E-Mail Tracking in Online Marketing - Methods, Detection, and Usage

E-Mail tracking uses personalized links and pictures for gathering in- formation on user behavior, for example, where, when, on what kind of device, and how often an e-mail has been read. This information can be very useful for marketing purposes. On the other hand, privacy and security requirements of customers could be violated by tracking. This paper examines how e-mail track- ing works, how it can be detected automatically, and to what extent it is used in German e-commerce. We develop a detection model and software tool in order to collect and analyze more than 600 newsletter e-mails from companies of sev- eral different industries. The results show that the usage of e-mail tracking in Germany is prevalent but also varies depending on the industry.

[1]  Frank Piessens,et al.  FPDetective: dusting the web for fingerprinters , 2013, CCS.

[2]  John C. Mitchell,et al.  Third-Party Web Tracking: Policy and Technology , 2012, 2012 IEEE Symposium on Security and Privacy.

[3]  Martín Abadi,et al.  Host Fingerprinting and Tracking on the Web: Privacy and Security Implications , 2012, NDSS.

[4]  Avi Goldfarb,et al.  Privacy and Innovation , 2011, Innovation Policy and the Economy.

[5]  Hassan Takabi,et al.  Security and Privacy Risks of Using E-mail Address as an Identity , 2010, 2010 IEEE Second International Conference on Social Computing.

[6]  Alberto Bacchelli,et al.  Extracting Source Code from E-Mails , 2010, 2010 IEEE 18th International Conference on Program Comprehension.

[7]  Tomasz R. Surmacz,et al.  Reliability of e-mail delivery in the era of spam , 2007, 2nd International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX '07).

[8]  Roger Wattenhofer,et al.  BuzzTrack: topic detection and tracking in email , 2007, IUI '07.

[9]  Idit Keidar,et al.  Decentralized Electronic Mail , 2006, 26th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'06).

[10]  Benjamin Fabian,et al.  Emerging Markets for RFID Traces , 2006, ArXiv.

[11]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[12]  Eric Cole,et al.  Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives , 2005 .

[13]  Curtis R. Taylor Consumer Privacy and the Market for Customer Information , 2004 .

[14]  Hailin Wu,et al.  Hidden surveillance by Web sites: Web bugs in contemporary use , 2003, CACM.

[15]  Jussi Kangasharju,et al.  Secure and resilient peer-to-peer e-mail design and implementation , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[16]  Carl F. Mela,et al.  E-Customization , 2003 .

[17]  Journal of Marketing Research , 1968 .

[18]  Anca L. Ralescu,et al.  Confusion Matrix-based Feature Selection , 2011, MAICS.

[19]  Gillian R. Hayes,et al.  Information privacy in institutional and end-user tracking and recording technologies , 2009, Personal and Ubiquitous Computing.

[20]  Lars Becker Professionelles E-Mail-Management , 2009 .

[21]  Rolf Oppliger,et al.  Providing Certified Mail Services on the Internet , 2007, IEEE Security & Privacy.