WEB PROGRAMMING AND MOBILE DEVELOPMENT: UX/UI SOLUTIONS FOR PROTECTING USERS' PERSONAL DATA
DOI:
https://doi.org/10.28925/2663-4023.2025.30.992Keywords:
data privacy, UX/UI design, informed consent, Privacy-Embedded User Journey (PEUJ), user trust, personal data protection, web development, mobile development.Abstract
With the rapid expansion of digital platforms and the centrality of online services in everyday life, the issue of protecting users' personal data has become a critical aspect of human-computer interaction. Traditional approaches that reduce data protection to legal compliance and technical security measures have proven insufficient for ensuring genuine user privacy. This has led to the emergence of systematic UX/UI methodologies designed to integrate data protection principles directly into the user experience. The present study introduces an authorial framework – the Privacy-Embedded User Journey (PEUJ) – which unites contextual consent, proactive nudges, transparent data control, and iterative feedback loops. Experimental validation was conducted on three types of digital services (FinTech application, e-commerce platform, and health & fitness tracker), enabling the measurement of informed consent rates, user trust scores, frequency of privacy settings usage, incidence of excessive data sharing, user retention rates, and a composite Privacy-Usability Index (PUI). The findings reveal that the application of the PEUJ framework systematically increases informed consent by 22–35 percentage points, improves user trust by 18–28%, reduces excessive data sharing by 25–40%, and increases user retention by 8–12 percentage points. Particular attention is devoted to the role of embedding privacy interventions into key interaction points rather than relying on post-factum compliance, which is shown to enhance both user autonomy and business metrics. The study further highlights the potential of employing the Privacy-Usability Index (PUI) as a unified metric for evaluating and comparing privacy-focused UX interventions across domains. These insights underscore the importance of rethinking data protection as an integral element of user experience that ensures both ethical compliance and commercial viability [1, 2].
Downloads
References
Acquisti, A., Adjerid, I., Balebako, R. (2021). Nudges for privacy and security: Understanding and assisting users’ choices. ACM Computing Surveys, 55(3), 1–42. https://doi.org/10.1145/3485830
Bennett, C., & O'Donnell, K. (2024). User-centered data privacy: A framework for empathetic design. Journal of Usability Studies, 19(2), 88–105.
Cavoukian, A. (2009). Privacy by design: The 7 foundational principles. Ontario: Information and Privacy Commissioner of Ontario.
Degeling, M., Utz, C., & Lentzsch, C. (2023). A comparative analysis of privacy policies and their comprehension in mobile ecosystems. Proceedings on Privacy Enhancing Technologies, 2023(4), 5–22. https://doi.org/10.56553/popets-2023-0123
Google PAIR. (2023). People + AI Guidebook: A/B testing. https://pair.withgoogle.com/guidebook/testing
Habib, H., Colnago, J., & Cranor, L. F. (2022). Towards a unified privacy utility framework for evaluating privacy interfaces. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (pp. 1–15). https://doi.org/10.1145/3491102.3517745
Utz, C., Degeling, M., & Fahl, S. (2021). (Un)informed consent: Studying GDPR consent notices in the field. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (pp. 973–990). https://doi.org/10.1145/3460120.3484756
Zarouali, B., Poels, K., & Ponnet, K. (2022). Contextual integrity and user expectations in privacy interface design: A theoretical framework and experimental test. New Media & Society, 24(1), 156–178. https://doi.org/10.1177/14614448211021115
Tan, H., Sun, J., Wenjia, W., & Zhu, C. (2021). User experience and usability of driving: A bibliometric analysis of 2000–2019. International Journal of Human-Computer Interaction, 37(4), 297–307. https://doi.org/10.1080/10447318.2020.1860516
Dirin, A., Nieminen, M., & Laine, T. H. (2023). Feelings of being for mobile user experience design. International Journal of Human-Computer Interaction, 39(20), 4059–4079. https://doi.org/10.1080/10447318.2022.2108964
Kivijärvi, H., & Pärnänen, K. (2023). Instrumental usability and effective user experience: Interwoven drivers and outcomes of human-computer interaction. International Journal of Human-Computer Interaction, 39(1), 34–51. https://doi.org/10.1080/10447318.2021.2016236
Holden, R. J., Abebe, E., Hill, J. R., Brown, J., Savoy, A., Voida, S., & Kulanthaivel, A. (2022). Human factors engineering and human-computer interaction: Supporting user performance and experience. In Clinical informatics study guide: Text and review (pp. 119–132). https://doi.org/10.1007/978-3-030-93765-2_9
Fan, M., Yang, X., Yu, T., Liao, Q. V., & Zhao, J. (2022). Human-AI collaboration for UX evaluation: Effects of explanation and synchronization. Proceedings of the ACM on Human-Computer Interaction, 6(CSCW1), 1–32. https://doi.org/10.1145/3512943
Paneru, B., Paneru, B., Poudyal, R., & Shah, K. B. (2024). Exploring the nexus of user interface (UI) and user experience (UX) in the context of emerging trends and customer experience, human-computer interaction, applications of artificial intelligence. International Journal of Informatics, Information System and Computer Engineering (INJIISCOM), 5(1), 102–113. https://doi.org/10.34010/injiscom.v5i1.12488
Wang, Y., Leon, P. G., & Schaub, F. (2023). Proactive privacy nudges for mobile app permissions: A large-scale field experiment. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (pp. 1–14). https://doi.org/10.1145/3544548.3580715
Vu, K. P. L., Proctor, R. W., & Hung, Y. H. (2021). Website design and evaluation. In Handbook of human factors and ergonomics (pp. 1016–1036). https://doi.org/10.1002/9781119636113.ch39
Chou, C. M., Shen, T. C., & Shen, C. H. (2022). Influencing factors on students’ learning effectiveness of AI-based technology application: Mediation variable of the human-computer interaction experience. Education and Information Technologies, 27(6), 8723–8750. https://doi.org/10.1007/s10639-021-10866-9
Souza, K. E. S. D., Aviz, I. L. D., Mello, H. D. D., Figueiredo, K., Vellasco, M. M. B. R., Costa, F. A. R., & Seruffo, M. C. D. R. (2022). An evaluation framework for user experience using eye tracking, mouse tracking, keyboard input, and artificial intelligence: A case study. International Journal of Human-Computer Interaction, 38(7), 646–660. https://doi.org/10.1080/10447318.2021.1960092
Moore, R. J., An, S., & Ren, G. J. (2023). The IBM natural conversation framework: A new paradigm for conversational UX design. Human-Computer Interaction, 38(3–4), 168–193. https://doi.org/10.1080/07370024.2022.2081571
Sabukunze, I. D., & Arakaza, A. (2021). User experience analysis on mobile application design using user experience questionnaire. Indonesian Journal of Information Systems, 4(1), 15–26. https://doi.org/10.24002/ijis.v4i1.4646
Nicolescu, L., & Tudorache, M. T. (2022). Human-computer interaction in customer service: The experience with AI chatbots — A systematic literature review. Electronics, 11(10), 1579. https://doi.org/10.3390/electronics11101579
Kostiuk, Y. V., Skladannyi, P. M., Bebeshko, B. T., Khorolska, K. V., Rzaieva, S. L., & Vorokhob, M. V. (2025). Information and communication systems security [Textbook]. Kyiv: Borys Grinchenko Kyiv Metropolitan University.
Kostiuk, Y. V., Skladannyi, P. M., Hulak, H. M., Bebeshko, B. T., Khorolska, K. V., & Rzaieva, S. L. (2025). Information security systems [Textbook]. Kyiv: Borys Grinchenko Kyiv Metropolitan University.
Hulak, H. M., Zhyltsov, O. B., Kyrychok, R. V., Korshun, N. V., & Skladannyi, P. M. (2023). Enterprise information and cyber security [Textbook]. Kyiv: Borys Grinchenko Kyiv Metropolitan University.
Korniiets, V., & Skladannyi, P. (2024). Formation of requirements for the architecture and functions of cybersecurity monitoring systems. Telecommunication and Information Technologies, 4(85), 90–96. https://doi.org/10.31673/2412-4338.2024.040224
Kostiuk, Y., et al. (2025). Models and algorithms for analyzing information risks during the security audit of personal data information system. In 3rd International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (Vol. 3925, pp. 155–171).
Mykhaylova, O., et al. (2024). Person-of-interest detection on mobile forensics data – AI-driven roadmap. In Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS) (Vol. 3654, pp. 239–251).
Mykhaylova, O., et al. (2023). Mobile application as a critical infrastructure cyberattack surface. In Workshop on Cybersecurity Providing in Information and Telecommunication Systems II (CPITS-II) (Vol. 3550, pp. 29–43).
Sadykov, Y., et al. (2021). Technology of location hiding by spoofing the mobile operator IP address. In IEEE International Conference on Information and Telecommunication Technologies and Radio Electronics (pp. 22–25). https://doi.org/10.1109/UkrMiCo52950.2021.9716700
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Вадим Читулян, Іван Олейніков, Олексій Ананченко, Вадим Дзюба

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.