{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T22:37:14Z","timestamp":1776119834040,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,9]]},"DOI":"10.1145\/3411497.3420221","type":"proceedings-article","created":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T20:59:15Z","timestamp":1604955555000},"page":"57-71","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Poli-see"],"prefix":"10.1145","author":[{"given":"Wentao","family":"Guo","sequence":"first","affiliation":[{"name":"Pomona College, Claremont, CA, USA"}]},{"given":"Jay","family":"Rodolitz","sequence":"additional","affiliation":[{"name":"Pomona College, Claremont, CA, USA"}]},{"given":"Eleanor","family":"Birrell","sequence":"additional","affiliation":[{"name":"Pomona College, Claremont, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2732701"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1108\/14684520710832342"},{"key":"e_1_3_2_1_3_1","volume-title":"Retrieved","author":"ASICS","year":"2018","unstructured":"ASICS 2018 . ASICS Privacy Policy . Retrieved October 30, 2019 from https: \/\/www.asics.com\/us\/en-us\/privacy-policy.html ASICS 2018. ASICS Privacy Policy. Retrieved October 30, 2019 from https: \/\/www.asics.com\/us\/en-us\/privacy-policy.html"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the Engaging Data Forum: The First International Forum on the Application and Management of Personal Electronic Information. https:\/\/ssrn.com\/abstract=2567409","author":"Barocas Solon","year":"2009","unstructured":"Solon Barocas and Helen Nissenbaum . 2009 . On Notice: The Trouble with Notice and Consent . In Proceedings of the Engaging Data Forum: The First International Forum on the Application and Management of Personal Electronic Information. https:\/\/ssrn.com\/abstract=2567409 Solon Barocas and Helen Nissenbaum. 2009. On Notice: The Trouble with Notice and Consent. In Proceedings of the Engaging Data Forum: The First International Forum on the Application and Management of Personal Electronic Information. https:\/\/ssrn.com\/abstract=2567409"},{"key":"e_1_3_2_1_5_1","volume-title":"Privacy Technologies and Policy","author":"Bier Cristoph","unstructured":"Cristoph Bier , Kay K\u00fchne , and J\u00fcrgen Beyerer . 2016. PrivacyInsight: The Next Generation Privacy Dashboard . In Privacy Technologies and Policy . Springer , 135--152. https:\/\/doi.org\/10.1007\/978-3-319-44760-5_9 10.1007\/978-3-319-44760-5_9 Cristoph Bier, Kay K\u00fchne, and J\u00fcrgen Beyerer. 2016. PrivacyInsight: The Next Generation Privacy Dashboard. In Privacy Technologies and Policy. Springer, 135--152. https:\/\/doi.org\/10.1007\/978-3-319-44760-5_9"},{"key":"e_1_3_2_1_6_1","volume-title":"Schneider","author":"Birrell Eleanor","year":"2017","unstructured":"Eleanor Birrell and Fred B . Schneider . 2017 . A Reactive Approach for Use-Based Privacy. Technical Report. Cornell University . https:\/\/hdl.handle.net\/1813\/54843 Eleanor Birrell and Fred B. Schneider. 2017. A Reactive Approach for Use-Based Privacy. Technical Report. Cornell University. https:\/\/hdl.handle.net\/1813\/54843"},{"key":"e_1_3_2_1_7_1","volume-title":"Privacy Panel: Usable and Quantifiable Mobile Privacy. In 2013 International Conference on Availability, Reliability and Security. IEEE, 218--223","author":"Biswas Debmalya","year":"2013","unstructured":"Debmalya Biswas , Imad Aad , and Gian Paolo Perrucci . 2013 . Privacy Panel: Usable and Quantifiable Mobile Privacy. In 2013 International Conference on Availability, Reliability and Security. IEEE, 218--223 . https:\/\/doi.org\/10.1109\/ARES.2013.29 10.1109\/ARES.2013.29 Debmalya Biswas, Imad Aad, and Gian Paolo Perrucci. 2013. Privacy Panel: Usable and Quantifiable Mobile Privacy. In 2013 International Conference on Availability, Reliability and Security. IEEE, 218--223. https:\/\/doi.org\/10.1109\/ARES.2013.29"},{"key":"e_1_3_2_1_8_1","unstructured":"European Parliament and Council of the European Union. 2016. General Data Protection Regulation (GDPR). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj  European Parliament and Council of the European Union. 2016. General Data Protection Regulation (GDPR). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"e_1_3_2_1_9_1","volume-title":"Last modified","author":"Federal Trade Commission et al.","year":"2007","unstructured":"Federal Trade Commission et al. Last modified June 25, 2007 . Fair Information Practice Principles. (Last modified June 25, 2007). Federal Trade Commission et al. Last modified June 25, 2007. Fair Information Practice Principles. (Last modified June 25, 2007)."},{"key":"e_1_3_2_1_10_1","volume-title":"Privacy and Trust -- Technology for Tracking and Controlling My Data Disclosures: Does This Work?","author":"Fischer-H\u00fcbner Simone","unstructured":"Simone Fischer-H\u00fcbner , Julio Angulo , Farzaneh Karegar , and Tobias Pulls . 2016. Transparency , Privacy and Trust -- Technology for Tracking and Controlling My Data Disclosures: Does This Work? . In Trust Management X. Springer , 3--14. https:\/\/doi.org\/10.1007\/978-3-319-41354-9_1 10.1007\/978-3-319-41354-9_1 Simone Fischer-H\u00fcbner, Julio Angulo, Farzaneh Karegar, and Tobias Pulls. 2016. Transparency, Privacy and Trust -- Technology for Tracking and Controlling My Data Disclosures: Does This Work?. In Trust Management X. Springer, 3--14. https:\/\/doi.org\/10.1007\/978-3-319-41354-9_1"},{"key":"e_1_3_2_1_11_1","volume-title":"2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC\/PiCom\/DataCom\/CyberSciTech)","author":"Ghazinour Kambiz","year":"2016","unstructured":"Kambiz Ghazinour and Tahani Albalawi . 2016. A Usability Study on the Privacy Policy Visualization Model. In 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing , 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC\/PiCom\/DataCom\/CyberSciTech) . IEEE , 578--585. https: \/\/doi.org\/10.1109\/DASC-PICom-DataCom-CyberSciTec. 2016 .109 10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.109 Kambiz Ghazinour and Tahani Albalawi. 2016. A Usability Study on the Privacy Policy Visualization Model. In 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC\/PiCom\/DataCom\/CyberSciTech). IEEE, 578--585. https: \/\/doi.org\/10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.109"},{"key":"e_1_3_2_1_12_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019","author":"Habib Hana","year":"2019","unstructured":"Hana Habib , Yixin Zou , Aditi Jannu , Neha Sridhar , Chelse Swoopes , Alessandro Acquisti , Lorrie Faith Cranor , Norman Sadeh , and Florian Schaub . 2019 . An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites . In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019 ). USENIX Association, Santa Clara, CA. https:\/\/www.usenix.org\/conference\/soups 2019\/ presentation\/habib Hana Habib, Yixin Zou, Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, and Florian Schaub. 2019. An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA. https:\/\/www.usenix.org\/conference\/soups2019\/ presentation\/habib"},{"key":"e_1_3_2_1_13_1","volume-title":"Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Harkous Hamza","year":"2018","unstructured":"Hamza Harkous , Kassem Fawaz , R\u00e9mi Lebret , Florian Schaub , Kang G. Shin , and Karl Aberer . 2018 . Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. In 27th USENIX Security Symposium (USENIX Security 18) . USENIX Association, Baltimore, MD, 531--548. https:\/\/www.usenix. org\/conference\/usenixsecurity18\/presentation\/harkous Hamza Harkous, Kassem Fawaz, R\u00e9mi Lebret, Florian Schaub, Kang G. Shin, and Karl Aberer. 2018. Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 531--548. https:\/\/www.usenix. org\/conference\/usenixsecurity18\/presentation\/harkous"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.019"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 5th Symposium on Usable Privacy and Security. ACM. https:\/\/doi.org\/10","author":"Kelley Patrick Gage","unstructured":"Patrick Gage Kelley , Joanna Bresee , Lorrie Faith Cranor , and Robert W. Reeder . 2009. A ?Nutrition Label? for Privacy . In Proceedings of the 5th Symposium on Usable Privacy and Security. ACM. https:\/\/doi.org\/10 .1145\/1572532.1572538 10.1145\/1572532.1572538 Patrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, and Robert W. Reeder. 2009. A ?Nutrition Label? for Privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security. ACM. https:\/\/doi.org\/10.1145\/1572532.1572538"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753561"},{"key":"e_1_3_2_1_17_1","first-page":"543","article-title":"The Cost of Reading Privacy Policies","volume":"4","author":"McDonald Aleecia M.","year":"2008","unstructured":"Aleecia M. McDonald and Lorrie Faith Cranor . 2008 . The Cost of Reading Privacy Policies . I\/S: A Journal of Law and Policy for the Information Society 4 , 3 (2008), 543 -- 568 . http:\/\/hdl.handle.net\/1811\/72839 Aleecia M. McDonald and Lorrie Faith Cranor. 2008. The Cost of Reading Privacy Policies. I\/S: A Journal of Law and Policy for the Information Society 4, 3 (2008), 543--568. http:\/\/hdl.handle.net\/1811\/72839","journal-title":"I\/S: A Journal of Law and Policy for the Information Society"},{"key":"e_1_3_2_1_18_1","volume-title":"Patrick Gage Kelley, and Lorrie Faith Cranor","author":"McDonald Aleecia M.","year":"2009","unstructured":"Aleecia M. McDonald , Robert W. Reeder , Patrick Gage Kelley, and Lorrie Faith Cranor . 2009 . A Comparative Study of Online Privacy Policies and Formats. In Privacy Enhancing Technologies. Springer , 37--55. https:\/\/doi.org\/10.1007\/978-3-642-03168-7_3 10.1007\/978-3-642-03168-7_3 Aleecia M. McDonald, Robert W. Reeder, Patrick Gage Kelley, and Lorrie Faith Cranor. 2009. A Comparative Study of Online Privacy Policies and Formats. In Privacy Enhancing Technologies. Springer, 37--55. https:\/\/doi.org\/10.1007\/978-3-642-03168-7_3"},{"key":"e_1_3_2_1_19_1","volume-title":"Last modified","author":"Aza Raskin","year":"2011","unstructured":"Aza Raskin et al. Last modified June 28, 2011 . Privacy Icons . https:\/\/wiki.mozilla. org\/Privacy_Icons Aza Raskin et al. Last modified June 28, 2011. Privacy Icons. https:\/\/wiki.mozilla. org\/Privacy_Icons"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00014"},{"key":"e_1_3_2_1_21_1","first-page":"39","article-title":"Disagreeable Privacy Policies: Mismatches between Meaning and Users? Understanding","volume":"30","author":"Reidenberg Joel R.","year":"2015","unstructured":"Joel R. Reidenberg , Travis Breaux , Lorrie Faith Cranor , Brian French , Amanda Grannis , James T. Graves , Fei Liu , Aleecia McDonald , Thomas B. Norton , Rohan Ramanath , N. Cameron Russell , Norman Sadeh , and Florian Schaub . 2015 . Disagreeable Privacy Policies: Mismatches between Meaning and Users? Understanding . Berkeley Technology Law Journal 30 , 1 (2015), 39 -- 88 . https: \/\/doi.org\/10.2139\/ssrn.2418297 10.2139\/ssrn.2418297 Joel R. Reidenberg, Travis Breaux, Lorrie Faith Cranor, Brian French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia McDonald, Thomas B. Norton, Rohan Ramanath, N. Cameron Russell, Norman Sadeh, and Florian Schaub. 2015. Disagreeable Privacy Policies: Mismatches between Meaning and Users? Understanding. Berkeley Technology Law Journal 30, 1 (2015), 39--88. https: \/\/doi.org\/10.2139\/ssrn.2418297","journal-title":"Berkeley Technology Law Journal"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-010-9228-2"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2208940.2208950"},{"key":"e_1_3_2_1_24_1","volume-title":"Retrieved","author":"Strava","year":"2018","unstructured":"Strava 2018 . Strava Privacy Policy . Retrieved October 30, 2019 from https: \/\/www.strava.com\/legal\/privacy Strava 2018. Strava Privacy Policy. Retrieved October 30, 2019 from https: \/\/www.strava.com\/legal\/privacy"},{"key":"e_1_3_2_1_26_1","unstructured":"United States Census Bureau [n.d.]. American Community Survey. https: \/\/www.census.gov\/programs-surveys\/acs\/  United States Census Bureau [n.d.]. American Community Survey. https: \/\/www.census.gov\/programs-surveys\/acs\/"},{"key":"e_1_3_2_1_27_1","volume-title":"Retrieved","author":"Policy Project Usable Privacy","year":"2017","unstructured":"Usable Privacy Policy Project 2017 . The Usable Privacy Policy Project . Retrieved October 30, 2019 from https:\/\/usableprivacy.org Usable Privacy Policy Project 2017. The Usable Privacy Policy Project. Retrieved October 30, 2019 from https:\/\/usableprivacy.org"},{"key":"e_1_3_2_1_28_1","volume-title":"Retrieved","author":"Policy Project Usable Privacy","year":"2018","unstructured":"Usable Privacy Policy Project 2018 . Machine-Annotated Privacy Policies . Retrieved October 30, 2019 from https:\/\/explore.usableprivacy.org\/?view=machine Usable Privacy Policy Project 2018. Machine-Annotated Privacy Policies. Retrieved October 30, 2019 from https:\/\/explore.usableprivacy.org\/?view=machine"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2009.12.001"},{"key":"e_1_3_2_1_30_1","volume-title":"Daniel Smullen, Sebastian Zimmeck, Rohan Ramanath, Peter Story, Fei Liu","author":"Wilson Shomir","year":"2018","unstructured":"Shomir Wilson , Florian Schaub , Frederick Liu , Kanthashree Mysore Sathyendra , Daniel Smullen, Sebastian Zimmeck, Rohan Ramanath, Peter Story, Fei Liu , Norman Sadeh , and Noah A. Smith. 2018 . Analyzing Privacy Policies at Scale : From Crowdsourcing to Automated Annotations. ACM Transactions on the Web ( 2018), 1:1--1:29. https:\/\/doi.org\/10.1145\/3230665 10.1145\/3230665 Shomir Wilson, Florian Schaub, Frederick Liu, Kanthashree Mysore Sathyendra, Daniel Smullen, Sebastian Zimmeck, Rohan Ramanath, Peter Story, Fei Liu, Norman Sadeh, and Noah A. Smith. 2018. Analyzing Privacy Policies at Scale: From Crowdsourcing to Automated Annotations. ACM Transactions on the Web (2018), 1:1--1:29. https:\/\/doi.org\/10.1145\/3230665"}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event USA","acronym":"CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 19th Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411497.3420221","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411497.3420221","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:41Z","timestamp":1750195901000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411497.3420221"}},"subtitle":["An Interactive Tool for Visualizing Privacy Policies"],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":29,"alternative-id":["10.1145\/3411497.3420221","10.1145\/3411497"],"URL":"https:\/\/doi.org\/10.1145\/3411497.3420221","relation":{},"subject":[],"published":{"date-parts":[[2020,11,9]]},"assertion":[{"value":"2020-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}