A4 Vertaisarvioitu artikkeli konferenssijulkaisussa

Where does your data go? Comparing network traffic and privacy policies of public sector mobile applications




TekijätCarlsson Robin, Heino Timi, Koivunen Lauri, Rauti Sampsa, Leppänen Ville

ToimittajaAlvaro Rocha, Hojjat Adeli, Gintautas Dzemyda, Fernando Moreira

Konferenssin vakiintunut nimiWorld Conference on Information Systems and Technologies

KustannuspaikkaCham

Julkaisuvuosi2022

JournalLecture notes in networks and systems

Kokoomateoksen nimiInformation Systems and Technologies: WorldCIST 2022, Volume 1

Sarjan nimiLecture Notes in Networks and Systems

Vuosikerta468

Aloitussivu214

Lopetussivu225

ISBN978-3-031-04825-8

eISBN978-3-031-04826-5

ISSN2367-3370

eISSN2367-3389

DOIhttps://doi.org/10.1007/978-3-031-04826-5_21

Verkko-osoitehttps://link.springer.com/chapter/10.1007/978-3-031-04826-5_21

Rinnakkaistallenteen osoitehttps://research.utu.fi/converis/portal/detail/Publication/68670874


Tiivistelmä

As services increasingly move online and mobile devices become ubiquitous, mobile applications are widely used by ordinary people with little technical knowledge. Consequently, user privacy has become an essential matter to consider when developing mobile applications. In this paper, we study the privacy of 32 mobile applications provided by Finnish public sector bodies. First, we investigate with network traffic analysis what kind of personal data these application send out to third party analytics services. We then analyze the privacy policy documents of these applications and assess their clarity and transparency. Our findings show that there are several inconsistencies between the actual traffic of the studied applications and what is said about processing personal data in privacy policies. This underlines the need for software developers and organizations to be better aware of privacy regulations and data their applications send out. There is also lots of work to be done in making the privacy policies less vague and more informative, for example when it comes to explaining what technical data items are sent to third parties and how this can potentially affect the user privacy.


Ladattava julkaisu

This is an electronic reprint of the original article.
This reprint may differ from the original in pagination and typographic detail. Please cite the original version.





Last updated on 2024-26-11 at 14:13