network services. In Privacy, Security, Risk and Trust
(PASSAT), 2012 International Conference on and
2012 International Confernece on Social Computing
(SocialCom), pages 656–665.
Hargittai, E. et al. (2010). Facebook privacy settings: Who
cares? First Monday, 15(8).
Jensen, C., Potts, C., and Jensen, C. (2005). Privacy
practices of internet users: self-reports versus
observed behavior. Int. J. Hum.-Comput. Stud.,
63(1-2):203–227.
Kelley, P. G., Hankes Drielsma, P., Sadeh, N., and Cranor,
L. F. (2008). User-controllable learning of security
and privacy policies. In Proc. of the 1st ACM
workshop on Workshop on AISec, AISec ’08, pages
11–18.
Kolter, J. and Pernul, G. (2009). Generating
user-understandable privacy preferences. In
Availability, Reliability and Security, 2009. ARES ’09.
International Conference on, pages 299 –306.
Korolova, A. (2010). Privacy violations using microtargeted
ads: A case study. In Proceedings of the 2010 IEEE
International Conference on Data Mining Workshops,
ICDMW ’10, pages 474–482.
Liu, Y., Gummadi, K. P., Krishnamurthy, B., and Mislove,
A. (2011). Analyzing facebook privacy settings:
User expectations vs. reality. In Proceedings of
the 2011 ACM SIGCOMM Conference on Internet
Measurement Conference, IMC ’11, pages 61–70,
New York, NY, USA. ACM.
MacQueen, J. et al. (1967). Some methods for classification
and analysis of multivariate observations. In
Proceedings of the fifth Berkeley symposium on
mathematical statistics and probability, volume 1,
pages 281–297. Oakland, CA, USA.
Madejski, M., Johnson, M., and Bellovin, S. (2012).
A study of privacy settings errors in an online
social network. In Pervasive Computing and
Communications Workshops (PERCOM Workshops),
2012 IEEE International Conference on, pages
340–345.
Meyer, D., Dimitriadou, E., Hornik, K., Weingessel, A.,
Leisch, F., Chang, C.-C., and Lin, C.-C. (2015).
Package ‘e1071’. https://cran.r-project.org/web/
packages/e1071/e1071.pdf.
Mugan, J., Sharma, T., and Sadeh, N. (2011).
Understandable learning of privacy preferences
through default personas and suggestions.
Pedersen, A. (2003). P3 - problems, progress, potential.
Privacy Laws & Business International Newsletter,
2:20–21.
Pollach, I. (2007). What’s wrong with online privacy
policies? Commun. ACM, 50(9):103–108.
Qin, M., Buffett, S., and Fleming, W. (2008). Predicting
user preferences via similarity-based clustering. In
Canadian Conference on AI, volume 5032 of Lecture
Notes in Computer Science, pages 222–233. Springer.
Sadeh, N., Hong, J., Cranor, L., Fette, I., Kelley, P.,
Prabaker, M., and Rao, J. (2009). Understanding
and capturing people’s privacy policies in a mobile
social networking application. Personal Ubiquitous
Comput., 13(6):401–412.
Scipioni, M. P. and Langheinrich, M. (2011). Towards a
new privacy-aware location sharing platform. Journal
of Internet Services and Information Security (JISIS),
1(4):47–59.
Solove, D. J. (2013). Privacy self-management and the
consent paradox. Harvard Law Review, 126.
Srivastava, A. and Geethakumari, G. (2013). A framework
to customize privacy settings of online social network
users. In Intelligent Computational Systems (RAICS),
2013 IEEE Recent Advances in, pages 187–192.
Srivastava, A. and Geethakumari, G. (2014). A
privacy settings recommender system for online social
networks. In Recent Advances and Innovations in
Engineering (ICRAIE), 2014, pages 1–6.
Tondel, I., Nyre, A., and Bernsmed, K. (2011). Learning
privacy preferences. In Availability, Reliability and
Security (ARES), 2011 Sixth International Conference
on, pages 621–626.
Tondel, I. A. and Nyre, A. A. (2012). Towards a
similarity metric for comparing machine-readable
privacy policies. In Open Problems in Network
Security, volume 7039 of Lecture Notes in Computer
Science, pages 89–103.
W3C (2002). The platform for privacy preferences
1.0 (P3P1.0) specificati. In Platform for Privacy
Preferences (P3P) Project.
Ward Jr, J. H. (1963). Hierarchical grouping to optimize an
objective function. Journal of the American statistical
association, 58(301):236–244.
Wishart, R., Corapi, D., Madhavapeddy, A., and Sloman,
M. (2010). Privacy butler: A personal privacy rights
manager for online presence. In Pervasive Computing
and Communications Workshops (PERCOM
Workshops), 2010 8th IEEE International Conference
on, pages 672 –677.
Yee, G. (2009). An automatic privacy policy agreement
checker for e-services. In Availability, Reliability and
Security, 2009. ARES ’09. International Conference
on, pages 307 –315.