{"id":"https://openalex.org/W4388925631","doi":"https://doi.org/10.1145/3603216.3624967","title":"Comparing Privacy Labels of Applications in Android and iOS","display_name":"Comparing Privacy Labels of Applications in Android and iOS","publication_year":2023,"publication_date":"2023-11-23","ids":{"openalex":"https://openalex.org/W4388925631","doi":"https://doi.org/10.1145/3603216.3624967"},"language":"en","primary_location":{"id":"doi:10.1145/3603216.3624967","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3603216.3624967","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd Workshop on Privacy in the Electronic Society","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103085010","display_name":"Rishabh Khandelwal","orcid":"https://orcid.org/0000-0003-3276-5764"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Rishabh Khandelwal","raw_affiliation_strings":["University of Wisconsin-Madison, Madison, WI, USA"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin-Madison, Madison, WI, USA","institution_ids":["https://openalex.org/I135310074"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079194336","display_name":"Asmit Nayak","orcid":"https://orcid.org/0009-0005-7143-2892"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Asmit Nayak","raw_affiliation_strings":["University of Wisconsin-Madison, Madison, WI, USA"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin-Madison, Madison, WI, USA","institution_ids":["https://openalex.org/I135310074"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105462992","display_name":"Paul Chung","orcid":"https://orcid.org/0009-0004-7065-9019"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Paul Chung","raw_affiliation_strings":["University of Wisconsin-Madison, Madison, WI, USA"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin-Madison, Madison, WI, USA","institution_ids":["https://openalex.org/I135310074"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042450214","display_name":"Kassem Fawaz","orcid":"https://orcid.org/0000-0002-4609-7691"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kassem Fawaz","raw_affiliation_strings":["University of Wisconsin-Madison, Madison, WI, USA"],"affiliations":[{"raw_affiliation_string":"University of Wisconsin-Madison, Madison, WI, USA","institution_ids":["https://openalex.org/I135310074"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103085010"],"corresponding_institution_ids":["https://openalex.org/I135310074"],"apc_list":null,"apc_paid":null,"fwci":3.9865,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.94028903,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"61","last_page":"73"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9761000275611877,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7244971394538879},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7099708914756775},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6800182461738586},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5703678131103516},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.5633582472801208},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.5198455452919006},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.48820310831069946},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.48028847575187683},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.4616606831550598},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4586382806301117},{"id":"https://openalex.org/keywords/privacy-policy","display_name":"Privacy policy","score":0.44992223381996155},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3381507694721222},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33436399698257446}],"concepts":[{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7244971394538879},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7099708914756775},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6800182461738586},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5703678131103516},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.5633582472801208},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.5198455452919006},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.48820310831069946},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.48028847575187683},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.4616606831550598},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4586382806301117},{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.44992223381996155},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3381507694721222},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33436399698257446},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3603216.3624967","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3603216.3624967","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd Workshop on Privacy in the Electronic Society","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1976596267","https://openalex.org/W1981568085","https://openalex.org/W1984255983","https://openalex.org/W1993095244","https://openalex.org/W2007784529","https://openalex.org/W2046653306","https://openalex.org/W2108554506","https://openalex.org/W2407313496","https://openalex.org/W3047488602","https://openalex.org/W3156177727","https://openalex.org/W4220689777","https://openalex.org/W4225091435","https://openalex.org/W4254194321","https://openalex.org/W4283704264","https://openalex.org/W4306962794","https://openalex.org/W4312801410"],"related_works":["https://openalex.org/W2025792237","https://openalex.org/W2027335090","https://openalex.org/W2098937825","https://openalex.org/W1996189363","https://openalex.org/W3124980950","https://openalex.org/W2295836226","https://openalex.org/W1997149610","https://openalex.org/W4245303888","https://openalex.org/W3010786834","https://openalex.org/W2596678640"],"abstract_inverted_index":{"The":[0],"increasing":[1],"concern":[2],"for":[3,180,238,245],"privacy":[4,17,25,38,50,95,147,190,222,258],"protection":[5],"in":[6,22,43,145,200],"mobile":[7],"apps":[8,98,160],"has":[9],"prompted":[10],"the":[11,24,60,66,100,106,132,165,193,209,219,243,253],"development":[12],"of":[13,27,62,94,125,158,236,257],"tools":[14],"such":[15],"as":[16,227],"labels":[18,39,51,96,191,223],"to":[19,36,40,78,173,195,251],"assist":[20],"users":[21],"understanding":[23],"practices":[26,82,127,148,163],"applications.":[28],"Both":[29],"Google":[30],"and":[31,46,65,105,118,128,143,176,183,229,248,255],"Apple":[32,107],"have":[33,161,192],"mandated":[34],"developers":[35],"use":[37],"increase":[41],"transparency":[42],"data":[44,57,63,71,81,129],"collection":[45],"sharing":[47],"practices.":[48],"These":[49],"provide":[52,177,196],"detailed":[53],"information":[54,198,210],"about":[55],"apps'":[56,80],"practices,":[58],"including":[59],"types":[61,130],"collected":[64],"purposes":[67],"associated":[68],"with":[69],"each":[70],"type.":[72],"This":[73],"offers":[74],"a":[75,90,113,122,233],"unique":[76],"opportunity":[77],"understand":[79],"at":[83,155],"scale.":[84],"In":[85],"this":[86],"study,":[87],"we":[88,140,169],"conduct":[89],"large-scale":[91],"measurement":[92],"study":[93,241],"using":[97],"from":[99],"Android":[101,119],"Play":[102],"Store":[103,109],"(n=2.4M)":[104],"App":[108],"(n=1.38M).":[110],"We":[111],"establish":[112],"common":[114],"mapping":[115],"between":[116,131],"iOS":[117],"labels,":[120],"enabling":[121],"direct":[123],"comparison":[124],"disclosed":[126],"two":[133,166],"platforms.":[134,150,167],"By":[135],"studying":[136],"over":[137],"100K":[138],"apps,":[139],"identify":[141],"discrepancies":[142,175],"inconsistencies":[144],"self-reported":[146],"across":[149],"Our":[151,185,240],"findings":[152],"reveal":[153],"that":[154,188],"least":[156],"60%":[157],"all":[159],"different":[162],"on":[164],"Additionally,":[168],"explore":[170],"factors":[171],"contributing":[172],"these":[174],"valuable":[178],"insights":[179],"developers,":[181],"users,":[182],"policymakers.":[184],"analysis":[186],"suggests":[187],"while":[189],"potential":[194],"useful":[197],"concisely,":[199],"their":[201],"current":[202],"state,":[203],"it":[204],"is":[205,212],"not":[206,225],"clear":[207],"whether":[208],"provided":[211],"accurate.":[213],"Without":[214],"robust":[215],"consistency":[216,256],"checks":[217],"by":[218],"distribution":[220],"platforms,":[221],"may":[224],"be":[226],"effective":[228],"can":[230],"even":[231],"create":[232],"false":[234],"sense":[235],"security":[237],"users.":[239],"highlights":[242],"need":[244],"further":[246],"research":[247],"improved":[249],"mechanisms":[250],"ensure":[252],"accuracy":[254],"labels.":[259]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2025-10-10T00:00:00"}
