{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T00:46:22Z","timestamp":1776127582047,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T00:00:00Z","timestamp":1603065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,19]]},"DOI":"10.1145\/3340531.3417469","type":"proceedings-article","created":{"date-parts":[[2020,10,19]],"date-time":"2020-10-19T05:31:05Z","timestamp":1603085465000},"page":"3441-3444","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["PrivacyCheck v2"],"prefix":"10.1145","author":[{"given":"Razieh","family":"Nokhbeh Zaeem","sequence":"first","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"given":"Safa","family":"Anya","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"given":"Alex","family":"Issa","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"given":"Jake","family":"Nimergood","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"given":"Isabelle","family":"Rogers","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"given":"Vinay","family":"Shah","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"given":"Ayush","family":"Srivastava","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"given":"K. Suzanne","family":"Barber","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,10,19]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"28th USENIX Security Symposium. 585--602","author":"Andow Benjamin","year":"2019","unstructured":"Benjamin Andow , Samin Yaseer Mahmud , Wenyu Wang , Justin Whitaker , William Enck , Bradley Reaves , Kapil Singh , and Tao Xie . 2019 . Policylint: investigating internal privacy policy contradictions on Google play . In 28th USENIX Security Symposium. 585--602 . Benjamin Andow, Samin Yaseer Mahmud, Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Tao Xie. 2019. Policylint: investigating internal privacy policy contradictions on Google play. In 28th USENIX Security Symposium. 585--602."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106426.3106427"},{"key":"e_1_3_2_2_3_1","unstructured":"FTC. 2000. Privacy Online: Fair Information Practices in the Electronic Marketplace: A Federal Trade Commission Report to Congress. https:\/\/www.ftc.gov\/reports\/privacy-online-fair-information-practices-electronic-marketplace-federal-trade-commission  FTC. 2000. Privacy Online: Fair Information Practices in the Electronic Marketplace: A Federal Trade Commission Report to Congress. https:\/\/www.ftc.gov\/reports\/privacy-online-fair-information-practices-electronic-marketplace-federal-trade-commission"},{"key":"e_1_3_2_2_4_1","first-page":"642","article-title":"Reading level of privacy policies on internet health web sites","volume":"51","author":"Graber Mark A","year":"2002","unstructured":"Mark A Graber , Donna M D Alessandro , and Jill Johnson-West . 2002 . Reading level of privacy policies on internet health web sites . Journal of Family Practice , Vol. 51 , 7 (2002), 642 -- 642 . Mark A Graber, Donna M D Alessandro, and Jill Johnson-West. 2002. Reading level of privacy policies on internet health web sites. Journal of Family Practice, Vol. 51, 7 (2002), 642--642.","journal-title":"Journal of Family Practice"},{"key":"e_1_3_2_2_5_1","volume-title":"27th USENIX Security Symposium. 531--548","author":"Harkous Hamza","year":"2018","unstructured":"Hamza Harkous , Kassem Fawaz , R\u00e9mi Lebret , Florian Schaub , Kang G Shin , and Karl Aberer . 2018 . Polisis: Automated analysis and presentation of privacy policies using deep learning . In 27th USENIX Security Symposium. 531--548 . Hamza Harkous, Kassem Fawaz, R\u00e9mi Lebret, Florian Schaub, Kang G Shin, and Karl Aberer. 2018. Polisis: Automated analysis and presentation of privacy policies using deep learning. In 27th USENIX Security Symposium. 531--548."},{"key":"e_1_3_2_2_6_1","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS)","author":"Harkous Hamza","year":"2016","unstructured":"Hamza Harkous , Kassem Fawaz , Kang G Shin , and Karl Aberer . 2016 . Pribots: Conversational privacy with chatbots . In Twelfth Symposium on Usable Privacy and Security (SOUPS) 2016. Hamza Harkous, Kassem Fawaz, Kang G Shin, and Karl Aberer. 2016. Pribots: Conversational privacy with chatbots. In Twelfth Symposium on Usable Privacy and Security (SOUPS) 2016."},{"key":"e_1_3_2_2_7_1","first-page":"543","article-title":"the Cost of reading privacy policies","volume":"4","author":"McDonald Aleecia M","year":"2008","unstructured":"Aleecia M McDonald and Lorrie Faith Cranor . 2008 . the Cost of reading privacy policies . I\/S: A Journal of Law and Policy for the Information Society , Vol. 4 (2008), 543 . Aleecia M McDonald and Lorrie Faith Cranor. 2008. the Cost of reading privacy policies. I\/S: A Journal of Law and Policy for the Information Society, Vol. 4 (2008), 543.","journal-title":"I\/S: A Journal of Law and Policy for the Information Society"},{"key":"e_1_3_2_2_8_1","volume-title":"An Assessment of Blockchain Identity Solutions: Minimizing Risk and Liability of Authentication. In 2019 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI). 26--33","author":"Rana Rima","year":"2019","unstructured":"Rima Rana , Razieh Nokhbeh Zaeem , and K Suzanne Barber . 2019 . An Assessment of Blockchain Identity Solutions: Minimizing Risk and Liability of Authentication. In 2019 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI). 26--33 . Rima Rana, Razieh Nokhbeh Zaeem, and K Suzanne Barber. 2019. An Assessment of Blockchain Identity Solutions: Minimizing Risk and Liability of Authentication. In 2019 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI). 26--33."},{"key":"e_1_3_2_2_9_1","unstructured":"Having Regard. 1980. Recommendation of the Council concerning Guidelines governing the Protection of Privacy and Transborder Flows of Personal Data. (1980).  Having Regard. 1980. Recommendation of the Council concerning Guidelines governing the Protection of Privacy and Transborder Flows of Personal Data. (1980)."},{"key":"e_1_3_2_2_10_1","volume-title":"Firoz Mahmud, and Md Jamil-Ur Rahman.","author":"Shawon Ashadullah","year":"2018","unstructured":"Ashadullah Shawon , Syed Tauhid Zuhori , Firoz Mahmud, and Md Jamil-Ur Rahman. 2018 . Website Classification Using Word Based Multiple N-Gram Models and Random Search Oriented Feature Parameters. In 2018 21st International Conference of Computer and Information Technology (ICCIT). IEEE , 1--6. Ashadullah Shawon, Syed Tauhid Zuhori, Firoz Mahmud, and Md Jamil-Ur Rahman. 2018. Website Classification Using Word Based Multiple N-Gram Models and Random Search Oriented Feature Parameters. In 2018 21st International Conference of Computer and Information Technology (ICCIT). IEEE, 1--6."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180445.3180447"},{"key":"e_1_3_2_2_12_1","volume-title":"Terms of Service","author":"DR.","unstructured":"ToS; DR. 2012. Terms of Service ; Didn't Read . https:\/\/tosdr.org ToS;DR. 2012. Terms of Service; Didn't Read. https:\/\/tosdr.org"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1126"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883035"},{"key":"e_1_3_2_2_15_1","first-page":"169","article-title":"A study of web privacy policies across industries","volume":"13","author":"Zaeem Razieh Nokhbeh","year":"2017","unstructured":"Razieh Nokhbeh Zaeem and K Suzanne Barber . 2017 . A study of web privacy policies across industries . Journal of Information Privacy and Security , Vol. 13 , 4 (2017), 169 -- 185 . Razieh Nokhbeh Zaeem and K Suzanne Barber. 2017. A study of web privacy policies across industries. Journal of Information Privacy and Security, Vol. 13, 4 (2017), 169--185.","journal-title":"Journal of Information Privacy and Security"},{"key":"e_1_3_2_2_16_1","volume-title":"The Effect of the GDPR on Privacy Policies: Recent Progress and Future Promise. ACM Transactions on Management of Information Systems","author":"Zaeem Razieh Nokhbeh","year":"2020","unstructured":"Razieh Nokhbeh Zaeem and K Suzanne Barber . 2020. The Effect of the GDPR on Privacy Policies: Recent Progress and Future Promise. ACM Transactions on Management of Information Systems ( 2020 ). Razieh Nokhbeh Zaeem and K Suzanne Barber. 2020. The Effect of the GDPR on Privacy Policies: Recent Progress and Future Promise. ACM Transactions on Management of Information Systems (2020)."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2016.7815701"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3127519"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2016.014"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.002"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1111\/joca.12191"},{"key":"e_1_3_2_2_22_1","volume-title":"Privee: An Architecture for Automatically Analyzing Web Privacy Policies. In 23rd USENIX Security Symposium. USENIX Association","author":"Zimmeck Sebastian","unstructured":"Sebastian Zimmeck and Steven M. Bellovin . 2014 . Privee: An Architecture for Automatically Analyzing Web Privacy Policies. In 23rd USENIX Security Symposium. USENIX Association , San Diego, CA, 1--16. Sebastian Zimmeck and Steven M. Bellovin. 2014. Privee: An Architecture for Automatically Analyzing Web Privacy Policies. In 23rd USENIX Security Symposium. USENIX Association, San Diego, CA, 1--16."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0037"}],"event":{"name":"CIKM '20: The 29th ACM International Conference on Information and Knowledge Management","location":"Virtual Event Ireland","acronym":"CIKM '20","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 29th ACM International Conference on Information &amp; Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340531.3417469","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3340531.3417469","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:42Z","timestamp":1750197762000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340531.3417469"}},"subtitle":["A Tool that Recaps Privacy Policies for You"],"short-title":[],"issued":{"date-parts":[[2020,10,19]]},"references-count":23,"alternative-id":["10.1145\/3340531.3417469","10.1145\/3340531"],"URL":"https:\/\/doi.org\/10.1145\/3340531.3417469","relation":{},"subject":[],"published":{"date-parts":[[2020,10,19]]},"assertion":[{"value":"2020-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}