{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T06:18:01Z","timestamp":1775283481738,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T00:00:00Z","timestamp":1559779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The Horizon 2020 project OPENREQ","award":["732463"],"award-info":[{"award-number":["732463"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,6]]},"DOI":"10.1145\/3314183.3324977","type":"proceedings-article","created":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T15:39:51Z","timestamp":1560353991000},"page":"93-98","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["User Interfaces for Counteracting Decision Manipulation in Group Recommender Systems"],"prefix":"10.1145","author":[{"given":"Thi Ngoc Trang","family":"Tran","sequence":"first","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Alexander","family":"Felfernig","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Viet Man","family":"Le","sequence":"additional","affiliation":[{"name":"Hue University, Hue, Vietnam"}]},{"given":"M\u00fcsl\u00fcm","family":"Atas","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Martin","family":"Stettinger","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]},{"given":"Ralph","family":"Samer","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Austria"}]}],"member":"320","published-online":{"date-parts":[[2019,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. Hawthorne effect. https:\/\/en.wikipedia.org\/wiki\/Hawthorne_effect  2018. Hawthorne effect. https:\/\/en.wikipedia.org\/wiki\/Hawthorne_effect"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1097047.1097061"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v31i4.2315"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1561\/1100000009"},{"key":"e_1_3_2_1_5_1","volume-title":"Group Recommender Systems: An Introduction","author":"Felfernig Alexander","unstructured":"Alexander Felfernig , M\u00fcsl\u00fcm Atas , Denis Helic , Trang T.N Tran , Martin Stettinger , and Ralph Samer . 2018. Group Recommender Systems: An Introduction . Springer , Chapter Algorithms for Group Recommendation, 27--58. Alexander Felfernig, M\u00fcsl\u00fcm Atas, Denis Helic, Trang T.N Tran, Martin Stettinger, and Ralph Samer. 2018. Group Recommender Systems: An Introduction. Springer, Chapter Algorithms for Group Recommendation, 27--58."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9364-9"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.02.013"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963772"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/989863.989869"},{"key":"e_1_3_2_1_10_1","unstructured":"Anthony Jameson Christopher Hackl Thomas Kleinbauer and Holm Presented. 2003. Evaluation of Automatically Designed Mechanisms.  Anthony Jameson Christopher Hackl Thomas Kleinbauer and Holm Presented. 2003. Evaluation of Automatically Designed Mechanisms."},{"key":"e_1_3_2_1_11_1","volume-title":"Recommendation to Groups","author":"Jameson Anthony","unstructured":"Anthony Jameson and Barry Smyth . 2007. Recommendation to Groups . Springer Berlin Heidelberg , Berlin, Heidelberg , 596--627. Anthony Jameson and Barry Smyth. 2007. Recommendation to Groups. Springer Berlin Heidelberg, Berlin, Heidelberg, 596--627."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2512208"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the Second International Conference on Social Informatics (SocInfo'10)","author":"Lang Juan","unstructured":"Juan Lang , Matt Spear , and S. Felix Wu . 2010. Social Manipulation of Online Recommender Systems . In Proceedings of the Second International Conference on Social Informatics (SocInfo'10) . Springer-Verlag, Berlin, Heidelberg, 125--139. Juan Lang, Matt Spear, and S. Felix Wu. 2010. Social Manipulation of Online Recommender Systems. In Proceedings of the Second International Conference on Social Informatics (SocInfo'10). Springer-Verlag, Berlin, Heidelberg, 125--139."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the International Conference of Soft Computing and Pattern Recognition (SoCPaR) (SoCPaR'11)","author":"Li Cong","unstructured":"Cong Li and Zhigang Luo . {n. d.}. Detection of shilling attacks in collaborative filtering recommender systems . In Proceedings of the International Conference of Soft Computing and Pattern Recognition (SoCPaR) (SoCPaR'11) . 190--193. Cong Li and Zhigang Luo. {n. d.}. Detection of shilling attacks in collaborative filtering recommender systems. In Proceedings of the International Conference of Soft Computing and Pattern Recognition (SoCPaR) (SoCPaR'11). 190--193."},{"key":"e_1_3_2_1_15_1","volume-title":"Anagnost","author":"McCarthy Joseph F.","year":"1998","unstructured":"Joseph F. McCarthy and Theodore D . Anagnost . 1998 . MUSICFX : An Arbiter of Group Preferences for Computer Supported Collaborative Workouts . Joseph F. McCarthy and Theodore D. Anagnost. 1998. MUSICFX: An Arbiter of Group Preferences for Computer Supported Collaborative Workouts."},{"key":"e_1_3_2_1_16_1","volume-title":"SPSS Survival Manual: A Step by Step Guide to Data Analysis Using SPSS for Windows Version 15","author":"Pallant Julie","unstructured":"Julie Pallant . 2007. SPSS Survival Manual: A Step by Step Guide to Data Analysis Using SPSS for Windows Version 15 ( 3 rd ed.). Open University Press , Milton Keynes, UK, USA . Julie Pallant. 2007. SPSS Survival Manual: A Step by Step Guide to Data Analysis Using SPSS for Windows Version 15 (3rd ed.). Open University Press, Milton Keynes, UK, USA.","edition":"3"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2013.2262769"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454008.1454033"},{"key":"e_1_3_2_1_19_1","volume-title":"Understanding the Hawthorne effect. BMJ 351","author":"Sedgwick Philip","year":"2015","unstructured":"Philip Sedgwick and Nan Greenwood . 2015. Understanding the Hawthorne effect. BMJ 351 ( 2015 ). Philip Sedgwick and Nan Greenwood. 2015. Understanding the Hawthorne effect. BMJ 351 (2015)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"W. Zhou J.Wen Y. S. Koh Q. Xiong M. Gao G. Dobbie and S. Alam. 2015. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis. PLoS ONE 10 (July 2015) e0130968.  W. Zhou J.Wen Y. S. Koh Q. Xiong M. Gao G. Dobbie and S. Alam. 2015. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis. PLoS ONE 10 (July 2015) e0130968.","DOI":"10.1371\/journal.pone.0130968"}],"event":{"name":"UMAP '19: 27th Conference on User Modeling, Adaptation and Personalization","location":"Larnaca Cyprus","acronym":"UMAP '19","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314183.3324977","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314183.3324977","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:22Z","timestamp":1750204402000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314183.3324977"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,6]]},"references-count":20,"alternative-id":["10.1145\/3314183.3324977","10.1145\/3314183"],"URL":"https:\/\/doi.org\/10.1145\/3314183.3324977","relation":{},"subject":[],"published":{"date-parts":[[2019,6,6]]},"assertion":[{"value":"2019-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}