{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:09:05Z","timestamp":1763017745137,"version":"3.43.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/percom.2017.7917874","type":"proceedings-article","created":{"date-parts":[[2017,5,4]],"date-time":"2017-05-04T16:32:17Z","timestamp":1493915537000},"page":"276-285","source":"Crossref","is-referenced-by-count":46,"title":["Privacy preference modeling and prediction in a simulated campuswide IoT environment"],"prefix":"10.1109","author":[{"given":"Hosub","family":"Lee","sequence":"first","affiliation":[{"name":"Donald Bren School of Information and Computer Sciences, University of California, Irvine, USA"}]},{"given":"Alfred","family":"Kobsa","sequence":"additional","affiliation":[{"name":"Donald Bren School of Information and Computer Sciences, University of California, Irvine, USA"}]}],"member":"263","reference":[{"key":"ref33","first-page":"403","article-title":"Inter-rater agreement","author":"altman","year":"1990","journal-title":"Practical Statistics for Medical Research"},{"journal-title":"CTree party Conditional Inference Trees CRAN repository","year":"0","author":"hothorn","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1198\/106186006X133933"},{"journal-title":"Statistical Power Analysis for the Behavioral Sciences (Revised ed )","year":"1977","author":"cohen","key":"ref30"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74796-3_61"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.019"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8090-5_13"},{"key":"ref10","first-page":"1880","article-title":"Privacy self-management and the consent dilemma","volume":"126","author":"solove","year":"2013","journal-title":"Harvard Law Review"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1654988.1654991"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0214-3"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"key":"ref14","article-title":"Predicting location-sharing privacy preferences in social network applications","author":"bigwood","year":"2012","journal-title":"Proc AwareCast Newcastle"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493510"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4108\/icst.mobiquitous.2014.258017"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2015.01.006"},{"key":"ref18","first-page":"27","article-title":"Follow my recommendations: A personalized privacy assistant for mobile app permissions","author":"liu","year":"2016","journal-title":"Proc 12th Symposium on Usable Privacy and Security (SOUPS 2016)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/765891.765952"},{"journal-title":"kmodes klaR K-Modes Clustering CRAN repository","year":"0","author":"neumann","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2312291"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009769707641"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.06.073"},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.9790\/3021-0204719725","article-title":"An overview on clustering methods","author":"madhulatha","year":"2012"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1674-7_38"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2638728.2641688"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4236\/ait.2013.32003"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.02.016"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.aaa1465","article-title":"Privacy and human behavior in the age of information","volume":"347","author":"acquisti","year":"2015","journal-title":"Science"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030118"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/019722498128700"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-010-0346-0"},{"key":"ref24","first-page":"679","author":"chow","year":"2015","journal-title":"HCI in Business A collaboration with academia in IoT privacy &#x201D; HCI in Business"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"ref26","first-page":"1","author":"huang","year":"1997","journal-title":"A fast clustering algorithm to cluster very large categorical data sets in data mining &#x201D; in Research Issues on Data Mining and Knowledge Discovery Tucson"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845392"}],"event":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications (PerCom)","start":{"date-parts":[[2017,3,13]]},"location":"Kona, HI, USA","end":{"date-parts":[[2017,3,17]]}},"container-title":["2017 IEEE International Conference on Pervasive Computing and Communications (PerCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7911029\/7917840\/07917874.pdf?arnumber=7917874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T17:29:19Z","timestamp":1755106159000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7917874\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/percom.2017.7917874","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}