{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T22:37:14Z","timestamp":1776119834044,"version":"3.50.1"},"reference-count":44,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2020,1,2]],"date-time":"2020-01-02T00:00:00Z","timestamp":1577923200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2020,1,2]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>Privacy policies emerge as the main mechanism to inform users on the way their information is managed by online service providers, and still remain the dominant approach for this purpose. The literature notes that users find difficulties in understanding privacy policies because they are usually written in technical or legal language even, although most users are unfamiliar with them. These difficulties have led most users to skip reading privacy policies and blindly accept them. This study aims to address this challenge this paper presents AppAware, a multiplatform tool that intends to improve the visualization of privacy policies for mobile applications.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>AppAware formulates a visualized report with the permission set of an application, which is easily understandable by a common user. AppAware aims to bridge the difficulty to read privacy policies and android\u2019s obscure permission set with a new privacy policy visualization model. Thus, we propose AppAware parser, a mobile add-on that acts complementary with AppAware and helps mobile device users to monitor the applications they installed to their smart device.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>To validate AppAware, the authors conducted a survey through questionnaire aiming to evaluate AppAware in terms of installability, usability and viability-purpose. The results demonstrate that AppAware is assessed above average by the users in all categories.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>In the best of the authors\u2019 knowledge, there is no such approach as AppAware as an application nor AppAware parser as add-on.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-04-2019-0049","type":"journal-article","created":{"date-parts":[[2020,1,23]],"date-time":"2020-01-23T06:16:15Z","timestamp":1579760175000},"page":"116-132","source":"Crossref","is-referenced-by-count":10,"title":["AppAware: a policy visualization model for mobile applications"],"prefix":"10.1108","volume":"28","author":[{"given":"Ioannis","family":"Paspatis","sequence":"first","affiliation":[]},{"given":"Aggeliki","family":"Tsohou","sequence":"additional","affiliation":[]},{"given":"Spyros","family":"Kokolakis","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020040311054195900_ref001","first-page":"106","article-title":"Visualizing privacy implications of access control policies in social network systems","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","year":"2010"},{"issue":"3","key":"key2020040311054195900_ref002","article-title":"Antecedents and consequences of consumers online privacy concerns","volume":"7","year":"2009","journal-title":"Journal of Business and Economics Research (JBER)"},{"key":"key2020040311054195900_ref003","first-page":"12","article-title":"A data privacy taxonomy","volume-title":"BNCOD \u201909: The 26th British National Conference on Databases","year":"2009"},{"issue":"5","key":"key2020040311054195900_ref004","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1080\/01972240490507956","article-title":"International differences in information privacy concerns: a global survey of consumers","volume":"20","year":"2004","journal-title":"The Information Society"},{"key":"key2020040311054195900_ref005","article-title":"Should the users be informed? On differences in risk perception between android and iPhone users","year":"2013"},{"key":"key2020040311054195900_ref006","unstructured":"Bruckner, L. and Voss, M. (2005), \u201cMozPETs \u2013 a privacy enhanced web browser\u201d, Darmstadt University of Technology. Security and Privacy Assurance in Advancing Technologies: New Developments, available at: http:\/\/mozpets.sourceforge.net\/"},{"key":"key2020040311054195900_ref007","article-title":"Privacy implications of presence sharing in mobile messaging applications","volume-title":"Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia \u2013 MUM '14","year":"2014"},{"issue":"1","key":"key2020040311054195900_ref008","first-page":"847","article-title":"Privacy protection for consumer transactions in electronic commerce: why self-regulation is inadequate","volume":"49","year":"1998","journal-title":"South Carolina Law Review"},{"key":"key2020040311054195900_ref009","article-title":"An evaluation of the Google chrome extension security architecture","volume-title":"21st USENIX Conference on Security","year":"2012"},{"key":"key2020040311054195900_ref010","first-page":"352","article-title":"What's up with Whatsapp? Comparing mobile instant messaging behaviors with traditional SMS","volume-title":"15th international Conference on Human-Computer Interaction with Mobile Devices and Services, Munich","year":"2013"},{"key":"key2020040311054195900_ref011","article-title":"Improving the specification and analysis of privacy policies \u2013 the RSLingo4Privacy approach","volume-title":"Proceedings of the 18th International Conference on Enterprise Information Systems","year":"2016"},{"issue":"6","key":"key2020040311054195900_ref012","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1080\/01449290410001715723","article-title":"Internet privacy concerns and their antecedents \u2013 measurement validity and a regression model","volume":"23","year":"2004","journal-title":"Behaviour and Information Technology"},{"key":"key2020040311054195900_ref013","first-page":"193","article-title":"A three-dimensional conceptual framework for database privacy","year":"2009"},{"key":"key2020040311054195900_ref014","article-title":"Model for privacy policy visualization","year":"2009"},{"issue":"4","key":"key2020040311054195900_ref015","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1108\/07363760210433627","article-title":"Collecting and using personal data: consumers\u2019 awareness and concerns","volume":"19","year":"2002","journal-title":"Journal of Consumer Marketing"},{"key":"key2020040311054195900_ref016","unstructured":"Hartmans, A. (2017), \u201cThe 20 most popular iPhone apps of 2017\u201d, Business Insider, available at: www.businessinsider.com\/top-apple-iphone-apps-2017-12"},{"issue":"4","key":"key2020040311054195900_ref017","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1080\/15536548.2013.10845689","article-title":"An empirical investigation of privacy awareness and concerns on social networking sites","volume":"9","year":"2013","journal-title":"Journal of Information Privacy and Security"},{"key":"key2020040311054195900_ref018","article-title":"Low user awareness against social malware: an empirical study and design of a security awareness application","volume-title":"13th European Mediterranean and Middle Eastern Conference on Information Systems (EMCIS 2016)","year":"2016"},{"key":"key2020040311054195900_ref019","article-title":"Standardizing privacy notices","volume-title":"Proceedings of the 28th international conference on Human factors in computing systems - CHI '10","year":"2010"},{"issue":"8","key":"key2020040311054195900_ref020","doi-asserted-by":"crossref","first-page":"840","DOI":"10.1016\/j.cose.2010.08.001","article-title":"Cyber security for home users: a new way of protection through awareness enforcement","volume":"29","year":"2010","journal-title":"Computers and Security"},{"key":"key2020040311054195900_ref021","unstructured":"McDonald, A. and Cranor, L.F. (2008), \u201cThe cost of reading privacy policies. I\/S: a journal of law and policy for the information society 2008\u201d, Privacy Year in Review issue, available at: http:\/\/lorrie.cranor.org\/pubs\/readingPolicyCost-authorDraft.pdf (accessed 25 June 2017)."},{"key":"key2020040311054195900_ref022","article-title":"Privacy awareness about information leakage","year":"2013"},{"key":"key2020040311054195900_ref023","article-title":"Stop annoying me!","year":"2017"},{"key":"key2020040311054195900_ref024","unstructured":"Olmstead, K. and Atkinson, M. (2015), \u201cApps permissions in the Google play\u201d, Pew Research Center, available at: www.pewinternet.org\/2015\/11\/10\/the-majority-of-smartphone-owners-download-apps\/ (accessed 20 January 2017)."},{"key":"key2020040311054195900_ref025","article-title":"Mobile application privacy risks: Viber users\u2019 de-anonymization using public data","year":"2017"},{"issue":"1","key":"key2020040311054195900_ref026","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1509\/jppm.19.1.62.16949","article-title":"Dimensions of privacy concern among online consumers","volume":"19","year":"2000","journal-title":"Journal of Public Policy and Marketing"},{"key":"key2020040311054195900_ref027","unstructured":"Statista (2017a), \u201cGlobal cumulative shipments of smartphones using the android operating system from 2007 to 2016\u201d, available at: www.statista.com\/statistics\/241943\/forecast-of-global-cumulative-shipments-of-smartphones-using-android-os\/"},{"key":"key2020040311054195900_ref028","unstructured":"Statista (2017b), \u201cNumber of apps available in leading app stores as of march 2017\u201d, available at: www.statista.com\/statistics\/276623\/number-of-apps-available-in-leading-app-stores\/"},{"key":"key2020040311054195900_ref029","unstructured":"Statista (2017c), \u201cNumber of available apps in the apple app store from July 2008 to January 2017\u201d, available at: www.statista.com\/statistics\/263795\/number-of-available-apps-in-the-apple-app-store\/"},{"key":"key2020040311054195900_ref030","unstructured":"Statista (2018), \u201cNumber of available applications in the Google play store from December 2009 to December 2017\u201d, available at: www.statista.com\/statistics\/266210\/number-of-available-applications-in-the-google-play-store\/"},{"key":"key2020040311054195900_ref031","first-page":"258","article-title":"An intensive analysis of security and privacy browser add-ons","volume-title":"International Conference on Risks and Security of Internet and Systems","year":"2016"},{"key":"key2020040311054195900_ref032","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1016\/j.procs.2017.12.198","article-title":"Usable security: revealing end-users comprehensions on security warnings","volume":"124","year":"2017","journal-title":"Procedia Computer Science"},{"issue":"3","key":"key2020040311054195900_ref033","doi-asserted-by":"crossref","first-page":"706","DOI":"10.1016\/j.chb.2012.12.018","article-title":"A game design framework for avoiding phishing attacks","volume":"29","year":"2013","journal-title":"Computers in Human Behavior"},{"key":"key2020040311054195900_ref034","article-title":"Protecting browsers from extension vulnerabilities","year":"2009"},{"key":"key2020040311054195900_ref035","article-title":"A usability study on the privacy policy visualization model","volume-title":"14th International Conference on Dependable, Autonomic and Secure Computing, 14th International Conference on Pervasive Intelligence and Computing, 2nd International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech)","year":"2016"},{"key":"key2020040311054195900_ref036","article-title":"DOMPurify: client-side protection against XSS and markup injection","year":"2017"},{"key":"key2020040311054195900_ref037","article-title":"Toward a method for privacy vulnerability analysis","year":"2004"},{"key":"key2020040311054195900_ref038","article-title":"SpyShield: preserving privacy from spy add-ons","volume-title":"Conference on Recent Advances in Intrusion Detection","year":"2007"},{"issue":"4","key":"key2020040311054195900_ref039","first-page":"253","article-title":"The distribution of privacy risks: who needs protection?","volume":"14","year":"1998","journal-title":"The Information Society"},{"issue":"8","key":"key2020040311054195900_ref040","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1145\/257874.257896","article-title":"Privacy, information technology, and healthcare","volume":"40","year":"1997","journal-title":"Communications of the ACM"},{"issue":"2","key":"key2020040311054195900_ref041","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1080\/13600869955134","article-title":"Contracting identity fraud in the information age: the identity theft and assumption deterrence act","volume":"13","year":"1999","journal-title":"International Review of Law, Computers, and Technology"},{"key":"key2020040311054195900_ref042","article-title":"Design and implementation of a functional extension framework for authn and Authz federation infrastructure using web browser add-on","volume-title":"IEEE 27th International Conference on Advanced Information Networking and Applications","year":"2013"},{"key":"key2020040311054195900_ref043","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2017.03.027","article-title":"Enabling valid informed consent for location tracking through privacy awareness of users: a process theory","year":"2017","journal-title":"Computer Law and Security Review"},{"key":"key2020040311054195900_ref044","article-title":"The creation and analysis of a website privacy policy corpus","year":"2016"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-04-2019-0049\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-04-2019-0049\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:22:52Z","timestamp":1753406572000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/28\/1\/116-132\/108420"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,2]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1,2]]}},"alternative-id":["10.1108\/ICS-04-2019-0049"],"URL":"https:\/\/doi.org\/10.1108\/ics-04-2019-0049","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-4961","type":"print"}],"subject":[],"published":{"date-parts":[[2020,1,2]]}}}