As of 2016, there are more mobile devices than humans on earth. Today, mobile devices are a critical part of our lives and often hold sensitive corporate and personal data. As a result, they are a lucrative target for attackers, and managing data privacy and security on mobile devices has become a vital issue. Existing access control mechanisms in most devices are restrictive and inadequate. They do not take into account the context of a device and its user when making decisions. In many cases, the access granted to a subject should change based on context of a device. Such fine-grained, context-sensitive access control policies have to be personalized too. In this paper, we present the MITHRIL system, that uses policies represented in Semantic Web technologies and captured using user feedback, to handle access control on mobile devices. We present an iterative feedback process to capture user specific policy. We also present a policy violation metric that allows us to decide when the capture process is complete.
SecureDroid: An Android Security Framework Extension for Context-Aware policy...Giuseppe La Torre
Mobile devices became the main repository of personal data and source of user-generated contents as well as the principal controller of our social networked life. In this scenario, malicious applications try to take advantage of all the possibilities left open by users and operating systems. In this paper, we propose SecureDroid: an extension of the Android security frame- work able to enforce flexible and declarative security policies at run-time, providing a fine-grained access control system. In particular, we focus on context dependent policies that allow the user to specify the way in which applications work according to current context.
Context-Aware Access Control and Presentation of Linked DataLuca Costabello
My PhD Thesis defence slideshow. The work discusses the influence of mobile context in accessing Linked Data from handheld devices. The work dissects this issue into two research questions: how to enable context-aware adaptation for Linked Data consumption, and how to protect access to RDF stores from context-aware devices.
Parse: A Mobile Backend as a Service (MBaaS)Ville Seppänen
Parse is a mobile backend as a service (MBaaS), a subcategory of PaaS. This is a presentation evaluating the service for a post-graduate seminar course.
SecureDroid: An Android Security Framework Extension for Context-Aware policy...Giuseppe La Torre
Mobile devices became the main repository of personal data and source of user-generated contents as well as the principal controller of our social networked life. In this scenario, malicious applications try to take advantage of all the possibilities left open by users and operating systems. In this paper, we propose SecureDroid: an extension of the Android security frame- work able to enforce flexible and declarative security policies at run-time, providing a fine-grained access control system. In particular, we focus on context dependent policies that allow the user to specify the way in which applications work according to current context.
Context-Aware Access Control and Presentation of Linked DataLuca Costabello
My PhD Thesis defence slideshow. The work discusses the influence of mobile context in accessing Linked Data from handheld devices. The work dissects this issue into two research questions: how to enable context-aware adaptation for Linked Data consumption, and how to protect access to RDF stores from context-aware devices.
Parse: A Mobile Backend as a Service (MBaaS)Ville Seppänen
Parse is a mobile backend as a service (MBaaS), a subcategory of PaaS. This is a presentation evaluating the service for a post-graduate seminar course.
We provide project guidance for final year MTech, BTech, MSc, MCA, ME, BE, BSc, BCA & Diploma students in Electronics, Computer Science, Information Technology, Instrumentation, Electrical & Electronics, Power electronics, Mechanical, Automobile etc. We provide live project assistance and will make the students involve throughout the project. We specialize in Matlab, VLSI, CST, JAVA, .NET, ANDROID, PHP, NS2, EMBEDDED, ARDUINO, ARM, DSP, etc based areas. We research in Image processing, Signal Processing, Wireless communication, Cloud computing, Data mining, Networking, Artificial Intelligence and several other areas. We provide complete support in project completion, documentation and other works related to project.Success is a lousy teacher. It seduces smart people into thinking they can't lose.we have better knowledge in this field and updated with new innovative technologies.
Call me at: 9037291113.
Social media & data protection policy v1.0 141112 Dave Shannon
Presentation presented to employees in a previous role. Unfortunately corporate identity has had to be removed, however content is still relevant to policies and legislation
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijripublishers Ijri
With the growing quantity of pictures users distribute from node to node social networks, retaining confidentiality has turn out to be a foremost predicament, as declared by a latest wave of made known occurrences wherever users unintentionally shared individual profile. In radiance of these occurrences made necessitate of tools to assist users organize access to their distributed data is evident. In the direction of speak to this requirement, we suggest an Adaptive Privacy Policy forecast (A3P) scheme to facilitate users compile confidentiality settings for their pictures. We observe the responsibility of communal context, picture content, and metadata as possible sign of users’ confidentiality preference. We recommend a two-level structure which according to the user’s obtainable times past on the site, establishs the most excellent obtainable confidentiality policy for the user’s pictures being uploaded. Our solution relies on an image classification framework for image categories which may be associated with similar policies, and on a policy prediction algorithm to automatically generate a policy for each newly uploaded image, also according to users’ social features. Over time, the generated policies will follow the evolution of users’ privacy attitude. We provide the results of our extensive evaluation over 5,000 policies, which demonstrate the effectiveness of our system, with prediction accuracies over 90 percent.
User-Controllable Security and Privacy for Pervasive Computing, at Hotmobile...Jason Hong
We describe our current work in developing novel mechanisms for managing security and privacy in pervasive computing environments. More specifically, we have developed and evaluated three different applications, including a contextual instant messenger, a people finder application, and a phone-based application for access control. We also draw out some themes we have learned thus far for user-controllable security and privacy.
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxtodd271
Running head: COMPANY Facebook Department of Defense (DoD) Ready 1
COMPANY Facebook DoD Ready 4
Step 1: Select an organization.
We have selected the company called Facebook. Facebook is an American company that offers services on online social networking. It was founded by Mark Zuckerberg together with his colleagues in 2004. It is located in Menlo Park, CA.
Step 2: Create an executive summary.
Business model of Facebook is very simple because it is based on advertising. Most of the organization’s revenue comes from advertisements. The company has also been able to unlock a lot for business value from its various operations that have emerged as one of the profitable giants in technology. Currently, Facebook has more than 48,000 employees worldwide ("How Does Facebook Make Money? Facebook Business Model in A Nutshell", 2020). The number of employees has increased gradually since the time the company was formed. This is due to its massive expansion over time. It has succeeded and grown in terms of its product cycle all over the world
· The IT security policy for the company include users changing their passwords on a regular basis and employing different symbols and numerals while coming up with new passwords. The users should also avoid disclosing private or personal information to people they do not trust. They should also be keen to check that they acknowledge the URL as well as domain names before sharing financial or personal data ("Data Policy", 2020). Users should also ensure that secure browsing is always turned on in their account settings. In case users feel or suspect that their account has been tampered with for various reasons, they are free to contact their social network and support staff of Facebook.
· The security policy was developed based on the exposure to threats and things that were affecting people more. The security policy was also developed based on the guidelines of the Department of Defense regarding social networks and policies. Complying with the rules and regulations of the DoD regarding the security of the public and their use of the application was vital.
· Exposing or putting people at risk of losing their personal data or being threatened on the platform was a concern and this led to development of matters catering for data security in the security policy of the company. Facebook stores data under the security measures as long as it is necessary to provide services and products to the users. Information in a given account is kept under safe conditions until the account is deleted, unless they no longer require the data in provision of services and products. The account can also be deleted anytime the user feels like.
Step 3: Conduct a research of DoD-specific requirement for an Organization IT infrastructure and US compliance laws that may affect them
· The mission statement of Facebook Inc. is “to give people power to build community and bring the world closer together.” The mission st.
System Analysis &DesignDr.Sameer AlimamyFall Semester .docxmabelf3
System Analysis &Design
Dr.Sameer Alimamy
Fall Semester 2018\2019
Final Project
Cinema Explorer “Mobile Application”
Student named and IDs:
Zahraa AlHashim 201202468
Hanouf AlQannas 201400897
Mashael AlOmair 201001787
Alhanoof AlOtaibi 201201928
Table of Content
1. Executive summary.
1.1 Case Background.
1.2 Organization structure.
1.3 Information system facilities.
1.4 The problem.
2. Scope Definition
Solution
2.1 Request for Information System Services.
2.2 Problem Statement Matrix.
3. Problem Analysis.
3.1 Problems, Opportunities, Objectives and Constraints Matrix.
3.2 Tentative List of Requirements.
4. Modeling Functional Requirements.
4.1 Use Case Glossary.
4.2 Use Case Model Diagram.
4.3 Use Case Narrative.
5. Modeling Object Requirements.
5.1 Entity/Definition Matrix.
5.2 Domain Model.
5.3 ER Diagram.
6. Project Management.
7. Prototype.
8. Appendix A: Preliminary Investigation Interview of Scope Definition.
Appendix B: Interview of Problem Analysis.
1. Executive Summary (200 - 300 words)
1.1 Case Background
According to 2030 vision we create an App that will be the first App for cinema in Saudi Arabia. The cinema App will call Cinema Explorer. We will make a system for the application shows newest movies in many cinemas around Saudi Arabia at different times and places to helps lovers movies booking online. The application will shows to the users the nearest cinemas around them and allows them to select the movies and the seats. In addition, the application has special options for other services, which are selecting 3d glasses, blanket ordering snacks. The payment will be only online by visa and master card distinguished easily to pay. One advantages of the Cinema Explorer Application is save the time instead of going to the Cinema’s places
1.2 Organization Structure:
Cinema Explorer Application
Programmer
AlHanouf Alotaibi
Vice President
Mashael
System Developer
Zahraa
System analyst
Hanouf
1.3 Information System Facilities:
This application will provide up to date movies with the ability to view movie trailers, reserve seats, choose a snack, and pay through this application.
· 4G connection is required for best performance and slow connection may affect the overall app experience
· Find movie by the type of movie, rating, language and cast
· Quick to load and easy to use
1.4 The problem:
Entertainment is a very important aspect in people’s lives. Therefore, people need to have many ways to entertain themselves. One of the most common and popular ways for entertainment is cinema, and there are many cinemas exist globally since 1890s. I addition, since there are many importan.
JPA1404 Context-based Access Control Systems for Mobile Deviceschennaijp
We are providing lot of best and quality 2014 and 2015 android IEEE projects for final year students. Here you can download the entire abstract and basepaper at free of cost.
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/android-projects/
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsJason Hong
Talk Feb2019 at UCSD's Halıcıoğlu Data Science Institute, Security and Privacy at the Edge: Challenges and Future Directions
In the near future, our smart devices will know almost everything about us. These devices, combined with AI technologies, will offer many opportunities to vastly improve society in positive ways. However, these same technologies also pose dramatic new challenges for privacy and for ethics. In this talk, I'll sketch out why privacy is so hard to tackle, how and why we have failed in privacy and ethics in web and smartphones, and discuss some possible social, legal, and technical approaches for steering IoT in more positive directions.
http://datascience.ucsd.edu/security-and-privacy-symposium/venue.html
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
The american workplace is in a period of unprecedented change as the combination of mobile technology and social media is changing the "who, what, when and where" of work.
We provide project guidance for final year MTech, BTech, MSc, MCA, ME, BE, BSc, BCA & Diploma students in Electronics, Computer Science, Information Technology, Instrumentation, Electrical & Electronics, Power electronics, Mechanical, Automobile etc. We provide live project assistance and will make the students involve throughout the project. We specialize in Matlab, VLSI, CST, JAVA, .NET, ANDROID, PHP, NS2, EMBEDDED, ARDUINO, ARM, DSP, etc based areas. We research in Image processing, Signal Processing, Wireless communication, Cloud computing, Data mining, Networking, Artificial Intelligence and several other areas. We provide complete support in project completion, documentation and other works related to project.Success is a lousy teacher. It seduces smart people into thinking they can't lose.we have better knowledge in this field and updated with new innovative technologies.
Call me at: 9037291113.
Social media & data protection policy v1.0 141112 Dave Shannon
Presentation presented to employees in a previous role. Unfortunately corporate identity has had to be removed, however content is still relevant to policies and legislation
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijripublishers Ijri
With the growing quantity of pictures users distribute from node to node social networks, retaining confidentiality has turn out to be a foremost predicament, as declared by a latest wave of made known occurrences wherever users unintentionally shared individual profile. In radiance of these occurrences made necessitate of tools to assist users organize access to their distributed data is evident. In the direction of speak to this requirement, we suggest an Adaptive Privacy Policy forecast (A3P) scheme to facilitate users compile confidentiality settings for their pictures. We observe the responsibility of communal context, picture content, and metadata as possible sign of users’ confidentiality preference. We recommend a two-level structure which according to the user’s obtainable times past on the site, establishs the most excellent obtainable confidentiality policy for the user’s pictures being uploaded. Our solution relies on an image classification framework for image categories which may be associated with similar policies, and on a policy prediction algorithm to automatically generate a policy for each newly uploaded image, also according to users’ social features. Over time, the generated policies will follow the evolution of users’ privacy attitude. We provide the results of our extensive evaluation over 5,000 policies, which demonstrate the effectiveness of our system, with prediction accuracies over 90 percent.
User-Controllable Security and Privacy for Pervasive Computing, at Hotmobile...Jason Hong
We describe our current work in developing novel mechanisms for managing security and privacy in pervasive computing environments. More specifically, we have developed and evaluated three different applications, including a contextual instant messenger, a people finder application, and a phone-based application for access control. We also draw out some themes we have learned thus far for user-controllable security and privacy.
Running head COMPANY Facebook Department of Defense (DoD) Ready1.docxtodd271
Running head: COMPANY Facebook Department of Defense (DoD) Ready 1
COMPANY Facebook DoD Ready 4
Step 1: Select an organization.
We have selected the company called Facebook. Facebook is an American company that offers services on online social networking. It was founded by Mark Zuckerberg together with his colleagues in 2004. It is located in Menlo Park, CA.
Step 2: Create an executive summary.
Business model of Facebook is very simple because it is based on advertising. Most of the organization’s revenue comes from advertisements. The company has also been able to unlock a lot for business value from its various operations that have emerged as one of the profitable giants in technology. Currently, Facebook has more than 48,000 employees worldwide ("How Does Facebook Make Money? Facebook Business Model in A Nutshell", 2020). The number of employees has increased gradually since the time the company was formed. This is due to its massive expansion over time. It has succeeded and grown in terms of its product cycle all over the world
· The IT security policy for the company include users changing their passwords on a regular basis and employing different symbols and numerals while coming up with new passwords. The users should also avoid disclosing private or personal information to people they do not trust. They should also be keen to check that they acknowledge the URL as well as domain names before sharing financial or personal data ("Data Policy", 2020). Users should also ensure that secure browsing is always turned on in their account settings. In case users feel or suspect that their account has been tampered with for various reasons, they are free to contact their social network and support staff of Facebook.
· The security policy was developed based on the exposure to threats and things that were affecting people more. The security policy was also developed based on the guidelines of the Department of Defense regarding social networks and policies. Complying with the rules and regulations of the DoD regarding the security of the public and their use of the application was vital.
· Exposing or putting people at risk of losing their personal data or being threatened on the platform was a concern and this led to development of matters catering for data security in the security policy of the company. Facebook stores data under the security measures as long as it is necessary to provide services and products to the users. Information in a given account is kept under safe conditions until the account is deleted, unless they no longer require the data in provision of services and products. The account can also be deleted anytime the user feels like.
Step 3: Conduct a research of DoD-specific requirement for an Organization IT infrastructure and US compliance laws that may affect them
· The mission statement of Facebook Inc. is “to give people power to build community and bring the world closer together.” The mission st.
System Analysis &DesignDr.Sameer AlimamyFall Semester .docxmabelf3
System Analysis &Design
Dr.Sameer Alimamy
Fall Semester 2018\2019
Final Project
Cinema Explorer “Mobile Application”
Student named and IDs:
Zahraa AlHashim 201202468
Hanouf AlQannas 201400897
Mashael AlOmair 201001787
Alhanoof AlOtaibi 201201928
Table of Content
1. Executive summary.
1.1 Case Background.
1.2 Organization structure.
1.3 Information system facilities.
1.4 The problem.
2. Scope Definition
Solution
2.1 Request for Information System Services.
2.2 Problem Statement Matrix.
3. Problem Analysis.
3.1 Problems, Opportunities, Objectives and Constraints Matrix.
3.2 Tentative List of Requirements.
4. Modeling Functional Requirements.
4.1 Use Case Glossary.
4.2 Use Case Model Diagram.
4.3 Use Case Narrative.
5. Modeling Object Requirements.
5.1 Entity/Definition Matrix.
5.2 Domain Model.
5.3 ER Diagram.
6. Project Management.
7. Prototype.
8. Appendix A: Preliminary Investigation Interview of Scope Definition.
Appendix B: Interview of Problem Analysis.
1. Executive Summary (200 - 300 words)
1.1 Case Background
According to 2030 vision we create an App that will be the first App for cinema in Saudi Arabia. The cinema App will call Cinema Explorer. We will make a system for the application shows newest movies in many cinemas around Saudi Arabia at different times and places to helps lovers movies booking online. The application will shows to the users the nearest cinemas around them and allows them to select the movies and the seats. In addition, the application has special options for other services, which are selecting 3d glasses, blanket ordering snacks. The payment will be only online by visa and master card distinguished easily to pay. One advantages of the Cinema Explorer Application is save the time instead of going to the Cinema’s places
1.2 Organization Structure:
Cinema Explorer Application
Programmer
AlHanouf Alotaibi
Vice President
Mashael
System Developer
Zahraa
System analyst
Hanouf
1.3 Information System Facilities:
This application will provide up to date movies with the ability to view movie trailers, reserve seats, choose a snack, and pay through this application.
· 4G connection is required for best performance and slow connection may affect the overall app experience
· Find movie by the type of movie, rating, language and cast
· Quick to load and easy to use
1.4 The problem:
Entertainment is a very important aspect in people’s lives. Therefore, people need to have many ways to entertain themselves. One of the most common and popular ways for entertainment is cinema, and there are many cinemas exist globally since 1890s. I addition, since there are many importan.
JPA1404 Context-based Access Control Systems for Mobile Deviceschennaijp
We are providing lot of best and quality 2014 and 2015 android IEEE projects for final year students. Here you can download the entire abstract and basepaper at free of cost.
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/android-projects/
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsJason Hong
Talk Feb2019 at UCSD's Halıcıoğlu Data Science Institute, Security and Privacy at the Edge: Challenges and Future Directions
In the near future, our smart devices will know almost everything about us. These devices, combined with AI technologies, will offer many opportunities to vastly improve society in positive ways. However, these same technologies also pose dramatic new challenges for privacy and for ethics. In this talk, I'll sketch out why privacy is so hard to tackle, how and why we have failed in privacy and ethics in web and smartphones, and discuss some possible social, legal, and technical approaches for steering IoT in more positive directions.
http://datascience.ucsd.edu/security-and-privacy-symposium/venue.html
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
The american workplace is in a period of unprecedented change as the combination of mobile technology and social media is changing the "who, what, when and where" of work.
Capturing policies for fine-grained access control on mobile devices
1. Capturing policies for fine
grained access control
on mobile devices
PRAJIT KUMAR DAS, ANUPAM JOSHI, TIM FININ
UMBC ebiquity lab
2. We present MITHRIL, a framework for
capturing user access control policies that
are fine-grained, context-sensitive and are
represented using Semantic Web
technologies and thereby manages access
control decisions for user data on mobile
devices.
Motivation
Android image source courtesy: Aha-Soft
2
3. Related Work
• Policy Engineering: Requires substantial technical knowledge,
understanding of access control issues (Feltus’08)
• Most people are ‘Privacy Pragmatists’ (Kumaraguru’05)
• Convergence of Enterprise usage and personal usage due to BYOD
adoption (Kodeswaran, Chakraborty et. al.’13)
• Users unsure of policy (Benisch, Sadeh’11)
• Privacy profiles used for user preferences (Liu et. al.’14)
3
11. • Semantic Web Rule Language
• antecedent => consequent
• Attribute-Based Access Control model
• Context pieces as attributes
Rule representation
11
12. Rule representation
A1: RequesterInfo = Facebook &
A2: UserActivity = Work &
A3: UserLocation = Office &
A4: UserTime = Working hours on Week day &
A5: ProtectedResource = Location
->
C1: Prohibit
When at work Professors do not share
their location in FB
Image courtesy: www.phdcomics.com
12
13. Image courtesy: www.phdcomics.comGeneric Rule: Professors do not share their location on FB
During lunch Professor Smith shares location
This is Prof. Smith. He likes to
check in to FB during lunch.
13
Rule learning
14. When out to lunch Professor Smith shares
location with students if he has lunch
scheduled with them and he is in town
14
Rule Learning – User Feedback Capture
20. Future Work
• More experiments validating violation metric
• Finer granularity capture of policy violation
• Possible predictive model for policy generation
• Using machine learning to generate policies
• Inducing policy using logic programming
20
21. Conclusion
We presented MITHRIL
• Framework for capturing ABAC access control policies
• User-preferred & specific policy capture
• Fine-grained, context-sensitive
• Uses Semantic Web technologies
• Policy enforcement
21
UMBC ebiquity lab
Editor's Notes
Most people are ‘Privacy Pragmatists’ who, while concerned about privacy, will sometimes trade it off for other benefits”
Since the late 1970’s Dr. Alan Westin has conducted over 30 privacy surveys. For each of his surveys, Westin has created one or more Privacy Indexes to summarize his results and to show trends in privacy concerns. One such survey conducted in 2003 concluded that people would trade off privacy when they get other benefits.
As per Westin/Harris Privacy Segmentation Model basic privacy groups are
* fundamentalist: very high privacy concern. Passionate about what they [see] as business threats to their consumer privacy, and [favor] active government regulation of business and information practices
* pragmatist: middle group with balanced privacy attitudes. Ask what benefits they get as consumers in sharing their personal information to balance against risks to their privacy interests, and they usually favor a mixture of government and private solutions.
* unconcerned: little to no concern about consumer privacy issues.
Why should we care?
Apps collect user data
Emails, Messages, Documents, Sensor data – Highly Personal Data
Can’t App permissions handle privacy and security of data?
App permissions – “Take it or leave it”
Is user okay with sharing location in public place not private place, no way to control that
Use Privacy and Security module to implement context-dependent Rules
Why should we care?
Apps collect user data
Emails, Messages, Documents, Sensor data – Highly Personal Data
Can’t App permissions handle privacy and security of data?
App permissions – “Take it or leave it”
Is user okay with sharing location in public place not private place, no way to control that
Use Privacy and Security module to implement context-dependent Rules
Why should we care?
Apps collect user data
Emails, Messages, Documents, Sensor data – Highly Personal Data
Can’t App permissions handle privacy and security of data?
App permissions – “Take it or leave it”
Is user okay with sharing location in public place not private place, no way to control that
Use Privacy and Security module to implement context-dependent Rules
A key idea is expressing policy rules in an extensible and expressive semantic model and RDF/OWL is a good standard to support this
Using RDF/OWL allows easy reuse/integration with concepts from common semantic models, including DBpedia, Linked Data, schema.org, etc.
An access-control policy representation technique using an ontology to model high-level semantic context on a mobile device.
A framework for policy capture and using our VM metric to determine transitional state for MITHRIL.
Access control decision handling and policy enforcement.
Graduate students have a policy P for lunch hour
If location not school don’t share lunch location with people from school
Dan is a graduate student at UMBC
Dan frequently has lunches with professors and students from school
He modifies the policy rule that applies to lunch hours to lunch location shareable if in presence of people from school
Thus we learn the specific policy P′ of Dan (who belongs to Graduate Student Group)
We use an ontology to provide users with contextual options for choosing the conditions of a rule
User feedback app uses feedback algorithm for rule refinement. Choices are to generalize or specialize rules.
VM = TV / (FV + TV)
Transitional marker
VM = TV / (FV + TV)
Transitional marker
VM = TV / (FV + TV)
Transitional marker
The plan is to extend XPrivacy to be able to handle rules defined by us and have an API mechanism to allow such an execution.
Mention that the solutions do not have contextual policies which you will bring in.
Extend system to incorporate rule firing API
Ensure contextual rule firing
Ensure energy-efficient rule firing
Norman Sadeh and his group from CMU have done substantial work with capturing user preferences. They captured location preferences of the user and used various learning techniques to boost their results. They observed that once some user feedback has been obtained, learning algorithms were better at predicting what the user’s rules would be. They also observed that user’s keep on switching between their preferences of sharing and not-sharing. Essentially concluding user’s were bad at predicting their own rules. We intend to use an ontology driven approach at capturing user feedback. We want to show that the when presented with fine-grained context-dependent rules and observed rule violations, users will be able to better predict their preferences.
Other learning techniques have also been adopted in predicting the user’s intended choices which include decision trees to assist in predicting meeting timings in a calendar application, inductive logic programming to predict user behavior and carry our probabilistic rule learning. Inductive logic programming was used by corapi in an attempt to learn user behavior and later for rule learning in a planning scenario. He shows how one might be able to induce rules for user behavior. In the planning work he uses probabilities for rules and a knowledge base to minimize the error between target probability and entailed probability. Although his work started with a claim of learning privacy rules he did not complete his implementation for the domain due to the complexity and scalability issues of his method. In another work done by Tom Mitchell, decision trees were used in creating a smart assistant who predicts the meeting preferences of the user but required significant user input at times. In a third work Joseph Halpern used First order logic to reason about policies. However, he acknowledged that when using first-order logic we reach a point where the problem becomes intractable as because we have to prove validity of a first-order formula which is an undecidable problem. They also do not discuss any kind of performance or accuracy measure.