{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:37:15Z","timestamp":1757543835203,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031775703"},{"type":"electronic","value":"9783031775710"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-77571-0_50","type":"book-chapter","created":{"date-parts":[[2024,12,20]],"date-time":"2024-12-20T02:01:05Z","timestamp":1734660065000},"page":"522-533","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Using the\u00a0Metadata-Based App-PI Ecosystem to\u00a0Assess the\u00a0Privacy Impact of\u00a0Health Apps"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3151-0842","authenticated-orcid":false,"given":"M. Mercedes","family":"Mart\u00ednez-Gonz\u00e1lez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9717-0824","authenticated-orcid":false,"given":"Alejandro","family":"P\u00e9rez-Fuente","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2546-9246","authenticated-orcid":false,"given":"Amador","family":"Aparicio","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7038-6378","authenticated-orcid":false,"given":"Pablo A.","family":"Criado-Lozano","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,21]]},"reference":[{"key":"50_CR1","doi-asserted-by":"crossref","unstructured":"Allix, K., Bissyand\u00e9, T.F., Klein, J., Le\u00a0Traon, Y.: AndroZoo: collecting millions of android apps for the research community. In: Proceedings of the 13th International Conference on Mining Software Repositories, pp. 468\u2013471 (2016)","DOI":"10.1145\/2901739.2903508"},{"key":"50_CR2","doi-asserted-by":"publisher","unstructured":"Aparicio, A., Mart\u00ednez-Gonz\u00e1lez, M.M., Carde\u00f1oso, V.: M\u00e9trica basada en grupos de permisos para entender el impacto de las aplicaciones Android sobre la privacidad. In: 2022 17th Iberian Conference on Information Systems and Technologies (CISTI), pp.\u00a01\u20135 (2022). https:\/\/doi.org\/10.23919\/CISTI54924.2022.9820147","DOI":"10.23919\/CISTI54924.2022.9820147"},{"key":"50_CR3","unstructured":"Arbanas, J., Silverglate, P.H., Hupfer, S., Loucks, J., Raman, P., Steinhart, M.: Data privacy and security worries are on the rise, while trust is down. deloitte\u2019s connected consumer survey 2023. Technical report. Deloitte Center for Technology, Media & Telecommunications (2023). https:\/\/www2.deloitte.com\/us\/en\/insights\/industry\/telecommunications\/connectivity-mobile-trends-survey\/2023\/data-privacy-and-security.html"},{"key":"50_CR4","doi-asserted-by":"publisher","unstructured":"Benjumea, J., Ropero, J., Rivera-Romero, O., Dorronzoro-Zubiete, E., Carrasco, A.: Privacy assessment in mobile health apps: scoping review. JMIR Mhealth Unhealth 8(7) (2020). https:\/\/doi.org\/10.2196\/18868","DOI":"10.2196\/18868"},{"key":"50_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-030-62974-8_13","volume-title":"Information Security","author":"KC Chang","year":"2020","unstructured":"Chang, K.C., Zaeem, R.N., Barber, K.S.: A framework for estimating privacy risk scores of mobile apps. In: Susilo, W., Deng, R.H., Guo, F., Li, Y., Intan, R. (eds.) ISC 2020. LNCS, vol. 12472, pp. 217\u2013233. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-62974-8_13"},{"key":"50_CR6","doi-asserted-by":"publisher","unstructured":"Degirmenci, K.: Mobile users\u2019 information privacy concerns and the role of app permission requests. Int. J. Inf. Manag. 50, 261\u2013272 (2020). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2019.05.010. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0268401218307965","DOI":"10.1016\/j.ijinfomgt.2019.05.010"},{"key":"50_CR7","unstructured":"Developers, A.: Android Developers. Security guidelines. https:\/\/developer.android.com\/training\/articles\/security-tips?hl=es-419#UserData"},{"key":"50_CR8","doi-asserted-by":"publisher","unstructured":"Gashi, E., Tafa, Z.: Permission-based privacy analysis for android applications. Int. J. Bus. Technol. 6(3) (2018). https:\/\/doi.org\/10.33107\/ijbte.2018.6.3.02. https:\/\/knowledgecenter.ubt-uni.net\/ijbte\/vol6\/iss3\/2","DOI":"10.33107\/ijbte.2018.6.3.02"},{"key":"50_CR9","unstructured":"Geiger, F.X., Malavolta, I.: Datasets of android applications: a literature review. ArXiv arxiv:1809.10069 (2018). https:\/\/api.semanticscholar.org\/CorpusID:52845379"},{"key":"50_CR10","doi-asserted-by":"publisher","unstructured":"Hudson, S., Liu, Y.: Mobile app users\u2019 privacy concerns: different heuristics for privacy assurance statements in the EU and china. Inf. Technol. People 36(1), 245\u2013262 (2023). https:\/\/doi.org\/10.1108\/ITP-06-2021-0478","DOI":"10.1108\/ITP-06-2021-0478"},{"key":"50_CR11","unstructured":"Hylender, C.D., Langlois, P., Pinto, A., Widup, S.: Data Breach Investigations Report. Technical report, Verizon (2024)"},{"key":"50_CR12","doi-asserted-by":"publisher","unstructured":"Jin, H., et al.: Why are they collecting my data?: inferring the purposes of network traffic in mobile apps. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(4), 173:1\u2013173:27 (2018). https:\/\/doi.org\/10.1145\/3287051","DOI":"10.1145\/3287051"},{"key":"50_CR13","doi-asserted-by":"publisher","unstructured":"Kitkowska, A., Karegar, F., W\u00e4stlund, E.: Share or protect: understanding the interplay of trust, privacy concerns, and data sharing purposes in health and well-being apps. In: Gena, C., et al. (eds.) Proceedings of the 15th Biannual Conference of the Italian SIGCHI Chapter, CHItaly 2023, Torino, Italy, 20\u201322 September 2023, pp. 15:1\u201315:14. ACM (2023). https:\/\/doi.org\/10.1145\/3605390.3605417","DOI":"10.1145\/3605390.3605417"},{"key":"50_CR14","doi-asserted-by":"publisher","unstructured":"Kuan-Lin, C., Chung-Huang, Y.: Design and implementation of privacy impact assessment for android mobile devices. ZTE Commun. 14(S0), 37 (2016). https:\/\/doi.org\/10.3969\/j.issn.1673-5188.2016.S0.003","DOI":"10.3969\/j.issn.1673-5188.2016.S0.003"},{"key":"50_CR15","doi-asserted-by":"publisher","unstructured":"Laperdrix, P., Mehanna, N., Durey, A., Rudametkin, W.: The price to play: a privacy analysis of free and paid games in the android ecosystem. In: Laforest, F., et al. (eds.) WWW \u201922: The ACM Web Conference 2022, Virtual Event, Lyon, France, 25\u201329 April 2022, pp. 3440\u20133449. ACM (2022). https:\/\/doi.org\/10.1145\/3485447.3512279","DOI":"10.1145\/3485447.3512279"},{"key":"50_CR16","unstructured":"Li, L., et al.: AndroZoo++: collecting millions of android apps and their metadata for the research community. arXiv e-prints arXiv:1709.05281 (2017)"},{"key":"50_CR17","unstructured":"Liu, B., et al.: Follow my recommendations: a personalized privacy assistant for mobile app permissions. In: Twelfth Symposium on Usable Privacy and Security, SOUPS 2016, Denver, CO, USA, 22\u201324 June 2016, pp. 27\u201341. USENIX Association (2016). https:\/\/www.usenix.org\/conference\/soups2016\/technical-sessions\/presentation\/liu"},{"key":"50_CR18","doi-asserted-by":"publisher","unstructured":"Mayrhofer, R., Stoep, J.V., Brubaker, C., Kralevich, N.: The android platform security model. ACM Trans. Priv. Secur. 24(3) (2021). https:\/\/doi.org\/10.1145\/3448609","DOI":"10.1145\/3448609"},{"key":"50_CR19","doi-asserted-by":"publisher","unstructured":"Momen, N., Hatamian, M., Fritsch, L.: Did app privacy improve after the GDPR? IEEE Secur. Priv. 17(6), 10\u201320 (2019). https:\/\/doi.org\/10.1109\/MSEC.2019.2938445","DOI":"10.1109\/MSEC.2019.2938445"},{"key":"50_CR20","doi-asserted-by":"crossref","unstructured":"de\u00a0Montjoye, Y.A., et al.: On the privacy-conscientious use of mobile phone data. Sci. Data 5 (2018). https:\/\/api.semanticscholar.org\/CorpusID:54472286","DOI":"10.1038\/sdata.2018.286"},{"key":"50_CR21","doi-asserted-by":"publisher","unstructured":"Orjiude, K.E., Yinka-Banjo, C.O.: A multilateral privacy impact analysis method for android applications. Ann. Sci. Technol. 7(2), 1\u201320 (2022). https:\/\/doi.org\/10.2478\/ast-2022-0005","DOI":"10.2478\/ast-2022-0005"},{"key":"50_CR22","doi-asserted-by":"publisher","unstructured":"Shrivastava, G., Kumar, P., Gupta, D., Rodrigues, J.J.P.C.: Privacy issues of android application permissions: a literature review. Trans. Emerg. Telecommun. Technol. 31(12) (2020). https:\/\/doi.org\/10.1002\/ett.3773","DOI":"10.1002\/ett.3773"},{"key":"50_CR23","doi-asserted-by":"publisher","unstructured":"Stach, C.: Big brother is smart watching you - privacy concerns about health and fitness applications. In: Mori, P., Furnell, S., Camp, O. (eds.) Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, Funchal, Madeira - Portugal, 22\u201324 January 2018, pp. 13\u201323. SciTePress (2018). https:\/\/doi.org\/10.5220\/0006537000130023","DOI":"10.5220\/0006537000130023"},{"key":"50_CR24","doi-asserted-by":"publisher","unstructured":"Tangari, G., Ikram, M., Ijaz, K., Kaafar, M.A., Berkovsky, S.: Mobile health and privacy: cross sectional study. BMJ (2021). https:\/\/doi.org\/10.1136\/bmj.n1248","DOI":"10.1136\/bmj.n1248"},{"key":"50_CR25","unstructured":"Veltman, A.: Samsung health: how self-tracking trivialises our ethical concerns. Diggit Maga. (2023). https:\/\/www.diggitmagazine.com\/articles\/samsung-health-ethical-concerns"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of the International Conference on Ubiquitous Computing and Ambient Intelligence (UCAmI 2024)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-77571-0_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,20]],"date-time":"2024-12-20T02:10:30Z","timestamp":1734660630000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-77571-0_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031775703","9783031775710"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-77571-0_50","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"21 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"UCAmI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Ubiquitous Computing and Ambient Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belfast","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ucami2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ucami.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}