Behavioural Tracking on the Internet: A Technical Perspective

The main goal of this chapter is to present a state-of the-art of behavioural tracking on the Internet and to highlight some of the resulting potential privacy threats. This chapter is structured as follows: First section introduces the concept of behavioural tracking. The following sections describe how tracking is performed by web sites, location-based services and social networks, respectively. Final section presents some of the existing tracking-prevention solutions. Finally, the author concludes the report and proposes some recommendations.

[1]  Catherine Dwyer,et al.  Behavioral Targeting: A Case Study of Consumer Tracking on Levis.com , 2009, AMCIS.

[2]  Balachander Krishnamurthy,et al.  On the leakage of personally identifiable information via online social networks , 2009, CCRV.

[3]  Gerald Friedland,et al.  Cybercasing the Joint: On the Privacy Implications of Geo-Tagging , 2010, HotSec.

[4]  Bruce Schneier,et al.  Architecture of Privacy , 2009, IEEE Security & Privacy Magazine.

[5]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[6]  Gregory J. Conti,et al.  An honest man has nothing to fear: user perceptions on web-based information disclosure , 2007, SOUPS '07.

[7]  Mireille Hildebrandt Profiling: From data to knowledge , 2006, Datenschutz und Datensicherheit - DuD.

[8]  Massimo Barbaro,et al.  A Face Is Exposed for AOL Searcher No , 2006 .

[9]  Evelyne Beatrix Cleff,et al.  Privacy Issues in Mobile Advertising , 2007 .

[10]  Ian Goldberg,et al.  Louis, Lester and Pierre: Three Protocols for Location Privacy , 2007, Privacy Enhancing Technologies.

[11]  Balachander Krishnamurthy,et al.  WWW 2009 MADRID! Track: Security and Privacy / Session: Web Privacy Privacy Diffusion on the Web: A Longitudinal Perspective , 2022 .

[12]  Reality Mining , 2014, Encyclopedia of Social Network Analysis and Mining.

[13]  Chris Jay Hoofnagle,et al.  Flash Cookies and Privacy , 2009, AAAI Spring Symposium: Intelligent Information Privacy Management.

[14]  Ben Laurie,et al.  Under)mining Privacy in Social Networks , 2008 .

[15]  Emiliano De Cristofaro,et al.  Private Information Disclosure from Web Searches , 2010, Privacy Enhancing Technologies.

[16]  Balachander Krishnamurthy,et al.  Characterizing privacy in online social networks , 2008, WOSN '08.

[17]  Privacy, Accountability and Trust – Challenges and Opportunities , 2011 .

[18]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[19]  Serge Gutwirth,et al.  Data Protection in a Profiled World , 2010, Data Protection in a Profiled World.

[20]  Lise Getoor,et al.  To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles , 2009, WWW '09.

[21]  Katja Hose,et al.  Partout: a distributed engine for efficient RDF processing , 2012, WWW.

[22]  John Krumm Ubiquitous Advertising: The Killer Application for the 21st Century , 2011, IEEE Pervasive Computing.

[23]  Dan Boneh,et al.  An Analysis of Private Browsing Modes in Modern Browsers , 2010, USENIX Security Symposium.

[24]  Peter Eckersley,et al.  How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.

[25]  Mirco Musolesi,et al.  Sensing meets mobile social networks: the design, implementation and evaluation of the CenceMe application , 2008, SenSys '08.

[26]  Emiliano Miluzzo,et al.  People-centric urban sensing , 2006, WICON '06.

[27]  Daniel Le Métayer Privacy by Design: A Matter of Choice , 2010, Data Protection in a Profiled World.

[28]  Evgeniy Gabrilovich,et al.  Introduction to Computational Advertising , 2008, ACL.

[29]  Balachander Krishnamurthy,et al.  Privacy Leakage in Mobile Online Social Networks , 2010, WOSN.

[30]  Greg Conti Googling Security: How Much Does Google Know About You? , 2008 .