Monday, June 3, 2019

Enhancing Online Privacy In Behavioral Targeting Advertisement Information Technology Essay

Enhancing Online Privacy In Behavioral Targeting Advertisement In kneadation Techno recordy tryAdvertisements atomic number 18 fork of everyday life even if its not a choice. They are placed in every possible physically spot and in every kind of mass media. Advertising has become an key channel of modern marting 19. The purpose of advertisements can be brand awareness, brand forwarding or brand sales and the regularity varies ground on the media used.Internet media is an important communication channel and could not be an exception therefore, display waft advertisement has become a big industry especially the latest years as advertisers struggle to approach ever-larger audiences with higher susceptibilities to consume. It is estimated that global online advertising market is valued $40 billion in 2009 and grown to $80 billion by 2010.5Yet, people actively avoid looking at online banners 1 and empirical and observational studies show that advertising messages are noisy 2. Mea ning that people are anointed by the existence of advertisements on vane and therefore the effectiveness of the advertisement function might be low for people that dislike this noise. A way to measure the effectiveness and success of online banner advertisements is CTR (Click Through Rate). A CTR is calculated by dividing the amount of users who clicked on an ad in spite of appearance a weave page by the amount of times the ad was in total delivered (impressions).The average click-through sum up of banner ads has been decreasing consistently, from 3% in the mid-1990s to 0.2% (eMarketer 2004).Studies showed that since we are faced with an ever expanding mass of nurture theselection of the relevant bits of information seems to become more important than the retrieval of data 3. The relevance of information is subjective and is related to the personal raise of each user. Hence, the idea of behavioural targeting within online advertisement was very cursorily expanded in all count ries and is today affected to be a mandatory service for the online advertisement industry. Online Behavioural targeting (OAB) is not a new practice within online advertisement industry it was low gear released in late 1990s from DoubleClick to track users across sites and present banner advertisements based on their browsing preferences. 6Interest based advertising is not a static area of applied science. On the contrast, its continuously evolving and adapted to new techniques and methods, aiming to increase the revenues by succeeding on targeting the correct potency customers based on their personal interests. Its evolution combines blade mining in data analysis of on-line users behaviour and machine learning in optimizing web on-line advertising 1Companies in the industry use Interest based advertising as a ancestor for optimizing the selection of ads to display for a real user. The selection of ads is based on an interest profile built up during visits to websites within a specific ad network.Problems with behavioural targetingThe problem in todays solution within interest based advertisement is that since users have the ability to choose to surf in private mode, by selecting this choice from the web browser, it is impossible to gather anon. data rough their interests.In advance, although online behavioral advertising promises to decrease the noise and increase the users interest, there is a great concern and protest, particularly among privacy and consumer protagonism groups 6 mainly because of the technology that is been used.In addition to the general disapproval of the fact that the majority of advertising companies store and use their customers information in a non-ethical way, an forthcoming refinement of the methods which advertising companies use to inform their users about their online tracking is expected due to an EU directive issued on 2009 15. This directive is expected to redefine the implementation and operation of current methods used for retrieval of identification data, since every online advertising agency should explicitly ask for the users consent before accessing and processing his data.Current technology backgroundAs mentioned previously, apart from the fact that current behavioral advertising techniques fail to retrieve the appropriate information regarding their target groups, they also neglect the security system concerns. Most of them seem to focus more on attracting users attention and persuade them to purchase without taking into consideration their privacy. As a result, security attacks are super related with current advertising methods, thus making customers suspicious and face rather negatively the fact that their online behavior is monitored.In this section we testament first provide a brief description of the available techniques that are widely used from the advertising industry, in order to familiarize the reader with some basic underlying concepts. Consequently, we will specify whic h of these technologies are used by some of the leading advertising companies aiming to track users online preferences, how they manage to deal with security attacks and why they lull fail to convince people that they perform their privacy protection efficiently.One of the most common techniques used to track online behavior nowadays are Cookies. These are text files created by web sites and placed into users hard disk. When a user is visiting a site this file is placed automatically in a specific repository that each browser retains to store cookies. The near time the user choses to visit again this specific site, he will be unequivocally identified based on the information that cookie has stored for him7. This information can be related to his browsing report, such as the sites he has visited, the usernames and passwords he provided to log into them etc., or information regarding his systems or networks details, such as browser type and version, operating system he uses or his IP address8.Another, relatively new introduced method is Deep big bucks Inspection (DPI). It is mainly carried out within the users ISP consent and cooperation with advertising companies, since it uses specific software and hardware aiming to retrieve information regarding the online preferences of ISP customers 9. This information may include details regarding sensitive private data, such as name, sex or location of the user as well as his browsing and buying history.On the other hand, web beacons are often used for behavioral tracking also. They are usually a chunk of code linked to a graphic image that is not visible to the user in the foreground of a Web page. It can be used to collect either unnamed data, and in this case are stored in the cache of web browser or personal information which can be retrieved for example from an email containing the web beacon 10.The techniques mentioned in the previous paragraph are widely used by some of the most dominant companies in the adv ertising industry, which aim to piss the users profiles based on the tracking of their interests. In this section we will examine how companies like DoubleClick, Phorm and hayseed exploit the available web techniques to gather information about their users and how they manage to protect the privacy of them.DoubleClick, which was founded in 90s and managed to evolve into one of the most well-known online advertising agencies was acquired by Google Inc.in 2007. They use web cookies that are stored on users browser each time he chooses to visit Google, DoubleClick or some of their partners (YouTube, Amazon etc.). Hence, they retrieve information based on both general browsing history of the user as well as his searching or purchasing history through specific advertising sites. The DoubleClick Cookie is stored in the web browser as a log file containing the time that the user interacted with the advertisement, the users IP address, a number specifying the advertisement, a unique ident ification number for the users browser and the universal resource locator path of the site that hosts the advertisement 11. As such, DoubleClick claims to use information that dont violate users privacy and dont use sensitive personal data to construct the users online profile.Phorm uses Deep Packet Inspection to acquire information from the users online preferences. It cooperates with ISPs to collect data regarding their customers and uses the existing ISP infrastructure to achieve this. The main procedure it falls is to mark each browser with a several(predicate) random number and relate it with the 10 most often keywords that appear in the visited sites and as such construct a channel, which is a specific subset of users interests 13.Yahoo makes use of web beacons and the so called Yahoo Cookies, in order to offer their users more focused to their interests advertisements 14. They use both anonymous and personal data, but in the latter case they require partners to disclose th e presence of web beacons in their privacy policies and state what choices are available to users regarding the collection and use of this information, as state in their website14. As such, they rely on their partners privacy policies to efficiently protect the personal information of their users and also inform the user about the action of lay in his private data. link up privacy concernsDespite the fact that all the previously mentioned advertising agencies offer an opt-out choice to their users 15, which allow them to disable the tracking methods operation, there is a lot of discussion about the level in which they succeed in protecting their users privacy. The greater issue of controversy between privacy advocates and advertising agencies focuses on whether all these companies actually use the retrieved information in an ethical way, and if this information is indeed anonymous. Numerous reports depict that Abacus Alliances, which owns databases containing personal information and is one of the major cooperators of DoubleClick practice sensitive data of DoubleClicks visitors 12. Phorm has been constantly accused from UK tabloids and Privacy Protection Organizations to infringe Internet Users rights by acquiring and storing personal information, and has also intrigued EU s interest which has launched several legal proceedings against UK for not complying with the EU security rules 20.Research MethodologyIn order to provide an accomplished approach to our research we consider that the most suitable inquiry method is Qualitative Methodology and more specifically the conceptual inductive research process since it this is used in close to every workplace and study environment 17 and covers our research structure and baseborns. Within a qualitative study we can generate data in the form of participant descriptions of their experiences and use literary analytic procedures to produce higher-order descriptions and understandings of the investigated experience 1 8.First, we will investigate the dominant tendencies of tracking users online behaviour and create the corresponding profiles for marketing purposes. By looking into the main web tools and techniques they deploy to retrieve information about the visitors of their sites, we will try to find out how they manage to build an overall setting of their preferences. We will particularly examine these techniques through a point of view of privacy concerns. In fact we will examine the ways they claim to successfully use towards protecting the privacy of their users, and in which degree they actually manage to achieve this. This part of our survey will be carried out through a data collection procedure based on three different sources of informationThe official sites of these companies, in which they describe the basic techniques that use for online behavioral targeting and what policies they follow to protect the privacy of their users.Articles and papers which discuss and evaluate these tec hniques, by pointing out the basic points in which they fail to efficiently provide privacy security.Previous surveys and statistics which picture that either users are not interested in the advertisements they are exposed to, or their distrust to the level of the protection they perceive that these companies offer to them.On the next step, our research will deal with a combination of technologies that aim to collect anonymous information regarding customers behaviour and use them for behavioural advertisement targeting. As such, its tendency will be to succeed in providing efficient advertise targeting along with showing respect to the users need for privacy and freedom of choice.On the third part of our research, we will try to testify the acceptance of our proposed technique. We consider that the most suitable way to achieve this is within a questionnaire that will give us feedback for our proposal.Related ResearchThe selection of the target group for this questionnaire was bas ed on the following criteriaThe target group should consist of people that have regular contact with variant Web sites. This means that they have already experienced being exposed to online advertisements, and as such will be better able to express a well-argued opinion about online advertising issues.It would be also useful that they acquire basic knowledge regarding the common tools and methods basically used to track their online behavior. Of course this doesnt mean that they should have in deep knowledge of the technical aspects of these methods, but rather a general sense of how it is feasible for an advertising company to get information about their online behavior.The above consequently imply that the target group should consist of young-aged people, who are the main Internet users and usually have daily interaction with web applications.For practical purposes it would be more convenient that the target group is easily accessible from us and is also familiar with Research an d Scientific concepts. As such, it will be of greater interest to them to take part in our survey.For the above reasons we regarded that the most suitable target audience for our questionnaire are KTH and DSV students. Our questions will deal with both examining their opinion about the effectiveness of our proposal in correctly identifying their interests and defining the level of their trust to the privacy protection that it guarantees. The final step will be to collect and evaluate the results coming out of our survey, in order to reach our final conclusions.Literature references1 Drze, X., and Hussherr, F.-X. (2004). Internet Advertising Is Anybody Watching? Journalof Interactive market , 8-23.2 Bharat N. Anand Ron Shachar (2009) Targeted advertising as a signal Quant Mark Econ (2009) 7237-2663Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen, Cross-Disciplinary Perspectives, Springer, p.1 (2008) (Profiling the European Citizen)4 J. Jaworska and M. Sydow ( 2008) Behavioural Targeting in On-Line Advertising An Empirical drive5 Policy Engagement Network The Information Systems and Innovation Group, ONLINE ADVERTISINGConfronting the Challenges. MAY 20096 V.Toubiana, A.Narayanan, D.Boneh, (2009) Adnostic Privacy Preserving Targeted Advertising7 JOON S. PARK AND RAVI SANDHU, Secure Cookies on the Web, IEEE INTERNET COMPUTING, July-August 20008 Daniel Lin, Michael C. Loui, Taking the Byte stunned of Cookies Privacy, Consent, and the Web, Ethics and Social Impact, ACM Policy 989 Gabriel Macia-Fernandez, Yong Wang, Rafael Rodrguez-Gomez, Aleksandar Kuzmanovic,ISP-Enabled Behavioral Ad Targeting without Deep Packet Inspection,IEEE INFOCOM 2010 proceedings10 JOSHUA GOMEZ, TRAVIS PINNICK, ASHKAN SOLTAN, KNOW PRIVACY, UC Berkeley, School of Information, JUNE 1st 2009 p.8-911 http//www.google.com/privacy/ads/12 Ethan Preston Law Clerk, In the Matter of DoubleClick Inc.- Complaint and Request for Injunction, Request for Investigation and for Oth er Relief, submitted to Federal Trade Commission, February 10, 200013 http//www.phorm.com/14 http//info.yahoo.com/privacy/us/yahoo/webbeacons/15 2007/0248 (COD), Directive Of The European Parliament And Of Council, electronic communications universal service, users rights relating to networks and services, processing of personal data, protection of privacy, consumer protection cooperation Telecoms Package(amend.Directives 2002/22/EC, 2002/58/EC and Regulation (EC)No 2006/2004), Brussels, 22 October 200916 http//www.networkadvertising.org/participating/17 http//www.qsrinternational.com/what-is-qualitative-research.aspx18 D. E. Polkinghorne, handbook of Clinical Psychology Competencies, 200919 Adams M (1995) Brands of gold. Mediaweek 1330-3220 OsborneClark.com, International Online Behavioral Advertising Survey, 201021 Anton, A.I., Earp, J.B., Young, J.D., How Internet Users Privacy Concerns Have Evolved since 2002, Security Privacy, IEEE, Volume 8 , Issue1, Jan.-Feb. 2010p.24

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.