Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
167 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
42 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends (2403.02292v3)

Published 4 Mar 2024 in cs.LG and cs.HC

Abstract: We present an analysis of 12 million instances of privacy-relevant reviews publicly visible on the Google Play Store that span a 10 year period. By leveraging state of the art NLP techniques, we examine what users have been writing about privacy along multiple dimensions: time, countries, app types, diverse privacy topics, and even across a spectrum of emotions. We find consistent growth of privacy-relevant reviews, and explore topics that are trending (such as Data Deletion and Data Theft), as well as those on the decline (such as privacy-relevant reviews on sensitive permissions). We find that although privacy reviews come from more than 200 countries, 33 countries provide 90% of privacy reviews. We conduct a comparison across countries by examining the distribution of privacy topics a country's users write about, and find that geographic proximity is not a reliable indicator that nearby countries have similar privacy perspectives. We uncover some countries with unique patterns and explore those herein. Surprisingly, we uncover that it is not uncommon for reviews that discuss privacy to be positive (32%); many users express pleasure about privacy features within apps or privacy-focused apps. We also uncover some unexpected behaviors, such as the use of reviews to deliver privacy disclaimers to developers. Finally, we demonstrate the value of analyzing app reviews with our approach as a complement to existing methods for understanding users' perspectives about privacy

Definition Search Book Streamline Icon: https://streamlinehq.com
References (90)
  1. Comparing security and privacy attitudes among U.S. users of different smartphone and Smart-Speaker platforms. In 17th Symposium on Usable Privacy and Security (SOUPS), 2021.
  2. Evaluating in-workflow messages for improving mental models of end-to-end encryption. In 30th USENIX Security Symposium, 2021.
  3. Investigating influencer vpn ads on youtube. In 43rd IEEE Symposium on Security and Privacy, 2022.
  4. Building machine translation systems for the next thousand languages. arXiv:2205.03983, 2022.
  5. Rosanna Bellini. Paying the price: When intimate partners use technology for financial harm. In CHI Conference on Human Factors in Computing Systems, 2023.
  6. What the app is that? deception and countermeasures in the android user interface. In 36th IEEE Symposium on Security and Privacy, 2015.
  7. Security at the end of the tunnel: The anatomy of VPN mental models among experts and Non-Experts in a corporate context. In 31st USENIX Security Symposium, 2022.
  8. Evaluating the information security awareness of smartphone users. In CHI Conference on Human Factors in Computing Systems, 2020.
  9. Rebecca Bundhun. Why smartphones are key for india’s digital ambitions. The National, 2022. https://www.thenationalnews.com/business/technology/2022/09/05/why-smartphones-are-key-for-indias-digital-ambitions/.
  10. A large scale study of user behavior, expectations and engagement with android permissions. In 30th USENIX Security Symposium, 2021.
  11. The spyware used in intimate partner violence. In 39th IEEE Symposium on Security and Privacy, 2018.
  12. Collective privacy management in social media: A cross-cultural validation. ACM Trans. Comput.-Hum. Interact., June 2018.
  13. A multinational study on online privacy: global concerns and local responses. New media & society, 2009.
  14. Is it a concern or a preference? an investigation into the ability of privacy scales to capture and distinguish granular privacy constructs. In 18th Symposium on Usable Privacy and Security (SOUPS), 2022.
  15. Parents’ and teens’ perspectives on privacy in a technology-filled world. In 10th Symposium On Usable Privacy and Security (SOUPS), 2014.
  16. GoEmotions: A Dataset of Fine-Grained Emotions. In 58th Annual Meeting of the Association for Computational Linguistics (ACL), 2020.
  17. How and why people use virtual private networks. In 31st USENIX Security Symposium, 2022.
  18. Berni Dwan. The security implications of the digital diary. Computer Fraud & Security, 1997, 1997.
  19. Behavior ever follows intention? a validation of the security behavior intentions scale (sebis). In CHI conference on human factors in computing systems, 2016.
  20. Paul Ekman. An argument for basic emotions. Cognition & emotion, 6, 1992.
  21. Android permissions demystified. In 18th ACM conference on Computer and communications security (CCS), 2011.
  22. “a stalker’s paradise”: How intimate partner abusers exploit technology. In CHI Conference on Human Factors in Computing Systems, 2018.
  23. Zack Friedman. Stop falling for this Facebook scam. Forbes, August 2019. https://www.forbes.com/sites/zackfriedman/2019/08/19/facebook-scam/?sh=4b3a3abda4cf.
  24. An analysis of pre-installed android software. In 41st IEEE Symposium on Security and Privacy, 2020.
  25. Difficulties of measuring culture in privacy studies. Proceedings of the ACM Human-Computer Interaction, 2021.
  26. Safety vs. surveillance: what children have to say about mobile apps for parental control. In CHI Conference on Human Factors in Computing Systems, 2018.
  27. Samuel Gibbs. Why is facebook trying to force you to use its messenger app? The Guardian, February 2016. https://www.theguardian.com/technology/2016/jun/06/facebook-forcing-messenger-app-explainer.
  28. Ellis Hamburger. Why telegram has become the hottest messaging app in the world. The Verge, February 2014. https://www.theverge.com/2014/2/25/5445864/telegram-messenger-hottest-app-in-the-world.
  29. Keep on lockin’in the free world: A multi-national comparison of smartphone locking. In CHI Conference on Human Factors in Computing Systems, 2016.
  30. Hark: A deep learning system for navigating privacy feedback at scale. In 43rd IEEE Symposium on Security and Privacy, 2022.
  31. How weird is usable privacy and security research? In 33rd USENIX Security Symposium, 2024.
  32. Clinical computer security for victims of intimate partner violence. In 28th USENIX Security Symposium, 2019.
  33. Debertav3: Improving deberta using electra-style pre-training with gradient-disentangled embedding sharing. arXiv:2111.09543, 2021.
  34. A world full of privacy and security (mis)conceptions? findings of a representative survey in 12 countries. In CHI Conference on Human Factors in Computing Systems, 2023.
  35. Distilling the knowledge in a neural network. arXiv:1503.02531, 2015.
  36. Lora: Low-rank adaptation of large language models. arXiv:2106.09685, 2021.
  37. They would do better if they worked together: The case of interaction problems between password managers and websites. In 42nd IEEE Symposium on Security and Privacy, 2021.
  38. An analysis of the privacy and security risks of android vpn permission-enabled apps. In ACM Internet Measurement Conference (IMC), 2016.
  39. Facebook Inc. Form 8-k current report pursuant to section 13 or 15(d) of the securities exchange act of 1934. February 2014. https://www.sec.gov/Archives/edgar/data/1326801/000132680114000010/form8k_2192014.htm.
  40. Google Inc. Fingerprint hidl. 2022. https://source.android.com/docs/security/features/authentication/fingerprint-hal.
  41. Google Inc. Comment posting policy. Google, 2023. https://web.archive.org/web/20230515141330/https://play.google.com/about/comment-posting-policy/?hl=en-US.
  42. Google Inc. Gemini: A family of highly capable multimodal models. arXiv:2312.11805, 2023.
  43. Google Inc. Play console help: Financial services. 2023. http://web.archive.org/web/20240105040615/https://support.google.com/googleplay/android-developer/answer/9876821.
  44. Mike Isaac. Whatsapp delays privacy changes amid user backlash. The New York Times, January 2021. https://www.nytimes.com/2021/01/15/technology/whatsapp-privacy-changes-delayed.html.
  45. Ethical frameworks and computer security trolley problems: Foundations for conversations. arXiv:2302.14326, 2023.
  46. Maya Kosoff. This Facebook ’privacy notice’ is a hoax, and you shouldn’t bother sharing it. Insider, January 2015. https://www.businessinsider.com/facebook-privacy-notice-hoax-2015-1.
  47. "if https were secure, i wouldn’t need 2fa"-end user and administrator mental models of https. In 40th IEEE Symposium on Security and Privacy, 2019.
  48. Testing the null hypothesis of stationarity against the alternative of a unit root: How sure are we that economic time series have a unit root? Journal of econometrics, 54, 1992.
  49. Jolie Lee. Talking angela app scare based on a hoax. USA TODAY, February 2014. https://www.usatoday.com/story/news/nation-now/2014/02/20/talking-angela-app-scare-hoax/5635337/.
  50. A usability evaluation of Tor launcher. Proceedings on Privacy Enhancing Technologies, 2017.
  51. Comments on multi-window against mobile application lock. Journal of Multidisciplinary Engineering Science Studies (JMESS), (5), 2016.
  52. The android update problem: An empirical study. In 15th International Conference on Mining Software Repositories (MSR), 2018.
  53. Privacy attitudes of smart speaker users. Proceedings on Privacy Enhancing Technologies, 2019.
  54. Coral Murphy Marcos. Duckduckgo search engine increased its traffic by 62% in 2020 as users seek privacy. USA Today, Jan 2021. https://www.usatoday.com/story/tech/2021/01/18/search-engine-duckduckgo-increases-traffic-google-competitor/4202556001/.
  55. " we can’t live without {{\{{Them!}}\}}" app developers’ adoption of ad networks and their considerations of consumer risks. In 15th Symposium on Usable Privacy and Security (SOUPS), 2019.
  56. Understanding the demographics of twitter users. In 5th International AAAI Conference on Web and Social Media (ICWSM), 2011.
  57. “desperate times call for desperate measures”: User concerns with mobile loan apps in kenya. In 43rd IEEE Symposium on Security and Privacy, 2022.
  58. Algorithms for hierarchical clustering: an overview. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 2012.
  59. Emotional and practical considerations towards the adoption and abandonment of vpns as a privacy-enhancing technology. Proceedings on Privacy Enhancing Technologies, 2020.
  60. Analyzing user perspectives on mobile app privacy at scale. In 44th International Conference on Software Engineering (ICSE), 2022.
  61. Short text, large effect: Measuring the impact of user reviews on android app security & privacy. In 40th IEEE symposium on Security and Privacy, 2019.
  62. Sentence-t5: Scalable sentence encoders from pre-trained text-to-text models. In Findings of the Association for Computational Linguistics (ACL), 2022.
  63. Annie Njanja. Google clamps down on illegal loan apps in Kenya, Nigeria. TechCrunch, 2022. https://techcrunch.com/2022/11/18/google-clamps-down-on-illegal-loan-apps-in-kenya-nigeria/.
  64. Kate O’Flaherty. How to use signal: The brilliant whatsapp alternative. Forbes, Jan 2021. https://www.forbes.com/sites/kateoflahertyuk/2021/01/11/how-to-use-signal-the-awesome-whatsapp-alternative/?sh=5fe8d91c324b.
  65. OpenAI. Gpt-4 technical report. arXiv:2303.08774, 2023.
  66. Reducing permission requests in mobile apps. In ACM Internet Measurement Conference (IMC), 2019.
  67. Long-term measurement and analysis of the free proxy ecosystem. ACM Transactions on the Web (TWEB), 2019.
  68. How much is privacy worth around the world and across platforms? Journal of Economics & Management Strategy, (4), 2022.
  69. Emilee Rader. Normative and Non-Social beliefs about sensor data: Implications for collective privacy management. In 18th Symposium on Usable Privacy and Security (SOUPS), 2022.
  70. Exploring the limits of transfer learning with a unified text-to-text transformer. Journal of Machine Learning Research, 21(140), 2020.
  71. " all of them claim to be the best": Multi-perspective study of vpn users and vpn providers. arXiv:2208.03505, 2022.
  72. Elissa M Redmiles. " should i worry?" a cross-cultural examination of account security incident response. In 40th IEEE Symposium on Security and Privacy, 2019.
  73. How well do my results generalize? comparing security and privacy survey results from mturk, web, and telephone samples. In 40th IEEE Symposium on Security and Privacy, 2019.
  74. Windowguard: Systematic protection of GUI security in android. In Network and Distributed System Security Symposium (NDSS), 2017.
  75. World Population Review. iphone market share by country. 2023. https://worldpopulationreview.com/country-rankings/iphone-market-share-by-country.
  76. “won’t somebody think of the children?” examining coppa compliance at scale. In 18th Privacy Enhancing Technologies Symposium (PETS), 2018.
  77. Neil J. Rubenking. The best security suites for 2023. PCMag, April 2023. https://www.pcmag.com/picks/the-best-security-suites.
  78. Social media for large studies of behavior. Science, 2014.
  79. " privacy is not for me, it’s for those rich women" performative privacy practices on mobile phones by women in south asia. In 14th Symposium on Usable Privacy and Security (SOUPS), 2018.
  80. Freedom on the net 2022: Countering an authoritarian overhaul of the internet. Freedom House, 2022. https://freedomhouse.org/sites/default/files/2022-10/FOTN2022Digital.pdf.
  81. Awareness, adoption, and misconceptions of web privacy tools. Proceedings on Privacy Enhancing Technologies, 2021.
  82. Deciding on personalized ads: Nudging developers about user privacy. In 17th Symposium on Usable Privacy and Security (SOUPS), 2021.
  83. Replication: How well do my results generalize now? the external validity of online privacy and security surveys. In 18th Symposium on Usable Privacy and Security (SOUPS), 2022.
  84. Smart, useful, scary, creepy: perceptions of online behavioral advertising. In 8th Symposium on Usable Privacy and Security (SOUPS), 2012.
  85. Who is concerned about what? a study of american, chinese and indian users’ privacy concerns on social network sites. In Trust and Trustworthy Computing, 2011.
  86. Sok: A framework for unifying at-risk user research. In 43rd IEEE Symposium on Security and Privacy, 2022.
  87. Scam Watcher. Suspected scam. 2020. https://www.scamwatcher.com/scam/view/272748.
  88. Anti-Privacy and Anti-Security advice on TikTok: Case studies of Technology-Enabled surveillance and control in intimate partner and Parent-Child relationships. In 18th Symposium on Usable Privacy and Security (SOUPS), 2022.
  89. Android permissions remystified: A field study on contextual integrity. In 24th USENIX Security Symposium, 2015.
  90. " if sighted people know, i should be able to know:" privacy perceptions of bystanders with visual impairments around camera-based technology. In 32nd USENIX Security Symposium, 2022.
Citations (2)

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com

Tweets