Third-party web tracking: Policy and technology

JR Mayer, JC Mitchell - 2012 IEEE symposium on security and …, 2012 - ieeexplore.ieee.org
In the early days of the web, content was designed and hosted by a single person, group, or
organization. No longer. Webpages are increasingly composed of content from myriad …

Online display advertising markets: A literature review and future directions

H Choi, CF Mela, SR Balseiro… - Information Systems …, 2020 - pubsonline.informs.org
This paper summarizes the display advertising literature, organizing the content by the
agents in the display advertising ecosystem, and proposes new research directions. In doing …

Accountable algorithms

JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …

Social isolation and social anxiety as drivers of generation Z's willingness to share personal information on social media

T Lyngdoh, D El‐Manstrly, K Jeesha - Psychology & Marketing, 2023 - Wiley Online Library
Generation Z's (gen z) sharing of personal information on social media is a growing
phenomenon with significant ramifications. Existing research, however, focuses on …

Method, a device and computer program products for protecting privacy of users from web-trackers

N Laoutaris, J Blackburn - US Patent 10,110,633, 2018 - Google Patents
US10110633B2 - Method, a device and computer program products for protecting privacy of
users from web-trackers - Google Patents US10110633B2 - Method, a device and computer …

Exploring motivations for online privacy protection behavior: Insights from panel data

SC Boerman, S Kruikemeier… - Communication …, 2021 - journals.sagepub.com
Personally managing and protecting online privacy has become an essential part of
everyday life. This research draws on the protection motivation theory (PMT) to investigate …

Clonecloud: elastic execution between mobile device and cloud

BG Chun, S Ihm, P Maniatis, M Naik… - Proceedings of the sixth …, 2011 - dl.acm.org
Mobile applications are becoming increasingly ubiquitous and provide ever richer
functionality on mobile devices. At the same time, such devices often enjoy strong …

Lightweight techniques for private heavy hitters

D Boneh, E Boyle, H Corrigan-Gibbs… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
This paper presents a new protocol for solving the private heavy-hitters problem. In this
problem, there are many clients and a small set of data-collection servers. Each client holds …

A contextual approach to privacy online

H Nissenbaum - Daedalus, 2011 - direct.mit.edu
Recent media revelations have demonstrated the extent of third-party tracking and
monitoring online, much of it spurred by data aggregation, profiling, and selective targeting …

Considerations for evaluation and generalization in interpretable machine learning

F Doshi-Velez, B Kim - Explainable and interpretable models in computer …, 2018 - Springer
As machine learning systems become ubiquitous, there has been a surge of interest in
interpretable machine learning: systems that provide explanation for their outputs. These …