{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T22:13:31Z","timestamp":1730240011518,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T00:00:00Z","timestamp":1721865600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T00:00:00Z","timestamp":1721865600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,25]]},"DOI":"10.1109\/icecet61485.2024.10698132","type":"proceedings-article","created":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T17:33:15Z","timestamp":1728408795000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Policy Peek: Privacy Policy Automatic Analysis Tool"],"prefix":"10.1109","author":[{"given":"Majed","family":"Alghoul","sequence":"first","affiliation":[{"name":"Birzeit University,Department of Computer Science,Ramallah,Palestine"}]},{"given":"Mousa","family":"Moutan","sequence":"additional","affiliation":[{"name":"Birzeit University,Department of Computer Science,Ramallah,Palestine"}]},{"given":"Nabeel","family":"Kastro","sequence":"additional","affiliation":[{"name":"Birzeit University,Department of Computer Science,Ramallah,Palestine"}]},{"given":"Abdallah","family":"Karakra","sequence":"additional","affiliation":[{"name":"Birzeit University,Department of Computer Science,Ramallah,Palestine"}]},{"given":"Hafez","family":"Barghouthi","sequence":"additional","affiliation":[{"name":"Birzeit University,Department of Computer Science,Ramallah,Palestine"}]},{"given":"Murad","family":"Njoum","sequence":"additional","affiliation":[{"name":"Birzeit University,Department of Computer Science,Ramallah,Palestine"}]},{"given":"Ruba","family":"Awadallah","sequence":"additional","affiliation":[{"name":"Birzeit University,Department of Computer Science,Ramallah,Palestine"}]}],"member":"263","reference":[{"key":"ref1","article-title":"PRIVACY AND FREEDOM","volume-title":"By A. Westin. New York:Atheneum Publishers","author":"WsrN","year":"1967"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-5326-8.ch001"},{"key":"ref3","article-title":"What is the data protection directive? The predecessor to the GDPR","author":"Lord","year":"2018","journal-title":"Digital Guardian"},{"key":"ref4","first-page":"1","article-title":"Platform for privacy preferences (p3p)","volume-title":"Encyclopedia of Cryptography, Security and Privacy","author":"Cranor","year":"2022"},{"journal-title":"The platform for privacy preferences 1.0 (P3P1.0) specification","year":"2002","author":"Consortium","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01820-6"},{"journal-title":"Understanding EU data protection policy","year":"2020","author":"VORONOVA","key":"ref7"},{"journal-title":"An Overview of Algorithmic Bias in Artificial Intelligence","year":"2021","author":"Kartha","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2017.05.015"},{"key":"ref10","first-page":"93","article-title":"An Americans Guide to the GDPR","volume":"98","author":"Jones","year":"2020","journal-title":"Denv. L. Rev."},{"article-title":"Right to be informed","year":"2024","author":"Office","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_20"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1486870"},{"key":"ref14","first-page":"1","article-title":"Privee: An architecture for automatically analyzing web privacy policies","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Zimmeck"},{"key":"ref15","first-page":"531","article-title":"Polisis: Automated analysis and presentation of privacy policies using deep learning","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Harkous"},{"article-title":"{PriBots}: Conversational privacy with chatbots","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016),2016","author":"Harkous","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3502184"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3502184"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3127519"},{"article-title":"(n.d.). GitHub - Pushpit07\/PrivacyChecker: Privacy Checker is a Google Chrome extension that automatically summarizes and lists out the suspicious points in a websites privacy and cookie policies","volume-title":"GitHub","author":"Bhardwaj","key":"ref20"},{"volume-title":"Helps you navigate the complex world of online privacy. (n.d.)","author":"Se","key":"ref21"}],"event":{"name":"2024 International Conference on Electrical, Computer and Energy Technologies (ICECET)","start":{"date-parts":[[2024,7,25]]},"location":"Sydney, Australia","end":{"date-parts":[[2024,7,27]]}},"container-title":["2024 International Conference on Electrical, Computer and Energy Technologies (ICECET"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10697983\/10697986\/10698132.pdf?arnumber=10698132","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T05:52:44Z","timestamp":1728453164000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10698132\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,25]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icecet61485.2024.10698132","relation":{},"subject":[],"published":{"date-parts":[[2024,7,25]]}}}