ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Major Study Settles the Debate Between Apps vs. Websites

Major Study Settles the Debate Between Apps vs. Websites

When it comes to your most-used solution, is the mobile application a more secure choice in terms of user privacy, or does the website offer superior protection against leaked information? Researchers from Northeastern University sought to answer this question in a recent study comparing the app versions of programs against their web-based counterpart on Android and iOS devices.

Selecting a group of 50 of the most popular free services online with equal functionality in both the app and the website, the researchers compared the data leakage of information that could be used to identify a user from either platform. Being sure to sample from a variety of industry categories--including business, news, shopping, music, and even weather--the team would log in as if they were a regular user before tracking how their information is shared by the site to advertisers and data analytics companies.

So, between mobile apps and web-based services, which leaks more of a user’s information? According to research team member and assistant professor David Choffnes, that depends.

Choffnes stated that the team expected applications would leak more information by their more direct access to it. While their findings do support that hypothesis somewhat, the margin was much closer than they expected. In 40 percent of their tested cases, the website version of a service or function would share a greater variety of information with outside parties than the apps would.

The type of information shared also varied based on the platform a user chose. Websites, for example, would share the user’s name and location, while apps were far more likely to share a device’s unique ID number. Together, the app and website could collect a fairly comprehensive profile on the user, much to the surprise of the research team.

While there are legitimate reasons for these services to share out their information, the research team is concerned that the users are unaware of where their personal information is going, as many believe that their information is being held solely by the service they provide it to. However, the team hopes to spread awareness of credential and information sharing, and has even provided an online report of what information is leaked by particular apps, as well as an online tool to determine which method of accessing a service, the app or the web page, is the more secure option.

Information is an incredibly valuable and sensitive asset to a business, so it is best to know just where your information is going. For more information about how our data management services can help your business, give us a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 06 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Ransomware Data Backup communications Smartphone Upgrade Small Business Smartphones Microsoft Office Network Mobile Devices Data Recovery Communication Managed IT Services Productivity Quick Tips Social Media Users VoIP Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Passwords Holiday Disaster Recovery Covid-19 IT Support Browser Apps Windows 10 Managed Service Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Remote Work Internet of Things Data Management Saving Money Operating System Government Windows Artificial Intelligence Managed IT services Workplace Strategy Gadgets Networking Business Technology App Virtualization Blockchain Spam WiFi Server Information Remote Bandwidth Encryption Mobile Device Management Gmail Apple Office Information Technology Two-factor Authentication Office 365 Employee/Employer Relationship Budget History Health Big Data Analytics Conferencing Access Control Data Security Wi-Fi Cybercrime BDR Voice over Internet Protocol Cost Management IT Management Help Desk Hacking Training Remote Computing Document Management Hacker Save Money Patch Management Vendor Compliance Remote Monitoring Employer-Employee Relationship Retail Mobile Office Alert Managed Services Hiring/Firing Legal Data loss Outlook Password Data storage Money Customer Service Unified Threat Management Firewall Applications Augmented Reality Project Management Word BYOD Search... Vulnerabilities Computing Best Practice IBM Vendor Management Website Hard Drive Remote Workers The Internet of Things Twitter Google Maps Windows 7 Free Resource YouTube Scam User Law Enforcement End of Support How To Printer Laptop VPN Update Chrome Travel Virtual Reality Sports Social Engineering Social Data Breach Cryptocurrency Paperless Office SaaS DDoS Mobile Computing Antivirus Black Market Cleaning Maintenance Marketing iPhone Robot Running Cable Education Cortana Windows 11 Content Filtering Monitoring Storage Websites Healthcare Mobility Router Meetings Saving Time Chromebook Software as a Service Drones Data Protection Automobile Managed Services Provider Computers Bitcoin Virtual Private Network How To Telephone HIPAA Microchip Current Events Flexibility Wireless Technology Excel Solutions eWaste Tech Terms Hack Identity Theft Integration Downtime Images 101 Notifications Managed IT Digital Display Unified Communications Safety Virtual Assistant Google Docs Bluetooth Taxes Virtual Desktop PowerPoint Experience Distributed Denial of Service Employees Avoiding Downtime Administration Office Tips Memory Private Cloud Presentation Holidays Specifications Processor Physical Security IT Consultant Disaster Cooperation Politics Video Conferencing Machine Learning Settings Customer Relationship Management Co-Managed IT Virtual Machines Start Menu Entertainment Lithium-ion battery Computer Repair Solid State Drive Downloads Multi-factor Authentication Computer Care Professional Services Vulnerability Processors Securty Wireless Headphones Memes Tablets Microsoft Excel Workplace Monitors Business Cards Visible Light Communication Domains Tech Human Resources Reading Going Green Net Neutrality Google Calendar Error Financial Data Windows 8 Supercomputer Troubleshooting Bookmark Risk Management Virus IT Scams Download Displays Piracy Advertising Motion Sickness Term Google Apps Relocation Comparison Telework Work/Life Balance Google Drive HTML Tech Support Microsoft 365 Cables Public Speaking Browsers Smartwatch Nanotechnology Communitications Upload Procurement Corporate Profile Software License Streaming Media Google Play Knowledge In Internet of Things Television Keyboard Social Network FinTech Telephony Employer Employee Relationship Point of Sale Business Owner Hard Drives Data Analysis CES Hacks Screen Reader IT Assessment Network Congestion Cabling Trends Supply Chain Management Writing Tablet Mobile Technology Value G Suite Security Cameras Reliable Computing intranet Mouse Shortcut Customer Resource management Organization VoIP Devices Cyber security Tracking Shortcuts Wireless Tip of the week Heating/Cooling Fileless Malware Environment Smart Devices Gamification Remote Working Company Culture Web Server Windows XP Scalability Social Networking Administrator SharePoint Telephone System AI Text Messaging Regulations Trend Micro Proactive IT Digital Payment Be Proactive Transportation Inbound Marketing Directions Digital Security Cameras Bring Your Own Device Backup and Disaster Recovery Electronic Health Records Worker Content Access Desktop Wasting Time Electronic Medical Records Time Management Accountants eCommerce Music Public Cloud Modem Workplace Strategies Videos Database Surveillance Spyware Managing Costs Electronic Payment Audit Staffing Botnet Health IT Equifax File Sharing SSID Hard Drive Disposal Employer/Employee Relationships IP Address Media Rental Service Redundancy Tactics Development Micrsooft Username Flash Cache Virtual Machine Phone System Reviews Telephone Systems Unified Threat Management Startup Optimization Business Growth Workers Freedom of Information Smart Technology email scam Teamwork Navigation 2FA Addiction Printing Data Storage Mobile Security Hypervisor CCTV Recovery Competition User Tip Shopping Banking Touchscreen Legislation Google Wallet News Medical IT Deep Learning SQL Server Computer Malfunction Computer Accessories Evernote Paperless Messenger Emergency Network Management Entrepreneur PCI DSS Vendor Mangement Licensing LiFi Documents Application Proxy Server Gig Economy Business Metrics Emails Humor Hosted Solution Samsung Fake News Supply Chain Uninterrupted Power Supply Computing Infrastructure Azure Webcam Business Communications Books Business Intelligence Service Level Agreement Internet Service Provider Management Regulations Compliance Language Business Mangement Device security Managed IT Service Society

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?