enter search term and/or author name
Special Issue: Computational Ethics and Accountability
Cristina Baroglio, Olivier Boissier, Axel Polleres
Article No.: 40
Automatic Resolution of Normative Conflicts in Supportive Technology Based on User Values
Alex Kayal, Willem-Paul Brinkman, Mark A. Neerincx, M. Birna Van Riemsdijk
Article No.: 41
Social commitments (SCs) provide a flexible, norm-based, governance structure for sharing and receiving data. However, users of data sharing applications can subscribe to multiple SCs, possibly producing opposing sharing and receiving...
Preserving Privacy as Social Responsibility in Online Social Networks
Dilara Kekulluoglu, Nadin Kokciyan, Pinar Yolum
Article No.: 42
Online social networks provide an environment for their users to share content with others, where the user who shares a content item is put in charge, generally ignoring others that might be affected by it. However, a content that is shared by one...
Measuring Moral Acceptability in E-deliberation: A Practical Application of Ethics by Participation
Ilse Verdiesen, Virginia Dignum, Jeroen Van Den Hoven
Article No.: 43
Current developments in governance and policy setting are challenging traditional top-down models of decision-making. Whereas, on the one hand, citizens are increasingly demanding and expected to participate directly on governance questions,...
Enhanced Audit Strategies for Collaborative and Accountable Data Sharing in Social Networks
Leila Bahri, Barbara Carminati, Elena Ferrari, Andrea Bianco
Article No.: 44
Data sharing and access control management is one of the issues still hindering the development of decentralized online social networks (DOSNs), which are now gaining more research attention with the recent developments in P2P computing, such as...
easIE: Easy-to-Use Information Extraction for Constructing CSR Databases From the Web
Vasiliki Gkatziaki, Symeon Papadopoulos, Richard Mills, Sotiris Diplaris, Ioannis Tsampoulatidis, Ioannis Kompatsiaris
Article No.: 45
Public awareness of and concerns about companies’ social and environmental impacts have seen a marked increase over recent decades. In parallel, the quantity of relevant information has increased, as states pass laws requiring certain...
Accountable Protocols in Abductive Logic Programming
Marco Gavanelli, Marco Alberti, Evelina Lamma
Article No.: 46
Finding the entity responsible for an unpleasant situation is often difficult, especially in artificial agent societies.
SCIFF is a formalization of agent societies, including a language to describe rules and protocols, and an...
On the Assessment of Systematic Risk in Networked Systems
Aron Laszka, Benjamin Johnson, Jens Grossklags
Article No.: 48
In a networked system, the risk of security compromises depends not only on each node’s security but also on the topological structure formed by the connected individuals, businesses, and computer systems. Research in network security has...
Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse
Samaneh Tajalizadehkhoob, Rainer Böhme, Carlos Gañán, Maciej Korczyński, Michel Van Eeten
Article No.: 49
Internet security and technology policy research regularly uses technical indicators of abuse to identify culprits and to tailor mitigation strategies. As a major obstacle, current inferences from abuse data that aim to characterize providers with...
Measuring Third-party Tracker Power across Web and Mobile
Reuben Binns, Jun Zhao, Max Van Kleek, Nigel Shadbolt
Article No.: 52
Third-party networks collect vast amounts of data about users via websites and mobile applications. Consolidations among tracker companies can significantly increase their individual tracking capabilities, prompting scrutiny by competition...
PrivacyCheck: Automatic Summarization of Privacy Policies Using Data Mining
Razieh Nokhbeh Zaeem, Rachel L. German, K. Suzanne Barber
Article No.: 53
Prior research shows that only a tiny percentage of users actually read the online privacy policies they implicitly agree to while using a website. Prior research also suggests that users ignore privacy policies because these policies are lengthy...