{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:33:22Z","timestamp":1778603602287,"version":"3.51.4"},"reference-count":43,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2018,8,7]],"date-time":"2018-08-07T00:00:00Z","timestamp":1533600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"State of Texas IDWise Project"},{"name":"Center for Identity's Strategic Partners"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2018,11,30]]},"abstract":"<jats:p>\n            Prior research shows that only a tiny percentage of users actually read the online privacy policies they implicitly agree to while using a website. Prior research also suggests that users ignore privacy policies because these policies are lengthy and, on average, require 2 years of college education to comprehend. We propose a novel technique that tackles this problem by automatically extracting summaries of online privacy policies. We use data mining models to analyze the text of privacy policies and answer 10 basic questions concerning the privacy and security of user data, what information is gathered from them, and how this information is used. In order to train the data mining models, we thoroughly study privacy policies of 400 companies (considering 10% of all listings on NYSE, Nasdaq, and AMEX stock markets) across industries. Our free Chrome browser extension, PrivacyCheck, utilizes the data mining models to summarize any HTML page that contains a privacy policy. PrivacyCheck stands out from currently available counterparts because it is readily applicable on\n            <jats:italic>any<\/jats:italic>\n            online privacy policy. Cross-validation results show that PrivacyCheck summaries are accurate 40% to 73% of the time. Over 400 independent Chrome users are currently using PrivacyCheck.\n          <\/jats:p>","DOI":"10.1145\/3127519","type":"journal-article","created":{"date-parts":[[2018,8,8]],"date-time":"2018-08-08T19:14:21Z","timestamp":1533755661000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":85,"title":["PrivacyCheck"],"prefix":"10.1145","volume":"18","author":[{"given":"Razieh Nokhbeh","family":"Zaeem","sequence":"first","affiliation":[{"name":"University of Texas at Austin"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rachel L.","family":"German","sequence":"additional","affiliation":[{"name":"University of Texas at Austin"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"K. Suzanne","family":"Barber","sequence":"additional","affiliation":[{"name":"University of Texas at Austin"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2018,8,7]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1257\/jel.54.2.442"},{"key":"e_1_2_2_2_1","volume-title":"Adblock Plus Surf the web without annoying ads&excl","year":"2015"},{"key":"e_1_2_2_3_1","volume-title":"Smith","author":"Ammar Waleed","year":"2012"},{"key":"e_1_2_2_4_1","volume-title":"Retrieved","author":"T.","year":"2002"},{"key":"e_1_2_2_5_1","volume-title":"Retrieved","year":"2015"},{"key":"e_1_2_2_6_1","volume-title":"P3P policy usage statistics. Retrieved","year":"2015"},{"key":"e_1_2_2_7_1","volume-title":"Towards usable privacy policy display and management. Information Management 8 Computer Security 20, 1","author":"Clarke Nathan","year":"2012"},{"key":"e_1_2_2_8_1","first-page":"273","article-title":"Necessary but not sufficient: Standardized mechanisms for privacy notice and choice","volume":"10","author":"Cranor Lorrie Faith","year":"2012","journal-title":"Journal on Telecommunications 8 High Technology Law"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165734.1165735"},{"key":"e_1_2_2_10_1","unstructured":"Lorrie Cranor Marc Langheinrich Massimo Marchiori Martin Presler-Marshall and Joseph Reagle. 2006b. The Platform for Privacy Preferences 1.1 (P3P1.1) Specification.  Lorrie Cranor Marc Langheinrich Massimo Marchiori Martin Presler-Marshall and Joseph Reagle. 2006b. The Platform for Privacy Preferences 1.1 (P3P1.1) Specification."},{"key":"e_1_2_2_11_1","volume-title":"Truste market share in the Alexa top 1M. Retrieved","year":"2015"},{"key":"e_1_2_2_12_1","volume-title":"20th Americas Conference on Information Systems (AMCIS\u201914)","author":"Ermakova Tatiana","year":"2014"},{"key":"e_1_2_2_13_1","volume-title":"Retrieved","author":"FTC.","year":"2000"},{"key":"e_1_2_2_14_1","volume-title":"Retrieved","author":"FTC.","year":"2010"},{"key":"e_1_2_2_15_1","volume-title":"Retrieved","author":"FTC.","year":"2012"},{"key":"e_1_2_2_16_1","volume-title":"Join over 40 million Ghostery users and download the web\u2019s most popular privacy tool. Retrieved","year":"2015"},{"key":"e_1_2_2_17_1","volume-title":"Google Prediction API v 1.6. Retrieved","year":"2015"},{"key":"e_1_2_2_18_1","volume-title":"Retrieved","year":"2014"},{"key":"e_1_2_2_19_1","first-page":"642","article-title":"Reading level of privacy policies on internet health web sites","volume":"51","author":"Graber Mark A.","year":"2002","journal-title":"Journal of Family Practice"},{"key":"e_1_2_2_20_1","volume-title":"Industry Classification Benchmark (ICB): A single standard defining the market. Retrieved","author":"ICB.","year":"2015"},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753561"},{"key":"e_1_2_2_23_1","volume-title":"The Adaptive Web","author":"Kobsa Alfred"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502518"},{"key":"e_1_2_2_25_1","first-page":"543","article-title":"The cost of reading privacy policies","volume":"4","author":"McDonald Aleecia M.","year":"2008","journal-title":"I\/S: A Journal of Law and Policy for the Information Society"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.4018\/jeco.2006010101"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/dir.20009"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.25.2.238"},{"key":"e_1_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Nasdaq. 2015. Nasdaq. Retrieved September 3 2015 from http:\/\/www.nasdaq.com.  Nasdaq. 2015. Nasdaq. Retrieved September 3 2015 from http:\/\/www.nasdaq.com.","DOI":"10.1016\/S1365-6937(15)30105-2"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456413"},{"key":"e_1_2_2_31_1","unstructured":"Having Regard. 1980. Recommendation of the council concerning guidelines governing the protection of privacy and transborder flows of personal data.  Having Regard. 1980. Recommendation of the council concerning guidelines governing the protection of privacy and transborder flows of personal data."},{"key":"e_1_2_2_32_1","volume-title":"Retrieved","author":"Me Disconnect","year":"2014"},{"key":"e_1_2_2_33_1","volume-title":"Retrieved","author":"Privacy Usable","year":"2016"},{"key":"e_1_2_2_34_1","volume-title":"Retrieved","author":"UT","year":"2015"},{"key":"e_1_2_2_35_1","volume-title":"Aleecia M. McDonald, Joel R. Reidenberg, Noah A. Smith, Fei Liu, N. Cameron Russell, Florian Schaub, and Shomir Wilson.","author":"Sadeh Norman","year":"2013"},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.09.038"},{"key":"e_1_2_2_37_1","volume-title":"Terms of Service","author":"DR.","year":"2015"},{"key":"e_1_2_2_38_1","unstructured":"TRUSTe. 2015. TRUSTe. Retrieved March 4 2015 from http:\/\/www.truste.com.  TRUSTe. 2015. TRUSTe. Retrieved March 4 2015 from http:\/\/www.truste.com."},{"key":"e_1_2_2_39_1","volume-title":"LREC Workshop on Text Analytics for Cybersecurity and Online Safety (TA-COS\u201916)","author":"Wilson Shomir","year":"2016"},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1126"},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883035"},{"key":"e_1_2_2_42_1","volume-title":"Retrieved","author":"Zimmeck Sebastian","year":"2014"},{"key":"e_1_2_2_43_1","volume-title":"23rd USENIX Security Symposium (USENIX Security\u201914)","author":"Zimmeck Sebastian"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3127519","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3127519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:29Z","timestamp":1750217429000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3127519"}},"subtitle":["Automatic Summarization of Privacy Policies Using Data Mining"],"short-title":[],"issued":{"date-parts":[[2018,8,7]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,11,30]]}},"alternative-id":["10.1145\/3127519"],"URL":"https:\/\/doi.org\/10.1145\/3127519","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,7]]},"assertion":[{"value":"2016-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-08-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}