References
- [1] A. Gutmann, “Online advertising revenue in the United States from 2000 to 2020,” 2020. [Online]. Available: https://www.statista.com/statistics/183816/us-online-advertising-revenue-since-2000/. Accessed on: Jan. 02, 2022.
- [2] “Total number of Websites.” [Online]. Available: https://www.internetlivestats.com/total-number-of-websites/#trend. Accessed on: Jan. 02, 2022.
- [3] G. Dautovic, “The 45 most important advertising statistics of 2020,” 2020. [Online]. Available: https://web.archive.org/web/20201126090706/ https://www.smallbizgenius.net/by-the-numbers/advertising-statistics/. Accessed on: Jul. 09, 2022.
- [4] J. Johnson, “Daily internet usage per capita worldwide 2011–2021, by device,” Jan. 27, 2021. [Online]. Available: https://www.statista.com/statistics/319732/daily-time-spent-online-device/. Accessed on: Jul. 09, 2022.
- [5] G. Broussard, “How advertising frequency can work to build online advertising effectiveness,” International Journal of Market Research, vol. 42, no. 4, 2000. https://doi.org/10.1177/147078530004200406
- [6] H. Beales, “The value of behavioural targeting,” Director, pp. 1–23, 2010. [Online]. Available: http://www.socialized.fr/wp-content/uploads/2010/08/beales-etude-sur-le-ciblage-comportementalsur-internet-ppc4bible.pdf
- [7] B. Ur, P. G. Leon, L. F. Cranor, R. Shay, and Y. Wang, “Smart, useful, scary, creepy,” in Proceedings of the Eighth Symposium on Usable Privacy and Security – SOUPS’12, Jul. 2012, Art no. 4, pp. 1–15. https://doi.org/10.1145/2335356.2335362
- [8] T. Dehling, Y. Zhang, and A. Sunyaev, “Consumer perceptions of online behavioral advertising,” in Proceedings – 21st IEEE Conference on Business Informatics, CBI 2019, vol. 1, Moscow, Russia, Aug. 2019, pp. 345–354. https://doi.org/10.1109/CBI.2019.00046
- [9] J. Estrada-Jiménez, J. Parra-Arnau, A. Rodríguez-Hoyos, and J. Forné, “Online advertising: Analysis of privacy threats and protection approaches,” Computer Communications, vol. 100, pp. 32–51, Mar. 2017. https://doi.org/10.1016/j.comcom.2016.12.016
- [10] J. W. Woensdregt, H. M. Al-Khateeb, G. Epiphaniou, and H. Jahankhani, “AdPExT: Designing a tool to assess information gleaned from browsers by online advertising platforms,” in Proceedings of 12th International Conference on Global Security, Safety and Sustainability, ICGS3 2019, London, UK, Apr. 2019. https://doi.org/10.1109/ICGS3.2019.8688328
- [11] S. Yuan, J. Wang, and X. Zhao, “Real-time bidding for online advertising,” in Proceedings of the Seventh International Workshop on Data Mining for Online Advertising – ADKDD’13, Aug. 2013, Art no. 3, pp. 1–8. https://doi.org/10.1145/2501040.2501980
- [12] J. Yan, N. Liu, G. Wang, W. Zhang, Y. Jiang, and Z. Chen, “How much can behavioral targeting help online advertising?” in Proceedings of the 18th international conference on World wide web – WWW’09, Apr. 2009, pp. 261–270. https://doi.org/10.1145/1526709.1526745
- [13] X. Wu, J. Yan, N. Liu, S. Yan, Y. Chen, and Z. Chen, “Probabilistic latent semantic user segmentation for behavioral targeted advertising,” in Proceedings of the Third International Workshop on Data Mining and Audience Intelligence for Advertising – ADKDD’09, Jun. 2009, pp. 10–17. https://doi.org/10.1145/1592748.1592751
- [14] F. Provost, B. Dalessandro, and R. Hook, “Audience selection for on-line brand advertising: Privacy-friendly social network targeting,” in Proceedings of the Fifteenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Jun. 2009, pp. 707–715. https://doi.org/10.1145/1557019.1557098
- [15] S. Muthukrishnan, “Ad exchanges: Research issues,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5929 LNCS, Springer, Berlin, Heidelberg, 2009, pp. 1–12. https://doi.org/10.1007/978-3-642-10841-9_1
- [16] N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna, “Cookieless monster: Exploring the ecosystem of web-based device fingerprinting,” in Proceedings – IEEE Symposium on Security and Privacy, Berkeley, CA, USA, Jun. 2013, pp. 541–555. https://doi.org/10.1109/SP.2013.43
- [17] N. Confessore, “Cambridge analytica and Facebook: The scandal and the fallout so far,” Apr. 04, 2018. [Online]. Available: https://www.nytimes.com/2018/04/04/us/politics/cambridge-analytica-scandal-fallout.html. Accessed on: Jul. 09, 2022.
- [18] G. Jefferson, “Is Facebook listening to me? Why those ads appear after you talk about things,” 2019. [Online]. Available: https://phys.org/news/2019-06-facebook-ads.html. Accessed on: Jul. 09, 2022.
- [19] C. Bennett, “Behind the one-way mirror: A deep dive into the technology of corporate surveillance,” 2019. [Online]. Available: https://www.eff.org/wp/behind-the-one-way-mirror. Accessed on: Jul. 09, 2022.
- [20] J. Schwartz, “Giving Web a memory cost its users privacy,” 2001. [Online]. Available: https://www.nytimes.com/2001/09/04/business/giving-web-a-memory-cost-its-users-privacy.html. Accessed on: Jul. 09, 2022.
- [21] D. Kristol and L. Montulli, “Request for comments: 2109,” 1997. [Online]. Available: https://tools.ietf.org/html/rfc2109. Accessed on: Jul. 09, 2022.
- [22] “What are cookies?” [Online]. Available: https://cookiecontroller.com/what-are-cookies/. Accessed on: Jul. 09, 2022.
- [23] S. Sternberg, “Fseek man page.” [Online]. Available: https://www.sas.upenn.edu/~saul/parasite/man/man3/fseek.3.html. Accessed on: Jul. 09, 2022.
- [24] D. Kristol and L. Montulli, “Request for comments: 2965,” 2000. [Online]. Available: https://tools.ietf.org/html/rfc2965. Accessed on: Jul. 09, 2022.
- [25] L. Sullivan, “64% of tracking cookies are blocked, deleted by Web browsers,” 2018. [Online]. Available: https://www.mediapost.com/publications/article/316757/64-of-tracking-cookies-are-blocked-deleted-by-we.html. Accessed on: Jul. 09, 2022.
- [26] G. Fishback, “Google’s new cookie restrictions: A nail in a coffin we should have already buried,” 2021. [Online]. Available: https://www.spiceworks.com/marketing/advertising/guest-article/google-new-cookie-restrictions-a-nail-in-a-coffin-we-should-have-already-buried/. Accessed on: Jul. 09, 2022.
- [27] P. Laperdrix, N. Bielova, B. Baudry, and G. Avoine, “Browser fingerprinting: A survey,” May 2019. [Online]. Available: http://arxiv.org/abs/1905.01051. Accessed on: Jul. 09, 2022.
- [28] O. E. Elejla, B. Belaton, M. Anbar, and B. O. Alijla, “IPv6 OS fingerprinting methods: Review,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10645 LNCS, Springer, Cham, Nov. 2017, pp. 661–668. https://doi.org/10.1007/978-3-319-70010-6_61
- [29] N. Takei, T. Saito, K. Takasu, and T. Yamada, “Web browser fingerprinting using only cascading style sheets,” in Proceedings – 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2015, Krakow, Poland, Nov. 2015, pp. 57–63. https://doi.org/10.1109/BWCCA.2015.105
- [30] K. Mowery and H. Shacham, “Pixel perfect: Fingerprinting canvas in HTML5,” Web 2.0 Security & Privacy 20 (W2SP), pp. 1–12, 2012. [Online]. Available: http://www.joelonsoftware.com/items/
- [31] D. Jang, R. Jhala, S. Lerner, and H. Shacham, “An empirical study of privacy-violating information flows in JavaScript web applications,” in Proceedings of the ACM Conference on Computer and Communications Security, 2010, pp. 270–283. https://doi.org/10.1145/1866307.1866339
- [32] J. Parra-Arnau, D. Rebollo-Monedero, and J. Forné, “Measuring the privacy of user profiles in personalized information systems,” Future Generation Computer Systems, vol. 33, pp. 53–63, Apr. 2014. https://doi.org/10.1016/j.future.2013.01.001
- [33] L. Sweeney, “Discrimination in online Ad Delivery,” SSRN Electronic Journal, Jan. 2013, pp. 1–36. https://doi.org/10.2139/ssrn.2208240
- [34] B. Kitts, N. McCoy, and M. van den Berg, “The future of online advertising: Thoughts on emerging issues in privacy, information bubbles, and disinformation,” in 2019 IEEE International Symposium on Technology and Society (ISTAS), vol. 2017, Medford, MA, USA, Nov. 2019, pp. 1–11. https://doi.org/10.1109/ISTAS48451.2019.8937870
- [35] E. Mills, “Device identification in online banking is privacy threat, expert says,” 2009. [Online]. Available: https://www.cnet.com/news/device-identification-in-online-banking-is-privacy-threat-expert-says. Accessed on: Jul. 09, 2022.
- [36] L. V. Balakhonskaya, D. P. Gavra, I. V. Beresneva, and K. K. Sadirova, “Markers of manipulation in the electoral communication in a digital environment,” in Proceedings of the 2020 IEEE Communication Strategies in Digital Society Seminar, ComSDS 2020, St. Petersburg, Russia, 2020, pp. 91–98. https://doi.org/10.1109/ComSDS49898.2020.9101306
- [37] J. R. Mayer, ““Any person... a pamphleteer”. Internet anonymity in the age of Web 2.0,” 2009. [Online]. Available: https://jonathanmayer.org/papers_data/thesis09.pdf
- [38] P. Eckersley, “How unique is your web browser?” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6205 LNCS, Springer, Berlin, Heidelberg, 2010, pp. 1–18. https://doi.org/10.1007/978-3-642-14527-8_1
- [39] C. E. Shannon, “A mathematical theory of communication,” Bell System Technical Journal, vol. 27, no. 4, pp. 623–656, Oct. 1948. https://doi.org/10.1002/j.1538-7305.1948.tb00917.x
- [40] E. Antonio, A. Fajardo, and R. Medina, “Tracking browser fingerprint using rule based algorithm,” in Proceedings – 2020 16th IEEE International Colloquium on Signal Processing and its Applications, CSPA 2020, Langkawi, Malaysia, Feb. 2020, pp. 225–229. https://doi.org/10.1109/CSPA48992.2020.9068729
- [41] T. D. Laksono, Y. Rosmansyah, B. Dabarsyah, and J. U. Choi, “JavaScript-based device fingerprinting mitigation using personal HTTP proxy,” in 2015 International Conference on Information Technology Systems and Innovation (ICITSI), Bandung, Indonesia, Mar. 2016, pp. 1–6. https://doi.org/10.1109/ICITSI.2015.7437697
- [42] T. Fosmark, “Adobe Flash end of support on December 31, 2020,” 2020. [Online]. Available: https://docs.microsoft.com/enus/lifecycle/announcements/adobe-flash-end-of-support./ Accessed on: Jul. 09, 2022.
- [43] K. Boda, Á. M. Földes, G. G. Gulyás, and S. Imre, “User tracking on the Web via cross-browser fingerprinting,” in LNCS, vol. 7161, Springer, Berlin, Heidelberg, 2012, pp. 31–46. https://doi.org/10.1007/978-3-642-29615-4_4
- [44] C. Kolbitsch, B. Livshits, B. Zorn, and C. Seifert, “Rozzle: De-cloaking Internet malware,” in Proceedings – IEEE Symposium on Security and Privacy, San Francisco, CA, May 2012, pp. 443–457. https://doi.org/10.1109/SP.2012.48
- [45] S. Baviskar and P. S. Thilagam, “Protection of Web user’s privacy by securing browser from Web privacy attacks,” International Journal of Computer Technology and Applications, vol. 2, no. 4, pp. 1051–1057, 2011. [Online]. Available: https://www.researchgate.net/publication/267410556
- [46] M. Vaites, “The effectiveness of a browser fingerprint as a tool for tracking,” M.S. thesis, Open University, UK, 2013.
- [47] M. Perry, E. Clark, S. Murdoch, and G. Koppen, “The design and implementation of the Tor browser [DRAFT],” 2018. [Online]. Available: http://www.torproject.org/projects/torbrowser/design/
- [48] N. Kaur, S. Azam, K. Kannoorpatti, K. C. Yeo, and B. Shanmugam, “Browser fingerprinting as user tracking technology,” in Proceedings of 2017 11th International Conference on Intelligent Systems and Control, ISCO 2017, Coimbatore, India, Jan. 2017, pp. 103–111. https://doi.org/10.1109/ISCO.2017.7855963
- [49] I. Hickson and D. Hyatt, Eds., “A vocabulary and associated APIs for HTML and XHTML,” 2008. [Online]. Available: https://www.w3.org/TR/2008/WD-html5-20080122/. Accessed on: Jul. 09, 2022.
- [50] A. Elbanna and N. Abdelbaki, “Browsers fingerprinting motives, methods, and countermeasures,” in CITS 2018 – 2018 International Conference on Computer, Information and Telecommunication Systems, Alsace, Colmar, Jul. 2018, pp. 1–5. https://doi.org/10.1109/CITS.2018.8440163
- [51] G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan, and C. Diaz, “The Web never forgets: Persistent tracking mechanisms in the wild categories and subject descriptors,” in Proceedings of the ACM Conference on Computer and Communications Security, Nov. 2014, pp. 674–689. https://doi.org/10.1145/2660267.2660347
- [52] M. Ayenson, D. J. Wambach, A. Soltani, N. Good, and C. J. Hoofnagle, “Flash cookies and privacy II: Now with HTML5 and ETag respawning,” SSRN Electronic Journal, Jul. 2011, pp. 1–21. https://doi.org/10.2139/ssrn.1898390
- [53] M. Schwarz, F. Lackner, and D. Gruss, “JavaScript template attacks: Automatically inferring host information for targeted exploits,” in Proceedings 2019 Network and Distributed System Security Symposium, San Diego, CA, USA, Feb. 2019. https://doi.org/10.14722/ndss.2019.23155
- [54] European Parliament, “General data protection regulation,” May 25, 2018. [Online]. Available: https://gdpr-info.eu/. Accessed on: Jul. 09, 2022.
- [55] J. Porter, “Google fined €50 million for GDPR violation in France,” 2019. [Online]. Available: https://www.theverge.com/2019/1/21/18191591/google-gdpr-fine-50-million-euros-data-consent-cnil. Accessed on: Jul. 09, 2022.
- [56] E. Price, “France fines Google $57 million for GDPR violations,” 2019. [Online]. Available: http://fortune.com/2019/01/21/france-fines-google-57-million-for-gdpr-violations/. Accessed on: Jul. 09, 2022.
- [57] C. Page, “Oracle and salesforce hit with $10 billion GDPR class-action lawsuit,” 2020. [Online]. Available: https://www.forbes.com/sites/carlypage/2020/08/14/oracle-andsalesforce-hit-with-10-billion-gdpr-class-action-lawsuit. Accessed on: Jul. 09, 2022.
- [58] T. Sakamoto and M. Matsunaga, “After GDPR, still tracking or not? Understanding opt-out states for online behavioral advertising,” in 2019 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, May 2019, pp. 92–99. https://doi.org/10.1109/SPW.2019.00027
- [59] P. Laperdrix, W. Rudametkin, and B. Baudry, “Beauty and the beast: Diverting modern Web browsers to build unique browser fingerprints,” in Proceedings – 2016 IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 2016, pp. 878–894. https://doi.org/10.1109/SP.2016.57
- [60] R. Brandom, “Google, Microsoft, and Amazon are paying to get around Adblock Plus,” 2015. [Online]. Available: https://www.theverge.com/2015/2/2/7963577/google-ads-get-through-adblock. Accessed on: Jul. 09, 2022.
- [61] A. Henry, “Ad-Blocker ghostery actually helps advertisers, if you ‘support’ it,” 2013. [Online]. Available: https://lifehacker.com/ad-blocking-extension-ghostery-actually-sells-data-to-a-514417864. Accessed on: Jul. 09, 2022.
- [62] N. Lomas, “U.K. carrier EE looking at giving users control over mobile ads,” 2015. [Online]. Available: http://techcrunch.com/2015/11/23/u-k-carrier-ee-looking-at-giving-users-control-over-mobile-ads. Accessed on: Jul. 09, 2022.
- [63] N. Lomas, “Shine signs first European carriers to its network-level ad blocking tech,” 2016. [Online]. Available: https://techcrunch.com/2016/02/18/shine-bags-first-european-carrier-as-three-uk-deploys-network-level-ad-blocking/?guccounter=1. Accessed on: Jul. 09, 2022.
- [64] “Brave Browser.” [Online]. Available: https://brave.com/. Accessed on: Jul. 09, 2022.
- [65] Brave, “Brave launches the first advertising platform built on privacy,” 2019. [Online]. Available: https://brave.com/brave-ads-launch/. Accessed on: Jul. 09, 2022.
- [66] European Parliament, “What should I do if I think that my personal data protection rights haven’t been respected?” 2018. [Online]. Available: https://ec.europa.eu/info/law/law-topic/data-protection/reform/rights-citizens/redress/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en. Accessed on: Jul. 09, 2022.