{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T16:42:23Z","timestamp":1776530543513,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-1646130"],"award-info":[{"award-number":["CNS-1646130"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-21-1-0057"],"award-info":[{"award-number":["W911NF-21-1-0057"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484536","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"2824-2843","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["Consistency Analysis of Data-Usage Purposes in Mobile Apps"],"prefix":"10.1145","author":[{"given":"Duc","family":"Bui","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Yuan","family":"Yao","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Kang G.","family":"Shin","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Jong-Min","family":"Choi","sequence":"additional","affiliation":[{"name":"Samsung Research, Seoul, Republic of Korea"}]},{"given":"Junbum","family":"Shin","sequence":"additional","affiliation":[{"name":"CryptoLab, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"42matters AG. 2020. Google Play Categories | 42matters. Retrieved 06\/27\/2020 from https:\/\/42matters.com\/docs\/app-market-data\/android\/apps\/google-play-categories."},{"key":"e_1_3_2_2_2_1","unstructured":"AdGuard. 2021. AdGuard ad filters | AdGuard knowledgebase. Retrieved 03\/12\/2021 from https:\/\/kb.adguard.com\/en\/general\/adguard-ad-filters."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--1--4614--3223--4_4"},{"key":"e_1_3_2_2_4_1","unstructured":"AllenAI. 2020. AllenNLP - Semantic Role Labeling. (2020)."},{"key":"e_1_3_2_2_5_1","unstructured":"Ben Andow. 2020. HtmlToPlaintext. Retrieved 07\/24\/2020 from https:\/\/github.com\/benandow\/HtmlToPlaintext."},{"key":"e_1_3_2_2_6_1","unstructured":"Ben Andow. 2020. PrivacyPolicyAnalysis. Retrieved 04\/10\/2021 from https:\/\/github.com\/benandow\/PrivacyPolicyAnalysis."},{"key":"e_1_3_2_2_7_1","volume-title":"PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Andow Benjamin","year":"2019","unstructured":"Benjamin Andow, Samin Yaseer Mahmud, Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Tao Xie. 2019. PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 585--602."},{"key":"e_1_3_2_2_8_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Andow Benjamin","year":"2020","unstructured":"Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Serge Egelman. 2020. Actions speak louder than words: entity-sensitive privacy policy and data flow analysis with policheck. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 985--1002."},{"key":"e_1_3_2_2_9_1","unstructured":"AppCensus Inc. 2020. AppCensus AppSearch. (2020)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2013.36"},{"key":"e_1_3_2_2_11_1","volume-title":"2017 IEEE 25th International Requirements Engineering Conference (RE), 394--399","author":"Bhatia Jaspreet","unstructured":"Jaspreet Bhatia and Travis D. Breaux. 2017. A data purpose case study of privacy policies. 2017 IEEE 25th International Requirements Engineering Conference (RE), 394--399."},{"key":"e_1_3_2_2_12_1","volume-title":"Semantic Incompleteness in Privacy Policy Goals. In 26th IEEE International Requirements Engineering Conference (RE'18)","author":"Bhatia Jaspreet","unstructured":"Jaspreet Bhatia and Travis D. Breaux. 2018. Semantic Incompleteness in Privacy Policy Goals. In 26th IEEE International Requirements Engineering Conference (RE'18)."},{"key":"e_1_3_2_2_13_1","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS","author":"Bird Sarah","year":"2020","unstructured":"Sarah Bird, Ilana Segall, and Martin Lopatka. 2020. Replication: why we still can't browse in peace: on the uniqueness and reidentifiability of web browsing histories. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). USENIX Association, 489--503."},{"key":"e_1_3_2_2_14_1","unstructured":"Claire Bonial Julia Bonn Kathryn Conger Jena Hwang Martha Palmer and Nicholas Reese. 2015. English PropBank Annotation Guidelines."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0019"},{"key":"e_1_3_2_2_16_1","unstructured":"United States Federal Trade Commission. 1998. Privacy online: a report to Congress. The Commission."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N19--1423"},{"key":"e_1_3_2_2_18_1","unstructured":"Duc Bui. 2021. PurPliance. Retrieved 09\/10\/2021 from https:\/\/github.com\/ducalpha\/PurPlianceOpenSource."},{"key":"e_1_3_2_2_19_1","volume-title":"Contextual Sentence Decomposition. Master's thesis","author":"Haussmann Elmar","unstructured":"Elmar Haussmann. 2011. Contextual Sentence Decomposition. Master's thesis. University of Freiburg."},{"key":"e_1_3_2_2_20_1","unstructured":"Explosion AI. 2020. Models & Languages \u00b7spaCy Usage Documentation. (2020)."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879176"},{"key":"e_1_3_2_2_22_1","unstructured":"Google Chrome DevTools Team. 2020. Puppeteer Tools for Web Developers. Retrieved 02\/05\/2020 from https:\/\/pptr.dev\/."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568276"},{"key":"e_1_3_2_2_24_1","unstructured":"GuoShi. 2020. HttpCanary - HTTP Sniffer\/Capture\/Analysis. Retrieved 06\/12\/2020 from https:\/\/play.google.com\/store\/apps\/details?id=com.guoshi.httpcanary&hl=en_US."},{"key":"e_1_3_2_2_25_1","volume-title":"Paid Apps. In Workshop on Technology and Consumer Protection (ConPro","author":"Han Catherine","year":"2019","unstructured":"Catherine Han, Irwin Reyes, Amit Elazari Bar On, Joel Reardon, Alvaro Feal, Serge Egelman, and Narseo Vallina-Rodriguez. 2019. Do You Get What You Pay For? Comparing the Privacy Behaviors of Free vs. Paid Apps. In Workshop on Technology and Consumer Protection (ConPro 2019). San Francisco, CA, USA."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W16--5615"},{"key":"e_1_3_2_2_27_1","volume-title":"Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Harkous Hamza","year":"2018","unstructured":"Hamza Harkous, Kassem Fawaz, R\u00e9mi Lebret, Florian Schaub, Kang G. Shin, and Karl Aberer. 2018. Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 531--548."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17--1044"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00071"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594315"},{"key":"e_1_3_2_2_31_1","unstructured":"Ilya Sergey. 2019. What does it mean for a program analysis to be sound? SIGPLAN Blog. Retrieved 10\/03\/2020 from https:\/\/blog.sigplan.org\/2019\/08\/07\/what-does-it-mean-for-a-program-analysis-to-be-sound\/."},{"key":"e_1_3_2_2_32_1","unstructured":"Grant Jenks. 2020. Grantjenks\/python-wordsegment. (2020)."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287051"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--94-011--3478--1"},{"key":"e_1_3_2_2_35_1","volume-title":"Martin","author":"Jurafsky Daniel","year":"2019","unstructured":"Daniel Jurafsky and James H. Martin. 2019. Speech and Language Processing, 3rd edition. (Third Edition draft edition).","edition":"3"},{"key":"e_1_3_2_2_36_1","unstructured":"Kaggle. 2020. Data leakage. Retrieved 10\/16\/2020 from https:\/\/kaggle.com\/alexisbcook\/data-leakage."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/0024--3841(74)90075--8"},{"key":"e_1_3_2_2_38_1","unstructured":"Philip Kotler and Gary Armstrong. 2017. Principles of marketing. Pearson education."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.26615\/978-"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.8"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00104"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_3_2_2_43_1","article-title":"Visualizing data using t-sne","volume":"9","author":"van der Maaten Laurens","year":"2008","unstructured":"Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-sne. Journal of machine learning research, 9, Nov, 2579--2605.","journal-title":"Journal of machine learning research"},{"key":"e_1_3_2_2_44_1","volume-title":"Foundations of Statistical Natural Language Processing","author":"Manning Christopher","unstructured":"Christopher Manning and Hinrich Schutze. 1999. Foundations of Statistical Natural Language Processing. MIT Press. 657 pages."},{"key":"e_1_3_2_2_45_1","volume-title":"Introduction to Information Retrieval","author":"Manning Christopher D.","unstructured":"Christopher D. Manning, Prabhakar Raghavan, and Hinrich Sch\u00fctze. 2008. Introduction to Information Retrieval. Cambridge University Press, New York, NY, USA."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/07268609008599430"},{"key":"e_1_3_2_2_47_1","volume-title":"Code Complete","author":"McConnell Steve","unstructured":"Steve McConnell. 2004. Code Complete, Second Edition. Microsoft Press, USA."},{"key":"e_1_3_2_2_48_1","first-page":"39","article-title":"Privacy as Contextual Integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as Contextual Integrity. Washington Law Review, 79, 39.","journal-title":"Washington Law Review"},{"key":"e_1_3_2_2_49_1","unstructured":"Office of the Australian Information Commissioner. 2021. What is personal information? OAIC. Retrieved 04\/21\/2021 from https:\/\/www.oaic.gov.au\/privacy\/guidance-and-advice\/what-is-personal-information\/."},{"key":"e_1_3_2_2_50_1","volume-title":"Workshop on Technology and Consumer Protection (ConPro). Workshop on Technology and Consumer Protection (ConPro 2019), in conjunction with the 39th IEEE Symposium on Security and Privacy","author":"Okoyomon Ehimare","year":"2019","unstructured":"Ehimare Okoyomon, Nikita Samarin, Primal Wijesekera, Amit Elazari Bar On, Narseo Vallina-Rodriguez, Irwin Reyes, \u00c1lvaro Feal, and Serge Egelman. 2019. On the ridiculousness of notice and consent: contradictions in app privacy policies. In Workshop on Technology and Consumer Protection (ConPro). Workshop on Technology and Consumer Protection (ConPro 2019), in conjunction with the 39th IEEE Symposium on Security and Privacy. San Francisco, CA, USA."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18--1191"},{"key":"e_1_3_2_2_52_1","volume-title":"Proc. USENIX Security Symposium (SEC'18)","author":"Pan Xiang","year":"2018","unstructured":"Xiang Pan, Yinzhi Cao, Xuechao Du, Boyuan He, Gan Fang, and Yan Chen. 2018. FlowCog: context-aware semantics extraction and analysis of information flow leaks in android apps. In Proc. USENIX Security Symposium (SEC'18). USENIX Association, Baltimore, MD, USA, 1669--1685."},{"key":"e_1_3_2_2_53_1","volume-title":"Proc. USENIX Security Symposium. Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13)","author":"Pandita Rahul","year":"2013","unstructured":"Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, and Tao Xie. 2013. WHYPER: towards automating risk assessment of mobile applications. In Proc. USENIX Security Symposium. Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13), 527--542."},{"key":"e_1_3_2_2_54_1","volume-title":"Proceedings of the Seventeenth Conference on Computational Natural Language Learning. Association for Computational Linguistics","author":"Pradhan Sameer","year":"2013","unstructured":"Sameer Pradhan, Alessandro Moschitti, Nianwen Xue, Hwee Tou Ng, Anders Bj\u00f6rkelund, Olga Uryupina, Yuchen Zhang, and Zhi Zhong. 2013. Towards Robust Linguistic Analysis using OntoNotes. In Proceedings of the Seventeenth Conference on Computational Natural Language Learning. Association for Computational Linguistics, Sofia, Bulgaria, 143--152."},{"key":"e_1_3_2_2_55_1","volume-title":"Joint Conference on EMNLP and CoNLL-Shared Task. Association for Computational Linguistics, 1--40","author":"Pradhan Sameer","year":"2012","unstructured":"Sameer Pradhan, Alessandro Moschitti, Nianwen Xue, Olga Uryupina, and Yuchen Zhang. 2012. Conll-2012 shared task: modeling multilingual unrestricted coreference in ontonotes. In Joint Conference on EMNLP and CoNLL-Shared Task. Association for Computational Linguistics, 1--40."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660287"},{"key":"e_1_3_2_2_57_1","unstructured":"Ralph Weischedel Martha Palmer Mitchell Marcus Eduard Hovy Sameer Pradhan Lance Ramshaw Nianwen Xue Ann Taylor Jeff Kaufman Michelle Franchini Mohammed El-Bachouti Robert Belvin and Ann Houston. 2013. OntoNotes Release 5.0 LDC2013T19. Linguistic Data Consortium. (2013)."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19--1410"},{"key":"e_1_3_2_2_59_1","volume-title":"Workshop on Technology and Consumer Protection (ConPro","author":"Reyes Irwin","year":"2017","unstructured":"Irwin Reyes, Primal Wiesekera, Abbas Razaghpanah, Joel Reardon, Narseo Vallina-Rodriguez, Serge Egelman, and Christian Kreibich. 2017. \"is our children's apps learning?\" automatically detecting COPPA violations. In Workshop on Technology and Consumer Protection (ConPro 2017). Workshop on Technology and Consumer Protection (ConPro 2017), in conjunction with the 38th IEEE Symposium on Security and Privacy (IEEE S&P 2017). San Jose, CA, USA."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0021"},{"key":"e_1_3_2_2_61_1","volume-title":"Data mining and knowledge discovery handbook","author":"Rokach Lior","unstructured":"Lior Rokach and Oded Maimon. 2005. Clustering methods. In Data mining and knowledge discovery handbook. Springer, 321--352."},{"key":"e_1_3_2_2_62_1","unstructured":"Peng Shi and Jimmy Lin. 2019. Simple BERT Models for Relation Extraction and Semantic Role Labeling. arXiv:1904.05255 [cs]."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0017"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1609\/hcomp.v7i1.5266"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884855"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103702"},{"key":"e_1_3_2_2_67_1","volume-title":"Saksham Chitkara, Kevin Ku, Matt Fredrikson, Jason Hong, and Yuvraj Agarwal.","author":"Srivastava Gaurav","year":"2018","unstructured":"Gaurav Srivastava, Kunal Bhuwalka, Swarup Kumar Sahoo, Saksham Chitkara, Kevin Ku, Matt Fredrikson, Jason Hong, and Yuvraj Agarwal. 2018. PrivacyProxy: Leveraging Crowdsourcing and In Situ Traffic Analysis to Detect and Mitigate Information Leakage. arXiv:1708.06384 [cs]."},{"key":"e_1_3_2_2_68_1","unstructured":"TermsFeed. 2021. Personal vs. sensitive information. Terms-Feed. Retrieved 04\/21\/2021 from https:\/\/www.termsfeed.com\/blog\/personal-vs-sensitive-information\/."},{"key":"e_1_3_2_2_69_1","unstructured":"Iulia Turc Ming-Wei Chang Kenton Lee and Kristina Toutanova. 2019. Well-Read Students Learn Better: On the Importance of Pre-training Compact Models. arXiv:1908.08962 [cs]."},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180196"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16--1126"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.55"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.55"},{"key":"e_1_3_2_2_74_1","volume-title":"23rd USENIX Security Symposium. 23rd USENIX Security Symposium, 1--16","author":"Zimmeck Sebastian","unstructured":"Sebastian Zimmeck and Steven M. Bellovin. 2014. Privee: an architecture for automatically analyzing web privacy policies. In 23rd USENIX Security Symposium. 23rd USENIX Security Symposium, 1--16."},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23034"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484536","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484536","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484536","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:52:43Z","timestamp":1763499163000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484536"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":75,"alternative-id":["10.1145\/3460120.3484536","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484536","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}