A Two-Pillar Approach to Analyze the Privacy Policies and Resource Access Behaviors of Mobile Augmented Reality Applications

David Harborth*, Majid Hatamian, Welderufael Tesfay, Kai Rannenberg

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Citations (Scopus)
3 Downloads (Pure)

Abstract

Augmented reality (AR) gained much public attention since the success of Pokémon Go in 2016. Technology companies like Apple or Google are currently focusing primarily on mobile AR (MAR) technologies, i.e. applications on mobile devices, like smartphones or tablets. Associated privacy issues have to be investigated early to foster market adoption. This is especially relevant since past research found several threats associated with the use of smartphone applications. Thus, we investigate two of the main privacy risks for MAR application users based on a sample of 19 of the most downloaded MAR applications for Android. First, we assess threats arising from bad privacy policies based on a machine-learning approach. Second, we investigate which smartphone data resources are accessed by the MAR applications. Third, we combine both approaches to evaluate whether privacy policies cover certain data accesses or not. We provide theoretical and practical implications and recommendations based on our results.
Original languageEnglish
Title of host publicationProceedings of the 52nd Hawaii International Conference on System Sciences
EditorsTung X. Bui
Place of PublicationHonolulu, HI
PublisherUniversity of Hawai'i Press
Pages5029-5038
Number of pages10
ISBN (Electronic)9780998133126
DOIs
Publication statusPublished - 8 Jan 2019
Externally publishedYes
Event52nd Hawaii International Conference on System Sciences - Honolulu, United States
Duration: 8 Jan 2019 → …
https://scholarspace.manoa.hawaii.edu/handle/10125/59440

Conference

Conference52nd Hawaii International Conference on System Sciences
Abbreviated titleHICSS
CountryUnited States
CityHonolulu
Period8/01/19 → …
Internet address

Fingerprint

Dive into the research topics of 'A Two-Pillar Approach to Analyze the Privacy Policies and Resource Access Behaviors of Mobile Augmented Reality Applications'. Together they form a unique fingerprint.

Cite this