E-Mail Tracking in Online Marketing - Methods, Detection, and Usage
暂无分享,去创建一个
[1] Frank Piessens,et al. FPDetective: dusting the web for fingerprinters , 2013, CCS.
[2] John C. Mitchell,et al. Third-Party Web Tracking: Policy and Technology , 2012, 2012 IEEE Symposium on Security and Privacy.
[3] Martín Abadi,et al. Host Fingerprinting and Tracking on the Web: Privacy and Security Implications , 2012, NDSS.
[4] Avi Goldfarb,et al. Privacy and Innovation , 2011, Innovation Policy and the Economy.
[5] Hassan Takabi,et al. Security and Privacy Risks of Using E-mail Address as an Identity , 2010, 2010 IEEE Second International Conference on Social Computing.
[6] Alberto Bacchelli,et al. Extracting Source Code from E-Mails , 2010, 2010 IEEE 18th International Conference on Program Comprehension.
[7] Tomasz R. Surmacz,et al. Reliability of e-mail delivery in the era of spam , 2007, 2nd International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX '07).
[8] Roger Wattenhofer,et al. BuzzTrack: topic detection and tracking in email , 2007, IUI '07.
[9] Idit Keidar,et al. Decentralized Electronic Mail , 2006, 26th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'06).
[10] Benjamin Fabian,et al. Emerging Markets for RFID Traces , 2006, ArXiv.
[11] Mayuram S. Krishnan,et al. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..
[12] Eric Cole,et al. Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives , 2005 .
[13] Curtis R. Taylor. Consumer Privacy and the Market for Customer Information , 2004 .
[14] Hailin Wu,et al. Hidden surveillance by Web sites: Web bugs in contemporary use , 2003, CACM.
[15] Jussi Kangasharju,et al. Secure and resilient peer-to-peer e-mail design and implementation , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[16] Carl F. Mela,et al. E-Customization , 2003 .
[17] Journal of Marketing Research , 1968 .
[18] Anca L. Ralescu,et al. Confusion Matrix-based Feature Selection , 2011, MAICS.
[19] Gillian R. Hayes,et al. Information privacy in institutional and end-user tracking and recording technologies , 2009, Personal and Ubiquitous Computing.
[20] Lars Becker. Professionelles E-Mail-Management , 2009 .
[21] Rolf Oppliger,et al. Providing Certified Mail Services on the Internet , 2007, IEEE Security & Privacy.