“…First, evaluation of metainformation regarding information privacy practices, such as privacy notices or user interface characteristics [16,17]. Second, manual assessment conducted on technical aspects of apps, such as analyzing the source code or monitoring data connections [18,19,1,9,20,21,22,23]. Research on automated breach of confidentiality risk assessment is sparse.…”