[go: up one dir, main page]

Purra, 2015 - Google Patents

Swedes Online: You Are More Tracked Than You Think

Purra, 2015

View PDF
Document ID
12870110076879319611
Author
Purra J
Publication year

External Links

Snippet

When you are browsing websites, third-party resources record your online habits; such tracking can be considered an invasion of privacy. It was previously unknown how many third-party resources, trackers and tracker companies are present in the different classes of …
Continue reading at www.diva-portal.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30873Retrieval from the Internet, e.g. browsers by navigation, e.g. using categorized browsing, portals, synchronized browsing, visual networks of documents, virtual worlds or tours
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30899Browsing optimisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30876Retrieval from the Internet, e.g. browsers by using information identifiers, e.g. encoding URL in specific indicia, browsing history
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/22Tracking the activity of the user
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/44Arrangements for executing specific programmes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic

Similar Documents

Publication Publication Date Title
Vallina et al. Tales from the porn: A comprehensive privacy analysis of the web porn ecosystem
Bujlow et al. A survey on web tracking: Mechanisms, implications, and defenses
EP4062343B1 (en) User consent framework
Bujlow et al. Web tracking: Mechanisms, implications, and defenses
Chaabane et al. A closer look at third-party osn applications: are they leaking your personal information?
Fruchter et al. Variations in tracking in relation to geographic location
Englehardt Automated discovery of privacy violations on the web
Wagner Auditing Corporate Surveillance Systems: Research Methods for Greater Transparency
Yoshihama et al. Web-Based Data Leakage Prevention.
Purra Swedes Online: You Are More Tracked Than You Think
Mohsen et al. An approach to guide users towards less revealing internet browsers
Bernardo et al. Web-based fingerprinting techniques
Acar Online Tracking Technologies and Web Privacy
Urban et al. Analyzing leakage of personal information by malware
Vallina Advanced Methods to Audit Online Web Services
Koop Preventing the Leakage of Privacy Sensitive User Data on the Web
Mohsen et al. Quantifying information exposure by web browsers
Chen et al. Semantics-Aware Cookie Purpose Compliance
JP2022536565A (en) Using crowdsourcing to combat disinformation
Benjamin Securing cyberspace: Analyzing cybercriminal communities through web and text mining perspectives
Jokinen Personal Internet Privacy and Surveillance: Implementation and evasion of user tracking
Ragab et al. Try on, spied on?: Privacy analysis of virtual try-on websites and android apps
Nezhadian et al. Analysis and prediction of web proxies misbehavior
Amarasekara et al. Improving the robustness of the cross-domain tracking process
Levy CDNs and Privacy Threats: A Measurement Study