Introduction Scientific goal – Investigate changing norms on personal data; identifying heavily targeted subgroups. Societal relevance – Information market.

Slides:



Advertisements
Similar presentations
* The Internet’s genesis - Defense Department project to create a network that could survive a nuclear conflict * The first users - Government agencies.
Advertisements

Behavior Tracking Dhaval Patel.
CIS 1310 – HTML & CSS Web Metrics Stats ’n Stuff.
Unit 1 - The Internet CSC CSC The Origin of the Internet  ARPANET  Advanced Research Projects Agency Network  Funded by the U.S. government.
Communications & Data Services The Evolution of Communications Cathy Avgiris EVP/GM May 10, 2012.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
Privacy Aziz Doumith Michael Kot Luis Pacheco Emory Petermann Wyatt Pierson Henry Stigler.
The Internet. What is the Internet?  The Internet is a network of networks.  It gives users access to a wide variety of information from millions of.
Router. Introduction A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work.
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
The Internet in Education Objectives Introduction Overview –The World Wide Web –Web Page v. Web Site v. Portal Unique and Compelling Characteristics Navigation.
PRIVACY BOOTCAMP YpJU.
S.E Peacock York University Social Science TRS 3-176, Session 4C Wednesday, July 29 10: :15
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Mark Levene, An Introduction to Search Engines and Web Navigation © Pearson Education Limited 2005 Slide 8.1 Chapter 8 : The Mobile Web Mobile computing.
Computer Concepts – Illustrated 8 th edition Unit A: Computer and Internet Basics.
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
Make It Easy For e-Buyers to Contact You Toll-free phone numbers Call centers Text messaging Instant chat 1.
CHAPTER 9 Using the World Wide Web. OBJECTIVES 1.Describe the Internet and the World Wide Web 2.Define related Internet terms 3.Explain the components.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
A Quick and Easy Guide to Skype Amazing Aardvarks of Alliteration Alex Hood Alex Huang John Milne Aaron Zell.
Canadian Advertising in Action, 6th ed. Keith J. Tuckwell ©2003 Pearson Education Canada Inc Elements of the Internet World Wide Web World.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
The Internet CSC September 30, History of the Internet Developed for secure military communications Evolved from Advanced Research Projects.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Will Social Features Make Sexy Again? By: Kevin Delaney and Vauhini Vara Presented By: Nathan Miller, Amy Murray, Megan Monaco, Michelle Nicol.
The Internet Teaching Learning Seminar Computer Studies.
THE INTERNET. TABLE OF CONTENT CONNECTING TO THE INTERNET ELECTRONIC MAIL WORLD WIDE WEB INTERNET SERVICES.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 Internet II A consortium of more than 180 universities, government agencies, and private businesses.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
science/internet-intro
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Chapter 1: Internet Marketing Foundations. Chapter Objectives Describe how computers and servers communicate to enable people to interact with webpages.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Online Ad Management & Your New Marketing Secret Weapon.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Christian Citizenship in a Digital World Lesson 2: Personal Identity: Your brand and reputation Your brand and reputation.
Internet Business Associate v2.0
Facebook privacy policy
Date: April. 13, Monday Evening.
Instructor Materials Chapter 5 Providing Network Services
HTTP and Abstraction on the Internet
To the ETS – Accounts Setup and Preferences Online Training Course
IT Security  .
The Internet Industry Week Two.
Introduction to Computers
3.04 Understand the use of direct marketing to attract attention and to build a brand.
A Digital Tool for the Classroom
Application of the Internet
Introduction to Computers
Social Media Cybersafety.
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
What is the Internet? Global system of interconnected computer networks – a network of networks! Hartland Consolidated Schools network Network at your.
ONE® Pages Training Presentation
Web Design & Development
THREE TIER MOBILE COMPUTING ARCHITECTURE
Lesson 2: Internet Communication
E-commerce Infrastructure Web Servers / Web Clients / Web Browsers
ICT Communications Lesson 3: Internet Life and Privacy
To the ETS – Accounts Setup and Preferences Online Training Course
Educational Computing
Internet Applications & Programming
Security of People, Property and Information
The Internet and Electronic mail
Internet and the world wide web (www)
Seminar-2019 CONDUCTED BY:- Gayatri institute of computer management TOPIC:-INFORMATION IS WEAlTH UNDER THE GUIDANCE OF:- BIBEK SIR PRESENTED BY:- SHAIK.
Presentation transcript:

Introduction Scientific goal – Investigate changing norms on personal data; identifying heavily targeted subgroups. Societal relevance – Information market failure. Research questions – What does big data mean for online agency? Who is being tracked ? Theoretical Basis – The Political Economy of the Information Market. Key findings – On the web, online agents act in an environment of market failure; online agents agree to unconscionable contracts regarding the extraction and use of their personal data. Questions for you: What is your opinion on cookie technology? Have you ever heard of flashcookies? Evercookies? Browser fingerprinting? Canvas fingerprinting? How much of your personal data would like to have erased by social media or search companies? How many profiles would you choose if you could have multiple identities online? Methods content analysis of the online discussions in the IETF subgroup on HTML cookies and RFCs on HTTP State Management ( ); multiple regression analysis; explorative analysis on newer web tracking technology; What Happens When You Use VoIP? “Skype may gather and use information about you, including (but not limited to) information in the following categories:” Multivariate Results Young(ish) people are more often racked (that is significant and linear). Higher educated higher income people are more often tracked (very straightforward). People with a paid job are less often tracked (seems to be changing, needs further check - so pls do not cite). **** Conclusions Online information market tends to display symptoms of market failure. Self-regulation is impossible because it would severely disadvantage a company. Unconscionable contracts are the only choice online users have. Web tracking leads to unequally targeted online populations. Sylvia E. Peacock Department of Social Science, York University, Toronto, Canada Literature cited Barth, Adam HTTP State Management Mechanism. RFC Online available at [accessed July 2014]. Kristol, David M., Montulli, Lou HTTP State Management Mechanism. RFC 2109, online available at Kristol, David M., Montulli, Lou HTTP State Management Mechanism. RFC 2965, online available at [accessed July 2014]. Peacock, Sylvia E What is Kind Midas Doing Online? User Agency in the Age of Big Data. Conference Presentation Atiner Conference, Athens, Greese, July Peacock, Sylvia E The Used User: Online Agency in the Age of Big Data. Submitted Manuscript. Skype Privacy Policy (July/2014) Data information Statistics Canada Canadian Internet Use Survey Machine readable data file. Statistics Canada Canadian Internet Use Survey Machine readable data file. URL URL wg-old/ © Basic poster template by Colin Purrington. Behavioral data Cookies, usage statistics, products and services ordered and delivered, statistics on page views, calling destinations; traffic data, i.e., duration of call, number calling, number called, content of instant messages, voice messages, video messages; access to other accounts on facebook, videos, Microsoft accounts, , i.e. the electronic key provided by the services that acts in place of a password for authentication; Data about personal service provider Bandwidth, address, IP address, phone number, mobile network, cell phone number, hotspot detection, error reports; Personal property data Computer type, computer capability, operating system, browser type, cell phone device model, manufacturer name, mobile operating system, cell usage, router device, router capability, connection information; Personal data Name, user ID, age, gender, language, list of contacts, Financial data Credit card number, banking information The VoIP User Source: skype.com/en/legal/privacy (July/2014) and Gingerbread man: veryicon.com/icons/holiday/christmas/ginger-man.html