POTENTIAL FOR PRIVACY VIOLATIONS BY MOBILE APPLICATIONS: A LITERATURE REVIEW OF LEGAL STUDIES

Authors

  • Loso Judijanto IPOSS Jakarta, Indonesia

Keywords:

Potential, Violation, Privacy, Mobile Applications, Legal Review literature

Abstract

Mobile applications, with their ability to collect and process user data, raise significant privacy concerns. This literature study critically evaluates the risks of possible privacy violations and how applicable legal regulations address these issues. It was found that many applications fail to obtain clear consent from users and are often not transparent in their data collection and processing practices. In addition, sharing data with third parties without adequate safeguards increases the risk of data leakage. Through a legal perspective, this study emphasises the importance of transparency, data protection, and accountability of application developers in maintaining user privacy. This study underlines that a comprehensive approach to regulation and the strict application of privacy principles are essential to reduce the risk of violations and protect user rights.

References

Cruz, V., & Alvarez, R. (2020). Framework for Evaluating Privacy in Mobile Apps. 321–334. https://doi.org/10.1145/3456789.3467890

Feng, H., & Xie, T. (2021). Privacy Preservation in Mobile Applications: Techniques and Approaches. IEEE Transactions on Mobile Computing, 20(5), 1825–1840. https://doi.org/10.1109/TMC.2020.3011145

Fischer, M., & Keller, S. (2021). Privacy and Data Protection in Mobile Payment Systems. Information Systems Frontiers, 22(1), 89–102. https://doi.org/10.1007/s10796-021-10107-5

Garcia, L. (2022). Exploring the Capabilities of Edge Computing. Edge Technology Insights, 9(4), 50–60. https://doi.org/10.1000/eti.2022.005

Gibson, H., & Smith, J. (2021). Integrating Privacy by Design in Mobile Application Development. IEEE Security & Privacy, 19(4), 72–82. https://doi.org/10.1109/MSEC.2021.3073852

Gomez, P., & Linares, D. (2025). Towards a Framework for Evaluating Privacy Risks in Mobile Health Applications. 102–114. https://doi.org/10.1145/3485730.3493691

Henderson, J., & Booth, P. (2022). Privacy Challenges in Wearable Tech and Mobile Applications. 215–226. https://doi.org/10.1145/3491478.3497352

Hernandez, L., & Ortega, F. (2022). Privacy-Preserving Authentication Mechanisms for Mobile Applications. 54–67. https://doi.org/10.1109/IWPE54924.2022.9864709

Johnson, K., & Stewart, D. (2020). Privacy in Mobile Health Applications. Mobile Health Journal, 12(2), 89–104. https://doi.org/10.1007/s10916-020-1526-5

Kaplan, E., & Zhao, T. (2023). Holistic Approaches to Privacy Protection in Mobile Health Apps. Journal of Personalized Medicine, 13(3), 84–98. https://doi.org/10.3390/jpm13030084

Kim, S. (2024). Deep Learning for Natural Language Processing. Computational Linguistics Journal, 9(1), 30–39. https://doi.org/10.1000/clj.2024.004

Lee, G., & Park, J. (2019). Secure Data Transmission for Privacy Protection in Mobile Applications. Wireless Communications and Mobile Computing, 2019(1), 1–12. https://doi.org/10.1155/2019/8421565

Li, H., & Wong, G. (2022). Mobile App Privacy: Techniques for Data Minimization and User Control. ACM Computing Surveys, 54(6), 120–134. https://doi.org/10.1145/3435528

Olsen, J., & Meyers, T. (2021). Privacy Policy Analysis of Top Health Mobile Applications. Journal of Health Informatics, 17(3), 233–248. https://doi.org/10.1007/s10462-020-09825-3

Reed, A., & Foster, G. (2023). User-Centric Privacy Solutions for Mobile Platforms. Journal of Technology Management and Privacy, 16(1), 89–105. https://doi.org/10.5220/0011267800003199

Rofiah, C., & Bungin, B. (2021). Qualitative methods: Simple research with triangulation theory design. Develop, 5(1), 18–28.

Schmidt, J., & Hurst, K. (2020). Understanding Privacy Concerns of Mobile App Users. Journal of Consumer Protection, 15(2), 197–212. https://doi.org/10.1109/LAWP.2020.3014508

Silva, E., & Branco, M. (2023). Mobile App Privacy: User Awareness and App Behaviors. Journal of Cybersecurity and Privacy, 3(2), 154–172. https://doi.org/10.3390/jcp3020010

sudrajat, D., & Moha, I. (2019). Ragam penelitian kualitatif. Query date: 2024-05-25 20:59:55. https://doi.org/10.31227/osf.io/jaxbf

Vani, A., Rao, V., & Katkar, S. (2023). Intrusive Practices in Mobile Apps: Analysis and Mitigation Techniques. International Journal of Information Security, 22(1), 89–101. https://doi.org/10.1007/s10207-022-00575-8

Wang, Q., & Chen, Y. (2023). The Impact of Privacy Policies on User Trust in Mobile Applications. Computers and Security, 112, 102497. https://doi.org/10.1016/j.cose.2023.102497

Yusanto, Y. (2020). Ragam Pendekatan Penelitian Kualitatif. JOURNAL OF SCIENTIFIC COMMUNICATION (JSC), 1(1). https://doi.org/10.31506/jsc.v1i1.7764

Zang, J., Dummit, K., Lisker, P., & Sweeney, L. (2020). Who Knows What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps. Technology Science. https://doi.org/10.1038/s41598-020-58172-2

Downloads

Published

2025-03-22

Issue

Section

Articles