How web tracking changes user agency in the age of Big Data: The used user

Big Data enhances the possibilities for storing personal data extracted from social media and web search on an unprecedented scale. This paper draws on the political economy of information which explains why the online industry fails to self-regulate, resulting in increasingly insidious web-tracking technologies. Content analysis of historical blogs and request for comments on HTTP cookies published by the Internet Engineering Task Force illustrates how cookie technology was introduced in the mid-1990s, amid stark warnings about increased system vulnerabilities and deceptive personal data extractions. In conclusion, online users today are left with few alternatives but to enter into unconscionable contracts about the extraction of their personal data when using the Internet for private purposes.

[1]  Óscar Muñoz-García,et al.  Detecting browser fingerprint evolution for identifying unique users , 2012, Int. J. Electron. Bus..

[2]  Vipin Kumar,et al.  Trends in big data analytics , 2014, J. Parallel Distributed Comput..

[3]  Joseph K. Liu,et al.  Toward efficient and privacy-preserving computing in big data era , 2014, IEEE Network.

[4]  Helmut Krcmar,et al.  Big Data , 2014, Wirtschaftsinf..

[5]  Steve Saxby,et al.  Identity crisis: Global challenges of identity protection in a networked world1 , 2014, Comput. Law Secur. Rev..

[6]  Elinor Ostrom,et al.  The Future of the Commons - Beyond Market Failure and Government Regulation , 2012 .

[7]  David M. Kristol,et al.  HTTP State Management Mechanism , 1997, RFC.

[8]  M. Barry Dumas,et al.  Principles of Computer Networks and Communications , 2008 .

[9]  Sylvia E. Peacock,et al.  Senior citizens and Internet technology , 2007, European journal of ageing.

[10]  T. G.,et al.  Logic in Practice , 1934, Nature.

[11]  Jaron Lanier,et al.  Who Owns the Future , 2013 .

[12]  Balachander Krishnamurthy,et al.  Measuring privacy loss and the impact of privacy protection in web browsing , 2007, SOUPS '07.

[13]  Cory Doctorow,et al.  Big data: Welcome to the petacentre , 2008, Nature.

[14]  Laura DeNardis,et al.  The global war for internet governance , 2014, WebSci '14.

[15]  Daniel R. Headrick The invisible weapon , 1991 .

[16]  Hovav Shacham,et al.  Pixel Perfect : Fingerprinting Canvas in HTML 5 , 2012 .

[17]  M. Anusha,et al.  Big Data-Survey , 2016 .

[18]  Jeffrey T. Hancock,et al.  Experimental evidence of massive-scale emotional contagion through social networks , 2014, Proceedings of the National Academy of Sciences.

[19]  Robert J. Kauffman,et al.  Understanding the paradigm shift to computational social science in the presence of big data , 2014, Decis. Support Syst..

[20]  Erez Lieberman Aiden,et al.  Uncharted: Big Data as a Lens on Human Culture , 2013 .

[21]  Robert Richards,et al.  Document Object Model (DOM) , 2006 .

[22]  James Q. Whitman The Two Western Cultures of Privacy: Dignity versus Liberty , 2004 .

[23]  C. E. Baker,et al.  Media, Markets, and Democracy: Frontmatter , 2001 .

[24]  E. G. Furubotn,et al.  Property Rights and Economic Theory: A Survey of Recent Literature , 1972 .

[25]  Herman T. Tavani,et al.  Diving into the bitstream : information technology meets society in a digital world , 2012 .

[26]  Robert O'Harrow,et al.  No place to hide , 1997, Science.

[27]  H. Künemund,et al.  Digitale Spaltung in Deutschland: geringere Bildung - seltener am PC , 2006 .

[28]  Richard Cumbley,et al.  Is "Big Data" creepy? , 2013, Comput. Law Secur. Rev..

[29]  Peter Eckersley,et al.  How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.

[30]  Marialaura Di Domenico,et al.  Market Research and the Ethics of Big Data , 2013 .

[31]  Saadi Lahlou,et al.  Identity, social status, privacy and face-keeping in digital society , 2008 .

[32]  Arvind Narayanan,et al.  The Web Never Forgets: Persistent Tracking Mechanisms in the Wild , 2014, CCS.

[33]  Gautam Shroff The Intelligent Web: Search, smart algorithms, and big data , 2013 .

[34]  J. Stewart No place to hide , 1996, Nature.

[35]  R Blackmon,et al.  The invisible weapon. , 2000, Healthcare Alabama.

[36]  Leanne Roderick,et al.  Discipline and Power in the Digital Age: The Case of the US Consumer Data Broker Industry , 2014 .

[37]  O. Gandy,et al.  Cultural Rights: Technology, Legality and Personality.@@@The Panoptic Sort: A Political Economy of Personal Information. , 1993 .

[38]  Martín Abadi,et al.  Host Fingerprinting and Tracking on the Web: Privacy and Security Implications , 2012, NDSS.

[39]  N. Helberger,et al.  Online tracking: questioning the power of informed consent , 2012 .

[40]  Chris Jay Hoofnagle,et al.  Flash Cookies and Privacy , 2009, AAAI Spring Symposium: Intelligent Information Privacy Management.

[41]  M. Harwood,et al.  Invasion of the Data Snatchers: Big Data and the Internet of Things Means Surveillance of Everything , 2014 .

[42]  Irene Pollach,et al.  What's wrong with online privacy policies? , 2007, CACM.