{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T10:28:13Z","timestamp":1769164093648,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T00:00:00Z","timestamp":1730678400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2012001"],"award-info":[{"award-number":["CNS-2012001"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,4]]},"DOI":"10.1145\/3646547.3689015","type":"proceedings-article","created":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T09:40:26Z","timestamp":1730454026000},"page":"505-515","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Analyzing Corporate Privacy Policies using AI Chatbots"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8939-6456","authenticated-orcid":false,"given":"Ziyuan","family":"Huang","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5197-2539","authenticated-orcid":false,"given":"Jiaming","family":"Tang","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3775-9176","authenticated-orcid":false,"given":"Manish","family":"Karir","sequence":"additional","affiliation":[{"name":"SignetRisk Analytics, Inc., Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3295-9200","authenticated-orcid":false,"given":"Mingyan","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1431-7434","authenticated-orcid":false,"given":"Armin","family":"Sarabi","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450048"},{"key":"e_1_3_2_1_2_1","volume-title":"PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play. In USENIX Security Symposium. 585--602","author":"Andow Benjamin","year":"2019","unstructured":"Benjamin Andow, Samin Yaseer Mahmud,WenyuWang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Tao Xie. 2019. PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play. In USENIX Security Symposium. 585--602."},{"key":"e_1_3_2_1_3_1","volume-title":"USENIX Security Symposium. 985--1002","author":"Andow Benjamin","year":"2020","unstructured":"Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Serge Egelman. 2020. Actions Speak Louder than Words: Entity-sensitive Privacy Policy and Data Flow Analysis with PoliCheck. In USENIX Security Symposium. 985--1002."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2002.1048502"},{"key":"e_1_3_2_1_5_1","volume-title":"Web Conference. 1943--1954","author":"Kumar Vinayshekhar Bannihatti","year":"2020","unstructured":"Vinayshekhar Bannihatti Kumar, Roger Iyengar, Namita Nisal, Yuanyuan Feng, Hana Habib, Peter Story, Sushain Cherivirala, Margaret Hagan, Lorrie Cranor, Shomir Wilson, et al. 2020. Finding a Choice in a Haystack: Automatic Extraction of Opt-out Statements from Privacy Policy Text. In Web Conference. 1943--1954."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-022-01076-3"},{"key":"e_1_3_2_1_7_1","volume-title":"Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. In USENIX Security Symposium. 531--548","author":"Harkous Hamza","year":"2018","unstructured":"Hamza Harkous, Kassem Fawaz, R\u00e9mi Lebret, Florian Schaub, Kang G Shin, and Karl Aberer. 2018. Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. In USENIX Security Symposium. 531--548."},{"key":"e_1_3_2_1_8_1","volume-title":"Automatic Detection of Vague Words and Sentences in Privacy Policies. arXiv preprint arXiv:1808.06219","author":"Lebanoff Logan","year":"2018","unstructured":"Logan Lebanoff and Fei Liu. 2018. Automatic Detection of Vague Words and Sentences in Privacy Policies. arXiv preprint arXiv:1808.06219 (2018)."},{"key":"e_1_3_2_1_9_1","volume-title":"Automated Text Mining for Requirements Analysis of Policy Documents. In International Requirements Engineering Conference. IEEE, 4--13","author":"Massey Aaron K","year":"2013","unstructured":"Aaron K Massey, Jacob Eisenstein, Annie I Ant\u00f3n, and Peter P Swire. 2013. Automated Text Mining for Requirements Analysis of Policy Documents. In International Requirements Engineering Conference. IEEE, 4--13."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3233\/SW-170283"},{"key":"e_1_3_2_1_11_1","volume-title":"Toward the Cure of Privacy Policy Reading Phobia: Automated Generation of Privacy Nutrition Labels from Privacy Policies. arXiv preprint arXiv:2306.10923","author":"Pan Shidong","year":"2023","unstructured":"Shidong Pan, Thong Hoang, Dawen Zhang, Zhenchang Xing, Xiwei Xu, Qinghua Lu, and Mark Staples. 2023. Toward the Cure of Privacy Policy Reading Phobia: Automated Generation of Privacy Nutrition Labels from Privacy Policies. arXiv preprint arXiv:2306.10923 (2023)."},{"key":"e_1_3_2_1_12_1","volume-title":"Conference on Empirical Methods in Natural Language Processing","author":"Ravichander Abhilasha","unstructured":"Abhilasha Ravichander, Alan W Black, Shomir Wilson, Thomas Norton, and Norman Sadeh. 2019. Question Answering for Privacy Policies: Combining Computational and Legal Perspectives. In Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics, 4949-- 4959."},{"key":"e_1_3_2_1_13_1","volume-title":"Identifying the Provision of Choices in Privacy Policy Text. In Conference on Empirical Methods in Natural Language Processing. 2774--2779","author":"Sathyendra Kanthashree Mysore","year":"2017","unstructured":"Kanthashree Mysore Sathyendra, Shomir Wilson, Florian Schaub, Sebastian Zimmeck, and Norman Sadeh. 2017. Identifying the Provision of Choices in Privacy Policy Text. In Conference on Empirical Methods in Natural Language Processing. 2774--2779."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"e_1_3_2_1_15_1","unstructured":"Chenhao Tang Zhengliang Liu Chong Ma Zihao Wu Yiwei Li Wei Liu Dajiang Zhu Quanzheng Li Xiang Li Tianming Liu et al. 2023. PolicyGPT: Automated Analysis of Privacy Policies with Large Language Models. arXiv preprint arXiv:2309.10238 (2023)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.21105\/joss.03557"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1126"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230665"},{"key":"e_1_3_2_1_19_1","volume-title":"Privee: An Architecture for Automatically Analyzing Web Privacy Policies. In USENIX Security Symposium. 1--16","author":"Zimmeck Sebastian","year":"2014","unstructured":"Sebastian Zimmeck and Steven M Bellovin. 2014. Privee: An Architecture for Automatically Analyzing Web Privacy Policies. In USENIX Security Symposium. 1--16."},{"key":"e_1_3_2_1_20_1","volume-title":"MAPS: Scaling Privacy Compliance Analysis to a Million Apps. Privacy Enhancing Technologies","author":"Zimmeck Sebastian","year":"2019","unstructured":"Sebastian Zimmeck, Peter Story, Daniel Smullen, Abhilasha Ravichander, Ziqi Wang, Joel Reidenberg, N Cameron Russell, and Norman Sadeh. 2019. MAPS: Scaling Privacy Compliance Analysis to a Million Apps. Privacy Enhancing Technologies (2019)."},{"key":"e_1_3_2_1_21_1","volume-title":"Automated Analysis of Privacy Requirements for Mobile Apps. In AAAI Fall Symposium Series.","author":"Zimmeck Sebastian","year":"2016","unstructured":"Sebastian Zimmeck, Ziqi Wang, Lieyong Zou, Roger Iyengar, Bin Liu, Florian Schaub, Shomir Wilson, Norman Sadeh, Steven Bellovin, and Joel Reidenberg. 2016. Automated Analysis of Privacy Requirements for Mobile Apps. In AAAI Fall Symposium Series."}],"event":{"name":"IMC '24: ACM Internet Measurement Conference","location":"Madrid Spain","acronym":"IMC '24","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2024 ACM on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3646547.3689015","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3646547.3689015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T11:49:13Z","timestamp":1755863353000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3646547.3689015"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,4]]},"references-count":21,"alternative-id":["10.1145\/3646547.3689015","10.1145\/3646547"],"URL":"https:\/\/doi.org\/10.1145\/3646547.3689015","relation":{},"subject":[],"published":{"date-parts":[[2024,11,4]]},"assertion":[{"value":"2024-11-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}