{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T22:37:12Z","timestamp":1776119832588,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T00:00:00Z","timestamp":1652140800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T00:00:00Z","timestamp":1652140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100012818","name":"Comunidad de Madrid","doi-asserted-by":"publisher","award":["2018\/TCS-4307"],"award-info":[{"award-number":["2018\/TCS-4307"]}],"id":[{"id":"10.13039\/100012818","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004837","name":"Ministerio de Ciencia e Innovaci\u00f3n","doi-asserted-by":"crossref","award":["PID2020-112584RB-C31"],"award-info":[{"award-number":["PID2020-112584RB-C31"]}],"id":[{"id":"10.13039\/501100004837","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100012818","name":"Comunidad de Madrid","doi-asserted-by":"publisher","award":["APOYO-JOVENES-QINIM8-72-PKGQ0J"],"award-info":[{"award-number":["APOYO-JOVENES-QINIM8-72-PKGQ0J"]}],"id":[{"id":"10.13039\/100012818","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012511","name":"Escuela Polit\u00e9cnica Nacional","doi-asserted-by":"publisher","award":["PII-DETRI-2021-06"],"award-info":[{"award-number":["PII-DETRI-2021-06"]}],"id":[{"id":"10.13039\/501100012511","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2022,9]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>A privacy policy describes the operations an organization carries out on its users\u2019 personal data and how it applies data protection principles. The automated analysis of privacy policies is a multidisciplinary research topic producing a growing but scattered body of knowledge. We address this gap by conducting a systematic mapping study which provides an overview of the field, identifies research opportunities, and suggests future research lines. Our study analyzed 39 papers from the 1097 publications found on the topic, to find what information can be automatically extracted from policies presented as textual documents, what this information is applied to, and what analysis techniques are being used. We observe that the techniques found can identify individual pieces of information from the policies with good results. However, further advances are needed to put them in context and provide valuable insight to end-users, organizations dealing with data protection laws and data protection authorities.<\/jats:p>","DOI":"10.1007\/s00607-022-01076-3","type":"journal-article","created":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T03:38:44Z","timestamp":1652153924000},"page":"2053-2076","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["A systematic mapping study on automated analysis of privacy policies"],"prefix":"10.1007","volume":"104","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6513-0303","authenticated-orcid":false,"given":"Jose M.","family":"Del Alamo","sequence":"first","affiliation":[]},{"given":"Danny S.","family":"Guaman","sequence":"additional","affiliation":[]},{"given":"Boni","family":"Garc\u00eda","sequence":"additional","affiliation":[]},{"given":"Ana","family":"Diez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,10]]},"reference":[{"key":"1076_CR1","doi-asserted-by":"crossref","unstructured":"Morel V, Pardo R (2020) SoK: three facets of privacy policies. In: Workshop on privacy in the electronic society, Virtual, France. https:\/\/hal.inria.fr\/hal-02267641","DOI":"10.1145\/3411497.3420216"},{"key":"1076_CR2","doi-asserted-by":"crossref","unstructured":"Wilson S et al (2016) The creation and analysis of a website privacy policy corpus. In: Proceedings of the 54th annual meeting of the association for computational linguistics, pp 1330\u20131340","DOI":"10.18653\/v1\/P16-1126"},{"key":"1076_CR3","doi-asserted-by":"crossref","unstructured":"Acar G et al (2014) The web never forgets: persistent tracking mechanisms in the wild. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp 674\u2013689","DOI":"10.1145\/2660267.2660347"},{"key":"1076_CR4","unstructured":"Fielding R, Singer D (2019) Tracking preference expression (DNT). W3C note, W3C (January). https:\/\/www.w3.org\/TR\/2019\/NOTE-tracking-dnt-20190117\/"},{"key":"1076_CR5","first-page":"543","volume":"4","author":"AM McDonald","year":"2008","unstructured":"McDonald AM, Cranor LF (2008) The cost of reading privacy policies. Isjlp 4:543","journal-title":"Isjlp"},{"key":"1076_CR6","unstructured":"Regulation GDP (2016) Regulation EU 2016\/679 of the European Parliament and of the Council of 27 April 2016"},{"key":"1076_CR7","doi-asserted-by":"publisher","DOI":"10.1201\/9781420085938","volume-title":"Handbook of natural language processing","author":"N Indurkhya","year":"2010","unstructured":"Indurkhya N, Damerau FJ (2010) Handbook of natural language processing. Chapman & Hall\/CRC, Cambridge"},{"key":"1076_CR8","first-page":"655","volume-title":"Handbook of natural language processing","author":"H Moisl","year":"2000","unstructured":"Moisl H (2000) Nlp based on artificial neural networks: introduction. In: Dale R, Moisl HSH (eds) Handbook of natural language processing. Marcel Dekker, New York, pp 655\u2013713"},{"key":"1076_CR9","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.inffus.2016.10.004","volume":"36","author":"S Sun","year":"2017","unstructured":"Sun S, Luo C, Chen J (2017) A review of natural language processing techniques for opinion mining systems. Inf Fus 36:10\u201325","journal-title":"Inf Fus"},{"key":"1076_CR10","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.jbi.2017.07.012","volume":"73","author":"K Kreimeyer","year":"2017","unstructured":"Kreimeyer K et al (2017) Natural language processing systems for capturing and standardizing unstructured clinical information: a systematic review. J Biomed Inform 73:14\u201329","journal-title":"J Biomed Inform"},{"key":"1076_CR11","doi-asserted-by":"crossref","unstructured":"Nazir F, Butt WH, Anwar MW, Khattak MAK (2017) The applications of natural language processing (NLP) for software requirement engineering-a systematic literature review. In: International conference on information science and applications. Springer, Berlin, pp 485\u2013493","DOI":"10.1007\/978-981-10-4154-9_56"},{"issue":"2","key":"1076_CR12","first-page":"139","volume":"7","author":"Y Kang","year":"2020","unstructured":"Kang Y et al (2020) Natural language processing (NLP) in management research: a literature review. J Manag Anal 7(2):139\u2013172","journal-title":"J Manag Anal"},{"key":"1076_CR13","doi-asserted-by":"publisher","first-page":"74808","DOI":"10.1109\/ACCESS.2020.2988408","volume":"8","author":"DS Guam\u00e1n","year":"2020","unstructured":"Guam\u00e1n DS, Del Alamo JM, Caiza JC (2020) A systematic mapping study on software quality control techniques for assessing privacy in information systems. IEEE Access 8:74808\u201374833","journal-title":"IEEE Access"},{"key":"1076_CR14","doi-asserted-by":"publisher","first-page":"22965","DOI":"10.1109\/ACCESS.2017.2765539","volume":"5","author":"P Murmann","year":"2017","unstructured":"Murmann P, Fischer-H\u00fcbner S (2017) Tools for achieving usable ex post transparency: a survey. IEEE Access 5:22965\u201322991","journal-title":"IEEE Access"},{"key":"1076_CR15","doi-asserted-by":"crossref","unstructured":"Becher S, Gerl A, Meier B (2020) Don\u2019t forget the user: from user preferences to personal privacy policies. In: 10th international conference on advanced computer information technologies. IEEE, pp 774\u2013778","DOI":"10.1109\/ACIT49673.2020.9208810"},{"key":"1076_CR16","doi-asserted-by":"crossref","unstructured":"Kirrane S, Villata S, d\u2019Aquin M (2018) Privacy, security and policies: a review of problems and solutions with semantic web technologies. Semantic Web 9(2):153\u2013161","DOI":"10.3233\/SW-180289"},{"key":"1076_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.infsof.2015.03.007","volume":"64","author":"K Petersen","year":"2015","unstructured":"Petersen K, Vakkalanka S, Kuzniarz L (2015) Guidelines for conducting systematic mapping studies in software engineering: an update. Inf Softw Technol 64:1\u201318","journal-title":"Inf Softw Technol"},{"issue":"1","key":"1076_CR18","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s11192-015-1765-5","volume":"106","author":"P Mongeon","year":"2016","unstructured":"Mongeon P, Paul-Hus A (2016) The journal coverage of web of science and scopus: a comparative analysis. Scientometrics 106(1):213\u2013228","journal-title":"Scientometrics"},{"key":"1076_CR19","doi-asserted-by":"crossref","unstructured":"Wohlin C (2014) Guidelines for snowballing in systematic literature studies and a replication in software engineering. In: Proceedings of the 18th international conference on evaluation and assessment in software engineering, pp 1\u201310","DOI":"10.1145\/2601248.2601268"},{"issue":"3","key":"1076_CR20","first-page":"411","volume":"30","author":"K Krippendorff","year":"2004","unstructured":"Krippendorff K (2004) Reliability in content analysis: some common misconceptions and recommendations. Hum Commun Res 30(3):411\u2013433","journal-title":"Hum Commun Res"},{"key":"1076_CR21","doi-asserted-by":"crossref","unstructured":"Ant\u00f3n AI et al (2007) Hipaa\u2019s effect on web site privacy policies. IEEE Secur Privacy 5(1):45\u201352","DOI":"10.1109\/MSP.2007.7"},{"key":"1076_CR22","doi-asserted-by":"crossref","unstructured":"Slankas J, Xiao X, Williams L, Xie T (2014) Relation extraction for inferring access control rules from natural language artifacts. In: Proceedings of the 30th annual computer security applications conference, pp 366\u2013375","DOI":"10.1145\/2664243.2664280"},{"issue":"3","key":"1076_CR23","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s00766-013-0190-7","volume":"19","author":"TD Breaux","year":"2014","unstructured":"Breaux TD, Hibshi H, Rao A (2014) Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements. Requir Eng 19(3):281\u2013307","journal-title":"Requir Eng"},{"key":"1076_CR24","unstructured":"Cunningham H, Maynard D, Tablan V (1999) Jape: a java annotation patterns engine"},{"key":"1076_CR25","unstructured":"Woodward M (2021) GDPR has inspired different privacy legislations worldwide. https:\/\/securityscorecard.com\/blog\/countries-with-gdpr-like-data-privacy-laws"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-022-01076-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-022-01076-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-022-01076-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T16:06:36Z","timestamp":1661184396000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-022-01076-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,10]]},"references-count":25,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["1076"],"URL":"https:\/\/doi.org\/10.1007\/s00607-022-01076-3","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,10]]},"assertion":[{"value":"12 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 May 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}