skip to main content
10.1145/1143120.1143123acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
Article

An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench

Published:12 July 2006Publication History

ABSTRACT

Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, our human-centered research has focused on understanding organizational privacy management needs, and, based on those needs, creating a usable and effective policy workbench called SPARCLE. SPARCLE will enable organizational users to enter policies in natural language, parse the policies to identify policy elements and then generate a machine readable (XML) version of the policy. In the future, SPARCLE will then enable mapping of policies to the organization's configuration and provide audit and compliance tools to ensure that the policy implementation operates as intended. In this paper, we present the strategies employed in the design and implementation of the natural language parsing capabilities that are part of the functional version of the SPARCLE authoring utility. We have created a set of grammars which execute on a shallow parser that are designed to identify the rule elements in privacy policy rules. We present empirical usability evaluation data from target organizational users of the SPARCLE system and highlight the parsing accuracy of the system with the organizations' privacy policies. The successful implementation of the parsing capabilities is an important step towards our goal of providing a usable and effective method for organizations to link the natural language version of privacy policies to their implementation, and subsequent verification through compliance auditing of the enforcement logs.

References

  1. Ackerman, M., & Mainwaring, S. (2005). Privacy issues in human-computer interaction. In L. Cranor & S. Garfinkel (Eds.) Security and Usability: Designing Secure Systems That People Can Use, Sebastopol, CA: O'Reilly, 381--400.Google ScholarGoogle Scholar
  2. Anderson R. J. A (1996). Security Policy Model for Clinical Information Systems. In the Proceedings of the 1996 IEEE Symposium on Security and Privacy, 30--43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Anderson R. J. (2000). Privacy Technology Lessons from Healthcare. In the Proceedings of the 2000 IEEE Symposium on Security and Privacy. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Agrawal, R., Kiernan, J., Srikant, R., and Xu, Y. (2003). Implementing P3P Using Database Technology. Proceedings of the 19th International Conference on Data Engineering, Bangalore, India.Google ScholarGoogle Scholar
  5. Ashley, P., Hada, S., Karjoth, G., Powers, C., and Schunter, M. (2003). Enterprise Privacy Architecture Language (EPAL 1.2). W3C Member Submission. http://www.w3.org/Submission/EPAL/Google ScholarGoogle Scholar
  6. Bohrer, K., Levy, S., Liu, X., and Schonberg, E. (2003). Individual Privacy Policy Based Access Control. In Proceedings of the 6th International Conference on Electronic Commerce Research (ICECR-6).Google ScholarGoogle Scholar
  7. Brodie, C., Karat, C., and Karat, J. (2005). Usable Security and Privacy: A Case Study of Developing Privacy Management Tools. Proceedings of the Symposium on Usable Privacy and Security, (SOUPS'05), ACM Digital Library. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. CRA Conference on "Grand Research Challenges in Information Security and Assurance". http://www.cra.org/Activities/grand.challenges/security/. November 16-19, 2003.Google ScholarGoogle Scholar
  9. Cranor, L. (2002). Web Privacy with P3P. Cambridge: O'Reilly. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Cranor, L. (2005). Privacy policies and privacy preferences. In L. Cranor & S. Garfinkel (Eds.) Security and Usability: Designing Secure Systems That People Can Use, Sebastopol, CA: O'Reilly, 447--472.Google ScholarGoogle Scholar
  11. IBM Research UIMA(2005) http://www.research.ibm.com/UIMA/Google ScholarGoogle Scholar
  12. IBM Tivoli Privacy Manager for eBusiness (2004). http://www-306.ibm.com/software/tivoli/products/privacy-mgr-e-bus/.Google ScholarGoogle Scholar
  13. Karat, C., Karat, J., Brodie, C., and Feng, J. (2006). Evaluating interfaces for privacy policy rule authoring. Proceedings of the Conference on Human Factors in Computing Systems -- CHI 2006, ACM Press, 83--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Karat, J., Karat, C., Brodie, C., and Feng, J. (2005). Privacy in information technology: Designing to enable privacy policy management in organizations. International Journal of Human Computer Studies, 63, 1-2, 153--174. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Karjoth, G. and Schunter, M. (2002) A Privacy Policy Model for Enterprises. Proceedings of the 15th IEEE Computer Security Foundations Workshop, 271--281. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Michael, J. B., Ong V. L., and Rowe N. C, (2001) "Natural-language processing support for developing policy-governed software systems", 39th International Conference on Technology for Object-Oriented Languages and Systems, IEEE Computer Society Press, pp. 263--274. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Microsoft Internet Explorer (2004). Help Safeguard your privacy on the web. http://www.microsoft.com/windows/ie/using/howto/privacy/config.mspxGoogle ScholarGoogle Scholar
  18. Neff, M., Byrd, R., and Boguraev, B. (2003) The Talent system: TEX-TRACT architecture and data model. In Proceedings of HLT-NAACL Workshop on Software Engineering and Architectures of Language Technology Systems, Edmonton, Alberta, Canada. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. OASIS (2005). eXtensible Access Control Markup Language Version 2.0. http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-specos.pdf.Google ScholarGoogle Scholar
  20. OASIS (2005). Privacy Policy Profile of XACML v2.0. http://docs.oasis-open.org/xacml/2.0/PRIVACY-PROFILE/access_control-xacml-2.0-privacy_profile-specos.pdf.Google ScholarGoogle Scholar
  21. Ponemon Institute and IAPP, (2004). 2003 Benchmark Study of Corporate Privacy Practices.Google ScholarGoogle Scholar
  22. Smith, J. (1993). Privacy policies and practices: Inside the organizational maze. Communications of the ACM, 36, 12, 105--122. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Whitten, A. and Tygar J. D. (1999) Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of the 9th USENIX Security Symposium, August, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. W3C (2002) A P3P Preference Exchange Language 1.0 (APPEL 1.0). http://www.w3.org/TR/P3P-preferences/Google ScholarGoogle Scholar

Index Terms

  1. An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        SOUPS '06: Proceedings of the second symposium on Usable privacy and security
        July 2006
        168 pages
        ISBN:1595934480
        DOI:10.1145/1143120

        Copyright © 2006 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 July 2006

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate15of49submissions,31%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader