WEB PROGRAMMING AND MOBILE DEVELOPMENT: UX/UI SOLUTIONS FOR PROTECTING USERS' PERSONAL DATA

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.30.992

Keywords:

data privacy, UX/UI design, informed consent, Privacy-Embedded User Journey (PEUJ), user trust, personal data protection, web development, mobile development.

Abstract

With the rapid expansion of digital platforms and the centrality of online services in everyday life, the issue of protecting users' personal data has become a critical aspect of human-computer interaction. Traditional approaches that reduce data protection to legal compliance and technical security measures have proven insufficient for ensuring genuine user privacy. This has led to the emergence of systematic UX/UI methodologies designed to integrate data protection principles directly into the user experience. The present study introduces an authorial framework – the Privacy-Embedded User Journey (PEUJ) – which unites contextual consent, proactive nudges, transparent data control, and iterative feedback loops. Experimental validation was conducted on three types of digital services (FinTech application, e-commerce platform, and health & fitness tracker), enabling the measurement of informed consent rates, user trust scores, frequency of privacy settings usage, incidence of excessive data sharing, user retention rates, and a composite Privacy-Usability Index (PUI). The findings reveal that the application of the PEUJ framework systematically increases informed consent by 22–35 percentage points, improves user trust by 18–28%, reduces excessive data sharing by 25–40%, and increases user retention by 8–12 percentage points. Particular attention is devoted to the role of embedding privacy interventions into key interaction points rather than relying on post-factum compliance, which is shown to enhance both user autonomy and business metrics. The study further highlights the potential of employing the Privacy-Usability Index (PUI) as a unified metric for evaluating and comparing privacy-focused UX interventions across domains. These insights underscore the importance of rethinking data protection as an integral element of user experience that ensures both ethical compliance and commercial viability [1, 2].

Downloads

Download data is not yet available.

References

Acquisti, A., Adjerid, I., Balebako, R. (2021). Nudges for privacy and security: Understanding and assisting users’ choices. ACM Computing Surveys, 55(3), 1–42. https://doi.org/10.1145/3485830

Bennett, C., & O'Donnell, K. (2024). User-centered data privacy: A framework for empathetic design. Journal of Usability Studies, 19(2), 88–105.

Cavoukian, A. (2009). Privacy by design: The 7 foundational principles. Ontario: Information and Privacy Commissioner of Ontario.

Degeling, M., Utz, C., & Lentzsch, C. (2023). A comparative analysis of privacy policies and their comprehension in mobile ecosystems. Proceedings on Privacy Enhancing Technologies, 2023(4), 5–22. https://doi.org/10.56553/popets-2023-0123

Google PAIR. (2023). People + AI Guidebook: A/B testing. https://pair.withgoogle.com/guidebook/testing

Habib, H., Colnago, J., & Cranor, L. F. (2022). Towards a unified privacy utility framework for evaluating privacy interfaces. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (pp. 1–15). https://doi.org/10.1145/3491102.3517745

Utz, C., Degeling, M., & Fahl, S. (2021). (Un)informed consent: Studying GDPR consent notices in the field. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (pp. 973–990). https://doi.org/10.1145/3460120.3484756

Zarouali, B., Poels, K., & Ponnet, K. (2022). Contextual integrity and user expectations in privacy interface design: A theoretical framework and experimental test. New Media & Society, 24(1), 156–178. https://doi.org/10.1177/14614448211021115

Tan, H., Sun, J., Wenjia, W., & Zhu, C. (2021). User experience and usability of driving: A bibliometric analysis of 2000–2019. International Journal of Human-Computer Interaction, 37(4), 297–307. https://doi.org/10.1080/10447318.2020.1860516

Dirin, A., Nieminen, M., & Laine, T. H. (2023). Feelings of being for mobile user experience design. International Journal of Human-Computer Interaction, 39(20), 4059–4079. https://doi.org/10.1080/10447318.2022.2108964

Kivijärvi, H., & Pärnänen, K. (2023). Instrumental usability and effective user experience: Interwoven drivers and outcomes of human-computer interaction. International Journal of Human-Computer Interaction, 39(1), 34–51. https://doi.org/10.1080/10447318.2021.2016236

Holden, R. J., Abebe, E., Hill, J. R., Brown, J., Savoy, A., Voida, S., & Kulanthaivel, A. (2022). Human factors engineering and human-computer interaction: Supporting user performance and experience. In Clinical informatics study guide: Text and review (pp. 119–132). https://doi.org/10.1007/978-3-030-93765-2_9

Fan, M., Yang, X., Yu, T., Liao, Q. V., & Zhao, J. (2022). Human-AI collaboration for UX evaluation: Effects of explanation and synchronization. Proceedings of the ACM on Human-Computer Interaction, 6(CSCW1), 1–32. https://doi.org/10.1145/3512943

Paneru, B., Paneru, B., Poudyal, R., & Shah, K. B. (2024). Exploring the nexus of user interface (UI) and user experience (UX) in the context of emerging trends and customer experience, human-computer interaction, applications of artificial intelligence. International Journal of Informatics, Information System and Computer Engineering (INJIISCOM), 5(1), 102–113. https://doi.org/10.34010/injiscom.v5i1.12488

Wang, Y., Leon, P. G., & Schaub, F. (2023). Proactive privacy nudges for mobile app permissions: A large-scale field experiment. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (pp. 1–14). https://doi.org/10.1145/3544548.3580715

Vu, K. P. L., Proctor, R. W., & Hung, Y. H. (2021). Website design and evaluation. In Handbook of human factors and ergonomics (pp. 1016–1036). https://doi.org/10.1002/9781119636113.ch39

Chou, C. M., Shen, T. C., & Shen, C. H. (2022). Influencing factors on students’ learning effectiveness of AI-based technology application: Mediation variable of the human-computer interaction experience. Education and Information Technologies, 27(6), 8723–8750. https://doi.org/10.1007/s10639-021-10866-9

Souza, K. E. S. D., Aviz, I. L. D., Mello, H. D. D., Figueiredo, K., Vellasco, M. M. B. R., Costa, F. A. R., & Seruffo, M. C. D. R. (2022). An evaluation framework for user experience using eye tracking, mouse tracking, keyboard input, and artificial intelligence: A case study. International Journal of Human-Computer Interaction, 38(7), 646–660. https://doi.org/10.1080/10447318.2021.1960092

Moore, R. J., An, S., & Ren, G. J. (2023). The IBM natural conversation framework: A new paradigm for conversational UX design. Human-Computer Interaction, 38(3–4), 168–193. https://doi.org/10.1080/07370024.2022.2081571

Sabukunze, I. D., & Arakaza, A. (2021). User experience analysis on mobile application design using user experience questionnaire. Indonesian Journal of Information Systems, 4(1), 15–26. https://doi.org/10.24002/ijis.v4i1.4646

Nicolescu, L., & Tudorache, M. T. (2022). Human-computer interaction in customer service: The experience with AI chatbots — A systematic literature review. Electronics, 11(10), 1579. https://doi.org/10.3390/electronics11101579

Kostiuk, Y. V., Skladannyi, P. M., Bebeshko, B. T., Khorolska, K. V., Rzaieva, S. L., & Vorokhob, M. V. (2025). Information and communication systems security [Textbook]. Kyiv: Borys Grinchenko Kyiv Metropolitan University.

Kostiuk, Y. V., Skladannyi, P. M., Hulak, H. M., Bebeshko, B. T., Khorolska, K. V., & Rzaieva, S. L. (2025). Information security systems [Textbook]. Kyiv: Borys Grinchenko Kyiv Metropolitan University.

Hulak, H. M., Zhyltsov, O. B., Kyrychok, R. V., Korshun, N. V., & Skladannyi, P. M. (2023). Enterprise information and cyber security [Textbook]. Kyiv: Borys Grinchenko Kyiv Metropolitan University.

Korniiets, V., & Skladannyi, P. (2024). Formation of requirements for the architecture and functions of cybersecurity monitoring systems. Telecommunication and Information Technologies, 4(85), 90–96. https://doi.org/10.31673/2412-4338.2024.040224

Kostiuk, Y., et al. (2025). Models and algorithms for analyzing information risks during the security audit of personal data information system. In 3rd International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (Vol. 3925, pp. 155–171).

Mykhaylova, O., et al. (2024). Person-of-interest detection on mobile forensics data – AI-driven roadmap. In Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS) (Vol. 3654, pp. 239–251).

Mykhaylova, O., et al. (2023). Mobile application as a critical infrastructure cyberattack surface. In Workshop on Cybersecurity Providing in Information and Telecommunication Systems II (CPITS-II) (Vol. 3550, pp. 29–43).

Sadykov, Y., et al. (2021). Technology of location hiding by spoofing the mobile operator IP address. In IEEE International Conference on Information and Telecommunication Technologies and Radio Electronics (pp. 22–25). https://doi.org/10.1109/UkrMiCo52950.2021.9716700

Downloads


Abstract views: 28

Published

2025-10-26

How to Cite

Chitulyan, V., Oleinikov, I., Ananchenko, O., & Dziuba, V. (2025). WEB PROGRAMMING AND MOBILE DEVELOPMENT: UX/UI SOLUTIONS FOR PROTECTING USERS’ PERSONAL DATA. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 2(30), 543–554. https://doi.org/10.28925/2663-4023.2025.30.992