services they read about, which is one aspect of under-
standing privacy policies. Therefore, in future work,
we must examine what types of user understanding
would render a privacy policy a consensual agreement
between users and the service provider. For this pur-
pose, we should identify the factors related to users’
understanding of and trust in a service by investigat-
ing the relationship between how service providers
actually handle users’ privacy information and how
users think their data will be used. To improve user
understanding, we must therefore explore additional
functions and implementations of the privacy policy
user understanding support tool.
ACKNOWLEDGEMENTS
We would like to express our deepest gratitude to Mr.
Yasushi Kasai and Mr. Takaomi Hayashi of the In-
stitute of Future Engineering for their cooperation in
preparing this paper. This work was supported by
JST, CREST Grant Number JPMJCR21M1, Japan.
REFERENCES
Alexa Internet, I. (2017). Alexa top sites in Japan. https:
//www.alexa.com/topsites/countries/JP.
Axelrod, A., He, X., and Gao, J. (2011). Domain adapta-
tion via pseudo in-domain data selection. In Proceed-
ings of the 2011 Conference on Empirical Methods in
Natural Language Processing, pages 355–362, Edin-
burgh, Scotland, UK. Association for Computational
Linguistics.
Cate, F. H. (2010). The limits of notice and choice. IEEE
Security & Privacy, 8(2):59–62.
Cranor, L. F., Guduru, P., and Arjula, M. (2006). User
interfaces for privacy agents. ACM Transactions on
Computer-Human Interaction, 13(2):135––178.
EU (n.d.). Regulation (eu) 2016/679 of the european parlia-
ment and of the council. https://eur-lex.europa.eu/eli/
reg/2016/679/oj. (Accessed on 06/08/2021).
H. Harkous, K. Fawaz, K. G. S. and Aberer, K. (2016). Pri-
bots: Conversational privacy with chatbots. In Twelfth
Symposium on Usable Privacy and Security (SOUPS
2016), Denver, CO. USENIX Association.
Harkous, H., Fawaz, K., Lebret, R., Schaub, F., Shin, K. G.,
and Aberer, K. (2018). Polisis: Automated analysis
and presentation of privacy policies using deep learn-
ing. Proceedings Of The 27Th Usenix Security Sym-
posium, pages 531–548.
Hasegawa, T., Sekine, S., and Grishman, R. (2004). Discov-
ering relations among named entities from large cor-
pora. In Proceedings of the 42nd Annual Meeting on
Association for Computational Linguistics, ACL ’04,
pages 415–es, USA. Association for Computational
Linguistics.
Kanamori, S., Nojima, R., Iwai, A., Kawaguchi, K., Sato,
H., Suwa, H., and Tabata, N. (2017). A study for
reasons why users do not read privacy policies. In
Proceedings of Computer Security Symposium 2017,
pages 874-881. in Japanese.
Kelley, P. G., Bresee, J., Cranor, L. F., and Reeder, R. W.
(2009). A ”nutrition label” for privacy. In Proceedings
of the 5th Symposium on Usable Privacy and Security
(SOUPS 2009), pages 1–12, New York, NY, USA. As-
sociation for Computing Machinery.
LEE, C. (2017). Lstm-crf models for named entity recogni-
tion. IEICE Transactions on Information and Systems,
E100.D(4):882–887.
Liang, X. (2019). Mecab usage and add user dictionary
to mebab. https://towardsdatascience.com/mecab-
usage-and-user-dictionary-to-mecab-9ee58966fc6.
Accessed on 21/11/2021.
McDonald, M. A. and Cranor, L. F. (2008). The cost of
reading privacy policies. I/S: A Journal of Law and
Policy for the Information Society, 4:543–568.
MIC (2020). Information and communications in Japan
(white paper 2020). (Accessed on 06/08/2021).
PPC (n.d.). Personal information protection commission
of Japan. https://www.ppc.go.jp/en/index.html. (Ac-
cessed on 06/08/2021).
Proctor, R. W., Ali, M. A., and Vu, K. P. L. (2008). Exam-
ining usability of web privacy policies. International
Journal of Human–Computer Interaction, 24(3):307–
328.
Rao, A., Schaub, F., Sadeh, N., Acquisti, A., and Kang,
R. (2016). Expecting the unexpected: Understanding
mismatched privacy expectations online. In Twelfth
Symposium on Usable Privacy and Security (SOUPS
2016), pages 77–96, Denver, CO. USENIX Associa-
tion.
Reidenberg, J. R., Russell, N. C., Callen, A., Quasir, S., and
Norton, T. (2014). Privacy harms and the effective-
ness of the notice and choice framework. 2014 TPRC
Confarence Paper.
Sato, H. and Tabata, N. (2013). Development of the multi-
dimensional privacy scale for internet users (MPS-I).
Japanese Journal of Personality, 21(3):312–315. in
Japanese.
Sekine, S. and Isahara, H. (2000). IREX: IR & IE evalu-
ation project in Japanese. In Proceedings of the Sec-
ond International Conference on Language Resources
and Evaluation (LREC’00), Athens, Greece. Euro-
pean Language Resources Association (ELRA).
SPI (2012). Smartphone privacy initiative.
https://www.soumu.go.jp/menu news/s-news/
01kiban08 02000087.html.
Wilson, S., Schaub, F., Dara, A. A., Liu, F., Cherivirala, S.,
Leon, P. G., Andersen, M. S., Zimmeck, S., Sathyen-
dra, K. M., Russell, N. C., Norton, T. B., Hovy, E.,
Reidenberg, J., and Sadeh, N. (2016). The creation
and analysis of a website privacy policy corpus. In
Proceedings of the 54th Annual Meeting of the Associ-
ation for Computational Linguistics (Volume 1: Long
Papers), pages 1330–1340, Berlin, Germany. Associ-
ation for Computational Linguistics.
Construction of a Support Tool for User Reading of Privacy Policies and Assessment of its User Impact
419