<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>An Ontology Design Pattern for Describing Personal Data in Privacy Policies</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Harshvardhan J. Pandit</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Declan O'Sullivan</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dave Lewis</string-name>
          <email>dave.lewisg@adaptcentre.ie</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>ADAPT Centre, Trinity College Dublin</institution>
          ,
          <addr-line>Dublin</addr-line>
          ,
          <country country="IE">Ireland</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Motivation &amp; Scope</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>Privacy laws such as the General Data Protection Regulation (GDPR) specify several obligations involving personal data. A privacy policy is a document that provides information for legal compliance on how personal data is collected, used, stored, and shared, which is essential for understanding their privacy implications. Approaches such as the UsablePrivacy project that extract information from the text of the privacy policy need to structure it in a manner suitable for machine processing. Semantic web has been proven to be suitable to represent this knowledge as a set of queryable concepts and relationships. However, there is a large overlap between di erent projects and approaches targeting the privacy policy that does not take advantage of the signi cant similarity of its underlying information. We present an ontology design pattern to aid these e orts in representing and modelling information related to personal data within a privacy policy. The pattern aims to assist the existing ecosystem of machine-based approaches for interpretation and visualisation of privacy policies by providing a common structured representation to ease modelling and sharing of related information.</p>
      </abstract>
      <kwd-group>
        <kwd>Ontology Design Pattern</kwd>
        <kwd>Personal Data</kwd>
        <kwd>Privacy Policy</kwd>
        <kwd>GDPR</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        format. This allows the approaches to scale with the ever-increasing and
changing nature of services and their privacy policies. Relevant approaches regarding
this are the UsablePrivacy project3 [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and the PrivacyGuide project [
        <xref ref-type="bibr" rid="ref10 ref9">9,10</xref>
        ].
      </p>
      <p>
        The privacy policy provides information associated with personal data such
as its collection, usage, sharing, and storage along with other information such
as the provision of various rights required by law. The General Data Protection
Regulation (GDPR) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], which is a European law for data protection, requires
speci cation of this information in privacy policies for compliance. This provides
commonality with respect to the mandatory information speci ed by laws which
is provided in privacy policies. Machine-processing approaches require this
information to be structured in a machine-readable format that can aid in the
automation of processes. Approaches that target the same set of information
have to deal with the same set of data - in this case the information
regarding personal data provided in privacy policies. This commonality of underlying
information (within privacy policies) can be represented using a common
vocabulary for its expression. This will aid the di erent approaches through sharing
of extracted information from privacy policies, while also making it possible to
compare the e ciency of di erent methods in extracting this information.
      </p>
      <p>
        Using a semantic web based approach provides a way to de ne such
knowledge in the form of concepts and relationships with the freedom for them to
be expanded and connected based on requirements. The UsablePrivacy project
already uses such an approach involving semantic web ontologies to represent its
underlying information about the categorisation of sentences within a privacy
policy [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. In addition to such machine-based approaches, other work involving
the information presented within a privacy policy will also bene t from such
structuring of information based on semantic web technologies.
      </p>
      <p>With this as our motivation, we present an ontology design pattern (ODP) for
modelling the information related to personal data within a privacy policy. This
ODP provides a way to express the personal data and the information associated
with it as a set of concepts and relationships which can be incorporated into a
larger semantic web ontology.</p>
      <p>In terms of scope, we limit to expressing information related to personal data
provided explicitly within a privacy policy. Other relevant information within a
privacy policy but not part of the pattern is discussed as future work at the
end of this paper. In terms of relevant work, we are not aware of any similar
approaches for modelling of information within a privacy policy towards creating
an ontology design pattern.</p>
      <p>The ODP is based on an investigation of privacy policies from Airbnb Ireland4
and Twitter 5, with archived copies made available6 in case of changes to the
policy in future. While we also evaluated other privacy policies for their structure
and content, we specify these two as being our primary use-cases for the purpose
3 https://www.usableprivacy.org
4 https://www.airbnb.ie/terms/privacy_policy
5 https://twitter.com/en/privacy
6 https://opengogs.adaptcentre.ie/harsh/privacy-policy-dashboard/
of this work. An investigation of information within the privacy policy provided
by Airbnb Ireland is available online 7 but is not part of this paper's contribution.</p>
      <p>The rest of this paper is structured as follows: Section 2 provides a description
of the pattern with an example provided in Section 3. Section 4 concludes the
paper with a discussion regarding future work.
2
2.1</p>
    </sec>
    <sec id="sec-2">
      <title>Pattern Description</title>
      <sec id="sec-2-1">
        <title>Competency Questions</title>
        <p>The pattern aims to answer the following competency questions:
1. What personal data is collected? e.g. email
2. Does the data have a category? e.g. contact information
3. What was its source? e.g. user
4. How is it collected? e.g. given by user, automated
5. What is it used for? e.g. creating an account, authentication and veri cation
6. How long is it retained for? e.g. 90days after account deletion
7. Who is it shared with? e.g. name of partner organisation(s)
8. What is the legal basis? e.g. given consent, legitimate use
9. What processes/purposes was the data shared for? e.g. analytics, marketing
10. What is the legal type of third party? e.g. processor, controller, authority</p>
        <p>The pattern does not consider questions related to the provision of GDPR
rights. While these questions are relevant, they are directly related to the data
subject (or user), and are common to all instances of personal data. They are
better represented in the model of the privacy policy rather than as an instance
of personal data. We provide them here for brevity, with a further discussion on
this provided in the future work section:
11. How can personal data be recti ed or corrected?
12. How can personal data be deleted or removed?
13. How can a copy of the personal data be obtained?
14. How can personal data be transferred to another party?
15. How can information about the personal data be obtained?</p>
        <p>
          The pattern uses the GDPRtEXT[
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] and GDPRov[
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] ontologies for de ning
concepts relevant to the GDPR. GDPRov is an ontology for describing the
provenance of consent and personal data lifecycles using GDPR relevant terminology,
and is an extension of PROV-O and P-Plan. GDPRtEXT provides de nitions
of concepts and terms used within the text of the GDPR using SKOS.
        </p>
        <p>The pattern is available online along with its documentation8 and has been
submitted to the ontology design patterns collaborative wiki9.
7 http://openscience.adaptcentre.ie/privacy-policy/personalise/demo/
policy.html
8 https://openscience.adaptcentre.ie/projects/privacy-policy/
design-pattern/
9 http://ontologydesignpatterns.org/wiki/Submissions:</p>
        <p>PrivacyPolicyPersonalData
2.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>Concepts &amp; Relationships</title>
        <p>
          A visualisation of the pattern is presented in Fig. 1, and was created using the
yEd graph editor10 with the Gra oo [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] palette.
Personal Data PersonalData represents an instance of personal data, such as
an email address, which is described in the privacy policy. It is de ned as an
instance of gdprov:PersonalData. Privacy policies often group related instances of
personal data in broader categories such as contact information for representing
email and phone number. To represent such a grouping in the pattern, the
category can be represented as a subclass of PersonalData using rdfs:subClassOf,
with its instances representing individual personal data items. In this case,
contact information would be a subclass of gdprov:PersonalData with email and
phone number being its instances.
        </p>
        <sec id="sec-2-2-1">
          <title>P ersonalDataCategory v P ersonalData</title>
          <p>(1)
Data Collection Data is collected through a gdprov:DataCollectionStep, and
is represented using the property gdprov:collectsData. The data provider is
represented using prov:Agent through the property gdprov:collectsDataFromAgent.</p>
          <p>Apart from the source, the privacy policy may also mention the
particular collection mechanism used for data collection. This is represented using
the gdprov:hasCollectionMechanism property, where the collection mechanism
10 https://www.yworks.com/products/yed
is represented by a suitable subclass of gdprtext:CollectionMechanism, such as
gdprtext:GivenByUser or gdprtext:AutomatedCollection.</p>
        </sec>
        <sec id="sec-2-2-2">
          <title>DataCollectionStep v</title>
          <p>1collectsData:P ersonalData</p>
        </sec>
        <sec id="sec-2-2-3">
          <title>DataCollectionStep v</title>
          <p>1collectsDataF romAgent:Agent</p>
        </sec>
        <sec id="sec-2-2-4">
          <title>P ersonalData v 8hasCollectionM echanism:CollectionM echanism</title>
          <p>Data Retention The retention of personal data informs how long it would
be stored for. This is represented using the Time Ontology in OWL11, which
is the W3C recommendation for describing temporal concepts. The retention
period is represented using the property time:hasDuration with the range being
an instance of time:Duration. This information is arbitrary and may be missing
or in an un-representable format within the privacy policy such as \retained for
as long as necessary" where the information is di cult to represent.</p>
        </sec>
        <sec id="sec-2-2-5">
          <title>P ersonalData v 8hasDuration:Duration</title>
          <p>Data Usage &amp; Processing Data Usage, also termed as Processing, is the use
of personal data for some purpose as speci ed within the privacy policy. This
can vary in terms of granularity from a comparatively simple step such as
sending an email to a more abstract process such as marketing which encompasses
several steps and processes. The pattern therefore uses gdprov:Process, which is
a subclass of p-plan:Plan, to de ne a process which can contain one or more
steps and processes. The property gdprov:usesData is used to represent the use
of personal data within a process.</p>
        </sec>
        <sec id="sec-2-2-6">
          <title>P rocess v</title>
          <p>1usesData:P ersonalData
Legal Basis for Data Usage Every use of personal data within a process
must have a legal basis under the GDPR. Examples of such legal basis de ned
within GDPRtEXT include consent, legitimate interest, compliance with the law,
and performance of contract. To represent this, the pattern uses the property
gdprov:hasLegalBasis with the range gdprtext:LawfulBasisForProcessing. Since
every data use must have at least one legal basis, this provides the axiom:</p>
        </sec>
        <sec id="sec-2-2-7">
          <title>P rocess v</title>
          <p>1hasLegalBasis:Lawf ulBasisF orP rocessing
(7)
Data Sharing The sharing of data involves the entity the data is shared with,
the purposes for sharing, and their legal basis. This is represented within the
pattern through the use of gdprov:DataSharingStep and the property gdprov:sharesData.
The entity the data is shared with is represented using the gdprov:sharesDataWith
property with the domain as gdprov:DataSharingStep and the range as a type of
11 https://www.w3.org/TR/owl-time/
(2)
(3)
(4)
(5)
(6)
gdprov:Agent, such as another Data Controller, Data Processor, or an
Authority. The purpose of sharing is represented using gdprov:Process and the property
gdprov:sharesDataForProcess to model the data being used in that process after
sharing. The legal basis of processes for which the data is shared is represented
using gdprov:hasLegalBasis as speci ed earlier. Since it is mandatory to inform
who the data is being shared with, along with its intended purposes, and the
speci c legal obligation, we have the following axioms:</p>
        </sec>
        <sec id="sec-2-2-8">
          <title>DataSharingStep v</title>
          <p>1sharesData:P ersonalData</p>
        </sec>
        <sec id="sec-2-2-9">
          <title>DataSharingStep v</title>
          <p>DataSharingStep v
1sharesDataW ith:Agent
1sharesDataF or:P rocess
(8)
(9)
(10)
3</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Example Use-Case</title>
      <p>We present here an example use-case of the pattern for depicting personal data
from Airbnb Ireland's privacy policy. The use-case was chosen for its generality in
terms of being common to other privacy policies as well as ease of understanding
for users.</p>
      <p>The use-case concerns the `email address' speci ed as personal data within
the privacy policy, which is provided by the user. It is used to \provide, improve,
and develop platform services", which is speci ed as a process with the legal
basis of legitimate interest. It is shared with the `Payments Controller' entity for
`Identity Veri cation' process which has a legal basis of 'contract ful lment'.</p>
      <p>
        The example use-case is illustrated in Fig. 2 using Gra oo [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] and shows
the classes, properties, and instances. The corresponding code is presented in
Listing. 1 using the Turtle12 notation for RDF. The answers to the competency
questions corresponding to the use-case are provided below.
1. What personal data is collected: Email Address
2. Does the data have a category: Account Information
3. What was its source: User
4. How is it collected: Given by user
5. What is it used for: Platform Services, Payments
6. How long is it retained for: inde nitely (no end duration)
7. Who is it shared with: Payments Controller
8. What is the legal basis: Legitimate Interest, Contract
9. What processes/purposes was the data shared for: Identity Veri cation
10. What is the legal type of third party: Data Controller
12 https://www.w3.org/TR/turtle/
This paper presents an ontology design pattern for representing information
associated with personal data in the context of a privacy policy. More speci cally,
it allows modelling and representation of collection, usage, storage, and sharing
of personal data along with the associated processes and entities, as well as their
legal basis. Concepts and relationships within the pattern are de ned using the
previously published GDPRov [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] and GDPRtEXT [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] ontologies. For de ning
the duration of storage, the pattern uses the Time ontology in OWL.
      </p>
      <p>The paper provides an use-case of the pattern based on an real-world privacy
policy to re ect its suitability. The use-case captures one instance of personal
data and the information related to it within the privacy policy. The depicted
usage of ontology design patterns provides motivation for adoption in approaches
related to the use of information within a privacy policy. This allows sharing of
information through a common representation for related activities such as
summarising, visualisation, analytics, or determining compliance using information
contained within privacy policies.</p>
      <p>Based on the intended motivation, the pattern provides a way to share the
relevant information regarding personal data, and provides further avenues for
research regarding similar patterns or meta-patterns related to privacy policies.</p>
    </sec>
    <sec id="sec-4">
      <title>Future Work</title>
      <p>We consider our work an initial e ort towards consolidating information within
privacy policies. Using the pattern to re ect information from several distinct
real-world privacy policies will demonstrate its feasibility and applicability in
real-world scenarios. This presents a challenge as the pattern currently assumes
the presence of all required information which may not be the case for some
usecases, particularly where interpretations of information are ambiguous. However,
capturing such ambiguities through a meta-pattern can possibly aid in agging
them for review by legal experts.</p>
      <p>In addition to the above, the pattern faces other challenges for the
modelling of information it aims to represent. For example, it is not clear what level
of abstraction should be represented in the pattern regarding concepts such as
storage and sharing. Should there be a DataStorageStep which can be further
annotated to represent various pieces of information relating to the storage of
personal data? Abstractions can help to represent di erent storage duration and
formats for the same instance of personal data, such as storing the actual data
for 6 months while a (pseudo-)anonymised copy is stored for 2 years. However,
tacking on such abstractions in to the pattern can make it rigid (in terms of
modelling) and complex. More work needs to be undertaken to evaluate whether such
abstractions are necessary in the pattern, and how they should be represented.</p>
      <p>Another challenge is the representation of storage duration (or retention
period). Concrete values such as 6 months or 2 years can be represented using
appropriate ontologies, but ambiguous statements are di cult to represent
using such ontologies. An example of this is the statement "data may be stored
for as long as necessary..." in which there is no end to the duration for storage.
Representing this as a time:Duration instance is problematic as there is no clear
method to represent its end period. Not de ning an end period is also not a
solution due to the open world assumption. Our approach towards solving this
issue is to abstract the storage activity as described earlier. However, we are
open for other approaches and solutions towards this problem.</p>
      <p>The privacy policy contains more information than is re ected by the
pattern. To represent this additional set(s) of information, larger (combinations of)
patterns and ontologies will be needed to model and represent all the relevant
information and context. This is especially relevant for GDPR as it mandates the
inclusion of information regarding its various rights, which is presented through
the privacy policy.</p>
      <p>Some of this information was presented in this paper as additional
competency questions. These help evaluate information regarding how the personal
data can be changed (recti ed), deleted, and obtained (download a copy).
Additionally, GDPR allows the data subject to change their consent, thereby a ecting
the processes involving personal data. Capturing this information is essential
towards quantifying the privacy policies into machine-readable data, with the
paper demonstrating the suitability of ODP for this task.
@prefix dct: &lt;http://purl.org/dc/terms/&gt; .
@prefix owl: &lt;http://www.w3.org/2002/07/owl#&gt; .
@prefix rdf: &lt;http://www.w3.org/1999/02/22-rdf-syntax-ns#&gt; .
@prefix rdfs: &lt;http://www.w3.org/2000/01/rdf-schema#&gt; .
@prefix xml: &lt;http://www.w3.org/XML/1998/namespace&gt; .
@prefix xsd: &lt;http://www.w3.org/2001/XMLSchema#&gt; .
@prefix gdprov:</p>
      <p>&lt;http://purl.org/adaptcentre/openscience/ontologies/gdprov#&gt; .
@prefix gdprtext:</p>
      <p>&lt;http://purl.org/adaptcentre/openscience/ontologies/GDPRtEXT#&gt; .
@prefix : &lt;http://example.com/personaldata#&gt; .
:PaymentProcess a gdprov:DataSharingStep ;
rdfs:label "Payment Process"^^xsd:string ;
gdprov:sharesData :EmailAddress ;
gdprov:sharesDataForProcess :IdentityVerification ;
gdprov:sharesDataWith :PaymentsController .
:PlatformServices a gdprov:Process ;
rdfs:label "Provide, Improve, and Develop Platform"^^xsd:string ;
gdprov:hasLegalBasis gdprtext:LegitimateInterest ;
gdprov:usesData :EmailAddress .
:Registration a gdprov:DataCollectionStep ;
rdfs:label "Registration for new users"^^xsd:string ;
gdprov:collectsData :EmailAddress ;
gdprov:collectsDataFromAgent :User ;
gdprov:hasCollectionMechanism gdprtext:GivenByUser .
:AccountInformation a rdfs:Class, owl:Class ;
rdfs:label "Account Information of an User"^^xsd:string ;
rdfs:subClassOf gdprov:PersonalData .
:IdentityVerification a gdprov:Process ;
rdfs:label "Identity Verification"^^xsd:string ;
gdprov:hasLegalBasis gdprtext:Contract ;
gdprov:usesData :EmailAddress .
:PaymentsController a gdprov:Controller,</p>
      <p>prov:Agent ;
rdfs:label "Payments Controller"^^xsd:string .
:User a gdprov:DataSubject,</p>
      <p>prov:Agent ;
rdfs:label "User of Service"^^xsd:string .
:EmailAddress a :AccountInformation,</p>
      <p>:PersonalData ;
rdfs:label "Email Address"^^xsd:string .</p>
      <p>Listing 1: Example Use-case in Turtle format presenting Email Address as an
instance of personal data along its collection, storage, and sharing</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgements</title>
      <p>This work is supported by the ADAPT Centre for Digital Content Technology
which is funded under the SFI Research Centres Programme (Grant 13/RC/2106)
and is co-funded under the European Regional Development Fund.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Regulation</surname>
          </string-name>
          (EU)
          <year>2016</year>
          /
          <article-title>679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data</article-title>
          ,
          <source>and repealing Directive</source>
          <volume>95</volume>
          /46/EC (
          <article-title>General Data Protection Regulation)</article-title>
          .
          <source>O cial Journal of the European Union L119</source>
          ,
          <volume>1</volume>
          {88 (May
          <year>2016</year>
          ), http://eur-lex.europa.eu/legal-content/EN/ TXT/?uri=OJ:L:
          <year>2016</year>
          :119:TOC
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Contissa</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Docter</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lagioia</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lippi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Micklitz</surname>
            ,
            <given-names>H.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Panlka</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sartor</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Torroni</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <string-name>
            <surname>Claudette Meets</surname>
            <given-names>GDPR</given-names>
          </string-name>
          :
          <article-title>Automating the Evaluation of Privacy Policies Using Arti cial Intelligence (</article-title>
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Fabian</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ermakova</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lentz</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Large-scale Readability Analysis of Privacy Policies</article-title>
          .
          <source>In: Proceedings of the International Conference on Web Intelligence</source>
          . pp.
          <volume>18</volume>
          {
          <fpage>25</fpage>
          . WI '17,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          , New York, NY, USA (
          <year>2017</year>
          ), http://doi.acm.
          <source>org/10</source>
          .1145/ 3106426.3106427
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Falco</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gangemi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peroni</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shotton</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vitali</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Modelling owl ontologies with gra oo</article-title>
          . In: Presutti,
          <string-name>
            <given-names>V.</given-names>
            ,
            <surname>Blomqvist</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Troncy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Sack</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Papadakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            ,
            <surname>Tordai</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . (eds.) The Semantic Web:
          <article-title>ESWC 2014 Satellite Events</article-title>
          . pp.
          <volume>320</volume>
          {
          <fpage>325</fpage>
          . Springer International Publishing,
          <string-name>
            <surname>Cham</surname>
          </string-name>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Jensen</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Potts</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Privacy Policies As Decision-making Tools: An Evaluation of Online Privacy Notices</article-title>
          .
          <source>In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems</source>
          . pp.
          <volume>471</volume>
          {
          <fpage>478</fpage>
          . CHI '04,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          , New York, NY, USA (
          <year>2004</year>
          ), http://doi.acm.
          <source>org/10</source>
          .1145/985692.985752
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Oltramari</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Piraviperumal</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schaub</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          , Wilson,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Cherivirala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Norton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Russell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Story</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Reidenberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Sadeh</surname>
          </string-name>
          , N.:
          <article-title>PrivOnto: A semantic framework for the analysis of privacy policies</article-title>
          .
          <source>Semantic Web</source>
          <volume>9</volume>
          (
          <issue>2</issue>
          ),
          <volume>185</volume>
          {203 (Jan
          <year>2018</year>
          ), http://www.medra.org/servlet/aliasResolver?alias=iospress&amp; doi=10.3233/SW-170283
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Pandit</surname>
            ,
            <given-names>H.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fatema</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>O'Sullivan</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lewis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>GDPRtEXT - GDPR as a Linked Data Resource</article-title>
          . p.
          <fpage>14</fpage>
          .
          <string-name>
            <surname>Heraklion</surname>
          </string-name>
          , Crete, Greece (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Pandit</surname>
            ,
            <given-names>H.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lewis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Modelling Provenance for GDPR Compliance using Linked Open Data Vocabularies</article-title>
          .
          <source>In: Proceedings of the 5th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2017) (PrivOn)</source>
          (
          <year>2017</year>
          ), http://ceur-ws.
          <source>org/</source>
          Vol-1951/#paper-
          <fpage>06</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Tesfay</surname>
            ,
            <given-names>W.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hofmann</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nakamura</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kiyomoto</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Serna</surname>
            ,
            <given-names>J.: I</given-names>
          </string-name>
          <string-name>
            <surname>Read but Don'T Agree</surname>
          </string-name>
          :
          <article-title>Privacy Policy Benchmarking Using Machine Learning and the EU GDPR</article-title>
          .
          <source>In: Companion Proceedings of the The Web Conference</source>
          <year>2018</year>
          . pp.
          <volume>163</volume>
          {
          <fpage>166</fpage>
          . WWW '18,
          <string-name>
            <given-names>International</given-names>
            <surname>World Wide Web Conferences Steering Committee</surname>
          </string-name>
          , Republic and Canton of Geneva, Switzerland (
          <year>2018</year>
          ), https://doi.org/10.1145/ 3184558.3186969
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Tesfay</surname>
            ,
            <given-names>W.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hofmann</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nakamura</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kiyomoto</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Serna</surname>
            ,
            <given-names>J.:</given-names>
          </string-name>
          <article-title>PrivacyGuide: Towards an Implementation of the EU GDPR on Internet Privacy Policy Evaluation</article-title>
          .
          <source>In: Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics</source>
          . pp.
          <volume>15</volume>
          {
          <fpage>21</fpage>
          . IWSPA '18,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          , New York, NY, USA (
          <year>2018</year>
          ), http://doi.acm.
          <source>org/10</source>
          .1145/3180445.3180447
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. Wilson,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Schaub</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Dara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.A.</given-names>
            ,
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Cherivirala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Giovanni</surname>
          </string-name>
          <string-name>
            <surname>Leon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            ,
            <surname>Schaarup</surname>
          </string-name>
          <string-name>
            <surname>Andersen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Zimmeck</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Sathyendra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.M.</given-names>
            ,
            <surname>Russell</surname>
          </string-name>
          ,
          <string-name>
            <surname>N.C.</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Norton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            ,
            <surname>Hovy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Reidenberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Sadeh</surname>
          </string-name>
          ,
          <string-name>
            <surname>N.</surname>
          </string-name>
          :
          <article-title>The Creation and Analysis of a Website Privacy Policy Corpus</article-title>
          . In:
          <article-title>Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers)</article-title>
          . pp.
          <volume>1330</volume>
          {
          <fpage>1340</fpage>
          . Association for Computational Linguistics, Berlin, Germany (Aug
          <year>2016</year>
          ), http://www.aclweb.org/anthology/P16-1126
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>