Javascript must be enabled to continue!
PPAdroid: An Approach to Android Privacy Protocol Analysis
View through CrossRef
<p>With the continuous growth of the number of mobile applications, users may provide personal information to applications consciously or unconsciously. Privacy protocol could help users understand the privacy behavior of applications. However, users usually ignore the content of the privacy protocol due to the length of their context. To solve such a problem, we conduct an empirical study on privacy protocols of Android applications and propose a method to detect sentences related to personal information operations in privacy protocol documents. In our proposed method, a verb list, a negation list, and a noun list related to user information operations are created and utilized to detect sentences related to user personal information by the Stanford CoreNLP technique. The experimental results show that our proposed method is better than state-of-art keyword-based methods. Furthermore, our proposed method can help users understand the contents of privacy protocol documents in a limited way.</p>
<p> </p>
Journal of Internet Technology
Title: PPAdroid: An Approach to Android Privacy Protocol Analysis
Description:
<p>With the continuous growth of the number of mobile applications, users may provide personal information to applications consciously or unconsciously.
Privacy protocol could help users understand the privacy behavior of applications.
However, users usually ignore the content of the privacy protocol due to the length of their context.
To solve such a problem, we conduct an empirical study on privacy protocols of Android applications and propose a method to detect sentences related to personal information operations in privacy protocol documents.
In our proposed method, a verb list, a negation list, and a noun list related to user information operations are created and utilized to detect sentences related to user personal information by the Stanford CoreNLP technique.
The experimental results show that our proposed method is better than state-of-art keyword-based methods.
Furthermore, our proposed method can help users understand the contents of privacy protocol documents in a limited way.
</p>
<p> </p>.
Related Results
Augmented Differential Privacy Framework for Data Analytics
Augmented Differential Privacy Framework for Data Analytics
Abstract
Differential privacy has emerged as a popular privacy framework for providing privacy preserving noisy query answers based on statistical properties of databases. ...
Privacy Risk in Recommender Systems
Privacy Risk in Recommender Systems
Nowadays, recommender systems are mostly used in many online applications to filter information and help users in selecting their relevant requirements. It avoids users to become o...
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...
Pengembangan Modul Berbasis Android tentang Kesiapan Kerja
Pengembangan Modul Berbasis Android tentang Kesiapan Kerja
Tujuan penelitian ini adalah menguji coba seberapa efektifitasnya modul berbasis android tentang kesiapan kerja untuk siswa sekolah kejuruan. Metode kajian menggunakan 4-D Â (Defin...
Privacy awareness in generative AI: the case of ChatGPT
Privacy awareness in generative AI: the case of ChatGPT
Purpose
Generative AI, like ChatGPT, uses large language models that process human language and learn from patterns identified in large data sets. Despite the great benefits offere...
Privacy in online advertising platforms
Privacy in online advertising platforms
Online advertising is consistently considered as the pillar of the "free• content on the Web since it is commonly the funding source of websites. Furthermore, the option of deliver...
On the Status of Rights
On the Status of Rights
Photo by Patrick Tomasso on Unsplash
ABSTRACT
In cases where the law conflicts with bioethics, the status of rights must be determined to resolve some of the tensions. ...
Application Status and Prospect of Data Privacy Protection Technology
Application Status and Prospect of Data Privacy Protection Technology
This article aims to explore the current application status and future prospects of data privacy protection technology, analyze the challenges faced by current data privacy, explor...

