An Exploratory Study on Vagueness in Website Privacy Policies

Slides:



Advertisements
Similar presentations
Institute for P-12 Engineering Research and Learning (INSPIRE) Heidi Diefes-Dux Teri Reed-Rhoads.
Advertisements

Controls Lab Interface Improvement Project #06508Faculty Advisors: Dr. A. Mathew and Dr. D. Phillips Project Objectives This work focused on the improvement.
COURSE OVERVIEW ADVANCED TEXT ANALYTICS Thomas Tiahrt, MA, PhD CSC492 – Advanced Text Analytics.
Welcome Introduction and Overview Computer Science Research Practicum Fall 2012 Andrew Rosenberg.
A Perspective from the Public Health Program of the College of Health Sciences AMERICAN UNIVERSITY OF ARMENIA.
Final Year Project Interim Presentation Software Visualisation and Comparison Tool Presented By : Shane Lillis, , 4th Year Computer Engineering.
ADVANCED WEB SEARCH TECHNIQUES Computing and Information Technology Ali Robertson 1.
Computer Science 725 – Software Security Presentation “Decentralized Trust Management” Decentralized Trust ManagementDecentralized Trust Management M.
Machine Learning Lecture 1. Course Information Text book “Introduction to Machine Learning” by Ethem Alpaydin, MIT Press. Reference book “Data Mining.
Working together – A Health Informatics Career Framework for the UK The English Perspective.
UMBC CMSC 341 Intro1 CMSC 341 Course Introduction.
ICT Standards and Guidelines Presenting the Project and the Team Sharif Hussein President, CNSI International.
Translation, Articulation, Communication Sarah Laleman Ward, Outreach Librarian Stephanie Margolin, Instructional Design Librarian CUNY Hunter College.
Experimental Results Abstract Fingerspelling is widely used for education and communication among signers. We propose a new static fingerspelling recognition.
Computer Science Faculty School of Software Engineering C INTERPRETER AND DEBUGGER (ISO/IEC 9899:2011) Developer: student of 203SE group: Lukyanov Dmitry.
Computer Engineering.
Iantha M. Haight.  Social bookmarking tools are being used by business, libraries  Can they be used successfully in college and university courses?
First week. Catalog Description This course explores basic cultural, social, legal, and ethical issues inherent in the discipline of computing. Students.
College Success Program John Cowles, Ph.D. Dean of Student Success and Retention Grand Rapids Community College Grand Rapids, Michigan.
Project #5: Generating Privacy and Security Threat Summary for Internet of Things REU Student: Ray Yan Graduate mentors: Logan Lebanoff Faculty Mentor(s):
Project 9: Investigating User Benefits and Risks Associated with IoT use REU Student: Joseph Prause Graduate mentors: Arup Ghosh Faculty Mentor(s):
Project 5: Generating Privacy and Security Threat Summary for Internet of Things REU Student: Nicole Fella Graduate Mentor: Kexin Liao Faculty Mentor:
Project #5: Generating Privacy and Security Threat Summary for Internet of Things REU Student: Ray Yan Graduate mentors: Logan Lebanoff Faculty Mentor(s):
Project #5: Generating Privacy and Security Threat Summary for Internet of Things REU Student: Ray Yan Graduate mentors: Logan Lebanoff Faculty Mentor(s):
Project 5: Generating Privacy and Security Threat Summary for Internet of Things REU Student: Nicole Fella Graduate Mentor: Kexin Liao Faculty Mentor:
Project 11: Security and Privacy of the Communication Channels among IoT Devices REU Student: Tianbo Chen Graduate mentors: Safa Bacanli and Huy Truong.
Survey on Security and Energy Efficiency in the Cloud Computing Environment Wei Wu.
Future-oriented Benchmarking Through Social Media Analysis
دانشکده سرمایه گذار مبانی و مدل
Women in Science & Technology Panel
Internet of Hospital Things: Infrastructure-Less Localization
Project 5: Generating Privacy and Security Threat Summary for Internet of Things REU Student: Nicole Fella Graduate Mentor: Kexin Liao Faculty Mentor:
Project 5: Generating Privacy and Security Threat Summary for Internet of Things REU Student: Nicole Fella Graduate Mentor: Kexin Liao Faculty Mentor:
Project 5: Generating Privacy and Security Threat Summary for Internet of Things REU Student: Nicole Fella Graduate Mentor: Kexin Liao Faculty Mentor:
Accomplishments: Problems & Solutions: Plans for next week:
Website Call
Cavendish & Hallwood Park Schools
Project 1: Investigating the Value versus Cost of Privacy in the Internet of Things REU Student: Patrick Dorton Graduate mentors: Salih Safa Bacanli.
Project #5: Generating Privacy and Security Threat Summary for Internet of Things REU Student: Ray Yan Graduate mentors: Logan Lebanoff Faculty Mentor(s):
Project #5: Generating Privacy and Security Threat Summary for Internet of Things REU Student: Ray Yan Graduate mentors: Logan Lebanoff Faculty Mentor(s):
Project #5: Generating Privacy and Security Threat Summary for Internet of Things REU Student: Ray Yan Graduate mentors: Logan Lebanoff Faculty Mentor(s):
Call : Website: -
Project 9: Investigating User Benefits and Risks Associated with IoT use REU Student: Joseph Prause Graduate mentors: Arup Ghosh Faculty Mentor(s):
ហ៊ែល Sua S’dei.
Project 5: Generating Privacy and Security Threat Summary for Internet of Things REU Student: Nicole Fella Graduate Mentor: Kexin Liao Faculty Mentor:
Project #5: Generating Privacy and Security Threat Summary for Internet of Things REU Student: Ray Yan Graduate mentors: Logan Lebanoff Faculty Mentor(s):
Week 5 ( June 11 – June 18, 2018) Faculty mentor(s): Dr.Fei Liu
Project 5: Generating Privacy and Security Threat Summary for Internet of Things REU Student: Nicole Fella Graduate Mentor: Kexin Liao Faculty Mentor:
Week 1 (May 23 – May 27, 2016) Accomplishments:
Faculty of Medicine and Health Sciences
REU student: Domonique Cox Graduate mentors: Kaiqiang Song
Project #5: Generating Privacy and Security Threat Summary for Internet of Things REU Student: Ray Yan Graduate mentors: Logan Lebanoff Faculty Mentor(s):
A key to success in college, career and life
Re- engineeniering.
Project 5: Generating Privacy and Security Threat Summary for Internet of Things REU Student: Nicole Fella Graduate Mentor: Kexin Liao Faculty Mentor:
Algorithms Lecture # 27 Dr. Sohail Aslam.
USING ARRAYS IN MATLAB BUILT-IN MATH FUNCTIONS
Algorithms Lecture # 01 Dr. Sohail Aslam.
REU student: Domonique Cox Graduate mentors: Kaiqiang Song
Massachusetts Institute of Technology
Type Topic in here! Created by Educational Technology Network
Unsupervised Machine Learning: Clustering Assignment
LANGUAGE EDUCATION.
Project #: IoT-enabled peer-to-peer energy trading REU Students: Eric Elliott & Nicholas Shanklin Graduate mentors: Sharare Zehtabian Faculty mentor(s):
SCHOLARS OF THE FUTURE An Implementation Model for Increasing Diversity in Information Technology The Scholars of the Future program is a four-year initiative.
Knowledge-based Systems
 WEBSITE:
 WEBSITE:
Algorithms Lecture #42 Dr. Sohail Aslam.
Austin Karingada, Jacob Handy, Adviser : Dr
Presentation transcript:

An Exploratory Study on Vagueness in Website Privacy Policies Nicole Fella Computer Engineering at Manhattan College Faculty Advisor: Dr. Fei Liu Graduate Mentor: Kexin Liao

Investigation of Vagueness Goal: Create a framework to help define and identify characteristics of vagueness to be implemented using a machine learning, natural language processing algorithm for classification Analyzed legal and linguistic perspectives of vagueness cases • Indeterminacy • Borderline cases • Linguistic characteristics

Investigation of Vagueness Goal: Create a framework to help define and identify characteristics of vagueness to be implemented using a machine learning, natural language processing algorithm for classification “Unclear” privacy policy excerpt: Terms similar to those highlighted above extended upon library of vague key words and phrases identified by experts.