want analyze the privacy policies of different types
of website —familiar and unfamiliar, domestic and
foreign. On the other hand, users indicate that lack
of trustworthiness, reputation and explanation about
the results are barriers for use of the application. In
future research, we will address the barriers
identified by users, in particular regarding trust and
how to provide explanations for automated analysis.
ACKNOWLEDGEMENTS
We would like to thank Naonori Kato for his help
during the preparation of this study.
REFERENCES
Benjamini, Y., Hochberg, Y., 1995. Controlling the False
Discovery Rate: A Practical and Powerful Approach to
Multiple Testing. Journal of the Royal Statistical
Society. Series B (Methodological) 57, 289–300.
Curran, P.J., West, S.G., Finch, J.F., 1996. The
Robustness of Test Statistics to Nonnormality and
Specification Error in Confirmatory Factor Analysis.
Psychological methods 1, 16–29.
EU, 2016. REGULATION (EU) 2016/679 OF THE
EUROPEAN PARLIAMENT AND OF THE
COUNCIL on the protection of natural persons with
regard to the processing of personal data and on the
free movement of such data, and repealing Directive
95/46/EC (General Data Protection Regulation).
Gideon, J., Cranor, L., Egelman, S., Acquisti, A., 2006.
Power Strips, Prophylactics, and Privacy, Oh My!
Presented at the Symposium On Usable Privacy and
Security (SOUPS) 2006, ACM Press, p. 12.
Gluck, J., Schaub, F., Friedman, A., Habib, H., Sadeh, N.,
Cranor, L.F., Agarwal, Y., 2016. How Short Is Too
Short? Implications of Length and Framing on the
Effectiveness of Privacy Notices, in: Twelfth
Symposium on Usable Privacy and Security (SOUPS
2016). USENIX Association, Denver, CO, pp. 321–
340.
Harbach, M., Hettig, M., Weber, S., Smith, M., 2014.
Using Personal Examples to Improve Risk
Communication for Security & Privacy Decisions, in:
Proceedings of the SIGCHI Conference on Human
Factors in Computing Systems, CHI ’14. ACM, New
York, NY, USA, pp. 2647–2656.
Harkous, H., Fawaz, K., Lebret, R., Schaub, F., Shin, K.,
Aberer, K., 2018. Polisis: Automated Analysis and
Presentation of Privacy Policies Using Deep Learning
[WWW Document].
Kelley, P.G., Cesca, L., Bresee, J., Cranor, L.F., 2010.
Standardizing Privacy Notices: An Online Study of the
Nutrition Label Approach, in: Proceedings of the
SIGCHI Conference on Human Factors in Computing
Systems, CHI ’10. ACM, New York, NY, USA, pp.
1573–1582.
Kim, D.J., Ferrin, D.L., Rao, H.R., 2008. A Trust-Based
Consumer Decision-Making Model in Electronic
Commerce: The Role of Trust, Perceived Risk, and
Their Antecedents. Decision Support Systems 44, 544–
564.
Kizilcec, R.F., 2016. How Much Information?: Effects of
Transparency on Trust in an Algorithmic Interface, in:
Proceedings of the 2016 CHI Conference on Human
Factors in Computing Systems, CHI’16. pp. 2390–
2395.
Kline, R.B., 2005. Principles and practice of structural
equation modeling, 2nd ed, Principles and practice of
structural equation modeling, 2nd ed. Guilford Press,
New York, NY, US.
Lee, J.D., See, K.A., 2004. Trust in Automation:
Designing for Appropriate Reliance. Hum Factors 46,
50–80.
McDonald, A.M., Cranor, L.F., 2008. The Cost of
Reading Privacy Policies. ISJLP 4, 543.
Proctor, R.W., Ali, M.A., Vu, K.-P.L., 2008. Examining
Usability of Web Privacy Policies. International
Journal of Human–Computer Interaction 24
, 307–328.
Rosseel, Y., 2012. lavaan: An R Package for Structural
Equation Modeling. Journal of Statistical Software,
Articles 48, 1–36.
Steinfeld, N., 2016. “I agree to the terms and conditions”:
(How) do users read privacy policies online? An eye-
tracking experiment. Computers in Human Behavior
55, 992–1000.
Sunyaev, A., Dehling, T., Taylor, P.L., Mandl, K.D.,
2015. Availability and quality of mobile health app
privacy policies. J Am Med Inform Assoc 22, e28–e33.
Tesfay, W.B., Hofmann, P., Nakamura, T., Kiyomoto, S.,
Serna, J., 2018. PrivacyGuide: Towards an
Implementation of the EU GDPR on Internet Privacy
Policy Evaluation, in: Proceedings of the Fourth ACM
International Workshop on Security and Privacy
Analytics, IWSPA ’18. ACM, New York, NY, USA,
pp. 15–21.
Wilson, S., Schaub, F., Dara, A.A., Liu, F., Cherivirala, S.,
Giovanni Leon, P., Schaarup Andersen, M., Zimmeck,
S., Sathyendra, K.M., Russell, N.C., B. Norton, T.,
Hovy, E., Reidenberg, J., Sadeh, N., 2016. The
Creation and Analysis of a Website Privacy Policy
Corpus, in: Proceedings of the 54th Annual Meeting of
the Association for Computational Linguistics
(Volume 1: Long Papers). pp. 1330–1340.
Zimmeck, S., Bellovin, S.M., 2014. Privee: An
Architecture for Automatically Analyzing Web
Privacy Policies, in: Proceedings of the 23rd USENIX
Conference on Security Symposium, SEC’14. USENIX
Association, Berkeley, CA, USA, pp. 1–16.