{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T12:08:21Z","timestamp":1763381301181,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,17]]},"DOI":"10.1145\/3772356.3772422","type":"proceedings-article","created":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T12:02:48Z","timestamp":1763380968000},"page":"77-84","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The Privacy Quagmire: Where Computer Scientists and Lawyers May Disagree"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8315-9591","authenticated-orcid":false,"given":"Yunwei","family":"Zhao","sequence":"first","affiliation":[{"name":"New York University, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0661-6378","authenticated-orcid":false,"given":"Varun","family":"Chandrasekaran","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign, Champaign, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4051-5968","authenticated-orcid":false,"given":"Thomas","family":"Wies","sequence":"additional","affiliation":[{"name":"New York University, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8101-1243","authenticated-orcid":false,"given":"Lakshminarayanan","family":"Subramanian","sequence":"additional","affiliation":[{"name":"New York University, New York, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Andow Benjamin","year":"2019","unstructured":"Benjamin Andow, Samin Yaseer Mahmud, Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Tao Xie. 2019. PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 585\u2013602. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/andow"},{"key":"e_1_3_2_1_2_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Andow Benjamin","year":"2020","unstructured":"Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Serge Egelman. 2020. Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 985\u20131002. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/andow"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1371"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.261"},{"key":"e_1_3_2_1_5_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Cui Hao","year":"2023","unstructured":"Hao Cui, Rahmadi Trimananda, Athina Markopoulou, and Scott Jordan. 2023. PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 1037\u20131054. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/cui"},{"key":"e_1_3_2_1_6_1","volume-title":"Differential Privacy: A Survey of Results. In Theory and Applications of Models of Computation. https:\/\/api.semanticscholar.org\/CorpusID:2887752","author":"Dwork Cynthia","year":"2008","unstructured":"Cynthia Dwork. 2008. Differential Privacy: A Survey of Results. In Theory and Applications of Models of Computation. https:\/\/api.semanticscholar.org\/CorpusID:2887752"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2619091","article-title":"TaintDroid","volume":"32","author":"Enck William","year":"2010","unstructured":"William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick Mcdaniel, and Anmol Sheth. 2010. TaintDroid. ACM Transactions on Computer Systems (TOCS) 32 (2010), 1 \u2013 29. https:\/\/api.semanticscholar.org\/CorpusID:433048","journal-title":"ACM Transactions on Computer Systems (TOCS)"},{"key":"e_1_3_2_1_8_1","volume-title":"Caiming Xiong, and Dragomir R. Radev.","author":"Han Simeng","year":"2022","unstructured":"Simeng Han, Hailey Schoelkopf, Yilun Zhao, Zhenting Qi, Martin Riddell, Luke Benson, Lucy Sun, Ekaterina Zubova, Yujie Qiao, Matthew Burtell, David Peng, Jonathan Fan, Yixin Liu, Brian Wong, Malcolm Sailor, Ansong Ni, Linyong Nan, Jungo Kasai, Tao Yu, Rui Zhang, Shafiq R. Joty, Alexander R. Fabbri, Wojciech Kryscinski, Xi Victoria Lin, Caiming Xiong, and Dragomir R. Radev. 2022. FOLIO: Natural Language Reasoning with First-Order Logic. ArXiv abs\/2209.00840 (2022). https:\/\/api.semanticscholar.org\/CorpusID:252070866"},{"key":"e_1_3_2_1_9_1","volume-title":"Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. ArXiv abs\/1802.02561","author":"Harkous Hamza","year":"2018","unstructured":"Hamza Harkous, Kassem Fawaz, R\u00e9mi Lebret, Florian Schaub, Kang G. Shin, and Karl Aberer. 2018. Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. ArXiv abs\/1802.02561 (2018). https:\/\/api.semanticscholar.org\/CorpusID:3656756"},{"key":"e_1_3_2_1_10_1","volume-title":"PolicyLR: A Logic Representation For Privacy Policies. ArXiv abs\/2408.14830","author":"Hooda Ashish","year":"2024","unstructured":"Ashish Hooda, Rishabh Khandelwal, Prasad R. Chalasani, Kassem Fawaz, and Somesh Jha. 2024. PolicyLR: A Logic Representation For Privacy Policies. ArXiv abs\/2408.14830 (2024). https:\/\/api.semanticscholar.org\/CorpusID:271962872"},{"key":"e_1_3_2_1_11_1","volume-title":"NL2FOL: Translating Natural Language to First-Order Logic for Logical Fallacy Detection. ArXiv abs\/2405.02318","author":"Lalwani Abhinav","year":"2024","unstructured":"Abhinav Lalwani, Lovish Chopra, Christopher Hahn, Caroline Trippel, Zhijing Jin, and Mrinmaya Sachan. 2024. NL2FOL: Translating Natural Language to First-Order Logic for Logical Fallacy Detection. ArXiv abs\/2405.02318 (2024). https:\/\/api.semanticscholar.org\/CorpusID:269604995"},{"key":"e_1_3_2_1_12_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Washington Law Review 79 (2004), 119\u2013157. https:\/\/api.semanticscholar.org\/CorpusID:150528892","journal-title":"Washington Law Review"},{"key":"e_1_3_2_1_13_1","volume-title":"Natural Legal Language Processing Workshop at ACL","author":"Shvartzshanider Yan","year":"2023","unstructured":"Yan Shvartzshanider, Ananth Balashankar, Thomas Wies, and Lakshminarayanan Subramanian. [n. d.]. Beyond The Text: Analysis of Privacy Statements through Syntactic and Semantic Role Labeling. In Natural Legal Language Processing Workshop at ACL 2023."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1126"},{"key":"e_1_3_2_1_15_1","volume-title":"Frederick Liu, Sushain Cherivirala, Pedro Giovanni Leon, Mads Schaarup Andersen, Sebastian Zimmeck, Kanthashree Mysore Sathyendra, N. Cameron Russell","author":"Wilson Shomir","year":"2016","unstructured":"Shomir Wilson, Florian Schaub, Aswarth Abhilash Dara, Frederick Liu, Sushain Cherivirala, Pedro Giovanni Leon, Mads Schaarup Andersen, Sebastian Zimmeck, Kanthashree Mysore Sathyendra, N. Cameron Russell, Thomas B. Norton, Eduard H. Hovy, Joel R. Reidenberg, and Norman M. Sadeh. 2016. The Creation and Analysis of a Website Privacy Policy Corpus. In Annual Meeting of the Association for Computational Linguistics. https:\/\/api.semanticscholar.org\/CorpusID:15817938"},{"key":"e_1_3_2_1_16_1","volume-title":"23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)","author":"Chi-Chih Yao Andrew","year":"1982","unstructured":"Andrew Chi-Chih Yao. 1982. Protocols for secure computations. 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982) (1982), 160\u2013164. https:\/\/api.semanticscholar.org\/CorpusID:62613325"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3627673.3679608"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0037"}],"event":{"name":"HotNets '25: 24th ACM Workshop on Hot Topics in Networks","location":"UMD Campus College Park MD USA","acronym":"HotNets '25","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 24th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772356.3772422","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T12:05:01Z","timestamp":1763381101000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772356.3772422"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,17]]},"references-count":18,"alternative-id":["10.1145\/3772356.3772422","10.1145\/3772356"],"URL":"https:\/\/doi.org\/10.1145\/3772356.3772422","relation":{},"subject":[],"published":{"date-parts":[[2025,11,17]]},"assertion":[{"value":"2025-11-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}