Results 41 to 50 of about 5,046,112 (378)
Privacy Policies across the Ages: Content of Privacy Policies 1996–2021
It is well known that most users do not read privacy policies but almost always tick the box to agree with them. While the length and readability of privacy policies have been well studied and many approaches for policy analysis based on natural language processing have been proposed, existing studies are limited in their depth and scope, often ...
openaire +3 more sources
From Prescription to Description: Mapping the GDPR to a Privacy Policy Corpus Annotation Scheme
The European Union’s General Data Protection Regulation (GDPR) has compelled businesses and other organizations to update their privacy policies to state specific information about their data practices.
Ellen Poplavska+3 more
semanticscholar +1 more source
The Privacy Policy Landscape After the GDPR [PDF]
The EU General Data Protection Regulation (GDPR) is one of the most demanding and comprehensive privacy regulations of all time. A year after it went into effect, we study its impact on the landscape of privacy policies online.
Thomas Linden+2 more
semanticscholar +1 more source
Identifying Privacy Policy in Service Terms Using Natural Language Processing [PDF]
Ever since technology (tech) companies realized that people\u27s usage data from their activities on mobile applications to the internet could be sold to advertisers for a profit, it began the Big Data era where tech companies collect as much data as ...
Ishimwe, Ange-Thierry
core +2 more sources
On a Formal and User-friendly Linguistic Approach to Access Control of Electronic Health Data [PDF]
The importance of the exchange of Electronic Health Records (EHRs) between hospitals has been recognized by governments and institutions. Due to the sensitivity of data exchanged, only mature standards and implementations can be chosen to operate.
Margheri, Andrea+3 more
core +1 more source
Review: Privacy-Preservation in the Context of Natural Language Processing
Data privacy is one of the highly discussed issues in recent years as we encounter data breaches and privacy scandals often. This raises a lot of concerns about the ways the data is acquired and the potential information leaks. Especially in the field of
Darshini Mahendran+2 more
doaj +1 more source
Understanding Website Privacy Policies—A Longitudinal Analysis Using Natural Language Processing
Privacy policies are the main method for informing Internet users of how their data are collected and shared. This study aims to analyze the deficiencies of privacy policies in terms of readability, vague statements, and the use of pacifying phrases ...
Veronika Belcheva+2 more
doaj +1 more source
A Logical Method for Policy Enforcement over Evolving Audit Logs [PDF]
We present an iterative algorithm for enforcing policies represented in a first-order logic, which can, in particular, express all transmission-related clauses in the HIPAA Privacy Rule. The logic has three features that raise challenges for enforcement -
Datta, Anupam, Garg, Deepak, Jia, Limin
core +2 more sources
A Hierarchical Multitier Approach for Privacy Policies in e-Government Environments
The appeal of e-Government users to retain control over their personal information, while making use of advanced governmental electronic services through interconnected and interoperable deployments, can be assisted by the incorporation of privacy policy
Prokopios Drogkaris+3 more
doaj +1 more source
The policy-controlled signature (PCS) scheme uses the access policy to control signature verification permission. However public access policy that may contain private information will leak user privacy.
Xurui Zheng+5 more
doaj +1 more source