Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp 2017
DOI: 10.1145/3055305.3055309
|View full text |Cite
|
Sign up to set email alerts
|

Learning a Privacy Incidents Database

Abstract: A repository of privacy incidents is essential for understanding the attributes of products and policies that lead to privacy incidents. We describe our vision for a novel privacy incidents database and our progress toward building a prototype. Key challenges in gathering such a database include bootstrapping and sustainability. We propose a semi-automated framework that can recognize privacy incidents and related information from various online sources such as news, blogs, and social media. The crux of our fr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…The Guardian provides all their content via an API called OpenPlatform 2 , launched in 2009 (Anderson, 2009). This data source has seen only tangential use in the scientific community (Li et al, 2016;Guimarães and Figueira, 2017;Murukannaiah et al, 2017) and has not been used for diachronic models before.…”
Section: Datamentioning
confidence: 99%
“…The Guardian provides all their content via an API called OpenPlatform 2 , launched in 2009 (Anderson, 2009). This data source has seen only tangential use in the scientific community (Li et al, 2016;Guimarães and Figueira, 2017;Murukannaiah et al, 2017) and has not been used for diachronic models before.…”
Section: Datamentioning
confidence: 99%
“…Breaches are frequently caused by social (user misbehavior) and technical (flaws in software) violations. Breach reports [21,34,47], often legally mandated, describe cases where deployed systems fail, or are maliciously or accidentally misused [31,41], and suggest actions to prevent, detect, and recover from future breaches [28,38]. Breach reports can help security analysts understand regulations by providing instances where regulations are violated.…”
Section: Textboxmentioning
confidence: 99%