[HTML][HTML] Privacy policy analysis: A scoping review and research agenda
Online users often neglect the importance of privacy policies-a critical aspect of digital
privacy and data protection. This scoping review addresses this oversight by delving into …
privacy and data protection. This scoping review addresses this oversight by delving into …
A solution toward transparent and practical AI regulation: Privacy nutrition labels for open-source generative AI-based applications
The rapid development and widespread adoption of Generative Artificial Intelligence-based
(GAI) applications have greatly enriched our daily lives, benefiting people by enhancing …
(GAI) applications have greatly enriched our daily lives, benefiting people by enhancing …
Is it a trap? a large-scale empirical study and comprehensive assessment of online automated privacy policy generators for mobile apps
Privacy regulations protect and promote the privacy of individuals by requiring mobile apps
to provide a privacy policy that explains what personal information is collected and how …
to provide a privacy policy that explains what personal information is collected and how …
Data Exposure from LLM Apps: An In-depth Investigation of OpenAI's GPTs
LLM app ecosystems are quickly maturing and supporting a wide range of use cases, which
requires them to collect excessive user data. Given that the LLM apps are developed by third …
requires them to collect excessive user data. Given that the LLM apps are developed by third …
VPVet: Vetting Privacy Policies of Virtual Reality Apps
Virtual reality (VR) apps can harvest a wider range of user data than web/mobile apps
running on personal computers or smartphones. Existing law and privacy regulations …
running on personal computers or smartphones. Existing law and privacy regulations …
Privacy policy analysis through prompt engineering for llms
Privacy policies are often obfuscated by their complexity, which impedes transparency and
informed consent. Conventional machine learning approaches for automatically analyzing …
informed consent. Conventional machine learning approaches for automatically analyzing …
SPRT: Automatically Adjusting SELinux Policy for Vulnerability Mitigation
H Wang, A Yu, L Xiao, J Li, X Cao - … of the 29th ACM Symposium on …, 2024 - dl.acm.org
Nowadays, SELinux has been widely applied in Linux systems to enforce security policy and
provide flexible MAC. However, improperly configured rules in policies may cause illegal …
provide flexible MAC. However, improperly configured rules in policies may cause illegal …
PolicyLR: A Logic Representation For Privacy Policies
Privacy policies are crucial in the online ecosystem, defining how services handle user data
and adhere to regulations such as GDPR and CCPA. However, their complexity and …
and adhere to regulations such as GDPR and CCPA. However, their complexity and …
VioDroid-Finder: automated evaluation of compliance and consistency for Android apps
J Chen, C Huang, J Han - Empirical Software Engineering, 2024 - Springer
Rapid growth in the variety and quantity of apps makes it difficult for users to protect their
privacy, although existing regulations have been introduced and the Android ecosystem is …
privacy, although existing regulations have been introduced and the Android ecosystem is …
Understanding Privacy Norms through Web Forms
Web forms are one of the primary ways to collect personal information online, yet they are
relatively under-studied. Unlike web tracking, data collection through web forms is explicit …
relatively under-studied. Unlike web tracking, data collection through web forms is explicit …