A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Economic Analysis of User-Privacy Options in Ad-Supported Services
[article]
2012
arXiv
pre-print
We analyze the value to e-commerce website operators of offering privacy options to users, e.g., of allowing users to opt out of ad targeting. ...
user, the site operator should strive to make the cost of a privacy option as low as possible. ...
Single-provider case We begin by presenting a general model of an ad-supported service with a single provider. ...
arXiv:1208.0383v1
fatcat:nhe24p6sg5dhrhv5ukt2s5gcbq
An Economic Analysis of User-Privacy Options in Ad-Supported Services
[chapter]
2012
Lecture Notes in Computer Science
We analyze the value to e-commerce website operators of offering privacy options to users, e.g., of allowing users to opt out of ad targeting. ...
user, the site operator should strive to make the cost of a privacy option as low as possible. ...
Single-Provider Case We begin by presenting a general model of an ad-supported service with a single provider. ...
doi:10.1007/978-3-642-35311-6_3
fatcat:acgww7aeebbovk2x6zeif57lxi
Google Capitalism
2012
tripleC: Communication, Capitalism & Critique
In section 2, Google's cycle of capital accumulation is explained and the role of surveillance in Google's form of capital accumulation is explained. ...
In section 3, the discussion if Google is "evil" is taken up. Based on Dallas Smythe's concept of the audience commodity, the role of the notion of Internet prosumer commodification is stressed. ...
There is only an opt-out option from this form of networked economic surveillance. Google's privacy policy provides a link to this option. ...
doi:10.31269/vol10iss1pp42-48
fatcat:ytdnoebkubbtvau7fkqon6qhce
Google Capitalism
2012
tripleC: Communication, Capitalism & Critique
In section 2, Google's cycle of capital accumulation is explained and the role of surveillance in Google's form of capital accumulation is explained. ...
In section 3, the discussion if Google is "evil" is taken up. Based on Dallas Smythe's concept of the audience commodity, the role of the notion of Internet prosumer commodification is stressed. ...
There is only an opt-out option from this form of networked economic surveillance. Google's privacy policy provides a link to this option. ...
doi:10.31269/triplec.v10i1.304
fatcat:hyfrgeuerjfktfe3lpnlbjlmdq
Online advertising: Analysis of privacy threats and protection approaches
2017
Computer Communications
For this purpose, a wealth of user data is collected, aggregated, processed and traded behind the scenes at an unprecedented rate. ...
The current advertising model builds upon an intricate infrastructure composed of a variety of intermediary entities and technologies whose main aim is to deliver personalized ads. ...
José Estrada-Jiménez and Ana Rodríguez-Hoyos acknowledge the support from Escuela Politécnica Nacional (EPN) for their doctoral studies at Universitat Politècnica de Catalunya (UPC). ...
doi:10.1016/j.comcom.2016.12.016
fatcat:qkct7qifnnahxd4tvlau3e6wiy
MyTrackingChoices: Pacifying the Ad-Block War by Enforcing User Privacy Preferences
[article]
2016
arXiv
pre-print
Free content and services on the Web are often supported by ads. ...
Therefore, our proposed approach consists in providing users with an option to specify the categories of web pages that are privacy-sensitive to them and block trackers present on such web pages only. ...
Parra-Arnau is the recipient of a Juan de la Cierva postdoctoral fellowship, FJCI-2014-19703, from the Spanish Ministry of Economy and Competitiveness. ...
arXiv:1604.04495v1
fatcat:j2r6yunsmvattapu6qj64bwulu
The Law and Economics of Intermediaries of Personal Information
2013
Social Science Research Network
The descriptive analysis of this industry has consequences in terms of business model and regulatory approach. ...
As for the latter, an imperfect understanding of the economics of personal information creates the risk for misaligned norms, and therefore for an uneven competition. ...
deliver an ad to certain class of profiled users. ...
doi:10.2139/ssrn.2228358
fatcat:jk2hlnhuwjespiibotlj22hoay
Location Based Services for Sharing Using Trusted Server
2020
International journal for research in engineering application & management
As LBS activity makes use of the user's identity and current location information, an appropriate path has to be utilized to protect the location privacy. ...
Nowadays, Location Based Service (LBS) has become one of the popular services which are provided by social networks. ...
According to an analysis of cognate work on location privacy, in this work, they have implemented the location privacy evaluation model of Distortion-Predicated Metric, which is used to assess the implementation ...
doi:10.35291/2454-9150.2020.0365
fatcat:yp5cw7juv5f4tnh3krengp4z4y
What is missing for the full deployment of mobile search services? results from a survey with experts
2010
2010 9th Conference of Telecommunication, Media and Internet
of content and services, and developing personal identity data management systems to improve user acceptance and enhance trust. ...
Moreover, experts think that perceived usefulness is valuable but trust is essential and that privacy should be seen as an opportunity rather than a constraint. ...
It has also an optional security system warning in case of an excess of exercise or any health problem; which in case a dangerous pattern or accident calls automatically the emergency service indicating ...
doi:10.1109/ctte.2010.5557707
dblp:conf/ctte/NikolovCBBF10
fatcat:bvn52d5nivai7flpoowk5kxbpm
Engineering Privacy and Protest: A Case Study of AdNauseam
2017
IEEE Symposium on Security and Privacy
Why not simply hide ads from users and hide users from trackers? The twofold answer reveals what may be distinctive elements of the AdNauseam approach. ...
First, it collects the ads it finds in its 'Vault', allowing users to interactively explore the ads they have been served, and providing insight into the algorithmic profiles created by advertising networks ...
This publication has been supported in part by grants from US NSF CNS/NetS 105833, US NSF SATC 1642553, and the Research Grants Council of Hong Kong, China (Project No. CityU 11669616) ...
dblp:conf/sp/HoweN17
fatcat:36a6efi43rbzfl4mvuc3r5mjo4
A Home Based Security Mechanism Using Paired Key For Sensor To Cloud Communication
2017
Zenodo
In this project, an urgent need for research in user data privacy in the cloud is established and the risks of not achieving it are outlined. ...
Preventive approach in the proposed model is based on key exchange model for the user data privacy, integrity and data confidentiality. ...
In this project, an urgent need for research in user data privacy in the cloud is established and the risks of not achieving it are outlined. ...
doi:10.5281/zenodo.807255
fatcat:r54nkylfizf6hgna35q5yn3oqa
Post-mortem privacy 2.0: theory, law, and technology
2017
International review of law computers & technology
This paper builds on the general survey of post-mortem privacy set out in the author's earlier work. ...
The argument is that both of these regulatory modalities provide examples and illustrations of how post-mortem privacy can be recognised practically, especially in the online environment. ...
Acknowledgments The author would like to thank her PhD supervisor, Prof Lilian Edwards for her continuous support, invaluable insights and constructive criticism. ...
doi:10.1080/13600869.2017.1275116
fatcat:ajun3r2y4ngmffiyb6sa64aufi
Cloud Based Approach to Enhance Security in VANET Communication
2021
International Journal of Advanced Trends in Computer Science and Engineering
We have a tendency to gift a summary of the subsequent problems that arise in VANETs: privacy, authentication, and secure message dissemination. ...
Given the importance of those problems, researchers have spent heaps of effort in these areas over the last decade. ...
To support added services provided by Service suppliers (SPs), communication between vehicles and SPs ought to be secure and therefore the message authentication method ought to be economical. ...
doi:10.30534/ijatcse/2021/801022021
fatcat:hs74s24vu5dhvdayatjtk3agsy
A Contribution to the Critique of the Political Economy of Google
2011
Fast Capitalism
Acknowledgments The research presented in this paper was conducted in the project "social networking sites in the surveillance society", funded by the austrian science Fund (FWF): project number P 22445 ...
There is only an opt-out option from this form of networked economic surveillance. Google's privacy policy provides a link to this option. ...
The analysis shows that Google makes use of privacy self-regulation for formulating privacy policies and terms of service that enable the large-scale economic surveillance of users for the purpose of capital ...
doi:10.32855/fcapital.201101.006
fatcat:xs264nyxvbdftc4yyshruo2r74
A Secure Cloud Internetwork Model with Economic and Social Incentives (SCIMES)
2012
Americas Conference on Information Systems
This in turn will result in more revenue for providers and greater benefits for users. ...
The Secure Cloud Internetwork Model with Economic and Social Incentives (SCIMES) provides the framework via a new internetwork model that will support trust ratings, as well as secure social and economic ...
The modularity and flexibility in the SCIMES cloud and tiered concept supports better security and privacy options. ...
dblp:conf/amcis/ReaCGS12
fatcat:e7hncrj7ljhernjoe5llwia3hq
« Previous
Showing results 1 — 15 out of 44,524 results