Itay Gonshorovitz Foundation of privacy Targeted Online Advertising.

Slides:



Advertisements
Similar presentations
E-Business and e-Commerce. e-commerce and e-business e-commerce refers to aspects of online business involving exchanges among customers, business partners.
Advertisements

tyBit, Inc all rights reserved.
The Internet and the Web
Banner Ad Delivery. Components of a Website Ads Content.
Data Mining and Text Analytics Advertising Laura Quinn.
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
Ankit Mehta 1. Brief history of online advertising May 1978: First Marketing Spam form DEC Marketing representative. 1994: First banner ad by AT&T on.
Online Privacy and Codes of Conduct Peter Fleischer Global Privacy Counsel my personal blog:
■ Google’s Ad Distribution Network ■ Primary Benefits of AdWords ■ Online Advertising Stats and Trends ■ Appendix: Basic AdWords Features ■ Introduction.
Consumers & Online Privacy: Agenda Background and objectives General attitudes to the internet Attitudes to online data and privacy Attitudes to.
Over 60% of the U.S. population is online with over 170 million users in the United States! The Internet is viewed more than the newspaper industry and.
The Evolution of Online Advertisement Casey Shannon CompSci 49S February 21, 2008.
The process of increasing the amount of visitors to a website by ranking high in the search results of a search engine.
Mapping Online Advertising: From Anxiety to Method Fernando Bermejo Fellow, Berkman Center for Internet & Society, Harvard University January 12th, 2010.
Lecture 20: Privacy in Online Social Networks Xiaowei Yang.
Analysis of Privacy Jim McCann & Daniel Kuo EECS 598.
Competition for Google AdWords A P EEP 142 4/13/06.
Internet Cookies: Changing Internet Use and Privacy Lindsay Maidment & Katherine Hollander November 8, 2006.
Lecture 21: Privacy and Online Advertising. References Challenges in Measuring Online Advertising Systems by Saikat Guha, Bin Cheng, and Paul Francis.
The Google Display Network. Why Display Matters.
CLICK FRAUD Alexander Tuzhilin By Vinny Rey. Why was the study done? Google was getting sued by advertisers because of click fraud. Google agreed to have.
© 2006 Pearson Education Canada Inc Canadian Advertising in Action Chapter 12 Internet Communications.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP does not maintain state. State Information can be passed using: HTTP Headers.
Google Online Marketing Challenge (GOMC)
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
Affiliate Marketing. What is Affiliate Marketing Type of performance-based marketing that rewards affiliates for generating leads or sales. The most common.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
Web Science & Technologies University of Koblenz ▪ Landau, Germany Online Advertising Steffen Staab.
PRIVAD: PRACTICAL PRIVACY IN ONLINE ADVERTISING Offense: Arindam Paul.
How It Applies In A Virtual World
Banner Advertising Banner Ads 4 The oldest, most common online advertising tool. 4 The first Banner Ads appeared at wired.com –first advertisers (14)
Behavior Tracking Dhaval Patel.
HTTP: cookies and advertising Concepts to cover:  web page content (including ads) from multiple site: composition at client  cookies  third-party cookies:
Guilherme Bersani A quick look at WEB ADVERTISING.
Alexander Consulting Enterprise 9/7/2015 Marketing Research in Global Markets Why Bother?
Copyright © 2009 Pearson Education, Inc. Slide 6-1 Chapter 6 E-commerce Marketing Concepts.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 49 The Dangers of Spyware and Phishing.
Click Fraud Forensics Dean Qudah Pace University DPS 2010.
Electronic CommerceNonhlanhla Shongwe  Introduction  Mission statement  Product  Business model  SWOT Analysis  Conclusion.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Privacy-Aware Personalization for Mobile Advertising
Lalit Sharma, JIM E-commerce Marketing Communications.
By William Cook.  How the internet works  How companies pay their bills  How to privately browse the internet.
Canadian Advertising in Action, 6th ed. Keith J. Tuckwell ©2003 Pearson Education Canada Inc Elements of the Internet World Wide Web World.
Protecting Students on the School Computer Network Enfield High School.
Online Advertising Core Concepts are Identical to traditional advertising: –Building Brand Awareness –Creating Consumer Demand –Informing Consumers of.
9-1 Chapter 9 The Internet.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP Headers Client IP Address HTTP User Login FAT URLs Cookies.
Chapter Twelve Digital Interactive Media Arens|Schaefer|Weigold Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
DIGITAL ADVERTISING Standard 4. THE ROLE OF DIGITAL ADVERTISING IS TO INCREASE SALES OR IMPROVE BRAND AWARENESS.
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
The World Wide Web. What is the worldwide web? The content of the worldwide web is held on individual pages which are gathered together to form websites.
Online Marketing. Types Marketing Link Building Content Marketing Search Engine Optimization(SEO) Social Media Marketing Advertising.
Chapter 4: Marketing on the Web. 2 How do you reach customers? Identify groups of potential customers Select the appropriate media Build the right message.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Computer Concepts 2014 Chapter 7 The Web and .
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
Chapter 1: Internet Marketing Foundations. Chapter Objectives Describe how computers and servers communicate to enable people to interact with webpages.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
1 DATA-DRIVEN SOLUTIONS. 2 KEYWORD-LEVEL SEARCH RETARGETING TARGET USERS BASED ON THEIR RECENT SEARCH HISTORY AND SEARCH QUERIES. A user performs a search.
The Google Display Network. Why Display Matters..
Some from Chapter 11.9 – “Web” 4 th edition and SY306 Web and Databases for Cyber Operations Cookies and.
Section A: Web Technology
Automated ad placement
Internet Advertising.
563.10: Bloom Cookies Web Search Personalization without User Tracking
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
E-Commerce and Social Networks
Presentation transcript:

Itay Gonshorovitz Foundation of privacy Targeted Online Advertising

Topics  Introduction to online advertisement  Understanding the participants and their roles.  Targeted advertising.  Privacy Issues  Solutions  User based solutions  Collaborative solutions  Conclusions

Introduction  Online Advertising plays a critically important role in the Internet world.  advertising is the main way of profiting from the Internet, the history of Internet advertising developed alongside the growth of the medium itself

Facts and short history  First internet banner, 1994, AT&T.  Also in 1994, the first commercial spam, a "Green Card Lottery".  The first ad server was developed by FocaLink Media Services and introduced on  In March 2008, Google acquired DoubleClick for US$3.1 billion in cash.

Parties  Advertiser  Got money, wants publicity  e.g., Coca-Cola  Publisher  Got content, wants money  Cnn.com  Ad-network  Got advertising infrastructure, wants money  e.g., Google AdSense, Yahoo  Consumer  Wants free content

Ad embedding

Business Model  CPM = Cost Per thousand impressions  Impression: user just sees the ad.  Rates vary from $0.25 to $100  CPC = Cost Per Click  This is the cost charged to an advertiser every time their ad is "clicked" on  Rates around 0.3$ per click

Click fraud  clicking on an ad for the purpose of generating a charge per click without having actual interest.  Might be:  The publisher  Advertiser’s competitor  The publisher’s competitor  Ad-networks deal with it by trying to identify who clicks on the ads.

Online behavioral advertising  Online behavioral advertising refers to the practice of ad-networks tracking users across web sites in order to learn user interests and preferences.  Benefits  Advertisers targets a more focused audience which increases the effectively.  Consumer is “bothered” by more relevant and interesting ads.

How ad-networks match ads  Most behavioral targeting systems work by categorizing users into one or more audience segments.  Profiling users based on collected data  Search history – analyzing search keywords  Browse history - analyzing content of visited pages  Purchase history  Social networks  Geography

How Ad-Networks track users  Cookies  3 rd Party cookies  Flash cookies  Web bug  IP address  User-agent Headers  Browser + OS  More than 24,000 signatures

Levis.com case study

Privacy  Tracking and categorizing users by the ad-networks tend to violate user’s privacy.  The gathered information, linked with the users real identity, form a violation of privacy in its most basic form.  For example, if a person is searching the web for information on a serious genetic disease, that information can be collected and stored along with that consumer's other information - including information that can uniquely identify the consumer.

So… What we have so far?  User - Preserve his privacy  Ad-Network & Publisher –  Maintain targeting and preserve their effectiveness and income  Still want to be able to fight click fraud  Questions:  Do the two goals necessarily conflict?  Or can they be both achieved?

Naive (paranoid) solution  Surf only across anonymizing proxies.  TOR  Surf in private mode  Advantages  Effective from the user’s perspective.  Disadvantages  Are proxies really anonymizing?  Very awkward  Slower  Damages targeted advertising

TrackMeNot (Howe, Nissenbaum, 2005)  Implemented as a Firefox plugin.  Achieves privacy through obfuscation.  Generates noisy queries.  Starts with fixed a seed query list and evolve queries base on previous results.  Mimics user behavior so fake queries be indistinguishable:  Query timing  Click through behavior

TrackMeNot  Advantages  Simple  Disadvantages  Still the real queries can be connected to real identity.  Might have problems with offensive contents.  Again, damages targeted advertising

Privad (Guha, Reznichenko, Tang, et al., 2009)  Require client software:  saves locally database of ads (served by the ad-network)  Learn user interests in order to match ads.  Match add from the local database according to the User interests.

Privad  Introduce new party – Dealer:  Proxies anonymously all communication between the user and the ad-network.  might be government regulatory agency.  hides user’s identity from the ad-network, but itself does not learn any profile information about the user since all messages between the user and ad-network are encrypted.

Privad  Advantages  Ad-Networks can still target ads without violates user privacy.  Disadvantages  Complicated to add the new party.  Ad-Network has to trust the dealer in order to fight click-fraud which might unmotivated them to cooperate.

Adnostic (Toubina, Narayanan, Boneh, et al., 2009)  Two party solution:  Client side: Implemented as a Firefox plugin.  Server side: requires Ad-Network support  User’s preferences and interests are stored locally by the plugin, instead of at the Ad-network.  The targeted ad is selected by the plugin locally at the users computer, instead of at the Ad-Network servers.

Adnostic - Accounting  “charge per click” model remains unchanged.  “charge per impression” is harder.  It uses homomorphic encryption scheme.  given the public key and ciphertexts, anyone can calculate  given the public key and ciphertexts, and scalar c, can be calculated.

Adnostic - charge per impression protocol  Client: Track user activity and maintains the data locally.  Visits an Ad supported website.  Server: Sends a list of n ads ids along with public key  The browser chooses an ad to display to the user. Then creates that matches the selected ad, then send, Along with zero-knowledge proof that and each is 0 or 1.

Adnostic - charge per impression protocol  Validates the proof. If the proof is valid then using homomorphic encryption calculates when c is the price of viewing the ad.  The server save encrypted counter for each ad and add to it the previous values. Only one counter’s real value change.  At the end of the billing period, say a month, each counter is decrypted (should be done by trusted authority) and the advertisers pays for the ad- network.

Adnostic  Advantages  Ad-networks can still target ads without violates user privacy.  Ad-networks can still detect click fraud though it will be difficult without gathering information on IP even for a short time.  Disadvantages  Ad-networks become weaker.  Ad-networks can still track user if they are willing to, and the protocol is built on trust.

Conclusions  In my opinion, It is hard to believe that ad-networks will give up the power of tracking users without legislation.  Nevertheless, There are reasonable solutions that still support targeted advertising without violating users privacy.

Questions?

References  [1] Daniel c. Howe and Helen Nissenbaum. Trackmenot: resisting surveillance in web search  [2] Saikat Guha, Bin Cheng, Alexey Reznichenko, Hamed Haddadi, and Paul Francis. Privad: Rearchitecting online advertising for privacy  [3] Vincent Toubiana, Arvind Narayanan Dan Boneh, Helen Nissenbaum, and Solon Barocas. Adnostic: Privacy preserving targeted advertising  [4] Catherine Dwyer. Behavioral targeting: A case study of consumer tracking on levis.com. In 15th Americas Conference on Information Systems,