{"id":191098,"date":"2014-07-16T00:00:00","date_gmt":"2014-07-16T03:40:08","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/msr-research-item\/in-plain-sight-online-tracking-and-profiling\/"},"modified":"2016-07-15T15:17:54","modified_gmt":"2016-07-15T22:17:54","slug":"in-plain-sight-online-tracking-and-profiling","status":"publish","type":"msr-video","link":"https:\/\/www.microsoft.com\/en-us\/research\/video\/in-plain-sight-online-tracking-and-profiling\/","title":{"rendered":"In Plain Sight: Online Tracking and Profiling"},"content":{"rendered":"
\n

Internet advertisers reach millions of customers through practices that involve real time tracking of users\u2019 online activities. The tracking is commonly conducted through browser cookies by third-party ad services. They engage with websites to facilitate marketing campaigns and gather service analytics. By installing cookies on users\u2019 computers, they track the users as they navigate from one site to another. Other trackers exploit shortcomings in the access control to the cache and apply cookie-less profiling. By using Java scripts in their webpages, the trackers await unexpected visitors and gain access to the cached content. In that manner, they can reconstruct the users\u2019 browsing history.<\/p>\n

At the same time, user applications that facilitate interaction with services, such as commonly used Internet browsers, reveal little or no information about the information flow between the devices and services. That leaves the consumers with no insight about the breadth of the digital footprints they leave while interacting with services and no understanding of how that data is exploited. In the broader context of privacy and cyber-security, it is important to consider methods and computing designs that empower consumers to make well informed decisions and take actions that keep themselves and other safe.<\/p>\n

We outline a research agenda that investigates several aspects of this problem area. That involves (1) characterizing the tracking ecosystem and the value exchange within it and (2) understanding of the users\u2019 attitudes, behavior, and awareness of the tracking practices. We discuss the findings of several studies that investigate these issues. While they motivate us to think of alternatives to the privacy invading practices, they also urge deeper questions about the principles of design and comprehensibility of computing systems.<\/p>\n<\/div>\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

Internet advertisers reach millions of customers through practices that involve real time tracking of users\u2019 online activities. The tracking is commonly conducted through browser cookies by third-party ad services. They engage with websites to facilitate marketing campaigns and gather service analytics. By installing cookies on users\u2019 computers, they track the users as they navigate from […]<\/p>\n","protected":false},"featured_media":198461,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"footnotes":""},"research-area":[],"msr-video-type":[],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-191098","msr-video","type-msr-video","status-publish","has-post-thumbnail","hentry","msr-locale-en_us"],"msr_download_urls":"","msr_external_url":"https:\/\/youtu.be\/-JK4eS7MGME","msr_secondary_video_url":"","msr_video_file":"","_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/191098"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-video"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video\/191098\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/198461"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=191098"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=191098"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=191098"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=191098"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=191098"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=191098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}