Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-v9fdk Total loading time: 0 Render date: 2024-11-17T19:15:16.547Z Has data issue: false hasContentIssue false

Part III - Ethical and Legal Reservations about Tracking Technologies

Published online by Cambridge University Press:  18 April 2018

Evan Selinger
Affiliation:
Rochester Institute of Technology, New York
Jules Polonetsky
Affiliation:
Future of Privacy Forum
Omer Tene
Affiliation:
International Association of Privacy Professionals
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2018

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

References

Mayer-Schönberger, V., Delete: The Virtue of Forgetting in the Digital Age (Princeton Univ. Press, Princeton, 2011).Google Scholar
Sweeney, L., Int. J. Uncert. Fuzziness Knowl. Based Syst. 10, 557570 (2002).Google Scholar
McAfee, A., Brynjolfsson, E., Harv. Bus. Rev. 90, 6066, 68, 128 (2012).Google Scholar
Tatonetti, N. P., Ye, P. P., Daneshjou, R., Altman, R. B., Sci. Transl. Med. 4, 125ra31 (2012).Google Scholar
Cohen, J. E., Stanford Law Rev. 52, 13731438 (2000).Google Scholar
Crawford, K., Miltner, K., Gray, M. L., Int. J. Commun. 8, 16631672 (2014).Google Scholar
Posner, R. A., Am. Econ. Rev. 71, 405409 (1981).Google Scholar
Solove, D. J., Harv. Law Rev. 126, 18801903 (2013).Google Scholar
Solove, D. J., Univ. Penn. L. Rev. 154, 477564 (2006).CrossRefGoogle Scholar
Schoeman, F., Ed., Philosophical Dimensions of Privacy: An Anthology (Cambridge Univ. Press, New York, 1984).Google Scholar
DePaulo, B. M., Wetzel, C., Weylin Sternglanz, R., Wilson, M. J. W., J. Soc. Issues 59, 391410 (2003).Google Scholar
Margulis, S. T., J. Soc. Issues 59, 243261 (2003).Google Scholar
Goffman, E., Relations in Public: Microstudies of the Public Order (Harper & Row, New York, 1971).Google Scholar
Sundstrom, E., Altman, I., Hum. Ecol. 4, 4767 (1976).Google Scholar
Schwartz, B., Am. J. Sociol. 73, 741752 (1968).CrossRefGoogle Scholar
Laufer, R. S., Wolfe, M., J. Soc. Issues 33, 2242 (1977).Google Scholar
Tsai, J. Y., Egelman, S., Cranor, L., Acquisti, A., Inf. Syst. Res. 22, 254268 (2011).Google Scholar
Slovic, P., Am. Psychol. 50, 364371 (1995).Google Scholar
Singer, E., Hippler, H., Schwarz, N., Int. J. Public Opin. Res. 4, 256268 (1992).Google Scholar
Skotko, V. P., Langmeyer, D., Sociometry 40, 178182 (1977).CrossRefGoogle Scholar
A. Westin, Harris Louis & Associates, Harris-Equifax Consumer Privacy Survey (Tech. rep. 1991).Google Scholar
Culnan, M. J., Armstrong, P. K., Organ. Sci. 10, 104115 (1999).Google Scholar
Smith, H. J., Milberg, S. J., Burke, S. J., Manage. Inf. Syst. Q. 20, 167196 (1996).Google Scholar
Lubin, B., Harrison, R. L., Psychol. Rep. 15, 7778 (1964).CrossRefGoogle Scholar
Spiekermann, S., Grossklags, J., Berendt, B., E-Privacy in 2nd Generation E-Commerce: Privacy Preferences versus Actual Behavior (Third ACM Conference on Electronic Commerce, Tampa, 2001), pp. 3847.Google Scholar
Norberg, P. A., Horne, D. R., Horne, D. A., J. Consum. Aff. 41, 100126 (2007).Google Scholar
Ajzen, I., Fishbein, M., Psychol. Bull. 84, 888918 (1977).CrossRefGoogle Scholar
Klopfer, P. H., Rubenstein, D. I., J. Soc. Issues 33, 5265 (1977).Google Scholar
Acquisti, A., Gross, R., in Privacy Enhancing Technologies, Danezis, G., Golle, P. Eds. (Springer, New York, 2006), pp. 3658.Google Scholar
Acquisti, A., Privacy in Electronic Commerce and the Economics of Immediate Gratification (Fifth ACM Conference on Electronic Commerce, New York, 2004), pp. 2129.Google Scholar
Hann, I., Hui, K., Lee, S. T., Png, I. P. L., J. Manage. Inf. Syst. 24, 1342 (2007).Google Scholar
Acquisti, A., John, L. K., Loewenstein, G., J. Legal Stud. 42, 249274 (2013).Google Scholar
Altman, I., Taylor, D., Social Penetration: The Development of Interpersonal Relationships (Holt, Rinehart & Winston, New York, 1973).Google Scholar
Frattaroli, J., Psychol. Bull. 132, 823865 (2006).Google Scholar
Pennebaker, J. W., Behav. Res. Ther. 31, 539548 (1993).Google Scholar
Steinfield, C., Ellison, N. B., Lampe, C., J. Appl. Dev. Psychol. 29, 434445 (2008).Google Scholar
Toma, C. L., Hancock, J. T., Pers. Soc. Psychol. Bull. 39, 321331 (2013).Google Scholar
Tamir, D. I., Mitchell, J. P., Proc. Natl. Acad. Sci. U.S.A. 109, 80388043 (2012).Google Scholar
Westin, A., Privacy and Freedom (Athenäum, New York, 1967).Google Scholar
Hoofnagle, C. J., Urban, J. M., Wake Forest Law Rev. 49, 261321 (2014).Google Scholar
Marx, G., Ethics Inf. Technol. 3, 157169 (2001).Google Scholar
Thibaut, J. W., Kelley, H. H., The Social Psychology of Groups (Wiley, Oxford, 1959).Google Scholar
Nissenbaum, H., Privacy in Context: Technology, Policy, and the Integrity of Social Life (Stanford Univ. Press, Redwood City, 2009).Google Scholar
Boyd, d., It’s Complicated: The Social Lives of Networked Teens (Yale Univ. Press, New Haven, 2014).Google Scholar
Stutzman, F., Gross, R., Acquisti, A., J. Priv. Confidential. 4, 741 (2013).Google Scholar
Xu, H., Teo, H. H., Tan, B. C., Agarwal, R., J. Manage. Inf. Syst. 26, 135174 (2009).Google Scholar
John, L. K., Acquisti, A., Loewenstein, G., J. Consum. Res. 37, 858873 (2011).Google Scholar
Altman, I., The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding (Cole, Monterey, 1975).Google Scholar
Chaikin, A. L., Derlega, V. J., Miller, S. J., J. Couns. Psychol. 23, 479481 (1976).Google Scholar
Derlega, V. J., Chaikin, A. L., J. Soc. Issues 33, 102115 (1977).Google Scholar
Acquisti, A., John, L. K., Loewenstein, G., J. Mark. Res. 49, 160174 (2012).Google Scholar
Moon, Y., J. Consum. Res. 26, 323339 (2000).Google Scholar
Petronio, S., Boundaries of Privacy: Dialectics of Disclosure (SUNY Press, Albany, 2002).Google Scholar
Stutzman, F., Kramer-Duffield, J., Friends Only: Examining a Privacy-Enhancing Behavior in Facebook (SIGCHI Conference on Human Factors in Computing Systems, ACM, Atlanta, 2010), pp. 15531562.Google Scholar
Honess, T., Charman, E., Closed Circuit Television in Public Places: Its Acceptability and Perceived Effectiveness (Police Research Group, London, 1992).Google Scholar
Gagné, M., Deci, E. L., J. Organ. Behav. 26, 331362 (2005).Google Scholar
Oulasvirta, A. et al., Long-Term Effects of Ubiquitous Surveillance in the Home (ACM Conference on Ubiquitous Computing, Pittsburgh, 2012), pp. 4150.Google Scholar
Palen, L., Dourish, P., Unpacking “Privacy” For a Networked World (SIGCHI Conference on Human Factors in Computing Systems, ACM, Fort Lauderdale, 2003), pp. 129136.Google Scholar
Tufekci, Z., Bull. Sci. Technol. Soc. 28, 2036 (2008).CrossRefGoogle Scholar
Bargh, J. A., McKenna, K. Y. A., Fitzsimons, G. M., J. Soc. Issues 58, 3348 (2002).Google Scholar
Calo, R., Geo. Wash. L. Rev. 82, 9951304 (2014).Google Scholar
Johnson, E. J., Goldstein, D., Science 302, 13381339 (2003).Google Scholar
McKenzie, C. R., Liersch, M. J., Finkelstein, S. R., Psychol. Sci. 17, 414420 (2006).Google Scholar
Gross, R., Acquisti, A., Information Revelation and Privacy in Online Social Networks (ACM Workshop–Privacy in the Electronic Society, New York, 2005), pp. 7180.Google Scholar
Johnson, E. J., Bellman, S., Lohse, G. L., Mark. Lett. 13, 515 (2002).Google Scholar
Hartzog, W., Am. Univ. L. Rev. 60, 16351671 (2010).Google Scholar
Conti, G., Sobiesk, E., Malicious Interface Design: Exploiting the User (19th International Conference on World Wide Web, ACM, Raleigh, 2010), pp. 271280.Google Scholar
Goldfarb, A., Tucker, C., Mark. Sci. 30, 389404 (2011).Google Scholar
White, T. B., Zahay, D. L., Thorbjørnsen, H., Shavitt, S., Mark. Lett. 19, 3950 (2008).Google Scholar
Smith, H. J., Dinev, T., Xu, H., Manage. Inf. Syst. Q. 35, 9891016 (2011).Google Scholar
Brandimarte, L., Acquisti, A., Loewenstein, G., Soc. Psychol. Personal. Sci. 4, 340347 (2013).Google Scholar
Jensen, C., Potts, C., Jensen, C., Int. J. Hum. Comput. Stud. 63, 203227 (2005).Google Scholar
Jensen, C., Potts, C., Privacy Policies as Decision-Making Tools: An Evaluation of Online Privacy Notices (SIGCHI Conference on Human factors in computing systems, ACM, Vienna, 2004), pp. 471478.Google Scholar
McDonald, A. M., Cranor, L. F., I/S: J. L. Policy Inf. Society. 4, 540565 (2008).Google Scholar
Wedekind, C., Milinski, M., Science 288, 850852 (2000).Google Scholar
Rigdon, M., Ishii, K., Watabe, M., Kitayama, S., J. Econ. Psychol. 30, 358367 (2009).Google Scholar
Kiesler, S., Siegel, J., McGuire, T. W., Am. Psychol. 39, 11231134 (1984).Google Scholar
Joinson, A. N., Eur. J. Soc. Psychol. 31, 177192 (2001).Google Scholar
Weisband, S., Kiesler, S., Self-Disclosure on Computer Forms: Meta-Analysis and Implications (SIGCHI Conference Conference on Human Factors in Computing Systems, ACM, Vancouver, 1996), pp. 310.Google Scholar
Tourangeau, R., Yan, T., Psychol. Bull. 133, 859883 (2007).Google Scholar
Postmes, T., Spears, R., Psychol. Bull. 123, 238259 (1998).Google Scholar
Zhong, C. B., Bohns, V. K., Gino, F., Psychol. Sci. 21, 311314 (2010).Google Scholar
Suler, J., Cyberpsychol. Behav. 7, 321326 (2004).Google Scholar
Shariff, A. F., Norenzayan, A., Psychol. Sci. 18, 803809 (2007).CrossRefGoogle Scholar
Moore, B., Privacy: Studies in Social and Cultural History (Armonk, New York, 1984).Google Scholar
Records, Computers and the Rights of Citizens (Secretary’s Advisory Committee, US Dept. of Health, Education and Welfare, Washington, DC, 1973).Google Scholar
Hargittai, E., in Social Stratification, Grusky, D. Ed. (Westview, Boulder, 2008), pp. 936113.Google Scholar
Ariès, P., Duby, G. (Eds.), A History of Private Life: From Pagan Rome to Byzantium (Harvard Univ. Press, Cambridge, 1992).Google Scholar
Murphy, R. F., Am. Anthropol. 66, 12571274 (1964).Google Scholar
Westin, A., in Philosophical Dimensions of Privacy: An Anthology, Schoeman, F.D. Ed. (Cambridge Univ. Press, Cambridge, 1984), pp. 5674.Google Scholar
Altman, I., J. Soc. Issues 33, 6684 (1977).Google Scholar
Hayat, M. A., Inf. Comm. Tech. L. 16, 137148 (2007).Google Scholar
Enkin, A., “Privacy,” www.torahmusings.com/2012/07/privacy (2014).Google Scholar
Rykwert, J., Soc. Res. (New York) 68, 2940 (2001).Google Scholar
Whitman, C. B., in Individualism and Holism: Studies in Confucian and Taoist Values, Munro, D. J., Ed. (Center for Chinese Studies, Univ. Michigan, Ann Arbor, 1985), pp. 85100.Google Scholar

6. Bibliography

Federal Trade Commission Act, 1914.Google Scholar
Muris, T., “Protecting Consumers’ Privacy: Goals and Accomplishments,” Federal Trade Commission, 11 June 2002. [Online]. Available: https://www.ftc.gov/public-statements/2002/06/protecting-consumers-privacy-goals-and-accomplishments.Google Scholar
Gralla, P., “Targeted Advertising Cookie Opt-Out (TACO),” PC World, 31 March 2009. Available: https://www.pcworld.com/article/232732/targeted_advertising_cookie_optout_taco.html.Google Scholar
“Webchoices: Digital Advertising Alliance’s Consumer Choice Tool for Web (Beta),” Digital Advertising Alliance. [Online]. Available: http://optout.aboutads.info.Google Scholar
“Advertising Option Icon Application,” Digital Advertising Alliance. [Online]. Available: https://www.aboutads.info/participants/icon/.Google Scholar
Clifford, S., “A Little ‘i’ to Teach about Online Privacy,” The New York Times, 26 January 2010.Google Scholar
“Data Protection Reform: Parliament Approves New Rules Fit for the Digital Era,” European Parliament, 14 April 2016. [Online]. Available: http://www.europarl.europa.eu/news/en/news-room/20160407IPR21776/Data-protection-reform-Parliament-approves-new-rules-fit-for-the-digital-era.Google Scholar
Official Journal of the European Union, “Regulation (EU) 2016/679 of the European Parliament and of the Council,” European Parliament, 4 May 2016. [Online]. Available: http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=OJ:L:2016:119:FULL&from=EN.Google Scholar
“The Origins of Do Not Track, and Its Future,” World Privacy Forum, 17 June 2013. [Online]. Available: https://www.worldprivacyforum.org/2013/06/the-origins-of-do-not-track-and-its-future/.Google Scholar
Schwartz, A., Sherry, L., Cooper, C., Tien, L., Pierce, D., Brandt, D., Smith, R. E., Givens, B., and Dixon, P., “Consumer Rights and Protections in the Behavioral Advertising Sector,” World Privacy Forum, October 2007. [Online]. Available: http://www.worldprivacyforum.org/wp-content/uploads/2008/04/ConsumerProtections_FTC_ConsensusDoc_Final_s.pdf.Google Scholar
Rampell, C., “‘Do Not Track’ Registry Proposed for Web Use,” Washington Post, 1 November 2007.Google Scholar
Preliminary staff report, “Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers,” Federal Trade Commision, December 2010. [Online]. Available: https://www.ftc.gov/sites/default/files/documents/reports/federal-trade-commission-bureau-consumer-protection-preliminary-ftc-staff-report-protecting-consumer/101201privacyreport.pdf.Google Scholar
“The DAA Self-Regulatory Principles,” Digital Advertising Alliance [Online]. Available: http://www.aboutads.info/principles.Google Scholar
Hoofnagle, C., “A Do-Not-Track Dilemma: DNT ~= Do Not Advertise,” Technology, Academics, Policy, 10 February 2011. [Online]. Available: http://www.techpolicy.com/Hoofnagle-ADoNotTrackDilemma.aspx.Google Scholar
Jones, J., “‘Do Not Track’ Means ‘Do Not Collect,’ FTC Advises,” Response Magazine, 7 March 2012. Available: http://www.responsemagazine.com/direct-response-marketing/news/do-not-track-means-do-not-collect-ftc-advises-4255.Google Scholar
Harvey, S. and Moonka, R., “Keep Your Opt-Outs,” Google Public Policy Blog, 24 January 2011. [Online]. Available: https://publicpolicy.googleblog.com/2011/01/keep-your-opt-outs.html.Google Scholar
Kirk, J., “Browser Add-On Locks Out Targeted Advertising,” PC World, 17 March 2009. Available: https://www.pcworld.com/article/161380/article.html.Google Scholar
Gilbertson, S., “Google Chrome Adds ‘Do Not Track’ Privacy Tools,” Wired, 7 November 2012. Available: https://www.wired.com/2012/11/chrome-23-skidoos-out-of-beta/.Google Scholar
Chokkattu, J., “Google Chrome for IOS Loses ‘Do Not Track’ Feature,” Digital Trends, 29 January 2016. Available: https://www.digitaltrends.com/mobile/chrome-do-not-track-ios/.Google Scholar
Bott, E., “IE9 and Tracking Protection: Microsoft Disrupts the Online Ad Business,” ZDNet, 13 February 2011. Available: http://www.zdnet.com/article/ie9-and-tracking-protection-microsoft-disrupts-the-online-ad-business/.Google Scholar
World Wide Web Consortium, “Platform for Privacy Preferences (P3P) Project,” 20 November 2007. [Online]. Available: https://www.w3.org/P3P/.Google Scholar
World Wide Web Consortium, “Platform for Internet Content Selection (PICS),” 20 November 2009. [Online]. Available: https://www.w3.org/PICS/.Google Scholar
Bott, E., “Privacy Protection and IE9: Who Can You Trust?,” ZDNet, 11 February 2011. Available: http://www.zdnet.com/article/privacy-protection-and-ie9-who-can-you-trust/.Google Scholar
Wingfield, N., “Microsoft Quashed Effort to Boost Online Privacy,” The Wall Street Journal, 2 August 2010. Available: https://www.wsj.com/articles/SB10001424052748703467304575383530439838568.Google Scholar
Hachman, M., “The Hidden Feature That Means Microsoft Has Already Won the ‘Do Not Track’ War,” ReadWrite, 5 October 2012. Available: https://readwrite.com/2012/10/05/why-microsoft-has-already-won-the-do-not-track-war/.Google Scholar
Eckersley, P., “Tracking Protection Lists: A Privacy Enhancing Technology That Complements Do Not Track,” 16 March 2011. [Online]. Available: https://www.eff.org/deeplinks/2011/03/tracking-protection-lists.Google Scholar
“History for Bug 628197,” Mozilla, 23 January 2011. [Online]. Available: https://bugzilla.mozilla.org/show_activity.cgi?id=628197.Google Scholar
Stamm, S., “Opting Out of Behavioral Ads,” 23 January 2011. [Online]. Available: http://blog.sidstamm.com/2011/01/opting-out-of-behavioral-ads.html.Google Scholar
“History for Bug 628198,” Mozilla, 23 January 2011. [Online]. Available: https://bugzilla.mozilla.org/show_activity.cgi?id=628198.Google Scholar
Mayer, Narayanan and Stamm, S., “Do Not Track: A Universal Third-Party Web Tracking Opt Out,” Network Working Group Internet: Draft, 7 March 2011. [Online]. Available: https://www.ietf.org/archive/id/draft-mayer-do-not-track-00.txt.Google Scholar
“Do Not Track Universal Web Tracking Opt Out,” DoNotTrack.Us [Online]. Available: http://donottrack.us.Google Scholar
World Wide Web Consortium, “Index of /2011/track-privacy/papers,” March 2011. [Online]. Available: https://www.w3.org/2011/track-privacy/papers/.Google Scholar
World Wide Web Consortium, “W3C Workshop on Web Tracking and User Privacy: Call for Participation,” March 2011. [Online]. Available: https://www.w3.org/2011/track-privacy/.Google Scholar
World Wide Web Consortium, “W3C Workshop on Web Tracking and User Privacy: Workshop Report,” March 2011. [Online]. Available: https://www.w3.org/2011/track-privacy/report.html.Google Scholar
Zeigler, A., Bateman, A., and Graff, E., “Web Tracking Protection,” 24 February 2011. [Online]. Available: https://www.w3.org/Submission/web-tracking-protection/.Google Scholar
World Wide Web Consortium, “Tracking Protection Working Group Charter,” 2011. [Online]. Available: https://www.w3.org/2011/tracking-protection/charter.html.Google Scholar
“AVG 2012,” Should I Remove It. [Online]. Available: http://www.shouldiremoveit.com/AVG-2012-5825-program.aspx.Google Scholar
Kerry, J. F. Sen., S.799: Commercial Privacy Bill of Rights Act of 2011, 2011.Google Scholar
Rockefeller, J. D. I. Sen., S.913: Do-Not-Track Online Act of 2011, 2011.Google Scholar
Markey, E. J. Rep., H.R.1895: Do Not Track Kids Act of 2011, 2011.Google Scholar
Speier, J. Rep., H.R.654: Do Not Track Me Online Act, 2011.Google Scholar
Lowenthal, A. Sen., S.B. 761: An Act to Add Section 22947.45 to the Business and Professions Code, Relating to Business, 2011.Google Scholar
Office of the Attorney General, Xavier Becerra, “Attorney General Kamala D. Harris Issues Guide on Privacy Policies and Do Not Track Disclosures,” State of California Department of Justice, 21 May 2014. [Online]. Available: https://oag.ca.gov/news/press-releases/attorney-general-kamala-d-harris-issues-guide-privacy-policies-and-do-not-track.Google Scholar
Zuiderveen Borgesius, F. J. and McDonald, A. M., “Do Not Track for Europe,” in 43rd Research Conference on Communication, Information and Internet Policy (Telecommunications Policy Research Conference), 2015.Google Scholar
World Wide Web Consortium, “Tracking Protection Working Group,” 2011. [Online]. Available: https://www.w3.org/2011/tracking-protection/.Google Scholar
Felten, E., “Privacy by Design: Frequency Capping,” Federal Trade Commission, 3 July 2012. [Online]. Available: https://www.ftc.gov/news-events/blogs/techftc/2012/07/privacy-design-frequency-capping.Google Scholar
“Welcome to the WHATWG Community,” WhatWG. Available: https://whatwg.org.Google Scholar
Gross, G., “Some Privacy Advocates Question Mobile Apps Agreement,” Network World, 26 July 2013. Available: https://www.networkworld.com/article/2168530/mobile-apps/some-privacy-advocates-question-mobile-apps-agreement.html.Google Scholar
McDonald, A. M. and Peha, J. M., “Track Gap: Policy Implications of User Expectations for the ‘Do Not Track’ Internet Privacy Feature,” in 39th Research Conference on Communication, Information and Internet Policy (Telecommunications Policy Research Conference), 2011.Google Scholar
Wiley, S. M., “Re: What Additional Optional Information Is ESSENTIAL in Europe to Document a Informed That Has Been Given?,” 28 March 2017. [Online]. Available: https://lists.w3.org/Archives/Public/public-tracking/2017Mar/0035.html.Google Scholar
Lauristin, M., “Draft Report on the Proposal for a Regulation of the European Parliament and of the Council Concerning the Respect for Private Life and the Protection of Personal Data in Electronic Communications and repealing Directive 2002/5 8/EC (Regulation on Privacy and Electronic Communications),” European Parliament, 9 June 2017. [Online]. Available: http://www.europarl.europa.eu/sides/getDoc.do?type=COMPARL&reference=PE-606.011&format=PDF&language=EN&secondRef=01.Google Scholar
Zuiderveen Borgesius, F., Van Hoboken, J., Fahy, R., Irion, K., and Rozendaal, M., “An Assessment of the Commission’s Proposal on Privacy and Electronic Communications: Study for the LIBE Committee,” European Parliament, May 2017. [Online]. Available: http://www.europarl.europa.eu/RegData/etudes/STUD/2017/583152/IPOL_STU(2017)583152_EN.pdf.Google Scholar
McDonald, A. M. and Cranor, L. F., “Beliefs and Behaviors: Internet Users’ Understanding of Behavioral Advertising,” in 38th Research Conference on Communication, Information and Internet Policy (Telecommunications Policy Research Conference), 2010.Google Scholar
Turow, J., King, J., Hoofnagle, C. J., Bleakley, A., and Hennessy, M., “Americans Reject Tailored Advertising and Three Activities That Enable It,” 2009. Available: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1478214.Google Scholar
Scott, M., “Rise of Ad-Blocking Software Threatens Online Revenue,” The New York Times, 30 May 2016. Available: https://www.nytimes.com/2016/05/31/business/international/smartphone-ad-blocking-software-mobile.html.Google Scholar
Elmer-DeWitt, P., “Let the iOS 9 Ad Block Wars Begin!,” Fortune, 19 September 2015. Available: http://fortune.com/2015/09/20/apple-ad-block-ios9/.Google Scholar
Geuss, M., “Over 300 Businesses Now Whitelisted on AdBlock Plus, 10% Pay to Play,” Ars Technica, 3 February 2015. Available: https://arstechnica.com/information-technology/2015/02/over-300-businesses-now-whitelisted-on-adblock-plus-10-pay-to-play/.Google Scholar
Dayen, D., “Be Careful Celebrating Google’s New Ad Blocker: Here’s What’s Really Going On,” The Intercept, 5 June 2017. Available: https://theintercept.com/2017/06/05/be-careful-celebrating-googles-new-ad-blocker-heres-whats-really-going-on/.Google Scholar
Wilander, J., “Intelligent Tracking Prevention,” Apple, Inc., 5 June 2017. [Online]. Available: https://webkit.org/blog/7675/intelligent-tracking-prevention/.Google Scholar
National Telecommunications & Information Agency, “Multistakeholder Process to Develop Consumer Data Privacy Codes of Conduct,” 29 February 2012. Available: https://www.ntia.doc.gov/federal-register-notice/2012/multistakeholder-meetings-develop-consumer-data-privacy-code-conduct-co.Google Scholar
Doty, N., “Tracking Preference Expression Patent Advisory Group Charter (DNT PAG),” 3 April 2015. [Online]. Available: https://www.w3.org/2012/06/dnt-pag-charter.html.Google Scholar
Bachman, K., “FTC Chair Stuns Advertisers,” AdWeek, 17 April 2013. Available: http://www.adweek.com/digital/ftc-chair-stuns-advertisers-148644/.Google Scholar
Bott, E., “Microsoft Sticks to Default Do Not Track Settings in IE 10,” ZDNet, 7 August 2012. Available: http://www.zdnet.com/article/microsoft-sticks-to-default-do-not-track-settings-in-ie-10/.Google Scholar
Keizer, G., “Yahoo to Ignore Microsoft’s ‘Do Not Track’ Signal from IE10,” Computer World, 29 October 2012. Available: https://www.computerworld.com/article/2493048/data-privacy/yahoo-to-ignore-microsoft-s--do-not-track--signal-from-ie10.html.Google Scholar
Noyes, K., “Apache Web Servers Will Ignore IE10’s ‘Do Not Track’ Settings,” PC World, 11 September 2012. Available: http://www.pcworld.com/article/262150/apache_web_servers_will_ignore_ie10s_do_not_track_settings.html.Google Scholar
Bott, E., “Major Advertising Group Quits Do Not Track Standards Body,” ZDNet, 17 September 2013. Available: http://www.zdnet.com/article/major-advertising-group-quits-do-not-track-standards-body/.Google Scholar
Aquino, J., “Jonathan Mayer to ‘Do Not Track’ Working Group: I Quit,” 31 July 2013. Available: http://www.businessinsider.com/jonathan-mayer-quits-do-not-track-standardization-group-2013-7?op=1Google Scholar
Soltani, A., Peterson, A., and Gellman, B., “NSA Uses Google Cookies to Pinpoint Targets for Hacking,” The Washington Post, 10 December 2013. Available: https://www.washingtonpost.com/news/the-switch/wp/2013/12/10/nsa-uses-google-cookies-to-pinpoint-targets-for-hacking/.Google Scholar
“‘Tor Stinks’ Presentation: Read the Full Document,” The Guardian, 4 October 2013. [Online]. Available: https://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document.Google Scholar
Paganini, P., “How NSA Tries to Compromise Tor Anonymity: Tor Stinks Document,” Security Affairs, 6 October 2013.Google Scholar
Ginsberg, J., Mohebbi, M., Patel, R. S., and Brilliant, L., “Detecting Influenza Epidemics Using Search Engine Query Data,” Nature, pp. 1012–4, December 2008.Google Scholar
Matyszczyk, C., “Sick? Google Shares Health Searches with Govt.,” C|net, 12 November 2008. Available: https://www.cnet.com/news/sick-google-shares-health-searches-with-govt/.Google Scholar
Metz, C., “When You Sneeze, Does Google Tell the Feds?,” The Register, 15 November 2008. Available: http://www.theregister.co.uk/2008/11/15/google_flu_trends_privacy/.Google Scholar
“17 Weird Things You Did on the Internet in 2007 That You Forgot All About,” BuzzFeed, 20 January 2017. Available: https://www.buzzfeed.com/geico/2007-internet.Google Scholar
Kirkpatrick, D., “As Facebook Takes Off, MySpace Strikes Back,” Fortune, 19 September 2007. Available: http://archive.fortune.com/2007/09/18/technology/myspace_strikes.fortune/index.htm.Google Scholar
MacManus, R., “Browser Market Share: Maxthon May Stop Firefox’s Slow Climb,” ReadWrite, 17 January 2007. Available: https://readwrite.com/2007/01/17/browser_market_share_maxthon_vs_firefox/.Google Scholar
“Our History,” The New York Times, 2017. [Online]. Available: http://www.nytco.com/who-we-are/culture/our-history/.Google Scholar
Kristol, D., “HTTP State Management Mechanism,” memo, Network Working Group, February 1997. [Online]. Available: https://tools.ietf.org/html/rfc2109.Google Scholar
European Parliament and the Council, “Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with regard to the Processing of Personal Data and on the Free Movement of Such Data,” 24 October 1995. [Online]. Available: http://data.europa.eu/eli/dir/1995/46/oj.Google Scholar
European Parliament and the Council, “Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016: On the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation),” 7 April 2016. [Online]. Available: http://data.europa.eu/eli/reg/2016/679/oj.Google Scholar
A. “. Plotkin, “Werewolf,” online game, 14 February 2010. [Online]. Available: http://www.eblong.com/zarf/werewolf.html.Google Scholar
Fung, B., “The FTC Was Built 100 Years Ago to Fight Monopolists: Now, It’s Washington’s Most Powerful Technology Cop,” The Washington Post, 25 September 2014. Available: https://www.washingtonpost.com/news/the-switch/wp/2014/09/25/the-ftc-was-built-100-years-ago-to-fight-monopolists-now-its-washingtons-most-powerful-technology-cop/.Google Scholar
“Open Secrets,” Center for Responsive Politics, 2016, [Online]. Available: http://www.opensecrets.org.Google Scholar
“DAA’s Self-Regulatory Program for Online Behavioral Advertising Frequently Asked Questions,” Digital Advertising Alliance, August 2011. [Online]. Available: http://www.aboutads.info/resource/download/DAA-Website-FAQ.pdf.Google Scholar
Sottek, T., “The 265 Members of Congress Who Sold You Out to ISPs, and How Much It Cost to Buy Them,” The Verge, 29 March 2017. Available: https://www.theverge.com/2017/3/29/15100620/congress-fcc-isp-web-browsing-privacy-fire-sale.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×