{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:03:56Z","timestamp":1776092636012,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["1942014"],"award-info":[{"award-number":["1942014"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,26]]},"DOI":"10.1145\/3603216.3624967","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T01:38:42Z","timestamp":1700703522000},"page":"61-73","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Comparing Privacy Labels of Applications in Android and iOS"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3276-5764","authenticated-orcid":false,"given":"Rishabh","family":"Khandelwal","sequence":"first","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-7143-2892","authenticated-orcid":false,"given":"Asmit","family":"Nayak","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7065-9019","authenticated-orcid":false,"given":"Paul","family":"Chung","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4609-7691","authenticated-orcid":false,"given":"Kassem","family":"Fawaz","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. JoMingyu\/google-play-scraper: Google play scraper for Python. https: \/\/github.com\/JoMingyu\/google-play-scraper"},{"key":"e_1_3_2_1_2_1","volume-title":"Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies. arXiv preprint arXiv:2306.17063","author":"Ali Mir Masood","year":"2023","unstructured":"Mir Masood Ali, David G Balash, Chris Kanich, and Adam J Aviv. 2023. Honesty is the Best Policy: On the Accuracy of Apple Privacy Labels Compared to Apps' Privacy Policies. arXiv preprint arXiv:2306.17063 (2023)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903508"},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/support.google. com\/googleplay\/answer\/11416267?hl=en&visit_id=638094609270086018- 2285502702&p=data-safety&rd=1#zippy=%2Csecurity-practices","author":"Google Play's Understand","year":"2022","unstructured":"Understand app privacy & security practices with Google Play's Data safety section Computer Google Play Help. 2022. (2022). https:\/\/support.google. com\/googleplay\/answer\/11416267?hl=en&visit_id=638094609270086018- 2285502702&p=data-safety&rd=1#zippy=%2Csecurity-practices"},{"key":"e_1_3_2_1_5_1","volume-title":"Xiaoyuan Wu, Chris Kanich, and Adam J Aviv.","author":"Balash David G","year":"2022","unstructured":"David G Balash, Mir Masood Ali, Xiaoyuan Wu, Chris Kanich, and Adam J Aviv. 2022. Longitudinal Analysis of Privacy Labels in the Apple App Store. arXiv preprint arXiv:2206.02658 (2022)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Rebecca Balebako Abigail Marsh Jialiu Lin Jason I Hong and Lorrie Faith Cranor. 2014. The privacy and security behaviors of smartphone app developers. (2014).","DOI":"10.14722\/usec.2014.23006"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808119"},{"key":"e_1_3_2_1_8_1","volume-title":"Longitudinal analysis of android ad library permissions. arXiv preprint arXiv:1303.0857","author":"Book Theodore","year":"2013","unstructured":"Theodore Book, Adam Pridgen, and Dan S Wallach. 2013. Longitudinal analysis of android ad library permissions. arXiv preprint arXiv:1303.0857 (2013)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.84"},{"key":"e_1_3_2_1_10_1","first-page":"273","article-title":"Necessary but not sucient: Standardized mechanisms for privacy notice and choice","author":"Cranor Lorrie Faith","year":"2012","unstructured":"Lorrie Faith Cranor. 2012. Necessary but not sucient: Standardized mechanisms for privacy notice and choice. J. on Telecomm. & High Tech. L. 10 (2012), 273.","journal-title":"J. on Telecomm. & High Tech."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563967"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00043"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00112"},{"key":"e_1_3_2_1_14_1","unstructured":"Grace Fox Colin Tonge Theo Lynn and John Mooney. 2018. Communicating compliance: developing a GDPR privacy label. (2018)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW55150.2022.00028"},{"key":"e_1_3_2_1_16_1","volume-title":"Twelfth symposium on usable privacy and security (SOUPS","author":"Gluck Joshua","year":"2016","unstructured":"Joshua Gluck, Florian Schaub, Amy Friedman, Hana Habib, Norman Sadeh, Lorrie Faith Cranor, and Yuvraj Agarwal. 2016. How short is too short? implications of length and framing on the eectiveness of privacy notices. In Twelfth symposium on usable privacy and security (SOUPS 2016). 321--340."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517232"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753561"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466466"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466466"},{"key":"e_1_3_2_1_22_1","volume-title":"Unpacking Privacy Labels: A Measurement and Developer Perspective on Google's Data Safety Section. arXiv preprint arXiv:2306.08111","author":"Khandelwal Rishabh","year":"2023","unstructured":"Rishabh Khandelwal, Asmit Nayak, Paul Chung, and Kassem Fawaz. 2023. Unpacking Privacy Labels: A Measurement and Developer Perspective on Google's Data Safety Section. arXiv preprint arXiv:2306.08111 (2023)."},{"key":"e_1_3_2_1_23_1","volume-title":"Max Van Kleek, and Nigel Shadbolt","author":"Kollnig Konrad","year":"2021","unstructured":"Konrad Kollnig, Anastasia Shuba, Reuben Binns, Max Van Kleek, and Nigel Shadbolt. 2021. Are iPhones Really Better for Privacy? Comparative Study of iOS and Android Apps. arXiv preprint arXiv:2109.13722 (2021)."},{"key":"e_1_3_2_1_24_1","volume-title":"Reuben Binns, and Nigel Shadbolt.","author":"Kollnig Konrad","year":"2022","unstructured":"Konrad Kollnig, Anastasia Shuba, Max Van Kleek, Reuben Binns, and Nigel Shadbolt. 2022. Goodbye tracking? Impact of iOS app tracking transparency and privacy labels. arXiv preprint arXiv:2204.03556 (2022)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502012"},{"key":"e_1_3_2_1_26_1","volume-title":"Understanding and capturing people's mobile app privacy preferences. Ph. D. Dissertation","author":"Lin Jialiu","unstructured":"Jialiu Lin. 2013. Understanding and capturing people's mobile app privacy preferences. Ph. D. Dissertation. Carnegie Mellon University."},{"key":"e_1_3_2_1_27_1","volume-title":"The privacy policy landscape after the GDPR. arXiv preprint arXiv:1809.08396","author":"Linden Thomas","year":"2018","unstructured":"Thomas Linden, Rishabh Khandelwal, Hamza Harkous, and Kassem Fawaz. 2018. The privacy policy landscape after the GDPR. arXiv preprint arXiv:1809.08396 (2018)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572586"},{"key":"e_1_3_2_1_29_1","volume-title":"Eleventh symposium on usable privacy and security (SOUPS","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub, Rebecca Balebako, Adam L Durity, and Lorrie Faith Cranor. 2015. A design space for effective privacy notices. In Eleventh symposium on usable privacy and security (SOUPS 2015). 1--17."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Gian Luca Scoccia Marco Autili Giovanni Stilo and Paola Inverardi. 2022. An empirical study of privacy labels on the Apple iOS mobile app store. (2022).","DOI":"10.1145\/3524613.3527813"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771795"},{"key":"e_1_3_2_1_32_1","volume-title":"Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at Scale. arXiv preprint arXiv:2206.06274","author":"Xiao Yue","year":"2022","unstructured":"Yue Xiao, Zhengyi Li, Yue Qin, Jiale Guan, Xiaolong Bai, Xiaojing Liao, and Luyi Xing. 2022. Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels at Scale. arXiv preprint arXiv:2206.06274 (2022)."},{"key":"e_1_3_2_1_33_1","volume-title":"Lorrie Faith Cranor, and Norman Sadeh","author":"Zhang Shikun","year":"2022","unstructured":"Shikun Zhang, Yuanyuan Feng, Yaxing Yao, Lorrie Faith Cranor, and Norman Sadeh. 2022. How Usable Are iOS App Privacy Labels? UMBC Faculty Collection (2022)."}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603216.3624967","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603216.3624967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:49:11Z","timestamp":1750286951000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603216.3624967"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":33,"alternative-id":["10.1145\/3603216.3624967","10.1145\/3603216"],"URL":"https:\/\/doi.org\/10.1145\/3603216.3624967","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}