2017 IEEE 25th International Requirements Engineering Conference Workshops (REW) 2017
DOI: 10.1109/rew.2017.77
|View full text |Cite
|
Sign up to set email alerts
|

Toward an Approach to Privacy Notices in IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…This work is different than the work presented by Shayegh et al because an analysis of the privacy practices is provided instead of proposing a model for the analysis . This work also differs from the work of Sengul because in that work the author described privacy issues for IoT instead of analyzing privacy policies.…”
Section: Introductionmentioning
confidence: 94%
See 1 more Smart Citation
“…This work is different than the work presented by Shayegh et al because an analysis of the privacy practices is provided instead of proposing a model for the analysis . This work also differs from the work of Sengul because in that work the author described privacy issues for IoT instead of analyzing privacy policies.…”
Section: Introductionmentioning
confidence: 94%
“…Similar analyses have been performed before for privacy policies for websites since the emergence of the web, and more recently for mobile applications . However, only recently works focusing on the analysis of privacy policies of IoT systems and devices have started to emerge.…”
Section: Privacy Policy and Notices For Consumer Iotmentioning
confidence: 99%
“…Usable privacy has been studied as an approach to make privacy policies understandable using machine learning, data processing, and legal analysis [60]. Most of the related work in this area has focused on enhancing the readability and usability of privacy policies through traditional NLP techniques, user interface improvements, and deep learning [13,[60][61][62][63][64][65][66][67][68][69][70][71][72][73]. Using LLMs for usable privacy is a recent area of research.…”
Section: Privacy Policy Of Iot Devicesmentioning
confidence: 99%
“…Shayegh, P. et al. 17 used the Latent Dirichlet allocation (LDA) algorithm for topic modeling to classify parts from the privacy policy documents under six topics: Information, Collection, Sharing, Permission, Purpose and Technology. In all these studies, manual or semi‐automated labeling is necessary and determining the classes/topics that the text sections of a privacy policy can be classified is a challenging task.…”
Section: Related Workmentioning
confidence: 99%