{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T10:33:08Z","timestamp":1770978788413,"version":"3.50.1"},"reference-count":85,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Wallenberg AI, Autonomous Systems and Software Program (WASP) funded by the Knut and Alice Wallenberg Foundation"},{"name":"Knowledge Foundation of Sweden"},{"DOI":"10.13039\/501100014195","name":"Region V\u00e4rmland","doi-asserted-by":"crossref","award":["RUN\/230445"],"award-info":[{"award-number":["RUN\/230445"]}],"id":[{"id":"10.13039\/501100014195","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"crossref","award":["20365177"],"award-info":[{"award-number":["20365177"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Digital Health Innovation (DHINO 2) Project"},{"name":"Vinnova through the DigitalWell Arena Project","award":["2018-03025"],"award-info":[{"award-number":["2018-03025"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3609188","type":"journal-article","created":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T17:32:54Z","timestamp":1757611974000},"page":"160982-161002","source":"Crossref","is-referenced-by-count":2,"title":["AI-Driven Personalized Privacy Assistants: A Systematic Literature Review"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9482-8906","authenticated-orcid":false,"given":"Victor","family":"Morel","sequence":"first","affiliation":[{"name":"Chalmers University of Technology, Gothenburg, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9005-0543","authenticated-orcid":false,"given":"Leonardo Horn","family":"Iwaya","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology, Gothenburg, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6938-4466","authenticated-orcid":false,"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology, Gothenburg, Sweden"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"State of IoT 2024: Number of Connected IoT Devices Growing 13% to 18.8 Billion Globally","year":"2024"},{"key":"ref2","volume-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons With Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95\/46\/EC (General Data Protection Regulation)","year":"2016"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.12.001"},{"key":"ref4","volume-title":"Personalized privacy assistant","author":"Sadeh","year":"2021"},{"key":"ref5","volume-title":"Regulation (EU) 2024\/1689 of the European Parliament and of the Council of 13 June 2024 Laying Down Harmonised Rules on Artificial Intelligence and Amending Regulations (EC), no. 300\/2008, (EU), no. 167\/2013, (EU), no. 168\/2013, (EU) 2018\/858, (EU) 2018\/1139 and (EU) 2019\/2144 and Directives 2014\/90\/EU, (EU) 2016\/797 and (EU) 2020\/1828 (Artificial Intelligence Act) (Text With EEA Relevance)","year":"2024"},{"issue":"1","key":"ref6","first-page":"166","article-title":"Privacy and freedom","volume":"25","author":"Westin","year":"1970","journal-title":"Washington Lee Law Rev."},{"key":"ref7","volume-title":"Opinion 2\/2013: Apps on Smart Devices","year":"2013"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW55150.2022.00029"},{"key":"ref9","volume-title":"California Consumer Privacy Act of 2018","year":"2018"},{"key":"ref10","volume-title":"The Platform for Privacy Preferences 1.0 (P3P1. 0) Specification","volume":"16","author":"Cranor","year":"2002"},{"key":"ref11","volume-title":"Tracking Preference Expression (DNT)","year":"2019"},{"key":"ref12","volume-title":"Artificial Intelligence: A Modern Approach","author":"Russell","year":"2002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594069"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-57321-8_5","article-title":"Explainable reinforcement learning: A survey","volume-title":"Proc. Int. Cross-Domain Conf. Mach. Learn. Knowl. Extraction","author":"Puiutta"},{"key":"ref16","article-title":"Procedures for performing systematic reviews","author":"Kitchenham","year":"2004"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642591"},{"key":"ref18","first-page":"2893","article-title":"Automating cookie consent and GDPR violation detection","volume-title":"Proc. 31st USENIX Secur. Symp. (USENIX Secur.)","author":"Bollinger"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.62"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201262"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2557500.2557504"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IE.2015.18"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2700472"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2320729"},{"key":"ref26","first-page":"27","article-title":"Follow my recommendations: A personalized privacy assistant for mobile app permissions","volume-title":"Proc. 12th Symp. Usable Privacy Secur. (SOUPS)","author":"Liu"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2016.079"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-47874-6_28","article-title":"PPM: A privacy prediction model for online social networks","volume-title":"Proc. Int. Conf. Social Inform.","author":"Dong"},{"key":"ref29","first-page":"380","article-title":"An automated negotiation agent for permission management","volume-title":"Proc. 16th Int. Conf. Auton. Agents Multiagent Syst. (AAMAS)","author":"Baarslag"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.4180836"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/552"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.4180831"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54433-5_4"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.25"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367733"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422188"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173842"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787986"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3172944.3172982"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2018.23001"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3301293.3302356"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0066"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2019.00027"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOT.2019.00036"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44041-1_26"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI47803.2020.9308396"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57805-3_18"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2020.3020006"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-019-09246-3"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75075-6_54"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3074676"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-022-09579-1"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.3390\/info13040183"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/99"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3471187"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3514094.3534129"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3508398.3511526"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17140-6_8"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2021.3106056"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3561820"},{"key":"ref61","first-page":"2262","article-title":"Predicting privacy preferences for smart devices as norms","volume-title":"Proc. 22nd Int. Conf. Auto. Agents Multiagent Syst.","author":"Serramia"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/SPW63631.2024.00028"},{"key":"ref63","volume-title":"CAT Manager App","year":"2025"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-005-0021-6"},{"issue":"1","key":"ref65","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum","year":"2004","journal-title":"Wash. L. Rev."},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2024.3363829"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1017\/9781316831960.021"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW59978.2023.00017"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.10.007"},{"key":"ref71","article-title":"Sharing trustworthy AI models with privacy-enhancing technologies","year":"2025"},{"key":"ref72","article-title":"Papaya project-D3.3\u2014Complete specification and implementation of privacy preserving data analytics","author":"Canard","year":"2020"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1515\/9780691249643"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/s10550-006-0098-6"},{"key":"ref75","volume-title":"IFTTT\u2014Automate Business & Home","year":"2024"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.32"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2024-0081"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3300381"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3381611"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3706599.3719816"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-024-01331-9"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445148"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.4324\/9781315095080-17"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.2307\/3103715"},{"key":"ref85","volume-title":"Research Design: Qualitative, Quantitative, and Mixed Methods Approaches","author":"Creswell","year":"2017"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11159499.pdf?arnumber=11159499","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T04:39:55Z","timestamp":1758256795000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11159499\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":85,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3609188","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}