Exploring Consequences of Privacy Policies with Narrative Generation via Answer Set Programming
Informed consent has become increasingly salient for data privacy and its regulation. Entities from governments to for-profit companies have addressed concerns about data privacy with policies that enumerate the conditions for personal data storage and transfer. However, increased enumeration of and transparency in data privacy policies has not improved end-users’ comprehension of how their data might be used: not only are privacy policies written in legal language that users may struggle to understand, but elements of these policies may compose in such a way that the consequences of the policy are not immediately apparent.
We present a framework that uses Answer Set Programming (ASP) — a type of logic programming — to formalize privacy policies. Privacy policies thus become constraints on a narrative planning space, allowing end-users to forward-simulate possible consequences of the policy in terms of actors having roles and taking actions in a domain. We demonstrate through the example of the Health Insurance Portability and Accountability Act (HIPAA) how to use the system in various ways, including asking questions about possibilities and identifying which clauses of the law are broken by a given sequence of events.
Sun 15 JanDisplayed time zone: Eastern Time (US & Canada) change
11:00 - 12:30
|Building Information Modeling Using Constraint Logic Programming (Extended Abstract)Virtual|
Joaquín Arias Universidad Rey Juan Carlos, Seppo Törmä VisuaLynk Oy, Finland, Manuel Carro IMDEA Software Institute and T.U. of Madrid (UPM), Gopal Gupta University of Texas at Dallas, USALink to publication DOI Pre-print File Attached
|Exploring Consequences of Privacy Policies with Narrative Generation via Answer Set Programming|
Chinmaya Dabral North Carolina State University, Emma Tosch Northeastern University, USA, Chris Martens Northeastern UniversityLink to publication Pre-print File Attached
|The Structure and Legal Interpretation of Computer ProgramsVirtual|
James Grimmelmann Cornell UniversityFile Attached
|Deontic Paradoxes in Library Lending Regulations: A Case Study in Flint|
Sterre Lutz Utrecht University and TNODOI Pre-print
|Defeasible Semantics for L4Virtual|
ProLaLaLink to publication DOI