{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T17:40:10Z","timestamp":1756834810330,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1145\/3460112.3471958","type":"proceedings-article","created":{"date-parts":[[2021,9,23]],"date-time":"2021-09-23T12:39:58Z","timestamp":1632400798000},"page":"215-229","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Privacy during Pandemic: A Global View of Privacy Practices around COVID-19 Apps"],"prefix":"10.1145","author":[{"given":"Tanusree","family":"Sharma","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana Champaign"}]},{"given":"Md. Mirajul","family":"Islam","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Anupam","family":"Das","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"S. M. Taiabul","family":"Haque","sequence":"additional","affiliation":[{"name":"University of Central Missouri"}]},{"given":"Syed Ishtiaque","family":"Ahmed","sequence":"additional","affiliation":[{"name":"University of Toronto"}]}],"member":"320","published-online":{"date-parts":[[2021,9,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. APEC Privacy Framework. www.apec.org\/Publications\/2017\/08\/APEC"},{"volume-title":"Asia Pacific Data Protection and Cyber Security Guide","year":"2019","key":"e_1_3_2_1_2_1","unstructured":"2020. Asia Pacific Data Protection and Cyber Security Guide 2019. http:\/\/documents.jdsupra.com\/2380c6d9-41fd-48bb-9f78-3fba5aa25e52.pdf"},{"key":"e_1_3_2_1_3_1","unstructured":"2020. Australian Privacy Principles. https:\/\/www.oaic.gov.au\/privacy\/australian-privacy-principles\/"},{"key":"e_1_3_2_1_4_1","unstructured":"2020. California Consumer Privacy Act (CCPA). https:\/\/oag.ca.gov\/privacy\/ccpa."},{"key":"e_1_3_2_1_5_1","unstructured":"2020. European Data Protection Board. https:\/\/edpb.europa.eu\/sites\/edpb\/"},{"key":"e_1_3_2_1_6_1","unstructured":"2020. General Data Protection Regulation. https:\/\/gdpr-info.eu\/"},{"key":"e_1_3_2_1_7_1","unstructured":"2020. Google Translator. https:\/\/translate.google.com\/?ui=tob"},{"volume-title":"Privacy Act of","year":"1974","key":"e_1_3_2_1_8_1","unstructured":"2020. Privacy Act of 1974. https : \/\/it.ojp.gov\/PrivacyLiberty\/authorities\/statutes\/1279"},{"key":"e_1_3_2_1_9_1","unstructured":"2021. About the Sustainable Development Goals - United Nations Sustainable Development. https:\/\/www.un.org\/sustainabledevelopment\/sustainable-development-goals\/"},{"key":"e_1_3_2_1_10_1","unstructured":"2021. Ensure healthy lives and promote well-being for all at all ages. https:\/\/sdgs.un.org\/goals\/goal3"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010226"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909609.2909661"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134652"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025961"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300410"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557376"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.11.014"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3378393.3402244"},{"key":"e_1_3_2_1_19_1","volume-title":"Personal data usage and privacy considerations in the COVID-19 global pandemic. Ci\u00eancia & Sa\u00fade Coletiva 25","author":"Araujo Almeida Bethania","year":"2020","unstructured":"Bethania de\u00a0Araujo Almeida, Danilo Doneda, Maria\u00a0Yury Ichihara, Manoel Barral-Netto, Gustavo\u00a0Correa Matta, Elaine\u00a0Teixeira Rabello, Fabio\u00a0Castro Gouveia, and Mauricio Barreto. 2020. Personal data usage and privacy considerations in the COVID-19 global pandemic. Ci\u00eancia & Sa\u00fade Coletiva 25 (2020), 2487\u20132492."},{"key":"e_1_3_2_1_20_1","volume-title":"Acceptability of app-based contact tracing for COVID-19: Cross-country survey study. JMIR mHealth and uHealth 8, 8","author":"Altmann Samuel","year":"2020","unstructured":"Samuel Altmann, Luke Milsom, Hannah Zillessen, Raffaele Blasone, Frederic Gerdon, Ruben Bach, Frauke Kreuter, Daniele Nosenzo, S\u00e9verine Toussaert, and Johannes Abeler. 2020. Acceptability of app-based contact tracing for COVID-19: Cross-country survey study. JMIR mHealth and uHealth 8, 8 (2020), e19857."},{"volume-title":"Institutional review board member handbook","author":"Amdur J","key":"e_1_3_2_1_21_1","unstructured":"Robert\u00a0J Amdur and Elizabeth\u00a0A Bankert. 2010. Institutional review board member handbook. Jones & Bartlett Publishers."},{"key":"e_1_3_2_1_22_1","volume-title":"Farhan Riaz, Sidrah Abdullah, Muhammad Imran, and Farhan Ahmad.","author":"Azad Muhammad\u00a0Ajmal","year":"2020","unstructured":"Muhammad\u00a0Ajmal Azad, Junaid Arshad, Syed Muhammad\u00a0Ali Akmal, Farhan Riaz, Sidrah Abdullah, Muhammad Imran, and Farhan Ahmad. 2020. A First Look at Privacy Analysis of COVID-19 Contact Tracing Mobile Applications. IEEE Internet of Things Journal(2020)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490507956"},{"key":"e_1_3_2_1_24_1","volume-title":"Decentralized Contact Tracing Using a DHT and Blind Signatures.IACR Cryptol. ePrint Arch. 2020","author":"Brack Samuel","year":"2020","unstructured":"Samuel Brack, Leonie Reichert, and Bj\u00f6rn Scheuermann. 2020. Decentralized Contact Tracing Using a DHT and Blind Signatures.IACR Cryptol. ePrint Arch. 2020 (2020), 398."},{"key":"e_1_3_2_1_25_1","volume-title":"Digital technologies in the public-health response to COVID-19. Nature medicine 26, 8","author":"Budd Jobie","year":"2020","unstructured":"Jobie Budd, Benjamin\u00a0S Miller, Erin\u00a0M Manning, Vasileios Lampos, Mengdie Zhuang, Michael Edelstein, Geraint Rees, Vincent\u00a0C Emery, Molly\u00a0M Stevens, Neil Keegan, 2020. Digital technologies in the public-health response to COVID-19. Nature medicine 26, 8 (2020), 1183\u20131192."},{"key":"e_1_3_2_1_26_1","volume-title":"The utilization of e-government services: citizen trust, innovation and acceptance factors. Information systems journal 15, 1","author":"Carter Lemuria","year":"2005","unstructured":"Lemuria Carter and France B\u00e9langer. 2005. The utilization of e-government services: citizen trust, innovation and acceptance factors. Information systems journal 15, 1 (2005), 5\u201325."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Fernando\u00a0Nobre Cavalcante. 2020. \u201cAlexa What about LGPD?\u201d: The Brazilian Data Protection Regulation in the C ontext of the Mediatization of Virtual Assistants. Security and Privacy in the Internet of Things (2020) 151.","DOI":"10.1201\/9781003016304-11"},{"key":"e_1_3_2_1_28_1","volume-title":"Pact: Privacy sensitive protocols and mechanisms for mobile contact tracing. arXiv preprint arXiv:2004.03544(2020).","author":"Chan Justin","year":"2020","unstructured":"Justin Chan, Shyam Gollakota, Eric Horvitz, Joseph Jaeger, Sham Kakade, Tadayoshi Kohno, John Langford, Jonathan Larson, Sudheesh Singanamalla, Jacob Sunshine, 2020. Pact: Privacy sensitive protocols and mechanisms for mobile contact tracing. arXiv preprint arXiv:2004.03544(2020)."},{"key":"e_1_3_2_1_29_1","unstructured":"Hyunghoon Cho Daphne Ippolito and Yun\u00a0William Yu. 2020. Contact tracing mobile apps for COVID-19: Privacy considerations and related trade-offs. arXiv preprint arXiv:2003.11511(2020)."},{"volume-title":"\u201cPan-European Privacy Preserving Proximity Tracing Initiative","author":"Cooper D","key":"e_1_3_2_1_30_1","unstructured":"D Cooper, KV Quathem, and AO Meneses. [n.d.]. COVID-19 Apps and Websites\u2013The \u201cPan-European Privacy Preserving Proximity Tracing Initiative\u201d and Guidance by Supervisory Authorities."},{"volume-title":"African Data Privacy Laws","author":"Dagbanja N","key":"e_1_3_2_1_31_1","unstructured":"Dominic\u00a0N Dagbanja. 2016. The right to privacy and data protection in Ghana. In African Data Privacy Laws. Springer, 229\u2013248."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.4018\/joeuc.2006010101"},{"key":"e_1_3_2_1_33_1","volume-title":"Health Insurance Portability and Accountability Act. StatPearls","author":"Edemekong Peter","year":"2020","unstructured":"Peter Edemekong, Pavan Annamaraju, and Micelle Haydel. 2020. Health Insurance Portability and Accountability Act. StatPearls (2020)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102181"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.31"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Urs Gasser Marcello Ienca James Scheibner Joanna Sleigh and Effy Vayena. 2020. Digital tools against COVID-19: taxonomy ethical challenges and navigation aid. The Lancet Digital Health(2020).","DOI":"10.1016\/S2589-7500(20)30137-0"},{"key":"e_1_3_2_1_37_1","volume-title":"safety, and privacy concerns of home monitoring technologies during COVID-19. Nature medicine 26, 8","author":"Gerke Sara","year":"2020","unstructured":"Sara Gerke, Carmel Shachar, Peter\u00a0R Chai, and I\u00a0Glenn Cohen. 2020. Regulatory, safety, and privacy concerns of home monitoring technologies during COVID-19. Nature medicine 26, 8 (2020), 1176\u20131182."},{"key":"e_1_3_2_1_38_1","first-page":"415","article-title":"The Apps Act: Regulation of Mobile Application Privacy","volume":"17","author":"Gnadinger Katherine","year":"2014","unstructured":"Katherine Gnadinger. 2014. The Apps Act: Regulation of Mobile Application Privacy. SMU Sci. & Tech. L. Rev. 17 (2014), 415.","journal-title":"SMU Sci. & Tech. L. Rev."},{"key":"e_1_3_2_1_39_1","volume-title":"The use of mobile phone data to inform analysis of COVID-19 pandemic epidemiology. Nature communications 11, 1","author":"Grantz H","year":"2020","unstructured":"Kyra\u00a0H Grantz, Hannah\u00a0R Meredith, Derek\u00a0AT Cummings, C\u00a0Jessica\u00a0E Metcalf, Bryan\u00a0T Grenfell, John\u00a0R Giles, Shruti Mehta, Sunil Solomon, Alain Labrique, Nishant Kishore, 2020. The use of mobile phone data to inform analysis of COVID-19 pandemic epidemiology. Nature communications 11, 1 (2020), 1\u20138."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392561.3394642"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction 3, CSCW(2019)","author":"Haque M\u00a0Taiabul","year":"2019","unstructured":"SM\u00a0Taiabul Haque, Pratyasha Saha, Muhammad\u00a0Sajidur Rahman, and Syed\u00a0Ishtiaque Ahmed. 2019. Of Ulti,\u2019hajano\u2019, and\u201d Matachetar otanetak datam\u201d Exploring Local Practices of Exchanging Confidential and Sensitive Information in Urban Bangladesh. Proceedings of the ACM on Human-Computer Interaction 3, CSCW(2019), 1\u201322."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocaa240"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2012.72"},{"key":"e_1_3_2_1_44_1","first-page":"3965","article-title":"Survey on Security Risks in Android OS and an Introduction to Samsung KNOX","volume":"6","author":"Krishnan Maya","year":"2015","unstructured":"Maya Krishnan. 2015. Survey on Security Risks in Android OS and an Introduction to Samsung KNOX. International Journal of Computer Science and Information Technologies 6, 4(2015), 3965\u20133967.","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"e_1_3_2_1_45_1","unstructured":"Naomi Lefkovitz and Kaitlin Boeckl. 2020. NIST Privacy Framework: An Overview. (2020)."},{"key":"e_1_3_2_1_46_1","unstructured":"Jinfeng Li and Xinyi Guo. 2020. COVID-19 Contact-tracing Apps: A Survey on the Global Deployment and Challenges. arXiv preprint arXiv:2005.03599(2020)."},{"key":"e_1_3_2_1_47_1","first-page":"131","article-title":"An exploration of the conceptual basis of privacy and the implications for the future of Australian privacy law","volume":"29","author":"Lindsay David","year":"2005","unstructured":"David Lindsay. 2005. An exploration of the conceptual basis of privacy and the implications for the future of Australian privacy law. Melb. UL Rev. 29(2005), 131.","journal-title":"Melb. UL Rev."},{"key":"e_1_3_2_1_48_1","first-page":"528","article-title":"Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach.","volume":"2020","author":"Liu K","year":"2020","unstructured":"Joseph\u00a0K Liu, Man\u00a0Ho Au, Tsz\u00a0Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, and Li Li. 2020. Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach.IACR Cryptol. ePrint Arch. 2020 (2020), 528.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ips014"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2020.3002492"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287098.3287107"},{"key":"e_1_3_2_1_52_1","first-page":"1","article-title":"Globalization and social protection: the impact of EU and international rules in the ratcheting up of US privacy standards. Yale J","author":"Shaffer Gregory","year":"2000","unstructured":"Gregory Shaffer. 2000. Globalization and social protection: the impact of EU and international rules in the ratcheting up of US privacy standards. Yale J. Int\u2019l L. 25(2000), 1.","journal-title":"Int\u2019l"},{"key":"e_1_3_2_1_53_1","unstructured":"Lucy Simko Ryan Calo Franziska Roesner and Tadayoshi Kohno. 2020. COVID-19 Contact Tracing and Privacy: Studying Opinion and Preferences. arXiv preprint arXiv:2005.06056(2020)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2003.11045836"},{"key":"e_1_3_2_1_55_1","unstructured":"Carmela Troncoso Mathias Payer Jean-Pierre Hubaux Marcel Salath\u00e9 James Larus Edouard Bugnion Wouter Lueks Theresa Stadler Apostolos Pyrgelis Daniele Antonioli 2020. Decentralized privacy-preserving proximity tracing. arXiv preprint arXiv:2005.12273(2020)."},{"volume-title":"Data protection law: A comparative analysis of Asia-Pacific and European approaches","author":"Walters Robert","key":"e_1_3_2_1_56_1","unstructured":"Robert Walters, Leon Trakman, and Bruno Zeller. 2019. Data protection law: A comparative analysis of Asia-Pacific and European approaches. Springer Nature."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63086-7_17"},{"key":"e_1_3_2_1_58_1","volume-title":"Public attitudes towards COVID-19 contact tracing apps: A UK-based focus group study. Health Expectations","author":"Williams N","year":"2020","unstructured":"Simon\u00a0N Williams, Christopher\u00a0J Armitage, Tova Tampe, and Kimberly Dienes. 2020. Public attitudes towards COVID-19 contact tracing apps: A UK-based focus group study. Health Expectations (2020)."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM48529.2020.00020"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.2196\/21572"}],"event":{"name":"COMPASS '21: ACM SIGCAS Conference on Computing and Sustainable Societies","sponsor":["SIGCAS ACM Special Interest Group on Computers and Society"],"location":"Virtual Event Australia","acronym":"COMPASS '21"},"container-title":["ACM SIGCAS Conference on Computing and Sustainable Societies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460112.3471958","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460112.3471958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,2]],"date-time":"2025-09-02T17:04:16Z","timestamp":1756832656000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460112.3471958"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":60,"alternative-id":["10.1145\/3460112.3471958","10.1145\/3460112"],"URL":"https:\/\/doi.org\/10.1145\/3460112.3471958","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]},"assertion":[{"value":"2021-09-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}