This work was supported by the TRUST Center (NSF award number CCF-0424422) 1 Introduction Within the last few years, online advertisement companies have.

Slides:



Advertisements
Similar presentations
Protecting Browser State from Web Privacy Attacks Collin Jackson, Andrew Bortz, Dan Boneh, John Mitchell Stanford University.
Advertisements

The Internet and the Web
This work was supported by the TRUST Center (NSF award number CCF ) Background In order to subsidize free services to consumers, web sites often.
Online Privacy and Codes of Conduct Peter Fleischer Global Privacy Counsel my personal blog:
On the Privacy of Private Browsing Kiavash Satvat, Matt Forshaw, Feng Hao, Ehsan Toreini Newcastle University DPM’13.
PUBLISHER INTRODUCTION
Georgios Kontaxis, Michalis Polychronakis Angelos D. Keromytis, Evangelos P. Markatos Siddhant Ujjain (2009cs10219) Deepak Sharma (2009cs10185)
Third Party Web Tracking Policy and Technology based on the paper of Jonathan R. Mayer and John C. Mitchell Stanford University Stanford, CA
Consumers & Online Privacy: Agenda Background and objectives General attitudes to the internet Attitudes to online data and privacy Attitudes to.
SciVal Experts & SciVal Funding Information Sessions.
Mapping Online Advertising: From Anxiety to Method Fernando Bermejo Fellow, Berkman Center for Internet & Society, Harvard University January 12th, 2010.
WRITE MARKETING COPY and EXECUTE TARGETED S 3.07.
3 rd Party Data & Audience Targeting © All rights reserved. 3 rd Party Data – Collected both online and offline by 3 rd party data companies such.
Project Proposal: Academic Job Market and Application Tracker Website Project designed by: Cengiz Gunay Client: Cengiz Gunay Audience: PhD candidates and.
HTTP: cookies and advertising Concepts to cover:  web page content (including ads) from multiple site: composition at client  cookies  third-party cookies:
By: Justin Mauss Privacy vs. Convenience. Agenda Finding the Balance: Privacy vs. Convenience Revisit Privacy vs. Convenience Overview of Online Tracking.
This work was supported by the TRUST Center (NSF award number CCF ) Methods Data Collection: 1. Start Sever on the host OS: This creates a sanitized.
This work was supported by the TRUST Center (NSF award number CCF ) Introduction In 1995 Mary J. Culnan stated that ‘fair information practices.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
This work was supported by the TRUST Center (NSF award number CCF ) Third Party Information Sharing Disclosure Practices Cody Rigney – Youngstown.
Copyright © 2009 Pearson Education, Inc. Slide 6-1 Chapter 6 E-commerce Marketing Concepts.
Tom Clarke VP, Research & Technology National Center for State Courts.
Pre-Programmatic automated buying model The Ad Network Model Aggregate and automated media buying across websites AD Advertising agency Advertiser.
WEB ANALYTICS ECOMMERCE SOCIAL MEDIA SEARCH ENGINE OPTIMIZATIO PAY PER CLICK MANAGEMENT EFFECTIVE WEBSITE COPY.
I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser Xiang Pan §, Yinzhi Cao †,
Search Engine Optimization ext 304 media-connection.com The process affecting the visibility of a website across various search engines to.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
Gaurav Aggarwal and Elie Bursztein, Collin Jackson, Dan Boneh, USENIX (Aug.,2010) A N A NALYSIS OF P RIVATE B ROWSING M ODES IN M ODERN B ROWSERS 1.
Cloak and Dagger: Dynamics of Web Search Cloaking David Y. Wang, Stefan Savage, and Geoffrey M. Voelker University of California, San Diego 左昌國 Seminar.
MIS – 3030 Business Technologies Social Media & Conversation Big Data.
AppNexus Classroom Training Demand-Side Setup Intended Audience: Buyers new to AppNexus Console v11. July 26, 2012.
Privacy Debate: Urgent Issue or Industry Hype? Getting Better all the time Can’t get no worse Bridging the Alan Chapell.
BEHAVIORAL TARGETING IN ADVERTISING By Rita Aliperti.
Hidden Surveillance by Consumer Health Information Websites Jacquelyn Burkell and Alexandre Fortier Faculty of Information and Media Studies University.
The Top 100 Online Resources for Business Growth A guide for business and marketing professionals to some of the most popular resources on the web for.
January 20, 2012 UK Specific Information Ad Choices AOL Advertising.
In 8 Minutes SocialSimple Personalize Your Web Through Social Networking.
© 2009 Eyeblaster. All rights reserved Presented by: Geoffrey King ● Sales Engineering APAC ● September 2009 Tracking Conversions.
© Copyright 2008 STI INNSBRUCK Collusion Discover who is tracking you online.
Final Presentation: CrunchTime 5/9/11. Outline  Introduction  Previous Work  Track & Recording  Pseudocode  SQlite  Blocking  Interface  Monetization.
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
Copyright The Asian Banker All rights reserved Channel Mgmt/Distribution Copyright The Asian Banker All rights reserved 1/8 Asian Banker.
1 DATA-DRIVEN SOLUTIONS. 2 KEYWORD-LEVEL SEARCH RETARGETING TARGET USERS BASED ON THEIR RECENT SEARCH HISTORY AND SEARCH QUERIES. A user performs a search.
1 Privacy & Preference Committee Update Ensuring a healthy ecosystem via transparency & trust Date: January 13, 2009 Alan Chapell, President.
May 9th, 2015 Market Research Describe the purpose of marketing research.
Applications of Big Data Analytics. Introduction ●Big data is an evolving term, and it consists of high volume of structured, semi-structured and unstructured.
Advertisements & Ad Blocking Technology By: Daniel Jackson.
Some from Chapter 11.9 – “Web” 4 th edition and SY306 Web and Databases for Cyber Operations Cookies and.
FOR TROUBLESHOOTING TIPS, CALL MOZILLA FIREFOX HELPLINE NUMBER | | TOLL FREE USA Firefox Focus- A New Private Browser for Android & iOS.
The Invisible Trail: Third-Party Tracking on the Web
Automated Experiments on Ad Privacy Settings
Automated ad placement
The Internet Industry Week Two.
Ad-blocker circumvention System
Radio: The Online Multiplier
Transform Billing Data Into Business Intelligence
Practical Censorship Evasion Leveraging Content Delivery Networks
WRITE MARKETING COPY and EXECUTE TARGETED S
Latest Updates on BlackHawk Mines Music : Privacy Policy
Digital Analytics Best Practices for Financial Services Environments
Blinkfire Analytics Uses the Microsoft Azure Cloud Platform’s Power to Recognize and Measure Media Value and Impact for Teams, Leagues, and Brands MICROSOFT.
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
INTRODUCTION DIGITAL MARKETINGDIGITAL MARKETING IS A WAY OF MARKETING THE BRANDS OR THINGS BY USING DIGITAL MEDIA SUCH AS MOBILE PHONES, INTERNET, COMPUTERS.
Project 1 – Twitter Slang Term Extraction
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Unit 27 Web Server Scripting Extended Diploma in ICT
Introducing Qwory, a Business-to-Business Search Engine That’s Powered by Microsoft Azure and Detects Vital Contact Information for Businesses MICROSOFT.
Firefox focus Lana Marinculic.
What is E- marketing? Internet marketing is any marketing activity that is connected online through the use of Internet technologies.
TRANCO: A Research-Oriented Top Sites Ranking Hardened Against Manipulation By Prudhvi raju G id:
Presentation transcript:

This work was supported by the TRUST Center (NSF award number CCF ) 1 Introduction Within the last few years, online advertisement companies have switched their business models to include the emerging concept of third party tracking. In its most basic concept, third party tracking allows advertisers to follow users across multiple websites that are a part of their network or a partnering company’s network. This allows advertisers to use techniques that map online activities into segments of ads that are likely more relevant to convert into a sale. Third party tracking is also used for advertisement analytics, frequency capping, and various other details. Prior studies on the online advertising industry often fail to provide consistency or reliability because the measurement platforms used differ between research laboratories. Using a properly instrumented browser that is able to detect a myriad of dynamic web content solves this issue of inconsistency. Using the open sourced community platform, FourthParty, initially developed by Stanford researcher Jonathan Mayer solved those caveats. The platform was built using Mozilla Firefox’s Addon-SDK, designed to work with production versions of Firefox 4.0 and up. The platform dumps dynamic content that is recorded into a SQLite Database to be later analyzed. For the studies below, the MozMil automation extension for Firefox was used to crawl the desired Alexa Top Websites list 2. Opt Out Behaviour and the DNT header Prior research has shown that that the NAI opt-out program confuses most consumers and that only half of member companies go beyond the NAI commitment in their privacy policy and promise to stop tracking after a user opts out. We conducted an experiment to measure how many NAI members leave tracking cookies in place after a user opts out. We also measured how many NAI members respond to the Do Not Track header, a new opt-out mechanism opposed by the online advertising industry. Methodology Identify tracking content from NAI members Load tracking content in fresh session Load tracking content after opting out Load tracking content using DNT header 4. Limitations of Browser Instrumentation When dealing with some third party content and the methods in which that content is served, incomplete data may result. This was the case in experimenting with the platforms ability to detect the presence of the AdChoices program on various websites and advertisements. Because of this caveat, a manual method was used to collect the data. Methodology Manually Inspect Alexa USA 500 Take note of ad count, ad position, AdChoices affiliation, ad size, and AdChoices icon size Take screenshot of website 4. Final Notes The uses of proper browser instrumentation on a readily available and popular production browser gives researchers the opportunity to measure different types of online dynamic content without the need to spend time modifying non-production browsers. This allows for consistency in results and a better focus on the study of data in place of the actual collection of data. The case studies provided show various examples on how data collected using this method can be used. Understanding Web Advertising Privacy Through Browser Instrumentation By: Jovanni Hernandez Mentor: Jonathan Mayer Faculty Advisor: John Mitchell, PhD When compared to CMU CyLab Categorization, seven companies in potential violation of privacy policies: Net Mining Wall Street on Demand 24/7 Real Media AdConian NetMining Undertone Vibrant Media 3. Effectiveness of TPLs Tracking protection lists are community or organization maintained lists designed to protect consumer privacy by blocking third party content using whitelists or blacklists. Methodology Crawl Alex 1k, each website in new private browsing session, using: EasyPrivacy EasyList EasyList & EasyPrivacy PrivacyChoice List 2 Abine Vanilla (2x) Filter data to show known tracking domains (PrivacyChoice) Filter cookies removing non-uniquely identifying cookies, session cookies, and interest segments