Internet advertising: An interplay among advertisers, online publishers, ad exchanges and web users, 2012. ,
Affinicast unveils personalization tool, 1996. ,
Web advertisers get new tool, 1998. ,
The value of behavioral targeting, 2009. ,
How much can behavioral targeting help online advertising?, Proceedings of the 18th international conference on World wide web, WWW '09, 2009. ,
DOI : 10.1145/1526709.1526745
Investment insights, 2012. ,
Kerry-mccain privacy bill: What you need to know, 2011. ,
Sen. rockefeller: Get ready for a real do-not-track bill for online advertising http://adage.com/article/digital/ sen-rockefeller-ready-a-real-track-bill, 2011. ,
The daa's self-regulatory principles fall far short of do not track daa-self-regulation-principles-fall-far-short-do-not-track, 2011. ,
A brief overview of the supplementary daa principles, 2011. ,
Many failures: A brief history of privacy self-regulation in the united states, 2011. ,
Third-Party Web Tracking: Policy and Technology, 2012 IEEE Symposium on Security and Privacy, 2012. ,
DOI : 10.1109/SP.2012.47
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.388.5781
Why Johnny can't opt out, Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, CHI '12, 2012. ,
DOI : 10.1145/2207676.2207759
Do not track: Implementations, 2014. ,
Do-not-track as default, Nw. J. Tech. & Intell. Prop, vol.11, issue.2, p.575, 2013. ,
If you choose not to decide, your web browser will make your choice, 2012. ,
The Paradox of Privacy Empowerment: The Unintended Consequences of 'Do Not Track', W3C Workshop: Do Not Track and Beyond, 2012. ,
DOI : 10.2139/ssrn.2318146
Adblockplus -surf the web without annoying ads! ,
Disconnect -online privacy & security, 2014. ,
Tracking protection list, 2014. ,
Targeted Advertising ... and Privacy Too, CT-RSA, 2001. ,
DOI : 10.1007/3-540-45353-9_30
Privad: Practical privacy in online advertising, NSDI, 2011. ,
Adnostic: Privacy preserving targeted advertising, NDSS, 2010. ,
ObliviAd: Provably Secure and Practical Online Behavioral Advertising, 2012 IEEE Symposium on Security and Privacy, 2012. ,
DOI : 10.1109/SP.2012.25
Ip addresses are personal data, e.u. regulator says, 2008. ,
Flash Cookies and Privacy, SSRN Electronic Journal, 2009. ,
DOI : 10.2139/ssrn.1446862
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.401.7830
Evercookie ? never forget, p.2012 ,
New web code draws concern over privacy risks, 2010. ,
How Unique Is Your Web Browser?, PETS, 2010. ,
DOI : 10.1007/978-3-642-14527-8_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.381.1264
FPDetective, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013. ,
DOI : 10.1145/2508859.2516674
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting, 2013 IEEE Symposium on Security and Privacy, 2013. ,
DOI : 10.1109/SP.2013.43
Detecting and defending against third-party tracking on the web What they know Measurement and modeling of eye-mouse behavior in the presence of nonlinear page layouts, Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, NSDI'12, pp.12-12, 2013. ,
Google ads settings ,
Who do online advertisers think you are, 2012. ,
Bluekai audience data marketplace: Data types, 2014. ,
Health and wellness preference data segments, 2014. ,
The data brokers: Selling your per- sonal informationnews/ the-data-brokers-selling-your-personal-information, 2014. ,
The new york times: How companies learn your secrets, 2012. ,
DOI : 10.7312/star16075-025
There is no such thing as anonymous online tracking, 2011. ,
On the leakage of personally identifiable information via online social networks, WOSN, 2009. ,
Privacy leakage vs. protection measures: the growing disconnect, W2SP, 2011. ,
Which websites are sharing your per- sonal details, 2012. ,
Ebay pulls the plug on intent data reseller strategy, 2011. ,
Why johnny can't browse in peace: On the uniqueness of web browsing history patterns, 5th Workshop on Hot Topics in Privacy Enhancing Technologies, p.2012, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00747841
How Unique and Traceable Are Usernames?, PETS, 2011. ,
DOI : 10.1007/978-3-642-22263-4_1
URL : https://hal.archives-ouvertes.fr/hal-00747495
Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008. ,
DOI : 10.1109/SP.2008.33
The eternal value of privacy http://archive.wired.com/ politics/security/commentary/securitymatters, p.5, 2006. ,
Freedom and responsibility, 2006. ,
'i've got nothing to hide' and other misunderstandings of privacy, San Diego Law Review, vol.44, p.745, 2007. ,
The Right to Privacy, Harvard Law Review, vol.4, issue.5, 1890. ,
DOI : 10.2307/1321160
Situating Privacy Online, Information, Communication & Society, vol.7, issue.1, pp.92-114, 2004. ,
DOI : 10.2307/3481326
Privacy, economics, and price discrimination on the internet, ICEC '03, 2003. ,
DOI : 10.1145/948005.948051
Facebook firings: Top 10 cases and the nlrb's new guidelines facebook-firings-top-ten-cases-and-the-nlrbs-new-guidelines, 2011. ,
Manager's poor judgment leads to reversal of termination of employee ? for poor judgment http://www.hrmorning.com/ managers-poor-judgment-leads-to-reversal-of-termination-of-employee-for-poor-j, 2013. ,
The Facebook Effect: The Inside Story of the Company That Is Connecting the World, 2011. ,
The filter bubble What the internet is hiding from you, 2011. ,
Privacy considerations of online behaviour tracking, 2012. ,
Privacy diffusion on the web, Proceedings of the 18th international conference on World wide web, WWW '09, pp.541-550, 2009. ,
DOI : 10.1145/1526709.1526782
Big friend is watching you, Proceedings of the 2012 ACM workshop on Workshop on online social networks, WOSN '12, 2012. ,
DOI : 10.1145/2342549.2342552
URL : https://hal.archives-ouvertes.fr/hal-00748155
Tracking website data-collection and privacy practices with the iWatch web crawler, Proceedings of the 3rd symposium on Usable privacy and security, SOUPS '07, 2007. ,
DOI : 10.1145/1280680.1280686
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.518.428
An empirical study of privacyviolating information flows in javascript web applications, CCS, 2010. ,
Protecting browser state from web privacy attacks, Proceedings of the 15th international conference on World Wide Web , WWW '06, 2006. ,
DOI : 10.1145/1135777.1135884
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.6662
Flash Cookies and Privacy II: Now with HTML5 and ETag Respawning, SSRN Electronic Journal, 2011. ,
DOI : 10.2139/ssrn.1898390
Host fingerprinting and tracking on the web: Privacy and security implications, 19th Annual Network & Distributed System Security Symposium, 2012. ,
User agent switcher, 2014. ,
User agent rg, 2014. ,
Auctions in do-not-track compliant internet advertising, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, 2011. ,
DOI : 10.1145/2046707.2046782
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.224.9909
Privacy-aware personalization for mobile advertising, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012. ,
DOI : 10.1145/2382196.2382266
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.357.3825
Repriv: Re-envisioning in-browser privacy, S&P, 2011. ,
DOI : 10.1109/sp.2011.37
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.221.8964
Online information privacy: Measuring the cost-benefit trade-off, ICIS, 2002. ,
How much is location privacy worth?, WEIS, Citeseer, 2005. ,
A study on the value of location privacy, Proceedings of the 5th ACM workshop on Privacy in electronic society , WPES '06, 2006. ,
DOI : 10.1145/1179601.1179621
Your browsing behavior for a big mac, Proceedings of the 22nd international conference on World Wide Web, WWW '13, 2011. ,
DOI : 10.1016/0167-2681(80)90051-7
Unwillingness to pay for privacy: A field experiment, Economics Letters, vol.117, issue.1, pp.25-27, 2012. ,
DOI : 10.1016/j.econlet.2012.04.077
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.392.3898
Investigating the value of privacy in online social networks: conjoint analysis, ICIS, 2009. ,
On the value of information -what facebook users are willing to pay, ECIS, 2009. ,
What Is Privacy Worth?, The Journal of Legal Studies, vol.42, issue.2, 2009. ,
DOI : 10.1086/671754
Power strips, prophylactics, and privacy, oh my!, Proceedings of the second symposium on Usable privacy and security , SOUPS '06, 2006. ,
DOI : 10.1145/1143120.1143137
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.9520
When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information, Workshop on Economics of Information Security, 2007. ,
Valuating Privacy, IEEE Security and Privacy Magazine, vol.3, issue.5, pp.22-25, 2005. ,
DOI : 10.1109/MSP.2005.137
Privacy and rationality in individual decision making, IEEE Security and Privacy Magazine, vol.3, issue.1, pp.26-33, 2005. ,
DOI : 10.1109/MSP.2005.22
Indirect content privacy surveys, Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS '11, 2011. ,
DOI : 10.1145/2078827.2078847
How much is your personal data worth, pp.927-86 ,
Markets and privacy, Communications of the ACM, vol.39, issue.9, p.92, 1996. ,
DOI : 10.1145/234215.234476
Selling privacy at auction, ACM EC, 2011. ,
DOI : 10.1145/1993574.1993605
URL : http://arxiv.org/abs/1011.1375
For sale : your data, Proceedings of the 10th ACM Workshop on Hot Topics in Networks, HotNets '11, 2011. ,
DOI : 10.1145/2070562.2070575
What they know about you, The Wall Street Journal, 2010. ,
Challenges in measuring online advertising systems, Proceedings of the 10th annual conference on Internet measurement, IMC '10, 2010. ,
DOI : 10.1145/1879141.1879152
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.172.1603
Privacy and rationality in individual decision making, IEEE Security and Privacy Magazine, vol.3, issue.1, pp.26-33, 2005. ,
DOI : 10.1109/MSP.2005.22
Google's cookie matching protocol ,
Doubleclick ad exchange real-time bidding protocol ,
Pulsepoint real-time bidding api ,
Real-time bidding protocol request examples ,
Real-time bidding protocol request examples ,
Real-time bidding for online advertising, Proceedings of the Seventh International Workshop on Data Mining for Online Advertising, ADKDD '13, 2013. ,
DOI : 10.1145/2501040.2501980
Cpm ads ,
Cost-per-click (cpc) ,
COUNTERSPECULATION, AUCTIONS, AND COMPETITIVE SEALED TENDERS, The Journal of Finance, vol.16, issue.1, pp.8-37, 1961. ,
DOI : 10.1111/j.1540-6261.1961.tb02789.x
Decrypting price confirmations https://developers.google.com/ ad-exchange/rtb/response-guide/decrypt-price ,
How Unique Is Your Web Browser?, Privacy Enhancing Technologies, pp.1-18, 2010. ,
DOI : 10.1007/978-3-642-14527-8_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.381.1264
Private exchange ,
Selling off Privacy at Auction, Proceedings 2014 Network and Distributed System Security Symposium, 2014. ,
DOI : 10.14722/ndss.2014.23270
URL : https://hal.archives-ouvertes.fr/hal-00915249
Ad interest manager ,
The Impact of Privacy Policy on the Auction Market for Online Display Advertising, SSRN Electronic Journal ,
DOI : 10.2139/ssrn.2333193
Selenium -web browser automation ,
Updates to custom audiences targeting tool ,
Facebook to partner with acxiom, epsilon to match store purchases with user profiles http://adage.com/article/digital/ facebook-partner-acxiom-epsilon-match-store-purchases-user-profiles, 239967. ,
Betrayed by Your Ads!, PETS, 2012. ,
DOI : 10.1007/978-3-642-31680-7_1
URL : https://hal.archives-ouvertes.fr/hal-00747823
Retargeting ads follow surfers to other sites, 2011. ,
Google: Cookie matching https://developers.google.com/ ad-exchange/rtb/cookie-guide, 2014. ,
Price discrimination is all around you, 2011. ,
Adroll's ad exchange partners, 2014. ,
Criteo to provide customers with access to facebook exchange http://www.criteo.com/en/news-and-events/press-releases/ criteo-provide-customers-access-facebook-exchange, 2012. ,
Extra! extra! washington post digital goes programmatic, gets premium rates with doubleclick's ad exchange, 2013. ,
A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, vol.31, issue.1, pp.469-472, 1985. ,
Efficient aggregation of encrypted data in wireless sensor networks, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2005. ,
DOI : 10.1109/MOBIQUITOUS.2005.25
Single round access privacy on outsourced storage, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012. ,
DOI : 10.1145/2382196.2382229
Outbound authentication for programmable secure coprocessors, ESORICS, 2002. ,
DOI : 10.1145/782814.782838
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.177.4236
Betrayed by Your Ads!, PETS, 2012. ,
DOI : 10.1007/978-3-642-31680-7_1
URL : https://hal.archives-ouvertes.fr/hal-00747823
Google ads settings https://www.google.com/settings, 2014. ,
Sslshader: Cheap ssl acceleration with commodity processors, NSDI, 2011. ,
Amazon elastic compute cloud (amazon ec2), 2014. ,