Filters








1,154 Hits in 13.0 sec

Cookies That Give You Away

Steven Englehardt, Dillon Reisman, Christian Eubank, Peter Zimmerman, Jonathan Mayer, Arvind Narayanan, Edward W. Felten
2015 Proceedings of the 24th International Conference on World Wide Web - WWW '15  
We study the ability of a passive eavesdropper to leverage "third-party" HTTP tracking cookies for mass surveillance.  ...  Using OpenWPM, our web privacy measurement platform, we simulate users browsing the web and find that the adversary can reconstruct 62-73% of a typical user's browsing history.  ...  In this paper we studied what can be inferred from the surveillance of web traffic and established that utilizing third-party tracking cookies enables an adversary to attribute traffic to users much more  ... 
doi:10.1145/2736277.2741679 dblp:conf/www/EnglehardtREZMN15 fatcat:5y5igwhgrnfqxh54z26vd7xyei

Throwing it All Away: Community, Data Privacy and False Choices of Web 2.0

Eli Edwards
2008 Social Science Research Network  
of community and privacy, Web 2.0 users are choosing community and thus rejecting privacy.  ...  Online privacy has long been a challenge, but the rise of Web 2.0 technologies has made it easier for more people to share personal information about themselves.  ...  A rational actor model of information privacy holds that privacy functions as a property right, and that if people give away their privacy for minor benefits, it means that they ascribe a "low value" to  ... 
doi:10.2139/ssrn.1370745 fatcat:3yb5zraxpnbvxcaae5v2y4nfte

Web Privacy Census

Chris Jay Hoofnagle, Nathan Good
2012 Social Science Research Network  
Highlights • We repeated a 2012 survey of tracking mechanisms such as HTTP cookies, Flash cookies, and HTML5 storage, used by top 25,000 most popular websites • We found that the top 100 most popular sites  ...  In 2011, we started surveying the online mechanisms used to track people online (e.g., HTTP cookies, Flash cookies and HTML5 storage). We called this our Web Privacy Census.  ...  The conclusion is that more effective tools such as obfuscation with the Tor browser are needed to combat fingerprinting. • In "Cookies That Give You Away: Evaluating the Surveillance Implications of Web  ... 
doi:10.2139/ssrn.2460547 fatcat:kaxxdrl73nbvncdqipea37h2ze

Recipes for Cookies: The Role of Institutions in Shaping the Development of Communication Technologies

Rajiv C. Shah, Jay P. Kesan
2004 Social Science Research Network  
A case study of the cookies technology, which allows web sites to maintain surveillance on their visitors, shows the differing influences of universities, firms, and consortia.  ...  This technology fundamentally affects privacy, because cookies allow web sites to track and store information about their visitors.  ...  of code.  ... 
doi:10.2139/ssrn.565041 fatcat:ibdzg5bwove5pgrs7uk53cjwle

A feminist Critique to digital consent

Elinor Carmi
2021 Seminar.net  
The online surveillance adtech industry that funds the web had to use a mechanism that commodifies people, rendering their behaviors into data - products that can be sold and traded for the highest bidder  ...  The design of digital consent creates a specific interface that teaches people to behave in ways that preserve the asymmetric power relations.  ...  surveillance mechanisms such as web-cookies.  ... 
doi:10.7577/seminar.4291 fatcat:5vjtqjwbebae7ebiqc4mec3o5a

Katz on a Hot Tin Roof - Saving the Fourth Amendment from Commercial Conditioning by Reviving Voluntariness in Disclosures to Third Parties

Mary Leary
2013 Social Science Research Network  
, but shifts the issue away from a focus on government surveillance.  ...  Cell phones and mobile devices This form of commercial conditioning is not limited to activity on the World Wide Web: the history of cell phone tracking is similar to that of cookies.  ... 
doi:10.2139/ssrn.2253682 fatcat:qrr6aie4pff5pigwv2hnuseojy

To Track or 'Do Not Track': Advancing Transparency and Individual Control in Online Behavioral Advertising

Omer Tene, Jules Polonetsky
2011 Social Science Research Network  
GHOSTERY, http://www.ghostery.com (last visited Oct. 7, 2011) ("Ghostery tracks the trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies  ...  If anything, it drives consumers away from even attempting to understand what rights they give away as they move from site to site." LAWRENCE LESSIG, CODE: VERSION 2.0, at 228 (2006).  ...  In particular, critics argue that users are uninformed of industry information practices and deprived of the opportunity to exert meaningful control over their data.  ... 
doi:10.2139/ssrn.1920505 fatcat:fifrwdkqbzhxtfm3ykupwecjkm

Information We Collect: Surveillance and Privacy in the Implementation of Google Apps for Education

Maria Lindh, Jan Nolin
2016 European Educational Research Journal  
From a front end viewpoint of Google Apps for Education, the advantages of the services are evident to the users, and emerge in the study, whereas back end strategies are relatively hidden.  ...  the practices and ethics of a free public service institution.  ...  However, web 2.0 corporations (of which Google is the most iconic) build on an original idea of giving away processing for free while retaining ownership of the archive.  ... 
doi:10.1177/1474904116654917 fatcat:2dv3gx4cavej3oo6ukblyllbxa

A Survey on Web Tracking: Mechanisms, Implications, and Defenses

Tomasz Bujlow, Valentin Carela-Espanol, Beom-Ryeol Lee, Pere Barlet-Ros
2017 Proceedings of the IEEE  
We show why tracking is being used and its possible implications for the users. For each of the tracking methods, we present possible defenses.  ...  Privacy seems to be the Achilles' heel of today's web.  ...  away to the nearest.  ... 
doi:10.1109/jproc.2016.2637878 fatcat:vpykj2neezgebjhh5imvulenpq

Data aggregators, consumer data, and responsibility online: Who is tracking consumers online and should they stop?

Kirsten Martin
2015 The Information Society  
The goal of this article is to examine the strategic choices of firms collecting consumer data online and to identify the roles and obligations of the actors within the current network of online tracking  ...  Firms online are uniquely positioned to undercut or to respect privacy expectations within three possible roles: as a member of a supply chain of information traders, within a network of surveillance online  ...  Acknowledgments I thank Katie Shilton and Mary Culnan for helpful comments on an earlier draft of this article. This article was presented to the Society of Business Ethics (2013).  ... 
doi:10.1080/01972243.2015.1107166 fatcat:og2ly7e5ljhibgp5uwwnhmpugq

Google as a de facto privacy regulator: Analyzing Chrome's removal of third-party cookies from an antitrust perspective

Damien Geradin, Dimitrios Katsifis, Theano Karanikioti
2020 Social Science Research Network  
Importantly, these policy decisions have far-reaching implications, in that they affect the ability of third parties to track users online and perform advertising.  ...  In the past two decades companies have used a variety of methods to track users online, the most famous (but not the only one) being the web cookie.  ...  It only contains information about a small collection of interest groups to which the user belongs (in our example, the browser informs the ad network that the user belongs to the interest group of "people  ... 
doi:10.2139/ssrn.3738107 fatcat:ljpftxnvkjbpbdbas4qn3byyfa

Are cookie banners indeed compliant with the law? Deciphering EU legal requirements on consent and technical means to verify compliance of cookie banners [article]

Cristiana Santos, Nataliia Bielova, Célestin Matte
2020 arXiv   pre-print
The definition of requirements emerges from a joint interdisciplinary analysis composed of lawyers and computer scientists in the domain of web tracking technologies.  ...  Our contribution resides in the definition of seventeen operational and fine-grained requirements on cookie banner design that are legally compliant, and moreover, we define whether and when the verification  ...  Greek DPA, 2020 Belgian DPA, 2020 Irish DPA, 2020 Recent audits on websites Recurrent audits on websites are aimed at information-gathering assessment of the state of cookie (and related technologies  ... 
arXiv:1912.07144v2 fatcat:4nkrmy3wrrbhpibatedfzixmee

Is it safe? [chapter]

2019 Internet Health Report 2019  
On mobiles, users can turn off or reset advertising identifiers that track them across apps, similar to blocking cookies on the Web.  ...  You are signing away rights.  ... 
doi:10.14361/9783839449462-003 fatcat:ynnamgky65b6tmqos6q4doojf4

Leaky Apps and Data Shots: Technologies of Leakage and Insertion in NSA-Surveillance

Lonneke Van der Velden
2015 Surveillance & Society  
The NSA disclosures have put the issue of surveillance at center stage, and with that, a range of technologies by which data are captured.  ...  Taking a post-Foucauldian trajectory within surveillance theory as a point of reference, in which conceptual frameworks tended to emphasize data bodies and data flows, this article argues that the leaks  ...  Acknowledgments I would like to thank Sabine Niederer, Liliana Bounegru, Ernst van den Hemel, Maxigas, and the anonymous reviewers for their useful comments on this paper and Matthijs Koot and Rejo Zenger  ... 
doi:10.24908/ss.v13i2.5315 fatcat:brwzzn5majcsdjazcnznv6mldy

Marketing, Consumers and Technology: Perspectives for Enhancing Ethical Transactions

Gene R. Laczniak, Patrick E. Murphy
2006 Business Ethics Quarterly  
Abstract: The advance of technology has influenced marketing in a number of ways that have ethical implications.  ...  Growth in use of the Internet and e-commerce has placed electronic "cookies," spyware, spam, RFIDs, and data mining at the forefront of the ethical debate.  ...  of possible kidnapping (Richtel 2004 ), • Marketers emphasize that some aspects of the much discussed consumer privacy debate may be exaggerated because many consumers are willing to give away personal  ... 
doi:10.5840/beq200616330 fatcat:obzedobtjbfmtl7mo67rbgjxva
« Previous Showing results 1 — 15 out of 1,154 results