Filters








44,524 Hits in 4.7 sec

An Economic Analysis of User-Privacy Options in Ad-Supported Services [article]

Joan Feigenbaum, Michael Mitzenmacher, Georgios Zervas
2012 arXiv   pre-print
We analyze the value to e-commerce website operators of offering privacy options to users, e.g., of allowing users to opt out of ad targeting.  ...  user, the site operator should strive to make the cost of a privacy option as low as possible.  ...  Single-provider case We begin by presenting a general model of an ad-supported service with a single provider.  ... 
arXiv:1208.0383v1 fatcat:nhe24p6sg5dhrhv5ukt2s5gcbq

An Economic Analysis of User-Privacy Options in Ad-Supported Services [chapter]

Joan Feigenbaum, Michael Mitzenmacher, Georgios Zervas
2012 Lecture Notes in Computer Science  
We analyze the value to e-commerce website operators of offering privacy options to users, e.g., of allowing users to opt out of ad targeting.  ...  user, the site operator should strive to make the cost of a privacy option as low as possible.  ...  Single-Provider Case We begin by presenting a general model of an ad-supported service with a single provider.  ... 
doi:10.1007/978-3-642-35311-6_3 fatcat:acgww7aeebbovk2x6zeif57lxi

Google Capitalism

Christian Fuchs
2012 tripleC: Communication, Capitalism & Critique  
In section 2, Google's cycle of capital accumulation is explained and the role of surveillance in Google's form of capital accumulation is explained.  ...  In section 3, the discussion if Google is "evil" is taken up. Based on Dallas Smythe's concept of the audience commodity, the role of the notion of Internet prosumer commodification is stressed.  ...  There is only an opt-out option from this form of networked economic surveillance. Google's privacy policy provides a link to this option.  ... 
doi:10.31269/vol10iss1pp42-48 fatcat:ytdnoebkubbtvau7fkqon6qhce

Google Capitalism

Christian Fuchs
2012 tripleC: Communication, Capitalism & Critique  
In section 2, Google's cycle of capital accumulation is explained and the role of surveillance in Google's form of capital accumulation is explained.  ...  In section 3, the discussion if Google is "evil" is taken up. Based on Dallas Smythe's concept of the audience commodity, the role of the notion of Internet prosumer commodification is stressed.  ...  There is only an opt-out option from this form of networked economic surveillance. Google's privacy policy provides a link to this option.  ... 
doi:10.31269/triplec.v10i1.304 fatcat:hyfrgeuerjfktfe3lpnlbjlmdq

Online advertising: Analysis of privacy threats and protection approaches

José Estrada-Jiménez, Javier Parra-Arnau, Ana Rodríguez-Hoyos, Jordi Forné
2017 Computer Communications  
For this purpose, a wealth of user data is collected, aggregated, processed and traded behind the scenes at an unprecedented rate.  ...  The current advertising model builds upon an intricate infrastructure composed of a variety of intermediary entities and technologies whose main aim is to deliver personalized ads.  ...  José Estrada-Jiménez and Ana Rodríguez-Hoyos acknowledge the support from Escuela Politécnica Nacional (EPN) for their doctoral studies at Universitat Politècnica de Catalunya (UPC).  ... 
doi:10.1016/j.comcom.2016.12.016 fatcat:qkct7qifnnahxd4tvlau3e6wiy

MyTrackingChoices: Pacifying the Ad-Block War by Enforcing User Privacy Preferences [article]

Jagdish Prasad Achara, Javier Parra-Arnau, Claude Castelluccia
2016 arXiv   pre-print
Free content and services on the Web are often supported by ads.  ...  Therefore, our proposed approach consists in providing users with an option to specify the categories of web pages that are privacy-sensitive to them and block trackers present on such web pages only.  ...  Parra-Arnau is the recipient of a Juan de la Cierva postdoctoral fellowship, FJCI-2014-19703, from the Spanish Ministry of Economy and Competitiveness.  ... 
arXiv:1604.04495v1 fatcat:j2r6yunsmvattapu6qj64bwulu

The Law and Economics of Intermediaries of Personal Information

Giacomo Luchetta
2013 Social Science Research Network  
The descriptive analysis of this industry has consequences in terms of business model and regulatory approach.  ...  As for the latter, an imperfect understanding of the economics of personal information creates the risk for misaligned norms, and therefore for an uneven competition.  ...  deliver an ad to certain class of profiled users.  ... 
doi:10.2139/ssrn.2228358 fatcat:jk2hlnhuwjespiibotlj22hoay

Location Based Services for Sharing Using Trusted Server

2020 International journal for research in engineering application & management  
As LBS activity makes use of the user's identity and current location information, an appropriate path has to be utilized to protect the location privacy.  ...  Nowadays, Location Based Service (LBS) has become one of the popular services which are provided by social networks.  ...  According to an analysis of cognate work on location privacy, in this work, they have implemented the location privacy evaluation model of Distortion-Predicated Metric, which is used to assess the implementation  ... 
doi:10.35291/2454-9150.2020.0365 fatcat:yp5cw7juv5f4tnh3krengp4z4y

What is missing for the full deployment of mobile search services? results from a survey with experts

S. G. Nikolov, R. Compano, M. Bacigalupo, J.L. Gomez-Barroso, C. Feijoo
2010 2010 9th Conference of Telecommunication, Media and Internet  
of content and services, and developing personal identity data management systems to improve user acceptance and enhance trust.  ...  Moreover, experts think that perceived usefulness is valuable but trust is essential and that privacy should be seen as an opportunity rather than a constraint.  ...  It has also an optional security system warning in case of an excess of exercise or any health problem; which in case a dangerous pattern or accident calls automatically the emergency service indicating  ... 
doi:10.1109/ctte.2010.5557707 dblp:conf/ctte/NikolovCBBF10 fatcat:bvn52d5nivai7flpoowk5kxbpm

Engineering Privacy and Protest: A Case Study of AdNauseam

Daniel C. Howe, Helen Nissenbaum
2017 IEEE Symposium on Security and Privacy  
Why not simply hide ads from users and hide users from trackers? The twofold answer reveals what may be distinctive elements of the AdNauseam approach.  ...  First, it collects the ads it finds in its 'Vault', allowing users to interactively explore the ads they have been served, and providing insight into the algorithmic profiles created by advertising networks  ...  This publication has been supported in part by grants from US NSF CNS/NetS 105833, US NSF SATC 1642553, and the Research Grants Council of Hong Kong, China (Project No. CityU 11669616)  ... 
dblp:conf/sp/HoweN17 fatcat:36a6efi43rbzfl4mvuc3r5mjo4

A Home Based Security Mechanism Using Paired Key For Sensor To Cloud Communication

Diljeet Singh Makkar, C. Harisharan Aggarwal
2017 Zenodo  
In this project, an urgent need for research in user data privacy in the cloud is established and the risks of not achieving it are outlined.  ...  Preventive approach in the proposed model is based on key exchange model for the user data privacy, integrity and data confidentiality.  ...  In this project, an urgent need for research in user data privacy in the cloud is established and the risks of not achieving it are outlined.  ... 
doi:10.5281/zenodo.807255 fatcat:r54nkylfizf6hgna35q5yn3oqa

Post-mortem privacy 2.0: theory, law, and technology

Edina Harbinja
2017 International review of law computers & technology  
This paper builds on the general survey of post-mortem privacy set out in the author's earlier work.  ...  The argument is that both of these regulatory modalities provide examples and illustrations of how post-mortem privacy can be recognised practically, especially in the online environment.  ...  Acknowledgments The author would like to thank her PhD supervisor, Prof Lilian Edwards for her continuous support, invaluable insights and constructive criticism.  ... 
doi:10.1080/13600869.2017.1275116 fatcat:ajun3r2y4ngmffiyb6sa64aufi

Cloud Based Approach to Enhance Security in VANET Communication

2021 International Journal of Advanced Trends in Computer Science and Engineering  
We have a tendency to gift a summary of the subsequent problems that arise in VANETs: privacy, authentication, and secure message dissemination.  ...  Given the importance of those problems, researchers have spent heaps of effort in these areas over the last decade.  ...  To support added services provided by Service suppliers (SPs), communication between vehicles and SPs ought to be secure and therefore the message authentication method ought to be economical.  ... 
doi:10.30534/ijatcse/2021/801022021 fatcat:hs74s24vu5dhvdayatjtk3agsy

A Contribution to the Critique of the Political Economy of Google

Christian Fuchs
2011 Fast Capitalism  
Acknowledgments The research presented in this paper was conducted in the project "social networking sites in the surveillance society", funded by the austrian science Fund (FWF): project number P 22445  ...  There is only an opt-out option from this form of networked economic surveillance. Google's privacy policy provides a link to this option.  ...  The analysis shows that Google makes use of privacy self-regulation for formulating privacy policies and terms of service that enable the large-scale economic surveillance of users for the purpose of capital  ... 
doi:10.32855/fcapital.201101.006 fatcat:xs264nyxvbdftc4yyshruo2r74

A Secure Cloud Internetwork Model with Economic and Social Incentives (SCIMES)

Alan Rea, Xiaojun Cao, Aparna Gupta, Nirmala Shenoy
2012 Americas Conference on Information Systems  
This in turn will result in more revenue for providers and greater benefits for users.  ...  The Secure Cloud Internetwork Model with Economic and Social Incentives (SCIMES) provides the framework via a new internetwork model that will support trust ratings, as well as secure social and economic  ...  The modularity and flexibility in the SCIMES cloud and tiered concept supports better security and privacy options.  ... 
dblp:conf/amcis/ReaCGS12 fatcat:e7hncrj7ljhernjoe5llwia3hq
« Previous Showing results 1 — 15 out of 44,524 results