2015 IEEE 17th Conference on Business Informatics 2015
DOI: 10.1109/cbi.2015.44
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing Privacy Policies Based on a Privacy-Aware Profile: The Facebook and LinkedIn Case Studies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…[41]- [44]), privacy policies (e.g. [45]- [47]), business processes (e.g. [48]- [50]), network protocols (e.g.…”
Section: Inclusion and Exclusion Proceduresmentioning
confidence: 99%
“…[41]- [44]), privacy policies (e.g. [45]- [47]), business processes (e.g. [48]- [50]), network protocols (e.g.…”
Section: Inclusion and Exclusion Proceduresmentioning
confidence: 99%
“…A few hours before of her death, she tweeted, ''Have the house to myself everybody gone'' [8]. Therefore, the posted information in online may cause the user in danger [9]- [11].…”
Section: Introductionmentioning
confidence: 99%
“…As suggested in Fig. 1, a RSL-IL4Privacy policy is represented as a set of privacy Statements and other related constructs such as Services, Recipients, Private Data and Enforcements (Caramujo and Silva, 2015). The Statement is the key concept of the privacy-aware profile.…”
Section: Rslingo and Rsl-il4privacymentioning
confidence: 99%
“…Each attribute of X receives a value from a feature function that associates such attribute with a possible label. Each feature holds a weight that represents its strength for the proposed label (Ceri et al, 2013): positive values mean a good association between the function and the label, negative values mean otherwise, and a value of 0 means that the feature function does not have an influence on the label identification. In short, CRFs provide a powerful and flexible mechanism for exploiting arbitrary feature sets along with dependency in the labels of neighbouring words (Sarawagi, 2008).…”
Section: Automatic Text Extractionmentioning
confidence: 99%
See 1 more Smart Citation