Specifying privacy policies with P3P and EPAL: lessons learned
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Inside JetBlue's Privacy Policy Violations
IEEE Security and Privacy
Privacy practices of Internet users: self-reports versus observed behavior
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Mining rule semantics to understand legislative compliance
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Super-sticky and declassifiable release policies for flexible information dissemination control
Proceedings of the 5th ACM workshop on Privacy in electronic society
HIPAA's Effect on Web Site Privacy Policies
IEEE Security and Privacy
A Survey and Analysis of the P3P Protocol's Agents, Adoption, Maintenance, and Future
IEEE Transactions on Dependable and Secure Computing
Proceedings of the 12th ACM symposium on Access control models and technologies
A roadmap for comprehensive online privacy policy management
Communications of the ACM - Creating a science of games
Tracking website data-collection and privacy practices with the iWatch web crawler
Proceedings of the 3rd symposium on Usable privacy and security
What's wrong with online privacy policies?
Communications of the ACM - ACM's plan to go online first
Getting users to pay attention to anti-phishing education: evaluation of retention and transfer
Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit
Semantic parameterization: A process for modeling domain descriptions
ACM Transactions on Software Engineering and Methodology (TOSEM)
A user study of the expandable grid applied to P3P privacy policy visualization
Proceedings of the 7th ACM workshop on Privacy in the electronic society
On the need for user-defined fine-grained access control policies for social networking applications
Proceedings of the workshop on Security in Opportunistic and SOCial networks
Automating the Extraction of Rights and Obligations for Regulatory Compliance
ER '08 Proceedings of the 27th International Conference on Conceptual Modeling
An analysis of privacy signals on the World Wide Web: Past, present and future
Information Sciences: an International Journal
Why Eliciting and Managing Legal Requirements Is Hard
RELAW '08 Proceedings of the 2008 Requirements Engineering and Law
Requirements-based Access Control Analysis and Policy Specification (ReCAPS)
Information and Software Technology
Timing is everything?: the effects of timing and placement of online privacy indicators
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A Comparative Study of Online Privacy Policies and Formats
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Usability of user agents for privacy-preference specification
Proceedings of the 2007 conference on Human interface: Part II
Identifying Commitment-Based Software Requirements to Thwart Unfair and Deceptive Practices
RELAW '09 Proceedings of the 2009 Second International Workshop on Requirements Engineering and Law
Towards a personalized privacy management framework
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems
A dynamic privacy model for web services
Computer Standards & Interfaces
From the economics to the behavioral economics of privacy: a note
ICEB'10 Proceedings of the Third international conference on Ethics and Policy of Biometrics and International Data Sharing
A comparative study of privacy mechanisms and a novel privacy mechanism [short paper]
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
{Privacy, privacidad, Приватност} policies in social media: providing translated privacy notice
Proceedings of the 1st Workshop on Privacy and Security in Online Social Media
What do online behavioral advertising privacy disclosures communicate to users?
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
A Value Sensitive Design Investigation of Privacy Enhancing Tools in Web Browsers
Decision Support Systems
Are Online Privacy Policies Readable?
International Journal of Information Security and Privacy
International Journal of Technology and Human Interaction
Privacy policies and national culture on the internet
Information Systems Frontiers
Hi-index | 0.00 |
By analyzing 40 online privacy policy documents from nine financial institutions, the authors examine the clarity and readability of these important privacy notices. Using goal-driven requirements engineering techniques and readability analysis, the findings show that compliance with the ex-isting legislation and standards is, at best, questionable.