Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems 2023
DOI: 10.1145/3544548.3580637
|View full text |Cite
|
Sign up to set email alerts
|

Investigating Deceptive Design in GDPR’s Legitimate Interest

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 33 publications
0
0
0
Order By: Relevance
“…Previous research has extensively examined the compliance landscape of applications under GDPR and identified common privacy concerns, including complex permission revocation procedures, obscure privacy language, and inadequate data handling. Building upon this body of work, our study explores similar issues prevalent in online platforms within the Chinese context, including inadequate consent revocation mechanisms, deficiencies in implementing the right to copy and transfer data, and shortcomings in obtaining separate individual consent [5,18,34]. While some common privacy concerns align with prior studies, our research also identified unique challenges specific to Chinese platforms, such as the lack of risk assessment and user notification, calling for tailored approaches to enhance privacy protection.…”
Section: Discussionmentioning
confidence: 75%
See 1 more Smart Citation
“…Previous research has extensively examined the compliance landscape of applications under GDPR and identified common privacy concerns, including complex permission revocation procedures, obscure privacy language, and inadequate data handling. Building upon this body of work, our study explores similar issues prevalent in online platforms within the Chinese context, including inadequate consent revocation mechanisms, deficiencies in implementing the right to copy and transfer data, and shortcomings in obtaining separate individual consent [5,18,34]. While some common privacy concerns align with prior studies, our research also identified unique challenges specific to Chinese platforms, such as the lack of risk assessment and user notification, calling for tailored approaches to enhance privacy protection.…”
Section: Discussionmentioning
confidence: 75%
“…For example, Mohan et al found several general GDPR non-compliance activities that occurred on large-scale cloud services when analyzing the privacy policies of cloud services after GDPR was published [43]. Moreover, Kyi et al focus on the ambiguous design and description in privacy policies, they summarized the deceptive strategies used in privacy notices, such as hiding legitimate privacy information at the end of privacy policies, using complicated procedures to revoke one's permission after it had been granted for access by the data processor, and the use of linguistic tricks when writing privacy policies, such as providing an implicit definition of legitimate interests to users or even do not give any specific explanation [34]. They also found that non-compliant platforms had ambiguous data processing and sharing rules, mentioned a few explicit durations that they would maintain users' personal information, and used inappropriate methods to alert users about privacy policy updates, thus providing users with little power to control their data.…”
Section: Compliance With Gdprmentioning
confidence: 99%
“…One of these topics is "legitimate interests," which is one of the six legal bases of data collection and processing in Article 6 GDPR. What constitutes "legitimate interest" under the GDPR still requires interpretation by European courts and, consequently, still is the subject of recent research about deceptive design and potentially unfaithful data practices [36] five years after the enforcement of the GDPR [40].…”
Section: Topic Changes Over Timementioning
confidence: 99%