Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
column
Free access

Mobile-app privacy nutrition labels missing key ingredients for success

Published: 20 October 2022 Publication History

Abstract

Android and iOS privacy labels confuse developers and end users.

References

[1]
Anthony, S.F. The Case for Standardization of Privacy Policy Formats. July 2001; https://bit.ly/3xvSUKj
[2]
Chen, B.X. What we learned from Apple's new privacy labels. The New York Times, (Jan. 27, 2021); https://nyti.ms/3LsOCc9
[3]
Congress of the United States. House of Representatives, Committee on Energy and Commerce, letter to Tim Cook. (Feb. 9, 2021); https://bit.ly/3xAaWv1
[4]
Cranor, L.F. Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. J. on Telecomm. and High Tech. L. 10, 273 (2012); https://bit.ly/3RZTjgc
[5]
Cranor, L.F. et al. A large-scale evaluation of U.S. financial institutions' standardized privacy notices. ACM Trans. Web 10, 3, Article 17 (Aug. 2016); https://bit.ly/3RYMvQ3
[6]
Egelman, S. et al. Timing is everything? The effects of timing and placement of online privacy indicators. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2009), 319--328; https://bit.ly/3QWE3PN
[7]
Emami-Naeini, P. et al. Ask the experts: What should be on an IoT privacy and security label? In Proceedings of the 2020 IEEE Symposium on Security and Privacy (SP) (2020), 447--)464
[8]
Fowler, G.A. I checked apple's new privacy 'nutrition labels.' Many were false. The Washington Post (Jan. 29, 2021); https://wapo.st/3dx2rK9
[9]
Gardner, J. et al. Helping mobile application developers create accurate privacy labels. (IWPE'22, May 2022); https://bit.ly/3qOgs9g
[10]
Kelley, P.G. et al. A "nutrition label" for privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security, pages 1--12, 2009. https://bit.ly/3dqMTrr
[11]
Kelley, P.G. et al. Standardizing privacy notices: An online study of the nutrition label approach. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '10 (2010), 1573--1582; https://bit.ly/3BSH0Nd
[12]
Kelley, P.G. et al. Privacy as part of the app decision-making process. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (2013), 3393--3402; https://bit.ly/3LuiRji
[13]
Koch, S. et al. Keeping privacy labels honest. In Proceedings on Privacy Enhancing Technologies 4, (2022).
[14]
Li, T. et al. Honeysuckle: Annotation-guided code generation of in-app privacy notices. In Proceedings of ACM Interact. Mob. Wearable Ubiquitous Technol. 5, 3 Article 112 (Sept 2021); https://bit.ly/3dsj2Pq
[15]
Li, T. et al. Understanding challenges for developers to create accurate privacy nutrition labels. In CHI Conference on Human Factors in Computing Systems, CHI '22, New York, NY, USA, 2022; https://bit.ly/3BUsu7K
[16]
Li, Y. et al. Understanding iOS privacy nutrition labels: An exploratory large-scale analysis of app store data. In CHI Conference on Human Factors in Computing Systems Extended Abstracts, CHI EA '22, New York, NY, USA, 2022; https://bit.ly/3eWR0vL
[17]
Zhang, S. et al. How usable are iOS app privacy labels? In Proceedings on Privacy Enhancing Technologies 4, (2022).

Cited By

View all
  • (2024)Unpacking privacy labelsProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699059(2831-2848)Online publication date: 14-Aug-2024
  • (2024)Exploring expandable-grid designs to make iOS app privacy labels more usableProceedings of the Twentieth USENIX Conference on Usable Privacy and Security10.5555/3696899.3696907(139-157)Online publication date: 12-Aug-2024
  • (2024)The death of privacy policies: How app stores shape GDPR compliance of appsInternet Policy Review10.14763/2024.2.175713:2Online publication date: 2-Apr-2024
  • Show More Cited By

Index Terms

  1. Mobile-app privacy nutrition labels missing key ingredients for success

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Communications of the ACM
    Communications of the ACM  Volume 65, Issue 11
    November 2022
    130 pages
    ISSN:0001-0782
    EISSN:1557-7317
    DOI:10.1145/3569027
    • Editor:
    • James Larus
    Issue’s Table of Contents
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 20 October 2022
    Published in CACM Volume 65, Issue 11

    Check for updates

    Qualifiers

    • Column
    • Popular
    • Un-reviewed

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)867
    • Downloads (Last 6 weeks)160
    Reflects downloads up to 15 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Unpacking privacy labelsProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699059(2831-2848)Online publication date: 14-Aug-2024
    • (2024)Exploring expandable-grid designs to make iOS app privacy labels more usableProceedings of the Twentieth USENIX Conference on Usable Privacy and Security10.5555/3696899.3696907(139-157)Online publication date: 12-Aug-2024
    • (2024)The death of privacy policies: How app stores shape GDPR compliance of appsInternet Policy Review10.14763/2024.2.175713:2Online publication date: 2-Apr-2024
    • (2024)Is a Trustmark and QR Code Enough? The Effect of IoT Security and Privacy Label Information Complexity on Consumer Comprehension and BehaviorProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642011(1-32)Online publication date: 11-May-2024
    • (2024)Explainability as a Requirement for Hardware: Introducing Explainable Hardware (XHW)2024 IEEE 32nd International Requirements Engineering Conference (RE)10.1109/RE59067.2024.00042(354-362)Online publication date: 24-Jun-2024
    • (2024)Usable Cybersecurity: a Contradiction in Terms?Interacting with Computers10.1093/iwc/iwad03536:1(3-15)Online publication date: 23-Jan-2024
    • (2023)Investigating security indicators for hyperlinking within the metaverseProceedings of the Nineteenth USENIX Conference on Usable Privacy and Security10.5555/3632186.3632219(605-620)Online publication date: 7-Aug-2023
    • (2023)Comparing Privacy Labels of Applications in Android and iOSProceedings of the 22nd Workshop on Privacy in the Electronic Society10.1145/3603216.3624967(61-73)Online publication date: 26-Nov-2023
    • (2023)Understanding and Mitigating Technology-Facilitated Privacy Violations in the Physical WorldProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3580909(1-16)Online publication date: 19-Apr-2023
    • (2023)Comparing Privacy Label Disclosures of Apps Published in both the App Store and Google Play Stores2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW59978.2023.00022(150-157)Online publication date: Jul-2023

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Digital Edition

    View this article in digital edition.

    Digital Edition

    Magazine Site

    View this article on the magazine site (external)

    Magazine Site

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media