-
{A New Hope}: Contextual Privacy Policies for Mobile Applications and An Approach Toward Automated Generation
Abstract: Privacy policies have emerged as the predominant approach to conveying privacy notices to mobile application users. In an effort to enhance both readability and user engagement, the concept of contextual privacy policies (CPPs) has been proposed by researchers. The aim of CPPs is to fragment privacy policies into concise snippets, displaying them only within the corresponding contexts within the a… ▽ More
Submitted 10 March, 2024; v1 submitted 22 February, 2024; originally announced February 2024.
Comments: USENIX Security 2024. arXiv admin note: text overlap with arXiv:2307.01691
-
Navigating Privacy and Copyright Challenges Across the Data Lifecycle of Generative AI
Abstract: The advent of Generative AI has marked a significant milestone in artificial intelligence, demonstrating remarkable capabilities in generating realistic images, texts, and data patterns. However, these advancements come with heightened concerns over data privacy and copyright infringement, primarily due to the reliance on vast datasets for model training. Traditional approaches like differential p… ▽ More
Submitted 10 January, 2024; v1 submitted 30 November, 2023; originally announced November 2023.
Comments: Accepted by 2024 IEEE/ACM 3rd International Conference on AI Engineering - Software Engineering for AI (CAIN)
-
Tag Your Fish in the Broken Net: A Responsible Web Framework for Protecting Online Privacy and Copyright
Abstract: The World Wide Web, a ubiquitous source of information, serves as a primary resource for countless individuals, amassing a vast amount of data from global internet users. However, this online data, when scraped, indexed, and utilized for activities like web crawling, search engine indexing, and, notably, AI model training, often diverges from the original intent of its contributors. The ascent of… ▽ More
Submitted 5 November, 2023; v1 submitted 11 October, 2023; originally announced October 2023.
Comments: added some information on how to deal with CDN in the design section; minor fixes on writing
-
Test-takers have a say: understanding the implications of the use of AI in language tests
Abstract: Language tests measure a person's ability to use a language in terms of listening, speaking, reading, or writing. Such tests play an integral role in academic, professional, and immigration domains, with entities such as educational institutions, professional accreditation bodies, and governments using them to assess candidate language proficiency. Recent advances in Artificial Intelligence (AI) a… ▽ More
Submitted 19 July, 2023; originally announced July 2023.
-
Right to be Forgotten in the Era of Large Language Models: Implications, Challenges, and Solutions
Abstract: The Right to be Forgotten (RTBF) was first established as the result of the ruling of Google Spain SL, Google Inc. v AEPD, Mario Costeja González, and was later included as the Right to Erasure under the General Data Protection Regulation (GDPR) of European Union to allow individuals the right to request personal data be deleted by organizations. Specifically for search engines, individuals can se… ▽ More
Submitted 4 June, 2024; v1 submitted 8 July, 2023; originally announced July 2023.
Comments: Revised the writing
-
SeePrivacy: Automated Contextual Privacy Policy Generation for Mobile Applications
Abstract: Privacy policies have become the most critical approach to safeguarding individuals' privacy and digital security. To enhance their presentation and readability, researchers propose the concept of contextual privacy policies (CPPs), aiming to fragment policies into shorter snippets and display them only in corresponding contexts. In this paper, we propose a novel multi-modal framework, namely SeeP… ▽ More
Submitted 9 July, 2023; v1 submitted 4 July, 2023; originally announced July 2023.
-
Toward the Cure of Privacy Policy Reading Phobia: Automated Generation of Privacy Nutrition Labels From Privacy Policies
Abstract: Software applications have become an omnipresent part of modern society. The consequent privacy policies of these applications play a significant role in informing customers how their personal information is collected, stored, and used. However, customers rarely read and often fail to understand privacy policies because of the ``Privacy Policy Reading Phobia'' (PPRP). To tackle this emerging chall… ▽ More
Submitted 19 June, 2023; originally announced June 2023.
-
Is It a Trap? A Large-scale Empirical Study And Comprehensive Assessment of Online Automated Privacy Policy Generators for Mobile Apps
Abstract: Privacy regulations protect and promote the privacy of individuals by requiring mobile apps to provide a privacy policy that explains what personal information is collected and how these apps process this information. However, developers often do not have sufficient legal knowledge to create such privacy policies. Online Automated Privacy Policy Generators (APPGs) can create privacy policies, but… ▽ More
Submitted 23 September, 2023; v1 submitted 5 May, 2023; originally announced May 2023.
Comments: USENIX Security 2024
-
To Be Forgotten or To Be Fair: Unveiling Fairness Implications of Machine Unlearning Methods
Abstract: The right to be forgotten (RTBF) is motivated by the desire of people not to be perpetually disadvantaged by their past deeds. For this, data deletion needs to be deep and permanent, and should be removed from machine learning models. Researchers have proposed machine unlearning algorithms which aim to erase specific data from trained models more efficiently. However, these methods modify how data… ▽ More
Submitted 10 January, 2024; v1 submitted 7 February, 2023; originally announced February 2023.
Comments: Accepted by AAAI Spring Symposium on AI Trustworthiness Assessment 2023. Published in AI and Ethics Journal https://link.springer.com/article/10.1007/s43681-023-00398-y
-
A Systematic Literature Review on Blockchain Governance
Abstract: Blockchain has been increasingly used as a software component to enable decentralisation in software architecture for a variety of applications. Blockchain governance has received considerable attention to ensure the safe and appropriate use and evolution of blockchain, especially after the Ethereum DAO attack in 2016. However, there are no systematic efforts to analyse existing governance solutio… ▽ More
Submitted 26 March, 2022; v1 submitted 12 May, 2021; originally announced May 2021.
Comments: Submitted to Journal of Systems and Software
-
Integrated Model-Driven Engineering of Blockchain Applications for Business Processes and Asset Management
Abstract: Blockchain has attracted broad interests to build decentralised applications. Blockchain has attracted broad interests to build decentralised applications. However, develo** such applications without introducing vulnerabilities is hard for developers, not the least because the deployed code is immutable and can be called by anyone with access to the network. Model-driven engineering (MDE) helps… ▽ More
Submitted 22 October, 2020; v1 submitted 26 May, 2020; originally announced May 2020.
Comments: to appear in Software: Practice and Experience (2020)
-
Blockchains for Business Process Management - Challenges and Opportunities
Abstract: Blockchain technology promises a sizable potential for executing inter-organizational business processes without requiring a central party serving as a single point of trust (and failure). This paper analyzes its impact on business process management (BPM). We structure the discussion using two BPM frameworks, namely the six BPM core capabilities and the BPM lifecycle. This paper provides research… ▽ More
Submitted 31 January, 2018; v1 submitted 11 April, 2017; originally announced April 2017.
Comments: Preprint for ACM TMIS