Third-party web tracking: Policy and technology

JR Mayer, JC Mitchell - 2012 IEEE symposium on security and …, 2012 - ieeexplore.ieee.org
In the early days of the web, content was designed and hosted by a single person, group, or
organization. No longer. Webpages are increasingly composed of content from myriad …

[HTML][HTML] Control de nuestros datos personales en la era del big data: el caso del rastreo web de terceros

LD González Guerrero - Estudios Socio-Jurídicos, 2019 - scielo.org.co
Cientos de corredores de datos instalan tecnologías de rastreo en la web para monitorear la
navegación de las personas, lo que se conoce como rastreo web de terceros. Este artículo …

Cross-device tracking: Measurement and disclosures

J Brookman, P Rouge, A Alva… - Proceedings on Privacy …, 2017 - petsymposium.org
Internet advertising and analytics technology companies are increasingly trying to find ways
to link behavior across the various devices consumers own. This cross-device tracking can …

Privacy notices as tabula rasa: An empirical investigation into how complying with a privacy notice is related to meeting privacy expectations online

K Martin - Journal of Public Policy & Marketing, 2015 - journals.sagepub.com
Recent privacy scholarship has focused on the failure of adequate notice and consumer
choice as a tool to address consumers' privacy expectations online. However, there has not …

The right to be forgotten across the pond

ML Ambrose, J Ausloos - Journal of …, 2013 - scholarlypublishingcollective.org
Are you unclear about the European Commission's 2012 draft Data Protection Regulation
proposing a qualified “right to be forgotten?” That's not surprising, say Meg Ambrose and Jef …

The effect of behavioral tracking practices on consumers' shopping evaluations and repurchase intention toward trusted online retailers

TMC Jai, LD Burns, NJ King - Computers in Human Behavior, 2013 - Elsevier
The study applies the Stimulus–Organism–Response (SOR) model and Social Contract
Theory to investigate the effect of behavioral practices scenarios (stimulus) on consumers' …

No boundaries: data exfiltration by third parties embedded on web pages

G Acar, S Englehardt, A Narayanan - Proceedings on Privacy …, 2020 - petsymposium.org
We investigate data exfiltration by third-party scripts directly embedded on web pages.
Specifically, we study three attacks: misuse of browsers' internal login managers, social data …

Understanding what they do with what they know

CE Wills, C Tatar - Proceedings of the 2012 ACM Workshop on Privacy …, 2012 - dl.acm.org
This work seeks to understand what" they"(Web advertisers) actually do with the information
available to them. We analyze the ads shown to users during controlled browsing as well as …

Are you sure you want to contact us? quantifying the leakage of pii via website contact forms

O Starov, P Gill, N Nikiforakis - Proceedings on Privacy …, 2016 - petsymposium.org
The majority of commercial websites provide users the ability to contact them via dedicated
contact pages. In these pages, users are typically requested to provide their names, email …

Transaction costs, privacy, and trust: The laudable goals and ultimate failure of notice and choice to respect privacy online

K Martin - First Monday, 2013 - papers.ssrn.com
The goal of this paper is to outline the laudable goals and ultimate failure of notice and
choice to respect privacy online and suggest an alternative framework to manage and …