Results 41 to 50 of about 5,046,112 (378)

Privacy Policies across the Ages: Content of Privacy Policies 1996–2021

open access: yesACM Transactions on Privacy and Security, 2023
It is well known that most users do not read privacy policies but almost always tick the box to agree with them. While the length and readability of privacy policies have been well studied and many approaches for policy analysis based on natural language processing have been proposed, existing studies are limited in their depth and scope, often ...
openaire   +3 more sources

From Prescription to Description: Mapping the GDPR to a Privacy Policy Corpus Annotation Scheme

open access: yesInternational Conference on Legal Knowledge and Information Systems, 2020
The European Union’s General Data Protection Regulation (GDPR) has compelled businesses and other organizations to update their privacy policies to state specific information about their data practices.
Ellen Poplavska   +3 more
semanticscholar   +1 more source

The Privacy Policy Landscape After the GDPR [PDF]

open access: yesProceedings on Privacy Enhancing Technologies, 2018
The EU General Data Protection Regulation (GDPR) is one of the most demanding and comprehensive privacy regulations of all time. A year after it went into effect, we study its impact on the landscape of privacy policies online.
Thomas Linden   +2 more
semanticscholar   +1 more source

Identifying Privacy Policy in Service Terms Using Natural Language Processing [PDF]

open access: yes, 2020
Ever since technology (tech) companies realized that people\u27s usage data from their activities on mobile applications to the internet could be sold to advertisers for a profit, it began the Big Data era where tech companies collect as much data as ...
Ishimwe, Ange-Thierry
core   +2 more sources

On a Formal and User-friendly Linguistic Approach to Access Control of Electronic Health Data [PDF]

open access: yes, 2013
The importance of the exchange of Electronic Health Records (EHRs) between hospitals has been recognized by governments and institutions. Due to the sensitivity of data exchanged, only mature standards and implementations can be chosen to operate.
Margheri, Andrea   +3 more
core   +1 more source

Review: Privacy-Preservation in the Context of Natural Language Processing

open access: yesIEEE Access, 2021
Data privacy is one of the highly discussed issues in recent years as we encounter data breaches and privacy scandals often. This raises a lot of concerns about the ways the data is acquired and the potential information leaks. Especially in the field of
Darshini Mahendran   +2 more
doaj   +1 more source

Understanding Website Privacy Policies—A Longitudinal Analysis Using Natural Language Processing

open access: yesInformation, 2023
Privacy policies are the main method for informing Internet users of how their data are collected and shared. This study aims to analyze the deficiencies of privacy policies in terms of readability, vague statements, and the use of pacifying phrases ...
Veronika Belcheva   +2 more
doaj   +1 more source

A Logical Method for Policy Enforcement over Evolving Audit Logs [PDF]

open access: yes, 2011
We present an iterative algorithm for enforcing policies represented in a first-order logic, which can, in particular, express all transmission-related clauses in the HIPAA Privacy Rule. The logic has three features that raise challenges for enforcement -
Datta, Anupam, Garg, Deepak, Jia, Limin
core   +2 more sources

A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments

open access: yesFuture Internet, 2015
The appeal of e-Government users to retain control over their personal information, while making use of advanced governmental electronic services through interconnected and interoperable deployments, can be assisted by the incorporation of privacy policy
Prokopios Drogkaris   +3 more
doaj   +1 more source

A Secure and Policy-Controlled Signature Scheme With Strong Expressiveness and Privacy-Preserving Policy

open access: yesIEEE Access, 2021
The policy-controlled signature (PCS) scheme uses the access policy to control signature verification permission. However public access policy that may contain private information will leak user privacy.
Xurui Zheng   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy