Journal of Information Resources Management ›› 2024, Vol. 14 ›› Issue (5): 75-90.doi: 10.13365/j.jirm.2024.05.075

Previous Articles     Next Articles

Induced Consent Analysis of Privacy Policy Based on Grounded Theory and Machine Learning

Chen Menglei1 Luo Yingjia2 Zhu Hou1   

  1. 1.Information Management College, Sun Yat-Sen University, Guangzhou,510006;
    2.School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore, 637371
  • Online:2024-09-26 Published:2024-10-15
  • About author:Chen Menglei,master candidate,specializing in semantic analysis of information resources;Luo Yingjia,master candidate,specializing in semantic analysis of information resources;Zhu Hou(corresponding author) ,Ph.D., associate professor and master’s supervisor, specializing in privacy management and computer simulation,Email:zhuhou3@mail.sysu.edu.cn.
  • Supported by:
    This is an outcome from "Public Opinion Evolution Mechanism and Risk Control of Smart Media Based on Crowd-Algorithm Interaction"(23YJC630270) funded by Ministry of Education in China Project of Humanities and Social Sciences and "Research on Mechanism of Social Media Privacy Leakage from Multi-sources and Their Interaction Based on Computational Experiments"(71801229) funded by National Natural Science Foundation of China.

Abstract: Analyzing privacy policies from the user’s perspective to understand the tendency for induced consent is beneficial in helping users identify unfair terms and providing regulatory authorities with guidance to standardize app privacy policies. This study uses grounded theory to examine the tendency of induced consent in privacy policies from the user’s perspective and develops a coding system for such tendencies. After manually annotating the corpus, we trained a K-BERT model using semi-supervised learning to achieve the automated identification of statements with a tendency to induce consent within privacy policies. Moreover, further network analysis and sequence pattern mining were conducted to explore the characteristics and underlying patterns of user consent induction in privacy policies. Empirical analysis reveals that user opportunity costs, privacy management costs, and fuzzy concepts are central to the network of inducing dimensions. Fuzzy concepts and responsibility-shifting statements play a crucial role in the patterned inductive writing of privacy policies, usually appearing densely following other unfair statements. Furthermore, the study identifies significant differences in the features of induced consent between the children's domain and other domains. Some common features exist among privacy policies across specific domains, potentially linked to similarities in service delivery and business logic.

Key words: Privacy policy, Induced consent, Grounded theory, K-BERT, Network analysis, Sequential pattern mining

CLC Number: