Privacy and Tracking

  • Chapter
  • First Online:
Security, Privacy and User Interaction

Abstract

In order for ubiquitous computing to realize its full potential, it is necessary for service providers to detect the presence of user devices to identify the needs and wishes of the associated users—both as this relates to the performance of services and the implementation of privacy preferences. We take a large step in the direction of improving service performance by introducing an approach to tie a person’s online behavior (e.g., as represented by her HTML cookies) with her physical behavior (e.g., location and brick-and-mortar purchases). This enables insights from web browsing to be applied to in-store sales (e.g., using coupons), and data related to user location and behavior to be used to improve the understanding of the user’s online needs. We also show how to tie a user profile to a user communications channel, which enables messaging (e.g., alerts, reminders and coupons) that is tied to the detection of user actions, whether on- or offline. We show how to combine this advance in profiling capabilities with a practically manageable approach to enhance end-user privacy. One aspect of this is an extension of the domain of observations to which users can (or can deny to) grant permissions, e.g., allowing individual users a practical method to determine under what circumstances facial recognition can be used for personalization purposes. Our approach is backwards compatible with existing consumer devices; can be rolled out gradually; and is designed with attention given to the usability of the resulting system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 42.79
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
EUR 52.74
Price includes VAT (France)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    If the app has BLUETOOTH_ADMIN permission, this can be simplified, as the app can also initiate discovery and manipulate Bluetooth settings.

References

  1. S. Jerde, The New York Times Can Now Predict Your Emotions and Motivations After Reading a Story (2019). https://www.adweek.com/tv-video/the-new-york-times-can-now-predict-your-emotions-and-motivations-after-reading-a-story/

  2. K. Mowery, H. Shacham, Pixel perfect: fingerprinting canvas in HTML5, in Proceedings of W2SP (2012), pp. 1–12

    Google Scholar 

  3. S. Kamkar, Evercookie (2010). http://samy.pl/evercookie

  4. M.K. Franklin, M.K. Reiter, Fair Exchange with a Semi-Trusted Third Party (ACM, New York, 1997), pp. 1–5

    Google Scholar 

  5. J. Camenisch, U. Maurer, M. Stadler, Digital payment systems with passive anonymity-revoking trustees. J. Comput. Sec. 5(1), 69–89 (1997)

    Article  Google Scholar 

  6. S. Micali, Fair cryptosystems. Massachusetts Institute of Technology. Technical Report (1993)

    Google Scholar 

  7. L. Coney, J.L. Hall, P.L. Vora, D. Wagner, Towards a privacy measurement criterion for voting systems, in Proceedings of the 2005 National Conference on Digital Government Research (2005), pp. 287–288

    Google Scholar 

  8. L. Sweeney, k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowledge Based Syst. 10(05), 557–570 (2002)

    Google Scholar 

  9. C. Dwork, Differential privacy, in Encyclopedia of Cryptography and Security (2011), pp. 338–340

    Google Scholar 

  10. A.P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, D. Wagner, Android Permissions: User Attention, Comprehension, and Behavior (ACM, New York, 2012), p. 3

    Google Scholar 

  11. S. Von Solms, D. Naccache, On blind signatures and perfect crimes. Comput. Sec. 11(6), 581–583 (1992)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Jakobsson, M., Jakobsson, A. (2020). Privacy and Tracking. In: Jakobsson, M. (eds) Security, Privacy and User Interaction. Springer, Cham. https://doi.org/10.1007/978-3-030-43754-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-43754-1_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-43753-4

  • Online ISBN: 978-3-030-43754-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation