{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T16:55:29Z","timestamp":1768409729272,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,27]],"date-time":"2017-08-27T00:00:00Z","timestamp":1503792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,27]]},"DOI":"10.1145\/3109859.3109935","type":"proceedings-article","created":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T11:58:11Z","timestamp":1503575891000},"page":"394-395","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Privacy for Recommender Systems"],"prefix":"10.1145","author":[{"given":"Bart P.","family":"Knijnenburg","sequence":"first","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Shlomo","family":"Berkovsky","sequence":"additional","affiliation":[{"name":"CSIRO, Epping, Australia"}]}],"member":"320","published-online":{"date-parts":[[2017,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.163"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017284.2017287"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2792838.2800173"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.40"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830525"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipt005"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10799-005-5879-y"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1329125.1329345"},{"key":"e_1_3_2_1_10_1","volume-title":"Economics of Information Security and Privacy","author":"Compa\u00f1\u00f3 Ram\u00f3n","unstructured":"Ram\u00f3n Compa\u00f1\u00f3 and Wainer Lusoli . 2010. The Policy Maker's Anguish: Regulating Personal Data Behavior Between Paradoxes and Dilemmas . In Economics of Information Security and Privacy , Tyler Moore, David Pym and Christos Ioannidis (eds.). Springer US , New York, NY , 169--185. Ram\u00f3n Compa\u00f1\u00f3 and Wainer Lusoli. 2010. The Policy Maker's Anguish: Regulating Personal Data Behavior Between Paradoxes and Dilemmas. In Economics of Information Security and Privacy, Tyler Moore, David Pym and Christos Ioannidis (eds.). Springer US, New York, NY, 169--185."},{"key":"e_1_3_2_1_11_1","volume-title":"Knijnenburg","author":"Dong Cailing","year":"2016","unstructured":"Cailing Dong , Hongxia Jin , and Bart P . Knijnenburg . 2016 . PPM : A Privacy Prediction Model for Online Social Networks. In Social Informatics , 400--420. Cailing Dong, Hongxia Jin, and Bart P. Knijnenburg. 2016. PPM: A Privacy Prediction Model for Online Social Networks. In Social Informatics, 400--420."},{"key":"e_1_3_2_1_12_1","first-page":"1","article-title":"On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy","volume":"2","author":"Dwork Cynthia","year":"2008","unstructured":"Cynthia Dwork and Moni Naor . 2008 . On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy . Journal of Privacy and Confidentiality 2 , 1 . Cynthia Dwork and Moni Naor. 2008. On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy. Journal of Privacy and Confidentiality 2, 1.","journal-title":"Journal of Privacy and Confidentiality"},{"key":"e_1_3_2_1_13_1","volume-title":"Recommender Systems Handbook","author":"Friedman Arik","unstructured":"Arik Friedman , Bart P. Knijnenburg , Kris Vanhecke , Luc Martens , and Shlomo Berkovsky . 2015. Privacy Aspects of Recommender Systems . In Recommender Systems Handbook ( 2 nd ed.), Francesco Ricci, Lior Rokach and Bracha Shapira (eds.). Springer US , 649--688. Arik Friedman, Bart P. Knijnenburg, Kris Vanhecke, Luc Martens, and Shlomo Berkovsky. 2015. Privacy Aspects of Recommender Systems. In Recommender Systems Handbook (2nd ed.), Francesco Ricci, Lior Rokach and Bracha Shapira (eds.). Springer US, 649--688.","edition":"2"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1941487.1941498"},{"key":"e_1_3_2_1_15_1","volume-title":"A Survey of Consumer Privacy Attitudes and Behaviors. Harris Interactive","author":"Harris Interactive","unstructured":"Harris Interactive inc. 2000. A Survey of Consumer Privacy Attitudes and Behaviors. Harris Interactive , Inc., New York, NY. Retrieved from http:\/\/www.bbbonline.org\/UnderstandingPrivacy\/library\/harrissummary.pdf Harris Interactive inc. 2000. A Survey of Consumer Privacy Attitudes and Behaviors. Harris Interactive, Inc., New York, NY. Retrieved from http:\/\/www.bbbonline.org\/UnderstandingPrivacy\/library\/harrissummary.pdf"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869446.1869449"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Arjan J. P. Jeckmans Michael Beye Zekeriya Erkin Pieter Hartel Reginald L. Lagendijk and Quiang Tang. 2013. Privacy in Recommender Systems. In Social Media Retrieval Naeem Ramzan Roelof van Zwol Jong-Seok Lee Kai Cl\u00fcver and Xian-Sheng Hua (eds.). Springer.  Arjan J. P. Jeckmans Michael Beye Zekeriya Erkin Pieter Hartel Reginald L. Lagendijk and Quiang Tang. 2013. Privacy in Recommender Systems. In Social Media Retrieval Naeem Ramzan Roelof van Zwol Jong-Seok Lee Kai Cl\u00fcver and Xian-Sheng Hua (eds.). Springer.","DOI":"10.1007\/978-1-4471-4555-4_12"},{"key":"e_1_3_2_1_18_1","volume-title":"A user-tailored approach to privacy decision support","author":"Knijnenburg Bart P.","unstructured":"Bart P. Knijnenburg . 2015. A user-tailored approach to privacy decision support . University of California , Irvine, Irvine, CA . Bart P. Knijnenburg. 2015. A user-tailored approach to privacy decision support. University of California, Irvine, Irvine, CA."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499670"},{"key":"e_1_3_2_1_20_1","volume-title":"Counteracting the Negative Effect of Form Auto-completion on the Privacy Calculus. In ICIS 2013 Proceedings.","author":"Knijnenburg Bart P.","year":"2013","unstructured":"Bart P. Knijnenburg , Alfred Kobsa , and Hongxia Jin . 2013 . Counteracting the Negative Effect of Form Auto-completion on the Privacy Calculus. In ICIS 2013 Proceedings. Bart P. Knijnenburg, Alfred Kobsa, and Hongxia Jin. 2013. Counteracting the Negative Effect of Form Auto-completion on the Privacy Calculus. In ICIS 2013 Proceedings."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481369"},{"key":"e_1_3_2_1_22_1","volume-title":"The Adaptive Web: Methods and Strategies of Web Personalization","author":"Kobsa Alfred","year":"2079","unstructured":"Alfred Kobsa . 2007. Privacy-Enhanced Web Personalization . In The Adaptive Web: Methods and Strategies of Web Personalization , Peter Brusilovsky, Alfred Kobsa and Wolfgang Nejdl (eds.). Springer Verlag , Berlin\/Heidelberg\/ New York , 628--670. Retrieved from 10.1007\/978-3-540-7 2079 -9_21 Alfred Kobsa. 2007. Privacy-Enhanced Web Personalization. In The Adaptive Web: Methods and Strategies of Web Personalization, Peter Brusilovsky, Alfred Kobsa and Wolfgang Nejdl (eds.). Springer Verlag, Berlin\/Heidelberg\/New York, 628--670. Retrieved from 10.1007\/978-3-540-72079-9_21"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557102"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/767193.767196"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2792838.2800191"},{"key":"e_1_3_2_1_26_1","volume-title":"4th Intl. Workshop on Security and Social Networking, 340--345","author":"Madejski M.","unstructured":"M. Madejski , M. Johnson , and S. M. Bellovin . 2012. A study of privacy settings errors in an online social network . In 4th Intl. Workshop on Security and Social Networking, 340--345 . M. Madejski, M. Johnson, and S. M. Bellovin. 2012. A study of privacy settings errors in an online social network. In 4th Intl. Workshop on Security and Social Networking, 340--345."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2390231.2390245"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1743546.1743558"},{"key":"e_1_3_2_1_29_1","volume-title":"Recommendation of the Council Concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data","author":"OECD.","unstructured":"OECD. 1980. Recommendation of the Council Concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data . Organization for Economic Co-operation and Development . OECD. 1980. Recommendation of the Council Concerning Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data. Organization for Economic Co-operation and Development."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2003.11044341"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/4236.968832"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-009-9036-2"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-011-9110-z"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the CHI 2006 Workshop on Privacy-Enhanced Personalization, 44--46","author":"Wang Yang","year":"2006","unstructured":"Yang Wang and Alfred Kobsa . 2006 . Impacts of Privacy Laws and Regulations on Personalized Systems . In Proceedings of the CHI 2006 Workshop on Privacy-Enhanced Personalization, 44--46 . Yang Wang and Alfred Kobsa. 2006. Impacts of Privacy Laws and Regulations on Personalized Systems. In Proceedings of the CHI 2006 Workshop on Privacy-Enhanced Personalization, 44--46."},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the Usable Security Mini Conference","author":"Wilkinson Daricia","year":"2017","unstructured":"Daricia Wilkinson , Saadhika Sivakumar , David Cherry , Bart P. Knijnenburg , Elaine M. Raybourn , Pamela Wisniewski , and Henry Sloan . 2017 . User-Tailored Privacy by Design . In Proceedings of the Usable Security Mini Conference 2017. Daricia Wilkinson, Saadhika Sivakumar, David Cherry, Bart P. Knijnenburg, Elaine M. Raybourn, Pamela Wisniewski, and Henry Sloan. 2017. User-Tailored Privacy by Design. In Proceedings of the Usable Security Mini Conference 2017."}],"event":{"name":"RecSys '17: Eleventh ACM Conference on Recommender Systems","location":"Como Italy","acronym":"RecSys '17","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval","SIGecom Special Interest Group on Economics and Computation"]},"container-title":["Proceedings of the Eleventh ACM Conference on Recommender Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3109859.3109935","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3109859.3109935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:01Z","timestamp":1750217401000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3109859.3109935"}},"subtitle":["Tutorial Abstract"],"short-title":[],"issued":{"date-parts":[[2017,8,27]]},"references-count":35,"alternative-id":["10.1145\/3109859.3109935","10.1145\/3109859"],"URL":"https:\/\/doi.org\/10.1145\/3109859.3109935","relation":{},"subject":[],"published":{"date-parts":[[2017,8,27]]},"assertion":[{"value":"2017-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}