Track and Treat - Usage of E-Mail Tracking for Newsletter Individualization

E-Mail tracking mechanisms gather information on individual recipients’ reading behavior. Previous studies show that e-mail newsletters commonly include tracking elements. However, prior work does not examine the degree to which e-mail senders actually employ gathered user information. The paper closes this research gap by means of an experimental study to clarify the use of tracking-based information. To that end, twelve mail accounts are created, each of which subscribes to a pre-defined set of newsletters from companies based in Germany, the UK, and the USA. Systematically varying e-mail reading patterns across accounts, each account simulates a different type of user with individual reading behavior. Assuming senders to track e-mail reading habits, we expect changes in mailer behavior. The analysis confirms the prominence of tracking in that over 92% of the newsletter e-mails contain tracking images. For 13 out of 44 senders an adjustment of communication policy in response to user reading behavior is observed. Observed effects include sending newsletters at different times, adapting advertised products to match the users’ IT environment, increased or decreased mailing frequency, and mobile-specific adjustments. Regarding legal issues, not all companies that adapt the mail-sending behavior state the usage of such mechanisms in their privacy policy.

[1]  Benedict Bender,et al.  E-Mail Tracking in Online Marketing - Methods, Detection, and Usage , 2015, Wirtschaftsinformatik.

[2]  Igor Santos,et al.  The web is watching you: A comprehensive review of web-tracking techniques and countermeasures , 2017, Log. J. IGPL.

[3]  Nataliia Bielova,et al.  Hybrid Information Flow Monitoring against Web Tracking , 2013, 2013 IEEE 26th Computer Security Foundations Symposium.

[4]  Benedict Bender,et al.  E-Mail Tracking: Status Quo and Novel Countermeasures , 2016, ICIS.

[5]  A. B. I. Hasouneh,et al.  Measuring the Effectiveness of E-mail Direct Marketing in Building Customer Relationship , 2010 .

[6]  John C. Mitchell,et al.  Third-Party Web Tracking: Policy and Technology , 2012, 2012 IEEE Symposium on Security and Privacy.

[7]  Arvind Narayanan,et al.  The Web Never Forgets: Persistent Tracking Mechanisms in the Wild , 2014, CCS.

[8]  Hamid Nazerzadeh,et al.  Real-time optimization of personalized assortments , 2013, EC.

[9]  Benedict Bender,et al.  Web Tracking - A Literature Review on the State of Research , 2018, HICSS.

[10]  D. Wetherall,et al.  A Study of Third-Party Tracking by Mobile Apps in the Wild , 2012 .

[11]  Giorgio Maria Di Nunzio,et al.  Gathering and Mining Information from Web Log Files , 2007, DELOS.

[12]  Steve Uhlig,et al.  Tracking Personal Identifiers Across the Web , 2016, PAM.

[13]  Gianluca Stringhini,et al.  Stranger danger: exploring the ecosystem of ad-based URL shortening services , 2014, WWW.

[14]  Roger Wattenhofer,et al.  BuzzTrack: topic detection and tracking in email , 2007, IUI '07.

[15]  Javier Parra-Arnau,et al.  Pay-per-tracking: A collaborative masking model for web browsing , 2017, Inf. Sci..

[16]  Aaron Alva,et al.  Cross-Device Tracking: Measurement and Disclosures , 2017, Proc. Priv. Enhancing Technol..

[17]  Xavier Drèze,et al.  Real-Time Evaluation of E-mail Campaign Performance , 2009, Mark. Sci..

[18]  Natasa Milic-Frayling,et al.  Network Analysis of Third Party Tracking: User Exposure to Tracking Cookies through Search , 2013, 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT).

[19]  Jérôme Kunegis,et al.  On the Ubiquity of Web Tracking: Insights from a Billion-Page Web Crawl , 2016, J. Web Sci..

[20]  Benjamin Fabian,et al.  Privacy-invading mechanisms in e-commerce - a case study on German tourism websites , 2019, International Journal of Networking and Virtual Organisations.

[21]  Timothy Libert,et al.  Exposing the Hidden Web: An Analysis of Third-Party HTTP Requests on 1 Million Websites , 2015, ArXiv.

[22]  Arvind Narayanan,et al.  Online Tracking: A 1-million-site Measurement and Analysis , 2016, CCS.

[23]  Pere Barlet-Ros,et al.  A Survey on Web Tracking: Mechanisms, Implications, and Defenses , 2017, Proceedings of the IEEE.

[24]  Hassan Takabi,et al.  Security and Privacy Risks of Using E-mail Address as an Identity , 2010, 2010 IEEE Second International Conference on Social Computing.

[25]  David Wetherall,et al.  Detecting and Defending Against Third-Party Tracking on the Web , 2012, NSDI.

[26]  R. Krishnamoorthi,et al.  Identifying User Behavior by Analyzing Web Server Access Log File , 2009 .

[27]  Ian D. Mitchell Third-Party Tracking Cookies and Data Privacy , 2012 .

[28]  Thomas Mandl,et al.  "I would have never allowed it": User Perception of Third-party Tracking and Implications for Display Advertising , 2015, ISI.

[29]  Jérôme Kunegis,et al.  Tracking the Trackers: A Large-Scale Analysis of Embedded Web Trackers , 2016, ICWSM.