Figures and Tables from this paper
11 Citations
Et tu, Brute? Privacy Analysis of Government Websites and Mobile Apps
- Computer ScienceWWW
- 2022
Privacy and security measurements are performed on government websites and Android apps to help improve privacy and security of online government services, given that governments are now apparently taking Internet privacy/security seriously and imposing strict regulations on commercial sites.
Got Sick and Tracked: Privacy Analysis of Hospital Websites
- Computer Science2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
- 2022
This paper crawl 19,483 hospital web sites from 152 countries and provincial jurisdictions located in Asia, Europe, North America, Latin America, Africa and Oceania to identify wide-spread use of trackers and sites with potential security issues.
Unaccounted Privacy Violation: A Comparative Analysis of Persistent Identification of Users Across Social Contexts
- Business
- 2020
Cross-contexts inference about individuals is central to the profiling and targeting capacities of the online advertising industry. Advertisers identify moments of vulnerability, in part, by drawing…
Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective
- Computer ScienceIACR Cryptol. ePrint Arch.
- 2020
The Impact of the General Data Protection Regulation (GDPR) on the Amount of Online Tracking
- Business, Law
- 2021
We determine whether GDPR's enforcement increased consumers' online privacy by decreasing the amount of online tracking. We exploit a difference-in-differences design to evaluate the effect of GDPR's…
Analysing and strengthening OpenWPM's reliability
- Computer ScienceArXiv
- 2022
It is revealed that reliability of automation frameworks should not be taken for granted, and identity of such frameworks should be studied, and mitigations deployed, to improve reliability.
Scraping Airlines Bots: Insights Obtained Studying Honeypot Data
- Computer Science
- 2021
A platform capable of mimicking airlines' sites changing prices at will is presented, and a method to investigate the claim commonly made that proxy services used by web scraping bots have millions of residential IPs at their disposal is proposed.
ANALYZING USER BEHAVIOUR AND PAGE VIEWS BASED ON VISITOR TRAFFIC IN KOLEJ UNIVERSITI POLY-TECH MARA WEBSITE USING GOOGLE ANALYTIC
- Computer ScienceMALAYSIAN JOURNAL OF COMPUTING
- 2020
The capability of Google Analytics to analyze website traffics in terms of collecting data regarding page views, user interaction flow and visitor behaviour will benefit the organization for making a decision.
Botnet Sizes: When Maths Meet Myths
- BusinessICSOC Workshops
- 2020
Investigation of the claim commonly made that proxy services used by web scraping bots have millions of residential IPs at their disposal suggests that an IP reputation-based blocking strategy could be effective, contrary to what operators of these websites think today.
The Security Lottery: Measuring Client-Side Web Security Inconsistencies
- Computer Science
- 2022
This work formalizes security guarantees provided through four popular mechanisms and applies this to measure the prevalence of inconsistencies in the security policies of top sites across different client characteristics, and investigates the security implications of both deterministic and non-deterministic inconsistencies.
References
SHOWING 1-10 OF 35 REFERENCES
Tracking the Trackers: A Large-Scale Analysis of Embedded Web Trackers
- Computer ScienceICWSM
- 2016
It is found that trackers are widespread, and that very few trackers dominate the web (Google, Facebook and Twitter), except for a few countries such as China and Russia.
Cookies That Give You Away: The Surveillance Implications of Web Tracking
- Computer ScienceWWW
- 2015
It is shown that foreign users are highly vulnerable to the NSA's dragnet surveillance due to the concentration of third-party trackers in the U.S. Using measurement units in various locations, this work introduces a methodology that combines web measurement and network measurement.
Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016
- Computer ScienceUSENIX Security Symposium
- 2016
It is argued that an understanding of the ecosystem’s historical trends is important to any technical and policy discussions surrounding tracking and that third-party tracking on the web has increased in prevalence and complexity since the first third- party tracker was observed in 1996.
A Privacy Analysis of Cross-device Tracking
- Computer ScienceUSENIX Security Symposium
- 2017
It is shown that the similarity of IP addresses and Internet history for a user’s devices gives rise to a matching rate of F-1 = 0.91 for connecting a mobile to a desktop device in the authors' dataset, which is especially noteworthy in light of the increase in learning power that cross-device companies may achieve by leveraging user data from more than one device.
Online Tracking: A 1-million-site Measurement and Analysis
- Computer ScienceCCS
- 2016
The largest and most detailed measurement of online tracking conducted to date, based on a crawl of the top 1 million websites, is presented, which demonstrates the OpenWPM platform's strength in enabling researchers to rapidly detect, quantify, and characterize emerging online tracking behaviors.
Third-Party Web Tracking: Policy and Technology
- Computer Science2012 IEEE Symposium on Security and Privacy
- 2012
The current policy debate surrounding third-party web tracking is surveyed and the FourthParty web measurement platform is presented, to inform researchers with essential background and tools for contributing to public understanding and policy debates about web tracking.
The Rise of Panopticons: Examining Region-Specific Third-Party Web Tracking
- EconomicsTMA
- 2014
This paper samples every continent, targeting the 500 most popular websites in the US, UK, Australia, China, Egypt, Iran and Syria, and finds those third-party web services offering ad tracking services to be the most prevalent.
Variations in Tracking in Relation to Geographic Location
- Computer ScienceArXiv
- 2015
There are significant differences in tracking activity between different countries using several metrics and various ways to extend this study are suggested to yield a more complete representation of tracking from a global perspective.
Privacy leakage vs . Protection measures : the growing disconnect
- Computer Science
- 2011
The growing disconnect between the protection measures and increasing leakage and linkage suggests that the community needs to move beyond the losing battle with aggregators and examine what roles first-party sites can play in protecting privacy of their use rs.
The Web Never Forgets: Persistent Tracking Mechanisms in the Wild
- Computer ScienceCCS
- 2014
The evaluation of the defensive techniques used by privacy-aware users finds that there exist subtle pitfalls --- such as failing to clear state on multiple browsers at once - in which a single lapse in judgement can shatter privacy defenses.