1,173
Views
3
CrossRef citations to date
0
Altmetric
Articles

On web user tracking of browsing patterns for personalised advertising

, &
Pages 502-521 | Received 30 Oct 2016, Accepted 11 Jan 2017, Published online: 19 Feb 2017

References

  • Puglisi S, Rebollo-Monedero D, Forné J. On web user tracking: how third-party http requests track users’ browsing patterns for personalised advertising. 2016 Mediterranean Ad Hoc Networking Workshop Med-Hoc-Net. New York (NY): IEEE; 2016.
  • Puglisi S, Rebollo-Monedero D, Forné J. You never surf alone. Ubiquitous tracking of users? browsing habits, International Workshop on Data Privacy Management. Berlin: Springer; 2015. p. 273–280.
  • Michael K, Clarke R. Location and tracking of mobile devices: überveillance stalks the streets. Comput Law Secur Rev. 2013;29:216–228.
  • Veeningen M, Piepoli A, Zannone N. Are on-line personae really unlinkable? Data privacy management and autonomous spontaneous security. Berlin: Springer; 2014. p. 369–379.
  • Getoor L, Machanavajjhala A. Entity resolution: theory, practice & open challenges. Proc VLDB Endowment. 2012;5:2018–2019.
  • Eckersley P. Panopticlick. International Symposium on Privacy Enhancing Technologies Symposium. Berlin: Springer; 2010. p. 1–18.
  • Boda K, Földes ÁM, Gulyás GG, et al. User tracking on the web via cross-browser fingerprinting. Information security technology for applications. Berlin: Springer; 2012. p. 31–46.
  • Mowery K, Bogenreif D, Yilek S, et al. Fingerprinting information in javascript implementations. Proc W2SP. 2011;2:180–193.
  • Castelluccia C. Behavioural tracking on the internet: a technical perspective. European data protection: in good health? Berlin: Springer; 2012. p. 21–33.
  • Rao A, Schaub F, Sadeh N. What do they know about me? contents and concerns of online behavioral profiles. Sixth ASE International Conference Privacy, Security, Risk and Trust (PASSAT?14). 2014.
  • Kalavri V, Blackburn J, Varvello M, et al. Like a pack of wolves: community structure of web trackers. International Conference on Passive and Active Network Measurement. Berlin: Springer; 2016. p. 42–54.
  • Schelter S, Kunegis J. Tracking the trackers: a large-scale analysis of embedded web trackers. Tenth International AAAI Conference on Web and Social Media. 2016. p. 679–682.
  • Gomer R, Mendes Rodrigues E, Milic-Frayling N, et al. Network analysis of third party tracking: user exposure to tracking cookies through search. EEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) 2013. Vol. 1. IEEE Computer Society; 2013. p. 549–556.
  • Barrat A, Barthelemy M, Pastor-Satorras R, et al. The architecture of complex weighted networks. Proc Nat Acad Sci USA. 2004;101:3747–3752.
  • Pastor-Satorras R, Vázquez A, Vespignani A. Dynamical and correlation properties of the internet. Phys Rev Lett. 2001;87:258701.
  • Maslov S, Sneppen K. Specificity and stability in topology of protein networks. Science. 2002;296:910–913.
  • Newman ME. Assortative mixing in networks. Phys Rev Lett. 2002;89:208701.
  • Holland PW, Laskey KB, Leinhardt S. Stochastic blockmodels: first steps. Soc Networks. 1983;5:109–137.
  • Faust K, Wasserman S. Blockmodels: interpretation and evaluation. Soc Networks. 1992;14:5–61.
  • Peixoto TP. Entropy of stochastic blockmodel ensembles. Phys Rev E. 2012;85:056122.
  • Peixoto TP. Hierarchical block structures and high-resolution model selection in large networks. Phys Rev X. 2014;4:011047.
  • Peixoto TP. Efficient monte carlo and greedy heuristic for the inference of stochastic block models. Phys Rev E. 2014;89:012804.
  • Privacy badger. Available from: https://protect-us.mimecast.com/s/ln5jbru43zdntn?domain=eff.org
  • Mozilla lightbeam. Available from: https://protect-us.mimecast.com/s/rx4mbru8obvocv?domain=mozilla.org
  • Ghostery. Available from: https://protect-us.mimecast.com/s/mmgybrsrvalysl?domain=ghostery.com
  • Adblock. Available from: https://protect-us.mimecast.com/s/pv3wbrulm1lqsg?domain=adblockplus.org
  • Degeling M, Herrmann T. Your interests according to google-a profile-centered analysis for obfuscation of online tracking profiles. 2016. arXiv preprint arXiv:1601.06371.
  • Ard B. Confidentiality and the problem of third parties: protecting reader privacy in the age of intermediaries. Yale J Law Tech. 2015;16(1):1.
  • Parra-Arnau J, Rebollo-Monedero D, Forné J, et al. Optimal tag suppression for privacy protection in the semantic Web Data. Knowl Eng. 2012;81–82:46–66. DOI:10.1016/j.datak.2012.07.004.
  • Parra-Arnau J, Perego A, Ferrari E, et al. Privacy-preserving enhanced collaborative tagging. IEEE Trans Knowl Data Eng. 2014;26:180–193. DOI:10.1109/TKDE.2012.248.
  • Open directory project. Available from: http://www.dmoz.com
  • Parra-Arnau J, Rebollo-Monedero D, Forné J. Measuring the privacy of user profiles in personalized information systems. Future Gener Comput Syst. 2014;33:53–63.
  • Rebollo-Monedero D, Parra-Arnau J, Forné J. An information-theoretic privacy criterion for query forgery in information retrieval. International Conference on Security Technology. Berlin: Springer; 2011. p. 146–154
  • Peixoto TP. Parsimonious module inference in large networks. Phys Rev Lett. 2013;110:148701.
  • Rose S, Engel D, Cramer N, et al. Automatic keyword extraction from individual documents. Text Min. 2010;1–20.
  • Noldus R, Van Mieghem P. Assortativity in complex networks. J Complex Networks. 2015;cnv005.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.