A Step to Achieve Personalized Human Centric Privacy Policy Summary

被引:0
作者
Simon, Ivan [1 ]
Haggag, Sherif [1 ]
Haggag, Hussein [2 ]
机构
[1] Univ Adelaide, Fac Sci Engn & Technol, Adelaide, SA, Australia
[2] Umea Univ, Dept Comp Sci, Umea, Sweden
来源
PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING, ENASE 2023 | 2023年
关键词
Privacy Policy; Text Summarization; Human-Centric; Machine Learning; IDENTITY THEFT VICTIMIZATION; CYBERCRIME VICTIMIZATION; ONLINE PRIVACY; SECURITY;
D O I
10.5220/0011842600003464
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Online users continuously come across privacy policies for the service they use. Due to the complexity and verbosity of policies, majority of the users skip the tedious task of reading the policy and accept it. Without reading and evaluating the document users risk giving up all kinds of rights to their personal data and for the most part, are unaware of the data sharing and handling process. Efforts have been made to address the complex and lengthy structure of privacy policies by creating a standardized machine-readable format of privacy policies for the web browsers to process it automatically, a repository of crowdsourced summarized versions of some privacy policies, or by using natural language processing to summarize the policies. PirvacyInterpreter is one unique tool that acknowledges human-centric factors while summarising the policy. Thus, it generates a personalised summary of the privacy policy for the user providing relevant information to appease their privacy concerns. This paper presents the conceptualization of PrivacyInterpreter and implements a proof-of-concept model using configured RoBERTa(base) model to classify a privacy policy and produce a summary based on privacy aspects that reflect users' privacy concerns.
引用
收藏
页码:381 / 395
页数:15
相关论文
共 52 条
  • [41] Dissecting word embeddings and language models in natural language processing
    Verma, Vivek Kumar
    Pandey, Mrigank
    Jain, Tarun
    Tiwari, Pradeep Kumar
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (05) : 1509 - 1515
  • [42] Whitty M.T., 2019, Journal of Financial Crime, V26, P277, DOI DOI 10.1108/JFC-10-2017-0095
  • [43] Is There a Scam for Everyone? Psychologically Profiling Cyberscam Victims
    Whitty, Monica Therese
    [J]. EUROPEAN JOURNAL ON CRIMINAL POLICY AND RESEARCH, 2020, 26 (03) : 399 - 409
  • [44] Wilson S, 2016, PROCEEDINGS OF THE 54TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, VOL 1, P1330
  • [45] Wolf T, 2020, Arxiv, DOI [arXiv:1910.03771, DOI 10.48550/ARXIV.1910.03771, 10.48550/arXiv.1910.03771]
  • [46] Stability and Change in the Big Five Personality Domains: Evidence From a Longitudinal Study of Australians
    Wortman, Jessica
    Lucas, Richard E.
    Donne, M. Brent
    [J]. PSYCHOLOGY AND AGING, 2012, 27 (04) : 867 - 874
  • [47] Wu YH, 2016, Arxiv, DOI arXiv:1609.08144
  • [48] Predicting user concerns about Online privacy
    Yao, Mike Z.
    Rice, Ronald E.
    Wallis, Kier
    [J]. JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, 2007, 58 (05): : 710 - 722
  • [49] PrivacyCheck: Automatic Summarization of Privacy Policies Using Data Mining
    Zaeem, Razieh Nokhbeh
    German, Rachel L.
    Barber, K. Suzanne
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2018, 18 (04)
  • [50] Zhang J, 2020, P MACHINE LEARNING R, P11328, DOI DOI 10.48550/ARXIV.1912.08777