Purra, 2015 - Google Patents
Swedes Online: You Are More Tracked Than You ThinkPurra, 2015
View PDF- Document ID
- 12870110076879319611
- Author
- Purra J
- Publication year
External Links
Snippet
When you are browsing websites, third-party resources record your online habits; such tracking can be considered an invasion of privacy. It was previously unknown how many third-party resources, trackers and tracker companies are present in the different classes of …
- 235000011297 Brassica napobrassica 0 title description 37
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30873—Retrieval from the Internet, e.g. browsers by navigation, e.g. using categorized browsing, portals, synchronized browsing, visual networks of documents, virtual worlds or tours
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30899—Browsing optimisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30876—Retrieval from the Internet, e.g. browsers by using information identifiers, e.g. encoding URL in specific indicia, browsing history
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/22—Tracking the activity of the user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Vallina et al. | Tales from the porn: A comprehensive privacy analysis of the web porn ecosystem | |
Bujlow et al. | A survey on web tracking: Mechanisms, implications, and defenses | |
EP4062343B1 (en) | User consent framework | |
Bujlow et al. | Web tracking: Mechanisms, implications, and defenses | |
Chaabane et al. | A closer look at third-party osn applications: are they leaking your personal information? | |
Fruchter et al. | Variations in tracking in relation to geographic location | |
Englehardt | Automated discovery of privacy violations on the web | |
Wagner | Auditing Corporate Surveillance Systems: Research Methods for Greater Transparency | |
Yoshihama et al. | Web-Based Data Leakage Prevention. | |
Purra | Swedes Online: You Are More Tracked Than You Think | |
Mohsen et al. | An approach to guide users towards less revealing internet browsers | |
Bernardo et al. | Web-based fingerprinting techniques | |
Acar | Online Tracking Technologies and Web Privacy | |
Urban et al. | Analyzing leakage of personal information by malware | |
Vallina | Advanced Methods to Audit Online Web Services | |
Koop | Preventing the Leakage of Privacy Sensitive User Data on the Web | |
Mohsen et al. | Quantifying information exposure by web browsers | |
Chen et al. | Semantics-Aware Cookie Purpose Compliance | |
JP2022536565A (en) | Using crowdsourcing to combat disinformation | |
Benjamin | Securing cyberspace: Analyzing cybercriminal communities through web and text mining perspectives | |
Jokinen | Personal Internet Privacy and Surveillance: Implementation and evasion of user tracking | |
Ragab et al. | Try on, spied on?: Privacy analysis of virtual try-on websites and android apps | |
Nezhadian et al. | Analysis and prediction of web proxies misbehavior | |
Amarasekara et al. | Improving the robustness of the cross-domain tracking process | |
Levy | CDNs and Privacy Threats: A Measurement Study |