B. Sarma, N. Li, C. Gates, R. Potharaju, C. Nita-rotaru et al., Android permissions: a perspective combining risks and benefits, 17th ACM symposium on access control models and technologies, pp.13-22, 2012.

S. Thurm and Y. Kane, Your Apps Are Watching You, Wall Street Journal, 2010.

N. Papanikolaou, S. Creese, and M. Goldsmith, Refinement checking for privacy policies, Science of Computer Programming, pp.1198-1209, 2012.
DOI : 10.1016/j.scico.2011.07.009

E. U. Directive, EUR-Lex. In: Access to European Union Law, 2017.

A. Westin, Privacy and Freedom, 1967.

J. Ai-anton and A. Reese, Analyzing Web site privacy requirements using a privacy goal taxonomy, IEEE Joint Requirements Engineering Conference, vol.9, pp.23-31, 2001.

C. Jensen, C. Potts, and C. Jensen, Privacy Practices of Internet Users: SelfReport Versus Observed Behavior, International Journal of Human Computer Studies, vol.63, issue.1-2, pp.203-230, 2005.
DOI : 10.1016/j.ijhcs.2005.04.019

N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley et al., Understanding and capturing people's privacy policies in a mobile social networking application. Personal and Ubiquitous Computing, pp.401-412, 2009.
DOI : 10.1007/s00779-008-0214-3

URL : http://www.casos.cs.cmu.edu/publications/papers/2009UnderstandingCapturingPeoples.pdf

R. Cellan-jones, , 2014.

R. Liu, J. Cao, and L. Yang, Smartphone privacy in mobile computing: Issues, methods and systems, Information and Media Technologies, vol.10, issue.2, pp.281-293, 2015.

X. Wei, L. Gomez, I. Neamtiu, and M. Faloutsos, Permission evolution in the Android ecosystem, ACSAC '12 Proceedings of the 28th Annual Computer Security Applications Conference, Florida, pp.31-40, 2012.

M. Grace, W. Zhou, X. Jiang, and A. Sadeghi, Unsafe Exposure Analysis of Mobile In-App Advertisements, 2012.

T. Book, A. Pridgen, and D. Wallach, Longitudinal Analysis of Android Ad Library, 2013.

C. Hoffman, How-To Geek, 2013.

Z. Benenson, F. Gassmann, and L. Reinfelder, Android and iOS users' differences concerning security and privacy, Human Factors in Computing Systems, pp.817-822, 2013.

A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, A survey of mobile malware in the wild, 2011.

N. Seriot, , 2010.

C. Bonnington, First Instance of iOS App Store Malware Detected, 2012.

M. Egele, C. Kruegel, E. Kirda, and G. Vigna, PiOS: Detecting Privacy Leaks in iOS Applications. NDSS, pp.177-183, 2011.

C. Liu and K. P. Arnett, An Examination of Privacy Policies in Fortune 500 Web Sites, American Journal of Business, vol.17, issue.1, pp.13-22, 2002.

D. Wetherall, D. Choffnes, B. Greenstein, S. Han, P. Hornyack et al., Privacy revelations for web and mobile apps. In : HotOS, vol. HotOS XIII, 2011.

B. Van-alsenoy, V. Verdoodt, R. Heyman, E. Wauters, J. Ausloos et al., , 2015.

J. Zang, K. Dummit, J. Graves, P. Lisker, and L. Sweeney, Who Knows What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps, Technology Science, 2015.

A. Sunyaev, T. Dehling, P. Taylor, and K. Mandl, Availability and quality of mobile health app privacy policies. ournal of the, American Medical Informatics Association, vol.22, issue.1, pp.28-33, 2015.

A. I. Antón and J. B. Earp, A requirements taxonomy for reducing Web site privacy vulnerabilities, Requirements Engineering, vol.9, issue.3, pp.169-185, 2004.

S. Rosen, Z. Qian, and Z. M. Mao, Approfiler: a flexible method of exposing privacyrelated behavior in android applicaitons to end users, 32 annual ACM conference on Human factors in computing systems, pp.2347-2356, 2014.

, QSR: What is NVivo?, 2017.

D. Armstrong, A. Gosling, J. Weinman, and T. Marteau, The place of inter-rater reliability in qualitative research: an empirical study, Sociology, vol.31, pp.597-606, 1997.

B. Krishnamurthy and C. E. Wills, On the leakage of personally identifiable information via online social networks, 2nd ACM workshop on Online social networks, pp.7-12, 2009.

P. Schwartz and D. Solove, PII Problem: Privacy and a New Concept of Personally Identifiable Information, NYUL Rev, vol.86, 1814.

K. Harris, Privacy on the go, 2013.

, CalOPPA: California Online Privacy Protection Act (CalOPPA), 2015.

. Termsfeed, Privacy Policies are Mandatory by Law, 2017.

E. U. Directive, EUR-Lex. In: Access to European Union Law, pp.31995-32041, 2017.

A. Sunyaev, T. Dehling, P. L. Taylor, and K. D. Mandl, Availability and quality of mobile health app privacy policies, Journal of the American Medical Informatics Association, vol.22, issue.e1, pp.28-33, 2014.

Y. Montjoye, L. Radaelli, V. Singh, A. , and P. , Unique in the shopping mall: On the reidentifiability of credit card metadata, Science, vol.347, issue.6221, 2015.

B. Malin, Betrayed by my shadow: Learning data identify via trail matching, Journal of Privacy Technology, 2005.

E. J. Janger and P. M. Schwartz, The Gramm-Leach-Bliley Act, Information privacy and the limits of default rules, Minnesota Law Review, vol.86, 2002.

L. Yue, User control of personal information concerning mobile-app: Notice and consent?, Computer Law & Security Review, vol.30, issue.5, pp.521-529, 2014.

J. B. Earp, M. Vail, and A. I. Anton, Privacy policy representation in web-based healthcare, 40th Annual Hawaii International Conference, p.138, 2007.

L. Cranor, P. G. Kelley, L. Cesca, and J. Bresee, Standardizing privacy notices: an online study of the nutrition label approach, SIGCHI Conference, pp.1573-1582, 2010.

S. Kununka, N. Mehandjiev, P. Sampaio, and K. Vassilopoulou, End User Comprehension of Privacy Policy, International Symposium on End User Development, pp.135-149, 2017.

T. E. Wei, A. B. Jeng, H. M. Lee, C. H. Chen, and C. W. Tien, Android privacy. Machine Learning and Cybernetics (ICMLC), pp.1830-1837, 2012.

B. Van-alsenoy and V. , , 2015.

P. M. Schwartz and D. Solove, Notice and Choice, The Second NPLAN/BMSG Meeting on Digital Media and Marketing to Children, 2009.

A. Sunyaev, T. Dehling, P. Taylor, and K. Mandl, Availability and quality of mobile health app privacy policies, Journal of the American Medical Informatics Association, vol.22, issue.1, pp.22-33, 2014.