{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:44:11Z","timestamp":1767339851327,"version":"3.41.0"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319952758"},{"type":"electronic","value":"9783319952765"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95276-5_3","type":"book-chapter","created":{"date-parts":[[2018,6,29]],"date-time":"2018-06-29T13:30:22Z","timestamp":1530279022000},"page":"29-44","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Privacy Policy Annotation for Semi-automated Analysis: A Cost-Effective Approach"],"prefix":"10.1007","author":[{"given":"Dhiren A.","family":"Audich","sequence":"first","affiliation":[]},{"given":"Rozita","family":"Dara","sequence":"additional","affiliation":[]},{"given":"Blair","family":"Nonnecke","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,30]]},"reference":[{"key":"3_CR1","unstructured":"Madden, M., Rainie, L.: Americans Attitudes About Privacy, Security and Surveillance, May 2015. Available: http:\/\/www.pewinternet.org\/2015\/05\/20\/americans-attitudes-about-privacy-security-and-surveillance\/. Accessed 10 June 2016"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Jensen, C., Potts, C.: Privacy policies as decision-making tools: an evaluation of online privacy notices. In: 2004 Conference on Human Factors in Computing Systems, vol. 6, no. 1, pp. 471\u2013478 (2004)","DOI":"10.1145\/985692.985752"},{"issue":"2","key":"3_CR3","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MTS.2016.2554419","volume":"35","author":"S Winkler","year":"2016","unstructured":"Winkler, S., Zeadally, S.: Privacy policy analysis of popular web platforms. IEEE Technol. Soc. Mag. 35(2), 75\u201385 (2016)","journal-title":"IEEE Technol. Soc. Mag."},{"key":"3_CR4","unstructured":"Privacy Online: Fair Information Practices in the Electronic Marketplace, May 2000. http:\/\/1.usa.gov\/1XeBiuY. Accessed 10 June 2016"},{"key":"3_CR5","unstructured":"Council Regulation 2016\/679 of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation) [2016] OJ L119\/I, April 2016. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679&from=EN. Accessed 10 June 2016"},{"key":"3_CR6","unstructured":"Personal Information Protection and Electronic Documents Act, April 2000. http:\/\/laws-lois.justice.gc.ca\/eng\/acts\/P-8.6\/index.html. Accessed 10 June 2016"},{"key":"3_CR7","unstructured":"Digital Privacy Act, June 2015. http:\/\/laws-lois.justice.gc.ca\/eng\/annualstatutes\/2015_32\/page-1.html. Accessed 10 June 2016"},{"key":"3_CR8","first-page":"543","volume":"4","author":"AM McDonald","year":"2008","unstructured":"McDonald, A.M., Cranor, L.F.: Cost of reading privacy policies. ISJLP 4, 543 (2008)","journal-title":"ISJLP"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-03168-7_3","volume-title":"Privacy Enhancing Technologies","author":"AM McDonald","year":"2009","unstructured":"McDonald, A.M., Reeder, R.W., Kelley, P.G., Cranor, L.F.: A comparative study of online privacy policies and formats. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 37\u201355. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03168-7_3"},{"issue":"3","key":"3_CR10","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1002\/dir.20009","volume":"18","author":"GR Milne","year":"2004","unstructured":"Milne, G.R., Culnan, M.J.: Strategies for reducing online privacy risks: why consumers read (or don\u2019t read) online privacy notices. J. Interact. Mark. 18(3), 15\u201329 (2004)","journal-title":"J. Interact. Mark."},{"key":"3_CR11","first-page":"325","volume":"11","author":"LF Cranor","year":"2015","unstructured":"Cranor, L.F., Hoke, C., Leon, P.G., Au, A.: Are they worth reading-an in-depth analysis of online trackers\u2019 privacy policies. I\/S: J. Law Policy Inf. Soc. 11, 325 (2015)","journal-title":"I\/S: J. Law Policy Inf. Soc."},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Wilson, S., Schaub, F., Dara, A.A., Liu, F., Cherivirala, S., Leon, P.G., Andersen, M.S., Zimmeck, S., Sathyendra, K.M., Russell, N.C., Norton, T.B., Hovy, E., Reidenberg, J., Sadeh, N.: The creation and analysis of a website privacy policy corpus. In: Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), vol. 1, pp. 1330\u20131340 (2016)","DOI":"10.18653\/v1\/P16-1126"},{"key":"3_CR13","unstructured":"Sadeh, N., Acquisti, R., Breaux, T.D., Cranor, L.F., Mcdonalda, A.M., Reidenbergb, J.R., Smith, N.A., Liu, F., Russellb, N.C., Schaub, F., et al.: The usable privacy policy project: combining crowdsourcing, machine learning and natural language processing to semi-automatically answer those privacy questions users care about (2013)"},{"key":"3_CR14","unstructured":"Sun, Y.: Automatic Evaluation of Privacy Policy (2012)"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Cranor, L.F., Langheinrich, M., Marchiori, M.: A P3P preference exchange language 1.0 (APPEL1. 0). W3C working draft, vol. 15 (2002)","DOI":"10.1145\/644527.644528"},{"issue":"6","key":"3_CR16","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSECP.2003.1253568","volume":"1","author":"LF Cranor","year":"2003","unstructured":"Cranor, L.F.: P3P: making privacy policies more useful. IEEE Secur. Priv. 1(6), 50\u201355 (2003)","journal-title":"IEEE Secur. Priv."},{"issue":"2","key":"3_CR17","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/s10664-012-9204-1","volume":"18","author":"R L\u00e4mmel","year":"2013","unstructured":"L\u00e4mmel, R., Pek, E.: Understanding privacy policies. Empir. Softw. Eng. 18(2), 310\u2013374 (2013)","journal-title":"Empir. Softw. Eng."},{"key":"3_CR18","unstructured":"Ten steps to develop a multilayered privacy notice, February 2006. https:\/\/www.huntonprivacyblog.com\/wp-content\/uploads\/sites\/18\/2012\/07\/Centre-10-Steps-to-Multilayered-Privacy-Notice.pdf. Accessed 10 June 2016"},{"key":"3_CR19","unstructured":"Munur, M., Branam, S., Mrkobrad, M.: Best practices in drafting plain-language and layered privacy policies, September 2012. https:\/\/iapp.org\/news\/a\/2012-09-13-best-practices-in-drafting-plain-language-and-layered-privacy\/. Accessed 10 June 2016"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/11428817_21","volume-title":"Natural Language Processing and Information Systems","author":"P Cimiano","year":"2005","unstructured":"Cimiano, P., V\u00f6lker, J.: Text2Onto. In: Montoyo, A., Mu\u0144oz, R., M\u00e9tais, E. (eds.) NLDB 2005. LNCS, vol. 3513, pp. 227\u2013238. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11428817_21"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Velardi, P., Fabriani, P., Missikoff, M.: Using text processing techniques to automatically enrich a domain ontology. In: Proceedings of the International Conference on Formal Ontology in Information Systems-Volume 2001, pp. 270\u2013284. ACM (2001)","DOI":"10.1145\/505168.505194"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Ramanath, R., Schaub, F., Wilson, S., Liu, F., Sadeh, N., Smith, N.A.: Identifying relevant text fragments to help crowdsource privacy policy annotations. In: Second AAAI Conference on Human Computation and Crowdsourcing (2014)","DOI":"10.1609\/hcomp.v2i1.13179"},{"issue":"4","key":"3_CR23","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.jretai.2006.08.006","volume":"82","author":"Y Pan","year":"2006","unstructured":"Pan, Y., Zinkhan, G.M.: Exploring the impact of online privacy disclosures on consumer trust. J. Retail. 82(4), 331\u2013338 (2006)","journal-title":"J. Retail."},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Wilson, S., Schaub, F., Ramanath, R., Sadeh, N., Liu, F., Smith, N.A., Liu, F.: Crowdsourcing annotations for websites\u2019 privacy policies: can it really work? In: Proceedings of the 25th International Conference on World Wide Web, pp. 133\u2013143. International World Wide Web Conferences Steering Committee (2016)","DOI":"10.1145\/2872427.2883035"},{"key":"3_CR25","unstructured":"Sathyendra, K.M., Schaub, F., Wilson, S., Sadeh, N.: Automatic extraction of opt-out choices from privacy policies. In: 2016 AAAI Fall Symposium Series (2016)"},{"key":"3_CR26","unstructured":"Kim, S.N., Medelyan, O., Kan, M.-Y., Baldwin, T.: SemEval-2010 Task 5: automatic keyphrase extraction from scientific articles. In: Proceedings of the 5th International Workshop on Semantic Evaluation, ser. SemEval 2010, pp. 21\u201326. Association for Computational Linguistics, Stroudsburg (2010)"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Yeung, C.-M.A., Gibbins, N., Shadbolt, N.: A k-nearest-neighbour method for classifying web search results with data in Folksonomies. In: Proceedings of the 2008 IEEE\/WIC\/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 01, ser. WI-IAT 2008, pp. 70\u201376. IEEE Computer Society, Washington, D.C. (2008)","DOI":"10.1109\/WIIAT.2008.269"},{"issue":"4","key":"3_CR28","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1016\/j.eswa.2004.12.023","volume":"28","author":"S Tan","year":"2005","unstructured":"Tan, S.: Neighbor-weighted K-nearest neighbor for unbalanced text corpus. Expert Syst. Appl. 28(4), 667\u2013671 (2005)","journal-title":"Expert Syst. Appl."},{"key":"3_CR29","unstructured":"Frank, E., Paynter, G.W., Witten, I.H., Gutwin, C., Nevill-Manning, C.G.: Domain-specific keyphrase extraction. In: 16th International Joint Conference on Artificial Intelligence (IJCAI 1999), vol. 2, pp. 668\u2013673. Morgan Kaufmann Publishers Inc., San Francisco (1999)"},{"issue":"4","key":"3_CR30","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1023\/A:1009976227802","volume":"2","author":"PD Turney","year":"2000","unstructured":"Turney, P.D.: Learning algorithms for keyphrase extraction. Inf. Retr. 2(4), 303\u2013336 (2000)","journal-title":"Inf. Retr."},{"key":"3_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/11775300_8","volume-title":"Advances in Web-Age Information Management","author":"K Zhang","year":"2006","unstructured":"Zhang, K., Xu, H., Tang, J., Li, J.: Keyword extraction using support vector machine. In: Yu, J.X., Kitsuregawa, M., Leong, H.V. (eds.) WAIM 2006. LNCS, vol. 4016, pp. 85\u201396. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11775300_8"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Audich, D.A., Dara, R., Nonnecke, B.: Extracting keyword and keyphrase from online privacy policies. In: 2016 Eleventh International Conference on Digital Information Management (ICDIM), pp. 127\u2013132, September 2016","DOI":"10.1109\/ICDIM.2016.7829792"},{"key":"3_CR33","unstructured":"Mihalcea, R., Tarau, P.: TextRank: bringing order into texts. In: Proceedings of the 2004 Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics (2004)"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Witten, I.H., Paynter, G.W., Frank, E., Gutwin, C., Nevill-Manning, C.G.: KEA: practical automatic keyphrase extraction. In: Proceedings of the Fourth ACM Conference on Digital libraries, pp. 254\u2013255. ACM (1999)","DOI":"10.1145\/313238.313437"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Kim, S.N., Kan, M.-Y.: Re-examining automatic keyphrase extraction approaches in scientific articles. In: Proceedings of the Workshop on Multiword Expressions: Identification, Interpretation, Disambiguation and Applications, pp. 9\u201316. Association for Computational Linguistics (2009)","DOI":"10.3115\/1698239.1698242"},{"issue":"2","key":"3_CR36","first-page":"18","volume":"109","author":"S Siddiqi","year":"2015","unstructured":"Siddiqi, S., Sharan, A.: Keyword and keyphrase extraction techniques: a literature review. Int. J. Comput. Appl. 109(2), 18\u201323 (2015)","journal-title":"Int. J. Comput. Appl."},{"key":"3_CR37","unstructured":"Kim, S.N., Baldwin, T.: Extracting keywords from multi-party live chats. In: Proceedings of the 26th Pacific Asia Conference on Language, Information, and Computation, pp. 199\u2013208 (2012)"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Grineva, M., Grinev, M., Lizorkin, D.: Extracting key terms from noisy and multitheme documents. In: Proceedings of the 18th International Conference on World Wide Web, pp. 661\u2013670. ACM (2009)","DOI":"10.1145\/1526709.1526798"},{"key":"3_CR39","doi-asserted-by":"crossref","unstructured":"Yih, W.-T., Goodman, J., Carvalho, V.R.: Finding advertising keywords on web pages. In: Proceedings of the 15th International Conference on World Wide Web, pp. 213\u2013222. ACM (2006)","DOI":"10.1145\/1135777.1135813"},{"key":"3_CR40","doi-asserted-by":"crossref","unstructured":"Hasan, K.S., Ng, V.: Automatic keyphrase extraction: a survey of the state of the art. In: ACL, vol. 1, pp. 1262\u20131273 (2014)","DOI":"10.3115\/v1\/P14-1119"},{"key":"3_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/BFb0026666","volume-title":"Machine Learning: ECML-98","author":"DD Lewis","year":"1998","unstructured":"Lewis, D.D.: Naive (Bayes) at forty: the independence assumption in information retrieval. In: N\u00e9dellec, C., Rouveirol, C. (eds.) ECML 1998. LNCS, vol. 1398, pp. 4\u201315. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0026666"},{"issue":"3","key":"3_CR42","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1108\/eb046814","volume":"14","author":"MF Porter","year":"1980","unstructured":"Porter, M.F.: An algorithm for suffix stripping. Program 14(3), 130\u2013137 (1980)","journal-title":"Program"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management XII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95276-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T12:38:37Z","timestamp":1751719117000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-95276-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319952758","9783319952765"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95276-5_3","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"30 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IFIPTM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Trust Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ifiptm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.uoit.ca\/ifiptm2018\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}