{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T21:02:31Z","timestamp":1773176551749,"version":"3.50.1"},"reference-count":54,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/rcis.2017.7956539","type":"proceedings-article","created":{"date-parts":[[2017,6,26]],"date-time":"2017-06-26T16:35:56Z","timestamp":1498494956000},"page":"211-220","source":"Crossref","is-referenced-by-count":24,"title":["Towards an ethical recommendation framework"],"prefix":"10.1109","author":[{"given":"Dimitris","family":"Paraschakis","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04592-9_101"},{"key":"ref38","author":"rishabh","year":"0","journal-title":"When recommendation systems go bad"},{"key":"ref33","article-title":"Broken promises of privacy: Responding to the surprising failure of anonymization","volume":"57","author":"ohm","year":"2009","journal-title":"UCLA Law Review"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1177\/2053951715608876"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/SP.2008.33","article-title":"Robust de-anonymization of large sparse datasets","author":"narayanan","year":"2008","journal-title":"Proceedings of the 2008 IEEE Symposium on Security and Privacy"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/4236.968832"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.14763\/2014.4.338","article-title":"Staking out the unclear ethical terrain of online social experiments","author":"puschmann","year":"2014","journal-title":"Internet Policy Review"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250993"},{"key":"ref34","article-title":"The black box society. The secret algorithms that control money and information","author":"pasquale","year":"2015","journal-title":"Harvard University Press"},{"key":"ref28","article-title":"The cost of reading privacy policies","author":"mcdonald","year":"2008","journal-title":"I\/S - A Journal of Law and Policy for the Information Society"},{"key":"ref27","first-page":"129","article-title":"A conceptual model of personalized pricing recommender system based on customer online behavior","volume":"12","author":"massoud","year":"2012","journal-title":"International Journal of Computer Science & Network Security"},{"key":"ref29","author":"metcalf","year":"2015","journal-title":"Letter on proposed changes to the common rule"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2449396.2449405"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3386\/w23089"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/358916.358995"},{"key":"ref22","first-page":"40","article-title":"Simplifying privacy decisions: Towards interactive and adaptive solutions","author":"knijnenburg","year":"2013","journal-title":"Decisions RecSys"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2039320.2039329"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18609-2_10"},{"key":"ref23","author":"knijnenburg","year":"2015","journal-title":"A User-Tailored Approach to Privacy Decision Support"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063943"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30487-3_14"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73078-1_19"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2792838.2800178"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2040275"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/080321"},{"key":"ref10","article-title":"Algorithmic accountability reporting: On the investigation of black boxes","author":"diakopoulos","year":"2014","journal-title":"Tow Center for Digital Journalism A Tow\/Knight Brief"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref40","author":"rohle","year":"0","journal-title":"Desperately seeking the consumer Personalized search engines and the commercial exploitation of user data"},{"key":"ref12","year":"0","journal-title":"Big Data Seizing opportunities preserving values"},{"key":"ref13","first-page":"223","article-title":"Techniques for discrimination-free predictive models","author":"faisal","year":"2013","journal-title":"Discrimination and Privacy in the Information Society"},{"key":"ref14","author":"felten","year":"0","journal-title":"On the ethics of A\/B testing"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7637-6_19"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1093\/0195173716.001.0001"},{"key":"ref17","article-title":"Illegal, immoral, and mood-altering","author":"grimmelmann","year":"0","journal-title":"How Facebook and OKCupid broke the law when they experimented on users"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663744"},{"key":"ref19","first-page":"76","article-title":"Using linked data to build open, collaborative recommender systems","author":"heitmann","year":"2010","journal-title":"AAAI Spring Symposium Linked Data Meets Artificial Intelligence"},{"key":"ref4","first-page":"16","article-title":"Examining users&#x2019; attitude towards privacy preserving collaborative filtering","author":"berkovsky","year":"2007","journal-title":"Proc DMR"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107590205.004"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1177\/2053951715622512"},{"key":"ref5","first-page":"805","article-title":"Robust collaborative recommendation","author":"burke","year":"2010","journal-title":"Recommender Systems Handbook"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2209310.2209314"},{"key":"ref7","author":"chaslot","year":"0","journal-title":"Does Youtubes A I favor Trump and fake news?"},{"key":"ref49","author":"valentino-devries","year":"0","journal-title":"Websites vary prices deals based on users&#x2019; information"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-012-0389-1"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1080\/13614568.2015.1091040"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref48","first-page":"479","article-title":"Designing and evaluating explanations for recommender systems","author":"tintarev","year":"2010","journal-title":"Recommender Systems Handbook"},{"key":"ref47","article-title":"Ethics and technology: Controversies, questions and strategies for ethical computing","author":"tavani","year":"2015","journal-title":"Wiley"},{"key":"ref42","article-title":"Auditing algorithms: Research methods for detecting discrimination on internet platforms","author":"sandvig","year":"2014","journal-title":"Pre-conference of the 64th annual meeting of the International Communication Association"},{"key":"ref41","first-page":"64","article-title":"Do research ethics need updating for the digital age?","volume":"45","author":"ross","year":"2014","journal-title":"Monit Psychol"},{"key":"ref44","article-title":"Uniqueness of simple demographics in the U.S. population","author":"sweeney","year":"2000","journal-title":"Technical Report"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCS.2011.5945631"}],"event":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","location":"Brighton, United Kingdom","start":{"date-parts":[[2017,5,10]]},"end":{"date-parts":[[2017,5,12]]}},"container-title":["2017 11th International Conference on Research Challenges in Information Science (RCIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7951529\/7956506\/07956539.pdf?arnumber=7956539","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,10]],"date-time":"2020-10-10T18:41:17Z","timestamp":1602355277000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7956539\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/rcis.2017.7956539","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}