{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:07:52Z","timestamp":1776100072401,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T00:00:00Z","timestamp":1503446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,23]]},"DOI":"10.1145\/3106426.3106427","type":"proceedings-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T12:12:36Z","timestamp":1502367156000},"page":"18-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":84,"title":["Large-scale readability analysis of privacy policies"],"prefix":"10.1145","author":[{"given":"Benjamin","family":"Fabian","sequence":"first","affiliation":[{"name":"Hochschule f\u00fcr Telekommunikation, Leipzig, Germany"}]},{"given":"Tatiana","family":"Ermakova","sequence":"additional","affiliation":[{"name":"University of Potsdam, Potsdam, Germany"}]},{"given":"Tino","family":"Lentz","sequence":"additional","affiliation":[{"name":"Humboldt-Universit\u00e4t zu Berlin, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2017,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"TRUSTe http:\/\/www.truste.com\/  TRUSTe http:\/\/www.truste.com\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/dir.20009"},{"key":"e_1_3_2_1_3_1","first-page":"654","volume":"14","author":"Peterson D.","year":"2007","journal-title":"Development"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.019"},{"key":"e_1_3_2_1_6_1","first-page":"642","volume":"51","author":"Graber M.A.","year":"2002","journal-title":"Family Practice"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Sunyaev A. Dehling T. Taylor P.L. Mandl K.D.: Availability and Quality of Mobile Health App Privacy Policies. Journal of the American Medical Informatics Association (2014)  Sunyaev A. Dehling T. Taylor P.L. Mandl K.D.: Availability and Quality of Mobile Health App Privacy Policies. Journal of the American Medical Informatics Association (2014)","DOI":"10.1136\/amiajnl-2013-002605"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272516.1272522"},{"key":"e_1_3_2_1_9_1","first-page":"543","volume":"4","author":"McDonald A.M.","year":"2008","journal-title":"Reading Privacy Policies. ISJLP"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_3"},{"key":"e_1_3_2_1_11_1","unstructured":"Ermakova T. Baumann A. Fabian B. Krasnova H.: Privacy Policies and Users' Trust: Does Reada-bility Matter? In: AMCIS (2014)  Ermakova T. Baumann A. Fabian B. Krasnova H.: Privacy Policies and Users' Trust: Does Reada-bility Matter? In: AMCIS (2014)"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Sultan F. Urban G. L. Shankar V. Bart I. Y.: Determinants and Role of Trust in e-Business: A Large Scale Empirical Study. MIT Sloan School of Management (2002)  Sultan F. Urban G. L. Shankar V. Bart I. Y.: Determinants and Role of Trust in e-Business: A Large Scale Empirical Study. MIT Sloan School of Management (2002)","DOI":"10.2139\/ssrn.380404"},{"key":"e_1_3_2_1_13_1","unstructured":"Bansal G.; Zahedi F.; Gefen D.: The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation. In: ICIS (2008)  Bansal G.; Zahedi F.; Gefen D.: The Moderating Influence of Privacy Concern on the Efficacy of Privacy Assurance Mechanisms for Building Trust: A Multiple-Context Investigation. In: ICIS (2008)"},{"key":"e_1_3_2_1_14_1","unstructured":"Bansal G.; Zahedi F.; Gefen D.: Efficacy of Privacy Assurance Mechanisms in the Context of Disclosing Health Information Online. In: AMCIS (2008)  Bansal G.; Zahedi F.; Gefen D.: Efficacy of Privacy Assurance Mechanisms in the Context of Disclosing Health Information Online. In: AMCIS (2008)"},{"key":"e_1_3_2_1_15_1","first-page":"295","volume":"22","author":"Dinev T.","year":"2013","journal-title":"Information Systems"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208940.2208950"},{"key":"e_1_3_2_1_17_1","unstructured":"Gutwirth S.: Privacy and the Information Age. Rowman & Littlefield (2002)  Gutwirth S.: Privacy and the Information Age. Rowman & Littlefield (2002)"},{"key":"e_1_3_2_1_18_1","unstructured":"Westin A. F.: Privacy and Freedom. Atheneum (1967)  Westin A. F.: Privacy and Freedom. Atheneum (1967)"},{"key":"e_1_3_2_1_19_1","unstructured":"European Parliament and Council: Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data Official Journal 281 31--50 (1995)  European Parliament and Council: Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data Official Journal 281 31--50 (1995)"},{"key":"e_1_3_2_1_20_1","unstructured":"U.S. Department of Health & Human Services: Health Insurance Portability and Accountability Act of 1996 (HIPAA) http:\/\/www.hhs.gov\/ocr\/privacy\/ (1996)  U.S. Department of Health & Human Services: Health Insurance Portability and Accountability Act of 1996 (HIPAA) http:\/\/www.hhs.gov\/ocr\/privacy\/ (1996)"},{"key":"e_1_3_2_1_21_1","unstructured":"Clarke R.: Introduction to Dataveillance and Information Privacy and Definitions of Terms http:\/\/www.rogerclarke.com\/DV\/Intro.html (1999)  Clarke R.: Introduction to Dataveillance and Information Privacy and Definitions of Terms http:\/\/www.rogerclarke.com\/DV\/Intro.html (1999)"},{"key":"e_1_3_2_1_22_1","unstructured":"CNNMoney: Hospital network hacked 4.5 million records stolen http:\/\/money.cnn.com\/2014\/08\/18\/technology\/security\/hospital-chs-hack\/index.html?iid=SF_T_Lead (2014)  CNNMoney: Hospital network hacked 4.5 million records stolen http:\/\/money.cnn.com\/2014\/08\/18\/technology\/security\/hospital-chs-hack\/index.html?iid=SF_T_Lead (2014)"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415100201"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1284621.1284627"},{"key":"e_1_3_2_1_25_1","unstructured":"BusinessDictionary: Definition of Privacy Policy http:\/\/www.businessdictionary.com\/definition\/privacy-policy.html  BusinessDictionary: Definition of Privacy Policy http:\/\/www.businessdictionary.com\/definition\/privacy-policy.html"},{"key":"e_1_3_2_1_26_1","unstructured":"W3C http:\/\/www.w3.org\/P3P\/  W3C http:\/\/www.w3.org\/P3P\/"},{"key":"e_1_3_2_1_27_1","unstructured":"Sadeh N. Acquisti A. Breaux T.D. Cranor L.F. McDonald A.M. Reidenberg J. Smith N.A. Liu F. Russell C. Schaub F. Wilson S. Graves J.T. Leon P.G. Ramanath R. Rao A.: Towards Usable Privacy Policies: Semi-Automatically Extracting Data Practices From Websites' Privacy Policies. In: SOUPS (2014)  Sadeh N. Acquisti A. Breaux T.D. Cranor L.F. McDonald A.M. Reidenberg J. Smith N.A. Liu F. Russell C. Schaub F. Wilson S. Graves J.T. Leon P.G. Ramanath R. Rao A.: Towards Usable Privacy Policies: Semi-Automatically Extracting Data Practices From Websites' Privacy Policies. In: SOUPS (2014)"},{"key":"e_1_3_2_1_28_1","unstructured":"Hunteon Privacy Blog. 10 Steps to Multilayered Privacy Notice https:\/\/www.huntonprivacyblog.com\/wp-content\/files\/2012\/07\/Centre-10-Steps-to-Multilayered-Privacy-Notice.pdf  Hunteon Privacy Blog. 10 Steps to Multilayered Privacy Notice https:\/\/www.huntonprivacyblog.com\/wp-content\/files\/2012\/07\/Centre-10-Steps-to-Multilayered-Privacy-Notice.pdf"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_2_1_30_1","unstructured":"KnowPrivacy http:\/\/www.knowprivacy.org\/ (2009)  KnowPrivacy http:\/\/www.knowprivacy.org\/ (2009)"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456413"},{"key":"e_1_3_2_1_32_1","unstructured":"Feldman L. Turow J. Meltzer K.: Open to Exploitation: American Shoppers Online and Offline. Annenberg Public Policy Center (2005)  Feldman L. Turow J. Meltzer K.: Open to Exploitation: American Shoppers Online and Offline. Annenberg Public Policy Center (2005)"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.01.017"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017327.2017330"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0260"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518752"},{"key":"e_1_3_2_1_38_1","unstructured":"Klare G.R..: Measurement of Readability. Iowa St. (1963)  Klare G.R..: Measurement of Readability. Iowa St. (1963)"},{"key":"e_1_3_2_1_39_1","unstructured":"Harris T.L. Hodges R.E. (Eds.): The Literacy Dictionary: The Vocabulary of Reading and Writing. International Reading Association Newark (1995)  Harris T.L. Hodges R.E. (Eds.): The Literacy Dictionary: The Vocabulary of Reading and Writing. International Reading Association Newark (1995)"},{"key":"e_1_3_2_1_40_1","unstructured":"DuBay W.H.: Smart Language: Readers Readability and the Grading of Text. BookSurge Publishing (2007)  DuBay W.H.: Smart Language: Readers Readability and the Grading of Text. BookSurge Publishing (2007)"},{"key":"e_1_3_2_1_41_1","first-page":"102","volume":"6","author":"Klare G.R.","year":"1974","journal-title":"Assessing Readability. Reading Research Quarterly"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10897-008-9181-0"},{"key":"e_1_3_2_1_43_1","first-page":"496","volume":"49","author":"Anderson J.","year":"1983","journal-title":"Reading"},{"key":"e_1_3_2_1_44_1","first-page":"513","volume":"11","author":"Fry E.","year":"1968","journal-title":"Reading"},{"key":"e_1_3_2_1_45_1","unstructured":"DMOZ http:\/\/dmoz.org  DMOZ http:\/\/dmoz.org"},{"key":"e_1_3_2_1_46_1","unstructured":"Amazon: Alexa Top 1 Million Sites List http:\/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip.  Amazon: Alexa Top 1 Million Sites List http:\/\/s3.amazonaws.com\/alexa-static\/top-1m.csv.zip."},{"key":"e_1_3_2_1_47_1","unstructured":"Crawler4J. Google Code http:\/\/code.google.com\/p\/crawler4j  Crawler4J. Google Code http:\/\/code.google.com\/p\/crawler4j"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v57:13"},{"key":"e_1_3_2_1_49_1","unstructured":"Natural Language Toolkit http:\/\/www.nltk.org  Natural Language Toolkit http:\/\/www.nltk.org"},{"key":"e_1_3_2_1_50_1","first-page":"292","volume":"40","author":"Fitzsimmons P.R.","year":"2010","journal-title":"Edinburgh"},{"key":"e_1_3_2_1_51_1","first-page":"61","volume":"39","author":"Hedman A.S.","year":"2008","journal-title":"Health Education"},{"key":"e_1_3_2_1_52_1","first-page":"7","volume":"1","author":"Ley P.","year":"1996","journal-title":"Medicine"},{"key":"e_1_3_2_1_53_1","unstructured":"ORG Domain http:\/\/pir.org\/domains\/org-domain\/  ORG Domain http:\/\/pir.org\/domains\/org-domain\/"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Dickson-Swift V. James E.L. Liamputtong P.: What is Sensitive Research? Undertaking Sensitive Research in the Health and Social Sciences: Managing Boundaries Emotions and Risks 1--10 (2008)  Dickson-Swift V. James E.L. Liamputtong P.: What is Sensitive Research? Undertaking Sensitive Research in the Health and Social Sciences: Managing Boundaries Emotions and Risks 1--10 (2008)","DOI":"10.1017\/CBO9780511545481"},{"key":"e_1_3_2_1_55_1","unstructured":"Ermakova T. Fabian B. Babina E.: Readability of Privacy Policies of Healthcare Websites in: 12. Internationale Tagung Wirtschaftsinformatik (2015)  Ermakova T. Fabian B. Babina E.: Readability of Privacy Policies of Healthcare Websites in: 12. Internationale Tagung Wirtschaftsinformatik (2015)"},{"key":"e_1_3_2_1_56_1","unstructured":"Hazman M.: A Survey of Focused Crawler Approaches. Journal of Global Research in Computer Science 3 (2012)  Hazman M.: A Survey of Focused Crawler Approaches. Journal of Global Research in Computer Science 3 (2012)"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.4018\/jmhci.2011010104"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447310801937999"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39371-6_8"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985752"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1281243"},{"key":"e_1_3_2_1_62_1","unstructured":"Ant\u00f3n A.I. Earp J.B. Vail. V.W. Jain N. Gheen C. Frink J.M.: An Analysis of Web Site Privacy Policy Evolution in the Presence of HIPAA. IEEE Security & Privacy (2005)  Ant\u00f3n A.I. Earp J.B. Vail. V.W. Jain N. Gheen C. Frink J.M.: An Analysis of Web Site Privacy Policy Evolution in the Presence of HIPAA. IEEE Security & Privacy (2005)"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-010-9228-2"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Grossklags J. Good N.: Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers. Handbook of Financial Cryptography and Security Springer-Verlag (2007)  Grossklags J. Good N.: Empirical Studies on Software Notices to Inform Policy Makers and Usability Designers. Handbook of Financial Cryptography and Security Springer-Verlag (2007)","DOI":"10.1007\/978-3-540-77366-5_31"},{"issue":"12","key":"e_1_3_2_1_66_1","first-page":"123","volume":"7","author":"Jafar M.J.","year":"2009","journal-title":"Economics Research"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"Cadogan R.A.: An Imbalance Of Power: The Readability Of Internet Privacy Policies. Journal Of Business & Economics Research 2 (3) (2010)  Cadogan R.A.: An Imbalance Of Power: The Readability Of Internet Privacy Policies. Journal Of Business & Economics Research 2 (3) (2010)","DOI":"10.19030\/jber.v2i3.2864"},{"key":"e_1_3_2_1_68_1","volume-title":"AAAI Fall Symposium on Privacy and Language Technologies (2016)","author":"Sathyendra K.M."},{"key":"e_1_3_2_1_69_1","volume-title":"N.: Analyzing Vocabulary Intersections of Expert Annotations and Topic Models for Data Practices in Privacy Policies. AAAI Fall Symposium on Privacy and Language Technologies (2016)","author":"Liu F."},{"key":"e_1_3_2_1_70_1","volume-title":"N.: Demystifying Privacy Policies Using Language Technologies: Progress and Challenges. TA-COS '16: LREC Workshop on Text Analytics for Cybersecurity and Online Safety (2016)","author":"Wilson S."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2907942"},{"key":"e_1_3_2_1_72_1","volume-title":"Symposium on Usable Privacy and Security (2016)","author":"Cherivirala S.K."},{"key":"e_1_3_2_1_73_1","volume-title":"Sadeh, N.: The Creation and Analysis of a Website Privacy Policy Corpus. Annual Meeting of the Association for Computational Linguistics (2016)","author":"Wilson S."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.75"},{"key":"e_1_3_2_1_75_1","volume-title":"Symposium on Usable Privacy and Security (2015)","author":"Schaub F."},{"key":"e_1_3_2_1_76_1","volume-title":"Implications of Length and Framing on the Effectiveness of Privacy Notices. Symposium on Usable Privacy and Security (2016)","author":"Gluck J."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"crossref","unstructured":"Oglaza A. Zarate P. Laborde R.: KAPUER: A Decision Support System for Privacy Policies Specification. Annals of Data Science 1 (369) (2014)  Oglaza A. Zarate P. Laborde R.: KAPUER: A Decision Support System for Privacy Policies Specification. Annals of Data Science 1 (369) (2014)","DOI":"10.1007\/s40745-014-0027-3"},{"issue":"1","key":"e_1_3_2_1_78_1","first-page":"39","volume":"30","author":"Reidenberg J.R.","year":"2015","journal-title":"Understanding. Berkeley Technology Law Journal"},{"key":"e_1_3_2_1_79_1","volume-title":"B.: Exploring the Impact of Readability of Privacy Policies on Users' Trust. European Conference on Information Systems (2016)","author":"Ermakova T."}],"event":{"name":"WI '17: International Conference on Web Intelligence 2017","location":"Leipzig Germany","acronym":"WI '17","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","TCII IEEE Computer Society Technical Committee on Intelligent Informatics","Web Intelligence Consortium"]},"container-title":["Proceedings of the International Conference on Web Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106426.3106427","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106426.3106427","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:17Z","timestamp":1750217417000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106426.3106427"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,23]]},"references-count":78,"alternative-id":["10.1145\/3106426.3106427","10.1145\/3106426"],"URL":"https:\/\/doi.org\/10.1145\/3106426.3106427","relation":{},"subject":[],"published":{"date-parts":[[2017,8,23]]},"assertion":[{"value":"2017-08-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}