable Privacy and Security (SOUPS) (2017)"},{"key":"9246_CR69","doi-asserted-by":"crossref","unstructured":"Vescovi, M., Moiso, C., Pasolli, M., Cordin, L., Antonelli, F.: Building an eco-system of trusted services via user control and transparency on personal data. In: IFIP International Conference on Trust Management, pp. 240\u2013250. Springer (2015)","DOI":"10.1007\/978-3-319-18491-3_20"},{"issue":"3","key":"9246_CR70","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MIC.2011.29","volume":"15","author":"CR Vicente","year":"2011","unstructured":"Vicente, C.R., Freni, D., Bettini, C., Jensen, C.S.: Location-related privacy in geo-social networks. IEEE Internet Comput. 15(3), 20\u201327 (2011)","journal-title":"IEEE Internet Comput."},{"issue":"18","key":"9246_CR71","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1163\/016918611X603800","volume":"25","author":"ML Walters","year":"2011","unstructured":"Walters, M.L., Lohse, M., Hanheide, M., Wrede, B., Syrdal, D.S., Koay, K.L., Green, A., H\u00fcttenrauch, H., Dautenhahn, K., Sagerer, G., et al.: Evaluating the robot personality and verbal behavior of domestic robots using video-based studies. Adv. Robot. 25(18), 2233\u20132254 (2011)","journal-title":"Adv. Robot."},{"key":"9246_CR72","doi-asserted-by":"crossref","unstructured":"Wijesekera, P., Baokar, A., Tsai, L., Reardon, J., Egelman, S., Wagner, D., Beznosov, K.: The feasibility of dynamically granted permissions: aligning mobile privacy with user preferences. In: IEEE Symposium on Security and Privacy (SP), pp. 1077\u20131093. IEEE (2017)","DOI":"10.1109\/SP.2017.51"},{"key":"9246_CR73","unstructured":"Wisniewski, P., Knijnenburg, B.P., Lipford, H.R.: Profiling facebook users privacy behaviors. In: SOUPS2014 Workshop on Privacy Personas and Segmentation (2014)"},{"key":"9246_CR74","unstructured":"Woods, S., Walters, M., Koay, K.L., Dautenhahn, K.: Comparing human robot interaction scenarios using live and video based methods: towards a novel methodological approach. In: 9th IEEE International Workshop on Advanced Motion Control, pp. 750\u2013755. IEEE (2006)"},{"issue":"6","key":"9246_CR75","doi-asserted-by":"crossref","first-page":"1240","DOI":"10.1109\/TKDE.2017.2663422","volume":"29","author":"L Wu","year":"2017","unstructured":"Wu, L., Ge, Y., Liu, Q., Chen, E., Hong, R., Du, J., Wang, M.: Modeling the evolution of users\u2019 preferences and social links in social networking services. IEEE Trans. Knowl. Data Eng. 29(6), 1240\u20131253 (2017)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"9246_CR76","doi-asserted-by":"crossref","unstructured":"Wu, L., Ge, Y., Liu, Q., Chen, E., Long, B., Huang, Z.: Modeling users\u2019 preferences and social links in social networking services: a joint-evolving perspective. In: Thirtieth AAAI Conference on Artificial Intelligence (2016)","DOI":"10.1609\/aaai.v30i1.9980"},{"key":"9246_CR77","doi-asserted-by":"crossref","unstructured":"Xie, J., Knijnenburg, B.P., Jin, H.: Location sharing privacy preference: analysis and personalized recommendation. In: Proceedings of the 19th international conference on Intelligent User Interfaces, pp. 189\u2013198. ACM (2014)","DOI":"10.1145\/2557500.2557504"},{"key":"9246_CR78","unstructured":"Xu, H., Dinev, T., Smith, H.J., Hart, P.: Examining the formation of individual\u2019s privacy concerns: toward an integrative view. In: ICIS 2008 Proceedings, p.\u00a06 (2008)"},{"key":"9246_CR79","unstructured":"Xu, H., Gupta, S., Rosson, M.B., Carroll, J.M.: Measuring mobile users\u2019 concerns for information privacy, Proc. of the Third International Conference on Information Systems, Orlando, pp. 2278\u20132293 (2012)"},{"issue":"3","key":"9246_CR80","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/s10796-012-9350-4","volume":"16","author":"Y Zhao","year":"2014","unstructured":"Zhao, Y., Zhu, Q.: Evaluation on crowdsourcing research: current status and future direction. Inf. Syst. Front. 16(3), 417\u2013434 (2014)","journal-title":"Inf. Syst. Front."},{"key":"9246_CR81","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Etemad, S.A., Arya, A.: Gamification of exercise and fitness using wearable activity trackers. In: Proceedings of the 10th International Symposium on Computer Science in Sports (ISCSS), pp. 233\u2013240. Springer (2016)","DOI":"10.1007\/978-3-319-24560-7_30"}],"container-title":["User Modeling and User-Adapted Interaction"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11257-019-09246-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11257-019-09246-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11257-019-09246-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T15:28:17Z","timestamp":1664638097000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11257-019-09246-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,12]]},"references-count":81,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["9246"],"URL":"https:\/\/doi.org\/10.1007\/s11257-019-09246-3","relation":{},"ISSN":["0924-1868","1573-1391"],"issn-type":[{"type":"print","value":"0924-1868"},{"type":"electronic","value":"1573-1391"}],"subject":[],"published":{"date-parts":[[2019,10,12]]},"assertion":[{"value":"23 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 September 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}