{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T08:00:19Z","timestamp":1776931219668,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","funder":[{"name":"Ministry of Communications and Digital Affairs (KemKomdigi)","award":["B-2669\/BLSDM.1\/LT.02.03\/12\/2023"],"award-info":[{"award-number":["B-2669\/BLSDM.1\/LT.02.03\/12\/2023"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,13]]},"DOI":"10.1145\/3733802.3764051","type":"proceedings-article","created":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:38:21Z","timestamp":1763458701000},"page":"134-146","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["CI-PDP: A Framework for LLM-Based Privacy Policy Evaluation under Contextual Integrity and Indonesia\u2019s PDP Law"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-0624-608X","authenticated-orcid":false,"given":"Vero Arneal","family":"Octora","sequence":"first","affiliation":[{"name":"Cybersecurity and Digital Forensics, School of Computing, Telkom University, Bandung, West Java, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1875-0219","authenticated-orcid":false,"given":"Yudhistira","family":"Nugraha","sequence":"additional","affiliation":[{"name":"Cybersecurity and Digital Forensics, School of Computing, Telkom University, Bandung, West Java, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5614-2276","authenticated-orcid":false,"given":"Muhamad Erza","family":"Aminanto","sequence":"additional","affiliation":[{"name":"Cyber Security, Monash University Indonesia, Tangerang, Banten, Indonesia"}]}],"member":"320","published-online":{"date-parts":[[2025,11,18]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3323994.3369891"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","unstructured":"S. Adhikary P. Sen D. Roy and K. Ghosh. 2024. A case study for automated attribute extraction from legal documents using large language models. Artificial Intelligence and Law (2024) 1\u201322.","DOI":"10.1007\/s10506-024-09425-7"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3603216.3624962"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01436"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/RE59067.2024.00065"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3603216.3624967"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"crossref","unstructured":"O. Langston and B. Ashford. 2024. Automated summarization of multiple document abstracts and contents using large language models. Authorea Preprints. Zhong et al. 2022.","DOI":"10.36227\/techrxiv.172262754.45577350\/v1"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"C. Ma Z. Wu J. Wang S. Xu Y. Wei Z. Liu X. Li and Others. 2024. An iterative optimizing framework for radiology report summarization with ChatGPT. IEEE Transactions on Artificial Intelligence 5 8 (2024) 4163\u20134175.","DOI":"10.1109\/TAI.2024.3364586"},{"key":"e_1_3_3_2_10_2","unstructured":"A.\u00a0M. McDonald and L.\u00a0F. Cranor. 2008. The cost of reading privacy policies. Isjlp 4 (2008) 543."},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"crossref","unstructured":"Y. Meier J. Sch\u00e4wel and N.\u00a0C. Kr\u00e4mer. 2020. The shorter the better? Effects of privacy policy length on online privacy decision-making. Media and Communication 8 2 (2020) 291\u2013301.","DOI":"10.17645\/mac.v8i2.2846"},{"key":"e_1_3_3_2_12_2","unstructured":"H. Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79 (2004) 119."},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"Y. Nugraha and A. Martin. 2021. Towards a framework for trustworthy data security level agreement in cloud procurement. Computers & Security 106 (2021) 102266.","DOI":"10.1016\/j.cose.2021.102266"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Bogdan Padiu Remus Iacob Titu Rebedea and Mihai Dascalu. 2024. To what extent have llms reshaped the legal domain so far? a scoping literature review. Information 15 11 (2024) 662.","DOI":"10.3390\/info15110662"},{"key":"e_1_3_3_2_15_2","unstructured":"Republik Indonesia. 2022. Undang-Undang Republik Indonesia Nomor 27 Tahun 2022 tentang Perlindungan Data Pribadi. Lembaran Negara Republik Indonesia Tahun 2022."},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"crossref","unstructured":"M. Shukla I. Goyal B. Gupta and J. Sharma. 2024. A comparative study of ChatGPT Gemini and Perplexity. Int. J. Innov. Res. Comput. Sci. Technol 12 4 (2024) 10\u201315.","DOI":"10.55524\/ijircst.2024.12.4.2"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1609\/hcomp.v7i1.5266"},{"key":"e_1_3_3_2_18_2","unstructured":"C. Tang Z. Liu C. Ma Z. Wu Y. Li W. Liu L. Fan and Others. 2023. PolicyGPT: Automated analysis of privacy policies with large language models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2309.10238 (2023)."},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"crossref","unstructured":"J. Vitak and M. Zimmer. 2020. More Than Just Privacy: Using Contextual Integrity to Evaluate the Long-Term Risks from COVID-19 Surveillance Technologies. Social Media+ Society 6 3 (2020) 2056305120948250.","DOI":"10.1177\/2056305120948250"},{"key":"e_1_3_3_2_20_2","unstructured":"W.\u00a0X. Zhao K. Zhou J. Li T. Tang X. Wang Y. Hou J.\u00a0R. Wen and Others. 2023. A survey of large language models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2303.18223 1 2 (2023)."}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"WPES '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 24th Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3733802.3764051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T06:44:47Z","timestamp":1772433887000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733802.3764051"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"references-count":19,"alternative-id":["10.1145\/3733802.3764051","10.1145\/3733802"],"URL":"https:\/\/doi.org\/10.1145\/3733802.3764051","relation":{},"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"2025-11-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}