scholarly journals Surfing In Sound: Sonification of Hidden Web Tracking

Author(s):  
Otto Hans-Martin Lutz ◽  
Jacob Leon Kröger ◽  
Manuel Schneiderbauer ◽  
Manfred Hauswirth

Web tracking is found on 90% of common websites. It allows online behavioral analysis which can reveal insights to sensitive personal data of an individual. Most users are not aware of the amount of web tracking happening in the background. This paper contributes a sonification-based approach to raise user awareness by conveying information on web tracking through sound while the user is browsing the web. We present a framework for live web tracking analysis, conversion to Open Sound Control events and sonification. The amount of web tracking is disclosed by sound each time data is exchanged with a web tracking host. When a connection to one of the most prevalent tracking companies is established, this is additionally indicated by a voice whispering the company name. Compared to existing approaches on web tracking sonification, we add the capability to monitor any network connection, including all browsers, applications and devices. An initial user study with 12 participants showed empirical support for our main hypothesis: exposure to our sonification significantly raises web tracking awareness.

2021 ◽  
Vol 2021 (2) ◽  
pp. 88-110
Author(s):  
Duc Bui ◽  
Kang G. Shin ◽  
Jong-Min Choi ◽  
Junbum Shin

Abstract Privacy policies are documents required by law and regulations that notify users of the collection, use, and sharing of their personal information on services or applications. While the extraction of personal data objects and their usage thereon is one of the fundamental steps in their automated analysis, it remains challenging due to the complex policy statements written in legal (vague) language. Prior work is limited by small/generated datasets and manually created rules. We formulate the extraction of fine-grained personal data phrases and the corresponding data collection or sharing practices as a sequence-labeling problem that can be solved by an entity-recognition model. We create a large dataset with 4.1k sentences (97k tokens) and 2.6k annotated fine-grained data practices from 30 real-world privacy policies to train and evaluate neural networks. We present a fully automated system, called PI-Extract, which accurately extracts privacy practices by a neural model and outperforms, by a large margin, strong rule-based baselines. We conduct a user study on the effects of data practice annotation which highlights and describes the data practices extracted by PI-Extract to help users better understand privacy-policy documents. Our experimental evaluation results show that the annotation significantly improves the users’ reading comprehension of policy texts, as indicated by a 26.6% increase in the average total reading score.


2021 ◽  
Author(s):  
Peter Mechant ◽  
Ralf De Wolf ◽  
Mathias Van Compernolle ◽  
Glen Joris ◽  
Tom Evens ◽  
...  
Keyword(s):  

Compiler ◽  
2013 ◽  
Vol 2 (2) ◽  
Author(s):  
Saryanto Saryanto ◽  
Sumarsono Sumarsono ◽  
Nurcahyani Dewi Retnowati

Data communication in the internet today is so complex as an example of the speed factor becomes very important in communicating, everyone wants fast data communication services provided in order to maximum. In relation to the application as a communication liaison with client server applications, web service using a data serialization format to transmit the data. Before the data is sent, either fromthe client to the server or vice versa, should be modified in a specific data format beforehand according to the web service is used. Types of data serialization format used in the web service such as XML and JSON. The method used for testing include data serialization method, data measurement method and data parsing method. Data serialization method is used to calculate the time serialization of data from the database to the form of XML and JSON in applications with PHP platform. Data measurement method used to measure the size of the XML and JSON data which based on many fields of data serialization process. Data parsing method is used to calculate the processing time and JSON parsing XML data. Results o f comparative analysis o f XML and JSON in PHP applications using thearchitecture Rest can be concluded that the test result o f the difference in time and time serialization and JSON parsing XML data is influenced by the number o f records, if the number of records the greater the difference in eating time data serialization and parsing the data the greater the time also itcan be concluded that the faster the process JSON serialization and parsing XML data is compared. Testing results o f the JSON data size is smaller than the size of XML. Data exchange using XML format has a size limit of up to 31456.31 KB while JSON XML exceeds the size limit. Testing results on the Internet when the number o f records up to 50,000 data when the data serialization and parsing time data can not be detected in the database.


10.28945/3216 ◽  
2008 ◽  
Author(s):  
Tanja Krunic ◽  
Ljiljana Ruzic-Dimitrijevic

The idea of the paper is to investigate how much the online user privacy is respected by website owners, and how online privacy can be improved. We first focus ourselves on issues like possibilities of misusing personal data, data collecting and user-tracking. Then we give a short report about legislation in the EU concerning user privacy. Some facts about user confidence are given as well. They are follows by a brief list of hints for the users to protect their personal data when surfing the Web. Then we give an overview of actions website owners should take in order to support user privacy. Finally, we present the results of our investigation of the condition of user privacy in practice, and give some suggestions on its improvement.


Author(s):  
Manuel Álvarez Díaz ◽  
Víctor Manuel Prieto Álvarez ◽  
Fidel Cacheda Seijo
Keyword(s):  

This paper presents an analysis of the most important features of the Web and its evolution and implications on the tools that traverse it to index its content to be searched later. It is important to remark that some of these features of the Web make a quite large subset to remain “hidden”. The analysis of the Web focuses on a snapshot of the Global Web for six different years: 2009 to 2014. The results for each year are analyzed independently and together to facilitate the analysis of both the features at any given time and the changes between the different analyzed years. The objective of the analysis are twofold: to characterize the Web and more importantly, its evolution along the time.


Author(s):  
Tomi Heimonen

One of the challenges with designing effective mobile search interfaces is how to present and explore the search results. Category-based result organization and presentation techniques have been suggested in literature as a complement to the traditional ranked result list. In the mobile context categories can facilitate information access by providing an overview of the result set, by reducing the need for keyword entry and by providing means to filter the results. This chapter includes a review of recent research on category-based interfaces for mobile search. The chapter also addresses the challenges of evaluating mobile search in situ and presents a longitudinal user study that investigated how a mobile clustering interface is used to search the Web. Results from the study show that category-based interaction can be situationally useful, for example when users have problems describing their information need or wish to retrieve a subset of results. In summary, the chapter proposes future research directions for category-based mobile search interfaces.


Author(s):  
Stephen Andrew Roberts ◽  
Bruce Laurie

Public, organizational and personal data has never been so much in the forefront of discussion and attention as at the present time. The term ‘Big Data' (BD) has become part of public discourse, in the press, broadcast media and on the web. Most people in the wider public have very little idea of what it is and what it means but anyone who gives it a thought will see it as contemporary and relevant to life as much as to business. This paper is directed towards the perspectives of people working in, managing and developing organizations which are dedicated to fulfilling their respective purposes. All organizations need to understand their strategic purpose and to develop strategies and tactical responses accordingly. The organizations' purpose and the frameworks and resources adopted are part of its quest for achievement which creates value and worth. BD is a potential and actual source of value.


Author(s):  
Béatrice Bouchou ◽  
Denio Duarte ◽  
Mírian Halfeld Ferrari ◽  
Martin A. Musicante

The XML Messaging Protocol, a part of the Web service protocol stack, is responsible for encoding messages in a common XML format (or type), so that they can be understood at either end of a network connection. The evolution of an XML type may be required in order to reflect new communication needs, materialized by slightly different XML messages. For instance, due to a service evolution, it might be interesting to extend a type in order to allow the reception of more information, when it is available, instead of always disregarding it. The authors’ proposal consists in a conservative XML schema evolution. The framework is as follows: administrators enter updates performed on a valid XML document in order to specify new documents expected to be valid, and the system computes new types accepting both such documents and previously valid ones. Changing the type is mainly changing regular expressions that define element content models. They present the algorithm that implements this approach, its properties and experimental results.


Author(s):  
Peter O’Connor

The Web provides unprecedented opportunities for Web site operators to implicitly and explicitly gather highly detailed personal data about site visitors, resulting in a real and pressing threat to privacy. Approaches to protecting such personal data differ greatly throughout the world. To generalize greatly, most countries follow one of two diametrically opposed philosophies—the self-regulation approach epitomized by the United States, or the comprehensive omnibus legislative approach mandated by the European Union. In practice, of course, the situation is not so black and white as most countries utilize elements of both approaches. This chapter explains the background and importance of protecting the privacy of personal data, contrasts the two major philosophical approaches to protection mentioned above, performs a comparative analysis of the current situation throughout the world, and highlights how the legislative approach is being adopted as the de facto standard throughout the world. The use of trust marks as an alternative to the self-regulation or legislative approach is also discussed, while the effectiveness of each of these efforts is also examined.


Sign in / Sign up

Export Citation Format

Share Document