Crowdsourcing privacy policy analysis: Potential, challenges and best practices

被引:6
作者
Schaub, Florian [1 ]
Breaux, Travis D. [1 ]
Sadeh, Norman [1 ]
机构
[1] Carnegie Mellon Univ, Sch Comp Sci, Pittsburgh, PA 15213 USA
来源
IT-INFORMATION TECHNOLOGY | 2016年 / 58卷 / 05期
基金
美国国家科学基金会;
关键词
Crowdsourcing; human-computer interaction; privacy; privacy policies; usability;
D O I
10.1515/itit-2016-0009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy policies are supposed to provide transparency about a service's data practices and help consumers make informed choices about which services to entrust with their personal information. In practice, those privacy policies are typically long and complex documents that are largely ignored by consumers. Even for regulators and data protection authorities privacy policies are difficult to assess at scale. Crowdsourcing offers the potential to scale the analysis of privacy policies with microtasks, for instance by assessing how specific data practices are addressed in privacy policies or extracting information about data practices of interest, which can then facilitate further analysis or be provided to users in more effective notice formats. Crowdsourcing the analysis of complex privacy policy documents to non-expert crowd workers poses particular challenges. We discuss best practices, lessons learned and research challenges for crowdsourcing privacy policy analysis.
引用
收藏
页码:229 / 236
页数:8
相关论文
共 39 条
[1]  
Ackerman M. S., 1999, P C EL COMM EC 99
[2]   Quality Control in Crowdsourcing Systems Issues and Directions [J].
Allahbakhsh, Mohammad ;
Benatallah, Boualem ;
Ignjatovic, Aleksandar ;
Motahari-Nezhad, Hamid Reza ;
Bertino, Elisa ;
Dustdar, Schahram .
IEEE INTERNET COMPUTING, 2013, 17 (02) :76-81
[3]  
Andre P., 2014, P C COMP SUPP COOP W
[4]  
Bhatia J., 2015, WORKSH REQ ENG LAW R
[5]  
Breaux T. D., 2014, INT REQ ENG C RE 14
[6]   Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements [J].
Breaux, Travis D. ;
Hibshi, Hanan ;
Rao, Ashwini .
REQUIREMENTS ENGINEERING, 2014, 19 (03) :281-307
[7]  
Calo MR, 2012, NOTRE DAME LAW REV, V87, P1027
[8]   The Limits of Notice and Choice [J].
Cate, Fred H. .
IEEE SECURITY & PRIVACY, 2010, 8 (02) :59-62
[9]  
Costante E., 2013, DATA PRIVACY MANAGEM
[10]   Giving notice: Why privacy policies and security breach notifications aren't enough [J].
Cranor, LF .
IEEE COMMUNICATIONS MAGAZINE, 2005, 43 (08) :18-19