{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T23:55:21Z","timestamp":1770508521756,"version":"3.49.0"},"publisher-location":"Republic and Canton of Geneva, Switzerland","reference-count":66,"publisher":"International World Wide Web Conferences Steering Committee","license":[{"start":{"date-parts":[[2017,4,3]],"date-time":"2017-04-03T00:00:00Z","timestamp":1491177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Union's Horizon 2020","award":["Grant Agreement No. 644571"],"award-info":[{"award-number":["Grant Agreement No. 644571"]}]},{"name":"European Union's Horizon 2020","award":["Marie Sklodowska-Curie grant agreement No 690972"],"award-info":[{"award-number":["Marie Sklodowska-Curie grant agreement No 690972"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,3]]},"DOI":"10.1145\/3038912.3052691","type":"proceedings-article","created":{"date-parts":[[2017,4,6]],"date-time":"2017-04-06T13:30:38Z","timestamp":1491485438000},"page":"153-162","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["The Long-Standing Privacy Debate"],"prefix":"10.1145","author":[{"given":"Elias P.","family":"Papadopoulos","sequence":"first","affiliation":[{"name":"Foundation for Research and Technology - Hellas (FORTH) &amp; University of Crete, Heraklion, Crete, Greece"}]},{"given":"Michalis","family":"Diamantaris","sequence":"additional","affiliation":[{"name":"Foundation for Research and Technology - Hellas (FORTH) &amp; University of Crete, Heraklion, Crete, Greece"}]},{"given":"Panagiotis","family":"Papadopoulos","sequence":"additional","affiliation":[{"name":"Foundation for Research and Technology - Hellas (FORTH) &amp; University of Crete, Heraklion, Crete, Greece"}]},{"given":"Thanasis","family":"Petsas","sequence":"additional","affiliation":[{"name":"Appthority &amp; University of Crete, San Francisco, CA, USA"}]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[{"name":"Foundation for Research and Technology - Hellas (FORTH) &amp; University of Crete, Heraklion, Crete, Greece"}]},{"given":"Evangelos P.","family":"Markatos","sequence":"additional","affiliation":[{"name":"Foundation for Research and Technology - Hellas (FORTH) &amp; University of Crete, Heraklion, Crete, Greece"}]}],"member":"320","published-online":{"date-parts":[[2017,4,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Using VPN in the UAE? You'll Be Fined Up To $545 000 If Get Caught! http:\/\/thehackernews.com\/2016\/07\/vpn-is-illegal-in-uae.html."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660347"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516674"},{"key":"e_1_3_2_1_4_1","unstructured":"Android Developers. Android Debug Bridge. http:\/\/developer.android.com\/tools\/help\/adb.html."},{"key":"e_1_3_2_1_5_1","unstructured":"Android Developers. Class Overview: BroadcastReceiver. http:\/\/developer.android.com\/reference\/android\/content\/BroadcastReceiver.html."},{"key":"e_1_3_2_1_6_1","volume-title":"Flash cookies and privacy ii: Now with html5 and etag respawning. SSRN 1898390","author":"Ayenson M. D.","year":"2011","unstructured":"M. D. Ayenson, D. J. Wambach, A. Soltani, N. Good, and C. J. Hoofnagle. Flash cookies and privacy ii: Now with html5 and etag respawning. SSRN 1898390, 2011."},{"key":"e_1_3_2_1_7_1","unstructured":"bobzilla arkasha and uhtu. Wigle: Wireless geographic logging engine. https:\/\/wigle.net\/."},{"key":"e_1_3_2_1_8_1","volume-title":"CoRR","author":"Book T.","year":"2013","unstructured":"T. Book, A. Pridgen, and D. S. Wallach. Longitudinal analysis of android ad library permissions. CoRR, 2013."},{"key":"e_1_3_2_1_9_1","volume-title":"Web sites vs. web apps: What the experts think. https:\/\/www.visionmobile.com\/blog\/2013\/07\/web-sites-vs-web-apps-what-the-experts-think","author":"Borodescu C.","year":"2013","unstructured":"C. Borodescu. Web sites vs. web apps: What the experts think. https:\/\/www.visionmobile.com\/blog\/2013\/07\/web-sites-vs-web-apps-what-the-experts-think, 2013."},{"key":"e_1_3_2_1_10_1","unstructured":"I. Brodsky. Deathmatch: The mobile web vs. mobile apps. http:\/\/www.computerworld.com\/article\/3016736\/mobile-wireless\/the-mobile-web-vs-mobile-app-death-match."},{"key":"e_1_3_2_1_11_1","volume-title":"An interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed. https:\/\/mitmproxy.org\/","author":"Cortesi A.","year":"2015","unstructured":"A. Cortesi. An interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed. https:\/\/mitmproxy.org\/, 2015."},{"key":"e_1_3_2_1_12_1","unstructured":"CYREN. Cyren--Cloud-based Internet Security Solytions. http:\/\/commtouch.com\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23082"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881151.1881152"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741679"},{"key":"e_1_3_2_1_16_1","unstructured":"M. Firtman. Html5 compatibility on mobile and tablet browsers with testing on real devices. http:\/\/mobilehtml5.org\/ 2015."},{"key":"e_1_3_2_1_17_1","unstructured":"R. Fishkin. Mobile web vs mobile apps: Where should you invest your marketing? https:\/\/moz.com\/blog\/mobile-web-mobile-apps-invest-marketing-whiteboard-friday."},{"key":"e_1_3_2_1_18_1","volume-title":"Cydia Substrate: The powerful code modification platform behind cydia","author":"Freeman J.","year":"2008","unstructured":"J. Freeman. Cydia Substrate: The powerful code modification platform behind cydia., 2008. http:\/\/www.cydiasubstrate.com\/."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993574.1993605"},{"key":"e_1_3_2_1_20_1","volume-title":"Mixed content weakens https. https:\/\/developers.google.com\/web\/fundamentals\/security\/prevent-mixed-content\/what-is-mixed-content#mixed_content_weakens_https","author":"Developers Google","year":"2017","unstructured":"Google Developers. Mixed content weakens https. https:\/\/developers.google.com\/web\/fundamentals\/security\/prevent-mixed-content\/what-is-mixed-content#mixed_content_weakens_https, 2017."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185464"},{"key":"e_1_3_2_1_23_1","volume-title":"https:\/\/possiblemobile.com\/2013\/03\/ssl-pinning-for-increased-app-security\/","author":"Graves J.","year":"2013","unstructured":"J. Graves. Ssl pinning for increased app security. https:\/\/possiblemobile.com\/2013\/03\/ssl-pinning-for-increased-app-security\/, 2013."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818769"},{"key":"e_1_3_2_1_25_1","volume-title":"A study of third-party tracking by mobile apps in the wild","author":"Han S.","year":"2012","unstructured":"S. Han, Jaeyeon Jung, and David Wetherall. A study of third-party tracking by mobile apps in the wild, 2012."},{"key":"e_1_3_2_1_26_1","volume-title":"Adaway default blocklist. https:\/\/adaway.org\/hosts.txt","author":"Schuermann Kicelo","year":"2016","unstructured":"Kicelo and D. Schuermann. Adaway default blocklist. https:\/\/adaway.org\/hosts.txt, 2016."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362823"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280688"},{"key":"e_1_3_2_1_29_1","unstructured":"S. Kroft. The data brokers selling your personal information. http:\/\/www.cbsnews.com\/news\/the-data-brokers-selling-your-personal-information\/ 2009."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162084"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987456"},{"key":"e_1_3_2_1_32_1","volume-title":"App vs web. https:\/\/recon.meddle.mobi\/appvsweb\/","author":"Leung C.","year":"2016","unstructured":"C. Leung, J. Ren, D. Choffnes, and C. Wilson. App vs web. https:\/\/recon.meddle.mobi\/appvsweb\/, 2016."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2817946.2817947"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889178"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/953460.953509"},{"key":"e_1_3_2_1_36_1","unstructured":"C. C. Miller and S. Sengupta. Advertisers find new ways to track smartphone users. http:\/\/www.bostonglobe.com\/news\/nation\/2013\/10\/05\/selling-secrets-phone-users-advertisers\/ZSNNChJQvFuEcHJFsUJGUM\/story.html 2013."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465378"},{"key":"e_1_3_2_1_38_1","volume-title":"Go ahead and add that extra ad library, but be careful about which one you add. https:\/\/www.developereconomics.com\/add-extra-ad-library-but-be-careful-which-one","author":"Nagappan M.","year":"2015","unstructured":"M. Nagappan. Go ahead and add that extra ad library, but be careful about which one you add. https:\/\/www.developereconomics.com\/add-extra-ad-library-but-be-careful-which-one, 2015."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674991"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741090"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.43"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523671"},{"key":"e_1_3_2_1_43_1","unstructured":"Raspberry Pi Foundation. Raspberry Pi 2 Model B. https:\/\/www.raspberrypi.org\/products\/raspberry-pi-2-model-b\/."},{"key":"e_1_3_2_1_44_1","unstructured":"redphx. Apk Downloader. https:\/\/chrome.google.com\/webstore\/detail\/apk-downloader\/cgihflhdpokeobcfimliamffejfnmfii."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906392"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/2228298.2228315"},{"key":"e_1_3_2_1_47_1","unstructured":"rovo89. Xposed Module Repository. http:\/\/repo.xposed.info\/."},{"key":"e_1_3_2_1_48_1","unstructured":"D. Schurmann. Adaway: An open source ad blocker for android using the hosts file. https:\/\/adaway.org\/."},{"key":"e_1_3_2_1_49_1","unstructured":"Selenium. Selenium -- Web Browser Automation. http:\/\/www.seleniumhq.org\/."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766523"},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the 21st USENIX Security","author":"Shekhar S.","year":"2012","unstructured":"S. Shekhar, M. Dietz, and D. S. Wallach. Adsplit: Separating smartphone advertising from applications. In Proceedings of the 21st USENIX Security, 2012."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2801694.2801696"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23407"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808120"},{"key":"e_1_3_2_1_55_1","unstructured":"G. Sterling. Morgan stanley: No apps aren't winning. the mobile browser is. http:\/\/marketingland.com\/morgan-stanley-no-apps-arent-winning-the-mobile-browser-is-144303."},{"key":"e_1_3_2_1_56_1","volume-title":"Workshop on Mobile Security Technologies (MoST)","author":"Stevens R.","year":"2012","unstructured":"R. Stevens, C. Gibler, J. Crussell, J. Erickson, and H. Chen. Investigating user privacy in android ad libraries. In Workshop on Mobile Security Technologies (MoST), 2012."},{"key":"e_1_3_2_1_57_1","unstructured":"J. Summerfield. Mobile website vs. mobile app: Which is best for your organization? https:\/\/www.hswsolutions.com\/services\/mobile-web-development\/mobile-website-vs-apps\/."},{"key":"e_1_3_2_1_58_1","unstructured":"TRUSTe Technology Blog. Mobile tracking: How it works and why it's different. http:\/\/www.truste.com\/developer\/?p=86 2016."},{"key":"e_1_3_2_1_59_1","unstructured":"UnhappyGhost Goldenstein. Fingerprinting defenses in the tor browser. http:\/\/www.unhappyghost.com\/2015\/02\/forensics-fingerprinting-defenses-in-tor-browser.html."},{"key":"e_1_3_2_1_60_1","volume-title":"Same origin policy. https:\/\/www.w3.org\/Security\/wiki\/Same_Origin_Policy","author":"Security C Web","year":"2010","unstructured":"W3C Web Security. Same origin policy. https:\/\/www.w3.org\/Security\/wiki\/Same_Origin_Policy, 2010."},{"key":"e_1_3_2_1_61_1","unstructured":"J. Walton JohnSteven J. Manico K. Wall and R. Iramar. Certificate and Public Key Pinning. https:\/\/www.owasp.org\/index.php\/Certificate_and_Public_Key_Pinning."},{"key":"e_1_3_2_1_62_1","unstructured":"R. Welton. Android SSL certificate pinning bypass. https:\/\/github.com\/Fuzion24\/JustTrustMe."},{"key":"e_1_3_2_1_63_1","unstructured":"M. Whitener. Cookies are so yesterday; cross-device tracking is in-some tips. https:\/\/iapp.org\/news\/a\/cookies-are-so-yesterday-cross-device-tracking-is-insome-tips\/."},{"key":"e_1_3_2_1_64_1","unstructured":"L. Wroblewski. Mobile web vs. native apps or why you want both. http:\/\/www.lukew.com\/ff\/entry.asp?1954 2016."},{"key":"e_1_3_2_1_65_1","volume-title":"Proceedings of the 2012 USENIX ATC.","author":"Yoon C.","unstructured":"C. Yoon, D. Kim, W. Jung, C. Kang, and H. Cha. Appscope: Application energy metering framework for android smartphone using kernel activity monitoring. In Proceedings of the 2012 USENIX ATC."},{"key":"e_1_3_2_1_66_1","unstructured":"J. Zang K. Dummit J. Graves P. Lisker and L. Sweeney. Who knows what about me? a survey of behind the scenes personal data sharing to third parties by mobile apps. http:\/\/techscience.org\/a\/2015103001 2015."}],"event":{"name":"WWW '17: 26th International World Wide Web Conference","location":"Perth Australia","acronym":"WWW '17","sponsor":["IW3C2 International World Wide Web Conference Committee","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the 26th International Conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3038912.3052691","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3038912.3052691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:29Z","timestamp":1750217789000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3038912.3052691"}},"subtitle":["Mobile Websites vs Mobile Apps"],"short-title":[],"issued":{"date-parts":[[2017,4,3]]},"references-count":66,"alternative-id":["10.1145\/3038912.3052691","10.5555\/3038912"],"URL":"https:\/\/doi.org\/10.1145\/3038912.3052691","relation":{},"subject":[],"published":{"date-parts":[[2017,4,3]]},"assertion":[{"value":"2017-04-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}