{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:08:13Z","timestamp":1729613293469,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/icdim.2016.7829792","type":"proceedings-article","created":{"date-parts":[[2017,1,26]],"date-time":"2017-01-26T23:00:05Z","timestamp":1485471605000},"page":"127-132","source":"Crossref","is-referenced-by-count":7,"title":["Extracting keyword and keyphrase from online privacy policies"],"prefix":"10.1109","author":[{"given":"Dhiren A.","family":"Audich","sequence":"first","affiliation":[]},{"given":"Rozita","family":"Dara","sequence":"additional","affiliation":[]},{"given":"Blair","family":"Nonnecke","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526798"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20790"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1108\/eb046814"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.10.007"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1108\/eb026526"},{"article-title":"Coherent keyphrase extraction via web mining","year":"2003","author":"turney","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1119"},{"key":"ref36","article-title":"D&#x00E9;couverte locale des mots vides dans des corpus bruts de langues inconnues, sans aucune ressource","volume":"7","author":"vergne","year":"2004","journal-title":"JADT 9es Journ&#x00E9;es internationales d'Analyse statistique des Donn&#x00E9;es Textuelles"},{"key":"ref35","first-page":"35","article-title":"Probabilistic models of indexing and searching","author":"robertson","year":"1980","journal-title":"Proceedings of the 3rd annual ACM conference on Researchand development in information retrieval"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(88)90021-0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/dir.20009"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985752"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2006.08.006"},{"year":"2006","key":"ref14","article-title":"Ten steps to develop a multilayered privacy notice"},{"article-title":"Best practices in drafting plain-language and layered privacy policies","year":"2012","author":"munur","key":"ref15"},{"key":"ref16","article-title":"A p3p preference exchange language 1.0 (appell. 0)","volume":"15","author":"cranor","year":"2002","journal-title":"W3C Working Draft"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1253568"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9204-1"},{"year":"2016","key":"ref19","article-title":"Terms of service; didn't read (tos;dr)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10506-015-9168-8"},{"key":"ref4","first-page":"7","article-title":"Privacy and freedom, atheneum","author":"westin","year":"1967","journal-title":"New York"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10888-9_7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21521-6_11"},{"year":"2016","key":"ref6","article-title":"Regulation (eu) 2016\/679 of the european parliament and of the council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/ec (general data protection regulation)"},{"key":"ref29","first-page":"109","article-title":"Okapi at trec-3","volume":"109","author":"robertson","year":"1995","journal-title":"NIST SPECIAL PUBLICATION SP"},{"year":"2000","key":"ref5","article-title":"Privacy online: Fair information practices in the electronic marketplace"},{"year":"2015","key":"ref8","article-title":"Digital privacy act"},{"year":"2000","key":"ref7","article-title":"Personal information protection and electronic documents act"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355120"},{"key":"ref9","first-page":"543","article-title":"Cost of reading privacy policies, the","volume":"4","author":"mcdonald","year":"2008","journal-title":"ISJLP"},{"key":"ref1","article-title":"Are They Worth Reading? An In-Depth Analysis of Online Trackers Privacy Policies","author":"cranor","year":"2014","journal-title":"I\/S A Journal of law and Policy for the Information Society"},{"key":"ref20","first-page":"1","article-title":"Privee: An architecture for automatically analyzing web privacy policies","author":"zimmeck","year":"2014","journal-title":"23rd USENIX Security Symposium (USENIX Security 14)"},{"key":"ref22","first-page":"53","article-title":"The State of the Art in Ontology Design","volume":"18","author":"noy","year":"1997","journal-title":"Al Magazine"},{"article-title":"The usable privacy policy project: Combining crowdsourcing, machine learning and natural language processing to semi-automatically answer those privacy questions users care about","year":"2013","author":"sadeh","key":"ref21"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/11428817_21","article-title":"Text2onto","author":"cimiano","year":"2005","journal-title":"Natural Language Processing and Information Systems"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/505168.505194"},{"key":"ref26","article-title":"Textrank: Bringing order into texts","author":"mihalcea","year":"2004","journal-title":"Association for Computational Linguistics"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/9780470689646.ch1"}],"event":{"name":"2016 Eleventh International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2016,9,19]]},"location":"Porto, Portugal","end":{"date-parts":[[2016,9,21]]}},"container-title":["2016 Eleventh International Conference on Digital Information Management (ICDIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7813523\/7829753\/07829792.pdf?arnumber=7829792","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T00:56:16Z","timestamp":1568768176000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7829792\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/icdim.2016.7829792","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}