Search Results - "Such, Jose M."

Refine Results
  1. 1

    Implicit Contextual Integrity in Online Social Networks by Criado, Natalia, Such, Jose M.

    Published in Information sciences (20-12-2015)
    “…Many real incidents demonstrate that users of Online Social Networks need mechanisms that help them manage their interactions by increasing the awareness of…”
    Get full text
    Journal Article
  2. 2

    Tie and tag: A study of tie strength and tags for photo sharing by L Fogues, Ricard, Such, Jose M, Espinosa, Agustin, Garcia-Fornes, Ana

    Published in PloS one (29-08-2018)
    “…Tie strength and tags have been separately suggested as possible attributes for photo access controls in Social Network Services. However, an evaluation is…”
    Get full text
    Journal Article
  3. 3

    Resolving Multi-Party Privacy Conflicts in Social Media by Such, Jose M., Criado, Natalia

    “…Items shared through Social Media may affect more than one user's privacy-e.g., photos that depict multiple users, comments that mention multiple users, events…”
    Get full text
    Journal Article
  4. 4

    Transparency for Whom? Assessing Discriminatory Artificial Intelligence by van Nuenen, Tom, Ferrer, Xavier, Such, Jose M., Cote, Mark

    Published in Computer (Long Beach, Calif.) (01-11-2020)
    “…Artificial intelligence decision making can cause discriminatory harm to many vulnerable groups. Redress is often suggested through increased transparency of…”
    Get full text
    Journal Article
  5. 5

    How Socially Aware Are Social Media Privacy Controls? by Misra, Gaurav, Such, Jose M.

    Published in Computer (Long Beach, Calif.) (01-03-2016)
    “…Social media sites are key mediators of online communication. Yet the privacy controls for these sites are not fully socially aware, even when privacy…”
    Get full text
    Journal Article
  6. 6

    Basic Cyber Hygiene: Does It Work? by Such, Jose M., Ciholas, Pierre, Rashid, Awais, Vidler, John, Seabrook, Timothy

    Published in Computer (Long Beach, Calif.) (01-04-2019)
    “…A number of security certifications for small- and medium-size enterprises have been proposed, but how effective are these schemes? We evaluated the…”
    Get full text
    Journal Article
  7. 7

    Information assurance techniques: Perceived cost effectiveness by Such, Jose M., Gouglidis, Antonios, Knowles, William, Misra, Gaurav, Rashid, Awais

    Published in Computers & security (01-07-2016)
    “…The assurance technique is a fundamental component of the assurance ecosystem; it is the mechanism by which we assess security to derive a measure of…”
    Get full text
    Journal Article
  8. 8

    Open Challenges in Relationship-Based Privacy Mechanisms for Social Network Services by Fogues, Ricard, Such, Jose M., Espinosa, Agustin, Garcia-Fornes, Ana

    “…Social networking services (SNSs) such as Facebook and Twitter have experienced explosive growth during the few past years. Millions of users have created…”
    Get full text
    Journal Article
  9. 9

    All That Glitters Is Not Gold: On the Effectiveness of Cybersecurity Qualifications by Knowles, William, Such, Jose M., Gouglidis, Antonios, Misra, Gaurav, Rashid, Awais

    Published in Computer (Long Beach, Calif.) (01-12-2017)
    “…Do today's certification qualifications effectively assess cybersecurity professionals' core competencies? Five distinct techniques for identifying…”
    Get full text
    Journal Article
  10. 10

    Norm Monitoring Under Partial Action Observability by Criado, Natalia, Such, Jose M.

    Published in IEEE transactions on cybernetics (01-02-2017)
    “…In the context of using norms for controlling multiagent systems, a vitally important question that has not yet been addressed in the literature is the…”
    Get full text
    Journal Article
  11. 11

    BFF: A tool for eliciting tie strength and user communities in social networking services by Fogués, Ricard L., Such, Jose M., Espinosa, Agustin, Garcia-Fornes, Ana

    Published in Information systems frontiers (01-04-2014)
    “…The use of social networking services (SNSs) such as Facebook has explosively grown in the last few years. Users see these SNSs as useful tools to find friends…”
    Get full text
    Journal Article
  12. 12

    Self-disclosure decision making based on intimacy and privacy by Such, Jose M., Espinosa, Agustín, García-Fornes, Ana, Sierra, Carles

    Published in Information sciences (30-11-2012)
    “…Autonomous agents may encapsulate their principals’ personal data attributes. These attributes may be disclosed to other agents during agent interactions,…”
    Get full text
    Journal Article
  13. 13

    Attesting Digital Discrimination Using Norms by Criado, Natalia, Ferrer, Xavier, Such, Jose M

    “…More and more decisions are delegated to Machine Learning (ML) and automatic decision systems recently. Despite initial misconceptions considering these…”
    Get full text
    Journal Article
  14. 14

    Partial identities as a foundation for trust and reputation by Such, Jose M., Espinosa, Agustin, Garcia-Fornes, Ana, Botti, Vicent

    “…This paper explores the relationships between the hard security concepts of identity and privacy on the one hand, and the soft security concepts of trust and…”
    Get full text
    Journal Article
  15. 15

    Magentix2: A privacy-enhancing Agent Platform by Such, Jose M., García-Fornes, Ana, Espinosa, Agustín, Bellver, Joan

    “…Agent Platforms are the software that supports the development and execution of Multi-agent Systems. There are many Agent Platforms developed by the agent…”
    Get full text
    Journal Article
  16. 16

    Automated buyer profiling control based on human privacy attitudes by Such, Jose M., Garcia-Fornes, Ana, Botti, Vicent

    “…•We present a novel automated buyer profiling control mechanism.•It is based on pseudonym changes performed according to human privacy attitudes.•Agents…”
    Get full text
    Journal Article
  17. 17

    Advances in infrastructures and tools for multiagent systems by Alberola, Juan M., Botti, Vicent, Such, Jose M.

    Published in Information systems frontiers (01-04-2014)
    “…Issue Title: Advances in infrastructures and tools for multiagent systems In the last few years, information system technologies have focused on solving…”
    Get full text
    Journal Article
  18. 18

    Strategies for avoiding preference profiling in agent-based e-commerce environments by Serrano, Emilio, Such, Jose M., Botía, Juan A., García-Fornes, Ana

    “…Agent-based electronic commerce is known to offer many advantages to users. However, very few studies have been devoted to deal with privacy issues in this…”
    Get full text
    Journal Article
  19. 19

    A group-oriented secure multiagent platform by Such, Jose M., Alberola, Juan M., Espinosa, Agustin, Garcia-Fornes, Ana

    Published in Software, practice & experience (01-10-2011)
    “…Security is becoming a major concern in multiagent systems, since an agent's incorrect or inappropriate behaviour may cause non‐desired effects, such as money…”
    Get full text
    Journal Article
  20. 20

    A performance evaluation of three multiagent platforms by Alberola, Juan M., Such, Jose M., Garcia-Fornes, Ana, Espinosa, Agustin, Botti, Vicent

    Published in The Artificial intelligence review (01-08-2010)
    “…In the last few years, many researchers have focused on testing the performance of Multiagent Platforms. Results obtained show a lack of performance and…”
    Get full text
    Journal Article