skip to main content
10.1145/2381966.2381969acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Understanding what they do with what they know

Published:15 October 2012Publication History

ABSTRACT

This work seeks to understand what "they" (Web advertisers) actually do with the information available to them. We analyze the ads shown to users during controlled browsing as well as examine the inferred demographics and interests shown in Ad Preference Managers provided by advertisers.

In an initial study of ad networks and a focused study of the Google ad network, we found many expected contextual, behavioral and location-based ads along with combinations of these types of ads. We also observed profile-based ads. Most behavioral ads were shown as categories in the Ad Preference Manager (APM) of the ad network, but we found unexpected cases where the interests were not visible in the APM. We also found unexpected behavior for the Google ad network in that non-contextual ads were shown related to induced sensitive topics regarding sexual orientation, health and financial matters.

In a smaller study of Facebook, we did not find clear evidence that a user's browsing behavior on non-Facebook sites influences the ads shown to the user on Facebook, but we did observe such influence when the Facebook Like button is used to express interest in content. We did observe Facebook ads appearing to target users for sensitive interests with some ads even asserting such sensitive information, which appears to be a violation of Facebook's stated policy.

References

  1. Julia Angwin. The web's new gold mine: Your secrets. Wall Street Journal, July 30 2010. http://online.wsj.com/article/SB10001424052748703940904575395073512989404.html.Google ScholarGoogle Scholar
  2. Rebecca Balebako, Pedro Leon, Richard Shay, Blase Ur, and Lorrie Faith Cranor. Measuring the effectiveness of privacy tools for limiting behavioral advertising. In Web 2.0 Workshop on Security and Privacy, May 2012.Google ScholarGoogle Scholar
  3. Facebook advertising guidelines, Last Revised: March 20, 2012. http://www.facebook.com/ad_guidelines.php .Google ScholarGoogle Scholar
  4. Facebook help center: Ad and sponsored stories copy, image, targeting, and destination. http://www.facebook.com/help/?page=245316378826196.Google ScholarGoogle Scholar
  5. Fiddler web debugging proxy. http://www.fiddler2.com/fiddler2/.Google ScholarGoogle Scholar
  6. Google Ads Preferences. http://www.google.com/ads/preferences/.Google ScholarGoogle Scholar
  7. Interest-based advertising: How it works - Google ads preferences, 2010. http://www.google.com/ads/preferences/html/intl/en/about.html.Google ScholarGoogle Scholar
  8. Google privacy policy, Last Modified: March 1, 2012. http://www.google.com/intl/en/policies/privacy/.Google ScholarGoogle Scholar
  9. Saikat Guha, Bin Cheng, and Paul Francis. Challenges in measuring online advertising systems. In Proceedings of IMC, November 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Balachander Krishnamurthy, Konstantin Naryshkin, and Craig E. Wills. Privacy leakage vs. protection measures: The growing disconnect. In Proceedings of the Web 2.0 Security and Privacy Workshop, pages 1--10, Oakland, CA USA, May 2011.Google ScholarGoogle Scholar
  11. Balachander Krishnamurthy and Craig E. Wills. On the leakage of personally identifiable information via online social networks. In WOSN, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Balachander Krishnamurthy and Craig E. Wills. Privacy diffusion on the web: A longitudinal perspective. In Proceedings of the World Wide Web Conference, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jonathan Mayer. Tracking the trackers: Where everybody knows your username, October 2011. http://cyberlaw.stanford.edu/node/6740.Google ScholarGoogle Scholar
  14. Franziska Roesner, Tadayoshi Kohno, and David Wetherall. Detecting and defending against third-party tracking on the web. In Symposium on Networked Systems Design and Implementation, April 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Arnold Roosendaal. Facebook tracks and traces everyone: Like this! Technical report, Tilburg Law School, November 2010. Legal Studies Research Paper Series No. 03/2011. http://ssrn.com/abstract=1717563 .Google ScholarGoogle Scholar
  16. Craig E. Wills and Can Tatar. Understanding what they do with what they know. Technical Report WPI-CS-TR-12-03, Computer Science Department, Worcester Polytechnic Institute, August 2012. http://www.cs.wpi.edu/~cew/papers/tr12-03.pdf.Google ScholarGoogle Scholar

Index Terms

  1. Understanding what they do with what they know

        Recommendations

        Reviews

        William Edward Mihalo

        This paper describes research associated with systems security. It will be of interest to system administrators and people monitoring network security for an organization. It will also be of interest to people doing research in systems security and people interested in studying online privacy. The authors propose a method for studying browsing behavior and its effect on online privacy. They are particularly interested in the ad preference managers provided by advertisers on four major ad networks: AOL, BlueKai, Google, and Yahoo. The authors regard an ad network as a black box in terms of how it works. They note that an ad network has "inputs that can be controlled and outputs that can be observed." In effect, the authors developed a system to reverse-engineer the perceived logic used by the major ad networks. This paper is the abridged version of a longer paper, which is listed in the references. Unfortunately, the uniform resource locator (URL) listed is a dead link; the correct link for the longer paper is http://www.cs.wpi.edu/~cew/papers/tr1203.pdf. The authors found that "behavioral ads based [on] induced interests were shown as categories in the ad preference manager." They also found some unexpected cases where the interests were not visible. The Google ad network displayed unexpected behavior: "noncontextual ads were shown related to induced sensitive topics regarding sexual orientation, health, and financial matters." The authors did a smaller study with Facebook; if a user uses the "Like" button to express interest, the user's browsing behavior on non-Facebook sites influences the ads shown on Facebook. This study is interesting, but this short version of the results is hard to follow because some explanations and definitions were omitted. The longer version of the paper, which is 24 pages long, is easier to follow. Online Computing Reviews Service

        Access critical reviews of Computing literature here

        Become a reviewer for Computing Reviews.

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          WPES '12: Proceedings of the 2012 ACM workshop on Privacy in the electronic society
          October 2012
          150 pages
          ISBN:9781450316637
          DOI:10.1145/2381966
          • General Chair:
          • Ting Yu,
          • Program Chair:
          • Nikita Borisov

          Copyright © 2012 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 15 October 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate106of355submissions,30%

          Upcoming Conference

          CCS '24
          ACM SIGSAC Conference on Computer and Communications Security
          October 14 - 18, 2024
          Salt Lake City , UT , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader