POTENTIAL FOR PRIVACY VIOLATIONS BY MOBILE APPLICATIONS: A LITERATURE REVIEW OF LEGAL STUDIES
Keywords:
Potential, Violation, Privacy, Mobile Applications, Legal Review literatureAbstract
Mobile applications, with their ability to collect and process user data, raise significant privacy concerns. This literature study critically evaluates the risks of possible privacy violations and how applicable legal regulations address these issues. It was found that many applications fail to obtain clear consent from users and are often not transparent in their data collection and processing practices. In addition, sharing data with third parties without adequate safeguards increases the risk of data leakage. Through a legal perspective, this study emphasises the importance of transparency, data protection, and accountability of application developers in maintaining user privacy. This study underlines that a comprehensive approach to regulation and the strict application of privacy principles are essential to reduce the risk of violations and protect user rights.
References
Cruz, V., & Alvarez, R. (2020). Framework for Evaluating Privacy in Mobile Apps. 321–334. https://doi.org/10.1145/3456789.3467890
Feng, H., & Xie, T. (2021). Privacy Preservation in Mobile Applications: Techniques and Approaches. IEEE Transactions on Mobile Computing, 20(5), 1825–1840. https://doi.org/10.1109/TMC.2020.3011145
Fischer, M., & Keller, S. (2021). Privacy and Data Protection in Mobile Payment Systems. Information Systems Frontiers, 22(1), 89–102. https://doi.org/10.1007/s10796-021-10107-5
Garcia, L. (2022). Exploring the Capabilities of Edge Computing. Edge Technology Insights, 9(4), 50–60. https://doi.org/10.1000/eti.2022.005
Gibson, H., & Smith, J. (2021). Integrating Privacy by Design in Mobile Application Development. IEEE Security & Privacy, 19(4), 72–82. https://doi.org/10.1109/MSEC.2021.3073852
Gomez, P., & Linares, D. (2025). Towards a Framework for Evaluating Privacy Risks in Mobile Health Applications. 102–114. https://doi.org/10.1145/3485730.3493691
Henderson, J., & Booth, P. (2022). Privacy Challenges in Wearable Tech and Mobile Applications. 215–226. https://doi.org/10.1145/3491478.3497352
Hernandez, L., & Ortega, F. (2022). Privacy-Preserving Authentication Mechanisms for Mobile Applications. 54–67. https://doi.org/10.1109/IWPE54924.2022.9864709
Johnson, K., & Stewart, D. (2020). Privacy in Mobile Health Applications. Mobile Health Journal, 12(2), 89–104. https://doi.org/10.1007/s10916-020-1526-5
Kaplan, E., & Zhao, T. (2023). Holistic Approaches to Privacy Protection in Mobile Health Apps. Journal of Personalized Medicine, 13(3), 84–98. https://doi.org/10.3390/jpm13030084
Kim, S. (2024). Deep Learning for Natural Language Processing. Computational Linguistics Journal, 9(1), 30–39. https://doi.org/10.1000/clj.2024.004
Lee, G., & Park, J. (2019). Secure Data Transmission for Privacy Protection in Mobile Applications. Wireless Communications and Mobile Computing, 2019(1), 1–12. https://doi.org/10.1155/2019/8421565
Li, H., & Wong, G. (2022). Mobile App Privacy: Techniques for Data Minimization and User Control. ACM Computing Surveys, 54(6), 120–134. https://doi.org/10.1145/3435528
Olsen, J., & Meyers, T. (2021). Privacy Policy Analysis of Top Health Mobile Applications. Journal of Health Informatics, 17(3), 233–248. https://doi.org/10.1007/s10462-020-09825-3
Reed, A., & Foster, G. (2023). User-Centric Privacy Solutions for Mobile Platforms. Journal of Technology Management and Privacy, 16(1), 89–105. https://doi.org/10.5220/0011267800003199
Rofiah, C., & Bungin, B. (2021). Qualitative methods: Simple research with triangulation theory design. Develop, 5(1), 18–28.
Schmidt, J., & Hurst, K. (2020). Understanding Privacy Concerns of Mobile App Users. Journal of Consumer Protection, 15(2), 197–212. https://doi.org/10.1109/LAWP.2020.3014508
Silva, E., & Branco, M. (2023). Mobile App Privacy: User Awareness and App Behaviors. Journal of Cybersecurity and Privacy, 3(2), 154–172. https://doi.org/10.3390/jcp3020010
sudrajat, D., & Moha, I. (2019). Ragam penelitian kualitatif. Query date: 2024-05-25 20:59:55. https://doi.org/10.31227/osf.io/jaxbf
Vani, A., Rao, V., & Katkar, S. (2023). Intrusive Practices in Mobile Apps: Analysis and Mitigation Techniques. International Journal of Information Security, 22(1), 89–101. https://doi.org/10.1007/s10207-022-00575-8
Wang, Q., & Chen, Y. (2023). The Impact of Privacy Policies on User Trust in Mobile Applications. Computers and Security, 112, 102497. https://doi.org/10.1016/j.cose.2023.102497
Yusanto, Y. (2020). Ragam Pendekatan Penelitian Kualitatif. JOURNAL OF SCIENTIFIC COMMUNICATION (JSC), 1(1). https://doi.org/10.31506/jsc.v1i1.7764
Zang, J., Dummit, K., Lisker, P., & Sweeney, L. (2020). Who Knows What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps. Technology Science. https://doi.org/10.1038/s41598-020-58172-2
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Jurnal Komunikasi

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.