skip to main content
10.5555/3463952.3464061acmconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
research-article

ELVIRA: An Explainable Agent for Value and Utility-Driven Multiuser Privacy

Published: 03 May 2021 Publication History

Abstract

Online social networks fail to support users to adequately share co-owned content, which leads to privacy violations. Scholars proposed collaborative mechanisms to support users, but they did not satisfy one or more requirements needed according to empirical evidence in this domain, such as explainability, role-agnosticism, adaptability, and being utility- and value-driven. We present ELVIRA, an agent that supports multiuser privacy, whose design meets all these requirements. By considering the sharing preferences and the moral values of users, ELVIRA identifies the optimal sharing policy. Furthermore, ELVIRA justifies the optimality of the solution through explanations based on argumentation. We prove via simulations that ELVIRA provides solutions with the best trade-off between individual utility and value adherence. We also show through a user study that ELVIRA suggests solutions that are more acceptable than existing approaches and that its explanations are also more satisfactory.

References

[1]
A. Acquisti, L. Brandimarte, and G. Loewenstein. 2015. Privacy and human behavior in the age of information. Science, Vol. 347, 6221 (2015), 509--514.
[2]
N. Ajmeri, H. Guo, P. K Murukannaiah, and M. P Singh. 2020. Elessar: Ethics in Norm-Aware Agents. In Proceedings of the International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS). 16--24.
[3]
K. Atkinson and T. Bench-Capon. 2007. Practical reasoning as presumptive argumentation using action based alternating transition systems. Artificial Intelligence, Vol. 171, 10--15 (2007), 855--874.
[4]
K. Atkinson and T. Bench-Capon. 2018. Taking account of the actions of others in value-based reasoning. Artificial Intelligence, Vol. 254 (2018), 1--20.
[5]
A. Bardi and S.H Schwartz. 2003. Values and behavior: Strength and structure of relations. Personality and social psychology bulletin, Vol. 29, 10 (2003), 1207--1220.
[6]
A. Besmer and H.R. Lipford. 2010. Moving beyond untagging: photo privacy in a tagged world. In CHI. ACM, 1563--1572.
[7]
B. Carminati and E. Ferrari. 2011. Collaborative access control in on-line social networks. In CollaborateCom. IEEE, 231--240.
[8]
R. Fogues, P. Murukannaiah, J. Such, and M. Singh. 2017a. Sharing Policies in Multiuser Privacy Scenarios: Incorporating Context, Preferences, and Arguments in Decision Making. ACM TOCHI, Vol. 24, 1, Article 5 (2017), 29 pages.
[9]
R. Fogues, P. Murukannaiah, J. Such, and M. Singh. 2017b. SoSharP: Recommending Sharing Policies in Multiuser Privacy Scenarios. IEEE IC, Vol. 21, 6 (2017), 28--36.
[10]
R. Fogues, J. Such, A. Espinosa, and A. Garcia-Fornes. 2014. BFF: A tool for eliciting tie strength and user communities in social networking services. Information Systems Frontiers, Vol. 16, 2 (2014), 225--237.
[11]
D. J Hauser and N. Schwarz. 2016. Attentive Turkers: MTurk participants perform better on online attention checks than do subject pool participants. Behavior research methods, Vol. 48, 1 (2016), 400--407.
[12]
R. R Hoffman, S. T Mueller, G. Klein, and J. Litman. 2018. Metrics for explainable AI: Challenges and prospects. arXiv preprint arXiv:1812.04608 (2018).
[13]
H. Hu, G.J. Ahn, and J. Jorgensen. 2011. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In ACSAC. ACM, 103--112.
[14]
M. Humbert, B. Trubert, and K. Huguenin. 2019. A Survey on Interdependent Privacy. Comput. Surveys (2019), 35.
[15]
P. Ilia, I. Polakis, E. Athanasopoulos, F. Maggi, and S. Ioannidis. 2015. Face/Off: preventing privacy leakage from photos in social networks. In CCS. ACM Press, New York, New York, USA, 781--792.
[16]
D. Kekulluoglu, N. Kökciyan, and P. Yolum. 2018. Preserving privacy as social responsibility in online social networks. ACM TOIT, Vol. 18, 4 (2018), 42.
[17]
N. Kökciyan, N. Yaglikci, and P. Yolum. 2017. An argumentation approach for resolving privacy disputes in online social networks. ACM TOIT, Vol. 17, 3 (2017), 27.
[18]
H. Krasnova, S. Spiekermann, K. Koroleva, and T. Hildebrand. 2010. Online social networks: Why we disclose. JIT, Vol. 25, 2 (2010), 109--125.
[19]
A. C Kurtan and P. Yolum. 2018. PELTE: Privacy estimation of images from tags. In Proceedings of the International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS) .
[20]
A. Lampinen, V. Lehtinen, A. Lehmuskallio, and S. Tamminen. 2011. We're in it together: interpersonal management of disclosure in social network services. In CHI. ACM, 3217--3226.
[21]
J. Leskovec and J.J. Mcauley. 2012. Learning to discover social circles in ego networks. In NIPS. 539--547.
[22]
K. Liang, J. K Liu, R. Lu, and D. S Wong. 2014. Privacy concerns for photo sharing in online social networks. IEEE Internet Computing, Vol. 19, 2 (2014), 58--63.
[23]
N. K Malhotra, S. S Kim, and J. Agarwal. 2004. Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research, Vol. 15, 4 (2004), 336--355.
[24]
C. Mancini, Y. Rogers, A. K. Bandara, T. Coe, L. Jedrzejczyk, A. N. Joinson, B. A. Price, K. Thomas, and B. Nuseibeh. 2010. Contravision: exploring users' reactions to futuristic technology. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 153--162.
[25]
W Mason and S Suri. 2012. Conducting behavioral research on Amazon's Mechanical Turk. Behavior research methods, Vol. 44, 1 (2012), 1--23.
[26]
T. Miller. 2018. Explanation in artificial intelligence: Insights from the social sciences. Artificial Intelligence (2018).
[27]
G. Misra and J. Such. 2016. How socially aware are social media privacy controls? IEEE Computer, Vol. 49, 3 (2016), 96--99.
[28]
G. Misra and J. Such. 2017. PACMAN: Personal Agent for Access Control in Social Media. IEEE Internet Computing, Vol. 21, 6 (2017), 18--26.
[29]
F. Mosca. 2020. Value-Aligned and Explainable Agents for Collective Decision Making: Privacy Application. In Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems. 2199--2200.
[30]
F. Mosca, cS. Sarkadi, J. Such, and P. McBurney. 2020 a. Agent EXPRI: Licence to Explain. In International Workshop on Explainable, Transparent Autonomous Agents and Multi-Agent Systems. Springer, 21--38.
[31]
F. Mosca and J. Such. 2021. An Explainable Assistant for Multiuser Privacy. Working Paper (2021).
[32]
F. Mosca, J. Such, and P. McBurney. 2019. Value-driven Collaborative Privacy Decision Making. In AAAI PAL Symposium .
[33]
F. Mosca, J. Such, and P. McBurney. 2020 b. Towards a Value-driven Explainable Agent for Collective Privacy. In Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems. 1937--1939.
[34]
A-M. Olteanu, Ké. Huguenin, I. Dacosta, and J-P Hubaux. 2018. Consensual and privacy-preserving sharing of multi-subject and interdependent data. In Proceedings of the 25th Network and Distributed System Security Symposium (NDSS). Internet Society, 1--16.
[35]
L. J Paas and M. Morren. 2018. Please do not answer if you are reading this: Respondent attention in online panels. Marketing Letters, Vol. 29, 1 (2018), 13--21.
[36]
F. Paci, A. Squicciarini, and N. Zannone. 2018. Survey on access control for community-centered collaborative systems. Comput. Surveys, Vol. 51, 1 (2018).
[37]
E. Peer, J. Vosgerau, and A. Acquisti. 2014. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods, Vol. 46, 4 (2014), 1023--1031.
[38]
S. Rajtmajer, A. Squicciarini, C. Griffin, S. Karumanchi, and A. Tyagi. 2016. Constrained social-energy minimization for multi-party sharing in online social networks. In Proceedings of the International Conference on Autonomous Agents & Multiagent Systems (AAMAS). 680--688.
[39]
S. Rajtmajer, A. Squicciarini, J. Such, J. Semonsen, and A. Belmonte. 2017. An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content. In GAMESEC. Springer, 112--130.
[40]
M. Rokeach. 1973. The nature of human values .Free press.
[41]
S. H. Schwartz. 2003. A proposal for measuring value orientations across nations. Questionnaire package of the european social survey, Vol. 259, 290 (2003), 261.
[42]
S. H. Schwartz. 2012. An overview of the Schwartz theory of basic values. Online readings in Psychology and Culture, Vol. 2, 1 (2012), 11.
[43]
A. Squicciarini, M. Shehab, and F. Paci. 2009. Collective privacy management in social networks. In WWW. ACM, 521--530.
[44]
J. Such and N. Criado. 2016. Resolving Multi-Party Privacy Conflicts in Social Media. IEEE TKDE, Vol. 28, 7 (2016), 1851--1863.
[45]
J. Such and N. Criado. 2018. Multiparty Privacy in Social Media. Commun. ACM, Vol. 61, 8 (2018), 74--81.
[46]
J. Such, J. Porter, S. Preibusch, and A. Joinson. 2017. Photo privacy conflicts in social media: a large-scale empirical study. In CHI. ACM, 3821--3832.
[47]
J. Such and M. Rovatsos. 2016. Privacy Policy Negotiation in Social Media. ACM TAAS, Vol. 11, 1 (2016), 1--29.
[48]
C Tessier, L Chaudron, and H-J Müller. 2006. Conflicting agents: conflict management in multi-agent systems. Vol. 1. Springer Science & Business Media.
[49]
K. Thomas, C. Grier, and D. Nicol. 2010. Unfriendly: Multi-party privacy risks in social networks. In PET. Springer, 236--252.
[50]
O. Ulusoy and P. Yolum. 2019. Emergent Privacy Norms for Collaborative Systems. In PRIMA. Springer, 514--522.
[51]
O. Ulusoy and P. Yolum. 2020. Norm-based Access Control. In Proceedings of the 25th ACM Symposium on Access Control Models and Technologies. 35--46.
[52]
N. Vishwamitra, Y. Li, K. Wang, H. Hu, K. Caine, and G.J. Ahn. 2017. Towards pii-based multiparty access control for photo sharing in online social networks. In SACMAT. ACM, 155--166.
[53]
B. Viswanath, A. Mislove, M. Cha, and K.P. Gummadi. 2009. On the evolution of user interaction in facebook. In Proceedings of the 2nd ACM workshop on Online social networks. ACM, 37--42.
[54]
P. Wisniewski, H. Lipford, and D. Wilson. 2012. Fighting for my space: Coping mechanisms for SNS boundary regulation. In CHI. ACM, 609--618.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
AAMAS '21: Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems
May 2021
1899 pages
ISBN:9781450383073

Sponsors

Publisher

International Foundation for Autonomous Agents and Multiagent Systems

Richland, SC

Publication History

Published: 03 May 2021

Check for updates

Author Tags

  1. explainable agents
  2. human-agent interaction
  3. multiuser privacy
  4. practical reasoning
  5. value-based agents

Qualifiers

  • Research-article

Conference

AAMAS '21
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,155 of 5,036 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Feb 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media