Internet Technology (TOIT)


Search Issue
enter search term and/or author name


ACM Transactions on Internet Technology (TOIT), Volume 18 Issue 4, July 2018

Section: Special Issue on Computational Ethics and Accountability

Special Issue: Computational Ethics and Accountability
Cristina Baroglio, Olivier Boissier, Axel Polleres
Article No.: 40
DOI: 10.1145/3195835

Automatic Resolution of Normative Conflicts in Supportive Technology Based on User Values
Alex Kayal, Willem-Paul Brinkman, Mark A. Neerincx, M. Birna Van Riemsdijk
Article No.: 41
DOI: 10.1145/3158371

Social commitments (SCs) provide a flexible, norm-based, governance structure for sharing and receiving data. However, users of data sharing applications can subscribe to multiple SCs, possibly producing opposing sharing and receiving...

Preserving Privacy as Social Responsibility in Online Social Networks
Dilara Kekulluoglu, Nadin Kokciyan, Pinar Yolum
Article No.: 42
DOI: 10.1145/3158373

Online social networks provide an environment for their users to share content with others, where the user who shares a content item is put in charge, generally ignoring others that might be affected by it. However, a content that is shared by one...

Measuring Moral Acceptability in E-deliberation: A Practical Application of Ethics by Participation
Ilse Verdiesen, Virginia Dignum, Jeroen Van Den Hoven
Article No.: 43
DOI: 10.1145/3183324

Current developments in governance and policy setting are challenging traditional top-down models of decision-making. Whereas, on the one hand, citizens are increasingly demanding and expected to participate directly on governance questions,...

Enhanced Audit Strategies for Collaborative and Accountable Data Sharing in Social Networks
Leila Bahri, Barbara Carminati, Elena Ferrari, Andrea Bianco
Article No.: 44
DOI: 10.1145/3134439

Data sharing and access control management is one of the issues still hindering the development of decentralized online social networks (DOSNs), which are now gaining more research attention with the recent developments in P2P computing, such as...

easIE: Easy-to-Use Information Extraction for Constructing CSR Databases From the Web
Vasiliki Gkatziaki, Symeon Papadopoulos, Richard Mills, Sotiris Diplaris, Ioannis Tsampoulatidis, Ioannis Kompatsiaris
Article No.: 45
DOI: 10.1145/3155807

Public awareness of and concerns about companies’ social and environmental impacts have seen a marked increase over recent decades. In parallel, the quantity of relevant information has increased, as states pass laws requiring certain...

Accountable Protocols in Abductive Logic Programming
Marco Gavanelli, Marco Alberti, Evelina Lamma
Article No.: 46
DOI: 10.1145/3107936

Finding the entity responsible for an unpleasant situation is often difficult, especially in artificial agent societies.

SCIFF is a formalization of agent societies, including a language to describe rules and protocols, and an...

Section: Special Issue on Economics of Security and Privacy

On the Assessment of Systematic Risk in Networked Systems
Aron Laszka, Benjamin Johnson, Jens Grossklags
Article No.: 48
DOI: 10.1145/3166069

In a networked system, the risk of security compromises depends not only on each node’s security but also on the topological structure formed by the connected individuals, businesses, and computer systems. Research in network security has...

Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse
Samaneh Tajalizadehkhoob, Rainer Böhme, Carlos Gañán, Maciej Korczyński, Michel Van Eeten
Article No.: 49
DOI: 10.1145/3122985

Internet security and technology policy research regularly uses technical indicators of abuse to identify culprits and to tailor mitigation strategies. As a major obstacle, current inferences from abuse data that aim to characterize providers with...

Measuring Third-party Tracker Power across Web and Mobile
Reuben Binns, Jun Zhao, Max Van Kleek, Nigel Shadbolt
Article No.: 52
DOI: 10.1145/3176246

Third-party networks collect vast amounts of data about users via websites and mobile applications. Consolidations among tracker companies can significantly increase their individual tracking capabilities, prompting scrutiny by competition...

PrivacyCheck: Automatic Summarization of Privacy Policies Using Data Mining
Razieh Nokhbeh Zaeem, Rachel L. German, K. Suzanne Barber
Article No.: 53
DOI: 10.1145/3127519

Prior research shows that only a tiny percentage of users actually read the online privacy policies they implicitly agree to while using a website. Prior research also suggests that users ignore privacy policies because these policies are lengthy...