{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T13:43:47Z","timestamp":1769694227940,"version":"3.49.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030000622","type":"print"},{"value":"9783030000639","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00063-9_14","type":"book-chapter","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T05:39:46Z","timestamp":1535607586000},"page":"127-137","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Personalised Privacy Policies"],"prefix":"10.1007","author":[{"given":"Harshvardhan Jitendra","family":"Pandit","sequence":"first","affiliation":[]},{"given":"Declan","family":"O\u2019Sullivan","sequence":"additional","affiliation":[]},{"given":"Dave","family":"Lewis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,31]]},"reference":[{"key":"14_CR1","unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union L119, 1\u201388, May 2016. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=OJ:L:2016:119:TOC"},{"key":"14_CR2","unstructured":"Ammar, W., Wilson, S., Sadeh, N., Smith, N.A.: Automatic categorization of privacy policies: a pilot study (2012). http:\/\/repository.cmu.edu\/lti\/199\/"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Bhatia, J., Breaux, T.D.: A data purpose case study of privacy policies. In: 2017 IEEE 25th International Requirements Engineering Conference (RE), pp. 394\u2013399. IEEE (2017)","DOI":"10.1109\/RE.2017.56"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-44760-5_9","volume-title":"Privacy Technologies and Policy","author":"C Bier","year":"2016","unstructured":"Bier, C., K\u00fchne, K., Beyerer, J.: PrivacyInsight: the next generation privacy dashboard. In: Schiffner, S., Serna, J., Ikonomou, D., Rannenberg, K. (eds.) APF 2016. LNCS, vol. 9857, pp. 135\u2013152. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-44760-5_9"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-319-46963-8_4","volume-title":"Current Trends in Web Engineering","author":"S Esayas","year":"2016","unstructured":"Esayas, S., Mahler, T., McGillivray, K.: Is a picture worth a thousand terms? Visualising contract terms and data protection requirements for cloud computing users. In: Casteleyn, S., Dolog, P., Pautasso, C. (eds.) ICWE 2016. LNCS, vol. 9881, pp. 39\u201356. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46963-8_4"},{"key":"14_CR6","doi-asserted-by":"publisher","unstructured":"Fabian, B., Ermakova, T., Lentz, T.: Large-scale readability analysis of privacy policies. In: Proceedings of the International Conference on Web Intelligence, WI 2017, pp. 18\u201325. ACM, New York (2017). https:\/\/doi.org\/10.1145\/3106426.3106427","DOI":"10.1145\/3106426.3106427"},{"key":"14_CR7","unstructured":"Fawaz, H.H.K., Schaub, R.L.F., Karl, K.G.S.: Polisis: automated analysis and presentation of privacy policies using deep learning. Technical report, EPFL (2017). https:\/\/pribot.org\/files\/Polisis_Technical_Report.pdf"},{"key":"14_CR8","doi-asserted-by":"publisher","unstructured":"Jensen, C., Potts, C.: Privacy policies as decision-making tools: an evaluation of online privacy notices. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2004, pp. 471\u2013478. ACM, New York (2004). https:\/\/doi.org\/10.1145\/985692.985752","DOI":"10.1145\/985692.985752"},{"key":"14_CR9","doi-asserted-by":"publisher","unstructured":"Oltramari, A., et al.: PrivOnto: a semantic framework for the analysis of privacy policies. Semant. Web 9(2), 185\u2013203 (2018). https:\/\/doi.org\/10.3233\/SW-170283","DOI":"10.3233\/SW-170283"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/978-3-319-93417-4_31","volume-title":"The Semantic Web","author":"HJ Pandit","year":"2018","unstructured":"Pandit, H.J., Fatema, K., O\u2019Sullivan, D., Lewis, D.: GDPRtEXT - GDPR as a linked data resource. ESWC 2018. LNCS, vol. 10843, pp. 481\u2013495. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93417-4_31"},{"key":"14_CR11","unstructured":"Pandit, H.J., Lewis, D.: Modelling provenance for GDPR compliance using linked open data vocabularies. In: Proceedings of the 5th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2017) (PrivOn) (2017). http:\/\/ceur-ws.org\/Vol-1951\/#paper-06"},{"key":"14_CR12","doi-asserted-by":"publisher","unstructured":"Rossi, A., Palmirani, M.: A visualization approach for adaptive consent in the european data protection framework. In: 2017 Conference for E-Democracy and Open Government (CeDEM), pp. 159\u2013170, May 2017. https:\/\/doi.org\/10.1109\/CeDEM.2017.23","DOI":"10.1109\/CeDEM.2017.23"},{"key":"14_CR13","doi-asserted-by":"publisher","unstructured":"Tesfay, W.B., Hofmann, P., Nakamura, T., Kiyomoto, S., Serna, J.: I read but don\u2019t agree: privacy policy benchmarking using machine learning and the EU GDPR. In: WWW 2018 Companion Proceedings of the Web Conference 2018, pp. 163\u2013166. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland (2018). https:\/\/doi.org\/10.1145\/3184558.3186969","DOI":"10.1145\/3184558.3186969"},{"key":"14_CR14","doi-asserted-by":"publisher","unstructured":"Tesfay, W.B., Hofmann, P., Nakamura, T., Kiyomoto, S., Serna, J.: PrivacyGuide: towards an implementation of the EU GDPR on internet privacy policy evaluation. In: Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, IWSPA 2018, pp. 15\u201321. ACM, New York (2018). https:\/\/doi.org\/10.1145\/3180445.3180447","DOI":"10.1145\/3180445.3180447"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Wilson, S., et al.: The creation and analysis of a website privacy policy corpus. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), pp. 1330\u20131340. Association for Computational Linguistics, Berlin, Germany, August 2016. http:\/\/www.aclweb.org\/anthology\/P16-1126","DOI":"10.18653\/v1\/P16-1126"}],"container-title":["Communications in Computer and Information Science","New Trends in Databases and Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00063-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T02:57:15Z","timestamp":1571799435000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00063-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000622","9783030000639"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00063-9_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}