{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T17:56:24Z","timestamp":1775066184625,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T00:00:00Z","timestamp":1624233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,21]]},"DOI":"10.1145\/3462757.3466081","type":"proceedings-article","created":{"date-parts":[[2021,7,28]],"date-time":"2021-07-28T06:50:46Z","timestamp":1627455046000},"page":"40-49","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["A combined rule-based and machine learning approach for automated GDPR compliance checking"],"prefix":"10.1145","author":[{"given":"Rajaa El","family":"Hamdani","sequence":"first","affiliation":[{"name":"HEC Paris, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Majd","family":"Mustapha","sequence":"additional","affiliation":[{"name":"EURA NOVA, Belgium"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David Restrepo","family":"Amariles","sequence":"additional","affiliation":[{"name":"HEC Paris, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aurore","family":"Troussel","sequence":"additional","affiliation":[{"name":"Steptoe &amp; Johnson LLP, Belgium"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S\u00e9bastien","family":"Mee\u00f9s","sequence":"additional","affiliation":[{"name":"HEC Paris, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Katsiaryna","family":"Krasnashchok","sequence":"additional","affiliation":[{"name":"EURA NOVA, Belgium"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2021,7,27]]},"reference":[{"key":"e_1_3_2_1_3_1","volume-title":"Aurore Cl\u00e9ment Troussel, and Rajaa El Hamdani","author":"Amariles David Restrepo","year":"2020","unstructured":"David Restrepo Amariles , Aurore Cl\u00e9ment Troussel, and Rajaa El Hamdani . 2020 . Compliance Generation for Privacy Documents under GDPR : A Roadmap for Implementing Automation and Machine Learning . arXiv preprint arXiv:2012.12718 (2020). David Restrepo Amariles, Aurore Cl\u00e9ment Troussel, and Rajaa El Hamdani. 2020. Compliance Generation for Privacy Documents under GDPR: A Roadmap for Implementing Automation and Machine Learning. arXiv preprint arXiv:2012.12718 (2020)."},{"key":"e_1_3_2_1_4_1","volume-title":"Yuan Cao, George Foster, Colin Cherry, et al.","author":"Arivazhagan Naveen","year":"2019","unstructured":"Naveen Arivazhagan , Ankur Bapna , Orhan Firat , Dmitry Lepikhin , Melvin Johnson , Maxim Krikun , Mia Xu Chen , Yuan Cao, George Foster, Colin Cherry, et al. 2019 . Massively multilingual neural machine translation in the wild: Findings and challenges. arXiv preprint arXiv:1907.05019 (2019). Naveen Arivazhagan, Ankur Bapna, Orhan Firat, Dmitry Lepikhin, Melvin Johnson, Maxim Krikun, Mia Xu Chen, Yuan Cao, George Foster, Colin Cherry, et al. 2019. Massively multilingual neural machine translation in the wild: Findings and challenges. arXiv preprint arXiv:1907.05019 (2019)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2016.20"},{"key":"e_1_3_2_1_6_1","volume-title":"Claudette meets gdpr: Automating the evaluation of privacy policies using artificial intelligence. Available at SSRN 3208596","author":"Contissa Giuseppe","year":"2018","unstructured":"Giuseppe Contissa , Koen Docter , Francesca Lagioia , Marco Lippi , Hans- W Micklitz , Przemys\u0142aw Pa\u0142ka , Giovanni Sartor , and Paolo Torroni . 2018. Claudette meets gdpr: Automating the evaluation of privacy policies using artificial intelligence. Available at SSRN 3208596 ( 2018 ). Giuseppe Contissa, Koen Docter, Francesca Lagioia, Marco Lippi, Hans-W Micklitz, Przemys\u0142aw Pa\u0142ka, Giovanni Sartor, and Paolo Torroni. 2018. Claudette meets gdpr: Automating the evaluation of privacy policies using artificial intelligence. Available at SSRN 3208596 (2018)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381979"},{"key":"e_1_3_2_1_8_1","volume-title":"Transformer-xl: Attentive language models beyond a fixed-length context. arXiv preprint arXiv:1901.02860","author":"Dai Zihang","year":"2019","unstructured":"Zihang Dai , Zhilin Yang , Yiming Yang , Jaime Carbonell , Quoc V Le , and Ruslan Salakhutdinov . 2019 . Transformer-xl: Attentive language models beyond a fixed-length context. arXiv preprint arXiv:1901.02860 (2019). Zihang Dai, Zhilin Yang, Yiming Yang, Jaime Carbonell, Quoc V Le, and Ruslan Salakhutdinov. 2019. Transformer-xl: Attentive language models beyond a fixed-length context. arXiv preprint arXiv:1901.02860 (2019)."},{"key":"e_1_3_2_1_9_1","volume-title":"International Joint Conference on Rules and Reasoning. Springer, 36--51","author":"Vos Marina De","year":"2019","unstructured":"Marina De Vos , Sabrina Kirrane , Julian Padget , and Ken Satoh . 2019 . ODRL policy modelling and compliance checking . In International Joint Conference on Rules and Reasoning. Springer, 36--51 . Marina De Vos, Sabrina Kirrane, Julian Padget, and Ken Satoh. 2019. ODRL policy modelling and compliance checking. In International Joint Conference on Rules and Reasoning. Springer, 36--51."},{"key":"e_1_3_2_1_10_1","volume-title":"Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin , Ming-Wei Chang , Kenton Lee , and Kristina Toutanova . 2018 . Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018). Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. Bert: Pre-training of deep bidirectional transformers for language understanding. arXiv preprint arXiv:1810.04805 (2018)."},{"key":"e_1_3_2_1_11_1","volume-title":"Privacy CURE: Consent Comprehension Made Easy. In IFIP International Conference on ICT Systems Security and Privacy Protection. Springer, 124--139","author":"Drozd Olha","year":"2020","unstructured":"Olha Drozd and Sabrina Kirrane . 2020 . Privacy CURE: Consent Comprehension Made Easy. In IFIP International Conference on ICT Systems Security and Privacy Protection. Springer, 124--139 . Olha Drozd and Sabrina Kirrane. 2020. Privacy CURE: Consent Comprehension Made Easy. In IFIP International Conference on ICT Systems Security and Privacy Protection. Springer, 124--139."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45563-0_19"},{"key":"e_1_3_2_1_13_1","unstructured":"Guido Governatori and Sidney Shek. 2012. Rule Based Business Process Compliance.. In RuleML (2). Citeseer.  Guido Governatori and Sidney Shek. 2012. Rule Based Business Process Compliance.. In RuleML (2). Citeseer."},{"key":"e_1_3_2_1_14_1","volume-title":"Polisis: Automated analysis and presentation of privacy policies using deep learning. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 531--548.","author":"Harkous Hamza","year":"2018","unstructured":"Hamza Harkous , Kassem Fawaz , R\u00e9mi Lebret , Florian Schaub , Kang G Shin , and Karl Aberer . 2018 . Polisis: Automated analysis and presentation of privacy policies using deep learning. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 531--548. Hamza Harkous, Kassem Fawaz, R\u00e9mi Lebret, Florian Schaub, Kang G Shin, and Karl Aberer. 2018. Polisis: Automated analysis and presentation of privacy policies using deep learning. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 531--548."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32689-9_4"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-015-9558-1"},{"key":"e_1_3_2_1_17_1","volume-title":"Ontologies: State of the art, business potential, and grand challenges. Ontology Management","author":"Hepp Martin","year":"2008","unstructured":"Martin Hepp . 2008 . Ontologies: State of the art, business potential, and grand challenges. Ontology Management (2008), 3--22. Martin Hepp. 2008. Ontologies: State of the art, business potential, and grand challenges. Ontology Management (2008), 3--22."},{"key":"e_1_3_2_1_18_1","volume-title":"Long short-term memory. Neural computation 9, 8","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber . 1997. Long short-term memory. Neural computation 9, 8 ( 1997 ), 1735--1780. Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735--1780."},{"key":"e_1_3_2_1_19_1","volume-title":"Towards Privacy Policy Conceptual Modeling. In International Conference on Conceptual Modeling. Springer, 429--438","author":"Krasnashchok Katsiaryna","year":"2020","unstructured":"Katsiaryna Krasnashchok , Majd Mustapha , Anas Al Bassit , and Sabri Skhiri . 2020 . Towards Privacy Policy Conceptual Modeling. In International Conference on Conceptual Modeling. Springer, 429--438 . Katsiaryna Krasnashchok, Majd Mustapha, Anas Al Bassit, and Sabri Skhiri. 2020. Towards Privacy Policy Conceptual Modeling. In International Conference on Conceptual Modeling. Springer, 429--438."},{"key":"e_1_3_2_1_20_1","volume-title":"Automatic detection of vague words and sentences in privacy policies. arXiv preprint arXiv:1808.06219","author":"Lebanoff Logan","year":"2018","unstructured":"Logan Lebanoff and Fei Liu . 2018. Automatic detection of vague words and sentences in privacy policies. arXiv preprint arXiv:1808.06219 ( 2018 ). Logan Lebanoff and Fei Liu. 2018. Automatic detection of vague words and sentences in privacy policies. arXiv preprint arXiv:1808.06219 (2018)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_22_1","volume-title":"Zero-shot relation extraction via reading comprehension. arXiv preprint arXiv:1706.04115","author":"Levy Omer","year":"2017","unstructured":"Omer Levy , Minjoon Seo , Eunsol Choi , and Luke Zettlemoyer . 2017. Zero-shot relation extraction via reading comprehension. arXiv preprint arXiv:1706.04115 ( 2017 ). Omer Levy, Minjoon Seo, Eunsol Choi, and Luke Zettlemoyer. 2017. Zero-shot relation extraction via reading comprehension. arXiv preprint arXiv:1706.04115 (2017)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0004"},{"key":"e_1_3_2_1_24_1","volume-title":"Nicole Lee Fella, and Kexin Liao","author":"Liu Fei","year":"2018","unstructured":"Fei Liu , Nicole Lee Fella, and Kexin Liao . 2018 . Modeling language vagueness in privacy policies using deep neural networks. arXiv preprint arXiv:1805.10393 (2018). Fei Liu, Nicole Lee Fella, and Kexin Liao. 2018. Modeling language vagueness in privacy policies using deep neural networks. arXiv preprint arXiv:1805.10393 (2018)."},{"key":"e_1_3_2_1_26_1","volume-title":"Caiming Xiong, and Richard Socher.","author":"McCann Bryan","year":"2018","unstructured":"Bryan McCann , Nitish Shirish Keskar , Caiming Xiong, and Richard Socher. 2018 . The natural language decathlon: Multitask learning as question answering. arXiv preprint arXiv:1806.08730 (2018). Bryan McCann, Nitish Shirish Keskar, Caiming Xiong, and Richard Socher. 2018. The natural language decathlon: Multitask learning as question answering. arXiv preprint arXiv:1806.08730 (2018)."},{"key":"e_1_3_2_1_27_1","unstructured":"Tomas Mikolov Kai Chen G. S. Corrado and J. Dean. 2013. Efficient Estimation of Word Representations in Vector Space. In ICLR.  Tomas Mikolov Kai Chen G. S. Corrado and J. Dean. 2013. Efficient Estimation of Word Representations in Vector Space. In ICLR."},{"key":"e_1_3_2_1_28_1","volume-title":"Anas Al Bassit, and Sabri Skhiri","author":"Mustapha Majd","year":"2020","unstructured":"Majd Mustapha , Katsiaryna Krasnashchok , Anas Al Bassit, and Sabri Skhiri . 2020 . Privacy Policy Classification with XLNet (Short Paper). In Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer , 250--257. Majd Mustapha, Katsiaryna Krasnashchok, Anas Al Bassit, and Sabri Skhiri. 2020. Privacy Policy Classification with XLNet (Short Paper). In Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, 250--257."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58201-2_25"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98349-3_11"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3233\/FAIA200874"},{"key":"e_1_3_2_1_32_1","volume-title":"Deep Active Learning with Crowdsourcing Data for Privacy Policy Classification. arXiv preprint arXiv:2008.02954","author":"Qiu Wenjun","year":"2020","unstructured":"Wenjun Qiu and David Lie . 2020. Deep Active Learning with Crowdsourcing Data for Privacy Policy Classification. arXiv preprint arXiv:2008.02954 ( 2020 ). Wenjun Qiu and David Lie. 2020. Deep Active Learning with Crowdsourcing Data for Privacy Policy Classification. arXiv preprint arXiv:2008.02954 (2020)."},{"key":"e_1_3_2_1_33_1","volume-title":"Exploring the limits of transfer learning with a unified text-to-text transformer. arXiv preprint arXiv:1910.10683","author":"Raffel Colin","year":"2019","unstructured":"Colin Raffel , Noam Shazeer , Adam Roberts , Katherine Lee , Sharan Narang , Michael Matena , Yanqi Zhou , Wei Li , and Peter J Liu . 2019. Exploring the limits of transfer learning with a unified text-to-text transformer. arXiv preprint arXiv:1910.10683 ( 2019 ). Colin Raffel, Noam Shazeer, Adam Roberts, Katherine Lee, Sharan Narang, Michael Matena, Yanqi Zhou, Wei Li, and Peter J Liu. 2019. Exploring the limits of transfer learning with a unified text-to-text transformer. arXiv preprint arXiv:1910.10683 (2019)."},{"key":"e_1_3_2_1_34_1","volume-title":"Know what you don't know: Unanswerable questions for SQuAD. arXiv preprint arXiv:1806.03822","author":"Rajpurkar Pranav","year":"2018","unstructured":"Pranav Rajpurkar , Robin Jia , and Percy Liang . 2018. Know what you don't know: Unanswerable questions for SQuAD. arXiv preprint arXiv:1806.03822 ( 2018 ). Pranav Rajpurkar, Robin Jia, and Percy Liang. 2018. Know what you don't know: Unanswerable questions for SQuAD. arXiv preprint arXiv:1806.03822 (2018)."},{"key":"e_1_3_2_1_35_1","volume-title":"Question answering for privacy policies: Combining computational and legal perspectives. arXiv preprint arXiv:1911.00841","author":"Ravichander Abhilasha","year":"2019","unstructured":"Abhilasha Ravichander , Alan W Black , Shomir Wilson , Thomas Norton , and Norman Sadeh . 2019. Question answering for privacy policies: Combining computational and legal perspectives. arXiv preprint arXiv:1911.00841 ( 2019 ). Abhilasha Ravichander, Alan W Black, Shomir Wilson, Thomas Norton, and Norman Sadeh. 2019. Question answering for privacy policies: Combining computational and legal perspectives. arXiv preprint arXiv:1911.00841 (2019)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1086\/688669"},{"key":"e_1_3_2_1_37_1","unstructured":"Community Research and Development Information Service. 2021. Business Process Re-engineering and functional toolkit for GDPR compliance. https:\/\/cordis.europa.eu\/project\/id\/787149\/results. Accessed: 2021-02-28.  Community Research and Development Information Service. 2021. Business Process Re-engineering and functional toolkit for GDPR compliance. https:\/\/cordis.europa.eu\/project\/id\/787149\/results. Accessed: 2021-02-28."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1294"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-010-0175-9"},{"key":"e_1_3_2_1_40_1","first-page":"10","article-title":"DPMF: A Modeling Framework for Data Protection by Design","volume":"15","author":"Sion Laurens","year":"2020","unstructured":"Laurens Sion , Pierre Dewitte , Dimitri Van Landuyt , Kim Wuyts , Peggy Valcke , and Wouter Joosen . 2020 . DPMF: A Modeling Framework for Data Protection by Design . Enterprise Modelling and Information Systems Architectures (EMISAJ) 15 (2020), 10 -- 11 . Laurens Sion, Pierre Dewitte, Dimitri Van Landuyt, Kim Wuyts, Peggy Valcke, and Wouter Joosen. 2020. DPMF: A Modeling Framework for Data Protection by Design. Enterprise Modelling and Information Systems Architectures (EMISAJ) 15 (2020), 10--1.","journal-title":"Enterprise Modelling and Information Systems Architectures (EMISAJ)"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-1146"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180445.3180447"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE48521.2020.00025"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MODELS.2019.00-20"},{"key":"e_1_3_2_1_45_1","first-page":"963","article-title":"Efficient Full Compliance Checking of Concurrent Components for business Process Models","volume":"6","author":"Tosatto Silvano Colombo","year":"2019","unstructured":"Silvano Colombo Tosatto , Guido Governatori , Nick van Beest , and Francesco Olivieri . 2019 . Efficient Full Compliance Checking of Concurrent Components for business Process Models . FLAP 6 , 5 (2019), 963 -- 998 . Silvano Colombo Tosatto, Guido Governatori, Nick van Beest, and Francesco Olivieri. 2019. Efficient Full Compliance Checking of Concurrent Components for business Process Models. FLAP 6, 5 (2019), 963--998.","journal-title":"FLAP"},{"key":"e_1_3_2_1_46_1","volume-title":"Legal method and the rule of law","author":"Urbina Sebastian","unstructured":"Sebastian Urbina . 2002. Legal method and the rule of law . Vol. 59 . Springer Science & Business Media . Sebastian Urbina. 2002. Legal method and the rule of law. Vol. 59. Springer Science & Business Media."},{"key":"e_1_3_2_1_47_1","volume-title":"Attention is all you need. arXiv preprint arXiv:1706.03762","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani , Noam Shazeer , Niki Parmar , Jakob Uszkoreit , Llion Jones , Aidan N Gomez , Lukasz Kaiser , and Illia Polosukhin . 2017. Attention is all you need. arXiv preprint arXiv:1706.03762 ( 2017 ). Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Lukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. arXiv preprint arXiv:1706.03762 (2017)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1126"},{"key":"e_1_3_2_1_49_1","volume-title":"Le","author":"Yang Z.","year":"2019","unstructured":"Z. Yang , Zihang Dai , Yiming Yang , J. Carbonell , R. Salakhutdinov , and Quoc V . Le . 2019 . XLNet: Generalized Autoregressive Pretraining for Language Understanding. In NeurIPS. Z. Yang, Zihang Dai, Yiming Yang, J. Carbonell, R. Salakhutdinov, and Quoc V. Le. 2019. XLNet: Generalized Autoregressive Pretraining for Language Understanding. In NeurIPS."},{"key":"e_1_3_2_1_50_1","volume-title":"Benchmarking zero-shot text classification: Datasets, evaluation and entailment approach. arXiv preprint arXiv:1909.00161","author":"Yin Wenpeng","year":"2019","unstructured":"Wenpeng Yin , Jamaal Hay , and Dan Roth . 2019. Benchmarking zero-shot text classification: Datasets, evaluation and entailment approach. arXiv preprint arXiv:1909.00161 ( 2019 ). Wenpeng Yin, Jamaal Hay, and Dan Roth. 2019. Benchmarking zero-shot text classification: Datasets, evaluation and entailment approach. arXiv preprint arXiv:1909.00161 (2019)."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3127519"},{"key":"e_1_3_2_1_52_1","volume-title":"A review on multi-label learning algorithms","author":"Zhang Min-Ling","year":"2013","unstructured":"Min-Ling Zhang and Zhi-Hua Zhou . 2013. A review on multi-label learning algorithms . IEEE transactions on knowledge and data engineering 26, 8 ( 2013 ), 1819--1837. Min-Ling Zhang and Zhi-Hua Zhou. 2013. A review on multi-label learning algorithms. IEEE transactions on knowledge and data engineering 26, 8 (2013), 1819--1837."},{"key":"e_1_3_2_1_53_1","volume-title":"Zero-shot open entity typing as type-compatible grounding. arXiv preprint arXiv:1907.03228","author":"Zhou Ben","year":"2019","unstructured":"Ben Zhou , Daniel Khashabi , Chen-Tse Tsai , and Dan Roth . 2019. Zero-shot open entity typing as type-compatible grounding. arXiv preprint arXiv:1907.03228 ( 2019 ). Ben Zhou, Daniel Khashabi, Chen-Tse Tsai, and Dan Roth. 2019. Zero-shot open entity typing as type-compatible grounding. arXiv preprint arXiv:1907.03228 (2019)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0037"}],"event":{"name":"ICAIL '21: Eighteenth International Conference for Artificial Intelligence and Law","location":"S\u00e3o Paulo Brazil","acronym":"ICAIL '21","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence"]},"container-title":["Proceedings of the Eighteenth International Conference on Artificial Intelligence and Law"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3462757.3466081","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3462757.3466081","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:31Z","timestamp":1750195711000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3462757.3466081"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,21]]},"references-count":51,"alternative-id":["10.1145\/3462757.3466081","10.1145\/3462757"],"URL":"https:\/\/doi.org\/10.1145\/3462757.3466081","relation":{},"subject":[],"published":{"date-parts":[[2021,6,21]]},"assertion":[{"value":"2021-07-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}