Wolfie Christl and Sarah Spiekermann;
Networks of Control; Facultas, Vienna; 2016; 185 pages; landing.
Teaser: A Report on Corporate Surveillance, Digital Tracking, Big Data & Privacy Table of Contents
Analyzing Personal Data
Big Data and predicting behavior with statistics and data mining
Predictive analytics based on personal data: selected examples
The “Target” example: predicting pregnancy from purchase behavior
Predicting sensitive personal attributes from Facebook Likes
Judging personality from phone logs and Facebook data
Analyzing anonymous website visitors and their web searches
Recognizing emotions from keyboard typing patterns
Forecasting future movements based on phone data
Predicting romantic relations and job success from Facebook data
De-anonymization and re-identification
Analyzing Personal Data in Marketing, Finance, Insurance and Work
Practical examples of predicting personality from digital records
Credit scoring and personal finance
Employee monitoring, hiring and workforce analytics
Insurance and healthcare
Fraud prevention and risk management
Personalized price discrimination in e-commerce
Recording Personal Data – Devices and Platforms
Smartphones, mobile devices and apps – spies in your pocket?
Car telematics, tracking-based insurance and the Connected Car
Data abuse by apps
Wearables, fitness trackers and health apps – measuring the self
A step aside – gamification, surveillance and influence on behavior
Example: Fitbit’s devices and apps
Transmitting data to third parties
Health data for insurances and corporate wellness
Ubiquitous surveillance in an Internet of Things?
Examples – from body and home to work and public space
Data Brokers and the Business of Personal Data
The marketing data economy and the value of personal data
Thoughts on a ‘Customers’ Lifetime Risk’ – an excursus
From marketing data to credit scoring and fraud detection
Observing, inferring, modeling and scoring people
Data brokers and online data management platforms
Cross-device tracking and linking user profiles with hidden identifiers
Case studies and example companies
Acxiom – the world’s largest commercial database on consumers
Oracle and their consumer data brokers Bluekai and Datalogix
Experian – expanding from credit scoring to consumer data
arvato Bertelsmann – credit scoring and consumer data in Germany
LexisNexis and ID Analytics – scoring, identity, fraud and credit risks
Palantir – data analytics for national security, banks and insurers
Alliant Data and Analytics IQ – payment data and consumer scores
Lotame – an online data management platform (DMP)
Drawbridge – tracking and recognizing people across devices
Flurry, InMobi and Sense Networks – mobile and location data
Adyen, PAY.ON and others – payment and fraud detection
MasterCard – fraud scoring and marketing data
Summary of Findings and Discussion of its Societal Implications
Ubiquitous data collection
A loss of contextual integrity
The transparency issue
Power imbalances abused: systematic discrimination and sorting
Companies hurt consumers and themselves
Long term effects: the end of dignity?
Final reflection: From voluntary to mandatory surveillance?
Ethical Reflections on Personal Data Markets (by Sarah Spiekermann)
A short Utilitarian reflection on personal data markets
A short deontological reflection on personal data markets
A short virtue ethical reflection on personal data markets
Conclusion on ethical reflections
Short- and medium term aspects of regulation
Enforcing transparency from outside the “black boxes”
Knowledge, awareness and education on a broad scale
A technical and legal model for a privacy-friendly digital economy
List of tables
List of figures
Anna Fielder, Chair of Privacy International
Courtney gabrielson, International Association of Privacy Professionals (IAPP)
There are 677 footnoes, which are distinct from the references.
There are 211 references.
Posted in Advertising Activism, Privacy Activism |
Tagged Acxiom, Adyen, Alliant Data, Analytics IQ, arvato Bertelsmann, BlueKai, Cracked Labs, Cross-Device Linking, cross-device tracking, Customer Lifetime Risk, Customer Lifetime Value, Data Management Platform (DMP), Datalogix, deanonymization, Drawbridge, Experian, Flurry, ID Analytics, InMobi, LexisNexis, Life-Time Value (LTV), Lotame, MasterCard, Networks of Control, Oracle, Palantir, PAY.ON, Personal Data, reidentification, Sarah Spiekermann, Sense Networks, Visa, Wolfie Christl
Posted in Internet of Things, Silicon Valley Culture, Web Business & Culture |
Tagged 58 Daojia, @docker, Actiflo, AdKnowledge, Adyen, Airbnb, Alibaba, AppDirect, AppDynamics, AppNexus, Apttus, Atlassian Software Systems, Auction.com, AUTO1, Automattic, Avant, AVAST Software as., AVITO.ru, Beats Electronics, BelBel, Betterplace, BlaBlaCar, Blippar, Bloom Energy, Blue Apron, Box, bubble economics, Buzzfeed, China Rapid Finance, Cisco Meraki, Cloudera, CloudFlare, Coupa, Coupang, Credit Karma, Deem, Delivery Hero, Dianping, Didi Chuxing, Dji, DocuSign, Domo, Dropbox, Ele.me, Etsy, Eventbrite, Evernote, Fab.com, Facebook, Fanatics, FanDuel, Fanil, Farfetch, Fisker Automotive, Fitbit, Flipkart, Funding Circle, Fusion-io, Gilt Groupe Incorporated, github, Global Fashion Group, Good Technology, Google, GoPro, GrabTaxi, Groupon, Gusto, Hanhua Financial, HelloFresh, Home24, HomeAway, Honest Company, Hootsuite, Hortonworks, Houzz, Illumio, Inc., Infinidat, InMobi, InsideSales.com, Instacart, Instagram, Intarcia Therapeutics, Internet of Things (IoT), IronSource, Jasper Technologies, Jawbone, JD.com, Jimubox, JustFab, Kabam, Kabbage, Kik, Klarna, Koudai Gouwu, Kuaidi Dache, Lamabang, LaShou, Lazada, Legenary Pictures, Lending Club, LinkedIn, LivingSocial, Lookout, Lufax, Lwjw, Lyft, Lynda.com, Machine Zone, Magic Leap, Marketo, MarkLogic, Medallia, MediaMath, Meitu, Meituan, Meizu, Mobileye, Moderna Therapeutics, Mogujie, MongoDB, Mozido, Mu Sigma, MuleSoft, NantHealth, Nest, New Relic, Nextdoor, Nicra, Nimble Storage, Njoy, Nutanix, Oculus VR, Okta, Ola, One97 Communications, Oscar, Palantir, Palo Alto Networks, Panshi, Pinterest, Pluralsight, Powa, Prosper, Proteus Digital Health, Pure Storage, Qualtrics, Quickr, Quotient Technology, Razer, Renaissance Learning, Rocket Internet, Sapphire Energy, Shazam, Shopify, Simplivity, Slack, SnapChat, Snapdeal, SoFi, Sogou, SpaceX, Spotify, Sprinklr, Square, Stemcentrx, Stripe, Sunrun, Surveymonkey, Taboola, Tango, Tanium, Theranos, Thumbtack, Tintri, TransferWise, Trendy International GroupConsumer goods, Tujla, Tumblr, Twilio, Twitter, Uber, Udacity, unicorns, VANCL, Vice Media, Vox Media, Wandoujia, Warby Parker, Wayfair, Waze, Wework, WhatsApp, WiFi Master Key, Wish, Workday, Xero, Xiaomi, Yahoo!, Yammer, Yello Mobile, Yidao Yongche, YouTube, Zalando, Zenefits, Zeta Interactive, ZhongAn, ZocDoc, Zscaler, Zulily, Zuora, Zynga
Ryan Stevens, Clint Gibler, Jon Crussell, Jeremy Erickson, Hao Chen;
Investigating User Privacy in Android Ad Libraries; In Proceedings of MOST (MOST); 2012; 10 pages. Abstract
Mobclix: exfiltrate and/or modify the user’s calendar and contacts, exfiltrate user’s audio and image files, and turn on/off the camera LED.
Greystripe: get and/or set user’s cookies.
mOcean: send SMS and email messages, start phone calls, add calendar entries, get location, make arbitrary network requests.
Inmobi: send SMS and email messages, start phone calls, and modify the users calendar.
Posted in Advertising Activism, Privacy Technology |
Narseo Vallina-Rodriguez, Jay Shah, Alessandro Finamore, Yan Grunenberger, Hamed Haddadi, Konstantina Papagiannaki, John Crowcroft;
Breaking for Commercials: Characterizing Mobile Advertising; In Proceedings of the 2012 ACM Internet Measurement Conference (IMC ’12); 2012; 14 pages. Abstract
Mobile phones and tablets can be considered as the first incarnation of the post-PC era. Their explosive adoption rate has been driven by a number of factors, with the most signifcant influence being applications (apps) and app markets. Individuals and organizations are able to develop and publish apps, and the most popular form of monetization is mobile advertising.
The mobile advertisement (ad) ecosystem has been the target of prior research, but these works typically focused on a small set of apps or are from a user privacy perspective. In this work we make use of a unique, anonymized data set corresponding to one day of traffic for a major European mobile carrier with more than 3 million subscribers. We further take a principled approach to characterize mobile ad traffic along a number of dimensions, such as overall traffic, frequency, as well as possible implications in terms of energy on a mobile device.
Our analysis demonstrates a number of inefficiencies in today’s ad delivery. We discuss the benefits of well-known techniques, such as pre-fetching and caching, to limit the energy and net work signalling overhead caused by current systems. A prototype implementation on Android devices demonstrates an improvement of 50% in terms of energy consumption for offline ad-sponsored apps while limiting the amount of ad related traffic.
Ilias Leontiadis, Christos Efstratiou, Marco Picone, Cecilia Mascolo;
Don’t Kill My Ads!: Balancing Privacy In An Ad-Supported Mobile Application Market; In Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications (HotMobile ’12); 2012; pages 2:1–2:6. Abhinav Pathak, Y. Charlie Hu, Ming Zhang, Paramvir Bahl, Yi-Min Wang;
Fine-grained Power Modeling for Smartphones Using System Call Tracing; In Proceedings of the Sixth Conference On Computer Systems (EuroSys ’11); 2011; pages 153–168. Michael C. Grace, Wu Zhou, Xuxian Jiang, Ahmad-Reza Sadeghi;
Unsafe Exposure Analysis of Mobile In-App Advertisements; In Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WISEC ’12); 2012; pages 101–112. Hossein Falaki, Dimitrios Lymberopoulos, Ratul Mahajan, Srikanth Kandula, Deborah Estrin;
A First Look at Traffic on Smartphones; In Proceedings of the 10th Annual Conference On Internet Measurement (IMC ’10); 2010; pages 281–287. Hamed Haddadi, Pan Hui, and Ian Brown;
Mobiad: Private And Scalable Mobile Advertising; In Proceedings of the Fifth ACM international Workshop On Mobility In The Evolving Internet Architecture (MobiArch ’10); 2010; pages 33–38; Project Site, slides. Saikat Guha, Alexey Reznichenko, Kevin Tang, Hamed Haddadi, Paul Francis;
Serving Ads From Localhost For Performance, Privacy, And Profit; In Proceedings of the 8th Workshop on Hot Topics in Networks, 2009.
Ad Regex Dictionary, Alessandro Finamore, 2012. Qiang Xu, Jeffrey Erman, Alexandre Gerber, Zhuoqing Mao, Jeffrey Pang, and Shobha Venkataraman;
Identifying Diverse Usage Behaviors Of Smartphone Apps. In Proceedings of the 2011 ACM SIGCOMM Conference On Internet Measurement Conference (IMC ’11); 2011; pages 329–344. Feng Qian, Kee Shen Quah, Junxian Huang, Jeffrey Erman, Alexandre Gerber, Zhuoqing Mao, Subhabrata Sen, Oliver Spatscheck;
Web Caching On Smartphones: Ideal vs. Reality; In Proceedings of the 10th International Conference On Mobile Systems, Applications, And Services (MobiSys ’12); 2012; pages 127–140. Feng Qian, Zhaoguang Wang, Alexandre Gerber, Zhuoqing Morley Mao, Subhabrata Sen, Oliver Spatscheck;
Characterizing radio resource allocation for 3G networks. In Proceedings of the 10th Annual Conference On Internet Measurement (IMC ’10); 2010; pages 137–150. Aaron Carroll, Gernot Heiser;
An Analysis Of Power Consumption in a Smartphone; In Proceedings of the 2010 USENIX Annual Technical Conference (USENIXATC’10); 2010; pages 21–??. Niranjan Balasubramanian, Aruna Balasubramanian, Arun Venkataramani;
Energy Consumption in Mobile Phones: a Measurement Study and Implications for Network Applications; In Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference (IMC ’09); 2009; pages 280–293. Paul Pearce, Adrienne Porter Felt, Gabriel Nunez, David Wagner;
Addroid: Privilege Separation for Applications and Advertisers in Android; In Proceedings of ACM Symposium on Information, Computer and Communications Security (AsiaCCS’12); 2012.
Also Addroid: Privilege Separation for Applications and Advertisers in Android; Technical Report EECS-2013-59; Electrical Engineering & Computer Science, University of California, Berkeley; 2013-05-14; landing. William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, Anmol N. Sheth;
Taintdroid: An Information-Flow Tracking System For Realtime Privacy Monitoring on Smartphones; In Proceedings of the 9th USENIX Conference On Operating Systems Design and Implementation (OSDI’10); 2010; pages 1–6. Narendran Thiagarajan, Gaurav Aggarwal, Angela Nicoara, Dan Boneh, Jatinder P. Singh;
Who Killed My Battery?: Analyzing Mobile Browser Energy Consumption; In Proceedings of the 21st International Conference On World Wide Web (WWW ’12); 2012-04; pages 41–50; landing Zhaoguang Wang, Zhiyun Qian, Qiang Xu, Zhuoqing Mao, Ming Zhang;
An Untold Story Of Middleboxes In Cellular Networks; In SIGCOMM Computer Communication Reviews; 41(4):374–385; 2011-08. Narseo Vallina-Rodriguez Jon Crowcroft;
Energy Management Techniques In Modern Smartphones; In Communications Surveys Tutorials of the IEEE; 2012. Henry Haverinen, Jonne Siren, Pasi Eronen;
Energy Consumption Of Always-On Applications In WCDMA Networks; In Proceedings of the Vehicular Technology Conference 2007 (VTC2007-Spring); 2007; pages 964–968; 5 pages; paywall. Azeem J. Khan, V. Subbaraju, Archan Misra, Srinivasan Seshan;
Mitigating the True Cost Of Advertisement-Supported ”Free” Mobile Applications; In Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications (HotMobile ’12); 2012.
Posted in Ad Tech |
Tagged 3GPP, 800 HOSTING WPC/32POINTS, AdCache, AdFonic, AdFree, AdMob, AdWhirl, Alessandro Finamore, Amazon, App Media Group, Breaking for Commercials, Burstly, Characterizing Mobile Advertising, Content Delivery Network (CDN), EdgeCast, eProf, Flurry, GlobalCrossing, GoGrid LLC, Google Analytics, Google Cloud-to-Device (C2DM), GreyStripe, Hamed Haddadi, iAd, InMobi, Jay Shah, John Crowcroft, Jumptap, Konstantina Papagiannaki, MaxMind, Millennial Media, MobClix, Mobfox, Mojiva, Monsoon, MoPub, Narseo Vallina-Rodriguez, PassiveLocationProvider, Peer | Host, push notifications, Radio Resource Control (RRC), Softlayer, SPDY, WCDMA, WebM, Yan Grunenberger
Mobile and Money: Consumer Awareness and Adoption of Smartphone-based Financial Applications; IAB, InMobi & Viggle; 2013-04-11; 11 slides.
members get rewarded for their TV time
On the occasion of tax season
Starbucks stirs up mobile purchases with its apps; In The Internet Retailer; 2013-03-28. A survey of
“awareness” of mobile banking => high
use of mobile payment (e.g. PayPal) => medium
“awareness” of tax, expense, planning, news apps => low
perceived security (“is important”)
ease of use, speed (“not primarily important”)
Security References Cited