Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-mlc7c Total loading time: 0 Render date: 2024-11-08T08:17:13.434Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  24 March 2022

Isabel Wagner
Affiliation:
De Montfort University, Leicester
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Auditing Corporate Surveillance Systems
Research Methods for Greater Transparency
, pp. 285 - 320
Publisher: Cambridge University Press
Print publication year: 2022

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Acar, Abbas, Fereidooni, Hossein, Abera, Tigist, Sikder, Amit Kumar, Miettinen, Markus, Aksu, Hidayet, Conti, Mauro, Sadeghi, Ahmad-Reza, and Uluagac, Selcuk. 2020a. Peek-a-Boo: I See Your Smart Home Activities, Even Encrypted! In: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks. WiSec’20. Linz: ACM. Google Scholar
Acar, Gunes, Englehardt, Steven, and Narayanan, Arvind. 2020b. No Boundaries: Data Exfiltration by Third Parties Embedded on Web Pages. Proceedings on Privacy Enhancing Technologies, 2020(4), 220238.Google Scholar
Acar, Gunes, Eubank, Christian, Englehardt, Steven, Juarez, Marc, Narayanan, Arvind, and Diaz, Claudia. 2014. The Web Never Forgets: Persistent Tracking Mechanisms in the Wild. Pages 674689 of: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. CCS’14. Scottsdale, AZ: ACM. Google Scholar
Acar, Gunes, Juarez, Marc, Nikiforakis, Nick, Diaz, Claudia, Gürses, Seda, Piessens, Frank, and Preneel, Bart. 2013. FPDetective: Dusting the Web for Fingerprinters. Pages 11291140 of: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. CCS’13. Berlin: ACM. CrossRefGoogle Scholar
Achara, Jagdish Prasad, Acs, Gergely, and Castelluccia, Claude. 2015. On the Unicity of Smartphone Applications. Pages 2736 of: Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society. WPES’15. Denver, CO: ACM. CrossRefGoogle Scholar
Afroz, Sadia, Tschantz, Michael Carl, Sajid, Shaarif, Qazi, Shoaib Asif, Javed, Mobin, and Paxson, Vern. 2018. Exploring Server-Side Blocking of Regions. arXiv:1805.11606 [cs], May.Google Scholar
Agarwal, Lalit, Shrivastava, Nisheeth, Jaiswal, Sharad, and Panjwani, Saurabh. 2013. Do Not Embarrass: Re-Examining User Concerns for Online Tracking and Advertising. Pages 8:1–8:13 of: Proceedings of the Ninth Symposium on Usable Privacy and Security. SOUPS’13. Newcastle: ACM. Google Scholar
Agarwal, Pushkal, Joglekar, Sagar, Papadopoulos, Panagiotis, Sastry, Nishanth, and Kourtellis, Nicolas. 2020. Stop Tracking Me Bro! Differential Tracking of User Demographics on Hyper-Partisan Websites. Pages 1479–1490 of: Proceedings of The Web Conference 2020. WWW’20. Taipei: ACM. Google Scholar
Agarwal, Saharsh, Mani, Deepa, and Telang, Rahul. 2019 (June). The Impact of Ride-Hailing Services on Congestion: Evidence from Indian Cities. SSRN Scholarly Paper ID 3410623. Rochester, NY: Social Science Research Network.Google Scholar
Agarwal, Yuvraj, and Hall, Malcolm. 2013. ProtectMyPrivacy: Detecting and Mitigating Privacy Leaks on iOS Devices Using Crowdsourcing. Pages 97–110 of: Proceedings of the 11th Annual International Conference on Mobile Systems, Applications, and Services. MobiSys’13. Taipei: ACM. Google Scholar
Ahmad, Syed Suleman, Dar, Muhammad Daniyal, Zaffar, Muhammad Fareed, Vallina-Rodriguez, Narseo, and Nithyanand, Rishab. 2020. Apophanies or Epiphanies? How Crawlers Impact Our Understanding of the Web. Pages 271–280 of: Proceedings of The Web Conference 2020. WWW’20. Taipei: ACM. Google Scholar
Ali, Muhammad, Sapiezynski, Piotr, Bogen, Miranda, Korolova, Aleksandra, Mislove, Alan, and Rieke, Aaron. 2019a. Discrimination through Optimization: How Facebook’s Ad Delivery Can Lead to Skewed Outcomes. arXiv:1904.02095 [cs], Sept.Google Scholar
Ali, Suzan, Osman, Tousif, Mannan, Mohammad, and Youssef, Amr. 2019b. On Privacy Risks of Public WiFi Captive Portals. Pages 8098 of: , Pérez-Solà Cristina, Navarro-Arribas, Guillermo, Biryukov, Alex, and Joaquin, Garcia-Alfaro (eds.), Data Privacy Management, Cryptocurrencies and Blockchain Technology. Lecture Notes in Computer Science. Cham: Springer International Publishing.CrossRefGoogle Scholar
Allix, Kevin, Bissyandé, Tegawendé F., Klein, Jacques, and Traon, Yves Le. 2016 (May). AndroZoo: Collecting Millions of Android Apps for the Research Community. Pages 468471 of: 2016 IEEE/ACM 13th Working Conference on Mining Software Repositories MSR.Google Scholar
Almeida, Mario, Bilal, Muhammad, Finamore, Alessandro, Leontiadis, Ilias, Grunenberger, Yan, Varvello, Matteo, and Blackburn, Jeremy. 2018. CHIMP: Crowdsourcing Human Inputs for Mobile Phones. Pages 45–54 of: Proceedings of the 2018 World Wide Web Conference. WWW’18. Lyon: International World Wide Web Conferences Steering Committee. Google Scholar
Alrizah, Mshabab, Zhu, Sencun, Xing, Xinyu, and Wang, Gang. 2019. Errors, Misunderstandings, and Attacks: Analyzing the Crowdsourcing Process of Ad-Blocking Systems. Pages 230244 of: Proceedings of the Internet Measurement Conference. IMC’19. Amsterdam: ACM. Google Scholar
American Civil Liberties Union. 2019 (May). Sandvig v Barr: Challenge to CFAA Prohibition on Uncovering Racial Discrimination Online. www.aclu.org/cases/ sandvig-v-barr-challenge-cfaa-prohibition-uncovering-racial-discrimination-online.Google Scholar
American Civil Liberties Union. 2020 (March). Federal Court Rules ‘Big Data’ Discrimination Studies Do Not Violate Federal Anti-Hacking Law. www.aclu.org/ press-releases/federal-court-rules-big-data-discrimination-studies-do-not-violate-federal-anti.Google Scholar
Amnesty International. 2019. Surveillance Giants: How the Business Model of Google and Facebook Threatens Human Rights. Tech. rept. POL 30/1404/2019. London: Amnesty International.Google Scholar
Andow, Benjamin, Mahmud, Samin Yaseer, Wang, Wenyu, Whitaker, Justin, Enck, William, Reaves, Bradley, Singh, Kapil, and Xie, Tao. 2019 (Aug.). PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play. Pages 585– 602 of: 28th USENIX Security Symposium. USENIX Security 19. Santa Clara, CA: USENIX.Google Scholar
Andow, Benjamin, Mahmud, Samin Yaseer, Whitaker, Justin, Enck, William, Reaves, Bradley, Singh, Kapil, and Egelman, Serge. 2020. Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck. Pages 985–1002 of: 29th USENIX Security Symposium. USENIX Security 20. USENIX.Google Scholar
Andreou, Athanasios, Venkatadri, Giridhari, Goga, Oana, Gummadi, Krishna P., Loiseau, Patrick, and Mislove, Alan. 2018. Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebook’s Explanations. In: Proceedings of the 2018 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Andreou, Athanasios, Silva, Marcio, Benevenuto, Fabrício, Goga, Oana, Loiseau, Patrick, and Mislove, Alan. 2019 (Feb.). Measuring the Facebook Advertising Ecosystem. In: NDSS 2019: Proceedings of the Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Angwin, Julia. 2014. Privacy Tools: Opting Out from Data Brokers. ProPublica, Jan.Google Scholar
Angwin, Julia, and Parris, Terry Jr. 2016. Facebook Lets Advertisers Exclude Users by Race. ProPublica, Oct.Google Scholar
Angwin, Julia, Parris, Terry Jr., and Mattu, Surya. 2016a. Breaking the Black Box: What Facebook Knows About You. ProPublica ,Sept.Google Scholar
Angwin, Julia, Mattu, Surya, and Parris, Terry Jr. 2016b. Facebook Doesn’t Tell Users EverythingItReallyKnows…ProPublica, Dec.Google Scholar
Angwin, Julia, Scheiber, Noam, and Tobin, Ariana. 2018. Facebook Job Ads Raise Concerns About Age Discrimination. The New York Times, Jan.Google Scholar
Aqeel, Waqar, Chandrasekaran, Balakrishnan, Feldmann, Anja, and Maggs, Bruce M. 2020. On Landing and Internal Web Pages: The Strange Case of Jekyll and Hyde in Web Performance Measurement. Pages 680695 of: Proceedings of the ACM Internet Measurement Conference. IMC’20. Pittsburgh, PA: ACM. CrossRefGoogle Scholar
Arshad, Sajjad, Kharraz, Amin, and Robertson, William. 2017. Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions. Pages 441–459 of: Grossklags, Jens, and Preneel, Bart (eds.), Financial Cryptography and Data Security. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. Google Scholar
Arzt, Steven, Rasthofer, Siegfried, Fritz, Christian, Bodden, Eric, Bartel, Alexandre, Klein, Jacques, Le Traon, Yves, Octeau, Damien, and McDaniel, Patrick. 2014. FlowDroid: Precise Context, Flow, Field, Object-Sensitive and Lifecycle-Aware Taint Analysis for Android Apps. Pages 259–269 of: Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation. PLDI’14. Edinburgh: ACM. Google Scholar
Ayenson, Mika D., Wambach, Dietrich James, Soltani, Ashkan, Good, Nathan, and Hoofnagle, Chris Jay. 2011 (July). Flash Cookies and Privacy II: Now with HTML5 and ETag Respawning. SSRN Scholarly Paper ID 1898390. Rochester, NY: Social Science Research Network.Google Scholar
Backstrom, Lars, and Kleinberg, Jon. 2014. Romantic Partnerships and the Dispersion of Social Ties: A Network Analysis of Relationship Status on Facebook. Pages 831841 of: Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing. CSCW’14. Baltimore, MD: ACM. Google Scholar
Bakshy, Eytan, Messing, Solomon, and Adamic, Lada A. 2015. Exposure to Ideologically Diverse News and Opinion on Facebook. Science, 348 (6239), 11301132.CrossRefGoogle ScholarPubMed
Balebako, Rebecca, Leon, Pedro G., Shay, Richard, Ur, Blase, Wang, Yang, and Cranor, Lorrie Faith. 2012. Measuring the Effectiveness of Privacy Tools for Limiting Behavioral Advertising. In: In Web 2.0 Workshop on Security and Privacy. San Francisco, CA: IEEE.Google Scholar
Ballatore, Andrea, Graham, Mark, and Sen, Shilad. 2017. Digital Hegemonies: The Localness of Search Engine Results. Annals of the American Association of Geographers, 107 (5), 11941215.Google Scholar
Bandy, Jack, and Diakopoulos, Nicholas. 2019. Auditing News Curation Systems: A Case Study Examining Algorithmic and Editorial Logic in Apple News. arXiv:1908.00456 [cs], Aug.Google Scholar
Barford, Paul, Canadi, Igor, Krushevskaja, Darja, Ma, Qiang, and Muthukrishnan, S. 2014. Adscape: Harvesting and Analyzing Online Display Ads. Pages 597608 of: Proceedings of the 23rd International Conference on World Wide Web. WWW’14. Seoul: ACM. Google Scholar
Baron, Nancy. 2010. Escape from the Ivory Tower: A Guide to Making Your Science Matter. Washington, DC: Island Press.Google Scholar
Barth, Adam. 2011 (April). HTTP State Management Mechanism. Tech. rept. RFC 6265. Internet Engineering Task Force (IETF).Google Scholar
Bashir, Muhammad Ahmad, and Wilson, Christo. 2018. Diffusion of User Tracking Data in the Online Advertising Ecosystem. Proceedings on Privacy Enhancing Technologies, 2018 (4), 85103.Google Scholar
Bashir, Muhammad Ahmad, Arshad, Sajjad, Wilson, Christo, and Robertson, William. 2016. Tracing Information Flows Between Ad Exchanges Using Retar-geted Ads. Page 17 of: 25th USENIX Security Symposium. Austin, TX: USENIX.Google Scholar
Bashir, Muhammad Ahmad, Arshad, Sajjad, Kirda, Engin, Robertson, William, and Christo, Wilson. 2018. How Tracking Companies Circumvented Ad Blockers Using WebSockets. Pages 471–477 of: Proceedings of the Internet Measurement Conference 2018. IMC’18. Boston, MA: ACM. Google Scholar
Bashir, Muhammad Ahmad, Arshad, Sajjad, Kirda, Engin, Robertson, William, and Wilson, Christo. 2019a. A Longitudinal Analysis of the Ads.Txt Standard. Pages 294307 of: Proceedings of the Internet Measurement Conference. IMC’19. Amsterdam: ACM. Google Scholar
Bashir, Muhammad Ahmad, Farooq, Umar, Shahid, Maryam, Zaffar, Muhammad Fareed, and Wilson, Christo. 2019b. Quantity vs. Quality: Evaluating User Interest Profiles Using Ad Preference Managers. Page 15 of: Proceedings of the 2019 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Bau, Jason, Mayer, Jonathan, Paskov, Hristo, and Mitchell, John C. 2013. A Promising Direction for Web Tracking Countermeasures. Page 5 of: Web 2.0 Workshop on Security and Privacy. W2SP.Google Scholar
Bertram, Theo, Bursztein, Elie, Caro, Stephanie, Chao, Hubert, Chin, Feman, Rutledge, Fleischer, Peter, Gustafsson, Albin, Hemerly, Jess, Hibbert, Chris, Invernizzi, Luca, Kammourieh Donnelly, Lanah, Ketover, Jason, Laefer, Jay, Nicholas, Paul, Niu, Yuan, Obhi, Harjinder, Price, David, Strait, Andrew, Thomas, Kurt, and Verney, Al. 2019. Five Years of the Right to Be Forgotten. Pages 959– 972 of: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. CCS’19. London: ACM. Google Scholar
Bertrand, Marianne, and Mullainathan, Sendhil. 2004. Are Emily and Greg More Employable Than Lakisha and Jamal? A Field Experiment on Labor Market Discrimination. American Economic Review, 94 (4), 9911013.Google Scholar
Binns, Reuben, Zhao, Jun, Kleek, Max Van, and Shadbolt, Nigel. 2018a. Measuring Third-Party Tracker Power Across Web and Mobile. ACM Trans. Internet Technol., 18 (4), 52:1–52:22.CrossRefGoogle Scholar
Binns, Reuben, Lyngs, Ulrik, Kleek, Van, Max, Zhao, Jun, Libert, Timothy, and Shadbolt, Nigel. 2018b. Third Party Tracking in the Mobile Ecosystem. Pages 2331 of: Proceedings of the 10th ACM Conference on Web Science. WebSci’18. Amsterdam: ACM. Google Scholar
Bird, Sarah, Segall, Ilana, and Lopatka, Martin. 2020. Replication: Why We Still Can’t Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories. Pages 489–503 of: Sixteenth Symposium on Usable Privacy and Security. SOUPS 2020. USENIX.Google Scholar
Boda, Károly, Földes, Ádám Máté, Gulyás, Gábor György, and Imre, Sándor. 2012. User Tracking on the Web via Cross-Browser Fingerprinting. Pages 31–46 of: Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu, Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, and Laud, Peeter (eds.), Nordic Conference on Secure IT Systems. NordSec 2011. vol. LNCS 7161. Berlin, Heidelberg: Springer. Google Scholar
Bond, Robert M., Fariss, Christopher J., Jones, Jason J., Kramer, Adam D. I., Marlow, Cameron, Settle, Jaime E., and Fowler, James H. 2012. A 61-Million-Person Experiment in Social Influence and Political Mobilization. Nature, 489 (7415), 295298.Google Scholar
Book, Theodore, and Wallach, Dan S. 2013. A Case of Collusion: A Study of the Interface Between Ad Libraries and Their Apps. Pages 7986 of: Proceedings of the Third ACM Workshop on Security and Privacy in Smartphones & Mobile Devices. SPSM’13. Berlin: ACM. CrossRefGoogle Scholar
Book, Theodore, Pridgen, Adam, and Wallach, Dan S. 2013 (May). Longitudinal Analysis of Android Ad Library Permissions. Page 9 of: Mobile Security Technologies. MoST.Google Scholar
Borgesius, Frederik J. Zuiderveen. 2016. Singling out People without Knowing Their Names – Behavioural Targeting, Pseudonymous Data, and the New Data Protection Regulation. Computer Law & Security Review, 32 (2), 256271.Google Scholar
Borgolte, Kevin, and Feamster, Nick. 2020. Understanding the Performance Costs and Benefits of Privacy-Focused Browser Extensions. Pages 2275–2286 of: Proceedings of The Web Conference 2020. WWW’20. Taipei: ACM. Google Scholar
Bösch, Christoph, Erb, Benjamin, Kargl, Frank, Kopp, Henning, and Pfattheicher, Stefan. 2016. Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns. Proceedings on Privacy Enhancing Technologies, 2016 (4), 237254.CrossRefGoogle Scholar
Brik, Vladimir, Banerjee, Suman, Gruteser, Marco, and Oh, Sangho. 2008. Wireless Device Identification with Radiometric Signatures. Pages 116127 of: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking. MobiCom’08. San Francisco, CA: ACM. Google Scholar
Brookman, Justin, Rouge, Phoebe, Alva, Aaron, and Yeung, Christina. 2017. Cross-Device Tracking: Measurement and Disclosures. Proceedings on Privacy Enhancing Technologies, 2017 (2), 133148.Google Scholar
Bujlow, T., Carela-Español, V., Solé-Pareta, J., and Barlet-Ros, P. 2017. A Survey on Web Tracking: Mechanisms, Implications, and Defenses. Proceedings of the IEEE, 105 (8), 14761510.Google Scholar
Burklen, Susanne, Marron, Pedro Jose, Fritsch, Serena, and Rothermel, Kurt. 2005. User Centric Walk: An Integrated Approach for Modeling the Browsing Behavior of Users on the Web. Pages 149159 of: Proceedings of the 38th Annual Symposium on Simulation. ANSS’05. Washington, DC: IEEE Computer Society.CrossRefGoogle Scholar
Buttarelli, Giovanni. 2017. Privacy Matters: Updating Human Rights for the Digital Society. Health and Technology, 7 (4), 325328.Google Scholar
Cabañas, José González, Cuevas, Ángel, and Cuevas, Rubén. 2018. Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes. Pages 479495 of: 27th USENIX Security Symposium. USENIX Security 18. Baltimore, MD: USENIX Association.Google Scholar
Cahn, Aaron, Alfeld, Scott, Barford, Paul, and Muthukrishnan, S. 2016. An Empirical Study of Web Cookies. Pages 891901 of: Proceedings of the 25th International Conference on World Wide Web. WWW’16. Montréal: International World Wide Web Conferences Steering Committee. CrossRefGoogle Scholar
Calciati, Paolo, and Gorla, Alessandra. 2017. How Do Apps Evolve in Their Permission Requests?: A Preliminary Study. Pages 3741 of: Proceedings of the 14th International Conference on Mining Software Repositories. MSR’17. Buenos Aires: IEEE Press.Google Scholar
Callejo, Patricia, Kelton, Conor, Vallina-Rodriguez, Narseo, Cuevas, Rubén, Gasser, Oliver, Kreibich, Christian, Wohlfart, Florian, and Cuevas, Ángel. 2017. Opportunities and Challenges of Ad-Based Measurements from the Edge of the Network. Pages 87–93 of: Proceedings of the 16th ACM Workshop on Hot Topics in Networks. HotNets-XVI. Palo Alto, CA: ACM. Google Scholar
Cao, Yinzhi, Li, Song, and Wijmans, Erik. 2017. (Cross-)Browser Fingerprinting via OS and Hardware Level Features. In: Proceedings of the 2017 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Carbunar, Bogdan, and Potharaju, Rahul. 2015. A Longitudinal Study of the Google App Market. Pages 242–249 of: Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015. ASONAM’15. Paris: ACM. Google Scholar
Carrascal, Juan Pablo, Riederer, Christopher, Erramilli, Vijay, Cherubini, Mauro, and de Oliveira, Rodrigo. 2013. Your Browsing Behavior for a Big Mac: Economics of Personal Information Online. Pages 189200 of: Proceedings of the 22Nd International Conference on World Wide Web. WWW’13. Rio de Janeiro: ACM. Google Scholar
Carrascosa, Juan Miguel, Mikians, Jakub, Cuevas, Ruben, Erramilli, Vijay, and Laoutaris, Nikolaos. 2015. I Always Feel Like Somebody’s Watching Me: Measuring Online Behavioural Advertising. Pages 13:1–13:13 of: Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies. CoNEXT’15. Berlin, Heidelberg: ACM. Google Scholar
Cavoukian, Ann. 2013. Privacy by Design. Tech. rept. Information and Privacy Commissioner of Ontario.Google Scholar
Celosia, Guillaume, and Cunche, Mathieu. 2020. Discontinued Privacy: Personal Data Leaks in Apple Bluetooth-Low-Energy Continuity Protocols. Proceedings on Privacy Enhancing Technologies, 2020 (1), 2646.CrossRefGoogle Scholar
Chen, G., Cox, J. H., Uluagac, A. S., and Copeland, J. A. 2016a. In-Depth Survey of Digital Advertising Technologies. IEEE Communications Surveys Tutorials, 18 (3), 21242148.Google Scholar
Chen, H., Leung, H., Han, B., and Su, J. 2017 (May). Automatic Privacy Leakage Detection for Massive Android Apps via a Novel Hybrid Approach. Pages 17 of: Proceedings of the 2017 IEEE International Conference on Communications. ICC. Paris: IEEE.Google Scholar
Chen, Le, Mislove, Alan, and Wilson, Christo. 2015. Peeking Beneath the Hood of Uber. Pages 495508 of: Proceedings of the 2015 Internet Measurement Conference. IMC’15. Tokyo: ACM. CrossRefGoogle Scholar
Chen, Le, Mislove, Alan, and Wilson, Christo. 2016b. An Empirical Analysis of Algorithmic Pricing on Amazon Marketplace. Pages 1339–1349 of: Proceedings of the 25th International Conference on World Wide Web. WWW’16. Montreal: International World Wide Web Conferences Steering Committee. Google Scholar
Chen, Le, Ma, Ruijun, Hannák, Anikó, and Wilson, Christo. 2018. Investigating the Impact of Gender on Rank in Resume Search Engines. Page 651 of: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. Montreal: ACM. Google Scholar
Chen, Quan, and Kapravelos, Alexandros. 2018. Mystique: Uncovering Information Leakage from Browser Extensions. Pages 16871700 of: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. CCS’18. Toronto: ACM. Google Scholar
Chen, Terence, Chaabane, Abdelberi, Tournoux, Pierre Ugo, Kaafar, Mohamed-Ali, and Boreli, Roksana. 2013. How Much Is Too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness. Pages 225244 of: Cristofaro, Emiliano De, and Wright, Matthew (eds.), Privacy Enhancing Technologies. Lecture Notes in Computer Science, no. 7981. Berlin, Heidelberg: Springer. Google Scholar
Cheng, Long, Wilson, Christin, Liao, Song, Young, Jeffrey, Dong, Daniel, and Hu, Hongxin. 2020. Dangerous Skills Got Certified: Measuring the Trustworthiness of Skill Certification in Voice Personal Assistant Platforms. Pages 1699–1716 of: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. CCS’20. ACM. Google Scholar
Cheng, N., Wang, X. Oscar, Cheng, W., Mohapatra, P., and Seneviratne, A. 2013 (April). Characterizing Privacy Leakage of Public WiFi Networks for Users on Travel. Pages 27692777 of: 2013 Proceedings IEEE INFOCOM.Google Scholar
Chittaranjan, Gokul, Blom, Jan, and Gatica-Perez, Daniel. 2013. Mining Large-Scale Smartphone Data for Personality Studies. Personal Ubiquitous Comput., 17 (3), 433450.Google Scholar
Christl, Wolfie. 2017. Corporate Surveillance in Everyday Life. Tech. rept. Cracked Labs, Vienna, Austria.Google Scholar
Christl, Wolfie, and Spiekermann, Sarah. 2016. Networks of Control: A Report on Corporate Surveillance, Digital Tracking, Big Data & Privacy. Vienna: Facultas.Google Scholar
Clark, Alexander, Fox, Chris, and Lappin, Shalom (eds.). 2013. The Handbook of Computational Linguistics and Natural Language Processing. 1st edition. Chichester: Wiley-Blackwell.Google Scholar
Clark, Sandy, Blaze, Matt, and Smith, Jonathan M. 2015. Smearing Fingerprints: Changing the Game of Web Tracking with Composite Privacy. Pages 178–182 of: Christianson, Bruce, Švenda, Petr, Matyáš, Vashek, Malcolm, James, Stajano, Frank, and Anderson, Jonathan (eds.), Security Protocols XXIII. Lecture Notes in Computer Science. Cham: Springer. Google Scholar
Clayton, Richard, and Mansfield, Tony. 2014 (June). A Study of Whois Privacy and Proxy Service Abuse. Page 19 of: Proceedings (Online) of the 13th Workshop on Economics of Information Security. State College, PA.Google Scholar
Clement, J. 2020 (Feb.). Google: Ad Revenue 2001–2018. www.statista.com/statistics/ 266249/advertising-revenue-of-google/.Google Scholar
Clifford, Scott, Jewell, Ryan M, and Waggoner, Philip D. 2015. Are Samples Drawn from Mechanical Turk Valid for Research on Political Ideology? Research & Politics, 2 (4), 19.Google Scholar
CNIL. 2019 (Jan.). Deliberation of the Restricted Committee SAN-2019-001 of 21 January 2019 Pronouncing a Financial Sanction against GOOGLE LLC. Tech. rept.Google Scholar
Cobb, Camille, Simko, Lucy, Kohno, Tadayoshi, and Hiniker, Alexis. 2020. A Privacy-Focused Systematic Analysis of Online Status Indicators. Proceedings on Privacy Enhancing Technologies, 2020 (3), 384403.Google Scholar
Cockburn, Andy, Dragicevic, Pierre, Besançon, Lonni, and Gutwin, Carl. 2020. Threats of a Replication Crisis in Empirical Computer Science. Communications of the ACM, 63 (8), 7079.Google Scholar
COMPASS Science Communication, Inc. 2017. The Message Box Workbook. Washington, DC: National Academies Press.Google Scholar
Conti, M., Cozza, V., Petrocchi, M., and Spognardi, A. 2015 (Nov.). TRAP: Using Targeted Ads to Unveil Google Personal Profiles. Pages 16 of: 2015 IEEE International Workshop on Information Forensics and Security. WIFS.CrossRefGoogle Scholar
Continella, Andrea, Fratantonio, Yanick, Lindorfer, Martina, Puccetti, Alessandro, Zand, Ali, Kruegel, Christopher, and Vigna, Giovanni. 2017. Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis. In: Proceedings of the 2017 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Cook, John, Nithyanand, Rishab, and Shafiq, Zubair. 2020. Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem Using Header Bidding. Proceedings on Privacy Enhancing Technologies, 2020 (1), 6582.Google Scholar
Cooper, Drew, Castiglione, Joe, Mislove, Alan, and Wilson, Christo. 2018. Profiling Transport Network Company Activity Using Big Data. Transportation Research Record, 2672 (42), 192202.CrossRefGoogle Scholar
Corner, Mark D., Levine, Brian N., Ismail, Omar, and Upreti, Angela. 2017. Advertising-Based Measurement: A Platform of 7 Billion Mobile Devices. Pages 435447 of: Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking. MobiCom’17. Snowbird, UT: ACM. Google Scholar
Couldry, Nick. 2016 (Sept.). The Price of Connection: ‘Surveillance Capitalism’. http://theconversation.com/the-price-of-connection-surveillance-capitalism-64124.Google Scholar
Cozza, Vittoria, Hoang, Van Tien, Petrocchi, Marinella, and Spognardi, Angelo. 2016. Experimental Measures of News Personalization in Google News. Pages 93–104 of: Casteleyn, Sven, Dolog, Peter, and Pautasso, Cesare (eds.), Current Trends in Web Engineering. Lecture Notes in Computer Science. Cham: Springer. Google Scholar
Crump, Matthew J. C., McDonnell, John V., and Gureckis, Todd M. 2013. Evaluating Amazon’s Mechanical Turk as a Tool for Experimental Behavioral Research. PLOS ONE, 8 (3), e57410.Google Scholar
Crussell, Jonathan, Stevens, Ryan, and Chen, Hao. 2014. MAdFraud: Investigating Ad Fraud in Android Applications. Pages 123–134 of: Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services. MobiSys’14. Bretton Woods, NH: ACM. Google Scholar
Dabrowski, A., Merzdovnik, G., Kommenda, N., and Weippl, E. 2016 (May). Browser History Stealing with Captive Wi-Fi Portals. Pages 234240 of: 2016 IEEE Security and Privacy Workshops. SPW. San Jose, CA: IEEE.Google Scholar
Dabrowski, Adrian, Merzdovnik, Georg, Ullrich, Johanna, Sendera, Gerald, and Weippl, Edgar. 2019. Measuring Cookies and Web Privacy in a Post-GDPR World. Pages 258270 of: Choffnes, David, and Barcellos, Marinho (eds.), Passive and Active Measurement. Lecture Notes in Computer Science. Cham: Springer International Publishing.Google Scholar
Das, Anupam, Borisov, Nikita, and Caesar, Matthew. 2014. Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components. Pages 441452 of: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. CCS’14. Scottsdale, AZ: ACM. CrossRefGoogle Scholar
Das, Anupam, Borisov, Nikita, and Caesar, Matthew. 2016. Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses. In: Proceedings 2016 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Das, Anupam, Borisov, Nikita, and Chou, Edward. 2018a. Every Move You Make: Exploring Practical Issues in Smartphone Motion Sensor Fingerprinting and Countermeasures. Proceedings on Privacy Enhancing Technologies, 2018 (1), 88108.CrossRefGoogle Scholar
Das, Anupam, Acar, Gunes, Borisov, Nikita, and Pradeep, Amogh. 2018b. The Web’s Sixth Sense: A Study of Scripts Accessing Smartphone Sensors. Pages 1515– 1532 of: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Toronto: ACM. Google Scholar
Datta, Amit, Tschantz, Michael Carl, and Datta, Anupam. 2015. Automated Experiments on Ad Privacy Settings. Proceedings on Privacy Enhancing Technologies, 2015 (1), 92112.Google Scholar
Datta, Amit, Lu, Jianan, and Tschantz, Michael Carl. 2019. Evaluating Anti-Fingerprinting Privacy Enhancing Technologies. Pages 351362 of: The World Wide Web Conference. WWW’19. San Francisco, CA: ACM. Google Scholar
De Bock, KoenW, and Van den Poel, Dirk. 2010. Predicting Website Audience Demographics for Web Advertising Targeting Using Multi-Website Clickstream Data. Fundamenta Informaticae, 98 (1), 4970.Google Scholar
Cristofaro, De, Emiliano, Friedman, Arik, Jourjon, Guillaume, Kaafar, Ali, Mohamed, and Shafiq, M. Zubair. 2014. Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots. Pages 129136 of: Proceedings of the 2014 Conference on Internet Measurement Conference. IMC’14. Vancouver: ACM. Google Scholar
Domenico, De, Manlio, Lima, Antonio, and Musolesi, Mirco. 2013. Interdependence and Predictability of Human Mobility and Social Interactions. Pervasive and Mobile Computing, 9 (6), 798807.Google Scholar
de Montjoye, Yves-Alexandre, Quoidbach, Jordi, Robic, Florent, and Pentland, Alex. 2013a. Predicting Personality Using Novel Mobile Phone-Based Metrics. Pages 48–55 of: Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Greenberg, Ariel M., Kennedy, William G., and Bos, Nathan D. (eds.), Social Computing, Behavioral-Cultural Modeling and Prediction, vol. 7812. Berlin, Heidelberg: Springer. Google Scholar
de Montjoye, Yves-Alexandre, Hidalgo, César A., Verleysen, Michel, and Blondel, Vincent D. 2013b. Unique in the Crowd: The Privacy Bounds of Human Mobility. Scientific Reports, 3 (March), 1376.Google Scholar
de Montjoye, Yves-Alexandre, Radaelli, Laura, Singh, Vivek Kumar, and Pentland, Alex “Sandy”. 2015. Unique in the Shopping Mall: On the Reidentifiability of Credit Card Metadata. Science, 347 (6221), 536539.CrossRefGoogle ScholarPubMed
Degeling, Martin, and Nierhoff, Jan. 2018. Tracking and Tricking a Profiler: Automated Measuring and Influencing of Bluekai’s Interest Profiling. Pages 113 of: Proceedings of the 2018 Workshop on Privacy in the Electronic Society. WPES’18. Toronto: ACM. Google Scholar
Degeling, Martin, Utz, Christine, Lentzsch, Christopher, Hosseini, Henry, Schaub, Florian, and Holz, Thorsten. 2019 (Feb.). We Value Your Privacy …Now Take Some Cookies: Measuring the GDPR’s Impact on Web Privacy. In: Network and Distributed Systems Security (NDSS) Symposium. San Diego, CA: Internet Society.Google Scholar
Demetriou, Soteris, Merrill, Whitney, Yang, Wei, Zhang, Aston, and Gunter, Carl A. 2016. Free for All! Assessing User Data Exposure to Advertising Libraries on Android. In: Proceedings 2016 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Derr, Erik, Bugiel, Sven, Fahl, Sascha, Acar, Yasemin, and Backes, Michael. 2017. Keep Me Updated: An Empirical Study of Third-Party Library Updatability on Android. Pages 21872200 of: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. CCS’17. Dallas, TX: ACM. Google Scholar
Deußer, Clemens, Passmann, Steffen, and Strufe, Thorsten. 2020. Browsing Unicity: On the Limits of Anonymizing Web Tracking Data. Pages 279292 of: 2020 IEEE Symposium on Security and Privacy. SP. San Francisco, CA: IEEE.Google Scholar
Dey, Sanorita, Roy, Nirupam, Xu, Wenyuan, Choudhury, Romit Roy, and Nelakuditi, Srihari. 2014. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. In: Proceedings of the 2014 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Diamantaris, Michalis, Marcantoni, Francesco, Ioannidis, Sotiris, and Polakis, Jason. 2020. The Seven Deadly Sins of the HTML5 WebAPI: A Large-Scale Study on the Risks of Mobile Sensor-Based Attacks. ACM Transactions on Privacy and Security, 23 (4), 19:1–19:31.Google Scholar
DiNitto, Diana, and Johnson, David H. 2015. Social Welfare: Politics and Public Policy. 8 edition. Boston, MA: Pearson.Google Scholar
Doctorow, Cory. 2020 (Aug.). How to Destroy “Surveillance Capitalism.” https://onezero.medium.com/how-to-destroy-surveillance-capitalism-8135e6744d59.Google Scholar
Dolin, Claire, Weinshel, Ben, Shan, Shawn, Hahn, Chang Min, Choi, Euirim, Mazurek, Michelle L., and Ur, Blase. 2018. Unpacking Perceptions of Data-Driven Inferences Underlying Online Targeting and Personalization. Pages 493:1–493:12 of: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. CHI’18. Montreal: ACM. Google Scholar
Duan, Ruian, Bijlani, Ashish, Xu, Meng, Kim, Taesoo, and Lee, Wenke. 2017. Identifying Open-Source License Violation and 1-Day Security Risk at Large Scale. Pages 21692185 of: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. CCS’17. Dallas TX: ACM. Google Scholar
Dubois, Daniel J, Kolcun, Roman, Mandalari, Anna Maria, Paracha, Muhammad Talha, and Haddadi, Hamed. 2020. When Speakers Are All Ears: Characterizing Misactivations of IoT Smart Speakers. Proceedings on Privacy Enhancing Technologies, 2020 (4), 255276.Google Scholar
Dwork, Cynthia, Hardt, Moritz, Pitassi, Toniann, Reingold, Omer, and Zemel, Richard. 2012. Fairness through Awareness. Pages 214226 of: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference. Cambridge, MA: ACM. Google Scholar
Eckersley, Peter. 2010. How Unique Is Your Web Browser? Pages 118 of: Atallah, Mikhail J., and Hopper, Nicholas J. (eds.), Privacy Enhancing Technologies. Lecture Notes in Computer Science, no. 6205. Berlin, Heidelberg: Springer. Google Scholar
Eckhoff, David, and Wagner, Isabel. 2018. Privacy in the Smart City – Applications, Technologies, Challenges and Solutions. IEEE Communications Surveys & Tutorials, 20 (1), 489516.Google Scholar
Egele, Manuel, Kruegel, Christopher, Kirda, Engin, and Vigna, Giovanni. 2011 (Feb.). PiOS: Detecting Privacy Leaks in iOS Applications. Page 15 of: NDSS Symposium. San Diego, CA: Internet Society.Google Scholar
Enck, William, Gilbert, Peter, Han, Seungyeop, Tendulkar, Vasant, Chun, Byung-Gon, Cox, Landon P., Jung, Jaeyeon, McDaniel, Patrick, and Sheth, Anmol N. 2014. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. ACM Trans. Comput. Syst., 32(2), 5:1–5:29.Google Scholar
Englehardt, Steven, and Narayanan, Arvind. 2016. Online Tracking: A 1-Million-Site Measurement and Analysis. Pages 13881401 of: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. CCS’16. Vienna: ACM. Google Scholar
Englehardt, Steven, Reisman, Dillon, Eubank, Christian, Zimmerman, Peter, Mayer, Jonathan, Narayanan, Arvind, and Felten, Edward W. 2015. Cookies That Give You Away: The Surveillance Implications of Web Tracking. Pages 289–299 of: Proceedings of the 24th International Conference on World Wide Web. WWW’15. Florence: International World Wide Web Conferences Steering Committee. Google Scholar
Englehardt, Steven, Han, Jeffrey, and Narayanan, Arvind. 2018. I Never Signed up for This! Privacy Implications of Email Tracking. Proceedings on Privacy Enhancing Technologies, 2018 (1), 109126.Google Scholar
Epp, Clayton, Lippold, Michael, and Mandryk, Regan L. 2011. Identifying Emotional States Using Keystroke Dynamics. Page 715 of: Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems. CHI’11. Vancouver: ACM Press.Google Scholar
Epstein, Robert, and Robertson, Ronald E. 2015. The Search Engine Manipulation Effect (SEME) and Its Possible Impact on the Outcomes of Elections. Proceedings of the National Academy of Sciences, 112 (33), E4512–E4521.Google Scholar
Epstein, Robert, Robertson, Ronald E., Lazer, David, and Wilson, Christo. 2017. Suppressing the Search Engine Manipulation Effect (SEME). Proc. ACM Hum.-Comput. Interact., 1 (CSCW), 42:1–42:22.Google Scholar
Ermakova, Tatiana, Fabian, Benjamin, Bender, Benedict, and Klimek, Kerstin. 2018. Web Tracking: – A Literature Review on the State of Research. Hawaii International Conference on System Sciences 2018. HICSS-51 (Jan.).Google Scholar
Eslami, Motahhare, Rickman, Aimee, Vaccaro, Kristen, Aleyasen, Amirhossein, Vuong, Andy, Karahalios, Karrie, Hamilton, Kevin, and Sandvig, Christian. 2015. “I Always Assumed That I Wasn’t Really That Close to [Her]”: Reasoning About Invisible Algorithms in News Feeds. Pages 153162 of: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. CHI’15. Seoul: ACM. Google Scholar
Eslami, Motahhare, Vaccaro, Kristen, Karahalios, Karrie, and Hamilton, Kevin. 2017 (May). “Be Careful; Things Can Be Worse than They Appear”: Understanding Biased Algorithms and Users’ Behavior Around Them in Rating Platforms. In: Eleventh International AAAI Conference on Web and Social Media. Montreal: AAAI Press.Google Scholar
Eslami, Motahhare, Kumaran, Krishna, Sneha, R., Sandvig, Christian, and Karahalios, Karrie. 2018. Communicating Algorithmic Process in Online Behavioral Advertising. Pages 432:1–432:13 of: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. CHI’18. Montreal: ACM. Google Scholar
European Data Protection Supervisor (EDPS). 2020 (July). Outcome of Own-Initiative Investigation into EU Institutions’ Use of Microsoft Products and Services. Tech. rept. European Union, Luxembourg.Google Scholar
Falahrastegar, Marjan, Haddadi, Hamed, Uhlig, Steve, and Mortier, Richard. 2016. Tracking Personal Identifiers Across the Web. Pages 3041 of: Karagiannis, Thomas, and Dimitropoulos, Xenofontas (eds.), Passive and Active Measurement. Lecture Notes in Computer Science. Cham: Springer. Google Scholar
Farooqi, Shehroze, Musa, Maaz, Shafiq, Zubair, and Zaffar, Fareed. 2020a. Canary-Trap: Detecting Data Misuse by Third-Party Apps on Online Social Networks. Proceedings on Privacy Enhancing Technologies, 2020 (4), 336354.CrossRefGoogle Scholar
Farooqi, Shehroze, Feal, Álvaro, Lauinger, Tobias, McCoy, Damon, Shafiq, Zubair, and Vallina-Rodriguez, Narseo. 2020b. Understanding Incentivized Mobile App Installs on Google Play Store. Pages 696709 of: Proceedings of the ACM Internet Measurement Conference. IMC’20. Pittsburgh, PA: ACM. CrossRefGoogle Scholar
Feal, Álvaro, Calciati, Paolo, Vallina-Rodriguez, Narseo, Troncoso, Carmela, and Gorla, Alessandra. 2020. Angel or Devil? A Privacy Study of Mobile Parental Control Apps. Proceedings on Privacy Enhancing Technologies, 2020 (2), 314335.CrossRefGoogle Scholar
Felt, Adrienne Porter, Barnes, Richard, King, April, Palmer, Chris, Bentzel, Chris, and Tabriz, Parisa. 2017 (Aug.). Measuring HTTPS Adoption on the Web. Pages 1323–1338 of: 26th USENIX Security Symposium. USENIX Security 17. Vancouver: USENIX.Google Scholar
Felten, Edward W., and Schneider, Michael A. 2000. Timing Attacks on Web Privacy. Pages 2532 of: Proceedings of the 7th ACM Conference on Computer and Communications Security. CCS’00. Athens: ACM. Google Scholar
Ferra, Fenia, Wagner, Isabel, Boiten, Eerke, Hadlington, Lee, Psychoula, Ismini, and Snape, Richard. 2020. Challenges in Assessing Privacy Impact: Tales from the Front Lines. Security and Privacy, 3 (2), e101.CrossRefGoogle Scholar
Fielding, Roy, and Reschke, Julian. 2014 (June). Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content. Tech. rept. RFC 7231. Internet Engineering Task Force (IETF).Google Scholar
Fifield, David, and Egelman, Serge. 2015. Fingerprinting Web Users Through Font Metrics. Pages 107–124 of: Böhme, Rainer, and Okamoto, Tatsuaki (eds.), Financial Cryptography and Data Security. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. Google Scholar
Foong, Eureka, Vincent, Nicholas, Hecht, Brent, and Gerber, Elizabeth M. 2018. Women (Still) Ask for Less: Gender Differences in Hourly Rate in an Online Labor Marketplace. Proc. ACM Hum.-Comput. Interact., 2 (CSCW), 53:1–53:21.Google Scholar
Ford, Marcia, and Palmer, William. 2019. Alexa, Are You Listening to Me? An Analysis of Alexa Voice Service Network Traffic. Personal and Ubiquitous Computing, 23 (1), 6779.Google Scholar
Fouad, Imane, Bielova, Nataliia, Legout, Arnaud, and Sarafijanovic-Djukic, Natasa. 2020. Missed by Filter Lists: Detecting Unknown Third-Party Trackers with Invisible Pixels. Proceedings on Privacy Enhancing Technologies, 2020 (2), 499518.Google Scholar
Frik, Alisa, Haviland, Amelia, and Acquisti, Alessandro. 2020. The Impact of AdBlockers on Product Search and Purchase Behavior: A Lab Experiment. Pages 163179 of: 29th USENIX Security Symposium. USENIX Security 20. USENIX.Google Scholar
Fruchter, Nathaniel, Miao, Hsin, Stevenson, Scott, and Balebako, Rebecca. 2015. Variations in Tracking in Relation to Geographic Location. Page 8 of: Proceedings of the 2015 Web 2.0 Workshop on Security and Privacy. W2SP. San Jose, CA: IEEE.Google Scholar
Galán, A. Arrate, Cabañas, J. González, Cuevas, Á, Calderón, M., and Rumin, R. Cuevas. 2019. Large-Scale Analysis of User Exposure to Online Advertising on Facebook. IEEE Access, 7 , 1195911971.Google Scholar
Galhotra, Sainyam, Brun, Yuriy, and Meliou, Alexandra. 2017. Fairness Testing: Testing Software for Discrimination. Pages 498–510 of: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering. ESEC/FSE 2017. Paderborn: ACM. Google Scholar
Galič, Maša. 2019. Surveillance, Privacy and Public Space in the Stratumseind Living Lab: The Smart City Debate, beyond Data. Ars Aequi, July, 570579.Google Scholar
Gamba, Julien, Rashed, Mohammed, Razaghpanah, Abbas, Tapiador, Juan, and Vallina-Rodriguez, Narseo. 2020. An Analysis of Pre-Installed Android Software. Pages 197213 of: 2020 IEEE Symposium on Security and Privacy. SP. San Francisco, CA: IEEE.Google Scholar
Ge, Yanbo, Knittel, Christopher R, MacKenzie, Don, and Zoepf, Stephen. 2016 (Oct.). Racial and Gender Discrimination in Transportation Network Companies. Working Paper 22776. National Bureau of Economic Research.Google Scholar
Gervais, Arthur, Filios, Alexandros, Lenders, Vincent, and Capkun, Srdjan. 2017. Quantifying Web Adblocker Privacy. Pages 21–42 of: Foley, Simon N., Gollmann, Dieter, and Snekkenes, Einar (eds.), Computer Security – ESORICS 2017.Lecture Notes in Computer Science. Cham: Springer. Google Scholar
Gill, Phillipa, Erramilli, Vijay, Chaintreau, Augustin, Krishnamurthy, Balachander, Papagiannaki, Konstantina, and Rodriguez, Pablo. 2013. Follow the Money: Understanding Economics of Online Aggregation and Advertising. Pages 141– 148 of: Proceedings of the 2013 Conference on Internet Measurement Conference. IMC’13. Barcelona: ACM. Google Scholar
Gjoka, Minas, Kurant, Maciej, Butts, Carter T., and Markopoulou, Athina. 2010 (March). Walking in Facebook: A Case Study of Unbiased Sampling of OSNs. Pages 19 of: 2010 Proceedings IEEE INFOCOM.Google Scholar
Gómez-Boix, Alejandro, Laperdrix, Pierre, and Baudry, Benoit. 2018. Hiding in the Crowd: An Analysis of the Effectiveness of Browser Fingerprinting at Large Scale. Pages 309–318 of: Proceedings of the 2018 World Wide Web Conference. WWW’18. Lyon: International World Wide Web Conferences Steering Committee. Google Scholar
Gonzalez, Roberto, Soriente, Claudio, and Laoutaris, Nikolaos. 2016. User Profiling in the Time of HTTPS. Pages 373379 of: Proceedings of the 2016 Internet Measurement Conference. IMC’16. Santa Monica, CA: ACM. Google Scholar
Cabañas, González, José, Cuevas, Ángel, and Cuevas, Rubén. 2017. FDVT: Data Valuation Tool for Facebook Users. Pages 37993809 of: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. CHI’17. Denver, CO: ACM. Google Scholar
Grace, Michael C., Zhou, Wu, Jiang, Xuxian, and Sadeghi, Ahmad-Reza. 2012. Unsafe Exposure Analysis of Mobile In-App Advertisements. Pages 101112 of: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks. WISEC’12. Tucson, AZ: ACM. Google Scholar
Guha, Saikat, Cheng, Bin, and Francis, Paul. 2010. Challenges in Measuring Online Advertising Systems. Pages 8187 of: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement. IMC’10. Melbourne: ACM. Google Scholar
Gulyas, Gabor Gyorgy, Some, Doliere Francis, Bielova, Nataliia, and Castelluccia, Claude. 2018. To Extend or Not to Extend: On the Uniqueness of Browser Extensions and Web Logins. Pages 1427 of: Proceedings of the 2018 Workshop on Privacy in the Electronic Society. WPES’18. Toronto: ACM. Google Scholar
Guo, Zhixiu, Lin, Zijin, Li, Pan, and Chen, Kai. 2020. SkillExplorer: Understanding the Behavior of Skills in Large Scale. Pages 26492666 of: 29th USENIX Security Symposium. USENIX Security 20. USENIX.Google Scholar
Gutwirth, Serge, and Hildebrandt, Mireille. 2010. Some Caveats on Profiling. Pages 31– 41 of: Gutwirth, Serge, Poullet, Yves, and De Hert, Paul (eds.), Data Protection in a Profiled World. Dordrecht: Springer Netherlands.Google Scholar
Habib, Hana, Zou, Yixin, Jannu, Aditi, Sridhar, Neha, Swoopes, Chelse, Acquisti, Alessandro, Cranor, Lorrie Faith, Sadeh, Norman, and Schaub, Florian. 2019 (Aug.). An Empirical Analysis of Data Deletion and Opt-Out Choices on 150 Websites. In: Fifteenth Symposium on Usable Privacy and Security. SOUPS 2019.Google Scholar
Han, Catherine, Reyes, Irwin, Feal, Álvaro, Reardon, Joel, Wijesekera, Primal, Elazari, Amit, Bamberger, Kenneth A, and Egelman, Serge. 2020. The Price Is (Not) Right: Comparing Privacy in Free and Paid Apps. Proceedings on Privacy Enhancing Technologies, 2020 (3), 222242.CrossRefGoogle Scholar
Hannak, Aniko, Sapiezynski, Piotr, Molavi Kakhki, Arash, Krishnamurthy, Balachander, Lazer, David, Mislove, Alan, and Wilson, Christo. 2013. Measuring Personalization of Web Search. Pages 527538 of: Proceedings of the 22nd International Conference on World Wide Web. WWW’13. Rio de Janeiro: ACM.Google Scholar
Hannak, Aniko, Soeller, Gary, Lazer, David, Mislove, Alan, and Wilson, Christo. 2014. Measuring Price Discrimination and Steering on E-Commerce Web Sites. Pages 305318 of: Proceedings of the 2014 Conference on Internet Measurement Conference. IMC’14. Vancouver: ACM. CrossRefGoogle Scholar
Hannák, Anikó, Wagner, Claudia, Garcia, David, Mislove, Alan, Strohmaier, Markus, and Wilson, Christo. 2017. Bias in Online Freelance Marketplaces: Evidence from TaskRabbit and Fiverr. Pages 19141933 of: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. CSCW’17. Portland, OR: ACM. Google Scholar
Hao, Shuai, Liu, Bin, Nath, Suman, Halfond, William G.J., and Govindan, Ramesh. 2014. PUMA: Programmable UI-Automation for Large-Scale Dynamic Analysis of Mobile Apps. Pages 204–217 of: Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services. MobiSys’14. Bretton Woods, NH: ACM. Google Scholar
Hara, Kotaro, Adams, Abigail, Milland, Kristy, Savage, Saiph, Callison-Burch, Chris, and Bigham, Jeffrey P. 2018. A Data-Driven Analysis of Workers’ Earnings on Amazon Mechanical Turk. Pages 114 of: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. Montreal: ACM. Google Scholar
Hargreaves, E., Agosti, C., Menasché, D., Neglia, G., Reiffers-Masson, A., and Altman, E. 2018 (Aug.). Biases in the Facebook News Feed: A Case Study on the Italian Elections. Pages 806812 of: 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. ASONAM.Google Scholar
Hargreaves, Eduardo, Agosti, Claudio, Menasché, Daniel, Neglia, Giovanni, Reiffers-Masson, Alexandre, and Altman, Eitan. 2019. Fairness in Online Social Network Timelines: Measurements, Models and Mechanism Design. Performance Evaluation, 129 (Feb.), 1539.Google Scholar
Harkous, Hamza, Fawaz, Kassem, Lebret, Rémi, Schaub, Florian, Shin, Kang G., and Aberer, Karl. 2018. Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. Pages 531548 of: 27th USENIX Security Symposium. USENIX Security 18. Baltimore, MD: USENIX.Google Scholar
He, Yongzhong, Yang, Xuejun, Hu, Binghui, and Wang, Wei. 2019. Dynamic Privacy Leakage Analysis of Android Third-Party Libraries. Journal of Information Security and Applications, 46 (June), 259270.Google Scholar
Henze, Martin, Pennekamp, Jan, Hellmanns, David, Mühmer, Erik, Ziegeldorf, Jan Henrik, Drichel, Arthur, and Wehrle, Klaus. 2017. CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps. Pages 262–271 of: Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. MobiQuitous 2017. Melbourne: ACM. Google Scholar
Hils, Maximilian, Woods, Daniel W., and Böhme, Rainer. 2020. Measuring the Emergence of Consent Management on the Web. Pages 317332 of: Proceedings of the ACM Internet Measurement Conference. IMC’20. Pittsburgh, PA: ACM. Google Scholar
Howe, Daniel C. 2015. Surveillance Countermeasures: Expressive Privacy via Obfuscation. Datafied Research, 4 (1), 8898.Google Scholar
Howe, Daniel C, and Nissenbaum, Helen. 2017. Engineering Privacy and Protest: A Case Study of AdNauseam. Pages 5764 of: Proceedings of the 3rd International Workshop on Privacy Engineering, vol. 1873. San Jose, CA: IEEE.Google Scholar
Hu, Desheng, Jiang, Shan, Robertson, E., Ronald, and Wilson, Christo. 2019a. Auditing the Partisanship of Google Search Snippets. Pages 693704 of: The World Wide Web Conference. WWW’19. San Francisco, CA: ACM. Google Scholar
Hu, H., Peng, P., and Wang, G. 2019b (May). Characterizing Pixel Tracking through the Lens of Disposable Email Services. Pages 545–559 of: 2019 IEEE Symposium on Security and Privacy. SP. San Francisco, CA: IEEE.Google Scholar
Hu, Xuehui Hu, de Tangil, Guillermo Suarez, and Sastry, Nishanth. 2020a. Multi-Country Study of Third Party Trackers from Real Browser Histories. Pages 7086 of: IEEE European Symposium on Security and Privacy. Euro S&P. IEEE.Google Scholar
Hu, Yangyu, Wang, Haoyu, He, Ren, Li, Li, Tyson, Gareth, Castro, Ignacio, Guo, Yao, Wu, Lei, and Xu, Guoai. 2020b. Mobile App Squatting. Pages 1727–1738 of: Proceedings of The Web Conference 2020. WWW’20. Taipei: ACM. Google Scholar
Humbert, Mathias, Trubert, Benjamin, and Huguenin, Kévin. 2019. A Survey on Interdependent Privacy. ACM Comput. Surv., 52 (6), 122:1–122:40.Google Scholar
Hunold, Matthias, Kesler, Reinhold, and Laitenberger, Ulrich. 2018. Hotel Rankings of Online Travel Agents, Channel Pricing and Consumer Protection. Working Paper 300. Düsseldorf Institute for Competition Economics (DICE) Discussion Paper.Google Scholar
Hupperich, Thomas, Tatang, Dennis, Wilkop, Nicolai, and Holz, Thorsten. 2018. An Empirical Study on Online Price Differentiation. Pages 7683 of: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy. CODASPY’18. Tempe, AZ: ACM. Google Scholar
IAB Tech Lab. 2019 (March). Ads.Txt Specification. Tech. rept. 1.0.2.Google Scholar
Ikram, Muhammad, Onwuzurike, Lucky, Farooqi, Shehroze, Cristofaro, Emiliano De, Friedman, Arik, Jourjon, Guillaume, Kaafar, Mohammed Ali, and Shafiq, M. Zubair. 2017a. Measuring, Characterizing, and Detecting Facebook Like Farms. ACM Trans. Priv. Secur., 20 (4), 13:1–13:28.Google Scholar
Ikram, Muhammad, Asghar, Hassan Jameel, Kaafar, Mohamed Ali, Mahanti, Anirban, and Krishnamurthy, Balachandar. 2017b. Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-Class Learning. Proceedings on Privacy Enhancing Technologies, 2017 (1), 7999.Google Scholar
International Association of Privacy Professionals. 2016. GDPR Complaint-Process Map. https://iapp.org/resources/gdpr-tool/.Google Scholar
Invernizzi, L., Thomas, K., Kapravelos, A., Comanescu, O., Picod, J., and Bursztein, E. 2016 (May). Cloak of Visibility: Detecting When Machines Browse a Different Web. Pages 743758 of: 2016 IEEE Symposium on Security and Privacy. SP. San Jose, CA: IEEE.CrossRefGoogle Scholar
Iordanou, Costas, Soriente, Claudio, Sirivianos, Michael, and Laoutaris, Nikolaos. 2017. Who Is Fiddling with Prices?: Building and Deploying a Watchdog Service for E-Commerce. Pages 376389 of: Proceedings of the Conference of the ACM Special Interest Group on Data Communication. SIGCOMM’17. Los Angeles, CA: ACM. Google Scholar
Iordanou, Costas, Smaragdakis, Georgios, Poese, Ingmar, and Laoutaris, Nikolaos. 2018. Tracing Cross Border Web Tracking. Pages 329–342 of: Proceedings of the Internet Measurement Conference 2018. IMC’18. Boston, MA: ACM. Google Scholar
Iqbal, Umar, Shafiq, Zubair, and Qian, Zhiyun. 2017. The Ad Wars: Retrospective Measurement and Analysis of Anti-Adblock Filter Lists. Pages 171183 of: Proceedings of the 2017 Internet Measurement Conference. IMC’17. London: ACM. Google Scholar
Iqbal, Umar, Snyder, Peter, Zhu, Shitong, Livshits, Benjamin, Qian, Zhiyun, and Shafiq, Zubair. 2020. ADGRAPH: A Graph-Based Approach to Ad and Tracker Blocking. Pages 65–78 of: IEEE Symposium on Security and Privacy.SP.SanFrancisco,CA: IEEE.Google Scholar
Jiang, Shan, Chen, Le, Mislove, Alan, and Wilson, Christo. 2018. On Ridesharing Competition and Accessibility: Evidence from Uber, Lyft, and Taxi. Pages 863– 872 of: Proceedings of the 2018 World Wide Web Conference. WWW’18. Lyon: International World Wide Web Conferences Steering Committee. Google Scholar
Jiang, Shan, Robertson, Ronald E., and Wilson, Christo. 2019. Bias Misperceived:The Role of Partisanship and Misinformation in YouTube Comment Moderation. Proceedings of the International AAAI Conference on Web and Social Media, 13 (July), 278289.Google Scholar
Jin, Haojian, Liu, Minyi, Dodhia, Kevan, Li, Yuanchun, Srivastava, Gaurav, Fredrikson, Matthew, AgarwalYuvraj, , and Hong, Jason I. 2018. Why Are They Collecting My Data?: Inferring the Purposes of Network Traffic in Mobile Apps. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2 (4), 173:1–173:27.Google Scholar
Johnson, I., Henderson, J., Perry, C., Schöning, J., and Hecht, B. 2017. Beautiful…but at What Cost?: An Examination of Externalities in Geographic Vehicle Routing. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 1 (2), 15:1–15:21.Google Scholar
Jones, Jason J., Bond, Robert M., Bakshy, Eytan, Eckles, Dean, and Fowler, James H. 2017. Social Influence and Political Mobilization: Further Evidence from a Randomized Experiment in the 2012 U.S. Presidential Election. PLOS ONE, 12 (4), e0173851.Google Scholar
Kamkar, Samy. 2010 (Oct.). Evercookie: – Virtually Irrevocable Persistent Cookies. https://samy.pl/evercookie/.Google Scholar
Karami, Soroush, Ilia, Panagiotis, Solomos, Konstantinos, and Polakis, Jason. 2020. Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting. In: Proceedings 2020 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Karegar, Farzaneh, Pettersson, John Sören, and Fischer-Hübner, Simone. 2020. The Dilemma of User Engagement in Privacy Notices: Effects of Interaction Modes and Habituation on User Attention. ACM Transactions on Privacy and Security (TOPS), 23 (1), 5:1–5:38.Google Scholar
Kawase, Ricardo, Papadakis, George, Herder, Eelco, and Nejdl, Wolfgang. 2011. Beyond the Usual Suspects: Context-Aware Revisitation Support. Pages 2736 of: Proceedings of the 22Nd ACM Conference on Hypertext and Hypermedia. HT’11. Eindhoven: ACM. Google Scholar
Kenneally, Erin, and Dittrich, David. 2012 (Aug.). The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. Tech. rept. US Department of Homeland Security.Google Scholar
Khattak, Sheharbano, Fifield, David, Afroz, Sadia, Javed, Mobin, Sundaresan, Srikanth, Paxson, Vern, Murdoch, Steven J., and McCoy, Damon. 2016. Do You See What I See? Differential Treatment of Anonymous Users. In: Proceedings 2016 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Klein, Amit, and Pinkas, Benny. 2019. DNS Cache-Based User Tracking. In: Proceedings 2019 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Kliman-Silver, Chloe, Hannak, Aniko, Lazer, David, Wilson, Christo, and Mislove, Alan. 2015. Location, Location, Location: The Impact of Geolocation on Web Search Personalization. Pages 121127 of: Proceedings of the 2015 Internet Measurement Conference. IMC’15. Tokyo: ACM. Google Scholar
Kohno, T., Broido, A., and Claffy, K. C. 2005. Remote Physical Device Fingerprinting. IEEE Transactions on Dependable and Secure Computing, 2 (2), 93108.Google Scholar
Kondracki, Brian, Aliyeva, Assel, Egele, Manuel, Polakis, Jason, and Nikiforakis, Nick. 2020. Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers. Pages 16781692 of: 2020 IEEE Symposium on Security and Privacy. SP. San Francisco, CA: IEEE.Google Scholar
Koop, Martin, Tews, Erik, and Katzenbeisser, Stefan. 2020. In-Depth Evaluation of Redirect Tracking and Link Usage. Proceedings on Privacy Enhancing Technologies, 2020 (4), 394413.Google Scholar
Kooti, Farshad, Grbovic, Mihajlo, Aiello, Luca Maria, Djuric, Nemanja, Radosavljevic, Vladan, , and Kristina, Lerman. 2017. Analyzing Uber’s Ride-Sharing Economy. Pages 574–582 of: Proceedings of the 26th International Conference on World Wide Web Companion. WWW’17 Companion. Perth: International World Wide Web Conferences Steering Committee. Google Scholar
Korolova, A. 2010 (Dec.). Privacy Violations Using Microtargeted Ads: A Case Study. Pages 474482 of: 2010 IEEE International Conference on Data Mining Workshops. Sydney: IEEE.Google Scholar
Kosinski, Michal, Stillwell, David, and Graepel, Thore. 2013. Private Traits and Attributes Are Predictable from Digital Records of Human Behavior. Proceedings of the National Academy of Sciences, 110 (15), 58025805.Google Scholar
Kramer, Adam D. I., Guillory, Jamie E., and Hancock, Jeffrey T. 2014. Experimental Evidence of Massive-Scale Emotional Contagion through Social Networks. Proceedings of the National Academy of Sciences, 111 (24), 87888790.Google Scholar
Kranch, Michael, and Bonneau, Joseph. 2015. Upgrading HTTPS in Mid-Air: An Empirical Study of Strict Transport Security and Key Pinning. In: Proceedings 2015 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Krishnamurthy, Balachander, and Wills, Craig. 2009. Privacy Diffusion on the Web: A Longitudinal Perspective. Page 541 of: Proceedings of the 18th International Conference on World Wide Web. WWW’09. Madrid: ACM Press.Google Scholar
Krishnamurthy, Balachander, and Wills, Craig E. 2006. Generating a Privacy Footprint on the Internet. Pages 6570 of: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement. IMC’06. Rio de Janeriro: ACM. Google Scholar
Krishnamurthy, Balachander, Naryshkin, Konstantin, and Wills, Craig E. 2011. Privacy Leakage vs. Protection Measures: The Growing Disconnect. Page 10 of: Web 2.0 Security and Privacy. W2SP. Oakland, CA: IEEE.Google Scholar
Kristof, Victor, Grossglauser, Matthias, and Thiran, Patrick. 2020. War of Words: The Competitive Dynamics of Legislative Processes. Pages 2803–2809 of: Proceedings of The Web Conference 2020. WWW’20. Taipei: ACM. Google Scholar
Kulshrestha, J., Zafar, M.B., Noboa, L.E., Gummadi, K.P., and Ghosh, S. 2015. Characterizing Information Diets of Social Media Users. Pages 218–227 of: Proceedings of the 9th International Conference on Web and Social Media. ICWSM 2015. Oxford: AAAI Press.Google Scholar
Kulshrestha, Juhi, Eslami, Motahhare, Messias, Johnnatan, Zafar, Muhammad Bilal, Ghosh, Saptarshi, Gummadi, Krishna P., and Karahalios, Karrie. 2017. Quantifying Search Bias: Investigating Sources of Bias for Political Searches in Social Media. Pages 417432 of: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. CSCW’17. Portland, OR: ACM. Google Scholar
Kumar, Vinayshekhar Bannihatti, Iyengar, Roger, Nisal, Namita, Feng, Yuanyuan, Habib, Hana, Story, Peter, Cherivirala, Sushain, Hagan, Margaret, Cranor, Lorrie, Wilson, Shomir, Schaub, Florian, and Sadeh, Norman. 2020. Finding a Choice in a Haystack: Automatic Extraction of Opt-Out Statements from Privacy Policy Text. Pages 1943–1954 of: Proceedings of The Web Conference 2020. WWW’20. Taipei: ACM. Google Scholar
Kurose, James, and Ross, Keith. 2016. Computer Networking: A Top-Down Approach. 7 edition. Boston, MA: Pearson.Google Scholar
Lambrecht, Anja, and Tucker, Catherine. 2019. Algorithmic Bias? An Empirical Study of Apparent Gender-Based Discrimination in the Display of STEM Career Ads. Management Science, 65 (7), 29662981.Google Scholar
Laperdrix, P., Rudametkin, W., and Baudry, B. 2016 (May). Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints. Pages 878894 of: 2016 IEEE Symposium on Security and Privacy. SP. San Jose, CA: IEEE.Google Scholar
Le, Huyen, Maragh, Raven, Ekdale, Brian, High, Andrew, Havens, Timothy, and Shafiq, Zubair. 2019. Measuring Political Personalization of Google News Search. Pages 29572963 of: The World Wide Web Conference. WWW’19. San Francisco, CA: ACM. Google Scholar
Lécuyer, Mathias, Ducoffe, Guillaume, Lan, Francis, Papancea, Andrei, Petsios, Theofilos, Spahn, Riley, Chaintreau, Augustin, and Geambasu, Roxana. 2014. XRay: Enhancing the Web’s Transparency with Differential Correlation. Pages 4964 of: 23rd USENIX Security Symposium. USENIX Security 14. San Diego, CA: USENIX.Google Scholar
Lecuyer, Mathias, Spahn, Riley, Spiliopolous, Yannis, Chaintreau, Augustin, Geambasu, Roxana, and Hsu, Daniel. 2015. Sunlight: Fine-Grained Targeting Detection at Scale with Statistical Confidence. Pages 554566 of: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. CCS’15. Denver, CO: ACM. Google Scholar
Lerner, Ada, Simpson, Anna Kornfeld, Kohno, Tadayoshi, and Roesner, Franziska. 2016. Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016. In: 25th USENIX Security Symposium. USENIX Security 16. Austin, TX: USENIX.Google Scholar
Leung, Christophe, Ren, Jingjing, Choffnes, David, and Wilson, Christo. 2016. Should You Use the App for That?: Comparing the Privacy Implications of App- and Web-Based Online Services. Pages 365372 of: Proceedings of the 2016 Internet Measurement Conference. IMC’16. Santa Monica, CA: ACM. Google Scholar
Li, Ang, Wang, Alice, Nazari, Zahra, Chandar, Praveen, and Carterette, Benjamin. 2020. Do Podcasts and Music Compete with One Another? Understanding Users’ Audio Streaming Habits. Pages 1920–1931 of: Proceedings of The Web Conference 2020. WWW’20. Taipei: ACM. Google Scholar
Li, M., Wang, W., Wang, P., Wang, S., Wu, D., Liu, J., Xue, R., and Huo, W. 2017a (May). LibD: Scalable and Precise Third-Party Library Detection in Android Markets. Pages 335–346 of: 2017 IEEE/ACM 39th International Conference on Software Engineering.ICSE.Google Scholar
Li, Menghao, Wang, Pei, Wang, Wei, Wang, Shuai, Wu, Dinghao, Liu, Jian, Xue, Rui, Huo, Wei, and Zou, Wei. 2018. Large-Scale Third-Party Library Detection in Android Markets. IEEE Transactions on Software Engineering, 1–1.Google Scholar
Li, Song, and Cao, Yinzhi. 2020. Who Touched My Browser Fingerprint? A Large-Scale Measurement Study and Classification of Fingerprint Dynamics. Pages 370– 385 of: Proceedings of the ACM Internet Measurement Conference. IMC’20. Pittsburgh, PA: ACM. Google Scholar
Li, Tai-Ching, Hang, Huy, Faloutsos, Michalis, and Efstathopoulos, Petros. 2015. TrackAdvisor: Taking Back Browsing Privacy from Third-Party Trackers. Pages 277289 of: Mirkovic, Jelena, and Liu, Yong (eds.), Passive and Active Measurement. Lecture Notes in Computer Science. Cham: Springer. Google Scholar
Li, Yuanchun, Yang, Ziyue, Guo, Yao, and Chen, Xiangqun. 2017b. DroidBot: A Lightweight UI-Guided Test Input Generator for Android. Pages 2326 of: 2017 IEEE/ACM 39th International Conference on Software Engineering Companion. ICSE-C. Buenos Aires: IEEE.Google Scholar
Libert, T., Graves, L., and Nielsen, R. K. 2018. Changes in Third-Party Content on European News Websites after GDPR. Tech. rept. pubs:909043. Reuters Institute for the Study of Journalism.Google Scholar
Libert, Timothy. 2015. Exposing the Invisible Web: An Analysis of Third-Party HTTP Requests on 1 Million Websites. International Journal of Communication, 9 (0), 18.Google Scholar
Libert, Timothy. 2018. An Automated Approach to Auditing Disclosure of Third-Party Data Collection in Website Privacy Policies. Pages 207–216 of: Proceedings of the 2018 World Wide Web Conference. WWW’18. Lyon: International World Wide Web Conferences Steering Committee. Google Scholar
Library of Congress. 2020 (Sept.). Recommended Formats Statement – Datasets – Resources (Preservation, Library of Congress). www.loc.gov/preservation/ resources/rfs/data.html.Google Scholar
Linden, Thomas, Khandelwal, Rishabh, Harkous, Hamza, and Fawaz, Kassem. 2020. The Privacy Policy Landscape After the GDPR. Proceedings on Privacy Enhancing Technologies, 2020 (1), 4764.Google Scholar
Liu, Bin, Sheth, Anmol, Weinsberg, Udi, Chandrashekar, Jaideep, and Govindan, Ramesh. 2013. AdReveal: Improving Transparency into Online Targeted Advertising. Pages 12:1–12:7 of: Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks. HotNets-XII. College Park, MD: ACM. Google Scholar
Liu, Tianming, Wang, Haoyu, Li, Li, Luo, Xiapu, Dong, Feng, Guo, Yao, Wang, Liu, Bissyandé, Tegawendé, and Klein, Jacques. 2020. MadDroid: Characterizing and Detecting Devious Ad Contents for Android Apps. Pages 1715–1726 of: Proceedings of The Web Conference 2020. WWW’20. Taipei: ACM. Google Scholar
Liu, X., Liu, J., Zhu, S., Wang, W., and Zhang, X. 2019. Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem. IEEE Transactions on Mobile Computing, 1–1.Google Scholar
Liu, Xing, Zhu, Sencun, Wang, Wei, and Liu, Jiqiang. 2017. Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem. Pages 655672 of: Deng, Robert, Weng, Jian, Ren, Kui, and Yegneswaran, Vinod (eds.), Security and Privacy in Communication Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Cham: Springer. Google Scholar
Liu, Yabing, Gummadi, Krishna P., Krishnamurthy, Balachander, and Mislove, Alan. 2011. Analyzing Facebook Privacy Settings: User Expectations vs. Reality. Pages 61–70 of: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference. IMC’11. Berlin: ACM. Google Scholar
Lurie, Emma, and Mustafaraj, Eni. 2019. Opening Up the Black Box: Auditing Google’s Top Stories Algorithm. Proceedings of the 32nd International Florida Artificial Intelligence Research Society Conference, 32(May), 376382. Sarasota, FL: AAAI Press.Google Scholar
Lyon, David. 2003. Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination. Psychology Press.Google Scholar
Ma, Ziang, Wang, Haoyu, Guo, Yao, and Chen, Xiangqun. 2016. LibRadar: Fast and Accurate Detection of Third-Party Libraries in Android Apps. Pages 653656 of: Proceedings of the 38th International Conference on Software Engineering Companion. ICSE’16. Austin, TX: ACM. Google Scholar
Malloy, Matthew, McNamara, Mark, Cahn, Aaron, and Barford, Paul. 2016. Ad Blockers: Global Prevalence and Impact. Pages 119125 of: Proceedings of the 2016 Internet Measurement Conference. IMC’16. Santa Monica, CA: ACM. Google Scholar
Marciel, M., Gonzalez, J., Kassa, Y. M., Gonzalez, R., and Ahmed, M. 2016 (Aug.). The Value of Online Users: Empirical Evaluation of the Price of Personalized Ads. Pages 694–700 of: 2016 11th International Conference on Availability, Reliability and Security. ARES. Salzburg: IEEE.Google Scholar
Mashhadi, Afra, and Chapman, Clovis. 2018. Who Gets the Lion’s Share in the Sharing Economy: A Case Study of Social Inequality in AirBnB. Pages 370–385 of: Staab, Steffen, Koltsova, Olessia, and Ignatov, Dmitry I. (eds.), Social Informatics. Lecture Notes in Computer Science. Cham: Springer. Google Scholar
Mathur, Arunesh, Acar, Gunes, Friedman, Michael J., Lucherini, Elena, Mayer, Jonathan Chetty, Marshini, and Narayanan, Arvind. 2019. Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites. Proceedings of the ACM on Human-Computer Interaction, 3 (CSCW), 81:1–81:32.Google Scholar
Matic, Srdjan, Iordanou, Costas, Smaragdakis, Georgios, and Laoutaris, Nikolaos. 2020. Identifying Sensitive URLs at Web-Scale. Pages 619633 of: Proceedings of the ACM Internet Measurement Conference. IMC’20. Pittsburgh, PA: ACM. Google Scholar
Matte, Celestin, Bielova, Nataliia, and Santos, Cristiana. 2020. Do Cookie Banners Respect My Choice? Pages 16121630 of: 2020 IEEE Symposium on Security and Privacy. SP. San Francisco, CA: IEEE.Google Scholar
May, Anna, Wachs, Johannes, and Hannák, Anikó. 2019. Gender Differences in Participation and Reward on Stack Overflow. Empirical Software Engineering, 24 (4), 19972019.Google Scholar
Mayer, J.R., and Mitchell, J.C. 2012 (May). Third-Party Web Tracking: Policy and Technology. Pages 413427 of: 2012 IEEE Symposium on Security and Privacy. SP. San Francisco, CA: IEEE.Google Scholar
Mazel, Johan, Garnier, Richard, and Fukuda, Kensuke. 2019. A Comparison of Web Privacy Protection Techniques. Computer Communications, 144 (Aug.), 162174.Google Scholar
Mazmudar, Miti, and Goldberg, Ian. 2020. Mitigator: Privacy Policy Compliance Using Trusted Hardware. Proceedings on Privacy Enhancing Technologies, 2020 (3), 204221.Google Scholar
McDonald, Allison, Bernhard, Matthew, Valenta, Luke, VanderSloot, Benjamin, Scott, Will, Sullivan, Nick, Halderman, J. Alex, and Ensafi, Roya. 2018. 403 Forbidden: A Global View of CDN Geoblocking. Pages 218–230 of: Proceedings of the Internet Measurement Conference 2018. IMC’18. Boston, MA: ACM. Google Scholar
McGrath, Sean, and Theodorou, Andreas. 2020 (Sept.). Exposing the Hidden Data Ecosystem Behind UK Charities. https://proprivacy.com/privacy-news/exposing-the-hidden-data-ecosystem-of-the-uks-most-trusted-charities.Google Scholar
Mehrotra, Rishabh, Anderson, Ashton, Diaz, Fernando, Sharma, Amit, Wallach, Hanna, and Yilmaz, Emine. 2017. Auditing Search Engines for Differential Satisfaction Across Demographics. Pages 626–633 of: Proceedings of the 26th International Conference on World Wide Web Companion. WWW’17 Companion. Perth: International World Wide Web Conferences Steering Committee. Google Scholar
Melicher, William, Sharif, Mahmood, Tan, Joshua, Bauer, Lujo, Christodorescu, Mihai, and Leon, Pedro Giovanni. 2016. (Do Not) Track Me Sometimes: Users’ Contextual Preferences for Web Tracking. Proceedings on Privacy Enhancing Technologies, 2016 (2), 135154.Google Scholar
Merrill, Jeremy B., and Tobin, Ariana. 2019. Facebook Moves to Block Ad TransparencyTools—…ProPublica, Jan.Google Scholar
Merzdovnik, G., Huber, M., Buhov, D., Nikiforakis, N., Neuner, S., Schmiedecker, M., and Weippl, E. 2017 (April). Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools. Pages 319333 of: 2017 IEEE European Symposium on Security and Privacy. EuroS P. Paris: IEEE.Google Scholar
Metwalley, Hassan, Traverso, Stefano, Mellia, Marco, Miskovic, Stanislav, and Baldi, Mario. 2015. The Online Tracking Horde: A View from Passive Measurements. Pages 111–125 of: Steiner, Moritz, Barlet-Ros, Pere, and Bonaventure, Olivier (eds.), Traffic Monitoring and Analysis. Lecture Notes in Computer Science. Cham: Springer. Google Scholar
, Mhaidli Abraham H., Zou, Yixin, and Schaub, Florian. 2019 (Aug.). “We Can’t Live Without Them!” App Developers’ Adoption of Ad Networks and Their Considerations of Consumer Risks. In: Fifteenth Symposium on Usable Privacy and Security. SOUPS 2019. Santa Clara, CA: USENIX.Google Scholar
Mikians, Jakub, Gyarmati, László, Erramilli, Vijay, and Laoutaris, Nikolaos. 2012. Detecting Price and Search Discrimination on the Internet. Pages 79–84 of: Proceedings of the 11th ACM Workshop on Hot Topics in Networks. HotNets-XI. Redmond, WA: ACM. Google Scholar
Mikians, Jakub, Gyarmati, László, Erramilli, Vijay, and Laoutaris, Nikolaos. 2013. Crowd-Assisted Search for Price Discrimination in e-Commerce: First Results. Pages 16 of: Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies. CoNEXT’13. Santa Barbara, CA: ACM. Google Scholar
Miroglio, Ben, , Zeber David, Kaye, Jofish, and Weiss, Rebecca. 2018. The Effect of Ad Blocking on User Engagement with the Web. Pages 813–821 of: Proceedings of the 2018 World Wide Web Conference. WWW’18. Lyon: International World Wide Web Conferences Steering Committee. Google Scholar
Mishra, Vikas, Laperdrix, Pierre, Vastel, Antoine, Rudametkin, Walter, Rouvoy, Romain, and Lopatka, Martin. 2020. Don’t Count Me Out: On the Relevance of IP Address in the Tracking Ecosystem. Pages 808–815 of: Proceedings of The Web Conference 2020. WWW’20. Taipei: ACM. Google Scholar
Moghaddam, Hooman Mohajeri, Acar, Gunes, Burgess, Ben, Mathur, Arunesh, Huang, Danny Yuxing, Feamster, Nick, Felten, Edward W, Mittal, Prateek, and Narayanan, Arvind. 2019. Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices. Pages 131–147 of: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. London: ACM. Google Scholar
Montgomery, Douglas C. 2019. Design and Analysis of Experiments. 9 edition. Hoboken, NJ: John Wiley & Sons.Google Scholar
Mowery, Keaton, and Shacham, Hovav. 2012. Pixel Perfect: Fingerprinting Canvas in HTML5. Page 12 of: Web 2.0 Workshop on Security and Privacy. W2SP. San Francisco, CA: IEEE.Google Scholar
Mowery, Keaton, Bogenreif, Dillon, Yilek, Scott, and Shacham, Hovav. 2011. Fingerprinting Information in JavaScript Implementations. Page 11 of: Web 2.0 Workshop on Security and Privacy. W2SP. Oakland, CA: IEEE.Google Scholar
Mughees, Muhammad Haris, Qian, Zhiyun, and Shafiq, Zubair. 2017. Detecting Anti Ad-Blockers in the Wild. Proceedings on Privacy Enhancing Technologies, 2017 (3), 130146.Google Scholar
Mulazzani, Martin, Reschl, Philipp, Huber, Markus, Leithner, Manuel, Schrittwieser, Sebastian, and Weippl, Edgar. 2013. Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting. Page 10 of: Web 2.0 Workshop on Security and Privacy. W2SP. San Francisco, CA: IEEE.Google Scholar
Munson, Sean A., Lee, Stephanie Y., and Resnick, Paul. 2013 (June). Encouraging Reading of Diverse Political Viewpoints with a Browser Widget. In: Seventh International AAAI Conference on Weblogs and Social Media. Cambridge, MA: AAAI Press.Google Scholar
Murphy, Kevin P. 2012. Machine Learning: A Probabilistic Perspective. Illustrated edition. Cambridge, MA: The MIT Press.Google Scholar
Narayanan, Arvind, and Reisman, Dillon. 2017. The Princeton Web Transparency and Accountability Project. Pages 45–67 of: Cerquitelli, Tania, Quercia, Daniele, and Pasquale, Frank (eds.), Transparent Data Mining for Big and Small Data, vol. 32. Cham: Springer International Publishing.Google Scholar
Narayanan, Arvind, and Shmatikov, Vitaly. 2008. Robust De-Anonymization of Large Sparse Datasets. Pages 111–125 of: IEEE Symposium on Security and Privacy, 2008. Oakland, CA: IEEE.Google Scholar
Natatsuka, Atsuko, Iijima, Ryo, Watanabe, Takuya, Akiyama, Mitsuaki, Sakai, Tetsuya, and Mori, Tatsuya. 2019. Poster: A First Look at the Privacy Risks of Voice Assistant Apps. Pages 26332635 of: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. CCS’19. London: ACM. Google Scholar
Nath, Suman. 2015. MAdScope: Characterizing Mobile In-App Targeted Ads. Pages 59–73 of: Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services. MobiSys’15. Florence: ACM. Google Scholar
Nguyen, Duc Cuong, Derr, Erik, Backes, Michael, and Bugiel, Sven. 2019. Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy. Page 15 of: IEEE Symposium on Security and Privacy. SP. San Francisco, CA: IEEE.Google Scholar
Niaki, Arian Akhavan, Cho, Shinyoung, Weinberg, Zachary, Hoang, Nguyen Phong, Razaghpanah, Abbas, Christin, Nicolas, and Gill, Phillipa. 2020. ICLab: A Global, Longitudinal Internet Censorship Measurement Platform. Pages 214230 of: 2020 IEEE Symposium on Security and Privacy. SP. San Francisco, CA: IEEE.Google Scholar
Nikiforakis, N., Kapravelos, A, Joosen, W., Kruegel, C., Piessens, F., and Vigna, G. 2013 (May). Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting. Pages 541555 of: IEEE Symposium on Security and Privacy. SP. San Francisco, CA: IEEE.Google Scholar
Nikiforakis, Nick, Acker, Steven Van, Piessens, Frank, and Joosen, Wouter. 2012. Exploring the Ecosystem of Referrer-Anonymizing Services. Pages 259278 of: Fischer-Hübner, Simone, and Wright, Matthew (eds.), Privacy Enhancing Technologies. Lecture Notes in Computer Science, no. 7384. Berlin, Heidelberg: Springer. Google Scholar
Nikiforakis, Nick, Joosen, Wouter, and Livshits, Benjamin. 2015. PriVaricator: Deceiving Fingerprinters with Little White Lies. Pages 820830 of: 24th International Conference on World Wide Web (WWW). WWW’15. Florence: ACM. Google Scholar
Nissenbaum, Helen. 2004. Privacy as Contextual Integrity. Wash.L.Rev., 79 , 119.Google Scholar
Nithyanand, Rishab, Khattak, Sheharbano, Javed, Mobin, Vallina-Rodriguez, Narseo, Falahrastegar, Marjan, Powles, Julia E., Cristofaro, Emiliano De, Hamed, Haddadi, and Murdoch, Steven J. 2016 (Aug.). Adblocking and Counter Blocking: A Slice of the Arms Race. In: 6th USENIX Workshop on Free and Open Communications on the Internet. FOCI 16. Austin, TX: USENIX.Google Scholar
Ohm, Paul. 2009 (Aug.). Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization. SSRN Scholarly Paper ID 1450006. Social Science Research Network, Rochester, NY.Google Scholar
Olejnik, Łukasz 2020 (Sept.). Shedding Light on Web Privacy Impact Assessment: A Case Study of the Ambient Light Sensor API. Pages 310–313 of: 2020 IEEE European Symposium on Security and Privacy Workshops. EuroS PW. IEEE.Google Scholar
Olejnik, Łukasz, Tran, Minh-Dung, and Castelluccia, Claude. 2014. Selling off Privacy at Auction. In: Proceedings 2014 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Olejnik, Łukasz, Acar, Gunes, Castelluccia, Claude, and Diaz, Claudia. 2016. The Leaking Battery. Pages 254–263 of: Garcia-Alfaro, Joaquin, Navarro-Arribas, Guillermo, Aldini, Alessandro, Martinelli, Fabio, and Suri, Neeraj (eds.), Data Privacy Management, and Security Assurance. Lecture Notes in Computer Science. Cham: Springer. Google Scholar
Oltramari, Alessandro, Piraviperumal, Dhivya, Schaub, Florian, Wilson, Shomir, Cherivirala, Sushain, Norton, Thomas B., Russell, N. Cameron, Story, Peter, Reidenberg, Joel, and Sadeh, Norman. 2018. PrivOnto: A Semantic Framework for the Analysis of Privacy Policies. Semantic Web, 9 (2), 185203.Google Scholar
Overdorf, Rebekah, Juarez, Mark, Acar, Gunes, Greenstadt, Rachel, and Diaz, Claudia. 2017. How Unique Is Your .Onion?: An Analysis of the Fingerprintability of Tor Onion Services. Pages 20212036 of: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. CCS’17. Dallas, TX: ACM. Google Scholar
Pachilakis, Michalis, Papadopoulos, Panagiotis, Markatos, Evangelos P., and Kourtellis, Nicolas. 2019. No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem. Pages 280293 of: Proceedings of the Internet Measurement Conference. IMC’19. Amsterdam: ACM. CrossRefGoogle Scholar
Pan, Elleen, Ren, Jingjing, Lindorfer, Martina, Wilson, Christo, and Choffnes, David. 2018. Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications. Proceedings on Privacy Enhancing Technologies, 2018 (4), 3350.Google Scholar
Papadopoulos, Panagiotis, Kourtellis, Nicolas, Rodriguez, Pablo Rodriguez, and Laoutaris, Nikolaos. 2017. If You Are Not Paying for It, You Are the Product: How Much Do Advertisers Pay to Reach You? Pages 142156 of: Proceedings of the 2017 Internet Measurement Conference. IMC’17. London: ACM. Google Scholar
Papadopoulos, Panagiotis, Kourtellis, Nicolas, and Markatos, Evangelos. 2019. Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid to Ask. Pages 14321442 of: The World Wide Web Conference. WWW’19. San Francisco, CA: ACM. Google Scholar
Papadopoulos, Panagiotis, Snyder, Peter, Athanasakis, Dimitrios, and Livshits, Benjamin. 2020. Keeping out the Masses: Understanding the Popularity and Implications of Internet Paywalls. Pages 1433–1444 of: Proceedings of The Web Conference 2020. WWW’20. Taipei: ACM. Google Scholar
Papaodyssefs, Fotios, Iordanou, Costas, Blackburn, Jeremy, Laoutaris, Nikolaos, and Papagiannaki, Konstantina. 2015. Web Identity Translator: Behavioral Advertising and Identity Privacy with WIT. Pages 3:1–3:7 of: Proceedings of the 14th ACM Workshop on Hot Topics in Networks. HotNets-XIV. Philadelphia, PA: ACM. Google Scholar
Parra-Arnau, Javier, Achara, Jagdish Prasad, and Castelluccia, Claude. 2017. MyAd-Choices: Bringing Transparency and Control to Online Advertising. ACM Trans. Web, 11 (1), 7:1–7:47.Google Scholar
Pasquale, Frank. 2015. The Black Box Society: The Secret Algorithms That Control Money and Information. Cambridge, MA: Harvard University Press.Google Scholar
Peddinti, Sai Teja, and Saxena, Nitesh. 2010. On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot. Pages 19–37 of: Atallah, Mikhail J., and Hopper, Nicholas J. (eds.), Privacy Enhancing Technologies. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. Google Scholar
Peddinti, Sai Teja, Bilogrevic, Igor, Taft, Nina, Pelikan, Martin, Erlingsson, Úlfar, Anthonysamy, Pauline, and Hogben, Giles. 2019. Reducing Permission Requests in Mobile Apps. Pages 259–266 of: Proceedings of the Internet Measurement Conference. IMC’19. Amsterdam: ACM. Google Scholar
Peer, Eyal, Brandimarte, Laura, Samat, Sonam, and Acquisti, Alessandro. 2017. Beyond the Turk: Alternative Platforms for Crowdsourcing Behavioral Research. Journal of Experimental Social Psychology, 70 (May), 153163.Google Scholar
Perdisci, Roberto, Papastergiou, Thomas, Alrawi, Omar, and Antonakakis, Manos. 2020. IoTFinder: Efficient Large-Scale Identification of IoT Devices via Passive DNS Traffic Analysis. Pages 474489 of: IEEE European Symposium on Security and Privacy. Euro S&P. IEEE.Google Scholar
Pham, Anh, Dacosta, Italo, Losiouk, Eleonora, Stephan, John, Huguenin, Kévin, and Hubaux, Jean-Pierre. 2019 (Aug.). HideMyApp: Hiding the Presence of Sensitive Apps on Android. Pages 711728 of: 28th USENIX Security Symposium.USENIX Security 19. Santa Clara, CA: USENIX.Google Scholar
Pitoura, Evaggelia, Tsaparas, Panayiotis, Flouris, Giorgos, Fundulaki, Irini, Papadakos, Panagiotis, Abiteboul, Serge, and Weikum, Gerhard. 2018. On Measuring Bias in Online Information. SIGMOD Rec., 46 (4), 1621.Google Scholar
Plane, Angelisa C., Redmiles, Elissa M., Mazurek, Michelle L., and Tschantz, Michael Carl. 2017. Exploring User Perceptions of Discrimination in Online Targeted Advertising. Pages 935951 of: 26th USENIX Security Symposium. USENIX Security 17. Vancouver: USENIX.Google Scholar
Pochat, Victor Le, van Goethem, Tom, and Joosen, Wouter. 2019. Rigging Research Results by Manipulating Top Websites Rankings. In: 26th Annual Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Privacy International. 2019a (March). Guess What? Facebook Still Tracks You on Android Apps (Even If You Don’t Have a Facebook Account). http://privacyinternational.org/blog/2758/appdata-update.Google Scholar
Privacy International. 2019b (Sept.). No Body’s Business But Mine: How Menstruation Apps Are Sharing Your Data. Tech. rept.Google Scholar
Pujol, Enric, Hohlfeld, Oliver, and Feldmann, Anja. 2015. Annoyed Users: Ads and Ad-Block Usage in the Wild. Pages 93106 of: Proceedings of the 2015 Internet Measurement Conference. IMC’15. Tokyo: ACM. Google Scholar
Rabinowitz, Phil. 2020. The Community Tool Box, Chapter 25: Changing Policies. https://ctb.ku.edu/en/table-of-contents/implement/changing-policies/ overview/main.Google Scholar
Rachovitsa, Adamantia. 2016. Engineering and Lawyering Privacy by Design: Understanding Online Privacy Both as a Technical and an International Human Rights Issue. International Journal of Law and Information Technology, 24 (4), 374399.Google Scholar
Rafique, M. Zubair, Van Goethem, Tom, Joosen, Wouter, Huygens, Christophe, and Nikiforakis, Nick. 2016. It’s Free for a Reason: Exploring the Ecosystem of Free Live Streaming Services. In: Proceedings 2016 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Rama, Daniele, Mejova, Yelena, Tizzoni, Michele, Kalimeri, Kyriaki, and Weber, Ingmar. 2020. Facebook Ads as a Demographic Tool to Measure the Urban-Rural Divide. Pages 327–338 of: Proceedings of The Web Conference 2020. WWW’20. Taipei: ACM. Google Scholar
Ramesh, Reethika, Raman, Ram Sundara, Bernhard, Matthew, Ongkowijaya, Victor, Evdokimov, Leonid, Edmundson, Anne, Sprecher, Steven, Ikram, Muhammad, and Ensafi, Roya. 2020. Decentralized Control: A Case Study of Russia. In: Proceedings 2020 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Rao, Ashwin, Kakhki, Arash Molavi, Razaghpanah, Abbas, Li, Anke, Choffnes, David, Legout, Arnaud, Mislove, Alan, and Gill, Phillipa. 2015. Meddle: Enabling Transparency and Control for Mobile Internet Traffic. Technology Science , 2015103003(Oct.).Google Scholar
Rashid, Fahmida Y. 2014 (April). Surveillance Is the Business Model of the Internet: Bruce Schneier . www.securityweek.com/surveillance-business-model-internet-bruce-schneier.Google Scholar
Rashidi, B., Fung, C., Nguyen, A., Vu, T., and Bertino, E. 2018. Android User Privacy Preserving Through Crowdsourcing. IEEE Transactions on Information Forensics and Security, 13 (3), 773787.Google Scholar
Razaghpanah, Abbas, Nithyanand, Rishab, Vallina-Rodriguez, Narseo, Sundaresan, Srikanth, Allman, Mark, Kreibich, Christian, and Gill, Phillipa. 2018. Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem. In: Proceedings of the 2018 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Reardon, Joel, Feal, Álvaro, Wijesekera, Primal, On, Amit Elazari Bar, Vallina-Rodriguez, Narseo, and Egelman, Serge. 2019 (Aug.). 50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System. Pages 603620 of: 28th USENIX Security Symposium. USENIX Security 19. Santa Clara, CA: USENIX.Google Scholar
Reed, Mark S. 2018. The Research Impact Handbook. St Johns Well: Fast Track Impact.Google Scholar
Ren, Jingjing, Rao, Ashwin, Lindorfer, Martina, Legout, Arnaud, and Choffnes, David. 2016. ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic. Pages 361–374 of: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services. MobiSys’16. Singapore: ACM. Google Scholar
Ren, Jingjing, Lindorfer, Martina, Dubois, Daniel J., Rao, Ashwin, Choffnes, David, and Vallina-Rodriguez, Narseo. 2018. Bug Fixes, Improvements, …and Privacy Leaks – A Longitudinal Study of PII Leaks Across Android App Versions. In: Proceedings of the 2018 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Ren, Jingjing, Dubois, Daniel J., Choffnes, David, Mandalari, Anna Maria, Kolcun, Roman, and Haddadi, Hamed. 2019. Information Exposure From Consumer IoT Devices: A Multidimensional, Network-Informed Measurement Approach. Pages 267279 of: Proceedings of the Internet Measurement Conference. IMC’19. Amsterdam: ACM. Google Scholar
Reschke, Julian F., and Fielding, Roy T. 2014 (June). Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing. Tech. rept. RFC 7230. Internet Engineering Task Force (IETF).Google Scholar
Reyes, Irwin, Wijesekera, Primal, Reardon, Joel, On, Amit Elazari Bar, Razaghpanah, Abbas, Vallina-Rodriguez, Narseo, and Egelman, Serge. 2018. “Won’t Somebody Think of the Children?” Examining COPPA Compliance at Scale. Proceedings on Privacy Enhancing Technologies, 2018 (3), 6383.Google Scholar
Ribeiro, Filipe N., Henrique, Lucas, Benevenuto, Fabricio, Chakraborty, Abhijnan, Kulshrestha, Juhi, Babaei, Mahmoudreza, and Gummadi, Krishna P. 2018 (June). Media Bias Monitor: Quantifying Biases of Social Media News Outlets at Large-Scale. In: Twelfth International AAAI Conference on Web and Social Media. Palo Alto, CA: AAAI Press.Google Scholar
Ribeiro, Manoel Horta, Ottoni, Raphael, West, Robert, Almeida, Virgílio A. F., and Meira, Wagner. 2020. Auditing Radicalization Pathways on YouTube. Pages 131–141 of: Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency. FAT*’20. Barcelona: ACM. Google Scholar
Riederer, Christopher, Echickson, Daniel, Huang, Stephanie, and Chaintreau, Augustin. 2016. FindYou: A Personal Location Privacy Auditing Tool. Pages 243–246 of: Proceedings of the 25th International Conference Companion on World Wide Web. WWW’16 Companion. Montreal: International World Wide Web Conferences Steering Committee. Google Scholar
Robertson, Ronald E., Jiang, Shan, Joseph, Kenneth, Friedland, Lisa, Lazer, David, and Wilson, Christo. 2018a. Auditing Partisan Audience Bias Within Google Search. Proc. ACM Hum.-Comput. Interact., 2(CSCW), 148:1–148:22.Google Scholar
Robertson, Ronald E., Lazer, David, and WilsonChristo, . 2018b. Auditing the Personalization and Composition of Politically-Related Search Engine Results Pages. Pages 955–965 of: Proceedings of the 2018 World Wide Web Conference. WWW’18. Lyon: International World Wide Web Conferences Steering Committee. Google Scholar
Robertson, Ronald E., Jiang, Shan, Lazer, David, and Wilson, Christo. 2019. Auditing Autocomplete: Suggestion Networks and Recursive Algorithm Interrogation. Pages 235–244 of: Proceedings of the 10th ACM Conference on Web Science. WebSci’19. Boston, MA: ACM Press.Google Scholar
Roesner, Franziska, Kohno, Tadayoshi, and Wetherall, David. 2012. Detecting and Defending Against Third-Party Tracking on the Web. Pages 1212 of: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation. NSDI’12. San Jose, CA: USENIX Association.Google Scholar
Roth, Sebastian, Barron, Timothy, Calzavara, Stefano, Nikiforakis, Nick, and Stock, Ben. 2020. Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies. In: Proceedings 2020 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Samarasinghe, Nayanamana, and Mannan, Mohammad. 2019. Towards a Global Perspective on Web Tracking. Computers & Security, 87 (Nov.), 101569.Google Scholar
Sanchez-Monedero, Javier, Dencik, Lina, and Edwards, Lilian. 2019. What Does It Mean to Solve the Problem of Discrimination in Hiring? Social, Technical and Legal Perspectives from the UK on Automated Hiring Systems. arXiv:1910.06144 [cs], Sept.Google Scholar
Sandvig, Christian, Hamilton, Kevin, Karahalios, Karrie, and Langbort, Cedric. 2014 (May). Auditing Algorithms: Research Methods for Detecting Discrimination on Internet Platforms. Page 23 of: Data and Discrimination: Converting Critical Concerns into Productive Inquiry.Google Scholar
Sarker, Shaown, Jueckstock, Jordan, and Kapravelos, Alexandros. 2020. Hiding in Plain Site: Detecting JavaScript Obfuscation through Concealed Browser API Usage. Pages 648661 of: Proceedings of the ACM Internet Measurement Conference. IMC’20. Pittsburgh, PA: ACM. Google Scholar
Scheiber, Noam. 2019. Facebook Accused of Allowing Bias Against Women in Job Ads. The New York Times (March).Google Scholar
Scheiber, Noam, and Isaac, Mike. 2019. Facebook Halts Ad Targeting Cited in Bias Complaints. The New York Times (March).Google Scholar
Schelter, Sebastian, and Kunegis, Jérôme. 2018. On the Ubiquity of Web Tracking: Insights from a Billion-Page Web Crawl. The Journal of Web Science, 4 (4), 5366.Google Scholar
Schirck-Matthews, Angela, Hochmair, Hartwig, Strelnikova, Dariia, and Juhasz, Levente. 2019. Comparing the Characteristics of Bicycle Trips between Endomondo, Google Maps, and MapQuest. Transportation Research Board Annual Meeting . Washington, DC.Google Scholar
Schubert, Charlotte. 2018 (Jan.). Do I Make Myself Clear? Media Training for Scientists. www.sciencemag.org/features/2018/01/do-i-make-myself-clear-media-training-scientists.Google Scholar
Seneviratne, Suranga, Kolamunna, Harini, and Seneviratne, Aruna. 2015. A Measurement Study of Tracking in Paid Mobile Applications. Pages 7:1–7:6 of: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks. WiSec’15. New York: ACM. Google Scholar
Shankland, Stephen, and Mihalcik, Carrie. 2019 (May). Google Holds Firm on Chrome Changes That May Break Ad Blockers. www.cnet.com/news/google-holds-firm-on-chrome-changes-that-may-break-ad-blockers /.Google Scholar
Shezan, Faysal Hossain, Hu, Hang, Wang, Jiamin, Wang, Gang, and Tian, Yuan. 2020. Read Between the Lines: An Empirical Measurement of Sensitive Applications of Voice Personal Assistant Systems. Pages 1006–1017 of: Proceedings of The Web Conference 2020. WWW’20. Taipei: ACM. Google Scholar
Shipp, Laura, and Blasco, Jorge. 2020. How Private Is Your Period?: A Systematic Analysis of Menstrual App Privacy Policies. Proceedings on Privacy Enhancing Technologies, 2020 (4), 491510.Google Scholar
Shuba, Anastasia, and Markopoulou, Athina. 2020. NoMoATS: Towards Automatic Detection of Mobile Tracking. Proceedings on Privacy Enhancing Technologies, 2020 (2), 4566.Google Scholar
Siby, Sandra, Juarez, Marc, Diaz, Claudia, Vallina-Rodriguez, Narseo, and Troncoso, Carmela. 2020. Encrypted DNS –> Privacy? A Traffic Analysis Perspective. In: Proceedings of the 2020 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.+Privacy?+A+Traffic+Analysis+Perspective.+In:+Proceedings+of+the+2020+Network+and+Distributed+System+Security+Symposium.+San+Diego,+CA:+Internet+Society.>Google Scholar
Silva, Márcio, Santos de Oliveira, Lucas, Andreou, Athanasios, Vaz de Melo, Pedro Olmo, Goga, Oana, and Benevenuto, Fabricio 2020. Facebook Ads Monitor: An Independent Auditing System for Political Ads on Facebook. Pages 224–234 of: Proceedings of The Web Conference 2020. WWW’20. Taipei: ACM. Google Scholar
Sjösten, Alexander, Van Acker, Steven, and Sabelfeld, Andrei. 2017. Discovering Browser Extensions via Web Accessible Resources. Pages 329336 of: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy. CODASPY’17. Scottsdale, AZ: ACM. Google Scholar
Snowden, Edward. 2019. Permanent Record. 1st edition. New York: Metropolitan Books.Google Scholar
Soeller, Gary, Karahalios, Karrie, Sandvig, Christian, and Wilson, Christo. 2016. MapWatch: Detecting and Monitoring International Border Personalization on Online Maps. Pages 867–878 of: Proceedings of the 25th International Conference on World Wide Web. WWW’16. Montreal: International World Wide Web Conferences Steering Committee. Google Scholar
Solomos, Konstantinos, Ilia, Panagiotis, Ioannidis, Sotiris, and Kourtellis, Nicolas. 2019. Talon: An Automated Framework for Cross-Device Tracking Detection. In: 22nd International Symposium on Research in Attacks, Intrusions and Defenses. RAID 2019. Beijing: USENIX.Google Scholar
Soltani, Ashkan, Canty, Shannon, Mayo, Quentin, Thomas, Lauren, and Hoofnagle, Chris Jay. 2009 (Aug.). Flash Cookies and Privacy. SSRN Scholarly Paper ID 1446862. Social Science Research Network, Rochester, NY.Google Scholar
Son, Sooel, Kim, Daehyeok, and Shmatikov, Vitaly. 2016. What Mobile Ads Know About Mobile Users. In: Proceedings of the 2016 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Sørensen, Jannick Kirk, and Kosta, Sokol. 2019. Before and After GDPR: The Changes in Third Party Presence at Public and Private European Websites. Pages 1590– 1600 of: WWW’19 Companion Proceedings of the The Web Conference 2019. San Francisco, CA: ACM Press.Google Scholar
Speicher, Till, Ali, Muhammad, Venkatadri, Giridhari, Ribeiro, Filipe Nunes, Arvanitakis, George, Benevenuto, Fabrício, Gummadi, Krishna P., Loiseau, Patrick, and Mislove, Alan. 2018 (Jan.). Potential for Discrimination in Online Targeted Advertising. Pages 5–19 of: Conference on Fairness, Accountability and Transparency. New York: ACM. Google Scholar
Srivastava, Animesh, Jain, Puneet, Demetriou, Soteris, Cox, Landon P., and Kim, Kyu-Han. 2017. CamForensics: Understanding Visual Privacy Leaks in the Wild. Pages 30:1–30:13 of: Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems. SenSys’17. Delft: ACM. Google Scholar
Starov, O., and Nikiforakis, N. 2017a (May). XHOUND: Quantifying the Fingerprintability of Browser Extensions. Pages 941–956 of: 2017 IEEE Symposium on Security and Privacy. SP. San Jose, CA: IEEE.Google Scholar
Starov, Oleksii, and Nikiforakis, Nick. 2017b. Extended Tracking Powers: Measuring the Privacy Diffusion Enabled by Browser Extensions. Pages 1481–1490 of: Proceedings of the 26th International Conference on World Wide Web. WWW’17. Perth, Australia: International World Wide Web Conferences Steering Committee. Google Scholar
Starov, Oleksii, Gill, Phillipa, and Nikiforakis, Nick. 2016. Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms. Proceedings on Privacy Enhancing Technologies, 2016 (1), 2033.Google Scholar
Starov, Oleksii, Zhou, Yuchen, Zhang, Xiao, Miramirkhani, Najmeh, and Nikiforakis, Nick. 2018. Betrayed by Your Dashboard: Discovering Malicious Campaigns via Web Analytics. Pages 227–236 of: Proceedings of the 2018 World Wide Web Conference. WWW’18. Lyon: International World Wide Web Conferences Steering Committee. Google Scholar
Starov, Oleksii, Laperdrix, Pierre, Kapravelos, Alexandros, and Nikiforakis, Nick. 2019 (May). Unnecessarily Identifiable: Quantifying the Fingerprintability of Browser Extensions Due to Bloat. Page 7 of: Proceedings of the 2019 World Wide Web Conference. WWW’19.Google Scholar
Stivala, Giada, and Pellegrino, Giancarlo. 2020. Deceptive Previews: A Study of the Link Preview Trustworthiness in Social Platforms. In: Proceedings 2020 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Stock, Ben, Pellegrino, Giancarlo, Rossow, Christian, Johns, Martin, and Backes, Michael. 2016. Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification. Pages 10151032 of: 25th USENIX Security Symposium. USENIX Security 16. Austin, TX: USENIX.Google Scholar
Storey, Grant, Reisman, Dillon, Mayer, Jonathan, and Narayanan, Arvind. 2017. The Future of Ad Blocking: An Analytical Framework and New Techniques. arXiv:1705.08568 [cs], May.Google Scholar
Stuart, Elizabeth A. 2010. Matching Methods for Causal Inference: A Review and a Look Forward. Statistical Science, 25 (1), 121.Google Scholar
Subramani, Karthika, Yuan, Xingzi, Setayeshfar, Omid, Vadrevu, Phani, Lee, Kyu Hyung, and Perdisci, Roberto. 2020. When Push Comes to Ads: Measuring the Rise of (Malicious) Push Advertising. Pages 724737 of: Proceedings of the ACM Internet Measurement Conference. IMC’20. Pittsburgh, PA: ACM. Google Scholar
Sweeney, Latanya. 2013. Discrimination in Online Ad Delivery. Commun. ACM, 56 (5), 4454.Google Scholar
Sy, Erik, Burkert, Christian, Federrath, Hannes, and Fischer, Mathias. 2018. Tracking Users Across the Web via TLS Session Resumption. Pages 289299 of: Proceedings of the 34th Annual Computer Security Applications Conference. ACSAC’18. San Juan, PR: ACM. Google Scholar
Tannert, Benjamin, and Schöning, Johannes. 2018. Disabled, but at What Cost?: An Examination of Wheelchair Routing Algorithms. Pages 46:1–46:7 of: Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services. MobileHCI’18. Barcelona: ACM. Google Scholar
Thebault-Spieker, Jacob, Terveen, Loren, and Hecht, Brent. 2017. Toward a Geographic Understanding of the Sharing Economy: Systemic Biases in UberX and TaskRabbit. ACM Trans. Comput.-Hum. Interact., 24 (3), 21:1–21:40.Google Scholar
Toubiana, Vincent, Subramanian, Lakshminarayanan, and Nissenbaum, Helen. 2011. TrackMeNot: Enhancing the Privacy of Web Search. arXiv:1109.4677 [cs], Sept.Google Scholar
Tran, Chau, Champion, Kaylea, Forte, Andrea, Hill, Benjamin Mako, and Greenstadt, Rachel. 2020. Are Anonymity-Seekers Just like Everybody Else? An Analysis of Contributions to Wikipedia from Tor. Pages 974990 of: 2020 IEEE Symposium on Security and Privacy. SP. San Francisco, CA: IEEE.Google Scholar
Trevisan, Martino, Traverso, Stefano, Bassi, Eleonora, and Mellia, Marco. 2019. 4 Years of EU Cookie Law: Results and Lessons Learned. Proceedings on Privacy Enhancing Technologies, 2019 (2), 126145.Google Scholar
Trickel, Erik, Starov, Oleksii, Kapravelos, Alexandros, Nikiforakis, Nick, and Doupé, Adam. 2019 (Aug.). Everyone Is Different: Client-Side Diversification for Defending Against Extension Fingerprinting. Pages 16791696 of: 28th USENIX Security Symposium. USENIX Security 19. Santa Clara, CA: USENIX.Google Scholar
Trielli, Daniel, and Diakopoulos, Nicholas. 2019. Search As News Curator: The Role of Google in Shaping Attention to News Information. Pages 453:1–453:15 of: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. CHI’19. Glasgow: ACM. Google Scholar
Tschantz, M. C., Datta, A., Datta, A., and Wing, J. M. 2015 (July). A Methodology for Information Flow Experiments. Pages 554568 of: 2015 IEEE 28th Computer Security Foundations Symposium. Verona: IEEE.Google Scholar
Tschantz, Michael Carl, Egelman, Serge, Choi, Jaeyoung, Weaver, Nicholas, and Friedland, Gerald. 2018a. The Accuracy of the Demographic Inferences Shown on Google’s Ad Settings. Pages 3341 of: Proceedings of the 2018 Workshop on Privacy in the Electronic Society. WPES’18. Toronto: ACM. Google Scholar
Tschantz, Michael Carl, Afroz, Sadia, Sajid, Shaarif, Qazi, Shoaib Asif, Javed, Mobin, and Paxson, Vern. 2018b. A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability. In: 8th USENIX Workshop on Free and Open Communications on the Internet. FOCI 18. Baltimore, MD: USENIX.Google Scholar
Ullah, I., Boreli, R., Kaafar, M. A., and Kanhere, S. S. 2014 (April). Characterising User Targeting for In-App Mobile Ads. Pages 547552 of: 2014 IEEE Conference on Computer Communications Workshops. INFOCOMWKSHPS. Toronto: IEEE.Google Scholar
Uluagac, A. S., Radhakrishnan, S. V., Corbett, C., Baca, A., and Beyah, R. 2013 (Oct.). A Passive Technique for Fingerprinting Wireless Devices with Wired-Side Observations. Pages 305313 of: 2013 IEEE Conference on Communications and Network Security. CNS. National Harbor, MD: IEEE.Google Scholar
United Nations. 1948 (Dec.). Universal Declaration of Human Rights. www.un.org/en/universal-declaration-human-rights/index.html.Google Scholar
Urban, Tobias, Tatang, Dennis, Holz, Thorsten, and Pohlmann, Norbert. 2018. Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs. Pages 449–469 of: Lopez, Javier, Zhou, Jianying, and Soriano, Miguel (eds.), Computer Security. Lecture Notes in Computer Science. Cham: Springer. Google Scholar
Urban, Tobias, Tatang, Dennis, Degeling, Martin, Holz, Thorsten, and Pohlmann, Norbert. 2019. A Study on Subject Data Access in Online Advertising After the GDPR. Pages 61–79 of: Pérez-Solà, Cristina, Navarro-Arribas, Guillermo, Biryukov, Alex, and Garcia-Alfaro, Joaquin (eds.), Data Privacy Management, Cryptocurrencies and Blockchain Technology. Lecture Notes in Computer Science. Cham: Springer International Publishing.Google Scholar
Urban, Tobias, Degeling, Martin, Holz, Thorsten, and Pohlmann, Norbert. 2020a. Beyond the Front Page:Measuring Third Party Dynamics in the Field. Pages 1275– 1286 of: Proceedings of the Web Conference 2020. WWW’20. Taipei: ACM. Google Scholar
Urban, Tobias, Tatang, Dennis, Degeling, Martin, Holz, Thorsten, and Pohlmann, Norbert. 2020b. Measuring the Impact of the GDPR on Data Sharing in Ad Networks. Page 15 of: 15th ACM Asia Conference on Computer and Communications Security. ASIA CCS’20. Taipei: ACM. Google Scholar
Utz, Christine, Degeling, Martin, Fahl, Sascha, Schaub, Florian, and Holz, Thorsten. 2019. (Un)Informed Consent: Studying GDPR Consent Notices in the Field. Pages 973990 of: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. CCS’19. London: ACM. Google Scholar
Vaccaro, Kristen, Karahalios, Karrie, Sandvig, Christian, Hamilton, Kevin, and Langbort, Cedric. 2015. Agree or Cancel? Research and Terms of Service Compliance. In: ACM CSCW Ethics Workshop: Ethics for Studying Sociotechnical Systems in a BigDataWorld. Vancouver, ACM. Google Scholar
Vadrevu, Phani, and Perdisci, Roberto. 2019. What You See Is NOT What You Get: Discovering and Tracking Social Engineering Attack Campaigns. Pages 308321 of: Proceedings of the Internet Measurement Conference. IMC’19. Amsterdam: ACM. Google Scholar
Vallina, Pelayo, Feal, Álvaro, Gamba, Julien, Vallina-Rodriguez, Narseo, and Anta, Antonio Fernández. 2019. Tales from the Porn: A Comprehensive Privacy Analysis of the Web Porn Ecosystem. Pages 245258 of: Proceedings of the Internet Measurement Conference. IMC’19. Amsterdam: ACM. CrossRefGoogle Scholar
Vallina, Pelayo, Pochat, Le, Victor, Feal, Álvaro, Paraschiv, Marius, Gamba, Julien, Burke, Tim, Hohlfeld, Oliver, Tapiador, Juan, and Vallina-Rodriguez, Narseo. 2020. Mis-Shapes, Mistakes, Misfits: An Analysis of Domain Classification Services. Pages 598618 of: Proceedings of the ACM Internet Measurement Conference. IMC’20. Pittsburgh, PA: ACM. Google Scholar
Vallina-Rodriguez, Narseo, Shah, Jay, Finamore, Alessandro, Grunenberger, Yan, Papagiannaki, Konstantina, Haddadi, Hamed, and Crowcroft, Jon. 2012. Breaking for Commercials: Characterizing Mobile Advertising. Pages 343–356 of: Proceedings of the 2012 Internet Measurement Conference. IMC’12. Boston, MA: ACM. Google Scholar
Vallina-Rodriguez, Narseo, Sundaresan, Srikanth, Razaghpanah, Abbas, Nithyanand, Rishab, Allman, Mark, Kreibich, Christian, and Gill, Phillipa. 2016. Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem. arXiv:1609.07190 [cs], Sept.Google Scholar
van Eijk, Rob, Asghari, Hadi, Winter, Philipp, and Narayanan, Arvind. 2019. The Impact of User Location on Cookie Notices (Inside and Outside of the European Union). In: IEEE Security & Privacy Workshop on Technology and Consumer Protection. ConPro’19. San Francisco, CA: IEEE.Google Scholar
Varmarken, Janus, Le, Hieu, Shuba, Anastasia, Markopoulou, Athina, and Shafiq, Zubair. 2020. The TV Is Smart and Full of Trackers: Measuring Smart TV Advertising and Tracking. Proceedings on Privacy Enhancing Technologies, 2020 (2), 129154.Google Scholar
Vastel, A., Laperdrix, P., Rudametkin, W., and Rouvoy, R. 2018a (May). FP-STALKER: Tracking Browser Fingerprint Evolutions. Pages 728–741 of: 2018 IEEE Symposium on Security and Privacy. SP. San Francisco, CA: IEEE.Google Scholar
Vastel, Antoine, Laperdrix, Pierre, Rudametkin, Walter, and Rouvoy, Romain. 2018b. Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies. Pages 135150 of: 27th USENIX Security Symposium. USENIX Security 18. Baltimore, MD: USENIX.Google Scholar
Venkatadri, G., Andreou, A., Liu, Y., Mislove, A., Gummadi, K. P., Loiseau, P., and Goga, O. 2018 (May). Privacy Risks with Facebook’s PII-Based Targeting: Auditing a Data Broker’s Advertising Interface. Pages 89107 of: 2018 IEEE Symposium on Security and Privacy. SP. San Francisco, CA: IEEE.Google Scholar
Venkatadri, Giridhari, Lucherini, Elena, Sapiezynski, Piotr, and Mislove, Alan. 2019. Investigating Sources of PII Used in Facebook’s Targeted Advertising. Proceedings on Privacy Enhancing Technologies, 2019 (1), 227244.Google Scholar
Vieira, Carolina, Ribeiro, Filipe, Vaz de Melo, Pedro Olmo, Benevenuto, Fabricio, and Zagheni, Emilio. 2020. Using Facebook Data to Measure Cultural Distance between Countries: The Case of Brazilian Cuisine. Pages 3091–3097 of: Proceedings of The Web Conference 2020. WWW’20. Taipei: ACM. Google Scholar
Viennot, Nicolas, Garcia, Edward, and Nieh, Jason. 2014. A Measurement Study of Google Play. Pages 221233 of: The 2014 ACM International Conference on Measurement and Modeling of Computer Systems. SIGMETRICS’14. Austin, TX: ACM. Google Scholar
Vincent, Nicholas, Johnson, Isaac, Sheehan, Patrick, and Hecht, Brent. 2019. Measuring the Importance of User-Generated Content to Search Engines. Proceedings of the International AAAI Conference on Web and Social Media, 13 (July), 505516.Google Scholar
Vines, Paul, Roesner, Franziska, and Kohno, Tadayoshi. 2017. Exploring ADINT: Using Ad Targeting for Surveillance on a Budget – or – How Alice Can Buy Ads to Track Bob. Pages 153–164 of: Proceedings of the 2017 on Workshop on Privacy in the Electronic Society. WPES’17.Dallas,TX:ACM. Google Scholar
Vissers, Thomas, Nikiforakis, Nick, Bielova, Nataliia, and Joosen, Wouter. 2014 (July). Crying Wolf? On the Price Discrimination of Online Airline Tickets. In: 7th Workshop on Hot Topics in Privacy Enhancing Technologies. HotPETs 2014. Amsterdam.Google Scholar
Vissers, Thomas, Joosen, Wouter, and Nikiforakis, Nick. 2015. Parking Sensors: Analyzing and Detecting Parked Domains. In: Proceedings 2015 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Wachter, Sandra. 2017 (Jan.). Privacy: Primus Inter Pares – Privacy as a Precondition for Self-Development, Personal Fulfilment and the Free Enjoyment of Fundamental Human Rights. SSRN Scholarly Paper ID 2903514. Social Science Research Network, Rochester, NY.Google Scholar
Wagner, Isabel, and Boiten, Eerke. 2018. Privacy Risk Assessment: From Art to Science, by Metrics. Pages 225241 of: 13th International DPM Workshop on Data Privacy Management, vol. LNCS 11025. Barcelona: Springer. Google Scholar
Wagner, James. 2018 (Oct.). Trustworthy Chrome Extensions, by Default.Google Scholar
Wan, Gerry, Izhikevich, Liz, Adrian, David, Yoshioka, Katsunari, Holz, Ralph, Rossow, Christian, and Durumeric, Zakir. 2020. On the Origin of Scanning: The Impact of Location on Internet-Wide Scans. Pages 662679 of: Proceedings of the ACM Internet Measurement Conference. IMC’20. Pittsburgh, PA: ACM. Google Scholar
Wang, David Y., Der, Matthew, Karami, Mohammad, Saul, Lawrence, McCoy, Damon, Savage, Stefan, and Voelker, Geoffrey M. 2014a. Search + Seizure: The Effectiveness of Interventions on SEO Campaigns. Pages 359–372 of: Proceedings of the 2014 Conference on Internet Measurement Conference. IMC’14. Vancouver: ACM. Google Scholar
Wang, Haoyu Liu, Zhe, Liang, Jingyue, Vallina-Rodriguez, Narseo, Guo, Yao, Li, Li, Tapiador, Juan, Cao, Jingcun, , and Xu, Guoai. 2018. Beyond Google Play: A Large-Scale Comparative Study of Chinese Android App Markets. Pages 293–307 of: Proceedings of the Internet Measurement Conference 2018. Boston, MA: ACM. Google Scholar
Wang, W., Wang, X., Feng, D., Liu, J., Han, Z., and Zhang, X. 2014b. Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection. IEEE Transactions on Information Forensics and Security, 9 (11), 18691882.Google Scholar
Wang, Yan, Chen, Yingying, Ye, Fan, Liu, Hongbo, and Yang, Jie. 2019. Implications of Smartphone User Privacy Leakage from the Advertiser’s Perspective. Pervasive and Mobile Computing, 53(Feb.), 13–32.Google Scholar
Webber, William, Moffat, Alistair, and Zobel, Justin. 2010. A Similarity Measure for Indefinite Rankings. ACM Trans. Inf. Syst., 28 (4), 20:1–20:38.Google Scholar
Wei, Miranda, Stamos, Madison, Veys, Sophie, Reitinger, Nathan, Goodman, Justin, Herman, Margot, Filipczuk, Dorota, Weinshel, Ben, Mazurek, Michelle L., and Ur, Blase. 2020. What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions, and Ad Explanations Through Users’ Own Twitter Data. Pages 145– 162 of: 29th USENIX Security Symposium. USENIX Security 20. USENIX.Google Scholar
Weinberg, Z., Chen, E. Y., Jayaraman, P. R., and Jackson, C. 2011 (May). I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks. Pages 147161 of: 2011 IEEE Symposium on Security and Privacy. SP. Oakland, CA: IEEE.Google Scholar
Weinshel, Ben, Wei, Miranda, Mondal, Mainack, Choi, Euirim, Shan, Shawn, Dolin, Claire, Mazurek, Michelle L., and Ur, Blase. 2019. Oh, the Places You’Ve Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing. Pages 149166 of: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. CCS’19. London: ACM. Google Scholar
Weissbacher, Michael, Mariconti, Enrico, Suarez-Tangil, Guillermo, Stringhini, Gianluca, Robertson, William, and Kirda, Engin. 2017. Ex-Ray: Detection of History-Leaking Browser Extensions. Pages 590–602 of: Proceedings of the 33rd Annual Computer Security Applications Conference. ACSAC 2017. Orlando, FL: ACM. Google Scholar
Whittaker, Zack. 2020. Oracle’s BlueKai Tracks You across the Web. That Data Spilled Online. TechCrunch, June.Google Scholar
Wicker, Stephen B., and Ghosh, Dipayan. 2020. Reading in the Panopticon—: Your Kindle May Be Spying on You, but You Can’t Be Sure. Communications of the ACM, 63 (5), 6873.Google Scholar
Wills, Craig E., and Tatar, Can. 2012. Understanding What They Do with What They Know. Pages 1318 of: Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society. WPES’12. Raleigh, NC: ACM. Google Scholar
Wu, Qianru, Liu, Qixu, Zhang, Yuqing, Liu, Peng, and Wen, Guanxing. 2016. A Machine Learning Approach for Detecting Third-Party Trackers on the Web. Pages 238–258 of: Askoxylakis, Ioannis, Ioannidis, Sotiris, Katsikas, Sokratis, and Meadows, Catherine (eds.), Computer Security – ESORICS 2016. Lecture Notes in Computer Science. Cham: Springer. Google Scholar
Wu, Shujiang, Li, Song, Cao, Yinzhi, and Wang, Ningfei. 2019 (Aug.). Rendered Private: Making GLSL Execution Uniform to Prevent WebGL-Based Browser Fingerprinting. Pages 16451660 of: 28th USENIX Security Symposium.USENIX Security 19. Santa Clara, CA: USENIX.Google Scholar
Yang, Zhemin, Yang, Min, Zhang, Yuan, Gu, Guofei, Ning, Peng, and Wang, X. Sean. 2013. AppIntent: Analyzing Sensitive Data Transmission in Android for Privacy Leakage Detection. Pages 10431054 of: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. CCS’13. Berlin: ACM. Google Scholar
Yang, Zhiju, and Yue, Chuan. 2020. A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments. Proceedings on Privacy Enhancing Technologies, 2020 (2), 2444.Google Scholar
You, W., Liang, B., Shi, W., Wang, P., and Zhang, X. 2018. TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices. IEEE Transactions on Dependable and Secure Computing, 1–1.Google Scholar
Yu, Zhonghao, Macbeth, Sam, Modi, Konark, and Pujol, Josep M. 2016. Tracking the Trackers. Pages 121–132 of: Proceedings of the 25th International Conference on World Wide Web. WWW’16. Montreal: International World Wide Web Conferences Steering Committee. Google Scholar
Zarras, Apostolis, Kapravelos, Alexandros, Stringhini, Gianluca, Holz, Thorsten, Kruegel, Christopher, and Vigna, Giovanni. 2014. The Dark Alleys of Madison Avenue: Understanding Malicious Advertisements. Pages 373380 of: Proceedings of the 2014 Conference on Internet Measurement Conference. IMC’14. Vancouver: ACM. Google Scholar
Zeber, David, Bird, Sarah, Oliveira, Camila, Rudametkin, Walter, Segall, Ilana, Wollsén, Fredrik, and Lopatka, Martin. 2020. The Representativeness of Automated Web Crawls as a Surrogate for Human Browsing. Pages 167178 of: Proceedings of The Web Conference 2020. WWW’20. Taipei: ACM. Google Scholar
Zhang, Jiexin, Beresford, Alastair R, and Sheret, Ian. 2019a. SENSORID: Sensor Calibration Fingerprinting for Smartphones. Page 18 of: Proceedings of the 40th IEEE Symposium on Security and Privacy. SP. San Francisco, CA: IEEE.Google Scholar
Zhang, Mingxue, Meng, Wei, Lee, Sangho, Lee, Byoungyoung, and Xing, Xinyu. 2019b (Aug.). All Your Clicks Belong to Me: Investigating Click Interception on the Web. Pages 941957 of: 28th USENIX Security Symposium. USENIX Security 19. Santa Clara, CA: USENIX.Google Scholar
Zhao, Qingchuan, Zuo, Chaoshun, Pellegrino, Giancarlo, and Lin, Zhiqiang. 2019. Geo-Locating Drivers: A Study of Sensitive Data Leakage in Ride-Hailing Services. In: Proceedings 2019 Network and Distributed System Security Symposium. San Diego, CA: Internet Society.Google Scholar
Zhao, Shuai, Kalra, Achir, Borcea, Cristian, and Chen, Yi. 2020. To Be Tough or Soft: Measuring the Impact of Counter-Ad-Blocking Strategies on User Engagement. Pages 26902696 of: Proceedings of The Web Conference 2020. WWW’20. Taipei: ACM. Google Scholar
Zhu, Shitong, Hu, Xunchao, Qian, Zhiyun, Shafiq, Zubair, and Yin, Heng. 2018 (Feb.). Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis. In: The Network and Distributed System Security Symposium. NDSS.Google Scholar
Zimmeck, Sebastian, and Bellovin, Steven M. 2014. Privee: An Architecture for Automatically Analyzing Web Privacy Policies. Page 17 of: 23rd USENIX Security Symposium. San Diego, CA: USENIX Association.Google Scholar
Zimmeck, Sebastian, Li, Jie S, Kim, Hyungtae, Bellovin, Steven M, and Jebara, Tony. 2017. A Privacy Analysis of Cross-Device Tracking. Page 19 of: 26th USENIX Security Symposium. Vancouver: USENIX.Google Scholar
Zimmeck, Sebastian, Story, Peter, Smullen, Daniel, Ravichander, Abhilasha, Wang, Ziqi, Reidenberg, Joel, Russell, N. Cameron, and Sadeh, Norman. 2019. MAPS: Scaling Privacy Compliance Analysis to a Million Apps. Proceedings on Privacy Enhancing Technologies, 2019 (3), 6686.Google Scholar
Žliobaitė, Indrė. 2017. Measuring Discrimination in Algorithmic Decision Making. Data Mining and Knowledge Discovery, 31 (4), 10601089.Google Scholar
Zuboff, Shoshana. 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. 1st edition. New York: PublicAffairs.Google Scholar
Zuo, Chaoshun, Wen, Haohuang, Lin, Zhiqiang, and Zhang, Yinqian. 2019. Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps. Pages 14691483 of: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. CCS’19. London: ACM. Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • References
  • Isabel Wagner, De Montfort University, Leicester
  • Book: Auditing Corporate Surveillance Systems
  • Online publication: 24 March 2022
  • Chapter DOI: https://doi.org/10.1017/9781108946940.017
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • References
  • Isabel Wagner, De Montfort University, Leicester
  • Book: Auditing Corporate Surveillance Systems
  • Online publication: 24 March 2022
  • Chapter DOI: https://doi.org/10.1017/9781108946940.017
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • References
  • Isabel Wagner, De Montfort University, Leicester
  • Book: Auditing Corporate Surveillance Systems
  • Online publication: 24 March 2022
  • Chapter DOI: https://doi.org/10.1017/9781108946940.017
Available formats
×