{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:52:23Z","timestamp":1743025943309,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031048258"},{"type":"electronic","value":"9783031048265"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-04826-5_21","type":"book-chapter","created":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T04:05:42Z","timestamp":1652155542000},"page":"214-225","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Where Does Your Data Go? Comparing Network Traffic and Privacy Policies of Public Sector Mobile Applications"],"prefix":"10.1007","author":[{"given":"Robin","family":"Carlsson","sequence":"first","affiliation":[]},{"given":"Timi","family":"Heino","sequence":"additional","affiliation":[]},{"given":"Lauri","family":"Koivunen","sequence":"additional","affiliation":[]},{"given":"Sampsa","family":"Rauti","sequence":"additional","affiliation":[]},{"given":"Ville","family":"Lepp\u00e4nen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,11]]},"reference":[{"issue":"4","key":"21_CR1","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1177\/0894439318777706","volume":"37","author":"PB Brandtzaeg","year":"2019","unstructured":"Brandtzaeg, P.B., Pultier, A., Moen, G.M.: Losing control to data-hungry apps: a mixed-methods approach to mobile app privacy. Soc. Sci. Comput. Rev. 37(4), 466\u2013488 (2019)","journal-title":"Soc. Sci. Comput. Rev."},{"key":"21_CR2","doi-asserted-by":"publisher","unstructured":"Jia, Q., Zhou, L., Li, H., Yang, R., Du, S., Zhu, H.: Who leaks my privacy: towards automatic and association detection with GDPR compliance. In: Biagioni, E.S., Zheng, Y., Cheng, S. (eds.) WASA 2019. LNCS, vol. 11604, pp. 137\u2013148. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-23597-0_11","DOI":"10.1007\/978-3-030-23597-0_11"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Kaur, N., Azam, S., Kannoorpatti, K., Yeo, K.C., Shanmugam, B.: Browser fingerprinting as user tracking technology. In: 2017 11th International Conference on Intelligent Systems and Control (ISCO), pp. 103\u2013111. IEEE (2017)","DOI":"10.1109\/ISCO.2017.7855963"},{"key":"21_CR4","unstructured":"Liu, H., Patras, P., Leith, D.J.: Android Mobile OS Snooping by Samsung. Huawei and Realme Handsets, Xiaomi (2021)"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Liu, Y., Song, H.H., Bermudez, I., Mislove, A., Baldi, M., Tongaonkar, A.: Identifying personal information in internet traffic. In: Proceedings of the 2015 ACM on Conference on Online Social Networks, pp. 59\u201370 (2015)","DOI":"10.1145\/2817946.2817947"},{"key":"21_CR6","unstructured":"Mulder, T.: Health apps, their privacy policies and the GDPR. Eur. J. Law Technol. 10(1), 22 (2019)"},{"key":"21_CR7","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.invent.2018.12.001","volume":"15","author":"K O\u2019Loughlin","year":"2019","unstructured":"O\u2019Loughlin, K., Neary, M., Adkins, E.C., Schueller, S.M.: Reviewing the data security and privacy policies of mobile apps for depression. Internet Interv. 15, 110\u2013115 (2019)","journal-title":"Internet Interv."},{"key":"21_CR8","doi-asserted-by":"publisher","first-page":"9390","DOI":"10.1109\/ACCESS.2018.2799522","volume":"6","author":"A Papageorgiou","year":"2018","unstructured":"Papageorgiou, A., Strigkos, M., Politou, E., Alepis, E., Solanas, A., Patsakis, C.: Security and privacy analysis of mobile health applications: the alarming state of practice. IEEE Access 6, 9390\u20139403 (2018)","journal-title":"IEEE Access"},{"key":"21_CR9","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1016\/j.procs.2014.08.051","volume":"37","author":"M Rowan","year":"2014","unstructured":"Rowan, M., Dehlinger, J.: A privacy policy comparison of health and fitness related mobile applications. Procedia Comput. Sci. 37, 348\u2013355 (2014)","journal-title":"Procedia Comput. Sci."},{"issue":"e1","key":"21_CR10","doi-asserted-by":"publisher","first-page":"e28","DOI":"10.1136\/amiajnl-2013-002605","volume":"22","author":"A Sunyaev","year":"2015","unstructured":"Sunyaev, A., Dehling, T., Taylor, P.L., Mandl, K.D.: Availability and quality of mobile health app privacy policies. J. Am. Med. Inform. Assoc. 22(e1), e28\u2013e33 (2015)","journal-title":"J. Am. Med. Inform. Assoc."},{"issue":"3","key":"21_CR11","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1016\/j.giq.2015.05.001","volume":"32","author":"N Thompson","year":"2015","unstructured":"Thompson, N., Ravindran, R., Nicosia, S.: Government data does not mean data governance: Lessons learned from a public sector application audit. Gov. Inf. Q. 32(3), 316\u2013322 (2015)","journal-title":"Gov. Inf. Q."}],"container-title":["Lecture Notes in Networks and Systems","Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-04826-5_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,20]],"date-time":"2022-12-20T16:05:37Z","timestamp":1671552337000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-04826-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031048258","9783031048265"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-04826-5_21","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"11 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WorldCIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"World Conference on Information Systems and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Budva","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montenegro","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"worldcist2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/worldcist.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}