Empowering Users in Online Open Communities

被引:0
作者
Osman N. [1 ]
Chenu-Abente R. [2 ]
Shen Q. [3 ]
Sierra C. [1 ]
Giunchiglia F. [2 ]
机构
[1] Artificial Intelligence Research Institute (IIIA-CSIC), Barcelona
[2] Dipartimento di Ingegneria e Scienza dell’Informazione, Univerità di Trento, Trento
[3] College of Computer Science and Technology, Jilin University, Changchun
基金
欧盟地平线“2020”;
关键词
Context; Norms; Online communities; Privacy; Social relations;
D O I
10.1007/s42979-021-00714-5
中图分类号
学科分类号
摘要
In this paper, we propose an architecture supporting online open communities, where by open communities, we mean communities where previously unknown people can join, possibly for a limited amount of time. The fundamental question that we address is “how we can make sure that an individual’s requirements are taken into consideration by the community while her privacy is respected and the community’s ethical code is not violated”. The main contributions are: (i) a conceptual framework which allows to describe individual and community profiles, including data and norms that provide information about their owner and their requirements, and (ii) a decentralised architecture enabling interactions that leverage the exchange of profile information among people and communities to ensure that requirements are fulfilled and privacy is respected. © 2021, The Author(s).
引用
收藏
相关论文
共 66 条
[1]  
Normative Multi-Agent Systems, 4, (2013)
[2]  
Angulo J., Fischer-Hubner S., Pulls T., Wastlund E., Towards usable privacy policy display & management-the primelife approach, In: HAISA, pp. 108-118, (2011)
[3]  
Arnaboldi V., Conti M., Passarella A., Pezzoni F., . Analysis of ego network structure in online social networks, In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing., pp. 31-40, (2012)
[4]  
Baader F., Horrocks I., Sattler U., Description logics, Handbook on Ontologies, pp. 3-28, (2004)
[5]  
Barth A., Datta A., Mitchell J.C., Nissenbaum H., Privacy and contextual integrity: Framework and applications, 2006 IEEE Symposium on Security and Privacy (S&P’06). IEEE, (2006)
[6]  
Bilogrevic I., Huguenin K., Agir B., Jadliwala M., Hubaux J.P., Adaptive information-sharing for privacy-aware mobile social networks. I, Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, Ubicomp ’13, New York, NY, USA, pp. 657-666, (2013)
[7]  
Blum M., Pentland A., Troster G., Insense: interest-based life logging, IEEE Multimed., 13, 4, pp. 40-48, (2006)
[8]  
Bonatti P.A., Decker S., Polleres A., Presutti V., Knowledge graphs: new directions for knowledge representation on the semantic web (dagstuhl seminar 18371), Dagstuhl Rep., 8, pp. 29-111, (2018)
[9]  
Bontempelli A., Teso S., Giunchiglia F., Passerini A., Learning in the wild with incremental skeptical gaussian processes, Proceedings of the 29Th International Joint Conference on Artificial Intelligence (IJCAI), (2020)
[10]  
Bouquet P., Giunchiglia F., Reasoning about theory adequacy. A new solution to the qualification problem, Fundamenta Informaticae, 23, 234, pp. 247-262, (1995)