{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T23:22:28Z","timestamp":1773789748782,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":118,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ANR project CISC"},{"name":"CHIST-ERA project UPRISE-IoT"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,9]]},"DOI":"10.1145\/3411497.3420216","type":"proceedings-article","created":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T20:59:15Z","timestamp":1604955555000},"page":"41-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["SoK"],"prefix":"10.1145","author":[{"given":"Victor","family":"Morel","sequence":"first","affiliation":[{"name":"Privatics Inria, Villeurbanne, France"}]},{"given":"Ra\u00fal","family":"Pardo","sequence":"additional","affiliation":[{"name":"IT University of Copenhagen, Copenhagen, Denmark"}]}],"member":"320","published-online":{"date-parts":[[2020,11,9]]},"reference":[{"key":"#cr-split#-e_1_3_2_1_1_1.1","doi-asserted-by":"crossref","unstructured":"Jan Camenisch Simone Fischer-H\u00fcbner and Kai Rannenberg (Eds.). 2011. Privacy and Identity Management for Life. Springer Berlin Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-20317-6 10.1007\/978-3-642-20317-6","DOI":"10.1007\/978-3-642-20317-6"},{"key":"#cr-split#-e_1_3_2_1_1_1.2","doi-asserted-by":"crossref","unstructured":"Jan Camenisch Simone Fischer-H\u00fcbner and Kai Rannenberg (Eds.). 2011. Privacy and Identity Management for Life. Springer Berlin Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-20317-6","DOI":"10.1007\/978-3-642-20317-6"},{"key":"e_1_3_2_1_2_1","unstructured":"2018-07-02. California?s New Privacy Law: It?s Almost GDPR in the US. https:\/\/www.bankinfosecurity.com\/californias-new-privacy-law-itsalmost-gdpr-in-us-a-11149  2018-07-02. California?s New Privacy Law: It?s Almost GDPR in the US. https:\/\/www.bankinfosecurity.com\/californias-new-privacy-law-itsalmost-gdpr-in-us-a-11149"},{"key":"e_1_3_2_1_3_1","unstructured":"3DCart. 2019-03-26. Create an Online Store with 3dcart Store Builder. https:\/\/www.3dcart.com\/personalized-policy.html  3DCart. 2019-03-26. Create an Online Store with 3dcart Store Builder. https:\/\/www.3dcart.com\/personalized-policy.html"},{"key":"e_1_3_2_1_4_1","unstructured":"Helton Aaron. 2009. Privacy Commons Icon Set.: Aaron.Helton:. https:\/\/web-beta.archive.org\/web\/20090601215200\/http:\/\/aaronhelton.wordpress.com\/2009\/02\/20\/privacy-commons-icon-set  Helton Aaron. 2009. Privacy Commons Icon Set.: Aaron.Helton:. https:\/\/web-beta.archive.org\/web\/20090601215200\/http:\/\/aaronhelton.wordpress.com\/2009\/02\/20\/privacy-commons-icon-set"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2003.1210062"},{"key":"e_1_3_2_1_6_1","volume-title":"Multi-Layered Privacy Notices: A Better Way","author":"Abrams Marty","year":"2005","unstructured":"Marty Abrams and Malcolm Crompton . 2005. Multi-Layered Privacy Notices: A Better Way ., Vol. 2 , 1 ( 2005 ), 1--4. Marty Abrams and Malcolm Crompton. 2005. Multi-Layered Privacy Notices: A Better Way., Vol. 2, 1 (2005), 1--4."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775241"},{"key":"e_1_3_2_1_8_1","volume-title":"Smith","author":"Ammar Waleed","year":"2012","unstructured":"Waleed Ammar , Shomir Wilson , Norman Sadeh , and Noah A . Smith . 2012 . Automatic Categorization of Privacy Policies: A Pilot Study . (2012). http:\/\/repository.cmu.edu\/lti\/199\/ Waleed Ammar, Shomir Wilson, Norman Sadeh, and Noah A. Smith. 2012. Automatic Categorization of Privacy Policies: A Pilot Study. (2012). http:\/\/repository.cmu.edu\/lti\/199\/"},{"key":"e_1_3_2_1_9_1","volume-title":"et almbox","author":"Anderson Anne","year":"2003","unstructured":"Anne Anderson , Anthony Nadalin , B. Parducci , D. Engovatov , H. Lockhart , M. Kudo , P. Humenn , S. Godik , S. Anderson , S. Crocker , et almbox . 2003 . Extensible Access Control Markup Language (Xacml) Version 1.0. (2003). http:\/\/courses.cs.vt.edu\/cs5204\/fall05-kafura\/Papers\/Security\/XACML-Specification.pdf Anne Anderson, Anthony Nadalin, B. Parducci, D. Engovatov, H. Lockhart, M. Kudo, P. Humenn, S. Godik, S. Anderson, S. Crocker, et almbox. 2003. Extensible Access Control Markup Language (Xacml) Version 1.0. (2003). http:\/\/courses.cs.vt.edu\/cs5204\/fall05-kafura\/Papers\/Security\/XACML-Specification.pdf"},{"key":"e_1_3_2_1_10_1","volume-title":"Automating the Generation of Privacy Policies for Context -Sharing Applications","author":"Apolinarski Wolfgang","year":"2015","unstructured":"Wolfgang Apolinarski , Marcus Handte , and Pedro Jose Marron . 2015-07. Automating the Generation of Privacy Policies for Context -Sharing Applications . IEEE , 73--80. https:\/\/doi.org\/10.1109\/IE. 2015 .18 10.1109\/IE.2015.18 Wolfgang Apolinarski, Marcus Handte, and Pedro Jose Marron. 2015-07. Automating the Generation of Privacy Policies for Context -Sharing Applications. IEEE, 73--80. https:\/\/doi.org\/10.1109\/IE.2015.18"},{"key":"e_1_3_2_1_11_1","unstructured":"Paul Ashley Satoshi Hada G\u00fcnter Karjoth Calvin Powers and Matthias Schunter. 2003. Enterprise Privacy Authorization Language (EPAL ). (2003).  Paul Ashley Satoshi Hada G\u00fcnter Karjoth Calvin Powers and Matthias Schunter. 2003. Enterprise Privacy Authorization Language (EPAL ). (2003)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644538"},{"key":"e_1_3_2_1_13_1","volume-title":"DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014","volume":"8872","author":"Azraoui Monir","year":"2014","unstructured":"Monir Azraoui , Kaoutar Elkhiyaoui , Melek \u00d6 nen, Karin Bernsmed , Anderson Santana de Oliveira , and Jakub Sendor . 2014 . A-PPL: An Accountability Policy Language. In Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop , DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014 , Wroclaw, Poland , September 10-11, 2014. Revised Selected Papers (Lecture Notes in Computer Science), Vol. 8872 . 319--326. Monir Azraoui, Kaoutar Elkhiyaoui, Melek \u00d6 nen, Karin Bernsmed, Anderson Santana de Oliveira, and Jakub Sendor. 2014. A-PPL: An Accountability Policy Language. In Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers (Lecture Notes in Computer Science), Vol. 8872. 319--326."},{"key":"e_1_3_2_1_14_1","volume-title":"Principles of Model Checking","author":"Baier Christel","unstructured":"Christel Baier and Joost-Pieter Katoen . 2008. Principles of Model Checking . MIT Press . Christel Baier and Joost-Pieter Katoen. 2008. Principles of Model Checking. MIT Press."},{"key":"e_1_3_2_1_15_1","volume-title":"Data Handling Policy Spaces and the Tags Language. In Security and Privacy Workshops (SPW)","author":"Bar-Sinai Michael","year":"2016","unstructured":"Michael Bar-Sinai , Latanya Sweeney , and Merce Crosas . 2016 . DataTags , Data Handling Policy Spaces and the Tags Language. In Security and Privacy Workshops (SPW) , 2016 IEEE. IEEE, 1--8. http:\/\/ieeexplore.ieee.org\/abstract\/document\/7527746\/ Michael Bar-Sinai, Latanya Sweeney, and Merce Crosas. 2016. DataTags, Data Handling Policy Spaces and the Tags Language. In Security and Privacy Workshops (SPW), 2016 IEEE. IEEE, 1--8. http:\/\/ieeexplore.ieee.org\/abstract\/document\/7527746\/"},{"key":"e_1_3_2_1_16_1","volume-title":"Privacy and Contextual Integrity: Framework and Applications. In 2006 IEEE Symposium on Security and Privacy (S&P '06)","author":"Barth Adam","year":"2006","unstructured":"Adam Barth , Anupam Datta , John C. Mitchell , and Helen Nissenbaum . 2006 . Privacy and Contextual Integrity: Framework and Applications. In 2006 IEEE Symposium on Security and Privacy (S&P '06) . IEEE, 15--pp. http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=1624011 Adam Barth, Anupam Datta, John C. Mitchell, and Helen Nissenbaum. 2006. Privacy and Contextual Integrity: Framework and Applications. In 2006 IEEE Symposium on Security and Privacy (S&P '06). IEEE, 15--pp. http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=1624011"},{"key":"e_1_3_2_1_17_1","unstructured":"Moritz Y. Becker Alexander Malkis and Laurent Bussard. 2010. S4P: A Generic Language for Specifying Privacy Preferences and Policies. (2010). http:\/\/www.msr-waypoint.com\/pubs\/122108\/main.pdf  Moritz Y. Becker Alexander Malkis and Laurent Bussard. 2010. S4P: A Generic Language for Specifying Privacy Preferences and Policies. (2010). http:\/\/www.msr-waypoint.com\/pubs\/122108\/main.pdf"},{"key":"e_1_3_2_1_18_1","unstructured":"Kathy Bohrer and Bobby Holland. 2000. Customer Profile Exchange (Cpexchange) Specification. http:\/\/mail.ctiforum.com\/standard\/standard\/www.cpexchange.org\/cpexchangev1_0F.pdf  Kathy Bohrer and Bobby Holland. 2000. Customer Profile Exchange (Cpexchange) Specification. http:\/\/mail.ctiforum.com\/standard\/standard\/www.cpexchange.org\/cpexchangev1_0F.pdf"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143123"},{"key":"e_1_3_2_1_20_1","volume-title":"Dave Kormann, and Patrick McDaniel.","author":"Byers Simon","year":"2005","unstructured":"Simon Byers , Lorrie Faith Cranor , Dave Kormann, and Patrick McDaniel. 2005 . Searching for Privacy: Design and Implementation of a P3P -Enabled Search Engine. In Privacy Enhancing Technologies,, David Martin and Andrei Serjantov (Eds.). Vol. 3424 . Springer Berlin Heidelberg , 314--328. https:\/\/doi.org\/10.1007\/11423409_20 10.1007\/11423409_20 Simon Byers, Lorrie Faith Cranor, Dave Kormann, and Patrick McDaniel. 2005. Searching for Privacy: Design and Implementation of a P3P -Enabled Search Engine. In Privacy Enhancing Technologies,, David Martin and Andrei Serjantov (Eds.). Vol. 3424. Springer Berlin Heidelberg, 314--328. https:\/\/doi.org\/10.1007\/11423409_20"},{"key":"e_1_3_2_1_21_1","unstructured":"Fred H Cate. 2008. The Failure of Fair Information Practice Principles. (2008) 38.  Fred H Cate. 2008. The Failure of Fair Information Practice Principles. (2008) 38."},{"key":"e_1_3_2_1_22_1","volume-title":"The Limits of Notice and Choice.","volume":"8","author":"Cate F. H.","year":"2010","unstructured":"F. H. Cate . 2010 -03 . The Limits of Notice and Choice. , Vol. 8 , 2 (2010-03), 59--62. https:\/\/doi.org\/10\/cgjkcd F. H. Cate. 2010-03. The Limits of Notice and Choice., Vol. 8, 2 (2010-03), 59--62. https:\/\/doi.org\/10\/cgjkcd"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.2307\/2371045"},{"key":"e_1_3_2_1_24_1","volume-title":"Mellish","author":"Clocksin William F.","year":"1994","unstructured":"William F. Clocksin and Christopher S . Mellish . 1994 . Programming in Prolog (4. ed.). Springer . William F. Clocksin and Christopher S. Mellish. 1994. Programming in Prolog (4. ed.). Springer."},{"key":"e_1_3_2_1_25_1","unstructured":"CNIL. 2019-01-21. The CNIL 's Restricted Committee Imposes a Financial Penalty of 50 Million Euros against GOOGLE LLC. https:\/\/www.cnil.fr\/en\/cnils-restricted-committee-imposes-financial-penalty-50-million-euros-against-google-llc  CNIL. 2019-01-21. The CNIL 's Restricted Committee Imposes a Financial Penalty of 50 Million Euros against GOOGLE LLC. https:\/\/www.cnil.fr\/en\/cnils-restricted-committee-imposes-financial-penalty-50-million-euros-against-google-llc"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381979"},{"key":"e_1_3_2_1_27_1","volume-title":"The Platform for Privacy Preferences 1.0 (P3P1. 0) Specification","author":"Cranor Lorrie","year":"2002","unstructured":"Lorrie Cranor , Marc Langheinrich , Massimo Marchiori , Martin Presler-Marshall , and Joseph Reagle . 2002. The Platform for Privacy Preferences 1.0 (P3P1. 0) Specification ., Vol. 16 ( 2002 ). https:\/\/elearn.inf.tu-dresden.de\/hades\/teleseminare\/wise0405\/Act.%208%20Models%20Languages%20Pierangela\/Materials\/P3P.pdf Lorrie Cranor, Marc Langheinrich, Massimo Marchiori, Martin Presler-Marshall, and Joseph Reagle. 2002. The Platform for Privacy Preferences 1.0 (P3P1. 0) Specification., Vol. 16 (2002). https:\/\/elearn.inf.tu-dresden.de\/hades\/teleseminare\/wise0405\/Act.%208%20Models%20Languages%20Pierangela\/Materials\/P3P.pdf"},{"key":"e_1_3_2_1_28_1","volume-title":"Necessary but Not Sufficient: Standardized Mechanisms for Privacy Notice and Choice","author":"Cranor Lorrie Faith","year":"2012","unstructured":"Lorrie Faith Cranor . 2012. Necessary but Not Sufficient: Standardized Mechanisms for Privacy Notice and Choice ., Vol. 10 ( 2012 ), 273. http:\/\/heinonline.org\/hol-cgi-bin\/get_pdf.cgi?handle=hein.journals\/jtelhtel10\u00a7ion=22 Lorrie Faith Cranor. 2012. Necessary but Not Sufficient: Standardized Mechanisms for Privacy Notice and Choice., Vol. 10 (2012), 273. http:\/\/heinonline.org\/hol-cgi-bin\/get_pdf.cgi?handle=hein.journals\/jtelhtel10\u00a7ion=22"},{"key":"e_1_3_2_1_29_1","unstructured":"CyLab Usable Privacy and Security Laboratory. 2019-03--26. Privacy Bird. http:\/\/www.privacybird.org\/  CyLab Usable Privacy and Security Laboratory. 2019-03--26. Privacy Bird. http:\/\/www.privacybird.org\/"},{"key":"e_1_3_2_1_30_1","volume-title":"Personalized Privacy Assistants for the Internet of Things","author":"Das Anupam","year":"2018","unstructured":"Anupam Das , Martin Degeling , Daniel Smullen , and Norman Sadeh . 2018. Personalized Privacy Assistants for the Internet of Things ., Vol. 2018 ( 2018 ). https:\/\/doi.org\/10.1109\/MPRV.2018.03367733 10.1109\/MPRV.2018.03367733 Anupam Das, Martin Degeling, Daniel Smullen, and Norman Sadeh. 2018. Personalized Privacy Assistants for the Internet of Things., Vol. 2018 (2018). https:\/\/doi.org\/10.1109\/MPRV.2018.03367733"},{"key":"e_1_3_2_1_31_1","volume-title":"We Value Your Privacy... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy. (2019). https:\/\/doi.org\/10\/gfxgxm arxiv","author":"Degeling Martin","year":"1808","unstructured":"Martin Degeling , Christine Utz , Christopher Lentzsch , Henry Hosseini , Florian Schaub , and Thorsten Holz . 2019. We Value Your Privacy... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy. (2019). https:\/\/doi.org\/10\/gfxgxm arxiv : 1808 .05096 Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, and Thorsten Holz. 2019. We Value Your Privacy... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy. (2019). https:\/\/doi.org\/10\/gfxgxm arxiv: 1808.05096"},{"key":"e_1_3_2_1_32_1","volume-title":"Privacy Policy Online","author":"DelPercio Daniel","year":"2011","unstructured":"Daniel DelPercio . 2019-03--26. Privacy Policy Online ( 2011 ). http:\/\/www.PrivacyPolicyOnline.com Daniel DelPercio. 2019-03--26. Privacy Policy Online (2011). http:\/\/www.PrivacyPolicyOnline.com"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866919.1866930"},{"key":"e_1_3_2_1_34_1","unstructured":"Disconnect. 2016-03-04. Privacy Icons. https:\/\/web.archive.org\/web\/20160304013156\/https:\/\/disconnect.me\/icons  Disconnect. 2016-03-04. Privacy Icons. https:\/\/web.archive.org\/web\/20160304013156\/https:\/\/disconnect.me\/icons"},{"key":"e_1_3_2_1_35_1","unstructured":"Docracy. 2012-07-24. An Open Source Privacy Policy for Mobile Apps. https:\/\/web.archive.org\/web\/20171124185357\/https:\/\/blog.docracy.com\/post\/27931026976\/an-open-source-privacy-policy-for-mobile-apps  Docracy. 2012-07-24. An Open Source Privacy Policy for Mobile Apps. https:\/\/web.archive.org\/web\/20171124185357\/https:\/\/blog.docracy.com\/post\/27931026976\/an-open-source-privacy-policy-for-mobile-apps"},{"key":"e_1_3_2_1_36_1","volume-title":"Is This Thing On?: Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms","author":"Egelman Serge","unstructured":"Serge Egelman , Raghudeep Kannavara , and Richard Chow . 2015. Is This Thing On?: Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms . ACM Press , 1669--1678. https:\/\/doi.org\/10.1145\/2702123.2702251 10.1145\/2702123.2702251 Serge Egelman, Raghudeep Kannavara, and Richard Chow. 2015. Is This Thing On?: Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms. ACM Press, 1669--1678. https:\/\/doi.org\/10.1145\/2702123.2702251"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518752"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_3_2_1_39_1","unstructured":"European Parliament. 2016-04-26. General Data Protection Regulation.  European Parliament. 2016-04-26. General Data Protection Regulation."},{"key":"e_1_3_2_1_40_1","unstructured":"Federal Trade Commission. 2000-06. FAIR INFORMATION PRACTICES IN THE ELECTRONIC MARKETPLACE. (2000-06) 208.  Federal Trade Commission. 2000-06. FAIR INFORMATION PRACTICES IN THE ELECTRONIC MARKETPLACE. (2000-06) 208."},{"key":"e_1_3_2_1_41_1","volume-title":"Children's Online Privacy Protection Rule","author":"Federal Trade Commission","year":"2013","unstructured":"Federal Trade Commission . 2013-01-17. Children's Online Privacy Protection Rule ; Final Rule . https:\/\/www.ftc.gov\/system\/files\/documents\/federal_register_notices\/ 2013 \/01\/2012--31341.pdf Federal Trade Commission. 2013-01-17. Children's Online Privacy Protection Rule ; Final Rule. https:\/\/www.ftc.gov\/system\/files\/documents\/federal_register_notices\/2013\/01\/2012--31341.pdf"},{"key":"e_1_3_2_1_42_1","volume-title":"Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM","author":"Feigenbaum Joan","year":"2001","unstructured":"Joan Feigenbaum , Michael J. Freedman , Tomas Sander , and Adam Shostack . 2001. Privacy Engineering for Digital Rights Management Systems . In Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM 2001 , Philadelphia, PA , USA, November 5, 2001, Revised Papers (Lecture Notes in Computer Science), Vol. 2320 . Springer , 76--105. https:\/\/doi.org\/10.1007\/3-540-47870-1_6 10.1007\/3-540-47870-1_6 Joan Feigenbaum, Michael J. Freedman, Tomas Sander, and Adam Shostack. 2001. Privacy Engineering for Digital Rights Management Systems. In Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers (Lecture Notes in Computer Science), Vol. 2320. Springer, 76--105. https:\/\/doi.org\/10.1007\/3-540-47870-1_6"},{"key":"e_1_3_2_1_43_1","unstructured":"Forbrukerr\u00e5det. 2018-06-27. Deceived by Design. https:\/\/fil.forbrukerradet.no\/wp-content\/uploads\/2018\/06\/2018-06-27-deceived-by-design-final.pdf  Forbrukerr\u00e5det. 2018-06-27. Deceived by Design. https:\/\/fil.forbrukerradet.no\/wp-content\/uploads\/2018\/06\/2018-06-27-deceived-by-design-final.pdf"},{"key":"e_1_3_2_1_44_1","unstructured":"FreePrivacyPolicies.com. 2019-03--26. Free Privacy Policy Generator & Template with GDPR - Free Privacy Policy. https:\/\/www.freeprivacypolicy.com\/  FreePrivacyPolicies.com. 2019-03--26. Free Privacy Policy Generator & Template with GDPR - Free Privacy Policy. https:\/\/www.freeprivacypolicy.com\/"},{"key":"e_1_3_2_1_45_1","first-page":"41","article-title":"LPL, Towards a GDPR-Compliant Privacy Language: Formal Definition and Usage","volume":"37","author":"Gerl Armin","year":"2018","unstructured":"Armin Gerl , Nadia Bennani , Harald Kosch , and Lionel Brunie . 2018 . LPL, Towards a GDPR-Compliant Privacy Language: Formal Definition and Usage . Trans. Large-Scale Data- and Knowledge-Centered Systems , Vol. 37 (2018), 41 -- 80 . Armin Gerl, Nadia Bennani, Harald Kosch, and Lionel Brunie. 2018. LPL, Towards a GDPR-Compliant Privacy Language: Formal Definition and Usage. Trans. Large-Scale Data- and Knowledge-Centered Systems, Vol. 37 (2018), 41--80.","journal-title":"Trans. Large-Scale Data- and Knowledge-Centered Systems"},{"key":"e_1_3_2_1_46_1","unstructured":"GetTerms. 2019-03-26. Getterms.Io. http:\/\/getterms.io\/  GetTerms. 2019-03-26. Getterms.Io. http:\/\/getterms.io\/"},{"key":"e_1_3_2_1_47_1","unstructured":"Google. 2019-03--26. Android Permissions Overview. https:\/\/developer.android.com\/guide\/topics\/permissions\/overview  Google. 2019-03--26. Android Permissions Overview. https:\/\/developer.android.com\/guide\/topics\/permissions\/overview"},{"key":"e_1_3_2_1_48_1","volume-title":"Toombs","author":"Gray Colin M.","year":"2018","unstructured":"Colin M. Gray , Yubo Kou , Bryan Battles , Joseph Hoggatt , and Austin L . Toombs . 2018 . The Dark (Patterns) Side of UX Design. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems - CHI '18. ACM Press , 1--14. https:\/\/doi.org\/10\/gfxvpz Colin M. Gray, Yubo Kou, Bryan Battles, Joseph Hoggatt, and Austin L. Toombs. 2018. The Dark (Patterns) Side of UX Design. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems - CHI '18. ACM Press, 1--14. https:\/\/doi.org\/10\/gfxvpz"},{"key":"e_1_3_2_1_49_1","unstructured":"Margaret D. Hagan. 2016. User-Centered Privacy Communication Design. (2016). https:\/\/www.usenix.org\/system\/files\/conference\/soups2016\/wfpn16-paper-hagan.pdf  Margaret D. Hagan. 2016. User-Centered Privacy Communication Design. (2016). https:\/\/www.usenix.org\/system\/files\/conference\/soups2016\/wfpn16-paper-hagan.pdf"},{"key":"e_1_3_2_1_50_1","unstructured":"Hamza Harkous Kassem Fawaz R\u00e9mi Lebret Florian Schaub Kang G. Shin and Karl Aberer. 2018-02-07. Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. (2018-02-07). arxiv: cs\/1802.02561 http:\/\/arxiv.org\/abs\/1802.02561  Hamza Harkous Kassem Fawaz R\u00e9mi Lebret Florian Schaub Kang G. Shin and Karl Aberer. 2018-02-07. Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. (2018-02-07). arxiv: cs\/1802.02561 http:\/\/arxiv.org\/abs\/1802.02561"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74835-9_35"},{"key":"e_1_3_2_1_52_1","volume-title":"The SPIN Model Checker - Primer and Reference Manual","author":"Holzmann Gerard J.","unstructured":"Gerard J. Holzmann . 2004. The SPIN Model Checker - Primer and Reference Manual . Addison-Wesley . Gerard J. Holzmann. 2004. The SPIN Model Checker - Primer and Reference Manual. Addison-Wesley."},{"key":"e_1_3_2_1_53_1","volume-title":"Logic in computer science - modelling and reasoning about systems (2. ed.)","author":"Huth Michael","unstructured":"Michael Huth and Mark Dermot Ryan . 2004. Logic in computer science - modelling and reasoning about systems (2. ed.) . Cambridge University Press . Michael Huth and Mark Dermot Ryan. 2004. Logic in computer science - modelling and reasoning about systems (2. ed.). Cambridge University Press."},{"key":"e_1_3_2_1_54_1","unstructured":"Iubenda. 2019-03-26 a. Features | Compliance Solutions. https:\/\/www.iubenda.com\/en\/features  Iubenda. 2019-03-26 a. Features | Compliance Solutions. https:\/\/www.iubenda.com\/en\/features"},{"key":"e_1_3_2_1_55_1","unstructured":"Iubenda. 2019-03-26 b. Terms of Service. https:\/\/www.iubenda.comhttps:\/\/www.iubenda.com\/en\/user\/tos  Iubenda. 2019-03-26 b. Terms of Service. https:\/\/www.iubenda.comhttps:\/\/www.iubenda.com\/en\/user\/tos"},{"key":"e_1_3_2_1_56_1","volume-title":"P2U: A Privacy Policy Specification Language for Secondary Data Sharing and Usage","author":"Iyilade Johnson","year":"2014","unstructured":"Johnson Iyilade and Julita Vassileva . 2014-05. P2U: A Privacy Policy Specification Language for Secondary Data Sharing and Usage . IEEE , 18--22. https:\/\/doi.org\/10.1109\/SPW. 2014 .12 10.1109\/SPW.2014.12 Johnson Iyilade and Julita Vassileva. 2014-05. P2U: A Privacy Policy Specification Language for Secondary Data Sharing and Usage. IEEE, 18--22. https:\/\/doi.org\/10.1109\/SPW.2014.12"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985752"},{"key":"e_1_3_2_1_58_1","unstructured":"Lalana Kagal. 2002. Rei. (2002). http:\/\/ebiquity.umbc.edu\/get\/a\/publication\/57.pdf  Lalana Kagal. 2002. Rei. (2002). http:\/\/ebiquity.umbc.edu\/get\/a\/publication\/57.pdf"},{"key":"e_1_3_2_1_59_1","unstructured":"Saffija Kasem-Madani and Michael Meier. 2015. Security and Privacy Policy Languages: A Survey Categorization and Gap Identification. (2015). https:\/\/arxiv.org\/abs\/1512.00201  Saffija Kasem-Madani and Michael Meier. 2015. Security and Privacy Policy Languages: A Survey Categorization and Gap Identification. (2015). https:\/\/arxiv.org\/abs\/1512.00201"},{"key":"e_1_3_2_1_60_1","volume-title":"Proceedings of the 5th Symposium on Usable Privacy and Security. ACM, 4. http:\/\/dl.acm.org\/citation.cfm?id=1572538","author":"Kelley Patrick Gage","unstructured":"Patrick Gage Kelley , Joanna Bresee , Lorrie Faith Cranor , and Robert W. Reeder . 2009. A Nutrition Label for Privacy . In Proceedings of the 5th Symposium on Usable Privacy and Security. ACM, 4. http:\/\/dl.acm.org\/citation.cfm?id=1572538 Patrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, and Robert W. Reeder. 2009. A Nutrition Label for Privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security. ACM, 4. http:\/\/dl.acm.org\/citation.cfm?id=1572538"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753561"},{"key":"e_1_3_2_1_62_1","volume-title":"Generating User -Understandable Privacy Preferences","author":"Kolter Jan","year":"2009","unstructured":"Jan Kolter and G\u00fcnther Pernul . 2009. Generating User -Understandable Privacy Preferences . IEEE , 299--306. https:\/\/doi.org\/10.1109\/ARES. 2009 .89 10.1109\/ARES.2009.89 Jan Kolter and G\u00fcnther Pernul. 2009. Generating User -Understandable Privacy Preferences. IEEE, 299--306. https:\/\/doi.org\/10.1109\/ARES.2009.89"},{"key":"e_1_3_2_1_63_1","unstructured":"Ulrich K\u00f6nig and Jan Schallaboeck. 2012. Privacy Preferences for E -Mail Messages. (2012). https:\/\/tools.ietf.org\/html\/koenig-privicons-03.txt  Ulrich K\u00f6nig and Jan Schallaboeck. 2012. Privacy Preferences for E -Mail Messages. (2012). https:\/\/tools.ietf.org\/html\/koenig-privicons-03.txt"},{"key":"e_1_3_2_1_64_1","volume-title":"Appel: A P3p Preference Exchange Language.","author":"Langheinrich Marc","year":"2002","unstructured":"Marc Langheinrich , Lorrie Cranor , and Massimo Marchiori . 2002 . Appel: A P3p Preference Exchange Language. (2002). https:\/\/www.w3.org\/TR\/P3P-preferences\/ Marc Langheinrich, Lorrie Cranor, and Massimo Marchiori. 2002. Appel: A P3p Preference Exchange Language. (2002). https:\/\/www.w3.org\/TR\/P3P-preferences\/"},{"key":"e_1_3_2_1_65_1","volume-title":"International Workshop on Formal Aspects in Security and Trust. Springer, 162--176","author":"M\u00e9tayer Daniel Le","year":"2008","unstructured":"Daniel Le M\u00e9tayer . 2008 . A Formal Privacy Management Framework . In International Workshop on Formal Aspects in Security and Trust. Springer, 162--176 . http:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-01465-9_11 Daniel Le M\u00e9tayer. 2008. A Formal Privacy Management Framework. In International Workshop on Formal Aspects in Security and Trust. Springer, 162--176. http:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-01465-9_11"},{"key":"e_1_3_2_1_66_1","volume-title":"Geospatial Extensible Access Control Markup Language (GeoXACML)","author":"Matheus Andreas","year":"2008","unstructured":"Andreas Matheus and J Herrmann . 2008. Geospatial Extensible Access Control Markup Language (GeoXACML) . Open Geospatial Consortium Inc . OGC ( 2008 ). Andreas Matheus and J Herrmann. 2008. Geospatial Extensible Access Control Markup Language (GeoXACML). Open Geospatial Consortium Inc. OGC (2008)."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.24"},{"key":"e_1_3_2_1_68_1","volume-title":"McDonald and Lorrie Faith Cranor","author":"Aleecia","year":"2008","unstructured":"Aleecia M. McDonald and Lorrie Faith Cranor . 2008 . The Cost of Reading Privacy Policies ., Vol. 4 (2008), 543. http:\/\/heinonline.org\/hol-cgi-bin\/get_pdf.cgi?handle=hein.journals\/isjlpsoc4\u00a7ion=27 Aleecia M. McDonald and Lorrie Faith Cranor. 2008. The Cost of Reading Privacy Policies., Vol. 4 (2008), 543. http:\/\/heinonline.org\/hol-cgi-bin\/get_pdf.cgi?handle=hein.journals\/isjlpsoc4\u00a7ion=27"},{"key":"e_1_3_2_1_69_1","unstructured":"Matthias Mehldau. 2007. Icons of Privacy (Original). https:\/\/netzpolitik.org\/wp-upload\/data-privacy-icons-v01.pdf  Matthias Mehldau. 2007. Icons of Privacy (Original). https:\/\/netzpolitik.org\/wp-upload\/data-privacy-icons-v01.pdf"},{"key":"e_1_3_2_1_70_1","unstructured":"Daniela Yidan Miao. 2014. PrivacyInformer: An Automated Privacy Description Generator for the MIT App Inventor. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.1029.2434&rep=rep1&type=pdf  Daniela Yidan Miao. 2014. PrivacyInformer: An Automated Privacy Description Generator for the MIT App Inventor. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.1029.2434&rep=rep1&type=pdf"},{"key":"e_1_3_2_1_71_1","volume-title":"Proceedings of the 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications(TrustCom). 366--373","author":"Morel V.","year":"2019","unstructured":"V. Morel , M. Cunche , and D. Le M\u00e9tayer . 2019. A Generic Information and Consent Framework for the IoT . In Proceedings of the 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications(TrustCom). 366--373 . https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE. 2019 .00056 10.1109\/TrustCom V. Morel, M. Cunche, and D. Le M\u00e9tayer. 2019. A Generic Information and Consent Framework for the IoT. In Proceedings of the 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications(TrustCom). 366--373. https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2019.00056"},{"key":"e_1_3_2_1_72_1","unstructured":"National Telecommunications and Information Administration. 2013. Short Form Notice Code of Conduct to Promote Transparency in Mobile Apps Practices. https:\/\/www.ntia.doc.gov\/files\/ntia\/publications\/july_25_code_draft.pdf  National Telecommunications and Information Administration. 2013. Short Form Notice Code of Conduct to Promote Transparency in Mobile Apps Practices. https:\/\/www.ntia.doc.gov\/files\/ntia\/publications\/july_25_code_draft.pdf"},{"key":"e_1_3_2_1_73_1","volume-title":"Privacy as Contextual Integrity","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum . 2004. Privacy as Contextual Integrity ., Vol. 79 ( 2004 ), 119. http:\/\/heinonline.org\/hol-cgi-bin\/get_pdf.cgi?handle=hein.journals\/washlr79\u00a7ion=16 Helen Nissenbaum. 2004. Privacy as Contextual Integrity., Vol. 79 (2004), 119. http:\/\/heinonline.org\/hol-cgi-bin\/get_pdf.cgi?handle=hein.journals\/washlr79\u00a7ion=16"},{"key":"e_1_3_2_1_74_1","volume-title":"Skills Matter: Further Results from the Survey of Adult Skills. OCLC: ocn953634518.","author":"Development Organisation","year":"2016","unstructured":"Organisation for Economic Co-operation and Development . 2016 . Skills Matter: Further Results from the Survey of Adult Skills. OCLC: ocn953634518. Organisation for Economic Co-operation and Development. 2016. Skills Matter: Further Results from the Survey of Adult Skills. OCLC: ocn953634518."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22479-0_10"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"e_1_3_2_1_77_1","volume-title":"Assessing Privacy Policies of Internet of Things Services","author":"Paul Niklas","unstructured":"Niklas Paul , Welderufael B. Tesfay , Dennis-Kenji Kipker , Mattea Stelter , and Sebastian Pape . 2018. Assessing Privacy Policies of Internet of Things Services . In ICT Systems Security and Privacy Protection, Lech Jan Janczewski and Miros\u0142aw Kuty\u0142owski (Eds.). Vol. 529 . Springer International Publishing , 156--169. https:\/\/doi.org\/10.1007\/978-3-319-99828-2_12 10.1007\/978-3-319-99828-2_12 Niklas Paul, Welderufael B. Tesfay, Dennis-Kenji Kipker, Mattea Stelter, and Sebastian Pape. 2018. Assessing Privacy Policies of Internet of Things Services. In ICT Systems Security and Privacy Protection, Lech Jan Janczewski and Miros\u0142aw Kuty\u0142owski (Eds.). Vol. 529. Springer International Publishing, 156--169. https:\/\/doi.org\/10.1007\/978-3-319-99828-2_12"},{"key":"e_1_3_2_1_78_1","unstructured":"Polisis. 2019-03-26 a. Chrome Polisis. https:\/\/chrome.google.com\/webstore\/detail\/polisis\/bkddolgokpghlbhhkflbbhhjghjdojck  Polisis. 2019-03-26 a. Chrome Polisis. https:\/\/chrome.google.com\/webstore\/detail\/polisis\/bkddolgokpghlbhhkflbbhhjghjdojck"},{"key":"e_1_3_2_1_79_1","unstructured":"Polisis. 2019-03-26 b. Firefox Polisis. https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/polisis\/  Polisis. 2019-03-26 b. Firefox Polisis. https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/polisis\/"},{"key":"e_1_3_2_1_80_1","unstructured":"Polisis. 2019-03-26 c. Polisis. https:\/\/www.pribot.org\/polisis  Polisis. 2019-03-26 c. Polisis. https:\/\/www.pribot.org\/polisis"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151030.1151053"},{"key":"e_1_3_2_1_82_1","unstructured":"Privacy Policy Generator. 2019-03-26. Privacy Policy Generator. https:\/\/privacypolicygenerator.info\/  Privacy Policy Generator. 2019-03-26. Privacy Policy Generator. https:\/\/privacypolicygenerator.info\/"},{"key":"e_1_3_2_1_83_1","unstructured":"Privacy Tech. 2018. Privacy Icons. https:\/\/www.privacytech.fr\/privacy-icons\/  Privacy Tech. 2018. Privacy Icons. https:\/\/www.privacytech.fr\/privacy-icons\/"},{"key":"e_1_3_2_1_84_1","unstructured":"PrivacyPolicies.com. 2019-03-26. Privacy Policy Generator: Fre GDPR CalOPPA - PrivacyPolicies. Com. https:\/\/www.privacypolicies.com\/  PrivacyPolicies.com. 2019-03-26. Privacy Policy Generator: Fre GDPR CalOPPA - PrivacyPolicies. Com. https:\/\/www.privacypolicies.com\/"},{"key":"e_1_3_2_1_85_1","unstructured":"Aza Raskin. 2010. Making Privacy Policies Not Suck. http:\/\/www.azarask.in\/blog\/post\/making-privacy-policies-not-suck\/  Aza Raskin. 2010. Making Privacy Policies Not Suck. http:\/\/www.azarask.in\/blog\/post\/making-privacy-policies-not-suck\/"},{"key":"e_1_3_2_1_86_1","unstructured":"Aza Raskin. 2011. Privacy Icons - MozillaWiki. https:\/\/wiki.mozilla.org\/Privacy_Icons  Aza Raskin. 2011. Privacy Icons - MozillaWiki. https:\/\/wiki.mozilla.org\/Privacy_Icons"},{"key":"e_1_3_2_1_87_1","volume-title":"Norton","author":"Reidenberg Joel R.","year":"2016","unstructured":"Joel R. Reidenberg , Jaspreet Bhatia , Travis Breaux , and Thomas B . Norton . 2016 . Automated Comparisons of Ambiguity in Privacy Policies and the Impact of Regulation . (2016). http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2715164 Joel R. Reidenberg, Jaspreet Bhatia, Travis Breaux, and Thomas B. Norton. 2016. Automated Comparisons of Ambiguity in Privacy Policies and the Impact of Regulation. (2016). http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2715164"},{"key":"e_1_3_2_1_88_1","volume-title":"Ambiguity in Privacy Policies and the Impact of Regulation.","volume":"45","author":"Reidenberg Joel R.","year":"2016","unstructured":"Joel R. Reidenberg , Jaspreet Bhatia , Travis D. Breaux , and Thomas B. Norton . 2016-06 . Ambiguity in Privacy Policies and the Impact of Regulation. , Vol. 45 , S2 ( 2016 -06), S163--S190. https:\/\/doi.org\/10\/gdcdzm Joel R. Reidenberg, Jaspreet Bhatia, Travis D. Breaux, and Thomas B. Norton. 2016-06. Ambiguity in Privacy Policies and the Impact of Regulation., Vol. 45, S2 (2016-06), S163--S190. https:\/\/doi.org\/10\/gdcdzm"},{"key":"e_1_3_2_1_89_1","first-page":"39","article-title":"Disagreeable Privacy Policies: Mismatches between Meaning and Users","volume":"30","author":"Reidenberg Joel R.","year":"2015","unstructured":"Joel R. Reidenberg , Travis Breaux , Lorrie Faith Cranor , Brian French , Amanda Grannis , James T. Graves , Fei Liu , Aleecia McDonald , Thomas B. Norton , and Rohan Ramanath . 2015 . Disagreeable Privacy Policies: Mismatches between Meaning and Users ' Understanding. , Vol. 30 (2015), 39 . http:\/\/heinonline.org\/hol-cgi-bin\/get_pdf.cgi?handle=hein.journals\/berktech30\u00a7ion=6 Joel R. Reidenberg, Travis Breaux, Lorrie Faith Cranor, Brian French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia McDonald, Thomas B. Norton, and Rohan Ramanath. 2015. Disagreeable Privacy Policies: Mismatches between Meaning and Users' Understanding., Vol. 30 (2015), 39. http:\/\/heinonline.org\/hol-cgi-bin\/get_pdf.cgi?handle=hein.journals\/berktech30\u00a7ion=6","journal-title":"Understanding."},{"key":"e_1_3_2_1_90_1","unstructured":"Arianna Rossi Rossana Ducato Helena Haapio and Stefania Passera. 2019. When Design Met Law: Design Patterns for Information Transparency. (2019) 43.  Arianna Rossi Rossana Ducato Helena Haapio and Stefania Passera. 2019. When Design Met Law: Design Patterns for Information Transparency. (2019) 43."},{"key":"e_1_3_2_1_91_1","unstructured":"Arianna Rossi and Monica Palmirani. 2019. DaPIS: An Ontology -Based Data Protection Icon Set. (2019) 181--195. https:\/\/doi.org\/10\/gf7fbn  Arianna Rossi and Monica Palmirani. 2019. DaPIS: An Ontology -Based Data Protection Icon Set. (2019) 181--195. https:\/\/doi.org\/10\/gf7fbn"},{"key":"e_1_3_2_1_92_1","volume-title":"Presentation at IGF","author":"Rundle Mary","year":"2006","unstructured":"Mary Rundle . 2006. International Data Protection and Digital Identity Management Tools , Presentation at IGF 2006 . (2006). Mary Rundle. 2006. International Data Protection and Digital Identity Management Tools, Presentation at IGF 2006. (2006)."},{"key":"e_1_3_2_1_93_1","volume-title":"Aleecia M. McDonald, Joel R. Reidenberg, Noah A. Smith, Fei Liu, N. Cameron Russell, Florian Schaub, et almbox.","author":"Sadeh Norman","year":"2013","unstructured":"Norman Sadeh , Alessandro Acquisti , Travis D. Breaux , Lorrie Faith Cranor , Aleecia M. McDonald, Joel R. Reidenberg, Noah A. Smith, Fei Liu, N. Cameron Russell, Florian Schaub, et almbox. 2013 . The Usable Privacy Policy Project. http:\/\/ra.adm.cs.cmu.edu\/anon\/usr0\/ftp\/home\/anon\/isr2013\/Carnegie Mellon University-ISR- 13--119.pdf Norman Sadeh, Alessandro Acquisti, Travis D. Breaux, Lorrie Faith Cranor, Aleecia M. McDonald, Joel R. Reidenberg, Noah A. Smith, Fei Liu, N. Cameron Russell, Florian Schaub, et almbox. 2013. The Usable Privacy Policy Project. http:\/\/ra.adm.cs.cmu.edu\/anon\/usr0\/ftp\/home\/anon\/isr2013\/Carnegie Mellon University-ISR-13--119.pdf"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_95_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub , Rebecca Balebako , Adam L. Durity , and Lorrie Faith Cranor . 2015 . A Design Space for Effective Privacy Notices . In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015 ). 1--17. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/schaub Florian Schaub, Rebecca Balebako, Adam L. Durity, and Lorrie Faith Cranor. 2015. A Design Space for Effective Privacy Notices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). 1--17. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/schaub"},{"key":"e_1_3_2_1_96_1","volume-title":"A Taxonomy of Privacy","author":"Solove Daniel J.","year":"2005","unstructured":"Daniel J. Solove . 2005. A Taxonomy of Privacy ., Vol. 154 ( 2005 ), 477. http:\/\/heinonline.org\/hol-cgi-bin\/get_pdf.cgi?handle=hein.journals\/pnlr154\u00a7ion=20 Daniel J. Solove. 2005. A Taxonomy of Privacy., Vol. 154 (2005), 477. http:\/\/heinonline.org\/hol-cgi-bin\/get_pdf.cgi?handle=hein.journals\/pnlr154\u00a7ion=20"},{"key":"e_1_3_2_1_97_1","unstructured":"State of California. 2018-06-28. Assembly Bill No. 375 California Consumer Privacy Act.  State of California. 2018-06-28. Assembly Bill No. 375 California Consumer Privacy Act."},{"key":"e_1_3_2_1_98_1","unstructured":"Cass R. Sunstein. 2014. Choosing Not to Choose. (2014). https:\/\/doi.org\/10\/gftmr3  Cass R. Sunstein. 2014. Choosing Not to Choose. (2014). https:\/\/doi.org\/10\/gftmr3"},{"key":"e_1_3_2_1_99_1","unstructured":"Latanya Sweeney Merc\u00e8 Crosas and Michael Bar-Sinai. 2015. Sharing Sensitive Data with Confidence: The Datatags System. (2015). http:\/\/techscience.org\/a\/2015101601\/  Latanya Sweeney Merc\u00e8 Crosas and Michael Bar-Sinai. 2015. Sharing Sensitive Data with Confidence: The Datatags System. (2015). http:\/\/techscience.org\/a\/2015101601\/"},{"key":"e_1_3_2_1_100_1","unstructured":"Alasdair Taylor. 2012-01-23T08:05:3900:00. Privacy Policy. https:\/\/seqlegal.com\/free-legal-documents\/privacy-policy  Alasdair Taylor. 2012-01-23T08:05:3900:00. Privacy Policy. https:\/\/seqlegal.com\/free-legal-documents\/privacy-policy"},{"key":"e_1_3_2_1_101_1","unstructured":"Terms of Service; Didn't Read. 2019-03-26. Terms of Service Classification. https:\/\/tosdr.org\/classification.html  Terms of Service; Didn't Read. 2019-03-26. Terms of Service Classification. https:\/\/tosdr.org\/classification.html"},{"key":"e_1_3_2_1_102_1","unstructured":"Termsfeed. 2019-03-26. Generic Privacy Policy Template. https:\/\/www.termsfeed.com\/assets\/pdf\/privacy-policy-template.pdf  Termsfeed. 2019-03-26. Generic Privacy Policy Template. https:\/\/www.termsfeed.com\/assets\/pdf\/privacy-policy-template.pdf"},{"key":"e_1_3_2_1_103_1","volume-title":"The Effect of Online Privacy Information on Purchasing Behavior : An Experimental Study","author":"Tsai Janice Y.","year":"2011","unstructured":"Janice Y. Tsai , Serge Egelman , Lorrie Cranor , and Alessandro Acquisti . 2011-06. The Effect of Online Privacy Information on Purchasing Behavior : An Experimental Study ., Vol. 22 , 2 ( 2011 -06), 254--268. https:\/\/doi.org\/10\/cxhgzz Janice Y. Tsai, Serge Egelman, Lorrie Cranor, and Alessandro Acquisti. 2011-06. The Effect of Online Privacy Information on Purchasing Behavior : An Experimental Study., Vol. 22, 2 (2011-06), 254--268. https:\/\/doi.org\/10\/cxhgzz"},{"key":"e_1_3_2_1_104_1","volume-title":"States Congress.","author":"United","year":"1996","unstructured":"United States Congress. 1996 . Health Insurance Portability and Accountability Act. https:\/\/www.hhs.gov\/sites\/default\/files\/privacysummary.pdf United States Congress. 1996. Health Insurance Portability and Accountability Act. https:\/\/www.hhs.gov\/sites\/default\/files\/privacysummary.pdf"},{"key":"e_1_3_2_1_105_1","volume-title":"States Congress.","author":"United","year":"1999","unstructured":"United States Congress. 1999 . Gramm--Leach --Bliley Act., 31 pages. United States Congress. 1999. Gramm--Leach --Bliley Act., 31 pages."},{"key":"e_1_3_2_1_106_1","unstructured":"Christine Utz Martin Degeling Sascha Fahl Florian Schaub and Thorsten Holz. 2019. (Un )Informed Consent: Studying GDPR Consent Notices in the Field. (2019) 18.  Christine Utz Martin Degeling Sascha Fahl Florian Schaub and Thorsten Holz. 2019. (Un )Informed Consent: Studying GDPR Consent Notices in the Field. (2019) 18."},{"key":"e_1_3_2_1_107_1","volume-title":"Annual Privacy Forum","author":"van de Ven Jasper","unstructured":"Jasper van de Ven and Frank Dylla . 2016. Qualitative Privacy Description Language . In Annual Privacy Forum . Springer , 171--189. http:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-44760-5_11 Jasper van de Ven and Frank Dylla. 2016. Qualitative Privacy Description Language. In Annual Privacy Forum. Springer, 171--189. http:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-44760-5_11"},{"key":"#cr-split#-e_1_3_2_1_108_1.1","doi-asserted-by":"crossref","unstructured":"Bibi Van den Berg and Simone Van der Hof. 2012. What Happens to My Data? A Novel Approach to Informing Users of Data Processing Practices. (2012). https:\/\/doi.org\/10.5210\/fm.v17i7.4010 10.5210\/fm.v17i7.4010","DOI":"10.5210\/fm.v17i7.4010"},{"key":"#cr-split#-e_1_3_2_1_108_1.2","doi-asserted-by":"crossref","unstructured":"Bibi Van den Berg and Simone Van der Hof. 2012. What Happens to My Data? A Novel Approach to Informing Users of Data Processing Practices. (2012). https:\/\/doi.org\/10.5210\/fm.v17i7.4010","DOI":"10.5210\/fm.v17i7.4010"},{"key":"e_1_3_2_1_109_1","volume-title":"Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (ACL). http:\/\/www.aclweb.org\/anthology\/P\/P16\/P16-1126","author":"Wilson Shomir","unstructured":"Shomir Wilson , Florian Schaub , Aswarth Abhilash Dara , Frederick Liu , Sushain Cherivirala , Pedro Giovanni Leon , Mads Schaarup Andersen , Sebastian Zimmeck , Kanthashree Mysore Sathyendra , N. Cameron Russell, et almbox. 2016. The Creation and Analysis of a Website Privacy Policy Corpus . In Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (ACL). http:\/\/www.aclweb.org\/anthology\/P\/P16\/P16-1126 .pdf Shomir Wilson, Florian Schaub, Aswarth Abhilash Dara, Frederick Liu, Sushain Cherivirala, Pedro Giovanni Leon, Mads Schaarup Andersen, Sebastian Zimmeck, Kanthashree Mysore Sathyendra, N. Cameron Russell, et almbox. 2016. The Creation and Analysis of a Website Privacy Policy Corpus. In Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (ACL). http:\/\/www.aclweb.org\/anthology\/P\/P16\/P16-1126.pdf"},{"key":"e_1_3_2_1_110_1","unstructured":"WP29. 2014. Opinion 8\/2014 on the Recent Developments on the Internet of Things.  WP29. 2014. Opinion 8\/2014 on the Recent Developments on the Internet of Things."},{"key":"e_1_3_2_1_111_1","unstructured":"WP29. 2017-12-15. Guidelines on Transparency under Regulation 2016\/679.  WP29. 2017-12-15. Guidelines on Transparency under Regulation 2016\/679."},{"key":"e_1_3_2_1_112_1","volume-title":"A Language for Automatically Enforcing Privacy Policies","author":"Yang Jean","unstructured":"Jean Yang , Kuat Yessenov , and Armando Solar-Lezama . 2012. A Language for Automatically Enforcing Privacy Policies . ACM Press , 85. https:\/\/doi.org\/10.1145\/2103656.2103669 10.1145\/2103656.2103669 Jean Yang, Kuat Yessenov, and Armando Solar-Lezama. 2012. A Language for Automatically Enforcing Privacy Policies. ACM Press, 85. https:\/\/doi.org\/10.1145\/2103656.2103669"},{"key":"e_1_3_2_1_113_1","volume-title":"AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications","author":"Yu Le","unstructured":"Le Yu , Tao Zhang , Xiapu Luo , and Lei Xue . 2015. AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications . ACM Press , 39--50. https:\/\/doi.org\/10.1145\/2808117.2808125 10.1145\/2808117.2808125 Le Yu, Tao Zhang, Xiapu Luo, and Lei Xue. 2015. AutoPPG: Towards Automatic Generation of Privacy Policy for Android Applications. ACM Press, 39--50. https:\/\/doi.org\/10.1145\/2808117.2808125"},{"key":"e_1_3_2_1_114_1","first-page":"1","article-title":"PrivacyCheck","volume":"18","author":"Zaeem Razieh Nokhbeh","year":"2016","unstructured":"Razieh Nokhbeh Zaeem , Rachel L. German , and K. Suzanne Barber . 2016 . PrivacyCheck : Automatic Summarization of Privacy Policies Using Data Mining. , Vol. 18 , 4 (2016), 1 -- 18 . https:\/\/doi.org\/10.1145\/3127519 10.1145\/3127519 Razieh Nokhbeh Zaeem, Rachel L. German, and K. Suzanne Barber. 2016. PrivacyCheck : Automatic Summarization of Privacy Policies Using Data Mining., Vol. 18, 4 (2016), 1--18. https:\/\/doi.org\/10.1145\/3127519","journal-title":"Automatic Summarization of Privacy Policies Using Data Mining."},{"key":"e_1_3_2_1_115_1","unstructured":"Zero-knowledge. 2001. Privacy Rights Markup Language Specification.(2001).  Zero-knowledge. 2001. Privacy Rights Markup Language Specification.(2001)."},{"key":"e_1_3_2_1_116_1","volume-title":"Bellovin","author":"Zimmeck Sebastian","year":"2014","unstructured":"Sebastian Zimmeck and Steven M . Bellovin . 2014 . Privee : An Architecture for Automatically Analyzing Web Privacy Policies. USENIX Association . https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity14\/sec14-paper-zimmeck.pdf OCLC: 254320948. Sebastian Zimmeck and Steven M. Bellovin. 2014. Privee: An Architecture for Automatically Analyzing Web Privacy Policies. USENIX Association. https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity14\/sec14-paper-zimmeck.pdf OCLC: 254320948."}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event USA","acronym":"CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 19th Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411497.3420216","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411497.3420216","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:41Z","timestamp":1750195901000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411497.3420216"}},"subtitle":["Three Facets of Privacy Policies"],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":118,"alternative-id":["10.1145\/3411497.3420216","10.1145\/3411497"],"URL":"https:\/\/doi.org\/10.1145\/3411497.3420216","relation":{},"subject":[],"published":{"date-parts":[[2020,11,9]]},"assertion":[{"value":"2020-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}