Have you been properly notified? automatic compliance analysis of privacy policy text with gdpr article 13

S Liu, B Zhao, R Guo, G Meng, F Zhang… - Proceedings of the Web …, 2021 - dl.acm.org
With the rapid development of web and mobile applications, as well as their wide adoption
in different domains, more and more personal data is provided, consciously or …

[HTML][HTML] Privacy policy analysis: A scoping review and research agenda

K Van Der Schyff, S Prior, K Renaud - Computers & Security, 2024 - Elsevier
Online users often neglect the importance of privacy policies-a critical aspect of digital
privacy and data protection. This scoping review addresses this oversight by delving into …

Privacy policies across the ages: content of privacy policies 1996–2021

I Wagner - ACM Transactions on Privacy and Security, 2023 - dl.acm.org
It is well known that most users do not read privacy policies but almost always tick the box to
agree with them. While the length and readability of privacy policies have been well studied …

[PDF][PDF] From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR.

C Lu, B Liu, Y Zhang, Z Li, F Zhang, H Duan, Y Liu… - NDSS, 2021 - utdallas.edu
When a domain is registered, information about the registrants and other related personnel
is recorded by WHOIS databases owned by registrars or registries (called WHOIS providers …

Privacy at scale: Introducing the PrivaSeer corpus of web privacy policies

M Srinath, S Wilson, CL Giles - arXiv preprint arXiv:2004.11131, 2020 - arxiv.org
Organisations disclose their privacy practices by posting privacy policies on their website.
Even though users often care about their digital privacy, they often don't read privacy …

Are they toeing the line? diagnosing privacy compliance violations among browser extensions

Y Ling, K Wang, G Bai, H Wang, JS Dong - Proceedings of the 37th IEEE …, 2022 - dl.acm.org
Browser extensions have emerged as integrated characteristics in modern browsers, with
the aim to boost the online browsing experience. Their advantageous position between a …

Bats: A spectral biclustering approach to single document topic modeling and segmentation

Q Wu, A Hare, S Wang, Y Tu, Z Liu… - ACM Transactions on …, 2021 - dl.acm.org
Existing topic modeling and text segmentation methodologies generally require large
datasets for training, limiting their capabilities when only small collections of text are …

Unifying privacy policy detection

H Hosseini, M Degeling, C Utz… - Proceedings on Privacy …, 2021 - petsymposium.org
Privacy policies have become a focal point of privacy research. With their goal to reflect the
privacy practices of a website, service, or app, they are often the starting point for …

CAPP-130: a corpus of chinese application privacy policy summarization and interpretation

L Wen, J Liu, F Xue, J Lou, Z Wang… - Advances in Neural …, 2024 - proceedings.neurips.cc
A privacy policy serves as an online internet protocol crafted by service providers, which
details how service providers collect, process, store, manage, and use personal information …

Extracting feature requests from online reviews of travel industry.

S Kumari, Z Ali - Acta Scientiarum: Technology, 2022 - search.ebscohost.com
Abstract Before product development, Requirement Engineering (RE) is the fundamental
need to know customer preferences for any product. Traditionally, RE is carried out in …