{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:23:43Z","timestamp":1725704623500},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,30]]},"DOI":"10.1109\/besc59560.2023.10386763","type":"proceedings-article","created":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T18:21:56Z","timestamp":1705515716000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Feasibility of Structured, Machine-Readable Privacy Notices"],"prefix":"10.1109","author":[{"given":"Vitor","family":"Jesus","sequence":"first","affiliation":[{"name":"Aston University,Birmingham,UK"}]},{"given":"Asma","family":"Patel","sequence":"additional","affiliation":[{"name":"Aston University,Birmingham,UK"}]},{"given":"Deepak","family":"Kumar","sequence":"additional","affiliation":[{"name":"Aston University,Birmingham,UK"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1080\/1369118X.2018.1486870"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/ACCESS.2022.3157850"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/EuroSPW54576.2021.00035"},{"article-title":"Right to be informed","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/ACCESS.2020.2970270"},{"year":"2022","article-title":"Data privacy vocabulary (dpv) version 1","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.17487\/rfc8615"},{"year":"2001","author":"Anthony","article-title":"The case for standardization of privacy policy formats","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/3184558.3186969"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/MIC.2017.75"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/CyberSA.2018.8551442"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.18653\/v1\/p16-1126"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.18653\/v1\/2021.acl-long.532"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/3422337.3447827"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/3106426.3106427"},{"year":"2019","article-title":"We read 150 privacy policies. they were an incomprehensible disaster","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/MIC.2017.75"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/3411497.3420216"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/3502288"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.3233\/FAIA200851"},{"volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)","author":"Knijnenburg","article-title":"Comics as a medium for privacy notices","key":"ref21"},{"article-title":"What methods can we use to provide privacy information?","key":"ref22"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/3411497.3420221"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/MSEC.2021.3132398"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.25148\/lawrev.17.2.4"},{"key":"ref26","first-page":"531","article-title":"Polisis: Automated analysis and presentation of privacy policies using deep learning","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Harkous"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1108\/ICS-06-2021-0080"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/2362499.2362511"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/PST.2012.6297943"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/EuroSPW55150.2022.00029"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/POLICY.2007.39"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1007\/978-3-030-31095-0_3"},{"volume-title":"Workshop on Usable IT Security Management (USM 07): Proceedings of the 3rd Symposium on Usable Privacy and Security","author":"Kumaraguru","article-title":"A survey of privacy policy languages","key":"ref33"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1007\/978-3-662-57932-9_2"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1145\/3442188.3445925"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1007\/978-3-030-27813-7_4"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.3233\/SW-170283"},{"year":"2013","article-title":"Sparql 1.1 overview","key":"ref38"},{"key":"ref39","first-page":"29","article-title":"An ontology design pattern for describing personal data in privacy policies","volume-title":"WOP@ ISWC","author":"Pandit"},{"year":"2013","article-title":"Data privacy vocabulary (dpv), version 1","key":"ref40"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1007\/978-3-030-64330-0_15"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1007\/978-3-030-03667-6_17"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1145\/3463676.3485608"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.2478\/popets-2021-0019"},{"volume-title":"Proceedings of the PAL: Privacy-Enhancing Artificial Intelligence and Language Technologies","author":"Ravichander","article-title":"Challenges in automated question answering for privacy policies","key":"ref45"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.2139\/ssrn.3208596"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1145\/3184558.3186969"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.17487\/rfc9116"},{"year":"2023","article-title":"Iso\/iec ts 27560 - privacy technologies \u2014 consent record information structure","key":"ref49"}],"event":{"name":"2023 10th International Conference on Behavioural and Social Computing (BESC)","start":{"date-parts":[[2023,10,30]]},"location":"Larnaca, Cyprus","end":{"date-parts":[[2023,11,1]]}},"container-title":["2023 10th International Conference on Behavioural and Social Computing (BESC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10385235\/10386086\/10386763.pdf?arnumber=10386763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T18:12:41Z","timestamp":1705687961000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10386763\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,30]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/besc59560.2023.10386763","relation":{},"subject":[],"published":{"date-parts":[[2023,10,30]]}}}