Search Results - "Such, Jose M."
-
1
Implicit Contextual Integrity in Online Social Networks
Published in Information sciences (20-12-2015)“…Many real incidents demonstrate that users of Online Social Networks need mechanisms that help them manage their interactions by increasing the awareness of…”
Get full text
Journal Article -
2
Tie and tag: A study of tie strength and tags for photo sharing
Published in PloS one (29-08-2018)“…Tie strength and tags have been separately suggested as possible attributes for photo access controls in Social Network Services. However, an evaluation is…”
Get full text
Journal Article -
3
Resolving Multi-Party Privacy Conflicts in Social Media
Published in IEEE transactions on knowledge and data engineering (01-07-2016)“…Items shared through Social Media may affect more than one user's privacy-e.g., photos that depict multiple users, comments that mention multiple users, events…”
Get full text
Journal Article -
4
Transparency for Whom? Assessing Discriminatory Artificial Intelligence
Published in Computer (Long Beach, Calif.) (01-11-2020)“…Artificial intelligence decision making can cause discriminatory harm to many vulnerable groups. Redress is often suggested through increased transparency of…”
Get full text
Journal Article -
5
How Socially Aware Are Social Media Privacy Controls?
Published in Computer (Long Beach, Calif.) (01-03-2016)“…Social media sites are key mediators of online communication. Yet the privacy controls for these sites are not fully socially aware, even when privacy…”
Get full text
Journal Article -
6
Basic Cyber Hygiene: Does It Work?
Published in Computer (Long Beach, Calif.) (01-04-2019)“…A number of security certifications for small- and medium-size enterprises have been proposed, but how effective are these schemes? We evaluated the…”
Get full text
Journal Article -
7
Information assurance techniques: Perceived cost effectiveness
Published in Computers & security (01-07-2016)“…The assurance technique is a fundamental component of the assurance ecosystem; it is the mechanism by which we assess security to derive a measure of…”
Get full text
Journal Article -
8
Open Challenges in Relationship-Based Privacy Mechanisms for Social Network Services
Published in International journal of human-computer interaction (04-05-2015)“…Social networking services (SNSs) such as Facebook and Twitter have experienced explosive growth during the few past years. Millions of users have created…”
Get full text
Journal Article -
9
All That Glitters Is Not Gold: On the Effectiveness of Cybersecurity Qualifications
Published in Computer (Long Beach, Calif.) (01-12-2017)“…Do today's certification qualifications effectively assess cybersecurity professionals' core competencies? Five distinct techniques for identifying…”
Get full text
Journal Article -
10
Norm Monitoring Under Partial Action Observability
Published in IEEE transactions on cybernetics (01-02-2017)“…In the context of using norms for controlling multiagent systems, a vitally important question that has not yet been addressed in the literature is the…”
Get full text
Journal Article -
11
BFF: A tool for eliciting tie strength and user communities in social networking services
Published in Information systems frontiers (01-04-2014)“…The use of social networking services (SNSs) such as Facebook has explosively grown in the last few years. Users see these SNSs as useful tools to find friends…”
Get full text
Journal Article -
12
Self-disclosure decision making based on intimacy and privacy
Published in Information sciences (30-11-2012)“…Autonomous agents may encapsulate their principals’ personal data attributes. These attributes may be disclosed to other agents during agent interactions,…”
Get full text
Journal Article -
13
Attesting Digital Discrimination Using Norms
Published in International journal of interactive multimedia and artificial intelligence (01-03-2021)“…More and more decisions are delegated to Machine Learning (ML) and automatic decision systems recently. Despite initial misconceptions considering these…”
Get full text
Journal Article -
14
Partial identities as a foundation for trust and reputation
Published in Engineering applications of artificial intelligence (01-10-2011)“…This paper explores the relationships between the hard security concepts of identity and privacy on the one hand, and the soft security concepts of trust and…”
Get full text
Journal Article -
15
Magentix2: A privacy-enhancing Agent Platform
Published in Engineering applications of artificial intelligence (01-01-2013)“…Agent Platforms are the software that supports the development and execution of Multi-agent Systems. There are many Agent Platforms developed by the agent…”
Get full text
Journal Article -
16
Automated buyer profiling control based on human privacy attitudes
Published in Electronic commerce research and applications (01-11-2013)“…•We present a novel automated buyer profiling control mechanism.•It is based on pseudonym changes performed according to human privacy attitudes.•Agents…”
Get full text
Journal Article -
17
Advances in infrastructures and tools for multiagent systems
Published in Information systems frontiers (01-04-2014)“…Issue Title: Advances in infrastructures and tools for multiagent systems In the last few years, information system technologies have focused on solving…”
Get full text
Journal Article -
18
Strategies for avoiding preference profiling in agent-based e-commerce environments
Published in Applied intelligence (Dordrecht, Netherlands) (2014)“…Agent-based electronic commerce is known to offer many advantages to users. However, very few studies have been devoted to deal with privacy issues in this…”
Get full text
Journal Article -
19
A group-oriented secure multiagent platform
Published in Software, practice & experience (01-10-2011)“…Security is becoming a major concern in multiagent systems, since an agent's incorrect or inappropriate behaviour may cause non‐desired effects, such as money…”
Get full text
Journal Article -
20
A performance evaluation of three multiagent platforms
Published in The Artificial intelligence review (01-08-2010)“…In the last few years, many researchers have focused on testing the performance of Multiagent Platforms. Results obtained show a lack of performance and…”
Get full text
Journal Article