{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T10:33:04Z","timestamp":1770978784875,"version":"3.50.1"},"reference-count":28,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2018,4,24]],"date-time":"2018-04-24T00:00:00Z","timestamp":1524528000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2018,11,30]]},"abstract":"<jats:p>Online social networks provide an environment for their users to share content with others, where the user who shares a content item is put in charge, generally ignoring others that might be affected by it. However, a content that is shared by one user can very well violate the privacy of other users. To remedy this, ideally, all users who are related to a content should get a say in how the content should be shared. Recent approaches advocate the use of agreement technologies to enable stakeholders of a post to discuss the privacy configurations of a post. This allows related individuals to express concerns so that various privacy violations are avoided up front. Existing techniques try to establish an agreement on a single post. However, most of the time, agreement should be established over multiple posts such that the user can tolerate slight breaches of privacy in return of a right to share posts themselves in future interactions. As a result, users can help each other preserve their privacy, viewing this as their social responsibility. This article develops a reciprocity-based negotiation for reaching privacy agreements among users and introduces a negotiation architecture that combines semantic privacy rules with utility functions. We evaluate our approach over multiagent simulations with software agents that mimic users based on a user study.<\/jats:p>","DOI":"10.1145\/3158373","type":"journal-article","created":{"date-parts":[[2018,4,25]],"date-time":"2018-04-25T12:22:17Z","timestamp":1524658937000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Preserving Privacy as Social Responsibility in Online Social Networks"],"prefix":"10.1145","volume":"18","author":[{"given":"Dilara","family":"Kekulluoglu","sequence":"first","affiliation":[{"name":"Bogazici University, Istanbul, Turkey"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2653-6669","authenticated-orcid":false,"given":"Nadin","family":"Kokciyan","sequence":"additional","affiliation":[{"name":"King\u2019s College London, London, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pinar","family":"Yolum","sequence":"additional","affiliation":[{"name":"Bogazici University 8 Utrecht University, Utrecht, Netherlands"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2018,4,24]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Roland Benabou and Jean Tirole. 2010. Individual and corporate social responsibility. Economica 77 305 1--19.  Roland Benabou and Jean Tirole. 2010. Individual and corporate social responsibility. Economica 77 305 1--19.","DOI":"10.1111\/j.1468-0335.2009.00843.x"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2015.01.006"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897053.2897063"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2011.247109"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.geb.2005.03.001"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.2307\/2092623"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2019470.2019471"},{"key":"e_1_2_1_8_1","first-page":"79","article-title":"SWRL: A Semantic Web rule language combining OWL and RuleML","volume":"21","author":"Horrocks Ian","year":"2004","unstructured":"Ian Horrocks , Peter F. Patel-Schneider , Harold Boley , Said Tabet , Benjamin Grosof , and Mike Dean . 2004 . SWRL: A Semantic Web rule language combining OWL and RuleML . World Wide Web Consortium Member Submission 21 , 79 . Ian Horrocks, Peter F. Patel-Schneider, Harold Boley, Said Tabet, Benjamin Grosof, and Mike Dean. 2004. SWRL: A Semantic Web rule language combining OWL and RuleML. World Wide Web Consortium Member Submission 21, 79.","journal-title":"World Wide Web Consortium Member Submission"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.97"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970030.2970035"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970030.2970036"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3003434"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2583425"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/3171837.3171950"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/0049-089X(76)90003-X"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979420"},{"key":"e_1_2_1_17_1","volume-title":"McAuley","author":"Leskovec Jure","year":"2012","unstructured":"Jure Leskovec and Julian J . McAuley . 2012 . Learning to discover social circles in ego networks. In Advances in Neural Information Processing Systems 25, F. Pereira, C. J. C. Burges, L. Bottou, and K. Q. Weinberger (Eds.). Curran Associates, Red Hook, NY , 539--547. Jure Leskovec and Julian J. McAuley. 2012. Learning to discover social circles in ego networks. In Advances in Neural Information Processing Systems 25, F. Pereira, C. J. C. Burges, L. Bottou, and K. Q. Weinberger (Eds.). Curran Associates, Red Hook, NY, 539--547."},{"key":"e_1_2_1_18_1","first-page":"10","article-title":"OWL Web Ontology Language overview","volume":"10","author":"McGuinness Debora L.","year":"2004","unstructured":"Debora L. McGuinness and Frank van Harmelen ( Eds .). 2004 . OWL Web Ontology Language overview . World Wide Web Consortium Recommendation 10 , 10 . Debora L. McGuinness and Frank van Harmelen (Eds.). 2004. OWL Web Ontology Language overview. World Wide Web Consortium Recommendation 10, 10.","journal-title":"World Wide Web Consortium Recommendation"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24804-2_8"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cognition.2007.12.003"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1160633.1160703"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0097-8493(99)00120-X"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2007.03.004"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441865"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526780"},{"key":"e_1_2_1_26_1","volume-title":"Retrieved","author":"Stewart Margaret Gould","year":"2014","unstructured":"Margaret Gould Stewart . 2014 . How giant Websites design for you (and a billion others, too) . Retrieved March 13, 2018, from https:\/\/www.ted.com\/talks\/margaret_gould_stewart_how_giant_websites_design_for_you_and_a_billion_others_too. Margaret Gould Stewart. 2014. How giant Websites design for you (and a billion others, too). Retrieved March 13, 2018, from https:\/\/www.ted.com\/talks\/margaret_gould_stewart_how_giant_websites_design_for_you_and_a_billion_others_too."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2539165"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2821512"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3158373","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3158373","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:24Z","timestamp":1750212804000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3158373"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,24]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,11,30]]}},"alternative-id":["10.1145\/3158373"],"URL":"https:\/\/doi.org\/10.1145\/3158373","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,24]]},"assertion":[{"value":"2017-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-04-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}