{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:04:59Z","timestamp":1769731499816,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3447827","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"143-148","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["A Large Publicly Available Corpus of Website Privacy Policies Based on DMOZ"],"prefix":"10.1145","author":[{"given":"Razieh","family":"Nokhbeh Zaeem","sequence":"first","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]},{"given":"K. Suzanne","family":"Barber","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, Austin, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"28th USENIX Security Symposium. 585--602","author":"Andow Benjamin","year":"2019","unstructured":"Benjamin Andow , Samin Yaseer Mahmud , Wenyu Wang , Justin Whitaker , William Enck , Bradley Reaves , Kapil Singh , and Tao Xie . 2019 . Policylint: investigating internal privacy policy contradictions on Google play . In 28th USENIX Security Symposium. 585--602 . Benjamin Andow, Samin Yaseer Mahmud, Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Tao Xie. 2019. Policylint: investigating internal privacy policy contradictions on Google play. In 28th USENIX Security Symposium. 585--602."},{"key":"e_1_3_2_2_2_1","volume-title":"29th USENIX Security Symposium ({USENIX} Security 20)","author":"Andow Benjamin","year":"2020","unstructured":"Benjamin Andow , Samin Yaseer Mahmud , Justin Whitaker , William Enck , Bradley Reaves , Kapil Singh , and Serge Egelman . 2020 . Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with POLICHECK . In 29th USENIX Security Symposium ({USENIX} Security 20) . 985--1002. Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Serge Egelman. 2020. Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with POLICHECK. In 29th USENIX Security Symposium ({USENIX} Security 20). 985--1002."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380262"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381979"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00287-019-01201-1"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_2_8_1","first-page":"642","article-title":"Reading level of privacy policies on internet health web sites","volume":"51","author":"Graber Mark A","year":"2002","unstructured":"Mark A Graber , Donna M D Alessandro , and Jill Johnson-West . 2002 . Reading level of privacy policies on internet health web sites . Journal of Family Practice , Vol. 51 , 7 (2002), 642 -- 642 . Mark A Graber, Donna M D Alessandro, and Jill Johnson-West. 2002. Reading level of privacy policies on internet health web sites. Journal of Family Practice, Vol. 51, 7 (2002), 642--642.","journal-title":"Journal of Family Practice"},{"key":"e_1_3_2_2_9_1","volume-title":"27th USENIX Security Symposium. 531--548","author":"Harkous Hamza","year":"2018","unstructured":"Hamza Harkous , Kassem Fawaz , R\u00e9mi Lebret , Florian Schaub , Kang G Shin , and Karl Aberer . 2018 . Polisis: Automated analysis and presentation of privacy policies using deep learning . In 27th USENIX Security Symposium. 531--548 . Hamza Harkous, Kassem Fawaz, R\u00e9mi Lebret, Florian Schaub, Kang G Shin, and Karl Aberer. 2018. Polisis: Automated analysis and presentation of privacy policies using deep learning. In 27th USENIX Security Symposium. 531--548."},{"key":"e_1_3_2_2_10_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Kales Daniel","year":"2019","unstructured":"Daniel Kales , Christian Rechberger , Thomas Schneider , Matthias Senker , and Christian Weinert . 2019 . Mobile private contact discovery at scale . In 28th USENIX Security Symposium (USENIX Security 19) . 1447--1464. Daniel Kales, Christian Rechberger, Thomas Schneider, Matthias Senker, and Christian Weinert. 2019. Mobile private contact discovery at scale. In 28th USENIX Security Symposium (USENIX Security 19). 1447--1464."},{"key":"e_1_3_2_2_11_1","volume-title":"AAAI Spring Symposium on Privacy-Enhancing Artificial Intelligence and Language Technologies.","author":"Kumar Vinayshekhar Bannihatti","year":"2019","unstructured":"Vinayshekhar Bannihatti Kumar , Abhilasha Ravichander , Peter Story , and Norman Sadeh . 2019 . Quantifying the effect of in-domain distributed word representations: A study of privacy policies . In AAAI Spring Symposium on Privacy-Enhancing Artificial Intelligence and Language Technologies. Vinayshekhar Bannihatti Kumar, Abhilasha Ravichander, Peter Story, and Norman Sadeh. 2019. Quantifying the effect of in-domain distributed word representations: A study of privacy policies. In AAAI Spring Symposium on Privacy-Enhancing Artificial Intelligence and Language Technologies."},{"key":"e_1_3_2_2_12_1","first-page":"543","article-title":"the Cost of reading privacy policies","volume":"4","author":"McDonald Aleecia M","year":"2008","unstructured":"Aleecia M McDonald and Lorrie Faith Cranor . 2008 . the Cost of reading privacy policies . I\/S: A Journal of Law and Policy for the Information Society , Vol. 4 (2008), 543 . Aleecia M McDonald and Lorrie Faith Cranor. 2008. the Cost of reading privacy policies. I\/S: A Journal of Law and Policy for the Information Society, Vol. 4 (2008), 543.","journal-title":"I\/S: A Journal of Law and Policy for the Information Society"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1486870"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-2099"},{"key":"e_1_3_2_2_15_1","volume-title":"Privacy at Scale: Introducing the PrivaSeer Corpus of Web Privacy Policies. arXiv preprint arXiv:2004.11131","author":"Srinath Mukund","year":"2020","unstructured":"Mukund Srinath , Shomir Wilson , and C Lee Giles . 2020. Privacy at Scale: Introducing the PrivaSeer Corpus of Web Privacy Policies. arXiv preprint arXiv:2004.11131 ( 2020 ). Mukund Srinath, Shomir Wilson, and C Lee Giles. 2020. Privacy at Scale: Introducing the PrivaSeer Corpus of Web Privacy Policies. arXiv preprint arXiv:2004.11131 (2020)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2013-002605"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3186969"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180445.3180447"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355583"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1126"},{"key":"e_1_3_2_2_21_1","volume-title":"29th ACM International Conference on Information and Knowledge Management (CIKM). ACM. To appear.","author":"Zaeem Razieh Nokhbeh","unstructured":"Razieh Nokhbeh Zaeem , Safa Anya , Alex Issa , Jake Nimergood , Isabelle Rogers , Vinay Shah , Ayush Srivastava , and K. Suzanne Barber . 2020. PrivacyCheck v2: A Tool that Recaps Privacy Policies for You . In 29th ACM International Conference on Information and Knowledge Management (CIKM). ACM. To appear. Razieh Nokhbeh Zaeem, Safa Anya, Alex Issa, Jake Nimergood, Isabelle Rogers, Vinay Shah, Ayush Srivastava, and K. Suzanne Barber. 2020. PrivacyCheck v2: A Tool that Recaps Privacy Policies for You. In 29th ACM International Conference on Information and Knowledge Management (CIKM). ACM. To appear."},{"key":"e_1_3_2_2_22_1","first-page":"169","article-title":"A study of web privacy policies across industries","volume":"13","author":"Zaeem Razieh Nokhbeh","year":"2017","unstructured":"Razieh Nokhbeh Zaeem and K Suzanne Barber . 2017 . A study of web privacy policies across industries . Journal of Information Privacy and Security , Vol. 13 , 4 (2017), 169 -- 185 . Razieh Nokhbeh Zaeem and K Suzanne Barber. 2017. A study of web privacy policies across industries. Journal of Information Privacy and Security, Vol. 13, 4 (2017), 169--185.","journal-title":"Journal of Information Privacy and Security"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3389685"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3127519"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0037"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Sebastian Zimmeck Ziqi Wang Lieyong Zou Roger Iyengar Bin Liu Florian Schaub Shomir Wilson Norman M Sadeh Steven M Bellovin and Joel R Reidenberg. 2017. Automated Analysis of Privacy Requirements for Mobile Apps.. In NDSS.  Sebastian Zimmeck Ziqi Wang Lieyong Zou Roger Iyengar Bin Liu Florian Schaub Shomir Wilson Norman M Sadeh Steven M Bellovin and Joel R Reidenberg. 2017. Automated Analysis of Privacy Requirements for Mobile Apps.. In NDSS.","DOI":"10.14722\/ndss.2017.23034"}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","location":"Virtual Event USA","acronym":"CODASPY '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447827","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447827"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":26,"alternative-id":["10.1145\/3422337.3447827","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3447827","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}