Nadin Kökciyan
Nadin Kökciyan

homepage

  Affiliation history
Bibliometrics: publication history
Average citations per article2.36
Citation Count26
Publication count11
Publication years2012-2017
Available for download6
Average downloads per article88.17
Downloads (cumulative)529
Downloads (12 Months)232
Downloads (6 Weeks)38
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


12 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 12 of 12
Sort by:

1 published by ACM
April 2018 ACM Transactions on Internet Technology (TOIT): Volume 18 Issue 4, September 2018
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 19,   Downloads (12 Months): 93,   Downloads (Overall): 93

Full text available: PDFPDF
Online social networks provide an environment for their users to share content with others, where the user who shares a content item is put in charge, generally ignoring others that might be affected by it. However, a content that is shared by one user can very well violate the privacy ...
Keywords: Privacy, agreement, negotiation

2
August 2017 IJCAI'17: Proceedings of the 26th International Joint Conference on Artificial Intelligence
Publisher: AAAI Press
Bibliometrics:
Citation Count: 1

More and more, devices around us are being connected to each other in the realm of Internet of Things (IoT). Their communication and especially collaboration promises useful services to be provided to end users. However, the same communication channels pose important privacy concerns to be raised. It is not clear ...

3 published by ACM
June 2017 ACM Transactions on Internet Technology (TOIT) - Special Issue on Argumentation in Social Media and Regular Papers: Volume 17 Issue 3, July 2017
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 8,   Downloads (12 Months): 75,   Downloads (Overall): 128

Full text available: PDFPDF
Preserving users’ privacy is important for Web systems. In systems where transactions are managed by a single user, such as e-commerce systems, preserving privacy of the transactions is merely the capability of access control. However, in online social networks, where each transaction is managed by and has effect on others, ...
Keywords: Privacy, agreement, argumentation, negotiation

4
October 2016 IEEE Transactions on Knowledge and Data Engineering: Volume 28 Issue 10, October 2016
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 7

Social network users expect the social networks that they use to preserve their privacy. Traditionally, privacy breaches have been understood as the malfunctioning of a given system. However, in online social networks, privacy breaches are not necessarily a malfunctioning of a system but a byproduct of its workings. The users ...

5 published by ACM
August 2016 PrAISe '16: Proceedings of the 1st International Workshop on AI for Privacy and Security
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 4,   Downloads (12 Months): 19,   Downloads (Overall): 70

Full text available: PDFPDF
Preserving privacy of posts in online social networks is difficult. One reason for this is that a post can be related to the poster as well as various others that are related to the post. Hence, it is possible to share information that pertains others without their consent. This pathological ...
Keywords: Negotiation, Agreement, Privacy

6
May 2016 AAMAS '16: Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems
Publisher: International Foundation for Autonomous Agents and Multiagent Systems
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2,   Downloads (12 Months): 14,   Downloads (Overall): 58

Full text available: PDFPDF
In this demonstration, we present PriGuardTool, which is a Web-based tool that can detect privacy violations in online social networks and notify the users accordingly. Our tool comes up with an interface where the users input their privacy concerns. An agent represents a user in the online social network. Each ...
Keywords: ontology, commitment, online social networks, privacy

7
May 2016 AAMAS '16: Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems
Publisher: International Foundation for Autonomous Agents and Multiagent Systems
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 2,   Downloads (12 Months): 14,   Downloads (Overall): 50

Full text available: PDFPDF
Keywords: online social networks, privacy, argumentation

8
February 2016 AAAI'16: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence
Publisher: AAAI Press
Bibliometrics:
Citation Count: 0

In online social networks (OSNs), users are allowed to create and share content about themselves and others. When multiple entities start distributing content, information can reach unintended individuals and inference can reveal more information about the user. Existing applications do not focus on detecting privacy violations before they occur in ...

9
May 2015 CARE/[email protected]'15: Proceedings of the 6th and 2nd International Conference on Advances in Social Computing and Multiagent Systems - 6th International Workshop on Collaborative Agents Research and Development, and Second International Workshop on Multiagent Foundations of Social Computing
Publisher: Springer
Bibliometrics:
Citation Count: 2

Privacy is a major concern of Web systems. Traditional Web systems employ static privacy agreements to notify its users of how their information will be used. Recent social networks allow users to specify some privacy concerns, thus providing a partially personalized privacy setting. However, still privacy violations are taking place ...

10
May 2015 AAMAS '15: Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems
Publisher: International Foundation for Autonomous Agents and Multiagent Systems
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 12,   Downloads (Overall): 51

Full text available: PDFPDF
In online social networks (OSNs), users are allowed to create and share content about themselves and others. When multiple entities start distributing content, information can reach unintended individuals and inference can reveal more information about the user. Existing applications do not focus on detecting privacy violations before they occur in ...
Keywords: commitment, privacy, ontology

11 published by ACM
October 2013 MIIRH '13: Proceedings of the 1st ACM international workshop on Multimedia indexing and information retrieval for healthcare
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 5,   Downloads (Overall): 79

Full text available: PDFPDF
Clinical experience sharing (CES) is a useful concept for both medical treatment and medical education purposes. One way of implementing CES is through the use of content based case retrieval (CBCR), where database of medical cases is browsed for case instances that are similar to the input query case. In ...
Keywords: clinical experience sharing, content-based case retrieval, information storage and retrieval, semantic framing

12
September 2012 SOCIALCOM-PASSAT '12: Proceedings of the 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

Social Web applications have successfully transformed content consuming users into content producers. Aside of socializing, these applications are frequently used to disseminate information and coordinate purposeful activities, such as disaster response, political action, and neighborhood organizations. These activities are carried out via human interpreted messages. In many cases, dedicated information ...
Keywords: Human-centered computing, Collaborative computing, Human information processing, Workflow management, Computer-supported collaborative work



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us