Learning and Revising User Profiles: The Identification ofInteresting Web Sites
Machine Learning - Special issue on multistrategy learning
Representation of electronic mail filtering profiles: a user study
Proceedings of the 5th international conference on Intelligent user interfaces
Explaining collaborative filtering recommendations
CSCW '00 Proceedings of the 2000 ACM conference on Computer supported cooperative work
Getting to know you: learning new user preferences in recommender systems
Proceedings of the 7th international conference on Intelligent user interfaces
E-Commerce Recommendation Applications
Data Mining and Knowledge Discovery
Amazon.com Recommendations: Item-to-Item Collaborative Filtering
IEEE Internet Computing
Designing example-critiquing interaction
Proceedings of the 9th international conference on Intelligent user interfaces
IEEE Transactions on Knowledge and Data Engineering
Improving user-interface dependability through mitigation of human error
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Toward harnessing user feedback for machine learning
Proceedings of the 12th international conference on Intelligent user interfaces
Preference-based search using example-critiquing with suggestions
Journal of Artificial Intelligence Research
Capturing Social Networking Privacy Preferences
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Mixed-initiative security agents
Proceedings of the 2nd ACM workshop on Security and artificial intelligence
Hide and seek: location sharing practices with social media
Proceedings of the 12th international conference on Human computer interaction with mobile devices and services
Towards security policy decisions based on context profiling
Proceedings of the 3rd ACM workshop on Artificial intelligence and security
Process-based derivation of requirements for medical devices
Proceedings of the 1st ACM International Health Informatics Symposium
Jano: specification and enforcement of location privacy in mobile and pervasive environments
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing
Who's your best friend?: targeted privacy attacks In location-sharing social networks
Proceedings of the 13th international conference on Ubiquitous computing
Improving users' consistency when recalling location sharing preferences
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part I
ROAuth: recommendation based open authorization
Proceedings of the Seventh Symposium on Usable Privacy and Security
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
User Modeling and User-Adapted Interaction
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
Privacy manipulation and acclimation in a location sharing application
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Reconciling mobile app privacy and usability on smartphones: could user privacy profiles help?
Proceedings of the 23rd international conference on World wide web
Hi-index | 0.00 |
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have successfully been used to refine models of user preferences, such as in recommender systems, they are generally configured as "black boxes" that take control over the entire policy and severely restrict the ways in which the user can manipulate it. This article presents an alternative approach, referred to as user-controllable policy learning. It involves the incremental manipulation of policies in a context where system and user refine a common policy model. The user regularly provides feedback on decisions made based on the current policy. This feedback is used to identify (learn) incremental policy improvements which are presented as suggestions to the user. The user, in turn, can review these suggestions and decide which, if any, to accept. The incremental nature of the suggestions enhances usability, and because the user and the system manipulate a common policy representation, the user retains control and can still make policy modifications by hand. Results obtained using a neighborhood search implementation of this approach are presented in the context of data derived from the deployment of a friend finder application, where users can share their locations with others, subject to privacy policies they refine over time. We present results showing policy accuracy, which averages 60% upon initial definition by our users climbing as high as 90% using our technique.