{"id":45,"date":"2018-10-30T16:39:09","date_gmt":"2018-10-30T16:39:09","guid":{"rendered":"https:\/\/blogit.itu.dk\/inda\/?page_id=45"},"modified":"2020-01-30T18:54:57","modified_gmt":"2020-01-30T18:54:57","slug":"list-of-publications","status":"publish","type":"page","link":"https:\/\/blogit.itu.dk\/virteuproject\/list-of-publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<div class=\"csl-bib-body\">\n<div class=\"csl-entry\">Bibliography formatted in APA citation style<\/div>\n<div>&nbsp;<\/div>\n<div class=\"csl-entry\">Berner, A., Seyfried, M., Nordenskj\u00f6ld, C., Kuhberg, P., &amp; Shklovski, I. (2019). Bear &amp; Co: Simulating Value Conflicts in IoT Development. <i>Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems<\/i>, INT025:1\u2013INT025:4. <a href=\"https:\/\/doi.org\/10.1145\/3290607.3313271\">https:\/\/doi.org\/10.1145\/3290607.3313271<\/a><\/div>\n<div>&nbsp;<\/div>\n<div class=\"csl-entry\">Br\u00f3dka, P., Chmiel, A., Magnani, M., &amp; Ragozini, G. (n.d.). Quantifying layer similarity in multiplex networks: A systematic study. <i>Royal Society Open Science<\/i>, <i>5<\/i>(8), 171747. <a href=\"https:\/\/doi.org\/10.1098\/rsos.171747\">https:\/\/doi.org\/10.1098\/rsos.171747<\/a><\/div>\n<div>&nbsp;<\/div>\n<div class=\"csl-entry\">Demetzou, K., B\u00f6ck, L., &amp; Hanteer, O. (2018). <i>Smart Bears don\u2019t talk to strangers: Analysing privacy concerns and technical solutions in smart toys for children<\/i>. 5 (7 pp.)-5 (7 pp.). <a href=\"https:\/\/doi.org\/10.1049\/cp.2018.0005\">https:\/\/doi.org\/10.1049\/cp.2018.0005<\/a><\/div>\n<div>&nbsp;<\/div>\n<div class=\"csl-entry\">DeVito, M. A., Hancock, J. T., French, M., Birnholtz, J., Antin, J., Karahalios, K., Tong, S., &amp; Shklovski, I. (2018). The Algorithm and the User: How Can HCI Use Lay Understandings of Algorithmic Systems? <i>Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems<\/i>, panel04:1\u2013panel04:6. <a href=\"https:\/\/doi.org\/10.1145\/3170427.3186320\">https:\/\/doi.org\/10.1145\/3170427.3186320<\/a><\/div>\n<div>&nbsp;<\/div>\n<div class=\"csl-entry\">Esposito, M. S. (2018). L\u2019impatto del trattamento sui diritti e le libert\u00e0 delle persone fisiche: Una valutazione alla luce della giurisprudenza delle autorit\u00e0 garanti italiana e spagnola. In A. Mantelero &amp; D. Poletti (Eds.), <i>Regolare la tecnologia: Il Reg. UE 2016\/679 e la protezione dei dati personali. Un dialogo fra Italia e Spagna<\/i>. <a href=\"https:\/\/www.academia.edu\/38143577\/Regolare_la_tecnologia._Il_Reg._Ue_2016-679_e_la_protezione_dei_dati_personali._Un_dialogo_tra_Italia_e_Spagna_a_cura_di_A._Mantelero_e_D._Poletti_.pdf\">https:\/\/www.academia.edu\/38143577\/Regolare_la_tecnologia._Il_Reg._Ue_2016-679_e_la_protezione_dei_dati_personali._Un_dialogo_tra_Italia_e_Spagna_a_cura_di_A._Mantelero_e_D._Poletti_.pdf<\/a><\/div>\n<div>&nbsp;<\/div>\n<div class=\"csl-entry\">Fatemi, Z., Salehi, M., &amp; Magnani, M. (2018). A Generalized Force-Directed Layout for Multiplex Sociograms. In S. Staab, O. Koltsova, &amp; D. I. Ignatov (Eds.), <i>Social Informatics<\/i> (pp. 212\u2013227). Springer International Publishing. <a href=\"https:\/\/doi.org\/10.1007\/978-3-030-01129-1_13\">https:\/\/doi.org\/10.1007\/978-3-030-01129-1_13<\/a><\/div>\n<div>&nbsp;<\/div>\n<div class=\"csl-entry\">Fritsch, E., Shklovski, I., &amp; Douglas-Jones, R. (2018). Calling for a Revolution: An Analysis of IoT Manifestos. <i>Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems<\/i>, 302:1\u2013302:13. <a href=\"https:\/\/doi.org\/10.1145\/3173574.3173876\">https:\/\/doi.org\/10.1145\/3173574.3173876<\/a><\/div>\n<div>&nbsp;<\/div>\n<div class=\"csl-entry\">Hanteer, O., Rossi, L., D\u2019Aurelio, D. V., &amp; Magnani, M. (2018). From Interaction to Participation: The Role of the Imagined Audience in Social Media Community Detection and an Application to Political Communication on Twitter. <i>ASONAM<\/i>, 531\u2013534. <a href=\"https:\/\/doi.org\/10.1109\/ASONAM.2018.8508575\">https:\/\/doi.org\/10.1109\/ASONAM.2018.8508575<\/a><\/div>\n<div>&nbsp;<\/div>\n<div class=\"csl-entry\">Hargitai, V., Shklovski, I., &amp; Wasowski, A. (2018). Going Beyond Obscurity: Organizational Approaches to Data Anonymization. <i>Proc. ACM Hum.-Comput. Interact.<\/i>, <i>2<\/i>(CSCW), 66:1\u201366:22. <a href=\"https:\/\/doi.org\/10.1145\/3274335\">https:\/\/doi.org\/10.1145\/3274335<\/a><\/div>\n<div>&nbsp;<\/div>\n<div class=\"csl-entry\">Jr, O. H. G., &amp; Nemorin, S. (2019). Toward a political economy of nudge: Smart city variations. <i>Information, Communication &amp; Society<\/i>, <i>22<\/i>(14), 2112\u20132126. <a href=\"https:\/\/doi.org\/10.1080\/1369118X.2018.1477969\">https:\/\/doi.org\/10.1080\/1369118X.2018.1477969<\/a><\/div>\n<div>&nbsp;<\/div>\n<div class=\"csl-entry\">Kotsios, A., Magnani, M., Rossi, L., Shklovski, I., &amp; Vega, D. (2019). An Analysis of the Consequences of the General Data Protection Regulation (GDPR) on Social Network Research. <i>ArXiv:1903.03196 [Cs]<\/i>. <a href=\"https:\/\/doi.org\/10.1145\/3365524\">https:\/\/doi.org\/10.1145\/3365524<\/a><\/div>\n<div>&nbsp;<\/div>\n<div class=\"csl-entry\">Light, A., Powell, A., &amp; Shklovski, I. (2017). Design for Existential Crisis in the Anthropocene Age. <i>Proceedings of the 8th International Conference on Communities and Technologies<\/i>, 270\u2013279. <a href=\"https:\/\/doi.org\/10.1145\/3083671.3083688\">https:\/\/doi.org\/10.1145\/3083671.3083688<\/a><\/div>\n<div>&nbsp;<\/div>\n<div class=\"csl-entry\">Light, A., Shklovski, I., &amp; Powell, A. (2017). Design for Existential Crisis. <i>Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems<\/i>, 722\u2013734. <a href=\"https:\/\/doi.org\/10.1145\/3027063.3052760\">https:\/\/doi.org\/10.1145\/3027063.3052760<\/a><\/div>\n<div>&nbsp;<\/div>\n<div class=\"csl-entry\">Mantelero, A. (2017). Towards a big data regulation based on social and ethical values. <i>Revista de Bio\u00e9tica y Derecho<\/i>, <i>The guidelines of the Council of Europe<\/i>(41), 67\u201384. <a href=\"https:\/\/doi.org\/10.1344\/rbd2017.41.19911\">https:\/\/doi.org\/10.1344\/rbd2017.41.19911<\/a><\/div>\n<div>&nbsp;<\/div>\n<div class=\"csl-entry\">Mantelero, A. (2018). AI and Big Data: A blueprint for a human rights, social and ethical impact assessment. <i>Computer Law &amp; Security Review<\/i>, <i>34<\/i>(4), 754\u2013772. <a href=\"https:\/\/doi.org\/10.1016\/j.clsr.2018.05.017\">https:\/\/doi.org\/10.1016\/j.clsr.2018.05.017<\/a><\/div>\n<\/div>\n<div>&nbsp;<\/div>\n<div class=\"csl-bib-body\">\n<div class=\"csl-entry\">Powell, A. (2018). Moral Orders in Contribution Cultures. <i>Communication, Culture and Critique<\/i>, <i>11<\/i>(4), 513\u2013529. <a href=\"https:\/\/doi.org\/10.1093\/ccc\/tcy023\">https:\/\/doi.org\/10.1093\/ccc\/tcy023<\/a><\/div>\n<div>&nbsp;<\/div>\n<div class=\"csl-entry\">Powell, A., Ustek-Spilda, F., &amp; Shklovski, I. (2019). Virtue, Capability and Care: Beyond the consequentialist imaginary. <i>Ethicomp 2020 &#8211; Paradigm Shifts in ICT Ethics: Societal Challenges in the Smart Society<\/i>.<\/div>\n<div>&nbsp;<\/div>\n<div class=\"csl-entry\">Tehrani, N. A., &amp; Magnani, M. (2018). <i>Partial and Overlapping Community Detection in Multiplex Social Networks<\/i>. <i>11186<\/i>, 15\u201328. <a href=\"https:\/\/doi.org\/10.1007\/978-3-030-01159-8_2\">https:\/\/doi.org\/10.1007\/978-3-030-01159-8_2<\/a><\/div>\n<div>&nbsp;<\/div>\n<div class=\"csl-entry\">Ustek Spilda, F., Powell, A., Shklovski, I., &amp; Lehuede Bravo, S. A. (2019). Peril v. promise: IoT and the ethical imaginaries. In <i>CHI\u201919 Extended Abstracts<\/i>. ACM Press. <a href=\"https:\/\/www.acm.org\/\">https:\/\/www.acm.org\/<\/a><\/div>\n<div>&nbsp;<\/div>\n<div class=\"csl-entry\">Ustek-Spilda, F., Powell, A., &amp; Nemorin, S. (2019). Engaging with ethics in Internet of Things: Imaginaries in the social milieu of technology developers. <i>Big Data &amp; Society<\/i>, <i>6<\/i>(2), 2053951719879468. <a href=\"https:\/\/doi.org\/10.1177\/2053951719879468\">https:\/\/doi.org\/10.1177\/2053951719879468<\/a><\/div>\n<div>&nbsp;<\/div>\n<div class=\"csl-entry\">Vega, D., &amp; Magnani, M. (2018). Foundations of Temporal Text Networks. <i>Applied Network Science<\/i>, <i>3<\/i>(1), 25. <a href=\"https:\/\/doi.org\/10.1007\/s41109-018-0082-3\">https:\/\/doi.org\/10.1007\/s41109-018-0082-3<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Bibliography formatted in APA citation style &nbsp; Berner, A., Seyfried, M., Nordenskj\u00f6ld, C., Kuhberg, P., &amp; Shklovski, I. (2019). Bear &amp; Co: Simulating Value Conflicts in IoT Development. Extended Abstracts [&hellip;]<\/p>\n","protected":false},"author":211,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-nosidebar.php","meta":{"ngg_post_thumbnail":0,"footnotes":""},"class_list":["post-45","page","type-page","status-publish","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogit.itu.dk\/virteuproject\/wp-json\/wp\/v2\/pages\/45","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogit.itu.dk\/virteuproject\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogit.itu.dk\/virteuproject\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogit.itu.dk\/virteuproject\/wp-json\/wp\/v2\/users\/211"}],"replies":[{"embeddable":true,"href":"https:\/\/blogit.itu.dk\/virteuproject\/wp-json\/wp\/v2\/comments?post=45"}],"version-history":[{"count":64,"href":"https:\/\/blogit.itu.dk\/virteuproject\/wp-json\/wp\/v2\/pages\/45\/revisions"}],"predecessor-version":[{"id":2362,"href":"https:\/\/blogit.itu.dk\/virteuproject\/wp-json\/wp\/v2\/pages\/45\/revisions\/2362"}],"wp:attachment":[{"href":"https:\/\/blogit.itu.dk\/virteuproject\/wp-json\/wp\/v2\/media?parent=45"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}