{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:53:17Z","timestamp":1776124397027,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T00:00:00Z","timestamp":1587340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,20]]},"DOI":"10.1145\/3366423.3380262","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T08:11:44Z","timestamp":1588579904000},"page":"1943-1954","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":48,"title":["Finding a Choice in a Haystack: Automatic Extraction of Opt-Out Statements from Privacy Policy Text"],"prefix":"10.1145","author":[{"given":"Vinayshekhar","family":"Bannihatti Kumar","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Roger","family":"Iyengar","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Namita","family":"Nisal","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"Yuanyuan","family":"Feng","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Hana","family":"Habib","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Peter","family":"Story","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Sushain","family":"Cherivirala","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Margaret","family":"Hagan","sequence":"additional","affiliation":[{"name":"Stanford University"}]},{"given":"Lorrie","family":"Cranor","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Shomir","family":"Wilson","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University"}]},{"given":"Florian","family":"Schaub","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"Norman","family":"Sadeh","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2020,4,20]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-6803.2004.00093.x"},{"key":"e_1_3_2_2_2_1","unstructured":"Amazon Web Services Inc.2017. Alexa Top Sites. https:\/\/docs.aws.amazon.com\/AlexaTopSites\/latest\/index.html.  Amazon Web Services Inc.2017. Alexa Top Sites. https:\/\/docs.aws.amazon.com\/AlexaTopSites\/latest\/index.html."},{"key":"e_1_3_2_2_3_1","volume-title":"Proceedings of the Web 2.0 Security and Privacy Workshop (W2SP).","author":"Balebako Rebecca","year":"2012","unstructured":"Rebecca Balebako , Pedro Leon , Richard Shay , Blase Ur , Yang Wang , and Lorrie\u00a0Faith Cranor . 2012 . Measuring the Effectiveness of Privacy Tools for Limiting Behavioral Advertising . In Proceedings of the Web 2.0 Security and Privacy Workshop (W2SP). Rebecca Balebako, Pedro Leon, Richard Shay, Blase Ur, Yang Wang, and Lorrie\u00a0Faith Cranor. 2012. Measuring the Effectiveness of Privacy Tools for Limiting Behavioral Advertising. In Proceedings of the Web 2.0 Security and Privacy Workshop (W2SP)."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2513549.2513559"},{"key":"e_1_3_2_2_5_1","unstructured":"S. Behnel. 2005. lxml - XML and HTML with Python. https:\/\/lxml.de\/.  S. Behnel. 2005. lxml - XML and HTML with Python. https:\/\/lxml.de\/."},{"key":"e_1_3_2_2_6_1","volume-title":"Natural Language Processing with Python","author":"Bird Steven","unstructured":"Steven Bird , Ewan Klein , and Edward Loper . 2009. Natural Language Processing with Python ( 1 st ed.). O\u2019Reilly Media, Inc. Steven Bird, Ewan Klein, and Edward Loper. 2009. Natural Language Processing with Python(1st ed.). O\u2019Reilly Media, Inc.","edition":"1"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2015.04.001"},{"key":"e_1_3_2_2_8_1","unstructured":"Bloomberg Businessweek. 2000. Business Week\/Harris Poll: A Growing Threat. (2000) 96.  Bloomberg Businessweek. 2000. Business Week\/Harris Poll: A Growing Threat. (2000) 96."},{"key":"e_1_3_2_2_9_1","volume-title":"SB-1121 California Consumer Privacy Act of","author":"Legislature Website California State","year":"2018","unstructured":"California State Legislature Website . 2018. SB-1121 California Consumer Privacy Act of 2018 . https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml?bill_id=201720180SB1121. California State Legislature Website. 2018. SB-1121 California Consumer Privacy Act of 2018. https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml?bill_id=201720180SB1121."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.84"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.3115\/1219840.1219862"},{"key":"e_1_3_2_2_12_1","unstructured":"Shan Chen Dan Hong and Vincent Shen. 2005. An Experimental Study on Validation Problems with Existing HTML Webpages.373\u2013379.  Shan Chen Dan Hong and Vincent Shen. 2005. An Experimental Study on Validation Problems with Existing HTML Webpages.373\u2013379."},{"key":"e_1_3_2_2_13_1","volume-title":"Beyond Concern: Understanding Net Users","author":"Cranor Lorrie\u00a0Faith","year":"1999","unstructured":"Lorrie\u00a0Faith Cranor , Joseph Reagle , and Mark\u00a0 S Ackerman . 1999 . Beyond Concern: Understanding Net Users \u2019 Attitudes About Online Privacy. Technical Report. TR 99.4.1, AT&T Labs-Research . Lorrie\u00a0Faith Cranor, Joseph Reagle, and Mark\u00a0S Ackerman. 1999. Beyond Concern: Understanding Net Users\u2019 Attitudes About Online Privacy. Technical Report. TR 99.4.1, AT&T Labs-Research."},{"key":"e_1_3_2_2_14_1","volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. CoRR abs\/1810.04805(2018). arxiv:1810.04805http:\/\/arxiv.org\/abs\/1810.04805","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin , Ming-Wei Chang , Kenton Lee , and Kristina Toutanova . 2018 . BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. CoRR abs\/1810.04805(2018). arxiv:1810.04805http:\/\/arxiv.org\/abs\/1810.04805 Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. CoRR abs\/1810.04805(2018). arxiv:1810.04805http:\/\/arxiv.org\/abs\/1810.04805"},{"key":"e_1_3_2_2_15_1","unstructured":"Digital Advertising Alliance. 2009. Self-Regulatory Principles for Online Behavioral Advertising. http:\/\/digitaladvertisingalliance.org\/principles.  Digital Advertising Alliance. 2009. Self-Regulatory Principles for Online Behavioral Advertising. http:\/\/digitaladvertisingalliance.org\/principles."},{"key":"e_1_3_2_2_16_1","unstructured":"Digital Advertising Alliance. 2019. Your AdChoices. https:\/\/youradchoices.com\/.  Digital Advertising Alliance. 2019. Your AdChoices. https:\/\/youradchoices.com\/."},{"key":"e_1_3_2_2_17_1","unstructured":"European Commission. 2016. EGULATION (EU) 2016\/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679.  European Commission. 2016. EGULATION (EU) 2016\/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106426.3106427"},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security(SOUPS \u201916)","author":"Gluck Joshua","year":"2016","unstructured":"Joshua Gluck , Florian Schaub , Amy Friedman , Hana Habib , Norman Sadeh , Lorrie\u00a0Faith Cranor , and Yuvraj Agarwal . 2016 . How Short is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices . In Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security(SOUPS \u201916) . USENIX Association, USA, 321\u2013340. Joshua Gluck, Florian Schaub, Amy Friedman, Hana Habib, Norman Sadeh, Lorrie\u00a0Faith Cranor, and Yuvraj Agarwal. 2016. How Short is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices. In Proceedings of the Twelfth USENIX Conference on Usable Privacy and Security(SOUPS \u201916). USENIX Association, USA, 321\u2013340."},{"key":"e_1_3_2_2_20_1","unstructured":"Yoav Goldberg and Omer Levy. 2014. word2vec Explained: deriving Mikolov et al.\u2019s negative-sampling word-embedding method. arXiv preprint arXiv:1402.3722(2014).  Yoav Goldberg and Omer Levy. 2014. word2vec Explained: deriving Mikolov et al.\u2019s negative-sampling word-embedding method. arXiv preprint arXiv:1402.3722(2014)."},{"key":"e_1_3_2_2_21_1","volume-title":"Usability of Websites\u2019 Opt-Out and Data Deletion Choices. In CHI\u201920: ACM CHI Conference on Human Factors in Computing Systems.","author":"Habib Hana","year":"2020","unstructured":"Hana Habib , Sarah Pearman , Jiamin Wang , Yixin Zou , Alessandro Acquisti , Lorrie\u00a0Faith Cranor , Norman Sadeh , and Florian Schaub . 2020 . \u201c It\u2019s a scavenger hunt \u201d: Usability of Websites\u2019 Opt-Out and Data Deletion Choices. In CHI\u201920: ACM CHI Conference on Human Factors in Computing Systems. Hana Habib, Sarah Pearman, Jiamin Wang, Yixin Zou, Alessandro Acquisti, Lorrie\u00a0Faith Cranor, Norman Sadeh, and Florian Schaub. 2020. \u201cIt\u2019s a scavenger hunt\u201d: Usability of Websites\u2019 Opt-Out and Data Deletion Choices. In CHI\u201920: ACM CHI Conference on Human Factors in Computing Systems."},{"key":"e_1_3_2_2_22_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security.","author":"Habib Hana","year":"2019","unstructured":"Hana Habib , Yixin Zou , Aditi Jannu , Neha Sridhar , Chelse Swoopes , Alessandro Acquisti , Lorrie\u00a0Faith Cranor , Norman Sadeh , and Florian Schaub . 2019 . An empirical analysis of data deletion and opt-out choices on 150 websites . In Fifteenth Symposium on Usable Privacy and Security. Hana Habib, Yixin Zou, Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie\u00a0Faith Cranor, Norman Sadeh, and Florian Schaub. 2019. An empirical analysis of data deletion and opt-out choices on 150 websites. In Fifteenth Symposium on Usable Privacy and Security."},{"key":"e_1_3_2_2_23_1","volume-title":"Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. arXiv preprint arXiv:1802.02561(2018).","author":"Harkous Hamza","year":"2018","unstructured":"Hamza Harkous , Kassem Fawaz , R\u00e9mi Lebret , Florian Schaub , Kang\u00a0 G Shin , and Karl Aberer . 2018 . Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. arXiv preprint arXiv:1802.02561(2018). Hamza Harkous, Kassem Fawaz, R\u00e9mi Lebret, Florian Schaub, Kang\u00a0G Shin, and Karl Aberer. 2018. Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. arXiv preprint arXiv:1802.02561(2018)."},{"key":"e_1_3_2_2_24_1","unstructured":"Jovanni Hernandez Akshay Jagadeesh and Jonathan Mayer. 2011. Tracking the Trackers: The AdChoices Icon. http:\/\/cyberlaw.stanford.edu\/blog\/2011\/08\/tracking-trackers-adchoices-icon.  Jovanni Hernandez Akshay Jagadeesh and Jonathan Mayer. 2011. Tracking the Trackers: The AdChoices Icon. http:\/\/cyberlaw.stanford.edu\/blog\/2011\/08\/tracking-trackers-adchoices-icon."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2008.4563068"},{"key":"e_1_3_2_2_26_1","unstructured":"IAB Europe. 2011. EU Framework for Online Behavioural Advertising. https:\/\/www.edaa.eu\/wp-content\/uploads\/2012\/10\/2013-11-11-IAB-Europe-OBA-Framework_.pdf.  IAB Europe. 2011. EU Framework for Online Behavioural Advertising. https:\/\/www.edaa.eu\/wp-content\/uploads\/2012\/10\/2013-11-11-IAB-Europe-OBA-Framework_.pdf."},{"key":"e_1_3_2_2_27_1","unstructured":"IAB Europe. 2019. GDPR Transparency and Consent Framework. https:\/\/iabtechlab.com\/standards\/gdpr-transparency-and-consent-framework\/.  IAB Europe. 2019. GDPR Transparency and Consent Framework. https:\/\/iabtechlab.com\/standards\/gdpr-transparency-and-consent-framework\/."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/E17-2068"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/10641734.2016.1233157"},{"key":"e_1_3_2_2_30_1","volume-title":"A Journal of Law and Policy for the Information Society 7","author":"Komanduri Saranga","year":"2011","unstructured":"Saranga Komanduri , Richard Shay , Greg Norcie , and Blase Ur. 2011. AdChoices? Compliance with Online Behavioral Advertising Notice and Choice Requirements . A Journal of Law and Policy for the Information Society 7 ( 2011 ). Saranga Komanduri, Richard Shay, Greg Norcie, and Blase Ur. 2011. AdChoices? Compliance with Online Behavioral Advertising Notice and Choice Requirements. A Journal of Law and Policy for the Information Society 7 (2011)."},{"key":"e_1_3_2_2_31_1","volume-title":"AAAI Spring Symposium on Privacy-Enhancing Artificial Intelligence and Language Technologies.","author":"Kumar Vinayshekhar\u00a0Bannihatti","year":"2019","unstructured":"Vinayshekhar\u00a0Bannihatti Kumar , Abhilasha Ravichander , Peter Story , and Norman Sadeh . 2019 . Quantifying the effect of in-domain distributed word representations: A study of privacy policies . In AAAI Spring Symposium on Privacy-Enhancing Artificial Intelligence and Language Technologies. Vinayshekhar\u00a0Bannihatti Kumar, Abhilasha Ravichander, Peter Story, and Norman Sadeh. 2019. Quantifying the effect of in-domain distributed word representations: A study of privacy policies. In AAAI Spring Symposium on Privacy-Enhancing Artificial Intelligence and Language Technologies."},{"key":"e_1_3_2_2_32_1","unstructured":"Jinhyuk Lee Wonjin Yoon Sungdong Kim Donghyeon Kim Sunkyu Kim Chan\u00a0Ho So and Jaewoo Kang. 2019. Biobert: pre-trained biomedical language representation model for biomedical text mining. arXiv preprint arXiv:1901.08746(2019).  Jinhyuk Lee Wonjin Yoon Sungdong Kim Donghyeon Kim Sunkyu Kim Chan\u00a0Ho So and Jaewoo Kang. 2019. Biobert: pre-trained biomedical language representation model for biomedical text mining. arXiv preprint arXiv:1901.08746(2019)."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207759"},{"key":"e_1_3_2_2_34_1","unstructured":"Frederick Liu Shomir Wilson Peter Story Sebastian Zimmeck and Norman Sadeh. 2018. Towards Automatic Classification of Privacy Policy Text. (2018).  Frederick Liu Shomir Wilson Peter Story Sebastian Zimmeck and Norman Sadeh. 2018. Towards Automatic Classification of Privacy Policy Text. (2018)."},{"key":"e_1_3_2_2_35_1","first-page":"139","article-title":"One-class SVMs for document classification","author":"Manevitz M","year":"2001","unstructured":"Larry\u00a0 M Manevitz and Malik Yousef . 2001 . One-class SVMs for document classification . Journal of machine Learning research 2 , Dec (2001), 139 \u2013 154 . Larry\u00a0M Manevitz and Malik Yousef. 2001. One-class SVMs for document classification. Journal of machine Learning research 2, Dec (2001), 139\u2013154.","journal-title":"Journal of machine Learning research 2"},{"key":"e_1_3_2_2_36_1","volume-title":"Michigan Law: Law and Economics Workshop(2015)","author":"Marotta-Wurgler F","year":"2015","unstructured":"F Marotta-Wurgler . 2015 . Does \u201dnotice and choice\u201d disclosure regulation work? An empirical study of privacy policies . Michigan Law: Law and Economics Workshop(2015) . https:\/\/www.law.umich.edu\/centersandprograms\/lawandeconomics\/workshops\/Documents\/Paper13.Marotta-Wurgler.Does%20Notice%20and%20Choice%20Disclosure%20Work.pdf F Marotta-Wurgler. 2015. Does \u201dnotice and choice\u201d disclosure regulation work? An empirical study of privacy policies. Michigan Law: Law and Economics Workshop(2015). https:\/\/www.law.umich.edu\/centersandprograms\/lawandeconomics\/workshops\/Documents\/Paper13.Marotta-Wurgler.Does%20Notice%20and%20Choice%20Disclosure%20Work.pdf"},{"key":"e_1_3_2_2_37_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security (SOUPS).","author":"Mathur Arunesh","year":"2018","unstructured":"Arunesh Mathur , Jessica Vitak , Arvind Narayanan , and Marshini Chetty . 2018 . Characterizing the use of browser-based blocking extensions to prevent online tracking . In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). Arunesh Mathur, Jessica Vitak, Arvind Narayanan, and Marshini Chetty. 2018. Characterizing the use of browser-based blocking extensions to prevent online tracking. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS)."},{"key":"e_1_3_2_2_38_1","first-page":"540","article-title":"The Cost of Reading Privacy Policies","volume":"4","author":"McDonald M.","year":"2008","unstructured":"Aleecia\u00a0 M. McDonald and Lorrie\u00a0 F. Cranor . 2008 . The Cost of Reading Privacy Policies . I\/S: A Journal of Law and Policy for the Information Society 4 , 3(2008), 540 \u2013 565 . Aleecia\u00a0M. McDonald and Lorrie\u00a0F. Cranor. 2008. The Cost of Reading Privacy Policies. I\/S: A Journal of Law and Policy for the Information Society 4, 3(2008), 540\u2013565.","journal-title":"I\/S: A Journal of Law and Policy for the Information Society"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866929"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0009"},{"key":"e_1_3_2_2_41_1","unstructured":"Tomas Mikolov Edouard Grave Piotr Bojanowski Christian Puhrsch and Armand Joulin. 2017. Advances in pre-training distributed word representations. arXiv preprint arXiv:1712.09405(2017).  Tomas Mikolov Edouard Grave Piotr Bojanowski Christian Puhrsch and Armand Joulin. 2017. Advances in pre-training distributed word representations. arXiv preprint arXiv:1712.09405(2017)."},{"key":"e_1_3_2_2_42_1","unstructured":"Mozilla. 2019. Geckodriver. https:\/\/github.com\/mozilla\/geckodriver.  Mozilla. 2019. Geckodriver. https:\/\/github.com\/mozilla\/geckodriver."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1294"},{"key":"e_1_3_2_2_44_1","unstructured":"Network Advertising Initiative. 2018. NAI Code of Conduct. https:\/\/www.networkadvertising.org\/sites\/default\/files\/nai_code2018.pdf.  Network Advertising Initiative. 2018. NAI Code of Conduct. https:\/\/www.networkadvertising.org\/sites\/default\/files\/nai_code2018.pdf."},{"key":"e_1_3_2_2_45_1","unstructured":"Network Advertising Initiative. 2019. Opt Out of Interested-Based Advertising. http:\/\/optout.networkadvertising.org\/.  Network Advertising Initiative. 2019. Opt Out of Interested-Based Advertising. http:\/\/optout.networkadvertising.org\/."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"crossref","unstructured":"Matthew\u00a0E Peters Mark Neumann Mohit Iyyer Matt Gardner Christopher Clark Kenton Lee and Luke Zettlemoyer. 2018. Deep contextualized word representations. arXiv preprint arXiv:1802.05365(2018).  Matthew\u00a0E Peters Mark Neumann Mohit Iyyer Matt Gardner Christopher Clark Kenton Lee and Luke Zettlemoyer. 2018. Deep contextualized word representations. arXiv preprint arXiv:1802.05365(2018).","DOI":"10.18653\/v1\/N18-1202"},{"key":"e_1_3_2_2_48_1","unstructured":"Postlight Labs LLC. 2019. Mercury Web Parser. https:\/\/mercury.postlight.com\/web-parser\/.  Postlight Labs LLC. 2019. Mercury Web Parser. https:\/\/mercury.postlight.com\/web-parser\/."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815705"},{"key":"e_1_3_2_2_50_1","first-page":"39","article-title":"Disagreeable privacy policies: Mismatches between meaning and users\u2019 understanding","volume":"30","author":"Reidenberg R","year":"2015","unstructured":"Joel\u00a0 R Reidenberg , Travis Breaux , Lorrie\u00a0Faith Cranor , Brian French , Amanda Grannis , James\u00a0 T Graves , Fei Liu , Aleecia McDonald , Thomas\u00a0 B Norton , Rohan Ramanath , N. Cameron\u00a0Russell , Norman Sadeh , and Florian Schaub . 2015 . Disagreeable privacy policies: Mismatches between meaning and users\u2019 understanding . Berkeley Tech. LJ 30 (2015), 39 . Joel\u00a0R Reidenberg, Travis Breaux, Lorrie\u00a0Faith Cranor, Brian French, Amanda Grannis, James\u00a0T Graves, Fei Liu, Aleecia McDonald, Thomas\u00a0B Norton, Rohan Ramanath, N. Cameron\u00a0Russell, Norman Sadeh, and Florian Schaub. 2015. Disagreeable privacy policies: Mismatches between meaning and users\u2019 understanding. Berkeley Tech. LJ 30(2015), 39.","journal-title":"Berkeley Tech. LJ"},{"key":"e_1_3_2_2_51_1","unstructured":"L. Richardson. 2004. Beautiful Soup. https:\/\/www.crummy.com\/software\/BeautifulSoup\/.  L. Richardson. 2004. Beautiful Soup. https:\/\/www.crummy.com\/software\/BeautifulSoup\/."},{"key":"e_1_3_2_2_52_1","unstructured":"A. Ronacher. 2010. Flask. http:\/\/flask.pocoo.org\/.  A. Ronacher. 2010. Flask. http:\/\/flask.pocoo.org\/."},{"key":"e_1_3_2_2_53_1","unstructured":"Salesforce.com inc.2018. Salesforce DMP Privacy. https:\/\/www.salesforce.com\/products\/marketing-cloud\/sfmc\/salesforce-dmp-privacy\/.  Salesforce.com inc.2018. Salesforce DMP Privacy. https:\/\/www.salesforce.com\/products\/marketing-cloud\/sfmc\/salesforce-dmp-privacy\/."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329806"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2016.23017"},{"key":"e_1_3_2_2_56_1","unstructured":"Selenium project. 2004. Selenium. https:\/\/www.seleniumhq.org\/.  Selenium project. 2004. Selenium. https:\/\/www.seleniumhq.org\/."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665963"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"crossref","unstructured":"Joseph Turow Jennifer King Chris\u00a0Jay Hoofnagle Amy Bleakley and Michael Hennessy. 2009. Americans Reject Tailored Advertising and Three Activities That Enable It. https:\/\/ssrn.com\/abstract=1478214.143.  Joseph Turow Jennifer King Chris\u00a0Jay Hoofnagle Amy Bleakley and Michael Hennessy. 2009. Americans Reject Tailored Advertising and Three Activities That Enable It. https:\/\/ssrn.com\/abstract=1478214.143.","DOI":"10.2139\/ssrn.1478214"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335362"},{"key":"e_1_3_2_2_60_1","unstructured":"U.S. Federal Trade Commission. 2009. CAN-SPAM Act: A Compliance Guide for Business. https:\/\/www.ftc.gov\/tips-advice\/business-center\/guidance\/can-spam-act-compliance-guide-business.  U.S. Federal Trade Commission. 2009. CAN-SPAM Act: A Compliance Guide for Business. https:\/\/www.ftc.gov\/tips-advice\/business-center\/guidance\/can-spam-act-compliance-guide-business."},{"key":"e_1_3_2_2_61_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan\u00a0N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In Advances in neural information processing systems. 5998\u20136008.  Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan\u00a0N Gomez \u0141ukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. In Advances in neural information processing systems. 5998\u20136008."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1126"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998316"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"crossref","unstructured":"L. Yu X. Luo X. Liu and T. Zhang. 2016. Can We Trust the Privacy Policies of Android Apps?. In DSN \u201916.  L. Yu X. Luo X. Liu and T. Zhang. 2016. Can We Trust the Privacy Policies of Android Apps?. In DSN \u201916.","DOI":"10.1109\/DSN.2016.55"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0037"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"crossref","unstructured":"S. Zimmeck Z. Wang L. Zou R. Iyengar B. Liu F. Shaub S. Wilson N. Sadeh S.\u00a0M. Bellovin and J. Reidenberg. 2016. Automated Analysis of Privacy Requirements for Mobile Apps. In NDSS \u201916. https:\/\/www.ndss-symposium.org\/ndss2017\/ndss-2017-programme\/automated-analysis-privacy-requirements-mobile-apps\/  S. Zimmeck Z. Wang L. Zou R. Iyengar B. Liu F. Shaub S. Wilson N. Sadeh S.\u00a0M. Bellovin and J. Reidenberg. 2016. Automated Analysis of Privacy Requirements for Mobile Apps. In NDSS \u201916. https:\/\/www.ndss-symposium.org\/ndss2017\/ndss-2017-programme\/automated-analysis-privacy-requirements-mobile-apps\/","DOI":"10.14722\/ndss.2017.23034"}],"event":{"name":"WWW '20: The Web Conference 2020","location":"Taipei Taiwan","acronym":"WWW '20","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of The Web Conference 2020"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380262","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366423.3380262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:10Z","timestamp":1750199590000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366423.3380262"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,20]]},"references-count":66,"alternative-id":["10.1145\/3366423.3380262","10.1145\/3366423"],"URL":"https:\/\/doi.org\/10.1145\/3366423.3380262","relation":{},"subject":[],"published":{"date-parts":[[2020,4,20]]},"assertion":[{"value":"2020-04-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}