Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society 2012
DOI: 10.1145/2381966.2381979
|View full text |Cite
|
Sign up to set email alerts
|

A machine learning solution to assess privacy policy completeness

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 59 publications
(40 citation statements)
references
References 48 publications
0
33
0
Order By: Relevance
“…However, in spite of notable efforts such as P3P (Wenning et al, 2006), the majority of privacy policies are unstructured and do not follow standardized formats. Costante et al (2012) proposed a supervised learning approach to determine which data practice categories are covered in a privacy policy. Rule-based extraction techniques have been proposed to extract some of a website's data collection practices from its privacy policy (Costante et al, 2013) or to answer certain binary questions about a privacy policy (Zimmeck and Bellovin, 2014).…”
Section: Related Workmentioning
confidence: 99%
“…However, in spite of notable efforts such as P3P (Wenning et al, 2006), the majority of privacy policies are unstructured and do not follow standardized formats. Costante et al (2012) proposed a supervised learning approach to determine which data practice categories are covered in a privacy policy. Rule-based extraction techniques have been proposed to extract some of a website's data collection practices from its privacy policy (Costante et al, 2013) or to answer certain binary questions about a privacy policy (Zimmeck and Bellovin, 2014).…”
Section: Related Workmentioning
confidence: 99%
“…Their analysis is limited to a small number of binary questions for which answers are extracted from privacy policies with varying accuracy. Costante et al [7] use text classification to estimate a policy's completeness based on topic coverage. Other approaches have applied topic modeling to privacy policies [6,29] and have automatically grouped related sections and paragraphs of privacy policies [15,24].…”
Section: Related Workmentioning
confidence: 99%
“…We further asked participants in the TOP05 and TOP10 groups to rate the perceived usefulness of paragraph highlighting on a sevenpoint scale ranging from "Not at all helpful" (1) to "Very Helpful" (7). Distribution of answer choices are shown in Figure 10.…”
Section: Productivity and Usabilitymentioning
confidence: 99%
“…These events enable the user to evaluate the a posteriori trust, that is, the level of trust she has after obtaining more information about the objective trustworthiness of the trustee. The user could realize, for example, that she did not give the right weight to privacy and that in the future, she should give more importance w 0 f Á to the fact that the website keeps personal data private, for example, by carefully reading a privacy policy or by using mechanisms that improve the privacy trust indicators (Costante et al 2012). We refer to the gap between the importance of a factor before and after the trust decision as the factor importance gap.…”
Section: The Modelmentioning
confidence: 99%