{"id":"https://openalex.org/W4404515023","doi":"https://doi.org/10.1145/3689941.3695777","title":"Privacy Policy Compliance in Miniapps: An Analytical Study","display_name":"Privacy Policy Compliance in Miniapps: An Analytical Study","publication_year":2023,"publication_date":"2023-11-19","ids":{"openalex":"https://openalex.org/W4404515023","doi":"https://doi.org/10.1145/3689941.3695777"},"language":"en","primary_location":{"id":"doi:10.1145/3689941.3695777","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3689941.3695777","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Workshop on Secure and Trustworthy Superapps","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101535986","display_name":"Yuyang Han","orcid":"https://orcid.org/0009-0003-8552-0696"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yuyang Han","raw_affiliation_strings":["Beijing Eletronic Science and Technology Institute, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0003-8552-0696","affiliations":[{"raw_affiliation_string":"Beijing Eletronic Science and Technology Institute, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"Zilong Xiao","orcid":"https://orcid.org/0009-0001-9754-8077"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zilong Xiao","raw_affiliation_strings":["Beijing Eletronic Science and Technology Institute, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0001-9754-8077","affiliations":[{"raw_affiliation_string":"Beijing Eletronic Science and Technology Institute, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100404719","display_name":"Zhiqiang Wang","orcid":"https://orcid.org/0000-0002-1789-8414"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhiqiang Wang","raw_affiliation_strings":["Beijing Eletronic Science and Technology Institute, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-1789-8414","affiliations":[{"raw_affiliation_string":"Beijing Eletronic Science and Technology Institute, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101609539","display_name":"Jianyi Zhang","orcid":"https://orcid.org/0000-0001-8765-053X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jianyi Zhang","raw_affiliation_strings":["Beijing Eletronic Science and Technology Institute, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0001-8765-053X","affiliations":[{"raw_affiliation_string":"Beijing Eletronic Science and Technology Institute, Beijing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101535986"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.1919,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.51080161,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"11","last_page":"17"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/compliance","display_name":"Compliance (psychology)","score":0.7087339162826538},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.6335703730583191},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5743588805198669},{"id":"https://openalex.org/keywords/privacy-policy","display_name":"Privacy policy","score":0.5118665099143982},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48827648162841797},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.48503440618515015},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.4823979139328003},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.4220816493034363},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.1088152825832367}],"concepts":[{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.7087339162826538},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.6335703730583191},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5743588805198669},{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.5118665099143982},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48827648162841797},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.48503440618515015},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.4823979139328003},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.4220816493034363},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.1088152825832367},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3689941.3695777","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3689941.3695777","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Workshop on Secure and Trustworthy Superapps","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W4308391531","https://openalex.org/W4384302769","https://openalex.org/W4387298286","https://openalex.org/W4388857088","https://openalex.org/W4388858806","https://openalex.org/W4388958891","https://openalex.org/W4388958968","https://openalex.org/W4394966854"],"related_works":["https://openalex.org/W3042284153","https://openalex.org/W576625533","https://openalex.org/W2132024542","https://openalex.org/W2476957992","https://openalex.org/W2116878667","https://openalex.org/W315296216","https://openalex.org/W2372946744","https://openalex.org/W1965085458","https://openalex.org/W116674348","https://openalex.org/W4232314713"],"abstract_inverted_index":{"Miniapps,":[0],"lightweight":[1],"applications":[2],"based":[3],"on":[4,10],"WebView":[5],"technology,":[6],"are":[7],"widely":[8],"used":[9],"many":[11],"platforms":[12,58],"around":[13],"the":[14,17,21,84,108,123,126],"world.":[15],"With":[16],"exponential":[18],"growth":[19],"in":[20],"number":[22],"of":[23,27,83,112,129],"miniapps,":[24],"a":[25,100],"variety":[26],"security":[28,48],"concerns":[29],"have":[30,39],"emerged.":[31],"Although":[32],"various":[33],"governments":[34],"and":[35,43,57,63,86,96],"miniapp":[36,73,93],"vendors":[37],"(platforms)":[38],"issued":[40],"developer":[41],"guidelines":[42],"privacy":[44,70,94,113],"policies":[45,53,95],"to":[46,61,78,89,104,120],"address":[47],"issues,":[49],"discrepancies":[50],"between":[51],"these":[52],"across":[54,114],"different":[55],"countries":[56],"can":[59],"lead":[60],"ambiguous":[62],"inconsistent":[64],"compliance.":[65],"This":[66,75],"inconsistency":[67],"poses":[68],"potential":[69],"risks":[71],"for":[72],"users.":[74],"paper":[76],"aims":[77],"provide":[79],"an":[80],"innovative":[81],"examination":[82],"challenges":[85],"strategies":[87],"relevant":[88],"ensuring":[90],"compliance":[91,101],"with":[92],"regulations.":[97],"We":[98],"propose":[99],"assessment":[102],"framework":[103],"help":[105],"developers":[106],"navigate":[107],"complex":[109],"legal":[110],"landscape":[111],"multiple":[115],"jurisdictions.":[116],"Our":[117],"goal":[118],"is":[119],"enrich":[121],"further":[122],"discourse":[124],"surrounding":[125],"safe":[127],"development":[128],"miniapps.":[130]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
