CINXE.COM
Towards Computer-Using Personal Agents
<!DOCTYPE html> <html lang="en"> <head> <meta content="text/html; charset=utf-8" http-equiv="content-type"/> <title>Towards Computer-Using Personal Agents</title> <!--Generated on Fri Jan 31 12:19:34 2025 by LaTeXML (version 0.8.8) http://dlmf.nist.gov/LaTeXML/.--> <meta content="width=device-width, initial-scale=1, shrink-to-fit=no" name="viewport"/> <link href="https://cdn.jsdelivr.net/npm/bootstrap@5.3.0/dist/css/bootstrap.min.css" rel="stylesheet" type="text/css"/> <link href="/static/browse/0.3.4/css/ar5iv.0.7.9.min.css" rel="stylesheet" type="text/css"/> <link href="/static/browse/0.3.4/css/ar5iv-fonts.0.7.9.min.css" rel="stylesheet" type="text/css"/> <link href="/static/browse/0.3.4/css/latexml_styles.css" rel="stylesheet" type="text/css"/> <script src="https://cdn.jsdelivr.net/npm/bootstrap@5.3.0/dist/js/bootstrap.bundle.min.js"></script> <script src="https://cdnjs.cloudflare.com/ajax/libs/html2canvas/1.3.3/html2canvas.min.js"></script> <script src="/static/browse/0.3.4/js/addons_new.js"></script> <script src="/static/browse/0.3.4/js/feedbackOverlay.js"></script> <base href="/html/2503.15515v1/"/></head> <body> <nav class="ltx_page_navbar"> <nav class="ltx_TOC"> <ol class="ltx_toclist"> <li class="ltx_tocentry ltx_tocentry_section"><a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#S1" title="In Towards Computer-Using Personal Agents"><span class="ltx_text ltx_ref_title"><span class="ltx_tag ltx_tag_ref">1 </span>Introduction</span></a></li> <li class="ltx_tocentry ltx_tocentry_section"><a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#S2" title="In Towards Computer-Using Personal Agents"><span class="ltx_text ltx_ref_title"><span class="ltx_tag ltx_tag_ref">2 </span>User Scenario</span></a></li> <li class="ltx_tocentry ltx_tocentry_section"><a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#S3" title="In Towards Computer-Using Personal Agents"><span class="ltx_text ltx_ref_title"><span class="ltx_tag ltx_tag_ref">3 </span>State of the Art</span></a></li> <li class="ltx_tocentry ltx_tocentry_section"><a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#S4" title="In Towards Computer-Using Personal Agents"><span class="ltx_text ltx_ref_title"><span class="ltx_tag ltx_tag_ref">4 </span>Added Value</span></a></li> <li class="ltx_tocentry ltx_tocentry_section"><a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#S5" title="In Towards Computer-Using Personal Agents"><span class="ltx_text ltx_ref_title"><span class="ltx_tag ltx_tag_ref">5 </span>CUPA Capabilities</span></a></li> <li class="ltx_tocentry ltx_tocentry_section"><a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#S6" title="In Towards Computer-Using Personal Agents"><span class="ltx_text ltx_ref_title"><span class="ltx_tag ltx_tag_ref">6 </span>Technical Challenges</span></a></li> <li class="ltx_tocentry ltx_tocentry_section"><a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#S7" title="In Towards Computer-Using Personal Agents"><span class="ltx_text ltx_ref_title"><span class="ltx_tag ltx_tag_ref">7 </span>Roadmap</span></a></li> <li class="ltx_tocentry ltx_tocentry_section"><a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#S8" title="In Towards Computer-Using Personal Agents"><span class="ltx_text ltx_ref_title"><span class="ltx_tag ltx_tag_ref">8 </span>Conclusion</span></a></li> </ol></nav> </nav> <div class="ltx_page_main"> <div class="ltx_page_content"> <article class="ltx_document ltx_authors_1line ltx_leqno"> <h1 class="ltx_title ltx_title_document">Towards Computer-Using Personal Agents</h1> <div class="ltx_authors"> <span class="ltx_creator ltx_role_author"> <span class="ltx_personname">Piero A. Bonatti </span><span class="ltx_author_notes"> <span class="ltx_contact ltx_role_affiliation"><span class="ltx_text ltx_affiliation_institution" id="id1.1.id1">University of Naples Federico II</span><span class="ltx_text ltx_affiliation_city" id="id2.2.id2">Naples</span><span class="ltx_text ltx_affiliation_country" id="id3.3.id3">Italy</span> </span> <span class="ltx_contact ltx_role_email"><a href="mailto:pab@unina.it">pab@unina.it</a> </span> <span class="ltx_contact ltx_role_orcid"><a class="ltx_ref" href="https://orcid.org/0000-0003-1436-5660" title="ORCID identifier">0000-0003-1436-5660</a></span> </span></span> <span class="ltx_author_before">, </span><span class="ltx_creator ltx_role_author"> <span class="ltx_personname">John Domingue </span><span class="ltx_author_notes"> <span class="ltx_contact ltx_role_affiliation"><span class="ltx_text ltx_affiliation_institution" id="id4.1.id1">Knowledge Media Institute, The Open University</span><span class="ltx_text ltx_affiliation_city" id="id5.2.id2">Milton Keynes</span><span class="ltx_text ltx_affiliation_country" id="id6.3.id3">UK</span> </span> <span class="ltx_contact ltx_role_email"><a href="mailto:john.domingue@open.ac.uk">john.domingue@open.ac.uk</a> </span> <span class="ltx_contact ltx_role_orcid"><a class="ltx_ref" href="https://orcid.org/0000-0001-8439-0293" title="ORCID identifier">0000-0001-8439-0293</a></span> </span></span> <span class="ltx_author_before">, </span><span class="ltx_creator ltx_role_author"> <span class="ltx_personname">Anna Lisa Gentile </span><span class="ltx_author_notes"> <span class="ltx_contact ltx_role_affiliation"><span class="ltx_text ltx_affiliation_institution" id="id7.1.id1">IBM Research</span><span class="ltx_text ltx_affiliation_city" id="id8.2.id2">San Jose, CA</span><span class="ltx_text ltx_affiliation_country" id="id9.3.id3">USA</span> </span> <span class="ltx_contact ltx_role_email"><a href="mailto:annalisa.gentile@ibm.com">annalisa.gentile@ibm.com</a> </span> <span class="ltx_contact ltx_role_orcid"><a class="ltx_ref" href="https://orcid.org/0000-0002-6401-4175" title="ORCID identifier">0000-0002-6401-4175</a></span> </span></span> <span class="ltx_author_before">, </span><span class="ltx_creator ltx_role_author"> <span class="ltx_personname">Andreas Harth </span><span class="ltx_author_notes"> <span class="ltx_contact ltx_role_affiliation"><span class="ltx_text ltx_affiliation_institution" id="id10.1.id1">Friedrich-Alexander-Universität Erlangen-Nürnberg & Fraunhofer Institute for Integrated Circuits IIS</span><span class="ltx_text ltx_affiliation_city" id="id11.2.id2">Nürnberg</span><span class="ltx_text ltx_affiliation_country" id="id12.3.id3">Germany</span> </span> <span class="ltx_contact ltx_role_orcid"><a class="ltx_ref" href="https://orcid.org/0000-0002-0702-510X" title="ORCID identifier">0000-0002-0702-510X</a></span> <span class="ltx_contact ltx_role_email"><a href="mailto:andreas.harth@fau.de">andreas.harth@fau.de</a> </span></span></span> <span class="ltx_author_before">, </span><span class="ltx_creator ltx_role_author"> <span class="ltx_personname">Olaf Hartig </span><span class="ltx_author_notes"> <span class="ltx_contact ltx_role_affiliation"><span class="ltx_text ltx_affiliation_institution" id="id13.1.id1">Linköping University</span><span class="ltx_text ltx_affiliation_city" id="id14.2.id2">Linköping</span><span class="ltx_text ltx_affiliation_country" id="id15.3.id3">Sweden</span> </span> <span class="ltx_contact ltx_role_email"><a href="mailto:olaf.hartig@liu.se">olaf.hartig@liu.se</a> </span> <span class="ltx_contact ltx_role_orcid"><a class="ltx_ref" href="https://orcid.org/0000-0002-1741-2090" title="ORCID identifier">0000-0002-1741-2090</a></span> </span></span> <span class="ltx_author_before">, </span><span class="ltx_creator ltx_role_author"> <span class="ltx_personname">Aidan Hogan </span><span class="ltx_author_notes"> <span class="ltx_contact ltx_role_affiliation"><span class="ltx_text ltx_affiliation_institution" id="id16.1.id1">DCC, Universidad de Chile & IMFD</span><span class="ltx_text ltx_affiliation_city" id="id17.2.id2">Santiago</span><span class="ltx_text ltx_affiliation_country" id="id18.3.id3">Chile</span> </span> <span class="ltx_contact ltx_role_email"><a href="mailto:ahogan@dcc.uchile.cl">ahogan@dcc.uchile.cl</a> </span> <span class="ltx_contact ltx_role_orcid"><a class="ltx_ref" href="https://orcid.org/0000-0001-9482-1982" title="ORCID identifier">0000-0001-9482-1982</a></span> </span></span> <span class="ltx_author_before">, </span><span class="ltx_creator ltx_role_author"> <span class="ltx_personname">Katja Hose </span><span class="ltx_author_notes"> <span class="ltx_contact ltx_role_affiliation"><span class="ltx_text ltx_affiliation_institution" id="id19.1.id1">TU Wien</span><span class="ltx_text ltx_affiliation_city" id="id20.2.id2">Vienna</span><span class="ltx_text ltx_affiliation_country" id="id21.3.id3">Austria</span> </span> <span class="ltx_contact ltx_role_email"><a href="mailto:katja.hose@tuwien.ac.at">katja.hose@tuwien.ac.at</a> </span> <span class="ltx_contact ltx_role_orcid"><a class="ltx_ref" href="https://orcid.org/0000-0001-7025-8099" title="ORCID identifier">0000-0001-7025-8099</a></span> </span></span> <span class="ltx_author_before">, </span><span class="ltx_creator ltx_role_author"> <span class="ltx_personname">Ernesto Jimenez-Ruiz </span><span class="ltx_author_notes"> <span class="ltx_contact ltx_role_affiliation"><span class="ltx_text ltx_affiliation_institution" id="id22.1.id1">City St George’s, University of London</span><span class="ltx_text ltx_affiliation_city" id="id23.2.id2">London</span><span class="ltx_text ltx_affiliation_country" id="id24.3.id3">UK</span> </span> <span class="ltx_contact ltx_role_email"><a href="mailto:ernesto.jimenez-ruiz@city.ac.uk">ernesto.jimenez-ruiz@city.ac.uk</a> </span> <span class="ltx_contact ltx_role_orcid"><a class="ltx_ref" href="https://orcid.org/0000-0002-9083-4599" title="ORCID identifier">0000-0002-9083-4599</a></span> </span></span> <span class="ltx_author_before">, </span><span class="ltx_creator ltx_role_author"> <span class="ltx_personname">Deborah L. McGuinness </span><span class="ltx_author_notes"> <span class="ltx_contact ltx_role_email"><a href="mailto:dlm@cs.rpi.edu">dlm@cs.rpi.edu</a> </span> <span class="ltx_contact ltx_role_affiliation"><span class="ltx_text ltx_affiliation_institution" id="id25.1.id1">Rensselaer Polytechnic Institute</span><span class="ltx_text ltx_affiliation_city" id="id26.2.id2">Troy, NY</span><span class="ltx_text ltx_affiliation_country" id="id27.3.id3">USA</span> </span> <span class="ltx_contact ltx_role_orcid"><a class="ltx_ref" href="https://orcid.org/0000-0001-7037-4567" title="ORCID identifier">0000-0001-7037-4567</a></span> </span></span> <span class="ltx_author_before">, </span><span class="ltx_creator ltx_role_author"> <span class="ltx_personname">Chang Sun </span><span class="ltx_author_notes"> <span class="ltx_contact ltx_role_affiliation"><span class="ltx_text ltx_affiliation_institution" id="id28.1.id1">Maastricht University</span><span class="ltx_text ltx_affiliation_city" id="id29.2.id2">Maastricht</span><span class="ltx_text ltx_affiliation_country" id="id30.3.id3">The Netherlands</span> </span> <span class="ltx_contact ltx_role_email"><a href="mailto:chang.sun@maastrichtuniversity.nl">chang.sun@maastrichtuniversity.nl</a> </span> <span class="ltx_contact ltx_role_orcid"><a class="ltx_ref" href="https://orcid.org/0000-0001-8325-8848" title="ORCID identifier">0000-0001-8325-8848</a></span> </span></span> <span class="ltx_author_before">, </span><span class="ltx_creator ltx_role_author"> <span class="ltx_personname">Ruben Verborgh </span><span class="ltx_author_notes"> <span class="ltx_contact ltx_role_affiliation"><span class="ltx_text ltx_affiliation_institution" id="id31.1.id1">IDLab, ELIS, Ghent University – imec</span><span class="ltx_text ltx_affiliation_city" id="id32.2.id2">Ghent</span><span class="ltx_text ltx_affiliation_country" id="id33.3.id3">Belgium</span> </span> <span class="ltx_contact ltx_role_email"><a href="mailto:ruben.verborgh@ugent.be">ruben.verborgh@ugent.be</a> </span> <span class="ltx_contact ltx_role_orcid"><a class="ltx_ref" href="https://orcid.org/0000-0002-8596-222X" title="ORCID identifier">0000-0002-8596-222X</a></span> </span></span> <span class="ltx_author_before"> and </span><span class="ltx_creator ltx_role_author"> <span class="ltx_personname">Jesse Wright </span><span class="ltx_author_notes"> <span class="ltx_contact ltx_role_affiliation"><span class="ltx_text ltx_affiliation_institution" id="id34.1.id1">Department of Computer Science, University of Oxford</span><span class="ltx_text ltx_affiliation_city" id="id35.2.id2">Oxford</span><span class="ltx_text ltx_affiliation_country" id="id36.3.id3">UK</span> </span> <span class="ltx_contact ltx_role_email"><a href="mailto:jesse.wright@cs.ox.ac.uk">jesse.wright@cs.ox.ac.uk</a> </span> <span class="ltx_contact ltx_role_orcid"><a class="ltx_ref" href="https://orcid.org/0000-0002-5771-988X" title="ORCID identifier">0000-0002-5771-988X</a></span> </span></span> </div> <div class="ltx_abstract"> <h6 class="ltx_title ltx_title_abstract">Abstract.</h6> <p class="ltx_p" id="id37.id1">Computer-Using Agents (CUA) enable users to automate increasingly-complex tasks using graphical interfaces such as browsers. As many potential tasks require personal data, we propose Computer-Using Personal Agents (CUPAs) that have access to an external repository of the user’s personal data. Compared with CUAs, CUPAs offer users better control of their personal data, the potential to automate more tasks involving personal data, better interoperability with external sources of data, and better capabilities to coordinate with other CUPAs in order to solve collaborative tasks involving the personal data of multiple users.</p> </div> <section class="ltx_section" id="S1"> <h2 class="ltx_title ltx_title_section"> <span class="ltx_tag ltx_tag_section">1. </span>Introduction</h2> <div class="ltx_para" id="S1.p1"> <p class="ltx_p" id="S1.p1.1">Advances in Generative AI, and particularly Large Language Models (LLMs), have led to the recent release of various <span class="ltx_text ltx_font_italic" id="S1.p1.1.1">Computer-Using Agents</span> (<span class="ltx_text ltx_font_italic" id="S1.p1.1.2">CUAs</span>) that automatically operate a user’s computer on their behalf. These agents use multimodal capabilities to interact with graphical interfaces via simulated mouse and keyboard inputs. Prominent commercial examples of CUAs include OpenAI’s Operator, Google’s Jarvis, and new functionalities in Anthropic’s Claude.</p> </div> <div class="ltx_para" id="S1.p2"> <p class="ltx_p" id="S1.p2.1">Potential use cases for CUAs involve personal and often sensitive data, such as credit card details for purchases, passport numbers for flight booking, addresses for deliveries, and allergy information for dinner reservations. While modern browsers sometimes store personal data to autocomplete web forms, CUAs could additionally take context into account (e.g., selecting between a home or work address, depending on the purchase) and go beyond simple autocompletion.</p> </div> <div class="ltx_para" id="S1.p3"> <p class="ltx_p" id="S1.p3.1">Passing personal data to CUAs raises valid concerns about how such data might be (mis)used. Currently, OpenAI’s Operator invokes a <span class="ltx_text ltx_font_italic" id="S1.p3.1.1">takeover mode</span> for tasks involving sensitive data (e.g., log-in or payment details): the user is required to fill the details in manually <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib25" title="">Operator2025, </a>)</cite>. Such measures target users’ concerns about how their personal information will be used by CUAs. OpenAI themselves state that Operator is <span class="ltx_text ltx_inline-quote ltx_outerquote ltx_font_italic" id="S1.p3.1.2">“still learning, evolving and may make mistakes”</span> <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib25" title="">Operator2025, </a>)</cite>. There are thus many open questions relating to the use of personal user data by CUAs.</p> </div> <div class="ltx_para" id="S1.p4"> <p class="ltx_p" id="S1.p4.1">Conversely, there are many potential benefits to users if CUAs are empowered with personal data. CUAs could autofill forms with personal data for users in a context-aware and potentially generative manner, automating a tedious task. CUAs could potentially enrich personal data with public data to better solve tasks. The CUAs of multiple users could negotiate to achieve a mutually beneficial result based on their users’ personal context and preferences.</p> </div> <div class="ltx_para" id="S1.p5"> <p class="ltx_p" id="S1.p5.1">Towards providing users more oversight over their personal data while enabling higher levels of automation for complex tasks, we propose <span class="ltx_text ltx_font_bold" id="S1.p5.1.1">Computer-Using Personal Agents</span> (<span class="ltx_text ltx_font_bold" id="S1.p5.1.2">CUPAs</span>): <span class="ltx_text ltx_font_italic" id="S1.p5.1.3">a Computer-Using Agent (CUA) that has controlled access to a structured repository of private information relating to a user</span>. This concept is illustrated in Figure <a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#S1.F1" title="Figure 1 ‣ 1. Introduction ‣ Towards Computer-Using Personal Agents"><span class="ltx_text ltx_ref_tag">1</span></a>. Specifically, we propose to instantiate the repository as a <span class="ltx_text ltx_font_italic" id="S1.p5.1.4">Personal Knowledge Graph</span> (<span class="ltx_text ltx_font_italic" id="S1.p5.1.5">PKG</span>) representing the user’s personal data, which would facilitate the specification by users on how the CUA can access and use these data. This PKG can collect more personal data over time, with policies also evolving to reflect the user’s fluctuating trust in the system <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib2" title="">afroogh2024trust, </a>)</cite>. Looking further forward, one can then imagine a scenario where CUPAs interact with websites and services via the underlying Web APIs instead of through a vision model, where CUPAs can assist in recommendations and negotiations based also on interactions with similar users and/or users’ CUPAs.</p> </div> <div class="ltx_para" id="S1.p6"> <p class="ltx_p" id="S1.p6.1">We provide a road-map towards realising this vision of CUPAs, discussing what is achievable now with current technology, and what gaps must be addressed via further research and development.</p> </div> <figure class="ltx_figure" id="S1.F1"> <div class="ltx_flex_figure"> <div class="ltx_flex_cell ltx_flex_size_2"><img alt="Refer to caption" class="ltx_graphics ltx_centering ltx_figure_panel ltx_img_landscape" height="177" id="S1.F1.g1" src="x1.png" width="338"/></div> </div> <figcaption class="ltx_caption ltx_centering"><span class="ltx_tag ltx_tag_figure">Figure 1. </span>Computer-Using Personal Agent </figcaption><div class="ltx_flex_figure"> <div class="ltx_flex_cell ltx_flex_size_1"><span class="ltx_ERROR ltx_centering ltx_figure_panel undefined" id="S1.F1.1">\Description</span></div> <div class="ltx_flex_break"></div> <div class="ltx_flex_cell ltx_flex_size_1"> <p class="ltx_p ltx_figure_panel ltx_align_center" id="S1.F1.2">[Computer-Using Personal Agent]”The image depicts the flow of Computer-Using Personal Agent.”</p> </div> </div> </figure> </section> <section class="ltx_section" id="S2"> <h2 class="ltx_title ltx_title_section"> <span class="ltx_tag ltx_tag_section">2. </span>User Scenario</h2> <div class="ltx_para" id="S2.p1"> <p class="ltx_p" id="S2.p1.1">Sam is expecting Jane over for dinner at 8pm, and is thinking about preparing Thai food. Sam is pre-diabetic, while Jane has a shellfish allergy. Sam requests that his CUPA to generates some suggestions of Thai recipes for the occasion. Consulting Sam’s schedule, the CUPA recommends to filter recipes requiring more than an hour to prepare based on when he finishes work and his commute time. Sam agrees, and the CUPA starts to retrieve and present shellfish-free recipes of Thai food that are quick to prepare. Upon consulting external sources of nutritional information and recipes on the Web, the CUPA flags some recipes as being above the postprandial glucose threshold recommended by Sam’s doctor (¡180 mg/dL), or as having high glycaemic indices (¿70).</p> </div> <div class="ltx_para" id="S2.p2"> <p class="ltx_p" id="S2.p2.1">Sam asks his CUPA to find out what recipe Jane might like. As Sam and Jane are friends, Sam’s CUPA can send the candidate recipes to Jane’s CUPA to see what she might like. Jane’s CUPA suggests to avoid some recipes that include coriander (listed in some recipes as cilantro), which Jane hates. Sam’s agent enforces his glucose thresholds and flags ingredients with high glycaemic indices, using external food and recipe knowledge graphs (e.g., the FoodKG <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib16" title="">haussman2019, </a>)</cite>) to find the alternative ingredients. Of the remaining options, Sam’s agent suggests a tofu green curry recipe that catches Sam’s eye. Since the recipe is flagged for having a high glycaemic index (78), the agent asks Sam if he might consider replacing jasmine rice with cauliflower rice as a healthier option. Sam refuses the substitution as it is a special occasion.</p> </div> <div class="ltx_para" id="S2.p3"> <p class="ltx_p" id="S2.p3.1">Sam requests his CUPA to order the ingredients from a local supermarket. Since green bell peppers are out of stock, the CUPA suggests to replace them with yellow bell peppers. Sam agrees, and the CUPA prepares the order for delivery to Sam’s home address, soliciting Sam’s confirmation. Later that night, Sam and Jane enjoy their dinner of Thai green curry. After Jane leaves, Sam suffers some slight heartburn. He requests his CUPA to order antacids and additionally registers the fact that green curry dishes may cause Sam heartburn for future reference.</p> </div> </section> <section class="ltx_section" id="S3"> <h2 class="ltx_title ltx_title_section"> <span class="ltx_tag ltx_tag_section">3. </span>State of the Art</h2> <div class="ltx_para" id="S3.p1"> <p class="ltx_p" id="S3.p1.1">Personal data play an increasingly important role in modern life <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib24" title="">Mortier2016, </a>; <a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib6" title="">Birch2021, </a>)</cite>. Early works <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib18" title="">Jones2012, </a>)</cite> characterise such data based on the <span class="ltx_text ltx_font_italic" id="S3.p1.1.1">concept of six senses</span>: owned by me, about me, directed to me, sent by me, already experienced by me, and useful to me. More restrictive definitions only include data created by the individual <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib3" title="">Bergman2016, </a>)</cite>, or that the individual cares for/about <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib11" title="">24824, </a>; <a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib12" title="">Cushing2022, </a>)</cite>.</p> </div> <div class="ltx_para" id="S3.p2"> <p class="ltx_p" id="S3.p2.1">Much literature has been dedicated to Personal Information Management systems (PIMs), which deal with the acquisition, organisation, maintenance, retrieval and sharing of personal data <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib19" title="">jones2007personal, </a>)</cite>. Notable PIM technologies include blockchain systems <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib36" title="">Zyskind2015, </a>; <a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib14" title="">Faber2019, </a>)</cite>, systems capturing user behaviour on multiple user devices <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib22" title="">Lin2022, </a>; <a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib26" title="">Schroder2022, </a>)</cite>, and end-user prototypes <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib9" title="">Chaudhry2015, </a>; <a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib24" title="">Mortier2016, </a>; <a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib20" title="">Kalokyri2018, </a>)</cite>. Personal Knowledge Graphs (PKGs) <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib7" title="">Chakraborty2022, </a>; <a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib8" title="">Chakraborty2023, </a>; <a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib27" title="">skjaeveland2024ecosystem, </a>)</cite> further apply a graph abstraction to personal data, opening up possibilities for declarative access policies, deductive inference, and integration with external Knowledge Graphs.</p> </div> <div class="ltx_para" id="S3.p3"> <p class="ltx_p" id="S3.p3.1">Towards taking fuller advantage of such data, AI-powered agents show much promise, particularly those that can automate tasks currently performed by the user. Robotic Process Automation (RPA) <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib29" title="">Aalst, </a>; <a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib13" title="">Silva2022, </a>)</cite> automates interactions with human interfaces. However, such approaches are hard-coded, brittle to changes in the interface, and incapable of generalising to unseen interfaces. Conversely, AI-based agents are capable of learning and generalising. LLM-based agents have been proposed to operate in diverse environments using recursion, feedback, and careful prompt engineering <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib33" title="">YangPNY23, </a>)</cite>. Such LLM-based agents are capable of solving computer tasks – despite the limited reasoning capabilities in LLMs <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib21" title="">KimBM23, </a>)</cite> – paving the way for CUAs such as Operator <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib25" title="">Operator2025, </a>)</cite>.</p> </div> <div class="ltx_para" id="S3.p4"> <p class="ltx_p" id="S3.p4.1">Regarding works unifying LLM-based agents with PKGs, AGENTIGraph <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib34" title="">Zhao2024, </a>)</cite> heads in this direction, but rather focuses on question answering. Closer to the idea of CUPAs is Charlie: a brief proposal by Berners-Lee <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib4" title="">charlieWorks, </a>)</cite> on combining LLM-based agents with PKGs instantiated by Solid pods using Semantic Web standards. This proposal, and the user scenario presented previously, echo the (yet unrealised) vision laid out by Berners-Lee et al. <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib5" title="">berners-lee2001, </a>)</cite> for the Semantic Web 24 years ago. Wright <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib31" title="">DBLP:journals/corr/abs-2409-04465, </a>)</cite> presents a “discuss then transact” model of LLM-interaction in support of this vision for LLM-based personal agents that represent legal entities.</p> </div> </section> <section class="ltx_section" id="S4"> <h2 class="ltx_title ltx_title_section"> <span class="ltx_tag ltx_tag_section">4. </span>Added Value</h2> <div class="ltx_para" id="S4.p1"> <p class="ltx_p" id="S4.p1.1">Societal and legal debates on personal data emphasise <em class="ltx_emph ltx_font_italic" id="S4.p1.1.1">protection</em> from the harm that they could inflict, and understandably so. Yet people voluntarily exchange personal data with others in their every-day lives in the pursuit of mutual benefit. People can decide to leverage more personal data, or different kinds of personal data, to achieve a desired outcome. For instance, patients might prefer to share fitness-tracker data with their doctor if this improves their treatment, or consumers might want to divulge allergies and dietary needs to streamline online shopping and avoid nasty surprises.</p> </div> <div class="ltx_para" id="S4.p2"> <p class="ltx_p" id="S4.p2.1">A dangerous assumption is that companies are more capable of distilling value from people’s personal data than the people the data describe. A company certainly has advantages over individuals in this respect, such as the ability to aggregate over a great many users. But personal data about a particular individual in isolation has much greater potential to empower that individual than a company they interact with, especially when the individual is coached by an agent such as a CUPA. CUPAs representing different parties could even negotiate a better outcome for <em class="ltx_emph ltx_font_italic" id="S4.p2.1.1">all</em> parties involved.</p> </div> <div class="ltx_para" id="S4.p3"> <p class="ltx_p" id="S4.p3.1">Considering the added value of CUPAs, and more generally of providing AI-based agents access to personal data, we highlight:</p> </div> <div class="ltx_para" id="S4.p4"> <dl class="ltx_description" id="S4.I1"> <dt class="ltx_item" id="S4.I1.ix1"><span class="ltx_tag ltx_tag_item"><span class="ltx_text ltx_font_bold" id="S4.I1.ix1.1.1.1">Multi-dimensional negotiation.: </span></span></dt> <dd class="ltx_item"> <div class="ltx_para" id="S4.I1.ix1.p1"> <p class="ltx_p" id="S4.I1.ix1.p1.1">CUPAs can help users to strike sweet-spots between multiple dimensions, such as the cost and duration of multi-hop flights, the deliciousness and healthiness of meal options, etc.</p> </div> </dd> <dt class="ltx_item" id="S4.I1.ix2"><span class="ltx_tag ltx_tag_item"><span class="ltx_text ltx_font_bold" id="S4.I1.ix2.1.1.1">Increased granularity.: </span></span></dt> <dd class="ltx_item"> <div class="ltx_para" id="S4.I1.ix2.p1"> <p class="ltx_p" id="S4.I1.ix2.p1.1">Humans struggle to negotiate on a fine-grained level, and may thus prefer broad policies that reduce cognitive load (e.g., to always accept all cookies) <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib32" title="">wright2024wantcookieautomatedtransparent, </a>)</cite>. CUPAs can help to reach fine-grained agreements that improve outcomes and honour party preferences.</p> </div> </dd> <dt class="ltx_item" id="S4.I1.ix3"><span class="ltx_tag ltx_tag_item"><span class="ltx_text ltx_font_bold" id="S4.I1.ix3.1.1.1">Improved risk/reward assessment.: </span></span></dt> <dd class="ltx_item"> <div class="ltx_para" id="S4.I1.ix3.p1"> <p class="ltx_p" id="S4.I1.ix3.p1.1">CUPAs can help users simulate and analyse a variety of hypothetical data exchange scenarios, and warn users of a particular risk, for example that the supermarket – if informed of a condition of a severe allergy – could sell this information to third parties, leading to an increase in life assurance premiums.</p> </div> </dd> <dt class="ltx_item" id="S4.I1.ix4"><span class="ltx_tag ltx_tag_item"><span class="ltx_text ltx_font_bold" id="S4.I1.ix4.1.1.1">Auditing and follow-up.: </span></span></dt> <dd class="ltx_item"> <div class="ltx_para" id="S4.I1.ix4.p1"> <p class="ltx_p" id="S4.I1.ix4.p1.1">CUPAs could automatically perform audits to assess whether the data were treated as agreed during the negotiation process, evaluate the benefit to the user, and improve for future interactions.</p> </div> </dd> </dl> </div> <div class="ltx_para ltx_noindent" id="S4.p5"> <p class="ltx_p" id="S4.p5.1">Such added value is, of course, dependent on the value outweighing the potential harms caused. This can be addressed via AI alignment, which ensures that artificial intelligence systems act in accordance with human intentions, values, and societal norms. It involves <span class="ltx_text ltx_font_italic" id="S4.p5.1.1">outer alignment</span>, where an AI’s objectives accurately reflect human goals, and <span class="ltx_text ltx_font_italic" id="S4.p5.1.2">inner alignment</span>, ensuring learned behaviours remain aligned in novel scenarios. Machine-readable policies on how personal data from the PKG can or should be used by the AI-based agent can also help to avoid harm. Representing personal data as PKGs allows standards such as the Open Digital Rights Language (ODRL) <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib17" title="">Iannella_Villata_2023, </a>)</cite> and policy engines implementing formal semantics <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib15" title="">Fornara_Rodríguez-Doncel_Esteves_Steyskal_Smith_2024, </a>)</cite> to specify and automate the processing of policies about how personal data are used, in what contexts, and under what conditions.</p> </div> </section> <section class="ltx_section" id="S5"> <h2 class="ltx_title ltx_title_section"> <span class="ltx_tag ltx_tag_section">5. </span>CUPA Capabilities</h2> <div class="ltx_para" id="S5.p1"> <p class="ltx_p" id="S5.p1.1">Computer-using personal agents must be able to <em class="ltx_emph ltx_font_italic" id="S5.p1.1.1">interact with diverse websites and APIs</em>. This allows them to book flights and hotels, search for job openings, and even schedule appointments. Moreover, they must possess the ability to <em class="ltx_emph ltx_font_italic" id="S5.p1.1.2">interact with other such agents</em>, such as coordinating travel arrangements with a travel agent or collaborating with a financial agent to manage expenses.</p> </div> <div class="ltx_para" id="S5.p2"> <p class="ltx_p" id="S5.p2.1">In addition to being able to <em class="ltx_emph ltx_font_italic" id="S5.p2.1.1">generate and adapt content</em> (e.g., personalised summaries and creative text), a computer-using personal agent must be able to <em class="ltx_emph ltx_font_italic" id="S5.p2.1.2">combine private data</em> from the user’s personal knowledge graph (PKG) with external information. For example, when searching for a new apartment, the agent should combine the user’s preferred neighbourhood from their PKG with data from real estate websites and local amenities databases to find the most suitable options. When utilising the knowledge stored within the PKG, the agent must also be able to <em class="ltx_emph ltx_font_italic" id="S5.p2.1.3">adapt the knowledge from the PKG for the current task</em>. For instance, when filling out a job application form, the agent should selectively use information from the user’s CV and work history stored in the PKG, tailoring the presentation to the specific requirements of each application. This adaptability is crucial for ensuring that agent actions are relevant and effective in the given context.</p> </div> <div class="ltx_para" id="S5.p3"> <p class="ltx_p" id="S5.p3.1">CUPAs must continuously <em class="ltx_emph ltx_font_italic" id="S5.p3.1.1">collect and enrich user information</em> to effectively assist them. This involves gathering data from various sources, including interactions with websites and APIs, user inputs, and external sources. By continuously <em class="ltx_emph ltx_font_italic" id="S5.p3.1.2">learning about user preferences</em>, these agents can personalise their assistance, such as recommending travel options that align with the user’s preferences or suggesting recipes that cater to specific dietary restrictions or tastes. However, it is also crucial for such agents to <em class="ltx_emph ltx_font_italic" id="S5.p3.1.3">avoid learning one-off or irrelevant patterns</em>, for example, to assume that Sam will always suffer heartburn after eating Thai food and should thus avoid it.</p> </div> <div class="ltx_para" id="S5.p4"> <p class="ltx_p" id="S5.p4.1">Computer-using personal agents must exhibit a high degree of autonomy. They should ideally <em class="ltx_emph ltx_font_italic" id="S5.p4.1.1">act maximally autonomously</em>, including the ability to <em class="ltx_emph ltx_font_italic" id="S5.p4.1.2">proactively anticipate and address user needs</em>. For example, an agent could proactively remind users of upcoming appointments or suggest relevant articles based on their recent reading history. However, this autonomy must always be balanced with the ability to <em class="ltx_emph ltx_font_italic" id="S5.p4.1.3">be guided and controlled by the user</em>, allowing users to provide instructions, adjust preferences, and maintain control over agentic actions.</p> </div> <div class="ltx_para" id="S5.p5"> <p class="ltx_p" id="S5.p5.1">While acting largely autonomously, it is crucial that a computer-using personal agent <em class="ltx_emph ltx_font_italic" id="S5.p5.1.1">acts in alignment with the user</em>, ensuring that tasks are completed as desired. This is essential in scenarios like recipe searches where the agent must accurately reflect dietary restrictions and preferences. Moreover, such an agent should always act in the user’s interests, even when <em class="ltx_emph ltx_font_italic" id="S5.p5.1.2">dealing with potentially conflicting goals</em>. For example, an agent helping a user plan a trip should consider factors like budget, travel time, and personal preferences, even if these factors may lead to a slightly more expensive or less convenient option. The agent should avoid <em class="ltx_emph ltx_font_italic" id="S5.p5.1.3">acting in an unethical or illegal manner</em> even if it potentially maximises a users immediate interests, e.g., via tax evasion.</p> </div> <div class="ltx_para" id="S5.p6"> <p class="ltx_p" id="S5.p6.1">To maintain user trust and ensure responsible behaviour, it is also crucial that agents <em class="ltx_emph ltx_font_italic" id="S5.p6.1.1">do not overstep bounds</em>, respecting user privacy and only acting within explicitly granted permissions. Finally, the repeated offering of <em class="ltx_emph ltx_font_italic" id="S5.p6.1.2">clear explanations of all actions</em> will aid in the fostering of trust and allow users to understand and verify agent behaviour.</p> </div> </section> <section class="ltx_section" id="S6"> <h2 class="ltx_title ltx_title_section"> <span class="ltx_tag ltx_tag_section">6. </span>Technical Challenges</h2> <div class="ltx_para" id="S6.p1"> <p class="ltx_p" id="S6.p1.1">The aforementioned desired capabilities for CUPAs, based on our vision of a trusted, accountable and largely autonomous agent acting with personal data for user benefit, raises a number of technical challenges.</p> </div> <div class="ltx_para" id="S6.p2"> <dl class="ltx_description" id="S6.I1"> <dt class="ltx_item" id="S6.I1.ix1"><span class="ltx_tag ltx_tag_item"><span class="ltx_text ltx_font_bold" id="S6.I1.ix1.1.1.1">Accountability and Liability: </span></span></dt> <dd class="ltx_item"> <div class="ltx_para" id="S6.I1.ix1.p1"> <p class="ltx_p" id="S6.I1.ix1.p1.1">In the case of undesired, illegal, or unethical acts involving CUPAs, it is important to determine who – or what – is responsible, who should be held accountable, and where the liability lies.</p> </div> </dd> <dt class="ltx_item" id="S6.I1.ix2"><span class="ltx_tag ltx_tag_item"><span class="ltx_text ltx_font_bold" id="S6.I1.ix2.1.1.1">Explainability, Traceability, and Provenance: </span></span></dt> <dd class="ltx_item"> <div class="ltx_para" id="S6.I1.ix2.p1"> <p class="ltx_p" id="S6.I1.ix2.p1.1">Provenance techniques are required to trace and explain how personal and external data led to specific answers or actions being derived or carried out by the CUPA. These provenance techniques would need to support diverse data models, machine learning processes, user inputs and policies.</p> </div> </dd> <dt class="ltx_item" id="S6.I1.ix3"><span class="ltx_tag ltx_tag_item"><span class="ltx_text ltx_font_bold" id="S6.I1.ix3.1.1.1">Data Interoperability: </span></span></dt> <dd class="ltx_item"> <div class="ltx_para" id="S6.I1.ix3.p1"> <p class="ltx_p" id="S6.I1.ix3.p1.1">Data interoperability is a key challenge towards implementing CUPAs. Being able to draw on and integrate more sources of data will improve the CUPAs performance. This is particularly challenging for new sources discovered on the fly.</p> </div> </dd> <dt class="ltx_item" id="S6.I1.ix4"><span class="ltx_tag ltx_tag_item"><span class="ltx_text ltx_font_bold" id="S6.I1.ix4.1.1.1">Inter-Agent Communication, Negotiation and Coordination: </span></span></dt> <dd class="ltx_item"> <div class="ltx_para" id="S6.I1.ix4.p1"> <p class="ltx_p" id="S6.I1.ix4.p1.1">Agents must communicate effectively in the context of multi-agent systems to achieve shared goals, requiring both a shared conceptual understanding and a means of encoding and decoding messages <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib30" title="">wooldridge2009introduction, </a>)</cite>. The same challenge applies to networks of CUPAs who coordinate to solve a particular set of goals for users.</p> </div> </dd> <dt class="ltx_item" id="S6.I1.ix5"><span class="ltx_tag ltx_tag_item"><span class="ltx_text ltx_font_bold" id="S6.I1.ix5.1.1.1">Security, Privacy, and Policies: </span></span></dt> <dd class="ltx_item"> <div class="ltx_para" id="S6.I1.ix5.p1"> <p class="ltx_p" id="S6.I1.ix5.p1.1">The sensitive nature of data processed by a CUPA calls for security, privacy, and usage control mechanisms, and the ability of the CUPA to understand and correctly apply the access/usage/action control policies of the user. In some countries, this would even be a legal requirement (e.g., under GDPR in the E.U.).</p> </div> </dd> <dt class="ltx_item" id="S6.I1.ix6"><span class="ltx_tag ltx_tag_item"><span class="ltx_text ltx_font_bold" id="S6.I1.ix6.1.1.1">Trust, Delegation, and Action Control: </span></span></dt> <dd class="ltx_item"> <div class="ltx_para" id="S6.I1.ix6.p1"> <p class="ltx_p" id="S6.I1.ix6.p1.1">Achieving agent autonomy requires trust modelling, delegation mechanisms, and structured action control policies <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib28" title="">south2025authenticated, </a>)</cite>. Trust models must be adaptable to different contexts, from rigid policies applicable in government agencies to more flexible, reputation-based approaches for personal agents <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib10" title="">chen2015trust, </a>)</cite>.</p> </div> </dd> <dt class="ltx_item" id="S6.I1.ix7"><span class="ltx_tag ltx_tag_item"><span class="ltx_text ltx_font_bold" id="S6.I1.ix7.1.1.1">User-in-the-Loop: </span></span></dt> <dd class="ltx_item"> <div class="ltx_para" id="S6.I1.ix7.p1"> <p class="ltx_p" id="S6.I1.ix7.p1.1">CUPAs will require input, guidance, permission and confirmation from the user. But to increase automation, the CUPA must avoid unnecessary interactions with the user. This creates the challenge of <span class="ltx_text ltx_font_italic" id="S6.I1.ix7.p1.1.1">when</span> to call upon the user, and how.</p> </div> </dd> <dt class="ltx_item" id="S6.I1.ix8"><span class="ltx_tag ltx_tag_item"><span class="ltx_text ltx_font_bold" id="S6.I1.ix8.1.1.1">Self-Improvement: </span></span></dt> <dd class="ltx_item"> <div class="ltx_para" id="S6.I1.ix8.p1"> <p class="ltx_p" id="S6.I1.ix8.p1.1">The CUPA should leverage its experience with the user in order to improve the services it provides over time, leading to greater automation, and actions/results that better benefit the user. This raises questions about how such a history can be captured, represented, stored and leveraged.</p> </div> </dd> <dt class="ltx_item" id="S6.I1.ix9"><span class="ltx_tag ltx_tag_item"><span class="ltx_text ltx_font_bold" id="S6.I1.ix9.1.1.1">Self-Determination and Alignment: </span></span></dt> <dd class="ltx_item"> <div class="ltx_para" id="S6.I1.ix9.p1"> <p class="ltx_p" id="S6.I1.ix9.p1.1">There are many ways an agent could be considered ‘aligned’ to a user. Naive approaches include ensuring that CUPA decision making always takes place within rules-based bounds - such as action controls set by a user - or doing a best effort to match user <span class="ltx_text ltx_font_italic" id="S6.I1.ix9.p1.1.1">intent</span> or <span class="ltx_text ltx_font_italic" id="S6.I1.ix9.p1.1.2">decision making</span>. There is a field of research discussing ‘beyond preference matching’ alignment which proposes that AI systems should be aligned to broader concepts such as value-based alignment, or prioritise user welfare over emulating decision making <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib35" title="">Zhi_Xuan_2024, </a>)</cite>.</p> </div> </dd> </dl> </div> </section> <section class="ltx_section" id="S7"> <h2 class="ltx_title ltx_title_section"> <span class="ltx_tag ltx_tag_section">7. </span>Roadmap</h2> <div class="ltx_para" id="S7.p1"> <p class="ltx_p" id="S7.p1.1">We envisage that moving from the current state of the art to fully addressing the above technical challenges will occur in three stages. These levels represent varying degrees of trust, accountability and autonomy.</p> </div> <div class="ltx_para" id="S7.p2"> <dl class="ltx_description" id="S7.I1"> <dt class="ltx_item" id="S7.I1.ix1"><span class="ltx_tag ltx_tag_item"><span class="ltx_text ltx_font_bold" id="S7.I1.ix1.1.1.1">CUAs enhanced with personal data: </span></span></dt> <dd class="ltx_item"> <div class="ltx_para" id="S7.I1.ix1.p1"> <p class="ltx_p" id="S7.I1.ix1.p1.1">In the first instance, we foresee extensions of CUAs – in the style of OpenAI’s Operator <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib25" title="">Operator2025, </a>)</cite> in a commercial setting and Agent-E <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib1" title="">abuelsaad2024agent, </a>)</cite> in a research setting – such that they use a PKG in order to access knowledge personal to the user. This would safely enable higher levels of automation, obviating the need to pass control back to the user in scenarios of the user’s choosing that involve personal data.</p> </div> </dd> <dt class="ltx_item" id="S7.I1.ix2"><span class="ltx_tag ltx_tag_item"><span class="ltx_text ltx_font_bold" id="S7.I1.ix2.1.1.1">Web-aware CUPAs: </span></span></dt> <dd class="ltx_item"> <div class="ltx_para" id="S7.I1.ix2.p1"> <p class="ltx_p" id="S7.I1.ix2.p1.1">CUAs currently rely on existing browser implementations to render an HTML page and then make use of vision models to interact with the page. An agent could rather observe HTTP requests made to a particular website, as well as the HTML forms present on a page, to invoke requests and actions directly via HTTP.</p> </div> </dd> <dt class="ltx_item" id="S7.I1.ix3"><span class="ltx_tag ltx_tag_item"><span class="ltx_text ltx_font_bold" id="S7.I1.ix3.1.1.1">Networks of CUPAs: </span></span></dt> <dd class="ltx_item"> <div class="ltx_para" id="S7.I1.ix3.p1"> <p class="ltx_p" id="S7.I1.ix3.p1.1">We envision networks of CUPAs interacting in order to complete tasks involving multiple users. This may involve structured service descriptions <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib23" title="">Martin2005, </a>)</cite>, or a mix of natural language and structured communication per a “discuss then transact” model <cite class="ltx_cite ltx_citemacro_citep">(<a class="ltx_ref" href="https://arxiv.org/html/2503.15515v1#bib.bib31" title="">DBLP:journals/corr/abs-2409-04465, </a>)</cite> whereby agents use natural language to first negotiate about a transaction they wish to perform, and then confirm this transaction using structured data.</p> </div> </dd> </dl> </div> </section> <section class="ltx_section" id="S8"> <h2 class="ltx_title ltx_title_section"> <span class="ltx_tag ltx_tag_section">8. </span>Conclusion</h2> <div class="ltx_para" id="S8.p1"> <p class="ltx_p" id="S8.p1.1">Computer-Using Agents (CUAs) have the potential to transform how users interact with their computers, their browsers and amongst themselves. Not having access to personal data limits such interactions. Giving CUAs unfettered access to the personal (and most sensitive) data of a user seems unwise, as does providing CUAs no access to personal data. We thus argue for CUPAs as a configurable middle-ground, where a Personal Knowledge Graph (PKG) is used to represent, store and control access to the personal data of the user. As a starting point, the data that a user fills into web forms can be captured in the PKG, and enriched by an AI-based agent. These data can then be used, if the user so wishes, by CUAs to automate further tasks. In a next step, CUPAs can learn to interact with websites via HTTP APIs rather than though visual interfaces. Finally, we envisage further into the future a network of CUPAs collaborating to address users’ tasks.</p> </div> <div class="ltx_acknowledgements"> <h6 class="ltx_title ltx_title_acknowledgements">Acknowledgements.</h6> This report is a result of Dagstuhl Seminar 25051 “Trust and Accountability in Knowledge Graph-Based AI for Self Determination”, which took place in January 2025. </div> </section> <section class="ltx_bibliography" id="bib"> <h2 class="ltx_title ltx_title_bibliography">References</h2> <ul class="ltx_biblist"> <li class="ltx_bibitem" id="bib.bib1"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(1)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib1.1.1">Abuelsaad, T., Akkil, D., Dey, P., Jagmohan, A., Vempaty, A., and Kokku, R.</span> </span> <span class="ltx_bibblock">Agent-e: From autonomous web navigation to foundational design principles in agentic systems. </span> <span class="ltx_bibblock"><span class="ltx_text ltx_font_italic" id="bib.bib1.2.1">arXiv preprint arXiv:2407.13032</span> (2024). </span> </li> <li class="ltx_bibitem" id="bib.bib2"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(2)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib2.1.1">Afroogh, S., Akbari, A., Malone, E., Kargar, M., and Alambeigi, H.</span> </span> <span class="ltx_bibblock">Trust in AI: progress, challenges, and future directions. </span> <span class="ltx_bibblock"><span class="ltx_text ltx_font_italic" id="bib.bib2.2.1">Humanities and Social Sciences Communications 11</span>, 1 (2024), 1–30. </span> </li> <li class="ltx_bibitem" id="bib.bib3"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(3)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib3.1.1">Bergman, O., and Whittaker, S.</span> </span> <span class="ltx_bibblock"><span class="ltx_text ltx_font_italic" id="bib.bib3.2.1">The science of managing our digital stuff</span>. </span> <span class="ltx_bibblock">MIT Press, 2016. </span> </li> <li class="ltx_bibitem" id="bib.bib4"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(4)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib4.1.1">Berners-Lee, T.</span> </span> <span class="ltx_bibblock">Charlie Works. </span> <span class="ltx_bibblock">Design Issues, <a class="ltx_ref ltx_url ltx_font_typewriter" href="https://www.w3.org/DesignIssues/Works.html" title="">https://www.w3.org/DesignIssues/Works.html</a>, 2025. </span> </li> <li class="ltx_bibitem" id="bib.bib5"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(5)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib5.1.1">Berners-Lee, T., Hendler, J., and Lassila, O.</span> </span> <span class="ltx_bibblock">The semantic web. </span> <span class="ltx_bibblock"><span class="ltx_text ltx_font_italic" id="bib.bib5.2.1">Scientific American 284</span>, 5 (2001), 34–43. </span> </li> <li class="ltx_bibitem" id="bib.bib6"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(6)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib6.1.1">Birch, K., Cochrane, D. T., and Ward, C.</span> </span> <span class="ltx_bibblock">Data as asset? the measurement, governance, and valuation of digital personal data by big tech. </span> <span class="ltx_bibblock"><span class="ltx_text ltx_font_italic" id="bib.bib6.2.1">Big Data and Society 8</span> (2021). </span> </li> <li class="ltx_bibitem" id="bib.bib7"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(7)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib7.1.1">Chakraborty, P., Dutta, S., and Sanyal, D. K.</span> </span> <span class="ltx_bibblock">Personal research knowledge graphs. </span> <span class="ltx_bibblock">In <span class="ltx_text ltx_font_italic" id="bib.bib7.2.1">WWW 2022 - Companion Proceedings of the Web Conference 2022</span> (4 2022), Association for Computing Machinery, Inc, pp. 763–768. </span> </li> <li class="ltx_bibitem" id="bib.bib8"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(8)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib8.1.1">Chakraborty, P., and Sanyal, D. K.</span> </span> <span class="ltx_bibblock">A comprehensive survey of personal knowledge graphs, 11 2023. </span> </li> <li class="ltx_bibitem" id="bib.bib9"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(9)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib9.1.1">Chaudhry, A., Crowcroft, J., Howard, H., Madhavapeddy, A., Mortier, R., Haddadi, H., and McAuley, D.</span> </span> <span class="ltx_bibblock">Personal data: Thinking inside the box. </span> <span class="ltx_bibblock"><span class="ltx_text ltx_font_italic" id="bib.bib9.2.1">Aarhus Series on Human Centered Computing 1</span> (2015), 4. </span> </li> <li class="ltx_bibitem" id="bib.bib10"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(10)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib10.1.1">Chen, R., Bao, F., and Guo, J.</span> </span> <span class="ltx_bibblock">Trust-based service management for social internet of things systems. </span> <span class="ltx_bibblock"><span class="ltx_text ltx_font_italic" id="bib.bib10.2.1">IEEE transactions on dependable and secure computing 13</span>, 6 (2015), 684–696. </span> </li> <li class="ltx_bibitem" id="bib.bib11"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(11)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib11.1.1">Cushing, A. L.</span> </span> <span class="ltx_bibblock">PIM as a caring: using ethics of care to explore personal information management as a caring process. </span> <span class="ltx_bibblock"><span class="ltx_text ltx_font_italic" id="bib.bib11.2.1">Journal of the Association for Information Science and Technology 74</span>, 11 (2023), 1282–1292. </span> </li> <li class="ltx_bibitem" id="bib.bib12"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(12)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib12.1.1">Cushing, A. L., and Kerrigan, P.</span> </span> <span class="ltx_bibblock">Personal information management burden: A framework for describing nonwork personal information management in the context of inequality. </span> <span class="ltx_bibblock"><span class="ltx_text ltx_font_italic" id="bib.bib12.2.1">Journal of the Association for Information Science and Technology 73</span> (11 2022), 1543–1558. </span> </li> <li class="ltx_bibitem" id="bib.bib13"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(13)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib13.1.1">da Silva Costa, D. A., Mamede, H. S., and da Silva, M. M.</span> </span> <span class="ltx_bibblock">Robotic Process Automation (RPA) adoption: a systematic literature review, 6 2022. </span> </li> <li class="ltx_bibitem" id="bib.bib14"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(14)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib14.1.1">Faber, B., Michelet, G., Weidmann, N., Mukkamala, R. R., and Vatrapu, R.</span> </span> <span class="ltx_bibblock">Bpdims:a blockchain-based personal data and identity management system. </span> <span class="ltx_bibblock"><span class="ltx_text ltx_font_italic" id="bib.bib14.2.1">Proceedings of the Annual Hawaii International Conference on System Sciences 2019-Janua</span> (2019), 6855–6864. </span> </li> <li class="ltx_bibitem" id="bib.bib15"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(15)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib15.1.1">Fornara, N., Rodríguez-Doncel, V., Esteves, B., Steyskal, S., and Smith, B. W.</span> </span> <span class="ltx_bibblock">ODRL Formal Semantics, May 2024. </span> </li> <li class="ltx_bibitem" id="bib.bib16"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(16)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib16.1.1">Haussmann, S., Seneviratne, O., Chen, Y., Ne’eman, Y., Codella, J., Chen, C.-H., McGuinness, D. L., and Zaki, M. J.</span> </span> <span class="ltx_bibblock">FoodKG: A semantics-driven knowledge graph for food recommendation. </span> <span class="ltx_bibblock">In <span class="ltx_text ltx_font_italic" id="bib.bib16.2.1">The Semantic Web – ISWC 2019</span> (Cham, 2019), C. Ghidini, O. Hartig, M. Maleshkova, V. Svátek, I. Cruz, A. Hogan, J. Song, M. Lefrançois, and F. Gandon, Eds., Springer International Publishing, pp. 146–162. </span> </li> <li class="ltx_bibitem" id="bib.bib17"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(17)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib17.1.1">Iannella, R., and Villata, S.</span> </span> <span class="ltx_bibblock">ODRL Information Model 2.2, Feb 2023. </span> </li> <li class="ltx_bibitem" id="bib.bib18"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(18)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib18.1.1">Jones, W.</span> </span> <span class="ltx_bibblock"><span class="ltx_text ltx_font_italic" id="bib.bib18.2.1">The future of personal information management, part 1: Our information, always and forever</span>. </span> <span class="ltx_bibblock">Morgan & Claypool Publishers, 2012. </span> </li> <li class="ltx_bibitem" id="bib.bib19"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(19)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib19.1.1">Jones, W. P., and Teevan, J.</span> </span> <span class="ltx_bibblock"><span class="ltx_text ltx_font_italic" id="bib.bib19.2.1">Personal information management</span>, vol. 14. </span> <span class="ltx_bibblock">University of Washington Press Seattle, WA, 2007. </span> </li> <li class="ltx_bibitem" id="bib.bib20"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(20)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib20.1.1">Kalokyri, V., Borgida, A., and lie Marian, A.</span> </span> <span class="ltx_bibblock">YourDigitalSelf: a personal digital trace integration tool. </span> <span class="ltx_bibblock"><span class="ltx_text ltx_font_italic" id="bib.bib20.2.1">International Conference on Information and Knowledge Management, Proceedings</span> (2018), 1963–1966. </span> </li> <li class="ltx_bibitem" id="bib.bib21"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(21)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib21.1.1">Kim, G., Baldi, P., and McAleer, S.</span> </span> <span class="ltx_bibblock">Language Models can Solve Computer Tasks. </span> <span class="ltx_bibblock">In <span class="ltx_text ltx_font_italic" id="bib.bib21.2.1">Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023</span> (2023), A. Oh, T. Naumann, A. Globerson, K. Saenko, M. Hardt, and S. Levine, Eds. </span> </li> <li class="ltx_bibitem" id="bib.bib22"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(22)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib22.1.1">Lin, J., and Wang, M.</span> </span> <span class="ltx_bibblock">PKG : A Personal Knowledge Graph for Recommendation. </span> <span class="ltx_bibblock">In <span class="ltx_text ltx_font_italic" id="bib.bib22.2.1">Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR ’22), July 11â•fi15, 2022, Madrid, Spain</span> (2022), vol. 1, Association for Computing Machinery, pp. 3334–3338. </span> </li> <li class="ltx_bibitem" id="bib.bib23"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(23)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib23.1.1">Martin, D., Paolucci, M., McIlraith, S., Burstein, M., McDermott, D., McGuinness, D., Parsia, B., Payne, T., Sabou, M., Solanki, M., Srinivasan, N., and Sycara, K.</span> </span> <span class="ltx_bibblock">Bringing semantics to web services: The OWL-S approach. </span> <span class="ltx_bibblock">In <span class="ltx_text ltx_font_italic" id="bib.bib23.2.1">Semantic Web Services and Web Process Composition</span> (Berlin, Heidelberg, 2005), J. Cardoso and A. Sheth, Eds., Springer Berlin Heidelberg, pp. 26–42. </span> </li> <li class="ltx_bibitem" id="bib.bib24"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(24)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib24.1.1">Mortier, R., Zhao, J., Crowcroft, J., Wang, L., Li, Q., Haddadi, H., Amar, Y., Crabtree, A., Colley, J., Lodge, T., Brown, T., McAuley, D., and Greenhalgh, C.</span> </span> <span class="ltx_bibblock">Personal data management with the databox: What’s inside the box? </span> <span class="ltx_bibblock">In <span class="ltx_text ltx_font_italic" id="bib.bib24.2.1">Proceedings of the 2016 ACM Workshop on Cloud-Assisted Networking</span> (New York, NY, USA, 2016), CAN ’16, Association for Computing Machinery, p. 49–54. </span> </li> <li class="ltx_bibitem" id="bib.bib25"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(25)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib25.1.1">OpenAI Team</span>. </span> <span class="ltx_bibblock">Introducing Operator. </span> <span class="ltx_bibblock">OpenAI Blog <a class="ltx_ref ltx_url ltx_font_typewriter" href="https://openai.com/index/introducing-operator/" title="">https://openai.com/index/introducing-operator/</a>, published 2025-01-23, accessed 2025-01-29, 2025. </span> </li> <li class="ltx_bibitem" id="bib.bib26"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(26)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib26.1.1">Schröder, M., Jilek, C., and Dengel, A.</span> </span> <span class="ltx_bibblock">A Human-in-the-Loop Approach for Personal Knowledge Graph Construction from File Names. </span> <span class="ltx_bibblock">In <span class="ltx_text ltx_font_italic" id="bib.bib26.2.1">Knowledge Graph Construction</span> (2022), vol. 3141, CEUR Workshop Proceedings. </span> </li> <li class="ltx_bibitem" id="bib.bib27"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(27)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib27.1.1">Skjæveland, M. G., Balog, K., Bernard, N., Łajewska, W., and Linjordet, T.</span> </span> <span class="ltx_bibblock">An ecosystem for personal knowledge graphs: A survey and research roadmap. </span> <span class="ltx_bibblock"><span class="ltx_text ltx_font_italic" id="bib.bib27.2.1">AI Open 5</span> (2024), 55–69. </span> </li> <li class="ltx_bibitem" id="bib.bib28"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(28)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib28.1.1">South, T., Marro, S., Hardjono, T., Mahari, R., Whitney, C. D., Greenwood, D., Chan, A., and Pentland, A.</span> </span> <span class="ltx_bibblock">Authenticated delegation and authorized ai agents. </span> <span class="ltx_bibblock"><span class="ltx_text ltx_font_italic" id="bib.bib28.2.1">arXiv preprint arXiv:2501.09674</span> (2025). </span> </li> <li class="ltx_bibitem" id="bib.bib29"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(29)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib29.1.1">van der Aalst, W. M., Bichler, M., and Heinzl, A.</span> </span> <span class="ltx_bibblock">Robotic process automation. </span> <span class="ltx_bibblock"><span class="ltx_text ltx_font_italic" id="bib.bib29.2.1">Business and Information Systems Engineering 60</span> (8 2018), 269–272. </span> </li> <li class="ltx_bibitem" id="bib.bib30"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(30)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib30.1.1">Wooldridge, M.</span> </span> <span class="ltx_bibblock"><span class="ltx_text ltx_font_italic" id="bib.bib30.2.1">An introduction to multiagent systems</span>. </span> <span class="ltx_bibblock">Wiley, 2009. </span> </li> <li class="ltx_bibitem" id="bib.bib31"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(31)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib31.1.1">Wright, J.</span> </span> <span class="ltx_bibblock">Here’s Charlie! Realising the semantic web vision of agents in the age of LLMs. </span> <span class="ltx_bibblock"><span class="ltx_text ltx_font_italic" id="bib.bib31.2.1">CoRR abs/2409.04465</span> (2024). </span> </li> <li class="ltx_bibitem" id="bib.bib32"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(32)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib32.1.1">Wright, J., Esteves, B., and Zhao, R.</span> </span> <span class="ltx_bibblock">Me want cookie! Towards automated and transparent data governance on the Web, 2024. </span> </li> <li class="ltx_bibitem" id="bib.bib33"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(33)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib33.1.1">Yang, J., Prabhakar, A., Narasimhan, K., and Yao, S.</span> </span> <span class="ltx_bibblock">InterCode: Standardizing and Benchmarking Interactive Coding with Execution Feedback. </span> <span class="ltx_bibblock">In <span class="ltx_text ltx_font_italic" id="bib.bib33.2.1">Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023</span> (2023), A. Oh, T. Naumann, A. Globerson, K. Saenko, M. Hardt, and S. Levine, Eds. </span> </li> <li class="ltx_bibitem" id="bib.bib34"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(34)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib34.1.1">Zhao, X., Blum, M., Yang, R., Yang, B., Carpintero, L. M., Pina-Navarro, M., Wang, T., Li, X., Li, H., Fu, Y., Wang, R., Zhang, J., and Li, I.</span> </span> <span class="ltx_bibblock">AGENTiGraph: an interactive knowledge graph platform for LLM-based chatbots utilizing private data, 2024. </span> </li> <li class="ltx_bibitem" id="bib.bib35"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(35)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib35.1.1">Zhi-Xuan, T., Carroll, M., Franklin, M., and Ashton, H.</span> </span> <span class="ltx_bibblock">Beyond preferences in ai alignment. </span> <span class="ltx_bibblock"><span class="ltx_text ltx_font_italic" id="bib.bib35.2.1">Philosophical Studies</span> (Nov. 2024). </span> </li> <li class="ltx_bibitem" id="bib.bib36"> <span class="ltx_tag ltx_role_refnum ltx_tag_bibitem">(36)</span> <span class="ltx_bibblock"> <span class="ltx_text ltx_font_smallcaps" id="bib.bib36.1.1">Zyskind, G., Nathan, O., and Pentland, A. S.</span> </span> <span class="ltx_bibblock">Decentralizing privacy: Using blockchain to protect personal data. </span> <span class="ltx_bibblock"><span class="ltx_text ltx_font_italic" id="bib.bib36.2.1">Proceedings - 2015 IEEE Security and Privacy Workshops, SPW 2015</span> (2015), 180–184. </span> </li> </ul> </section> <div class="ltx_pagination ltx_role_newpage"></div> </article> </div> <footer class="ltx_page_footer"> <div class="ltx_page_logo">Generated on Fri Jan 31 12:19:34 2025 by <a class="ltx_LaTeXML_logo" href="http://dlmf.nist.gov/LaTeXML/"><span style="letter-spacing:-0.2em; margin-right:0.1em;">L<span class="ltx_font_smallcaps" style="position:relative; bottom:2.2pt;">a</span>T<span class="ltx_font_smallcaps" style="font-size:120%;position:relative; bottom:-0.2ex;">e</span></span><span style="font-size:90%; position:relative; bottom:-0.2ex;">XML</span><img alt="Mascot Sammy" src="data:image/png;base64,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"/></a> </div></footer> </div> </body> </html>