{"id":"https://openalex.org/W4306406283","doi":"https://doi.org/10.1145/3545948.3545952","title":"Viopolicy-Detector: An Automated Approach to Detecting GDPR Suspected Compliance Violations in Websites","display_name":"Viopolicy-Detector: An Automated Approach to Detecting GDPR Suspected Compliance Violations in Websites","publication_year":2022,"publication_date":"2022-10-17","ids":{"openalex":"https://openalex.org/W4306406283","doi":"https://doi.org/10.1145/3545948.3545952"},"language":"en","primary_location":{"id":"doi:10.1145/3545948.3545952","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3545948.3545952","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030218221","display_name":"Haoran Ou","orcid":null},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haoran Ou","raw_affiliation_strings":["School of Cyber Science and Engineering, Sichuan University, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100606641","display_name":"Yong Fang","orcid":"https://orcid.org/0000-0003-2736-0615"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Fang","raw_affiliation_strings":["School of Cyber Science and Engineering, Sichuan University, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079552610","display_name":"Yongyan Guo","orcid":"https://orcid.org/0000-0003-3283-255X"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongyan Guo","raw_affiliation_strings":["School of Cyber Science and Engineering, Sichuan University, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054699755","display_name":"Wenbo Guo","orcid":"https://orcid.org/0000-0002-6890-4503"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenbo Guo","raw_affiliation_strings":["School of Cyber Science and Engineering, Sichuan University, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, China","institution_ids":["https://openalex.org/I24185976"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075394107","display_name":"Cheng Huang","orcid":"https://orcid.org/0000-0002-5871-946X"},"institutions":[{"id":"https://openalex.org/I24185976","display_name":"Sichuan University","ror":"https://ror.org/011ashp19","country_code":"CN","type":"education","lineage":["https://openalex.org/I24185976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cheng Huang","raw_affiliation_strings":["School of Cyber Science and Engineering, Sichuan University, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Sichuan University, China","institution_ids":["https://openalex.org/I24185976"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5030218221"],"corresponding_institution_ids":["https://openalex.org/I24185976"],"apc_list":null,"apc_paid":null,"fwci":1.516,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.86613459,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"409","last_page":"430"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/general-data-protection-regulation","display_name":"General Data Protection Regulation","score":0.7960432767868042},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7178974747657776},{"id":"https://openalex.org/keywords/privacy-policy","display_name":"Privacy policy","score":0.6760865449905396},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6027591824531555},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.530570924282074},{"id":"https://openalex.org/keywords/declaration","display_name":"Declaration","score":0.509065568447113},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.47472986578941345},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4721282422542572},{"id":"https://openalex.org/keywords/principle-of-legality","display_name":"Principle of legality","score":0.4318059980869293},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.4229307770729065},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.404096782207489},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3525528311729431},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.09009328484535217}],"concepts":[{"id":"https://openalex.org/C3090818","wikidata":"https://www.wikidata.org/wiki/Q1172506","display_name":"General Data Protection Regulation","level":3,"score":0.7960432767868042},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7178974747657776},{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.6760865449905396},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6027591824531555},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.530570924282074},{"id":"https://openalex.org/C138147947","wikidata":"https://www.wikidata.org/wiki/Q1183659","display_name":"Declaration","level":2,"score":0.509065568447113},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.47472986578941345},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4721282422542572},{"id":"https://openalex.org/C42027317","wikidata":"https://www.wikidata.org/wiki/Q2307054","display_name":"Principle of legality","level":2,"score":0.4318059980869293},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.4229307770729065},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.404096782207489},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3525528311729431},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.09009328484535217},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3545948.3545952","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3545948.3545952","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth","score":0.699999988079071}],"awards":[{"id":"https://openalex.org/G3385172613","display_name":null,"funder_award_id":"2021YFB3100500","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8925078574","display_name":null,"funder_award_id":"61902265, U20B2045","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1598140581","https://openalex.org/W1993095244","https://openalex.org/W2046653306","https://openalex.org/W2292805798","https://openalex.org/W2394985082","https://openalex.org/W2416995857","https://openalex.org/W2417863416","https://openalex.org/W2517394750","https://openalex.org/W2528826491","https://openalex.org/W2611687401","https://openalex.org/W2759177743","https://openalex.org/W2784134919","https://openalex.org/W2790061651","https://openalex.org/W2791737564","https://openalex.org/W2793002157","https://openalex.org/W2887427605","https://openalex.org/W2946186533","https://openalex.org/W2946666127","https://openalex.org/W2958793707","https://openalex.org/W2963611340","https://openalex.org/W2970017784","https://openalex.org/W2980748551","https://openalex.org/W2999830435","https://openalex.org/W3000190958","https://openalex.org/W3015767612","https://openalex.org/W3020871328","https://openalex.org/W3036723847","https://openalex.org/W3049637327","https://openalex.org/W3092011919","https://openalex.org/W3094729606","https://openalex.org/W3103666600","https://openalex.org/W3106386337","https://openalex.org/W3124776372","https://openalex.org/W3127285507","https://openalex.org/W3128187337","https://openalex.org/W3129741204","https://openalex.org/W3135347465","https://openalex.org/W3153735076","https://openalex.org/W3199842571","https://openalex.org/W3208710908","https://openalex.org/W3212134035","https://openalex.org/W4288072557","https://openalex.org/W4288086187"],"related_works":["https://openalex.org/W2917102635","https://openalex.org/W3023256691","https://openalex.org/W2603253017","https://openalex.org/W2883729192","https://openalex.org/W2789497412","https://openalex.org/W2901967497","https://openalex.org/W2910484607","https://openalex.org/W2794700933","https://openalex.org/W3171079982","https://openalex.org/W3048759155"],"abstract_inverted_index":{"To":[0,111],"provide":[1],"users":[2],"with":[3,191,332],"personalized":[4],"services,":[5],"the":[6,15,26,34,37,46,77,100,106,113,120,172,177,188,201,205,218,233,251,255,264,270,278,292,300,304,310,313],"website":[7,19,101,125,206],"collects":[8],"and":[9,122,151,280,295],"tracks":[10],"user\u2019s":[11],"activity":[12],"data.":[13,50,87],"At":[14],"same":[16],"time,":[17],"each":[18],"uses":[20],"a":[21,54,64,81,93,103,130,142,192],"privacy":[22,47,65,107,126,143,189,271],"policy":[23,66,108,144],"to":[24,44,128,163,182,208,221,231,286,323],"ensure":[25],"legality":[27],"of":[28,33,36,48,83,194,204,243,250,266,312],"these":[29,148],"actions.":[30],"The":[31],"purpose":[32],"implementation":[35],"General":[38],"Data":[39],"Protection":[40],"Regulation":[41],"(GDPR)":[42],"is":[43,53,58,109,284],"protect":[45],"user":[49,213],"Because":[51],"GDPR":[52,121,165],"programmatic":[55],"regulation,":[56],"there":[57,70],"no":[59],"specific":[60],"guidance":[61],"on":[62,76,138,263,274],"what":[63],"should":[67],"contain.":[68],"Therefore,":[69],"may":[71],"still":[72],"be":[73],"potential":[74],"violations":[75,168],"website,":[78,279],"thus":[79],"cause":[80,287],"risk":[82],"leak":[84],"users\u2019":[85],"private":[86],"In":[88],"this":[89,229],"paper,":[90],"we":[91,117,140,158,175,198,216,290,308],"define":[92],"violating":[94,114,224,293],"behavior":[95,115],"that":[96,297],"data":[97,132,184,210,267,275,282],"collected":[98,276],"by":[99,277],"without":[102],"declaration":[104],"in":[105,169,187,248,269,299],"illegal.":[110],"complete":[112],"detection,":[116],"first":[118],"interpret":[119],"analyze":[123,254],"1000":[124],"policies":[127],"present":[129,303],"personal":[131,209],"classification":[133,180],"including":[134,147,261],"eight":[135,149],"categories.":[136],"Based":[137],"this,":[139],"propose":[141,159],"annotation":[145],"scheme":[146],"categories":[150],"collect":[152],"145":[153],"related":[154,207],"Web":[155],"APIs.":[156],"Then":[157,289],"an":[160],"automated":[161],"method":[162,230],"detect":[164,232],"suspected":[166],"compliance":[167],"websites.":[170,315],"On":[171],"one":[173],"hand":[174],"use":[176,228],"multi-label":[178],"text":[179],"model":[181],"extract":[183],"collection":[185,211,283],"stated":[186],"policy,":[190,272],"precision":[193],"0.9817.":[195],"For":[196],"another,":[197],"dynamically":[199],"monitor":[200],"JavaScript":[202],"calls":[203],"during":[212],"visits.":[214],"Finally,":[215,307],"compare":[217],"two":[219],"results":[220,257],"determine":[222],"whether":[223],"behaviors":[225],"appeared.":[226],"We":[227,253],"European":[234],"top":[235],"500":[236],"websites":[237,246,294,298,331],"(actually":[238],"451":[239],"websites).":[240],"A":[241],"total":[242],"159":[244],"(35.3%)":[245],"appear":[247],"violation":[249],"GDPR.":[252],"detection":[256],"from":[258],"different":[259],"perspectives,":[260],"statistics":[262,273],"types":[265],"declared":[268],"which":[281],"likely":[285],"violations.":[288,306],"classify":[291],"find":[296],"Social":[301],"category":[302],"most":[305],"count":[309],"rankings":[311],"offending":[314],"Surprisingly,":[316],"top-ranking":[317],"sites":[318],"are":[319,326],"even":[320,327],"more":[321],"prone":[322],"breaches.":[324],"There":[325],"some":[328],"globally":[329],"well-known":[330],"violations,":[333],"such":[334],"as":[335],"BBC,":[336],"Nokia,":[337],"Ebay,":[338],"Google":[339],"etc.":[340]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
