A4 Refereed article in a conference publication

Where does your data go? Comparing network traffic and privacy policies of public sector mobile applications




AuthorsCarlsson Robin, Heino Timi, Koivunen Lauri, Rauti Sampsa, Leppänen Ville

EditorsAlvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira

Conference nameWorld Conference on Information Systems and Technologies

Publishing placeCham

Publication year2022

JournalLecture notes in networks and systems

Book title Information Systems and Technologies: WorldCIST 2022, Volume 1

Series titleLecture Notes in Networks and Systems

Volume468

First page 214

Last page225

ISBN978-3-031-04825-8

eISBN978-3-031-04826-5

ISSN2367-3370

eISSN2367-3389

DOIhttps://doi.org/10.1007/978-3-031-04826-5_21

Web address https://link.springer.com/chapter/10.1007/978-3-031-04826-5_21

Self-archived copy’s web addresshttps://research.utu.fi/converis/portal/detail/Publication/68670874


Abstract

As services increasingly move online and mobile devices become ubiquitous, mobile applications are widely used by ordinary people with little technical knowledge. Consequently, user privacy has become an essential matter to consider when developing mobile applications. In this paper, we study the privacy of 32 mobile applications provided by Finnish public sector bodies. First, we investigate with network traffic analysis what kind of personal data these application send out to third party analytics services. We then analyze the privacy policy documents of these applications and assess their clarity and transparency. Our findings show that there are several inconsistencies between the actual traffic of the studied applications and what is said about processing personal data in privacy policies. This underlines the need for software developers and organizations to be better aware of privacy regulations and data their applications send out. There is also lots of work to be done in making the privacy policies less vague and more informative, for example when it comes to explaining what technical data items are sent to third parties and how this can potentially affect the user privacy.


Downloadable publication

This is an electronic reprint of the original article.
This reprint may differ from the original in pagination and typographic detail. Please cite the original version.





Last updated on 2024-26-11 at 14:13