Palmer H. Muntz, director of admissions and an enrollment-management consultant at Lincoln Christian University, Illinois.
tl;dr => not impressed with Generational Theory; kids are packaged in ways that colleges want/need to see them.
John H. Pryor, Sylvia Hurtado, Victor B. Saenz, José Luis Santos, William S. Korn; American Freshmen: Forty Year Trends; Cooperative Institutional Research Program; UCLA; 2006?; 66 pages.
Richard H. Mullendore, a former vice president for student affairs at the University of Georgia
Gwendolyn Jordan Dungy, executive director of Naspa-Student Affairs Administrators in Higher Education.
Jeannine C. Lalonde, senior assistant dean of admissions at the University of Virginia.
Siva Vaidhyanathan, associate professor of media studies at the University of Virginia.
tl;dr => “Generational thinking is just a benign form of bigotry, in which you flatten out diversity. This is debilitating to the job of trying to work with young people.” (it’s WEIRD types… not minorities… get it?)
Fred A. Bonner II, Associate professor in the department of educational administration and human resources at Texas A&M University (see below).
Lisa A. Rossbacher, president of Southern Polytechnic State University, in Georgia.
tl;dr => Howe’s insights weren’t deep; they would have done the changes anyway.
<paraphrase>To accept generational thinking, one must find a way to swallow two large assumptions.
That tens of millions of people, born over about 20 years, are fundamentally different from people of other age groups
and that those tens of millions of people are similar to each other in meaningful ways.
This idea is the underpinning of Mr. Howe’s conclusion that each generation turns a historical corner, breaking sharply with the previous generation’s traits and values.</paraphrase>
We present the first large-scale studies of three advanced web tracking mechanisms — canvas fingerprinting, evercookies and use of “cookie syncing” in conjunction with evercookies. Canvas fingerprinting, a recently developed form of browser fingerprinting, has not previously been reported in the wild; our results show that over 5% of the top 100,000 websites employ it. We then present the first automated study of evercookies and respawning and the discovery of a new evercookie vector, IndexedDB. Turning to cookie syncing, we present novel techniques for detection and analysing ID flows and we quantify the amplification of privacy-intrusive track- ing practices due to cookie syncing.
Our evaluation of the defensive techniques used by privacy-aware users finds that there exist subtle pitfalls — such as failing to clear state on multiple browsers at once — in which a single lapse in judgement can shatter privacy defenses. This suggests that even sophisticated users face great difficulties in evading tracking techniques.
Bug 757726 – disallow enumeration of navigator.plugins. Mozilla. 2012-05.
G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. Gürses, F. Piessens, B. Preneel. FPDetective: Dusting the Web for Fingerprinters. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pages 1129–1140. ACM, 2013.
M. Ayenson, D. J. Wambach, A. Soltani, N. Good, C. J. Hoofnagle. Flash cookies and Privacy II: Now with HTML5 and ETag Respawning. World Wide Web Internet And Web Information Systems, 2011.
M. Backes, A. Kate, M. Maffei, K. Pecina. Obliviad: Provably Secure and Practical Online Behavioral Advertising. In Proceedings of the 2012 IEEE Symposium on Security and Privacy (SP), pages 257–271. IEEE, 2012.
R. Balebako, P. Leon, R. Shay, B. Ur, Y. Wang, L. Cranor. Measuring the Effectiveness of Privacy Tools for Limiting Behavioral Advertising. In Proceedings of the Web 2.0 Workshop on Security and Privacy, 2012.
M. Bilenko, M. Richardson, J. Y. Tsai. Targeted, Not Tracked: Client-Side Solutions For Privacy-Friendly Behavioral Advertising. In Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011), 2011.
M. Fredrikson, B. Livshits. Repriv: Re-imagining Content Personalization and In-browser Privacy. In Proceedings of the 2011 IEEE Symposium on Security and Privacy (SP), pages 131–146. IEEE, 2011.
S. Guha, B. Cheng, P. Francis. Privad: Practical Privacy In Online Advertising. In Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation. pages 169–182. USENIX Association, 2011.
T. Kohno, A. Broido, and K. C. Claffy. Remote Physical Device Fingerprinting. In Transactions on Dependable and Secure Computing. IEEE. 2(2):93–108, 2005.
B. Krishnamurthy, C. Wills. Privacy Diffusion on the Web: A Longitudinal Perspective. In Proceedings of the 18th International Conference on World Wide Web. pages 541–550. ACM, 2009.
B. Krishnamurthy, C. E. Wills. On the Leakage Of Personally Identifiable Information Via Online Social Networks. In Proceedings of the 2nd ACM Workshop on Online Social Networks. pages 7–12. ACM, 2009.
B. Liu, A. Sheth, U. Weinsberg, J. Chandrashekar, R. Govindan. AdReveal: Improving Transparency Into Online Targeted Advertising. In Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks. page 12. ACM, 2013.
J. R. Mayer, J. C. Mitchell. Third-party web tracking: Policy and technology. In IEEE Symposium on Security and Privacy, pages 413–427. IEEE, 2012.
A. M. McDonald, L. F. Cranor. Survey of the Use of Adobe Flash Local Shared Objects to Respawn HTTP Cookies. In Proceedings of ISJLP, 7:639, 2011. landing.
K. Mowery, H. Shacham. Pixel Perfect: Fingerprinting Canvas in HTML5. In Proceedings of W2SP, 2012.
N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens, G. Vigna. Cookieless Monster: Exploring the Ecosystem of Web-based Device Fingerprinting. In Proceedings of the IEEE Symposium on Security and Privacy, pages 541–555. IEEE, 2013.
L. Olejnik, T. Minh-Dung, C. Castelluccia. Selling Off Privacy at Auction. In Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS), 2013.
F. Roesner, T. Kohno, D. Wetherall. Detecting and Defending Against Third-Party Tracking on the Web. In Proceedings of the Symposium on Networking Systems Design and Implementation. USENIX, 2012.
A. Soltani, S. Canty, Q. Mayo, L. Thomas, C. J. Hoofnagle. Flash Cookies and Privacy. In Proceedings of the AAAI Spring Symposium: Intelligent Information Privacy Management, 2010.
O. Sorensen. Zombie-cookies: Case studies and Mitigation. In Proceedings of the 2013 8th International Conference for Internet Technology and Secured Transactions (ICITST), pages 321–326. IEEE, 2013.
M. Tran, X. Dong, Z. Liang, X. Jiang. Tracking the trackers: Fast and scalable dynamic analysis of web content for privacy violations. In Applied Cryptography and Network Security, pages 418–435. Springer, 2012.
T. Unger, M. Mulazzani, D. Fruhwirt, M. Huber, S. Schrittwieser, E. Weippl. SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting. In Proceedings of the 2013 Eighth International Conference on Availability, Reliability and Security (ARES), pages 255–261. IEEE, 2013.
Khaled El Emam, Elizabeth Jonker, Luk Arbuckle, Bradley Malin, “A Systematic Review of Re-Identification Attacks on Health Data“; In PLoS ONE; Volume 6, Number 12; 2011, doi:10.1371/journal.pone.0028071; page 7.
Pu Wang, Timothy Hunter, Alexandre M. Bayen, Katja Schechtner, Marta C. González, “Understanding Road Usage Patterns in Urban Areas”; In Scientific Reports; Volume 2; 2012-12-20. doi:10.1038/srep01001.
Khaled El Emam et al.; “De-identification Methods for Open Health Data: The Case of the Heritage Health Prize Claims Dataset”; In Journal of Medical Internet Research; Volume 14, Number 1; 2012; doi:10.2196/jmir.2001.
The Rebuttal: Narayanan & Felten
tl;dr => it doesn’t work, the reasoning is flawed; you can de-anonymize, we already showed that. “… is not an option” as the hard line.
K. El Emam, E. Jonker, L. Arbuckle, and B. Malin, “A Systematic Review of Re-Identification Attacks on Health Data,” PLoS ONE, vol. 6, no. 12, p. e28071, Dec. 2011.
Anna Monreale, Gennady L. Andrienko, Natalia V. Andrienko, Fosca Giannotti, Dino Pedreschi, Salvatore Rinzivillo, and Stefan Wrobel, “Movement Data Anonymity through Generalization,” Transactions on Data Privacy, vol. 3, no. 2, pp. 91–121, 2010.
S. C. Wieland, C. A. Cassa, K. D. Mandl, and B. Berger, “Revealing the spatial distribution of a disease while preserving privacy,” Proc. Natl. Acad. Sci. U.S.A., vol. 105, no. 46, pp. 17608–17613, Nov. 2008.
K. El Emam and L. Arbuckle, Anonymizing Health Data: Case Studies and Methods to Get You Started. O’Reilly, 2013.
L. Willenborg and T. de Waal, Statistical Disclosure Control in Practice. New York: Springer-Verlag, 1996.
L. Willenborg and T. de Waal, Elements of Statistical Disclosure Control. New York: Springer-Verlag, 2001.
K. El Emam, Guide to the De-Identification of Personal Health Information. CRC Press (Auerbach), 2013.
K. El Emam, L. Arbuckle, G. Koru, B. Eze, L. Gaudette, E. Neri, S. Rose, J. Howard, and J. Gluck, “De-identification Methods for Open Health Data: The Case of the Heritage Health Prize Claims Dataset,” Journal of Medical Internet Research, vol. 14, no. 1, p. e33, Feb. 2012.
K. El Emam, F. Dankar, R. Issa, E. Jonker, D. Amyot, E. Cogo, J.-P. Corriveau, M. Walker, S. Chowdhury, R. Vaillancourt, T. Roffey, and J. Bottomley, “A Globally Optimal k-Anonymity Method for the De-identification of Health Data,” Journal of the American Medical Informatics Association, vol. 16, no. 5, pp. 670–682, 2009.
K. El Emam, E. Jonker, E. Moher, and L. Arbuckle, “A Review of Evidence on Consent Bias in Research,” American Journal of Bioethics, vol. 13, no. 4, pp. 42–44, 2013.
on essayistic self-help “Somebody’s gonna kill me for saying this, but I think it was The Tipping Point,” Gladwell’s 2000 argument for the power of social connections, which made it safe for techies and business types—and, more generally, men—to read about bettering themselves. “The whole idea of showing that there is a counterintuitive way of looking at information, to make you understand yourself in a completely different way—that’s been game-changing.”
Hudson Street Press of Penguin.
was at Random House.
“I think it’s important to offer out a promise to the reader, It’s a kind of quintessentially American thing.”
The snide commentary of Boris Kachka in the article. Quoting…
…books on “willpower” and “vulnerability”—“self-help masquerading as ‘big-idea’ books.”
Today, every section of the store (or web page) overflows with instructions, anecdotes, and homilies. History books teach us how to lead, neuroscience how to use our amygdalas, and memoirs how to eat, pray, and love.
Instead of …
Instead of regulation, we have that new buzzword, self-regulation;
instead of an ambivalence over “selling out,” we have the millennial drive to “monetize”; and
instead of seeking to build better institutions, we mine them in order to build better selves.
Universities now devote faculty to fields (positive psychology, motivation science) that function as research arms of the self-help industry.
[J]ournalists schooled in a sense of public mission turn their skills to fulfilling our emotional needs.
But since self-help trails with it that old shameful stigma, the smartest writers and publishers shun the obvious terminology. And the savviest readers enjoy the masquerade, knowing full well what’s behind the costume: self-help with none of the baggage.
The “recovery” system named everything, defining every problem as a personal illness to be conquered
women who love too much,
“codependency,” which could potentially encompass any human relationship.
The guru has given way to the data set—as explicated by journalists eager to break the constraints of a shrinking medium by pitching their discoveries directly to the masses. And where yesterday’s healers had their Esalen Institute and Hazelden, journalists and scientist-writers have lecture circuits. “TED,” says Sutton, “is sort of like the new Oprah.”