{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T17:25:10Z","timestamp":1768411510842,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":74,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,1,5]],"date-time":"2024-01-05T00:00:00Z","timestamp":1704412800000},"content-version":"vor","delay-in-days":452,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1951411"],"award-info":[{"award-number":["1951411"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3551349.3561155","type":"proceedings-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T20:43:54Z","timestamp":1672951434000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Unsupervised Summarization of Privacy Concerns in Mobile Application Reviews"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5914-8638","authenticated-orcid":false,"given":"Fahimeh","family":"Ebrahimi","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, Louisiana State University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8353-5286","authenticated-orcid":false,"given":"Anas","family":"Mahmoud","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Louisiana State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"e_1_3_2_1_2_1","volume-title":"International Conference on Learning Representations.","author":"Arora Sanjeev","year":"2016","unstructured":"Sanjeev Arora, Yingyu Liang, and Tengyu Ma. 2016. A simple but tough-to-beat baseline for sentence embeddings. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54494-5_19"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3024180"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678872"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJISP.2020100105"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2018.00025"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063663"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944937"},{"key":"e_1_3_2_1_10_1","volume-title":"COVID-19 Apps: Privacy and Security Concerns","author":"Borra Surekha","unstructured":"Surekha Borra. 2020. COVID-19 Apps: Privacy and Security Concerns. Springer Singapore."},{"key":"e_1_3_2_1_11_1","first-page":"31","article-title":"Normalized (pointwise) mutual information in collocation extraction","volume":"30","author":"Bouma Gerlof","year":"2009","unstructured":"Gerlof Bouma. 2009. Normalized (pointwise) mutual information in collocation extraction. German Society for Computational Linguistics 30 (2009), 31\u201340.","journal-title":"German Society for Computational Linguistics"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568263"},{"key":"e_1_3_2_1_13_1","unstructured":"Jackie Cheung. 2008. Comparing abstractive and extractive summarization of evaluative text: controversiality and content selection. Thesis in the Department of Computer Science of the Faculty of Science University of British Columbia 47 (2008)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884612"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022167820937498"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.2583"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2316"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2930519"},{"key":"e_1_3_2_1_19_1","volume-title":"The Promise of the Sharing Economy Among Disadvantaged Communities. In Annual ACM Conference on Human Factors in Computing Systems. 2285\u20132294","author":"Dillahunt Tawanna","year":"2015","unstructured":"Tawanna Dillahunt and Amelia Malone. 2015. The Promise of the Sharing Economy Among Disadvantaged Communities. In Annual ACM Conference on Human Factors in Computing Systems. 2285\u20132294."},{"key":"e_1_3_2_1_20_1","volume-title":"Mobile App Privacy in Software Engineering Research: A Systematic Mapping Study. Information and Software Technology 133","author":"Ebrahimi Fahimeh","year":"2020","unstructured":"Fahimeh Ebrahimi, Miroslav Tushev, and Anas Mahmoud. 2020. Mobile App Privacy in Software Engineering Research: A Systematic Mapping Study. Information and Software Technology 133 (2020)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0307752101"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2016.10.002"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.57"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380924"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.88"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.881692"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.02.010"},{"key":"e_1_3_2_1_28_1","volume-title":"Empirical Study of Topic Modeling in Twitter. In Workshop on Social Media Analytics. 80\u201388","author":"Hong Liangjie","year":"2010","unstructured":"Liangjie Hong and Brian Davison. 2010. Empirical Study of Topic Modeling in Twitter. In Workshop on Social Media Analytics. 80\u201388."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414536.2414578"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9617-6"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.31"},{"key":"e_1_3_2_1_32_1","volume-title":"Apps and privacy: More than half of app users have uninstalled or decided to not install an app due to concerns about their personal information. Retrieved","author":"Internet Pew","year":"2022","unstructured":"Pew Internet. 2012. Apps and privacy: More than half of app users have uninstalled or decided to not install an app due to concerns about their personal information. Retrieved May 2022 from https:\/\/www.pewresearch.org\/internet\/2012\/09\/05\/privacy-and-data-management-on-mobile-devices-2\/"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9605-x"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Tom Kenter Alexey Borisov and Maarten Rijke. 2016. Siamese cbow: Optimizing word embeddings for sentence representations. arXiv preprint arXiv:1606.04640(2016).","DOI":"10.18653\/v1\/P16-1089"},{"key":"e_1_3_2_1_35_1","volume-title":"International Advancement of Artificial Intelligence Conference on Weblogs and Social Media.","author":"Khabiri Elham","year":"2011","unstructured":"Elham Khabiri, James Caverlee, and Chiao-Fang Hsu. 2011. Summarizing user-contributed comments. In International Advancement of Artificial Intelligence Conference on Weblogs and Social Media."},{"key":"e_1_3_2_1_36_1","volume-title":"What do mobile app users complain about?IEEE Software 32, 3","author":"Khalid Hammad","year":"2015","unstructured":"Hammad Khalid, Emad Shihab, Meiyappan Nagappan, and Ahmed Hassan. 2015. What do mobile app users complain about?IEEE Software 32, 3 (2015), 70\u201377."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2017.86"},{"key":"e_1_3_2_1_38_1","volume-title":"International conference on machine learning. 1188\u20131196","author":"Le Quoc","year":"2014","unstructured":"Quoc Le and Tomas Mikolov. 2014. Distributed representations of sentences and documents. In International conference on machine learning. 1188\u20131196."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.04.001"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v8i1.14575"},{"key":"e_1_3_2_1_41_1","volume-title":"Can mental health apps be effective for depression, anxiety, and stress during a pandemic?Practice Innovations 6, 2","author":"Longyear Robert","year":"2021","unstructured":"Robert Longyear and Kostadin Kushlev. 2021. Can mental health apps be effective for depression, anxiety, and stress during a pandemic?Practice Innovations 6, 2 (2021), 131\u2013137."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.3115\/1118108.1118117"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2015.7320414"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-016-0252-8"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Chris Martin. 2016. The sharing economy: A pathway to sustainability or a nightmarish form of neoliberal capitalism?Ecological Economics 121(2016) 149\u2013159.","DOI":"10.1016\/j.ecolecon.2015.11.027"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2630689"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9375-7"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3141771"},{"key":"e_1_3_2_1_49_1","volume-title":"Weakly-Supervised Neural Text Classification. In ACM International Conference on Information and Knowledge Management. 983\u2013992","author":"Meng Yu","year":"2018","unstructured":"Yu Meng, Jiaming Shen, Chao Zhang, and Jiawei Han. 2018. Weakly-Supervised Neural Text Classification. In ACM International Conference on Information and Knowledge Management. 983\u2013992."},{"key":"e_1_3_2_1_50_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg Corrado and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in Neural Information Processing Systems. 3111\u20133119."},{"key":"e_1_3_2_1_51_1","volume-title":"Mining and Analysis of Apps in Google Play. In International Conference on Web Information Systems and Technologies. 527\u2013535","author":"Mokarizadeh Shahab","year":"2013","unstructured":"Shahab Mokarizadeh, Mohammad Rahman, and Mihhail Matskin. 2013. Mining and Analysis of Apps in Google Play. In International Conference on Web Information Systems and Technologies. 527\u2013535."},{"key":"e_1_3_2_1_52_1","unstructured":"Debjyoti Mukherjee Alireza Ahmadi Maryam VahdatPour and Joel Reardon. 2020. An Empirical Study on User Reviews Targeting Mobile Apps\u2019 Security & Privacy. arXiv preprint arXiv:2010.06371(2020)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2993259.2993266"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00012"},{"key":"e_1_3_2_1_55_1","volume-title":"International Conference on Software Engineering - Software Engineering in Society.","author":"Mohamed\u00a0Abdelrazek Omar\u00a0Haggag John Grundy","year":"2021","unstructured":"John Grundy Mohamed\u00a0Abdelrazek Omar\u00a0Haggag, Sherif\u00a0Haggag. 2021. COVID-19 Vs Social Media apps: Does privacy really matter?. In International Conference on Software Engineering - Software Engineering in Society."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332474"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052691"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.26"},{"key":"e_1_3_2_1_60_1","volume-title":"Retrieved","author":"PYMNTS.","year":"2021","unstructured":"PYMNTS. 2021. High-Speed Traders Pay Robinhood $331 Million In Q1 To Execute Trades. Retrieved October 15, 2021 from https:\/\/www.pymnts.com\/earnings\/2021\/high-speed-traders-pay-robinhood-331-million-dollars-q1-execute-trades\/"},{"key":"e_1_3_2_1_61_1","unstructured":"Amir Sadeghian and Alireza Sharafat. 2015. Bag of words meets bags of popcorn. (2015)."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"crossref","unstructured":"Hani Safadi Weifeng Li Pouya Rahmati Saber Soleymani Krzysztof Kochut and Amit Sheth. 2020. Curtailing Fake News Propagation with Psychographics. SSRN Electronic Journal(2020).","DOI":"10.2139\/ssrn.3558236"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950299"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"Lauren Squires. Language in society. Enregistering internet language. 2010 39 4 (Language in society) 457\u2013492.","DOI":"10.1017\/S0047404510000412"},{"key":"e_1_3_2_1_65_1","volume-title":"The pandemic has more than doubled food-delivery apps business. Now what?Retrieved","author":"Sumagaysay Levi","year":"2021","unstructured":"Levi Sumagaysay. 2020. The pandemic has more than doubled food-delivery apps business. Now what?Retrieved October 15, 2021 from https:\/\/www.marketwatch.com."},{"key":"e_1_3_2_1_66_1","volume-title":"Privacy in a Time of COVID-19: How Concerned Are You?IEEE Security and Privacy 19, 5","author":"Trestian Ramona","year":"2021","unstructured":"Ramona Trestian, Guodong Xie, Pintu Lohar, Edoardo Celeste, Malika Bendechache, Rob Brennan, Evgeniia Jayasekera, Regina Connolly, and Irina Tal. 2021. Privacy in a Time of COVID-19: How Concerned Are You?IEEE Security and Privacy 19, 5 (2021), 26\u201335."},{"key":"e_1_3_2_1_67_1","volume-title":"Domain-Specific Analysis of Mobile App Reviews Using Keyword-Assisted Topic Models. In International Conference on Software Engineering.","author":"Tushev Miroslav","year":"2022","unstructured":"Miroslav Tushev, Fahimeh Ebrahimi, and Anas Mahmoud. 2022. Domain-Specific Analysis of Mobile App Reviews Using Keyword-Assisted Topic Models. In International Conference on Software Engineering."},{"key":"e_1_3_2_1_68_1","volume-title":"International Conference on Information Systems. 1\u201311","author":"Vakulenko Svitlana","year":"2014","unstructured":"Svitlana Vakulenko, Oliver M\u00fcller, and Jan Brocke. 2014. Enriching iTunes App Store categories via topic modeling. In International Conference on Information Systems. 1\u201311."},{"key":"e_1_3_2_1_69_1","volume-title":"Requirements Engineering: From System Goals to UML Models to Software Specifications","author":"van Lamsweerde Axel","year":"2009","unstructured":"Axel van Lamsweerde. 2009. Requirements Engineering: From System Goals to UML Models to Software Specifications. Wiley."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414536.2414577"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180196"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.1977"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-020-00274-7"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488514"}],"event":{"name":"ASE '22: 37th IEEE\/ACM International Conference on Automated Software Engineering","location":"Rochester MI USA","acronym":"ASE '22"},"container-title":["Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3561155","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3561155","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3561155","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T08:26:57Z","timestamp":1755851217000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3561155"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":74,"alternative-id":["10.1145\/3551349.3561155","10.1145\/3551349"],"URL":"https:\/\/doi.org\/10.1145\/3551349.3561155","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2023-01-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}