Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society 2013
DOI: 10.1145/2517840.2517868
|View full text |Cite
|
Sign up to set email alerts
|

Privacy awareness about information leakage

Abstract: The task of protecting users' privacy is made more difficult by their attitudes towards information disclosure without full awareness and the economics of the tracking and advertising industry. Even after numerous press reports and widespread disclosure of leakages on the Web and on popular Online Social Networks, many users appear not be fully aware of the fact that their information may be collected, aggregated and linked with ambient information for a variety of purposes. Past attempts at alleviating this p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
43
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 73 publications
(45 citation statements)
references
References 13 publications
1
43
0
1
Order By: Relevance
“…While several previous studies [9][10][11][12] have considered data collection online, including third-party data collection, we are unaware of any prior studies that considered such collection in the context of cross-device tracking across such a large number of sites. Other work [13][14][15][16] has focused on third-party data collection across mobile applicatons (as opposed to web browsers); while we do not measure leakage of information through apps, many of the same privacy interests are implicated.…”
Section: Introductionmentioning
confidence: 99%
“…While several previous studies [9][10][11][12] have considered data collection online, including third-party data collection, we are unaware of any prior studies that considered such collection in the context of cross-device tracking across such a large number of sites. Other work [13][14][15][16] has focused on third-party data collection across mobile applicatons (as opposed to web browsers); while we do not measure leakage of information through apps, many of the same privacy interests are implicated.…”
Section: Introductionmentioning
confidence: 99%
“…Others have considered the tracking when following the (non-sponsored) links provided by popular search engines [9], suggested taxonomies for third-party tracking [27], and developed tools to measure and protect against third-party tracking [17], [18]. In contrast to the above works, we leverage Disconnect's classification of trackers, group domains by organizational ownership, and compare the third-party resource usage and known trackers observed across different services when using HTTP or HTTPS.…”
Section: Related Studies and Resultsmentioning
confidence: 99%
“…Tracker identification: Public lists of known trackers typically are incomplete and out-of-date [13], [17]. Since potentially any external resource can be used for third-party tracking it is difficult to quantify exactly how much third-party tracking takes place.…”
Section: Domain Identification and Classificationmentioning
confidence: 99%
See 2 more Smart Citations