Tracking and Fingerprinting in E-Business

Author:

Boda Károly1,Földes Ádám Máté1,Gulyás Gábor György1,Imre Sándor1

Affiliation:

1. Budapest University of Technology and Economics, Hungary

Abstract

Online user tracking is a widely used marketing tool in e-business, even though it is often neglected in the related literature. In this chapter, the authors provide an exhaustive survey of tracking-related identification techniques, which are often applied against the will and preferences of the users of the Web, and therefore violate their privacy one way or another. After discussing the motivations behind the information-collecting activities targeting Web users (i.e., profiling), and the nature of the information that can be collected by various means, the authors enumerate the most important techniques of the three main groups of tracking, namely storage-based tracking, history stealing, and fingerprinting. The focus of the chapter is on the last, as this is the field where both the techniques intended to protect users and the current legislation are lagging behind the state-of-the-art technology; nevertheless, the authors also discuss conceivable defenses, and provide a taxonomy of tracking techniques, which, to the authors’ knowledge, is the first of its kind in the literature. At the end of the chapter, the authors attempt to draw the attention of the research community of this field to new tracking methods.

Publisher

IGI Global

Reference95 articles.

1. Aggarwal, G., Bursztein, E., Jackson, C., & Boneh, D. (2010). An analysis of private browsing modes in modern browsers. In Proceedings of the 19th USENIX Conference on Security (6-6). Berkeley, CA: USENIX Association.

2. Ayenson, M., Wambach, D. J., Soltani, A., Good, N., & Hoofnagle, C. J. (2011). Flash Cookies and Privacy II: Now with HTML5 and ETag Respawning. Social Science Research Network. Retrieved November 13, 2012, from http://ssrn.com/abstract=1898390

3. Baron, D. (2002). Bug 147777 –:Visited support allows queries into global history. Bugzilla@Mozilla. Retrieved November 13, 2012, from https://bugzilla.mozilla.org/show_bug.cgi?id=147777

4. Baron, D. (2010). Preventing attacks on a user's history through CSS:Visited selectors. David Baron’s homepage. Retrieved November 13, 2012, from http://dbaron.org/mozilla/visited-privacy

5. Benninger, C. (2006). AJAX Storage: A Look at Flash Cookies and Internet Explorer Persistence. Technical report. Retrieved November 13, 2012, from http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.2523

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3