Advertisement

Benchmarking Privacy Policies in the Mobile Application Ecosystem

  • Sharif Adel Kandil
  • Micha van den Akker
  • Koen van Baarsen
  • Slinger Jansen
  • Paul van Vulpen
Conference paper
Part of the Lecture Notes in Business Information Processing book series (LNBIP, volume 336)

Abstract

Mobile app providers have access to, and gather, large amounts of personal data. The exact data varies by app provider and is described in lengthy privacy policies with varying levels of transparency. Privacy policies with a low level of transparency hamper users from making educated decisions about the data that they want to share with third parties. In this paper, the Privacy Policy Benchmark Model is presented based on existing literature and applied to a selection of 20 mobile applications and their privacy policies. The Privacy Policy Benchmark Model is used for evaluating the transparency and quantity of data that is collected. The model consists of two aspects: the amount of data mobile app provides collect and the transparency of those privacy policies. The examined providers are transparent about what they collected and how they use it. They are less transparent about other topics such as the location of the stored information and how information is processed after removal, making privacy and usage considerations more difficult for users on those specific matters.

Keywords

Transparency Personal data Mobile app store Privacy policies 

References

  1. 1.
    Ngai, E.W., Gunasekaran, A.: A review for mobile commerce research and applications. Decis. Support Syst. 43(1), 3–15 (2007)CrossRefGoogle Scholar
  2. 2.
    Chitkara, S., Gothoskar, N., Harish, S., Hong, J.I., Agarwal, Y.: Does this app really need my location? Context-aware privacy management for smartphones. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1(3), 22 p. (2017). Article no. 42CrossRefGoogle Scholar
  3. 3.
  4. 4.
    Boyles, J.L., Smith, A., Madden, M.: Privacy and data management on mobile devices. Pew Internet and American Life Project (2012)Google Scholar
  5. 5.
    Almuhimedi, H., et al.: Your location has been shared 5,398 times!: A field study on mobile app privacy nudging. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI 2015, pp. 787–796. ACM, New York (2015)Google Scholar
  6. 6.
    Felt, A., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 627—638. ACM (2011)Google Scholar
  7. 7.
  8. 8.
    Dhar, S., Varshney, U.: Challenges and business models for mobile location-based services and advertising. Commun. ACM 54(5), 121–128 (2011)CrossRefGoogle Scholar
  9. 9.
    Cuadrado, F., Dueñas, J.C.: Mobile application stores: success factors, existing approaches, and future developments. IEEE Commun. Mag. 50(11), 160–167 (2012)CrossRefGoogle Scholar
  10. 10.
    Davis, M.: Rethinking personal data pre-read document. World Economic Forum (2010)Google Scholar
  11. 11.
    Jensen, C., Potts, C.: Privacy policies as decision-making tools: an evaluation of online privacy notices. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 471–478. ACM, April 2004Google Scholar
  12. 12.
    Pollach, I.: What’s wrong with online privacy policies? Commun. ACM 50(9), 103–108 (2007)CrossRefGoogle Scholar
  13. 13.
    Hamlin, K., Gallagher, D.P., Grant, J.: Response by Kaliya Hamlin, Identity Woman (2011). https://identitywoman.net/wp-content/uploads/2011/08/NSTIC-NOI-Kaliya.pdf
  14. 14.
    Jetmarová, B.: The value position of the role of knowledge management and its benefits for benchmarking application. J. Organ. Knowl. Manag. 2012, 1 (2012)Google Scholar
  15. 15.
    Stajano, F.: Will your digital butlers betray you?. In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, pp. 37–38. ACM (2004)Google Scholar
  16. 16.
  17. 17.
    Malhotra, N.K., Kim, S.S., Agarwal, J.: Internet users’ information privacy concerns (IUIPC): the construct, the scale, and a causal model. Inf. Syst. Res. 15(4), 336–355 (2004)CrossRefGoogle Scholar
  18. 18.
    Phelps, J., Nowak, G., Ferrell, E.: Privacy concerns and consumer willingness to provide personal information. J. Public Policy Mark. 19(1), 27–41 (2000)CrossRefGoogle Scholar
  19. 19.
    Wang, H., Lee, M.K., Wang, C.: Consumer privacy concerns about Internet marketing. Commun. ACM 41(3), 63–70 (1998)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Sharif Adel Kandil
    • 1
  • Micha van den Akker
    • 1
  • Koen van Baarsen
    • 1
  • Slinger Jansen
    • 1
  • Paul van Vulpen
    • 1
  1. 1.Utrecht UniversityUtrechtThe Netherlands

Personalised recommendations