1. bookTom 27 (2022): Zeszyt 1 (June 2022)
Informacje o czasopiśmie
License
Format
Czasopismo
eISSN
2255-8691
Pierwsze wydanie
08 Nov 2012
Częstotliwość wydawania
2 razy w roku
Języki
Angielski
Otwarty dostęp

Internet User Trackers and Where to Find Them

Data publikacji: 23 Aug 2022
Tom & Zeszyt: Tom 27 (2022) - Zeszyt 1 (June 2022)
Zakres stron: 75 - 82
Informacje o czasopiśmie
License
Format
Czasopismo
eISSN
2255-8691
Pierwsze wydanie
08 Nov 2012
Częstotliwość wydawania
2 razy w roku
Języki
Angielski

[1] A. Gutmann, “Online advertising revenue in the United States from 2000 to 2020,” 2020. [Online]. Available: https://www.statista.com/statistics/183816/us-online-advertising-revenue-since-2000/. Accessed on: Jan. 02, 2022. Search in Google Scholar

[2] “Total number of Websites.” [Online]. Available: https://www.internetlivestats.com/total-number-of-websites/#trend. Accessed on: Jan. 02, 2022. Search in Google Scholar

[3] G. Dautovic, “The 45 most important advertising statistics of 2020,” 2020. [Online]. Available: https://web.archive.org/web/20201126090706/ https://www.smallbizgenius.net/by-the-numbers/advertising-statistics/. Accessed on: Jul. 09, 2022. Search in Google Scholar

[4] J. Johnson, “Daily internet usage per capita worldwide 2011–2021, by device,” Jan. 27, 2021. [Online]. Available: https://www.statista.com/statistics/319732/daily-time-spent-online-device/. Accessed on: Jul. 09, 2022. Search in Google Scholar

[5] G. Broussard, “How advertising frequency can work to build online advertising effectiveness,” International Journal of Market Research, vol. 42, no. 4, 2000. https://doi.org/10.1177/147078530004200406 Search in Google Scholar

[6] H. Beales, “The value of behavioural targeting,” Director, pp. 1–23, 2010. [Online]. Available: http://www.socialized.fr/wp-content/uploads/2010/08/beales-etude-sur-le-ciblage-comportementalsur-internet-ppc4bible.pdf Search in Google Scholar

[7] B. Ur, P. G. Leon, L. F. Cranor, R. Shay, and Y. Wang, “Smart, useful, scary, creepy,” in Proceedings of the Eighth Symposium on Usable Privacy and Security – SOUPS’12, Jul. 2012, Art no. 4, pp. 1–15. https://doi.org/10.1145/2335356.2335362 Search in Google Scholar

[8] T. Dehling, Y. Zhang, and A. Sunyaev, “Consumer perceptions of online behavioral advertising,” in Proceedings – 21st IEEE Conference on Business Informatics, CBI 2019, vol. 1, Moscow, Russia, Aug. 2019, pp. 345–354. https://doi.org/10.1109/CBI.2019.00046 Search in Google Scholar

[9] J. Estrada-Jiménez, J. Parra-Arnau, A. Rodríguez-Hoyos, and J. Forné, “Online advertising: Analysis of privacy threats and protection approaches,” Computer Communications, vol. 100, pp. 32–51, Mar. 2017. https://doi.org/10.1016/j.comcom.2016.12.016 Search in Google Scholar

[10] J. W. Woensdregt, H. M. Al-Khateeb, G. Epiphaniou, and H. Jahankhani, “AdPExT: Designing a tool to assess information gleaned from browsers by online advertising platforms,” in Proceedings of 12th International Conference on Global Security, Safety and Sustainability, ICGS3 2019, London, UK, Apr. 2019. https://doi.org/10.1109/ICGS3.2019.8688328 Search in Google Scholar

[11] S. Yuan, J. Wang, and X. Zhao, “Real-time bidding for online advertising,” in Proceedings of the Seventh International Workshop on Data Mining for Online Advertising – ADKDD’13, Aug. 2013, Art no. 3, pp. 1–8. https://doi.org/10.1145/2501040.2501980 Search in Google Scholar

[12] J. Yan, N. Liu, G. Wang, W. Zhang, Y. Jiang, and Z. Chen, “How much can behavioral targeting help online advertising?” in Proceedings of the 18th international conference on World wide web – WWW’09, Apr. 2009, pp. 261–270. https://doi.org/10.1145/1526709.1526745 Search in Google Scholar

[13] X. Wu, J. Yan, N. Liu, S. Yan, Y. Chen, and Z. Chen, “Probabilistic latent semantic user segmentation for behavioral targeted advertising,” in Proceedings of the Third International Workshop on Data Mining and Audience Intelligence for Advertising – ADKDD’09, Jun. 2009, pp. 10–17. https://doi.org/10.1145/1592748.1592751 Search in Google Scholar

[14] F. Provost, B. Dalessandro, and R. Hook, “Audience selection for on-line brand advertising: Privacy-friendly social network targeting,” in Proceedings of the Fifteenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Jun. 2009, pp. 707–715. https://doi.org/10.1145/1557019.1557098 Search in Google Scholar

[15] S. Muthukrishnan, “Ad exchanges: Research issues,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5929 LNCS, Springer, Berlin, Heidelberg, 2009, pp. 1–12. https://doi.org/10.1007/978-3-642-10841-9_1 Search in Google Scholar

[16] N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna, “Cookieless monster: Exploring the ecosystem of web-based device fingerprinting,” in Proceedings – IEEE Symposium on Security and Privacy, Berkeley, CA, USA, Jun. 2013, pp. 541–555. https://doi.org/10.1109/SP.2013.43 Search in Google Scholar

[17] N. Confessore, “Cambridge analytica and Facebook: The scandal and the fallout so far,” Apr. 04, 2018. [Online]. Available: https://www.nytimes.com/2018/04/04/us/politics/cambridge-analytica-scandal-fallout.html. Accessed on: Jul. 09, 2022. Search in Google Scholar

[18] G. Jefferson, “Is Facebook listening to me? Why those ads appear after you talk about things,” 2019. [Online]. Available: https://phys.org/news/2019-06-facebook-ads.html. Accessed on: Jul. 09, 2022. Search in Google Scholar

[19] C. Bennett, “Behind the one-way mirror: A deep dive into the technology of corporate surveillance,” 2019. [Online]. Available: https://www.eff.org/wp/behind-the-one-way-mirror. Accessed on: Jul. 09, 2022. Search in Google Scholar

[20] J. Schwartz, “Giving Web a memory cost its users privacy,” 2001. [Online]. Available: https://www.nytimes.com/2001/09/04/business/giving-web-a-memory-cost-its-users-privacy.html. Accessed on: Jul. 09, 2022. Search in Google Scholar

[21] D. Kristol and L. Montulli, “Request for comments: 2109,” 1997. [Online]. Available: https://tools.ietf.org/html/rfc2109. Accessed on: Jul. 09, 2022. Search in Google Scholar

[22] “What are cookies?” [Online]. Available: https://cookiecontroller.com/what-are-cookies/. Accessed on: Jul. 09, 2022. Search in Google Scholar

[23] S. Sternberg, “Fseek man page.” [Online]. Available: https://www.sas.upenn.edu/~saul/parasite/man/man3/fseek.3.html. Accessed on: Jul. 09, 2022. Search in Google Scholar

[24] D. Kristol and L. Montulli, “Request for comments: 2965,” 2000. [Online]. Available: https://tools.ietf.org/html/rfc2965. Accessed on: Jul. 09, 2022. Search in Google Scholar

[25] L. Sullivan, “64% of tracking cookies are blocked, deleted by Web browsers,” 2018. [Online]. Available: https://www.mediapost.com/publications/article/316757/64-of-tracking-cookies-are-blocked-deleted-by-we.html. Accessed on: Jul. 09, 2022. Search in Google Scholar

[26] G. Fishback, “Google’s new cookie restrictions: A nail in a coffin we should have already buried,” 2021. [Online]. Available: https://www.spiceworks.com/marketing/advertising/guest-article/google-new-cookie-restrictions-a-nail-in-a-coffin-we-should-have-already-buried/. Accessed on: Jul. 09, 2022. Search in Google Scholar

[27] P. Laperdrix, N. Bielova, B. Baudry, and G. Avoine, “Browser fingerprinting: A survey,” May 2019. [Online]. Available: http://arxiv.org/abs/1905.01051. Accessed on: Jul. 09, 2022. Search in Google Scholar

[28] O. E. Elejla, B. Belaton, M. Anbar, and B. O. Alijla, “IPv6 OS fingerprinting methods: Review,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10645 LNCS, Springer, Cham, Nov. 2017, pp. 661–668. https://doi.org/10.1007/978-3-319-70010-6_61 Search in Google Scholar

[29] N. Takei, T. Saito, K. Takasu, and T. Yamada, “Web browser fingerprinting using only cascading style sheets,” in Proceedings – 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2015, Krakow, Poland, Nov. 2015, pp. 57–63. https://doi.org/10.1109/BWCCA.2015.105 Search in Google Scholar

[30] K. Mowery and H. Shacham, “Pixel perfect: Fingerprinting canvas in HTML5,” Web 2.0 Security & Privacy 20 (W2SP), pp. 1–12, 2012. [Online]. Available: http://www.joelonsoftware.com/items/ Search in Google Scholar

[31] D. Jang, R. Jhala, S. Lerner, and H. Shacham, “An empirical study of privacy-violating information flows in JavaScript web applications,” in Proceedings of the ACM Conference on Computer and Communications Security, 2010, pp. 270–283. https://doi.org/10.1145/1866307.1866339 Search in Google Scholar

[32] J. Parra-Arnau, D. Rebollo-Monedero, and J. Forné, “Measuring the privacy of user profiles in personalized information systems,” Future Generation Computer Systems, vol. 33, pp. 53–63, Apr. 2014. https://doi.org/10.1016/j.future.2013.01.001 Search in Google Scholar

[33] L. Sweeney, “Discrimination in online Ad Delivery,” SSRN Electronic Journal, Jan. 2013, pp. 1–36. https://doi.org/10.2139/ssrn.2208240 Search in Google Scholar

[34] B. Kitts, N. McCoy, and M. van den Berg, “The future of online advertising: Thoughts on emerging issues in privacy, information bubbles, and disinformation,” in 2019 IEEE International Symposium on Technology and Society (ISTAS), vol. 2017, Medford, MA, USA, Nov. 2019, pp. 1–11. https://doi.org/10.1109/ISTAS48451.2019.8937870 Search in Google Scholar

[35] E. Mills, “Device identification in online banking is privacy threat, expert says,” 2009. [Online]. Available: https://www.cnet.com/news/device-identification-in-online-banking-is-privacy-threat-expert-says. Accessed on: Jul. 09, 2022. Search in Google Scholar

[36] L. V. Balakhonskaya, D. P. Gavra, I. V. Beresneva, and K. K. Sadirova, “Markers of manipulation in the electoral communication in a digital environment,” in Proceedings of the 2020 IEEE Communication Strategies in Digital Society Seminar, ComSDS 2020, St. Petersburg, Russia, 2020, pp. 91–98. https://doi.org/10.1109/ComSDS49898.2020.9101306 Search in Google Scholar

[37] J. R. Mayer, ““Any person... a pamphleteer”. Internet anonymity in the age of Web 2.0,” 2009. [Online]. Available: https://jonathanmayer.org/papers_data/thesis09.pdf Search in Google Scholar

[38] P. Eckersley, “How unique is your web browser?” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6205 LNCS, Springer, Berlin, Heidelberg, 2010, pp. 1–18. https://doi.org/10.1007/978-3-642-14527-8_1 Search in Google Scholar

[39] C. E. Shannon, “A mathematical theory of communication,” Bell System Technical Journal, vol. 27, no. 4, pp. 623–656, Oct. 1948. https://doi.org/10.1002/j.1538-7305.1948.tb00917.x Search in Google Scholar

[40] E. Antonio, A. Fajardo, and R. Medina, “Tracking browser fingerprint using rule based algorithm,” in Proceedings – 2020 16th IEEE International Colloquium on Signal Processing and its Applications, CSPA 2020, Langkawi, Malaysia, Feb. 2020, pp. 225–229. https://doi.org/10.1109/CSPA48992.2020.9068729 Search in Google Scholar

[41] T. D. Laksono, Y. Rosmansyah, B. Dabarsyah, and J. U. Choi, “JavaScript-based device fingerprinting mitigation using personal HTTP proxy,” in 2015 International Conference on Information Technology Systems and Innovation (ICITSI), Bandung, Indonesia, Mar. 2016, pp. 1–6. https://doi.org/10.1109/ICITSI.2015.7437697 Search in Google Scholar

[42] T. Fosmark, “Adobe Flash end of support on December 31, 2020,” 2020. [Online]. Available: https://docs.microsoft.com/enus/lifecycle/announcements/adobe-flash-end-of-support./ Accessed on: Jul. 09, 2022. Search in Google Scholar

[43] K. Boda, Á. M. Földes, G. G. Gulyás, and S. Imre, “User tracking on the Web via cross-browser fingerprinting,” in LNCS, vol. 7161, Springer, Berlin, Heidelberg, 2012, pp. 31–46. https://doi.org/10.1007/978-3-642-29615-4_4 Search in Google Scholar

[44] C. Kolbitsch, B. Livshits, B. Zorn, and C. Seifert, “Rozzle: De-cloaking Internet malware,” in Proceedings – IEEE Symposium on Security and Privacy, San Francisco, CA, May 2012, pp. 443–457. https://doi.org/10.1109/SP.2012.48 Search in Google Scholar

[45] S. Baviskar and P. S. Thilagam, “Protection of Web user’s privacy by securing browser from Web privacy attacks,” International Journal of Computer Technology and Applications, vol. 2, no. 4, pp. 1051–1057, 2011. [Online]. Available: https://www.researchgate.net/publication/267410556 Search in Google Scholar

[46] M. Vaites, “The effectiveness of a browser fingerprint as a tool for tracking,” M.S. thesis, Open University, UK, 2013. Search in Google Scholar

[47] M. Perry, E. Clark, S. Murdoch, and G. Koppen, “The design and implementation of the Tor browser [DRAFT],” 2018. [Online]. Available: http://www.torproject.org/projects/torbrowser/design/ Search in Google Scholar

[48] N. Kaur, S. Azam, K. Kannoorpatti, K. C. Yeo, and B. Shanmugam, “Browser fingerprinting as user tracking technology,” in Proceedings of 2017 11th International Conference on Intelligent Systems and Control, ISCO 2017, Coimbatore, India, Jan. 2017, pp. 103–111. https://doi.org/10.1109/ISCO.2017.7855963 Search in Google Scholar

[49] I. Hickson and D. Hyatt, Eds., “A vocabulary and associated APIs for HTML and XHTML,” 2008. [Online]. Available: https://www.w3.org/TR/2008/WD-html5-20080122/. Accessed on: Jul. 09, 2022. Search in Google Scholar

[50] A. Elbanna and N. Abdelbaki, “Browsers fingerprinting motives, methods, and countermeasures,” in CITS 2018 – 2018 International Conference on Computer, Information and Telecommunication Systems, Alsace, Colmar, Jul. 2018, pp. 1–5. https://doi.org/10.1109/CITS.2018.8440163 Search in Google Scholar

[51] G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan, and C. Diaz, “The Web never forgets: Persistent tracking mechanisms in the wild categories and subject descriptors,” in Proceedings of the ACM Conference on Computer and Communications Security, Nov. 2014, pp. 674–689. https://doi.org/10.1145/2660267.2660347 Search in Google Scholar

[52] M. Ayenson, D. J. Wambach, A. Soltani, N. Good, and C. J. Hoofnagle, “Flash cookies and privacy II: Now with HTML5 and ETag respawning,” SSRN Electronic Journal, Jul. 2011, pp. 1–21. https://doi.org/10.2139/ssrn.1898390 Search in Google Scholar

[53] M. Schwarz, F. Lackner, and D. Gruss, “JavaScript template attacks: Automatically inferring host information for targeted exploits,” in Proceedings 2019 Network and Distributed System Security Symposium, San Diego, CA, USA, Feb. 2019. https://doi.org/10.14722/ndss.2019.23155 Search in Google Scholar

[54] European Parliament, “General data protection regulation,” May 25, 2018. [Online]. Available: https://gdpr-info.eu/. Accessed on: Jul. 09, 2022. Search in Google Scholar

[55] J. Porter, “Google fined €50 million for GDPR violation in France,” 2019. [Online]. Available: https://www.theverge.com/2019/1/21/18191591/google-gdpr-fine-50-million-euros-data-consent-cnil. Accessed on: Jul. 09, 2022. Search in Google Scholar

[56] E. Price, “France fines Google $57 million for GDPR violations,” 2019. [Online]. Available: http://fortune.com/2019/01/21/france-fines-google-57-million-for-gdpr-violations/. Accessed on: Jul. 09, 2022. Search in Google Scholar

[57] C. Page, “Oracle and salesforce hit with $10 billion GDPR class-action lawsuit,” 2020. [Online]. Available: https://www.forbes.com/sites/carlypage/2020/08/14/oracle-andsalesforce-hit-with-10-billion-gdpr-class-action-lawsuit. Accessed on: Jul. 09, 2022. Search in Google Scholar

[58] T. Sakamoto and M. Matsunaga, “After GDPR, still tracking or not? Understanding opt-out states for online behavioral advertising,” in 2019 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, May 2019, pp. 92–99. https://doi.org/10.1109/SPW.2019.00027 Search in Google Scholar

[59] P. Laperdrix, W. Rudametkin, and B. Baudry, “Beauty and the beast: Diverting modern Web browsers to build unique browser fingerprints,” in Proceedings – 2016 IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 2016, pp. 878–894. https://doi.org/10.1109/SP.2016.57 Search in Google Scholar

[60] R. Brandom, “Google, Microsoft, and Amazon are paying to get around Adblock Plus,” 2015. [Online]. Available: https://www.theverge.com/2015/2/2/7963577/google-ads-get-through-adblock. Accessed on: Jul. 09, 2022. Search in Google Scholar

[61] A. Henry, “Ad-Blocker ghostery actually helps advertisers, if you ‘support’ it,” 2013. [Online]. Available: https://lifehacker.com/ad-blocking-extension-ghostery-actually-sells-data-to-a-514417864. Accessed on: Jul. 09, 2022. Search in Google Scholar

[62] N. Lomas, “U.K. carrier EE looking at giving users control over mobile ads,” 2015. [Online]. Available: http://techcrunch.com/2015/11/23/u-k-carrier-ee-looking-at-giving-users-control-over-mobile-ads. Accessed on: Jul. 09, 2022. Search in Google Scholar

[63] N. Lomas, “Shine signs first European carriers to its network-level ad blocking tech,” 2016. [Online]. Available: https://techcrunch.com/2016/02/18/shine-bags-first-european-carrier-as-three-uk-deploys-network-level-ad-blocking/?guccounter=1. Accessed on: Jul. 09, 2022. Search in Google Scholar

[64] “Brave Browser.” [Online]. Available: https://brave.com/. Accessed on: Jul. 09, 2022. Search in Google Scholar

[65] Brave, “Brave launches the first advertising platform built on privacy,” 2019. [Online]. Available: https://brave.com/brave-ads-launch/. Accessed on: Jul. 09, 2022. Search in Google Scholar

[66] European Parliament, “What should I do if I think that my personal data protection rights haven’t been respected?” 2018. [Online]. Available: https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en. Accessed on: Jul. 09, 2022. Search in Google Scholar

Polecane artykuły z Trend MD

Zaplanuj zdalną konferencję ze Sciendo