Proceedings of the 27th ACM International Conference on Design of Communication 2009
DOI: 10.1145/1621995.1622041
|View full text |Cite
|
Sign up to set email alerts
|

Automatically identifying relations in privacy policies

Abstract: E-commerce privacy policies tend to consist of many ambiguities in language that protects companies more than the customers. Types of ambiguities found are currently divided into four patterns: mitigation (downplaying frequency), enhancement (emphasizing nonessential qualities), obfuscation (hedging claims and obscuring causality), and omission (removing agents). A number of phrases have been identified as creating ambiguities within these four categories. When a customer accepts the terms and conditions of a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…Rule-based extraction techniques have been proposed to extract some of a website's data collection practices from its privacy policy (Costante et al, 2013) or to answer certain binary questions about a privacy policy (Zimmeck and Bellovin, 2014). Other approaches leverage topic mod-eling (Chundi and Subramaniam, 2014;Stamey and Rossi, 2009) or sequence alignment techniques to analyze privacy policies or identify similar policy sections and paragraphs. However, the complexity and vagueness of privacy policies makes it difficult to automatically extract complex data practices from privacy policies without substantial gold standard data.…”
Section: Related Workmentioning
confidence: 99%
“…Rule-based extraction techniques have been proposed to extract some of a website's data collection practices from its privacy policy (Costante et al, 2013) or to answer certain binary questions about a privacy policy (Zimmeck and Bellovin, 2014). Other approaches leverage topic mod-eling (Chundi and Subramaniam, 2014;Stamey and Rossi, 2009) or sequence alignment techniques to analyze privacy policies or identify similar policy sections and paragraphs. However, the complexity and vagueness of privacy policies makes it difficult to automatically extract complex data practices from privacy policies without substantial gold standard data.…”
Section: Related Workmentioning
confidence: 99%
“…Stamey et al used latent semantic analysis to analyze e-commerce privacy policies to identify the important privacy sections and ranked the significant words for the identified sections [40]. The authors analyzed the sematic relations between words in the policies and identified ambiguity in text.…”
Section: Chapter 2 Content Analysis Of Privacy Policiesmentioning
confidence: 99%
“…Their analysis addresses six binary questions (e.g., whether a policy provides for limited retention or allows ad tracking), reaching F 1 scores between 0.6 and 1. Other approaches have applied topic modeling to privacy policies (Chundi and Subramaniam 2014;Stamey and Rossi 2009) and have automatically grouped related sections and paragraphs of privacy policies . introduce an unsupervised model for the automatic alignment of privacy policies and show that hidden Markov models are more effective than clustering and topic models.…”
Section: Related Workmentioning
confidence: 99%