REFERENCES
Acquisti, A., Adjerid, I., Balebako, R., Brandimarte, L.,
Cranor, L. F., Komanduri, S., Leon, P. G., Sadeh, N.,
Schaub, F., Sleeper, M., et al. (2017). Nudges for pri-
vacy and security: Understanding and assisting users’
choices online. ACM Computing Surveys (CSUR),
50(3):1–41.
Acquisti, A. and Fong, C. (2020). An experiment in hiring
discrimination via online social networks. Manage-
ment Science, 66(3):1005–1024.
Aghasian, E., Garg, S., Gao, L., Yu, S., and Montgomery, J.
(2017). Scoring users’ privacy disclosure across mul-
tiple online social networks. IEEE Access, 5:13118–
13130.
Bier, C. and Prior, J. (2014). Detection and labeling of
personal identifiable information in e-mails. In IFIP
International Information Security Conference, pages
351–358. Springer.
Bracamonte, V., Hidano, S., Tesfay, W. B., and Kiyomoto,
S. (2019). User study of the effectiveness of a pri-
vacy policy summarization tool. In International Con-
ference on Information Systems Security and Privacy,
pages 186–206. Springer.
Bracamonte, V., Hidano, S., Tesfay, W. B., and Kiyomoto,
S. (2020). Evaluating the effect of justification and
confidence information on user perception of a privacy
policy summarization tool. In ICISSP, pages 142–151.
Caliskan Islam, A., Walsh, J., and Greenstadt, R. (2014a).
Privacy detective: Detecting private information and
collective privacy behavior in a large social network.
In Proceedings of the 13th Workshop on Privacy in
the Electronic Society, WPES ’14, page 35–46, New
York, NY, USA. Association for Computing Machin-
ery.
Caliskan Islam, A., Walsh, J., and Greenstadt, R. (2014b).
Privacy Detective: Detecting Private Information and
Collective Privacy Behavior in a Large Social Net-
work. In Proceedings of the 13th Workshop on Pri-
vacy in the Electronic Society, WPES ’14, pages 35–
46. Association for Computing Machinery.
Castillo, S. R. M. and Chen, Z. (2016). Using Transfer
Learning to Identify Privacy Leaks in Tweets. In 2016
IEEE 2nd International Conference on Collaboration
and Internet Computing (CIC), pages 506–513.
Mao, H., Shuai, X., and Kapadia, A. (2011). Loose tweets:
an analysis of privacy leaks on twitter. In Proceedings
of the 10th annual ACM workshop on Privacy in the
electronic society, pages 1–12.
Sleeper, M., Cranshaw, J., Kelley, P. G., Ur, B., Acquisti,
A., Cranor, L. F., and Sadeh, N. (2013). ”i read my
twitter the next morning and was astonished”: A con-
versational perspective on twitter regrets. In Proceed-
ings of the SIGCHI Conference on Human Factors in
Computing Systems, CHI ’13, page 3277–3286, New
York, NY, USA. Association for Computing Machin-
ery.
Sokolova, M., El Emam, K., Rose, S., Chowdhury, S., Neri,
E., Jonker, E., and Peyton, L. (2009). Personal health
information leak prevention in heterogeneous texts.
AdaptLRTtoND ’09, page 58–69, USA. Association
for Computational Linguistics.
Tesfay, W. B., Hofmann, P., Nakamura, T., Kiyomoto, S.,
and Serna, J. (2018). I read but don’t agree: Privacy
policy benchmarking using machine learning and the
eu gdpr. In Companion Proceedings of the The Web
Conference 2018, pages 163–166.
Tesfay, W. B., Serna, J., and Pape, S. (2016). Challenges
in detecting privacy revealing information in unstruc-
tured text. In PrivOn@ ISWC.
Tesfay, W. B., Serna, J., and Rannenberg, K. (2019). Priva-
cybot: Detecting privacy sensitive information in un-
structured texts. In 2019 Sixth International Confer-
ence on Social Networks Analysis, Management and
Security (SNAMS), pages 53–60.
Vishwamitra, N., Knijnenburg, B., Hu, H., Kelly Caine,
Y. P., et al. (2017). Blur vs. block: Investigating
the effectiveness of privacy-enhancing obfuscation for
images. In Proceedings of the IEEE Conference on
Computer Vision and Pattern Recognition Workshops,
pages 39–47.
Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon,
P. G., and Cranor, L. F. (2011). ”i regretted the minute
i pressed share”: A qualitative study of regrets on
facebook. In Proceedings of the Seventh Symposium
on Usable Privacy and Security, SOUPS ’11, New
York, NY, USA. Association for Computing Machin-
ery.
Wobbrock, J. O., Findlater, L., Gergle, D., and Higgins,
J. J. (2011). The aligned rank transform for nonpara-
metric factorial analyses using only anova procedures.
In Proceedings of the SIGCHI Conference on Human
Factors in Computing Systems, CHI ’11, pages 143–
146. Association for Computing Machinery.
ICISSP 2021 - 7th International Conference on Information Systems Security and Privacy
634