Third-Party Apps on Facebook: Privacy and the Illusion of Control

被引:0
|
作者
Wang, Na [1 ]
Xu, Heng [1 ]
Grossklags, Jens [1 ]
机构
[1] Penn State Univ, University Pk, PA 16802 USA
基金
美国国家科学基金会;
关键词
Privacy; Third-Party Applications (Apps); Control; and Online Social Networks; Notice and Consent;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Little research examines the privacy threats associated with the use of third-party apps on Facebook. To address this gap in the literature, we systematically study third-party apps' current practices for privacy notice and consent by: i) collecting data from the 1800 most popular Facebook apps to record their data collection practices concerning users and their friends, and ii) developing our own Facebook app to conduct a number of tests to identify problems that exist in the current design of authentication dialogs for third-party apps on Facebook. To address these problems, we propose two new interface designs for third-party apps' authentication dialogs to: i) increase user control of apps' data access and restrict apps' publishing ability during the process of adding them to users' profiles, and ii) alert users when their global privacy settings on Facebook are violated by apps. This research provides both conceptual and empirical insights in terms of design recommendations to address privacy concerns toward third-party apps on Facebook.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] A look into user privacy and third-party applications in Facebook
    Seng, Sovantharith
    Al-Ameen, Mahdi Nasrullah
    Wright, Matthew
    [J]. INFORMATION AND COMPUTER SECURITY, 2021, 29 (02) : 283 - 313
  • [2] Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps
    Zhao, Kaifa
    Zhan, Xian
    Yu, Le
    Zhou, Shiyao
    Zhou, Hao
    Luo, Xiapu
    Wang, Haoyu
    Liu, Yepang
    [J]. 2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, 2023, : 1583 - 1595
  • [3] Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps
    Zhao, Kaifa
    Zhan, Xian
    Yu, Le
    Zhou, Shiyao
    Zhou, Hao
    Luo, Xiapu
    Wang, Haoyu
    Liu, Yepang
    [J]. Proceedings - International Conference on Software Engineering, 2023, : 1583 - 1595
  • [4] Understanding and Mitigating Privacy Leaks from Third-Party Smart Speaker Apps
    Alrumayh, Abrar S.
    Lehman, Sarah M.
    Tan, Chiu C.
    [J]. 2021 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2021, : 263 - 271
  • [5] LibKit: Detecting Third-Party Libraries in iOS Apps
    Dominguez-Alvarez, Daniel
    de la Cruz, Alejandro
    Gorla, Alessandra
    Caballero, Juan
    [J]. PROCEEDINGS OF THE 31ST ACM JOINT MEETING EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, ESEC/FSE 2023, 2023, : 1407 - 1418
  • [6] Third-party flow control
    Bansal, D
    Ward, PAS
    [J]. PROCEEDINGS OF THE 3RD ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, 2005, : 118 - 124
  • [7] Privacy-Preserving Multi-Party Access Control for Third-Party UAV Services
    George, Dominik Roy
    Sciancalepore, Savio
    Zannone, Nicola
    [J]. PROCEEDINGS OF THE 28TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2023, 2023, : 19 - 30
  • [8] A First Look at Android Apps' Third-Party Resources Loading
    Qayyum, Hina
    Salman, Muhammad
    Sentana, I. Wayan Budi
    Duc Linh Giang Nguyen
    Ikram, Muhammad
    Tyson, Gareth
    Kaafar, Mohamed Ali
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 : 193 - 213
  • [9] Do Developers Update Third-Party Libraries in Mobile Apps?
    Salza, Pasquale
    Palomba, Fabio
    Di Nucci, Dario
    D'Uva, Cosmo
    De Lucia, Andrea
    Ferrucci, Filomena
    [J]. 2018 IEEE/ACM 26TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC 2018), 2018, : 255 - 265
  • [10] Brahmastra: Driving Apps to Test the Security of Third-Party Components
    Bhoraskar, Ravi
    Han, Seungyeop
    Jeon, Jinseong
    Azim, Tanzirul
    Chen, Shuo
    Jung, Jaeyeon
    Nath, Suman
    Wang, Rui
    Wetherall, David
    [J]. PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, 2014, : 1021 - 1036