skip to main content
editorial
Free Access

Guest Editors’ Introduction

Published:06 March 2018Publication History
First page image

References

  1. Tim Baarslag, Alper T. Alan, Richard Gomer, Muddasser Alam, Charith Perera, Enrico H. Gerding, and M. C. schraefel. 2017. An automated negotiation agent for permission management. In Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems (AAMAS’17). 380--390. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Adam Barth, Anupam Datta, John C. Mitchell, and Helen Nissenbaum. 2006. Privacy and contextual integrity: Framework and applications. In Proceedings of the IEEE Symposium on Security and Privacy (SP’06). IEEE Computer Society, 184--198. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Amit K. Chopra, Fabiano Dalpiaz, F. Başak Aydemir, Paolo Giorgini, John Mylopoulos, and Munindar P. Singh. 2014. Protos: Foundations for engineering innovative sociotechnical systems. In Proceedings of the 18th IEEE International Requirements Engineering Conference (RE’14). IEEE Computer Society, 53--62.Google ScholarGoogle Scholar
  4. Natalia Criado and Jose M. Such. 2015. Implicit contextual integrity in online social networks. Information Sciences 325 (2015), 48--69. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Natalia Criado and Jose M. Such. 2016. Selective norm monitoring. In Proceedings of the 25th International Joint Conference on Artificial Intelligence (IJCAI’16). 208--214. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. CyBOK. 2017. The Cyber Security Body of Knowledge. Retrieved November 2017 from https://www.cybok.org/.Google ScholarGoogle Scholar
  7. DoD. 2015. The United States Department of Defense Cybersecurity Culture and Compliance Initiative. Retrieved September 2015 from http://www.defense.gov/Portals/1/Documents/pubs/OSD011517-15-RES-Final.pdf.Google ScholarGoogle Scholar
  8. Ricard L. Fogues, Pradeep K. Murukannaiah, Jose M. Such, and Munindar P. Singh. 2017. Sharing policies in multiuser privacy scenarios: Incorporating context, preferences, and arguments in decision making. ACM Transactions on Computer-Human Interaction (TOCHI) 24, 1 (2017), 5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Yang Gao, Francesca Toni, Hao Wang, and Fanjiang Xu. 2016. Argumentation-based multi-agent decision making with privacy preserved. In Proceedings of the 15th Conference on Autonomous Agents and Multiagent Systems (AAMAS’16). 1153--1161. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Christopher W. Geib and Robert P. Goldman. 2001. Plan recognition in intrusion detection systems. In Proceedings of the DARPA Information Survivability Conference & Exposition II (DISCEX’01), Vol. 1. IEEE, 46--55.Google ScholarGoogle Scholar
  11. Ponemon Institute. 2016. Cost of Data Breach Study: Global Analysis. Retrieved November 2017 from https://securityintelligence.com/cost-of-a-data-breach-2016/.Google ScholarGoogle Scholar
  12. Özgür Kafalı, Nirav Ajmeri, and Munindar P. Singh. 2016a. Revani: Revising and verifying normative specifications for privacy. IEEE Intelligent Systems 31, 5 (Sept. 2016), 8--15.Google ScholarGoogle Scholar
  13. Özgür Kafalı, Nirav Ajmeri, and Munindar P. Singh. 2017a. Kont: Computing tradeoffs in normative multiagent systems. In Proceedings of the 31st Conference on Artificial Intelligence (AAAI’17). 3006--3012.Google ScholarGoogle Scholar
  14. Özgür Kafalı, Jasmine Jones, Megan Petruso, Laurie Williams, and Munindar P. Singh. 2017b. How good is a security policy against real breaches? A HIPAA case study. In Proceedings of the 39th International Conference on Software Engineering (ICSE’17). IEEE Computer Society, 530--540. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Özgür Kafalı and Munindar P. Singh. 2017. Guest Editors’ Introduction - Improving Cybersecurity: User Accountability and Sociotechnical Systems. (2017). IEEE Computing Now. https://www.computer.org/web/computingnow/archive/improving-cybersecurity-april-2017-introduction.Google ScholarGoogle Scholar
  16. Özgür Kafalı, Munindar P. Singh, and Laurie Williams. 2016b. Nane: Identifying misuse cases using temporal norm enactments. In Proceedings of the 24th IEEE International Requirements Engineering Conference (RE’16). IEEE Computer Society, 136--145.Google ScholarGoogle ScholarCross RefCross Ref
  17. Nadin Kökciyan, Nefise Yaglikci, and Pınar Yolum. 2017. An argumentation approach for resolving privacy disputes in online social networks. ACM Transactions on Internet Technology (TOIT) 17, 3 ( June 2017), 27:1--27:22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Gaurav Misra and Jose M. Such. 2017. PACMAN: Personal agent for access control in social media. IEEE Internet Computing 21, 6 (2017), 18--26.Google ScholarGoogle ScholarCross RefCross Ref
  19. Sean Murphy. 2015. Is cybersecurity possible in healthcare? National Cybersecurity Institute Journal 1, 3 (March 2015), 49--63.Google ScholarGoogle Scholar
  20. Luis G. Nardin, Tina Balke-Visser, Nirav Ajmeri, Anup K. Kalia, Jaime S. Sichman, and Munindar P. Singh. 2016. Classifying sanctions and designing a conceptual sanctioning process model for socio-technical systems. The Knowledge Engineering Review 31, 2 (March 2016), 142--166.Google ScholarGoogle ScholarCross RefCross Ref
  21. Crowd Research Partners. 2016. Insider Threat Spotlight Report. Retrieved November 2017 from http://crowdresearchpartners.com/portfolio/insider-threat-report/.Google ScholarGoogle Scholar
  22. Sarah Rajtmajer, Anna Squicciarini, Jose M. Such, Justin Semonsen, and Andrew Belmonte. 2017. An ultimatum game model for the evolution of privacy in jointly managed content. In International Conference on Decision and Game Theory for Security. Springer, 112--130.Google ScholarGoogle ScholarCross RefCross Ref
  23. Fariba Sadri. 2012. Intention recognition in agents for ambient intelligence: Logic-based approaches. In Agents and Ambient Intelligence. Ambient Intelligence and Smart Environments, Vol. 12. IOS Press, 197--236.Google ScholarGoogle Scholar
  24. John Sammons. 2015. Digital Forensics: Threatscape and Best Practices. Syngress. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Munindar P. Singh. 2013. Norms as a basis for governing sociotechnical systems. ACM Transactions on Intelligent Systems and Technology (TIST) 5, 1 (Dec. 2013), 21:1--21:23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Jose M. Such. 2017. Privacy and autonomous systems. In Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI’17). 4761--4767. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Jose M. Such, Joel Porter, Sören Preibusch, and Adam Joinson. 2017. Photo privacy conflicts in social media: A large-scale empirical study. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 3821--3832. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Jose M. Such and Michael Rovatsos. 2016. Privacy policy negotiation in social media. ACM Transactions on Autonomous and Adaptive Systems (TAAS) 11, 1 (2016), 4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Verizon. 2017. Data Breach Digest. Retrieved November 2017 from http://www.verizonenterprise.com/verizon-insights-lab/data-breach-digest/2017/.Google ScholarGoogle Scholar

Index Terms

(auto-classified)
  1. Guest Editors’ Introduction

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Internet Technology
        ACM Transactions on Internet Technology  Volume 18, Issue 3
        Special Issue on Artificial Intelligence for Secruity and Privacy and Regular Papers
        August 2018
        314 pages
        ISSN:1533-5399
        EISSN:1557-6051
        DOI:10.1145/3185332
        • Editor:
        • Munindar P. Singh
        Issue’s Table of Contents

        Copyright © 2018 ACM

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 6 March 2018
        • Revised: 1 November 2017
        • Received: 1 November 2017
        • Accepted: 1 November 2017
        Published in toit Volume 18, Issue 3

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • editorial
        • Opinion
        • Refereed limited
      • Article Metrics

        • Downloads (Last 12 months)21
        • Downloads (Last 6 weeks)6

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!