{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T08:02:14Z","timestamp":1773734534876,"version":"3.50.1"},"reference-count":45,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T00:00:00Z","timestamp":1631577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Hybrid Intelligence Center"},{"name":"Dutch Ministry of Education, Culture and Science through the Netherlands Organisation for Scientific Research","award":["024.004.022"],"award-info":[{"award-number":["024.004.022"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2022,2,28]]},"abstract":"<jats:p>Privacy is the right of individuals to keep personal information to themselves. When individuals use online systems, they should be given the right to decide what information they would like to share and what to keep private. When a piece of information pertains only to a single individual, preserving privacy is possible by providing the right access options to the user. However, when a piece of information pertains to multiple individuals, such as a picture of a group of friends or a collaboratively edited document, deciding how to share this information and with whom is challenging. The problem becomes more difficult when the individuals who are affected by the information have different, possibly conflicting privacy constraints. Resolving this problem requires a mechanism that takes into account the relevant individuals\u2019 concerns to decide on the privacy configuration of information. Because these decisions need to be made frequently (i.e., per each piece of shared content), the mechanism should be automated. This article presents a personal assistant to help end-users with managing the privacy of their content. When some content that belongs to multiple users is about to be shared, the personal assistants of the users employ an auction-based privacy mechanism to regulate the privacy of the content. To do so, each personal assistant learns the preferences of its user over time and produces bids accordingly. Our proposed personal assistant is capable of assisting users with different personas and thus ensures that people benefit from it as they need it. Our evaluations over multiagent simulations with online social network content show that our proposed personal assistant enables privacy-respecting content sharing.<\/jats:p>","DOI":"10.1145\/3471187","type":"journal-article","created":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T16:03:26Z","timestamp":1631635406000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["PANOLA: A Personal Assistant for Supporting Users in Preserving Privacy"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3737-7947","authenticated-orcid":false,"given":"Onuralp","family":"Ulusoy","sequence":"first","affiliation":[{"name":"Utrecht University, Princetonplein, Utrecht, The Netherlands"}]},{"given":"Pinar","family":"Yolum","sequence":"additional","affiliation":[{"name":"Utrecht University, Princetonplein, Utrecht, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2021,9,14]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Privacy and human behavior in the age of information. Science 347, 6221","author":"Acquisti Alessandro","year":"2015","unstructured":"Alessandro Acquisti , Laura Brandimarte , and George Loewenstein . 2015. Privacy and human behavior in the age of information. Science 347, 6221 ( 2015 ), 509\u2013514. Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347, 6221 (2015), 509\u2013514."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/3304415.3304421"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/3398761.3398769"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2016.079"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.osnem.2018.02.001"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025696116075"},{"key":"e_1_2_1_7_1","volume-title":"Big Data Security and Privacy","author":"Bertino Elisa","unstructured":"Elisa Bertino and Elena Ferrari . 2018. Big Data Security and Privacy . Springer International Publishing , Cham , 425\u2013439. Elisa Bertino and Elena Ferrari. 2018. Big Data Security and Privacy. Springer International Publishing, Cham, 425\u2013439."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897053.2897063"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01726210"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376389"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390187"},{"key":"e_1_2_1_12_1","volume-title":"Confidence interval or p-value?: Part 4 of a series on evaluation of scientific publications. Deutsches \u00c4rzteblatt International 106, 19","author":"Du\u00a0Prel Jean-Baptist","year":"2009","unstructured":"Jean-Baptist Du\u00a0Prel , Gerhard Hommel , Bernd R\u00f6hrig , and Maria Blettner . 2009. Confidence interval or p-value?: Part 4 of a series on evaluation of scientific publications. Deutsches \u00c4rzteblatt International 106, 19 ( 2009 ), 335. Jean-Baptist Du\u00a0Prel, Gerhard Hommel, Bernd R\u00f6hrig, and Maria Blettner. 2009. Confidence interval or p-value?: Part 4 of a series on evaluation of scientific publications. Deutsches \u00c4rzteblatt International 106, 19 (2009), 335."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858214"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1865675.1865703"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038920"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943539"},{"key":"e_1_2_1_18_1","unstructured":"Seda Gurses Carmela Troncoso and Claudia Diaz. 2011. Engineering privacy by design. In Computers Privacy & Data Protection. 25\u00a0pages. Seda Gurses Carmela Troncoso and Claudia Diaz. 2011. Engineering privacy by design. In Computers Privacy & Data Protection. 25\u00a0pages."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.97"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158373"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1257\/pandp.20181018"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207728"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3003434"},{"key":"e_1_2_1_24_1","volume-title":"Privacy indexes: A survey of Westin\u2019s studies","author":"Kumaraguru Ponnurangam","year":"2005","unstructured":"Ponnurangam Kumaraguru and Lorrie\u00a0Faith Cranor . 2005. Privacy indexes: A survey of Westin\u2019s studies . 2005 . Available as ISRI Technical Report CMU-ISRI-05-138 (2005). Ponnurangam Kumaraguru and Lorrie\u00a0Faith Cranor. 2005. Privacy indexes: A survey of Westin\u2019s studies. 2005. Available as ISRI Technical Report CMU-ISRI-05-138 (2005)."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979420"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/647987.741336"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/3398761.3399124"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3146025"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.88"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983644"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2320729"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526780"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1995966.1996000"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2539165"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3208039"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2821512"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/3312046"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/3091529.3091572"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/3237383.3238086"},{"key":"e_1_2_1_40_1","volume-title":"Multi-Agent Systems and Agreement Technologies, Nick Bassiliades, Georgios Chalkiadakis, and Dave de\u00a0Jonge (Eds.)","author":"Ulusoy Onuralp","unstructured":"Onuralp Ulusoy and P\u0131nar Yolum . 2020. Agents for preserving privacy: Learning and decision making collaboratively . In Multi-Agent Systems and Agreement Technologies, Nick Bassiliades, Georgios Chalkiadakis, and Dave de\u00a0Jonge (Eds.) . Springer International Publishing , 116\u2013131. Onuralp Ulusoy and P\u0131nar Yolum. 2020. Agents for preserving privacy: Learning and decision making collaboratively. In Multi-Agent Systems and Agreement Technologies, Nick Bassiliades, Georgios Chalkiadakis, and Dave de\u00a0Jonge (Eds.). Springer International Publishing, 116\u2013131."},{"key":"e_1_2_1_41_1","volume-title":"Advances in Automated Negotiations","author":"Ulusoy Onuralp","unstructured":"Onuralp Ulusoy and P\u0131nar Yolum . 2020. Collaborative privacy management with auctioning mechanisms . In Advances in Automated Negotiations . Springer Singapore , Singapore , 45\u201362. Onuralp Ulusoy and P\u0131nar Yolum. 2020. Collaborative privacy management with auctioning mechanisms. In Advances in Automated Negotiations. Springer Singapore, Singapore, 45\u201362."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3381991.3395601"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.230"},{"key":"e_1_2_1_44_1","doi-asserted-by":"crossref","first-page":"301","DOI":"10.55782\/ane-1995-1090","article-title":"Two components of long-term memory","volume":"55","author":"Wo\u017aniak A.","year":"1995","unstructured":"Piotr\u00a0 A. Wo\u017aniak , Edward\u00a0 J. Gorzela\u0144czyk , and Janusz\u00a0 A. Murakowski . 1995 . Two components of long-term memory . Acta Neurobiologiae Experimentalis 55 , 4 (1995), 301 \u2014 305 . Piotr\u00a0A. Wo\u017aniak, Edward\u00a0J. Gorzela\u0144czyk, and Janusz\u00a0A. Murakowski. 1995. Two components of long-term memory. Acta Neurobiologiae Experimentalis 55, 4 (1995), 301\u2014305.","journal-title":"Acta Neurobiologiae Experimentalis"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3269329"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471187","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3471187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:30Z","timestamp":1750268970000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471187"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,14]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2,28]]}},"alternative-id":["10.1145\/3471187"],"URL":"https:\/\/doi.org\/10.1145\/3471187","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,14]]},"assertion":[{"value":"2020-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}