{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T20:13:53Z","timestamp":1767903233246,"version":"3.49.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T00:00:00Z","timestamp":1723680000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T00:00:00Z","timestamp":1723680000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,15]]},"DOI":"10.1109\/mapr63514.2024.10660854","type":"proceedings-article","created":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T18:23:27Z","timestamp":1725992607000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["User Privacy Risk Analysis within Website Privacy Policies"],"prefix":"10.1109","author":[{"given":"Thi-Huong-Giang","family":"Vu","sequence":"first","affiliation":[{"name":"Hanoi University of Science and Technology,School of Information and Communication Technology,Hanoi,Vietnam"}]},{"given":"Xuan-Bach","family":"Hoang","sequence":"additional","affiliation":[{"name":"Hanoi University of Science and Technology,School of Information and Communication Technology,Hanoi,Vietnam"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1163\/187529881x00209"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1163\/9789047403579_005"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4324\/9780429455247-3"},{"key":"ref4","article-title":"Law on Amendments to the Criminal Code No. 100\/2015\/QH13","year":"2017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5040\/9781526505897"},{"key":"ref6","article-title":"Law on Information Technology","year":"2006"},{"key":"ref7","article-title":"Law on Protection of Consumers Rights","year":"2023"},{"key":"ref8","article-title":"Law on Cyber Information Security","year":"2015"},{"key":"ref9","article-title":"Decree on Protection of Personal Data","year":"2023"},{"key":"ref10","article-title":"Decree on E-commerce","year":"2013"},{"issue":"7","key":"ref11","first-page":"642","article-title":"Reading level of privacy policies on Internet health Web sites","volume":"51","author":"Graber","year":"2002","journal-title":"The Journal of family practice"},{"key":"ref12","article-title":"Llama 2: open source, free for research and commercial use","volume-title":"Meta"},{"key":"ref13","article-title":"Mistral 7B the best 7B model to date, Apache 2.0","author":"Ai"},{"key":"ref14","article-title":"General data protection regulation (GDPR)","author":"Union","year":"2016"},{"key":"ref15","article-title":"Singapore Personal Data Protection Act","year":"2012"},{"key":"ref16","article-title":"Detecting compliance of privacy policies with data protection laws","author":"Qamar","year":"2021"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179395"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3502184"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/PST55820.2022.9851983"},{"key":"ref20","article-title":"Towards the exploitation of LLM-based chatbot for providing legal support to Palestinian cooperatives","author":"Qasem","year":"2023"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-5834-4_13"},{"key":"ref22","article-title":"Build with the Google Gemini API and Gemma open models","volume-title":"Google AI for Developers"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6894-4"},{"key":"ref24","first-page":"257","article-title":"BM25","author":"Amati","year":"2009"},{"key":"ref25","article-title":"QLoRA: Efficient finetuning of quantized LLMs","author":"Dettmers","year":"2023"},{"key":"ref26","article-title":"Huggingface\u2019s transformers: State-of-the-art natural language processing","author":"Wolf","year":"2020"},{"key":"ref27","article-title":"Scrapy 2.11 documentation","volume-title":"Zyte"},{"key":"ref28","article-title":"selenium 4.22.0","volume-title":"PyPI"},{"key":"ref29","article-title":"LangChain 0.2","volume-title":"LangChain"},{"key":"ref30","article-title":"vbd-llama2-7B-50b-chat","volume-title":"Hugging Face","year":"2023"},{"key":"ref31","article-title":"vietnamese-llama2-7b-120gb","volume-title":"Hugging Face","year":"2023"},{"key":"ref32","article-title":"Kaggle: Your machine learning and data science community","volume-title":"Kaggle"},{"key":"ref33","article-title":"Wandb","volume-title":"Weights & Biases"},{"key":"ref34","article-title":"Vietnamese legal dataset","volume-title":"Kaggle","author":"Buu","year":"2023"},{"key":"ref35","article-title":"Security privacy","volume-title":"Thanh Nien"}],"event":{"name":"2024 International Conference on Multimedia Analysis and Pattern Recognition (MAPR)","location":"Da Nang, Vietnam","start":{"date-parts":[[2024,8,15]]},"end":{"date-parts":[[2024,8,16]]}},"container-title":["2024 International Conference on Multimedia Analysis and Pattern Recognition (MAPR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10660665\/10660652\/10660854.pdf?arnumber=10660854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T05:34:24Z","timestamp":1726032864000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10660854\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,15]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/mapr63514.2024.10660854","relation":{},"subject":[],"published":{"date-parts":[[2024,8,15]]}}}