Affiliation:
1. Information Security Group, Royal Holloway , University of London
Abstract
Abstract
Menstruapps are mobile applications that can track a user’s reproductive cycle, sex life and health in order to provide them with algorithmically derived insights into their body. These apps are now hugely popular, with the most favoured boasting over 100 million downloads. In this study, we investigate the privacy practices of a set of 30 Android menstruapps, a set which accounts for nearly 200 million downloads.We measured how the apps present information and behave on a number of privacy related topics, such as the complexity of the language used, the information collected by them, the involvement of third parties and how they describe user rights. Our results show that while common pieces of personal data such as name, email, etc. are treated appropriately by most applications, reproductive-related data is not covered by the privacy policies and in most cases, completely disregarded, even when it is required for the apps to work. We have informed app developers of our findings and have tried to engage them in dialogue around improving their privacy practices.
Reference58 articles.
1. [1] Adhikari, R., Richards, D., and Scott, K. (2014). Security and privacy issues related to the use of mobile health apps. ACIS.
2. [2] Ahmed, E. (2019). No body’s business but mine: How menstruation apps are sharing your data. https://privacyinternational.org/long-read/3196/no-bodys-businessmine-how-menstruation-apps-are-sharing-your-data. Accessed on March 2020.
3. [3] Backes, M., Bugiel, S., and Derr, E. (2016). Reliable thirdparty library detection in android and its security applications. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pages 356–367. ACM.
4. [4] Balebako, R., Marsh, A., Lin, J., Hong, J. I., and Cranor, L. F. (2014). The privacy and security behaviors of smartphone app developers.
5. [5] Bhatia, J., Breaux, T. D., Reidenberg, J. R., and Norton, T. B. (2016). A theory of vagueness and privacy risk perception. In 2016 IEEE 24th International Requirements Engineering Conference (RE), pages 26–35. IEEE.
Cited by
49 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献