{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:11:42Z","timestamp":1756311102916,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031360954"},{"type":"electronic","value":"9783031360961"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-36096-1_8","type":"book-chapter","created":{"date-parts":[[2023,6,15]],"date-time":"2023-06-15T16:02:22Z","timestamp":1686844942000},"page":"113-131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Building Cross-language Corpora for\u00a0Human Understanding of\u00a0Privacy Policies"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0191-888X","authenticated-orcid":false,"given":"Francesco","family":"Ciclosi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1838-8077","authenticated-orcid":false,"given":"Silvia","family":"Vidor","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1091-8486","authenticated-orcid":false,"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,16]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Amos, R., Acar, G., Lucherini, E., Kshirsagar, M., Narayanan, A., Mayer, J.: Privacy policies over time: curation and analysis of a million-document dataset. In: WWW 2021: Proceedings of the Web Conference 2021, pp. 2165\u20132176 (2021)","DOI":"10.1145\/3442381.3450048"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/j.techfore.2015.01.021","volume":"96","author":"G Cecere","year":"2015","unstructured":"Cecere, G., Le Guel, F., Souli\u00e9, N.: Perceived internet privacy concerns on social networks in Europe. Technol. Forecast. Soc. Change 96, 277\u2013287 (2015)","journal-title":"Technol. Forecast. Soc. Change"},{"issue":"8","key":"8_CR3","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/S1361-3723(19)30086-7","volume":"2019","author":"A Chatzipoulidis","year":"2019","unstructured":"Chatzipoulidis, A., Tsiakis, T., Kargidis, T.: A readiness assessment tool for GDPR compliance certification. Comput. Fraud Secur. 2019(8), 14\u201319 (2019)","journal-title":"Comput. Fraud Secur."},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1007\/978-3-319-57454-7_46","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"M Chebel","year":"2017","unstructured":"Chebel, M., Latiri, C., Gaussier, E.: Bilingual lexicon extraction from comparable corpora based on closed concepts mining. In: Kim, J., Shim, K., Cao, L., Lee, J.-G., Lin, X., Moon, Y.-S. (eds.) PAKDD 2017. LNCS (LNAI), vol. 10234, pp. 586\u2013598. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-57454-7_46"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Ciclosi, F., Massacci, F.: The data protection officer: a ubiquitous role that no one really knows. IEEE Secur. Privacy 21(1), 66\u201377 (2023)","DOI":"10.1109\/MSEC.2022.3222115"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Del Alamo, J.M., Guaman, D.S., Garc\u00eda, B., Diez, A.: A systematic mapping study on automated analysis of privacy policies. Computing 104, 2053\u20132076 (2022)","DOI":"10.1007\/s00607-022-01076-3"},{"key":"8_CR7","unstructured":"Ermakova, T., Fabian, B., Babina, E.: Readability of privacy policies of healthcare websites. In: Wirtschaftsinformatik Proceedings 2015 (WI 2015) (2015)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Fabian, B., Ermakova, T., Lents, T.: Large-scale readability analysis of privacy policies. WI 2017: Proceedings of the International Conference on Web Intelligence, pp. 18\u201325 (2017)","DOI":"10.1145\/3106426.3106427"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Hosseini, M.B., Breaux, T.D., Slavin, R., Niu, J., Wang, X.: Analyzing privacy policies through syntax-driven semantic analysis of information types. Inf. Softw. Technol. 138, 106608 (2021)","DOI":"10.1016\/j.infsof.2021.106608"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-642-20128-8_4","volume-title":"Building and Using Comparable Corpora","author":"R K\u00f6hler","year":"2013","unstructured":"K\u00f6hler, R.: Statistical comparability: methodological caveats. In: Sharoff, S., Rapp, R., Zweigenbaum, P., Fung, P. (eds.) Building and Using Comparable Corpora, pp. 77\u201391. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-20128-8_4"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/978-3-030-49669-2_22","volume-title":"Data and Applications Security and Privacy XXXIV","author":"B Krumay","year":"2020","unstructured":"Krumay, B., Klar, J.: Readability of privacy policies. In: Singhal, A., Vaidya, J. (eds.) DBSec 2020. LNCS, vol. 12122, pp. 388\u2013399. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-49669-2_22"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Layton, R., Elaluf-Calderwood, S.: A social economic analysis of the impact of GDPR on security and privacy practices. In 2019 12th CMI Conference on Cybersecurity and Privacy (CMI), pp. 1\u20136. IEEE (2019)","DOI":"10.1109\/CMI48017.2019.8962288"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Leicht, J., Heisel, M.: A Survey on privacy policy languages: expressiveness concerning data protection regulations. In: 2019 12th CMI Conference on Cybersecurity and Privacy (CMI), pp. 1\u20136 (2019)","DOI":"10.1109\/CMI48017.2019.8962144"},{"key":"8_CR14","unstructured":"Li, B., Gaussier, E.: Improving corpus comparability for bilingual lexicon extraction from comparable corpora. In Proceedings of the 23rd International Conference on Computational Linguistics (Coling 2010), pp. 644\u2013652 (2010)"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-642-20128-8_7","volume-title":"Building and Using Comparable Corpora","author":"B Li","year":"2013","unstructured":"Li, B., Gaussier, E.: Exploiting comparable corpora for lexicon extraction: measuring and improving corpus quality. In: Sharoff, S., Rapp, R., Zweigenbaum, P., Fung, P. (eds.) Building and Using Comparable Corpora, pp. 131\u2013149. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-20128-8_7"},{"key":"8_CR16","unstructured":"National People\u2019s Congress of the People\u2019s Republic of China. Personal Information Protection Law of the People\u2019s Republic of China (2021)"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-642-20128-8_5","volume-title":"Building and Using Comparable Corpora","author":"ML Paramita","year":"2013","unstructured":"Paramita, M.L., Guthrie, D., Kanoulas, E., Gaizauskas, R., Clough, P., Sanderson, M.: Methods for collection and evaluation of comparable documents. In: Sharoff, S., Rapp, R., Zweigenbaum, P., Fung, P. (eds.) Building and Using Comparable Corpora, pp. 93\u2013112. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-20128-8_5"},{"key":"8_CR18","unstructured":"Parliament EU and Council EU. Consolidated text: Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation) (2016)"},{"issue":"1","key":"8_CR19","first-page":"39","volume":"30","author":"JR Reidenberg","year":"2015","unstructured":"Reidenberg, J.R., et al.: Disagreeable privacy policies: mismatches between meaning and users\u2019 understanding. Berkeley Technol. Law J. 30(1), 39\u201368 (2015)","journal-title":"Berkeley Technol. Law J."},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Robillard, J.M., et al.: Availability, readability, and content of privacy policies and terms of agreements of mental health apps. Internet Intervent. 17, 100243 (2019)","DOI":"10.1016\/j.invent.2019.100243"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Sarne, D., Chler, J., Singer, A., Sela, A., Bar Siman Tov, I.: Unsupervised topic extraction from privacy policies. In: WWW 2019: Companion Proceedings of The 2019 World Wide Web Conference, pp. 563\u2013568 (2019)","DOI":"10.1145\/3308560.3317585"},{"key":"8_CR22","unstructured":"Skadin\u0327a, I., Vasil\u0327jevs, A., Skadin\u0327\u0161, R., Gaizauskas, R., Tufi\u015f, D., Gornostay, T.: Analysis and evaluation of comparable corpora for under resourced areas of machine translation. In: The 5th Workshop on Building and Using Comparable Corpora, p. 17. CiteSeer (2012)"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Talvensaari, T., Laurikkala, J., J\u00e4rvelin, K., Juhola, M., Keskustalo, H.: Creating and exploiting a comparable corpus in cross-language information retrieval. ACM Trans. Inf. Syst. (TOIS), 25(1), 4-es (2007)","DOI":"10.1145\/1198296.1198300"},{"key":"8_CR24","first-page":"70","volume":"3","author":"J Tang","year":"2021","unstructured":"Tang, J., Shoemaker, H., Lerner, A., Birrell, E.: Defining privacy: how users interpret technical terms in privacy policies. Proceedi. Priv. Enhan. Technol. 3, 70\u201394 (2021)","journal-title":"Proceedi. Priv. Enhan. Technol."},{"issue":"3","key":"8_CR25","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1080\/08838151.2018.1451867","volume":"62","author":"J Turow","year":"2018","unstructured":"Turow, J., Hennessy, M., Draper, N.: Persistent misperceptions: Americans\u2019 misplaced confidence in privacy policies, 2003\u20132015. J. Broadcast. Electron. Media 62(3), 461\u2013478 (2018)","journal-title":"J. Broadcast. Electron. Media"},{"issue":"3","key":"8_CR26","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1109\/TEM.2008.922634","volume":"55","author":"MW Vail","year":"2008","unstructured":"Vail, M.W., Earp, J.B., Ant\u00f3n, A.I.: An empirical study of consumer perceptions and comprehension of web site privacy policies. IEEE Trans. Eng. Manage. 55(3), 442\u2013454 (2008)","journal-title":"IEEE Trans. Eng. Manage."},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Wilson, S., et al.: The creation and analysis of a website privacy policy corpus. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, vol. 1, pp. 1330\u20131340 (2016)","DOI":"10.18653\/v1\/P16-1126"},{"key":"8_CR28","unstructured":"Zaeem, R.N., et al.: PrivacyCheck v2: a tool that recaps privacy policies for you. CIKM 2020. In: Proceedings of the 29th ACM International Conference on Information & Knowledge Management, pp. 3441\u20133444 (2020)"},{"issue":"2","key":"8_CR29","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MTS.2016.2554419","volume":"35","author":"S Zeadally","year":"2016","unstructured":"Zeadally, S., Winkler, S.: Privacy policy analysis of popular web platforms. IEEE Technol. Soc. Mag. 35(2), 75\u201385 (2016)","journal-title":"IEEE Technol. Soc. Mag."},{"key":"8_CR30","unstructured":"Zimmeck, S., Bellovin, S.M.: Privee: an architecture for automatically analyzing web privacy policies. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 1\u201316, San Diego, CA. USENIX Association (2014)"},{"issue":"3","key":"8_CR31","first-page":"66","volume":"2019","author":"S Zimmeck","year":"2019","unstructured":"Zimmeck, S., et al.: MAPS: scaling privacy compliance analysis to a million apps. Proceed. Priv. Enhan. Technol. 2019(3), 66\u201386 (2019)","journal-title":"Proceed. Priv. Enhan. Technol."}],"container-title":["Communications in Computer and Information Science","Digital Sovereignty in Cyber Security: New Challenges in Future Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-36096-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,15]],"date-time":"2023-06-15T16:05:38Z","timestamp":1686845138000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-36096-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031360954","9783031360961"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-36096-1_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"16 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"<i>Conceptualization:<\/i> FC, FM, SV; <i>Methodology:<\/i> FC, SV; <i>Software:<\/i> SV, FC; <i>Validation:<\/i> FC, SV, FM; <i>Investigation:<\/i> FC, SV; <i>Data Curation:<\/i> FC, SV; <i>Writing - Original Draft:<\/i> FC, SV; <i>Writing - Review & Editing:<\/i> FC, SV, FM; <i>Visualization:<\/i> FC; <i>Supervision:<\/i> FM; <i>Project administration:<\/i> FM, SV; <i>Funding acquisition:<\/i> FM.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CRediT statements"}},{"value":"CyberSec4Europe","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Sovereignty in Cyber Security: New Challenges in Future Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Venice","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cybersec4europe2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cybersec4europe.eu\/about\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}