Privacy Diffusion on the Web: A Longitudinal Perspective. Krishnamurthy, B. & Wills, C. E. In pages 541-550.
abstract   bibtex   
For the last few years we have studied the diffusion of private information about users as they visit various Web sites triggering data gathering aggregation by third parties. This paper reports on our longitudinal study consisting of multiple snapshots of our examination of such diffusion over four years. We examine the various technical ways by which third-party aggregators acquire data and the depth of user-related information acquired. We study techniques for protecting against this privacy diffusion as well as limitations of such techniques. We introduce the concept of secondary privacy damage. Our results show increasing aggregation of user-related data by a steadily decreasing number of entities. A handful of companies are able to track users' movement across almost all of the popular Web sites. Virtually all the protection techniques have significant limitations highlighting the seriousness of the problem and the need for alternate solutions.
@inproceedings{ kri09,
  crossref = {www2009},
  author = {Balachander Krishnamurthy and Craig E. Wills},
  title = {Privacy Diffusion on the Web: A Longitudinal Perspective},
  pages = {541-550},
  topic = {cookies[0.9] javascript[0.9]},
  uri = {http://www2009.org/proceedings/pdf/p541.pdf},
  abstract = {For the last few years we have studied the diffusion of private information about users as they visit various Web sites triggering data gathering aggregation by third parties. This paper reports on our longitudinal study consisting of multiple snapshots of our examination of such diffusion over four years. We examine the various technical ways by which third-party aggregators acquire data and the depth of user-related information acquired. We study techniques for protecting against this privacy diffusion as well as limitations of such techniques. We introduce the concept of secondary privacy damage. Our results show increasing aggregation of user-related data by a steadily decreasing number of entities. A handful of companies are able to track users' movement across almost all of the popular Web sites. Virtually all the protection techniques have significant limitations highlighting the seriousness of the problem and the need for alternate solutions.}
}
Downloads: 0