Cross-device tracking

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search

Cross-device tracking refers to technology which enables the tracking of users across multiple devices such as smartphones, television sets, smart TVs, and personal computers.[1]

More specifically, cross-device tracking is a technique in which technology companies and advertisers deploy trackers, often in the form of unique identifiers, cookies, or even ultrasonic signals, to generate a profile of users across multiple devices, not simply one.[2] For example, one such form of this tracking uses audio beacons, or inaudible sounds, emitted by one device and recognized through the microphone of the other device.[2]

This form of tracking is utilized primarily by technology companies and advertisers who use this information to piece together a cohesive profile of the user.[2] These profiles inform and predict the type of advertisements the user receives.[2]

Background[edit]

There are many ways in which online tracking has manifested itself. Historically, when companies wanted to track users’ online behavior, they simply had users sign in to their website.[3] This is a form of deterministic cross-device tracking, in which the user’s devices are associated with their account credentials, such as their email or username.[4] Consequently, while the user is logged in, the company can keep a running history of what sites the user has been to and which ads the user interacted with between computers and mobile devices.[4]

Eventually, cookies were deployed by advertisers, providing each user with a unique identifier in his or her browser so that the user’s preferences can be monitored.[5] This unique identifier informs the placement of relevant, targeted ads the user may receive.[5] Cookies were also used by companies to improve the user experience, enabling users to pick up where they left off on websites.[6] However, as users began utilizing multiple devices––up to around five––advertisers became confused as to how to track, manage, and consolidate this data across multiple devices as the cookie-based model suggested that each device––whether a phone, computer, or tablet––was a different person.[5]

Other technologies such as supercookies, which stay on computers long after the user deletes his or her cookies, and web beacons, which are unique images from a URL, are also used by trackers and advertisers to gain increased insight into users’ behavior.[5] However, advertisers were still limited in that only one device was able to be tracked and associated with a user.[5]

Thus, cross-device tracking initially emerged as a means of generating a profile of users across multiple devices, not simply one.

One such tactic for cross-device tracking is called browser fingerprinting, and occurs when browsers, which are modifiable to the users’ tastes, produce a unique signal that companies or advertisers can use to single out the user.[5] Browser fingerprinting has been a cause for concern because of its effectiveness and also since it does not allow for users to opt-out of the tracking.[5]

Another tactic used by Google is called AdID and works on smartphones in tandem with cookies on a user’s computer to track behavior across devices.[3]

Now, cross-device tracking has evolved into a new, radical form of surveillance technology which enables users to be tracked across multiple devices, including smartphones, TVs, and personal computers through the use of audio beacons, or inaudible sound, emitted by one device and recognized through the microphone of the other device, usually a smartphone.[7] In addition, cross-device tracking may presage the future of the Internet of Things (IoT), in which all types of devices––such as offices, cars, and homes––are seamlessly interconnected via the internet.[3]

Ultrasonic tracking[edit]

Humans interpret sound by picking up on different frequencies.[8] Given the variety of sound waves that exist, humans can only hear frequencies that are within a certain range––generally from 20Hz to 20kHz. Interestingly, by the age of 30, most humans cannot hear sounds above 18kHz.[8]

Ultrasound, which is shorter wavelengths greater than or equal to 20kHz, enables the rapid transmission of data necessary for cross-device tracking to occur.[8]

Another integral component of cross-device tracking is the usage of audio beacons. Audio beacons are beacons that are embedded into ultrasound, so they cannot be heard by humans.[8] These audio beacons are used to surreptitiously track a user’s location and monitor online behavior by connecting with the microphone on another device without the user’s awareness.[8]

In October 2015, the Center for Democracy and Technology submitted comments to the Federal Trade Commission (FTC) regarding cross-device tracking technology, specifically mentioning SilverPush.[9][10]

Audio "beacons" can be embedded into television advertisements. In a similar manner to radio beacons, these can be picked up by mobile apps.[11] This allows the behavior of users to be tracked, including which ads were seen by the user and how long they watched an ad before changing the channel.[12]

In March 2016, the FTC issued warning letters to 12 app developers using cross-device tracking in their apps.[13] The FTC warned these developers that they may be violating the FTC Act if they state or imply that their apps are not tracking television viewing habits when they in fact are.

Applications[edit]

Studies have shown that 234 Android applications are eavesdropping on these ultrasonic channels without the user’s awareness.[14]

Applications such as Silverpush, Shopkick, and Lisnr are part of an “ultrasonic side-channel” in which the app, often unbeknownst to the user, intercepts ultrasonic signals emitted from the user’s environment, such as from a TV, to track which advertisements the user has heard and how long the person listened to them[14].

  • Silverpush­­––the leading company utilizing this technology––patented software enabling them to track TV ads based on audio stream above[14]
  • Shopkick, another popular application, gives discounts to users who shop at stores which emit these ultrasonic beacons, allowing them to create a profile of the user[14]
  • Lisnr utilizes a user’s location data in tandem with ultrasonic beacons to give users coupons related to their activities[14]

Another study suggested that Apple, Google, and Bluetooth Special Interest groups need to do more to prevent cross-device tracking.[15]

Privacy and surveillance concerns[edit]

Ultrasonic tracking[edit]

Cross-device tracking has privacy implications and allows for more detailed tracking of users than traditional tracking methods. Data can be collected from multiple devices used by a single user and correlated to form a more accurate picture of the person being tracked.[12] Moreover, malicious actors may use variants of the technology to deanonymize anonymity network users.[16]

Ultrasonic tracking technologies can pose massive threats to users’ privacy. There are four primary privacy concerns associated with this new form of tracking:

  • The first is media tracking: audio from the user’s television may be detected by the microphone in the user’s mobile device, allowing malicious actors to gain access to what the user is watching––particularly if it is salacious.[17] Advertisers can similarly gain insight into what a user typically watches.[17] In both scenarios, a user’s real-world behavior is linked to their online identity and used for tracking.[17]
  • Another form of tracking permitted by ultrasonic tracking is cross-device tracking, which enables a user’s profile to be connected across multiple devices based on proximity.[17] This form of tracking, in linking different devices, can help advertisers show more targeted ads or open individuals to attacks by malicious actors.[17]
  • Location tracking is yet another privacy concern.[17] Indeed, ultrasonic signals can convey location information via a location identifier, often placed in stores or businesses.[17]
  • Lastly, this new ultrasonic tracking poses a threat to users of Bitcoin and Tor because it deanonymizes users’ information, since ultrasonic signals associate the user’s mobile phone with the Bitcoin or Tor account.[17]

Panoptic surveillance and the commodification of users' digital identity[edit]

From cookies to ultrasonic trackers, some argue that invasive forms of surveillance underscore how users are trapped in a digital panopticon, similar to the concept envisioned by Jeremy Bentham: a prison in which the prisoners were able to be seen at all times by guards but were unable to detect when, or even if, they were being watched at all, creating a sense of paranoia that drove prisoners to carefully police their own behavior.[18] Similarly, scholars have drawn parallels between Bentham’s panopticon and today’s pervasive use of internet tracking in that individuals lack awareness to the vast disparities of power that exist between themselves and the corporation to which they willingly give their data.[18] In essence, companies are able to gain access to consumers’ activity when they use a company’s services.[18] The usage of these services often is beneficial, which is why users agree to exchange personal information.[18] However, since users participate in this unequal environment, in which corporations hold most of the power and in which the user is obliged to accept the bad faith offers made by the corporations, users are operating in an environment that ultimately controls, shapes and molds them to think and behave in a certain way, depriving them of privacy.[18]

In direct response to the panoptic and invasive forms of tracking manifesting themselves within the digital realm, some have turned to sousveillance: a form of inverse surveillance in which users can record those who are surveilling them, thereby empowering themselves.[19] This form of counter surveillance, often used through small wearable recording devices, enables the subversion of corporate and government panoptic surveillance by holding those in power accountable and giving people a voice––a permanent video record––to push back against government abuses of power or malicious behavior that may go unchecked.[19]

The television, along with the remote control, is also argued to be conditioning humans into habitually repeating that which they enjoy without experiencing genuine surprise or even discomfort, a critique of the television similar to that of those made against information silos on social media sites today.[20] In essence, this technological development led to egocasting: a world in which people exert extreme amounts of control over what they watch and hear.[20] As a result, users deliberately avoid content they disagree with in any form––ideas, sounds, or images.[20] In turn, this siloing can drive political polarization and stoke tribalism.[20] Plus, companies like TiVO analyze how TV show watchers use their remote and DVR capability to skip over programming, such as advertisements––a privacy concern users may lack awareness of as well.[20]

Some scholars have even contended that in an age of increased surveillance, users now participate online through the active generation and curation of online images––a form of control.[17] In so doing, users can be seen as rejecting the shame associated with their private lives.[17] Other scholars note that surveillance is fundamentally dependent upon location in both physical and virtual environments.[21] This form of surveillance can be seen in travel websites which enable the user to share their vacation to a virtual audience.[21] The person’s willingness to share their personal information online is validated by the audience, since the audience holds the user accountable and the user vicariously experiences pleasure through the audience.[21] Further, users' mobile data is increasingly being shared to third parties online, potentially underscoring the regulatory challenges inherent in protecting users' online privacy.[22]

In addition, scholars argue that users have the right to know the value of their personal data.[23] Increasingly, users’ digital identity is becoming commodified through the selling and monetizing of their personal data for profit by large companies.[23] Unfortunately, many people appear to be unaware of the fact that their data holds monetary value that can potentially be used towards other products and services.[23] Thus, scholars are arguing for users’ to have increased awareness and transparency into this process so that users can become empowered and informed consumers of data.[23]

Surveillance capitalism[edit]

The increased usage of cross-device tracking by advertisers is indicative of the rise of a new era of data extraction and analysis as a form of profit, or surveillance capitalism, a term coined by Shoshana Zuboff.[24] This form of capitalism seeks to commodify private human experience to create behavioral futures markets, in which behavior is predicted and behavioral data is harvested from the user.[24] Zuboff suggests that this new era of surveillance capitalism eclipses Bentham's panopticon, becoming far more encroaching and invasive as, unlike a prison, there is no escape, and the thoughts, feelings, and actions of users are immediately extracted to be commodified and resold.[24] Thus, since cross-device tracking seeks to create a profile of a user across multiple devices, big tech companies, such as Google, could use this behavioral data to make predictions about the user’s future behavior without the user’s awareness.[24]

Scholars are beginning to discuss the possibility of quantifying the monetary value of users’ personal data. Notably, the algorithms used to extract and mine user data are increasingly seen as business assets and thus protected via trade secrets.[23] Indeed, the usage of free online services, such as public Wi-Fi, often comes at the unknown cost to the user of being tracked and profiled by the company providing the service.[23] In essence, a transaction is occurring: users’ personal data is being exchanged for access to a free service.[23] Increasingly, scholars are advocating for users’ right to understand the fundamental value of their personal data more intimately so as to be more savvy, informed consumers who have the ability to protect the privacy of their online information and not be manipulated into unwittingly giving away personal information.[23]

Health and wellness applications[edit]

In addition, health and wellness applications also have a dearth of privacy protections as well: a study found that many health apps lacked encryption and that regulators should enforce stronger data privacy protections.[25] The study stated that of the 79 apps they tested, none of the applications locally encrypted the users’ personal information and 89% of the applications pushed the data online.[25] The lack of adequate privacy and security measures surrounding users’ personal medical data on mobile applications underscores the lessening degree to which users can trust mobile app developers to safeguard their personal information online.[25] While mobile application developers continue to confront privacy and security concerns, users are increasingly looking to ways to visualize their data through wearable devices and applications that track their workout and exercise routines.[26] Indeed, researchers discovered that these self-tracking devices play a role as a tool, a toy, and a tutor in users’ lives.[27] In the tool role, the self-tracking device functions as a mechanism to help the user in some capacity, often to achieve personal health goals.[27] The toy role underscores how some self-tracking users see it as a fun game, particularly with regard to rewards and viewing the visualized data.[27] Lastly, the tutor role reflects how users gain insights from and motivation about their activity from the apps themselves.[27] Other scholars have characterized self-tracking as performing for the system, or controlling what is (or isn’t) recorded, performing for the self, tracking themselves to gain insight into their behavior, and performing for other people, or the importance of how other people viewed the person being tracked, as well as the control the person being tracked had over their data and thus how they are perceived.[28]

Cookies, flash cookies, and web beacons[edit]

Additionally, privacy concerns surround cookies, flash cookies, and web beacons on websites today.[28] Ultimately, five main concerns surround the usage of cookies, flash cookies, and web beacons, according to a study:[29]

  • Firstly, the authors note that users lack anonymity online, with cookies utilizing unique identifiers and flash cookies enabling recognition of website visits[29]
  • Another concern the authors note is unintended uses of cookies, since cookies were initially designed to benefit the user’s experience and engagement online, but have since morphed into a business run by advertisers in which personal data is sold for profit[29]
  • Users are likely unaware of how their personal information is being used, reflecting the surreptitious nature of data collection[29]
  • Some cookies trespass into the web users’ own resources and are downloaded to the user’s computer often without the user’s awareness[29]
  • Lastly, the authors note that the threat of cookie sharing underscores how web users’ personal information can become combined with other data from websites and even a social security number to create a more cohesive picture of the user[29]

Data capitalism[edit]

Other scholars have defined a similarly extractive and destructive phenomenon called data capitalism.[30] Data capitalism is an economic system enabling the redistribution of power towards those who have access to the information––namely, big corporations.[30] There are three fundamental theories of how large companies engage users in virtual communities, reflecting the power of data capitalism on users today:

  • The free and open network: in making products free, large companies make their products more accessible to a larger audience from which they can extract valuable data in exchange.[30]
  • The connection between people and machines: data capitalism promotes a connection between people and machines which is derived from the user’s relationship to the technology itself.[30] Increasingly, tracking and surveillance technology is profiling users and learning their preferences, users become more comfortable with their devices and a self-fulfilling prophecy continues.[30]
  • The value placed on data: new information asymmetries are proliferating that exacerbate inequality of information and allow only the most powerful access to most people’s data.[30] Increasingly, a scholar suggests that the lack of transparency over users’ data reflects the tension between privacy and community online.[30]

Solutions[edit]

Scholars are convinced the current notice-and-consent model for privacy policies is fundamentally flawed because it assumes users intuitively understand all of the facts in a privacy policy, which is often not the case.[31] Instead, scholars emphasize the imperative role of creating a culture in which privacy becomes a social norm.[31] In effect, users of online technologies should identify the social activities they use on the internet and start questioning websites' governing norms as a natural outgrowth of their web browsing.[31] In effect, these norms need to prevent websites from collecting and sharing users' personal information.[31] In addition, starting with a user's personal values and seeing how these values correlate with online norms may be another way to assess whether or not privacy norms are being violated in odd cases.[31] Ultimately, scholars believe these privacy norms are vital to protecting both individuals and social institutions.[31]

Legal and ethical issues[edit]

While the United States lacks extensive privacy rights, the Fourth Amendment provides some privacy protections.[32] The Fourth Amendment states that “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,” suggesting that while individuals are protected from all levels of the government, they are not legally protected from private companies or individuals with malicious intent.[32]

There are large implications for this technology within the legal field. Legally, The Federal Trade Commission has a responsibility to prevent deceptive practices by technology companies, such as those that could lead to consumer injury.[33] The FTC has made efforts to prevent invasive web tracking, tracking in physical space, malware, insecure and poorly designed services, and the use of deception to engage in surveillance.[33] For instance, in the realm of invasive web tracking, the FTC has brought lawsuits against companies who engage in ‘history sniffing’––a technique that enables companies to ascertain which links a user clicked on based on the color of the link.[33] Concerning tracking in physical space, the FTC has also cracked down on Nomi, a company that scans the MAC addresses of customers’ phones in stores.[33] MAC addresses function as a unique identifier, enabling the connection to wireless networks.[33] In the case of malware, the FTC has placed pressure on companies such as CyberSpy, a self-proclaimed email attachment company that claimed to secretly record users’ key presses.[33] The FTC has also cracked down on companies like Compete, a browser toolbar, because it decrypted users’ personal information on the internet, putting users at risk.[33] Lastly, in cases during which deception is used to engage in surveillance, the FTC has investigated private investigators, who surveil individuals on another person’s behalf.[33] In addition, audio beacon technology, used by an application called Silverpush, could violate the FTC’s policies because users were not made aware as to when the ultrasonic signals were being recorded.[33]

Another scholar believes that the convergence between lived experience and online technology is creating a term called Mixed Reality, in which people and things are replaced with virtual experiences.[34] Mixed Reality technologies can pose legal challenges in that laws which govern the online world will also extend to the real world.[34] In addition, data tagging––often through GPS, location-based services, or even near-field communication (NFC)––is the new technology at the heart of mixed reality, since people’s data is determined in part by their location.[34] Near-field communication enables devices to transmit data to each other with a certain range.[34] Virtual reality can become a privacy issue because it attempts to immerse users into the virtual environment by recording a user's every sensation.[34] In turn, mixed reality’s amalgamation with daily tasks suggest that it will be implicated in numerous legal issues ranging from copyright law to intellectual property law.[34] Customers are also being denied a voice in contracts, since only corporations set the rules by which individuals’ private information is mined and extracted.[34] The solution to these issues, according to scholars, are opt-in controls to police users’ privacy that enable balance to be restored to the law, particularly as it stands regarding contracts.[34]

Ethically, Zuboff points to the extraction, commodification, and analysis of private human experiences as well as increased surveillance––which is sometimes hidden––in everyday life as violating users' rights to privacy.[35] The usage of surreptitious methods, in which the user is unaware of the extent to which he or she is being tracked, brings tracking mechanisms––such as cookies, flash cookies, and web beacons––into the ethical realm as well since users are not being informed of this tracking perhaps as often as they should.[32]

See also[edit]

References[edit]

  1. ^ Jebara, Tony; Bellovin, Steven M.; Kim, Hyungtae; Li, Jie S.; Zimmeck, Sebastian (2017). "A Privacy Analysis of Cross-device Tracking". undefined. Retrieved 4 April 2019.
  2. ^ a b c d Arp, Daniel. "Privacy Threats through Ultrasonic Side Channels on Mobile Devices". IEEE European Symposium on Security and Privacy: 1–13 – via IEEE Xplore.
  3. ^ a b c Jebara, Tony; Bellovin, Steven M.; Kim, Hyungtae; Li, Jie S.; Zimmeck, Sebastian (2017). A Privacy Analysis of Cross-device Tracking. pp. 1391–1408. ISBN 9781931971409.
  4. ^ a b Brookman, Justin (2017). "Cross-Device Tracking: Measurement and Disclosures" (PDF). Proceedings on Privacy Enhancing Technologies.
  5. ^ a b c d e f g "Comments for November 2015Workshop on Cross-Device Tracking" (PDF).
  6. ^ Sipior, Janice C.; Ward, Burke T.; Mendoza, Ruben A. (30 March 2011). "Online Privacy Concerns Associated with Cookies, Flash Cookies, and Web Beacons". Journal of Internet Commerce. 10 (1): 1–16. doi:10.1080/15332861.2011.558454. ISSN 1533-2861.
  7. ^ Arp, Daniel. "Privacy Threats through Ultrasonic Side Channels on Mobile Devices". IEEE European Symposium on Security and Privacy: 1–13 – via IEEE Xplore.
  8. ^ a b c d e Arp, Daniel. "Privacy Threats through Ultrasonic Side Channels on Mobile Devices". IEEE European Symposium on Security and Privacy: 1–13 – via IEEE Xplore.
  9. ^ "Re: Comments for November 2015 Workshop on Cross – Device Tracking" (PDF). Center for Democracy and Technology. Retrieved 1 April 2016.
  10. ^ "How TV ads silently ping commands to phones: Sneaky SilverPush code reverse-engineered". The Register. Retrieved 1 April 2016.
  11. ^ "FTC letter to app developers" (PDF). Retrieved 1 April 2016.
  12. ^ a b "Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC". Ars Technica. 13 November 2015. Retrieved 31 March 2016.
  13. ^ "FTC Issues Warning Letters to App Developers Using 'Silverpush' Code". 17 March 2016. Retrieved 1 April 2016.
  14. ^ a b c d e Arp, Daniel. "Privacy Threats through Ultrasonic Side Channels on Mobile Devices". IEEE European Symposium on Security and Privacy: 1–13 – via IEEE Xplore.
  15. ^ Korolova, Aleksandra; Sharma, Vinod (2018). "Cross-App Tracking via Nearby Bluetooth Low Energy Devices". Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy. CODASPY '18. New York, NY, USA: ACM: 43–52. doi:10.1145/3176258.3176313. ISBN 9781450356329.
  16. ^ Vasilios Mavroudis; et al. "On the Privacy and Security of the Ultrasound Ecosystem" (PDF). ubeacsec.org. Proceedings on Privacy Enhancing Technologies. Retrieved 30 November 2017.
  17. ^ a b c d e f g h i j Arp, Daniel. "Privacy Threats through Ultrasonic Side Channels on Mobile Devices". IEEE European Symposium on Security and Privacy: 1–13 – via IEEE Xplore.
  18. ^ a b c d e Campbell, John Edward; Carlson, Matt (2002). "Panopticon.com: Online Surveillance and the Commodification of Privacy". Journal of Broadcasting & Electronic Media. 46 (4): 586–606. doi:10.1207/s15506878jobem4604_6. ISSN 0883-8151.
  19. ^ a b Wellman, Barry; Nolan, Jason; Mann, Steve (2003). "Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments". Surveillance & Society. 1 (3): 331–355. doi:10.24908/ss.v1i3.3344. ISSN 1477-7487.
  20. ^ a b c d e Rosen, Christine (2004). "The Age of Egocasting". The New Atlantis (7): 51–72. ISSN 1543-1215. JSTOR 43152146.
  21. ^ a b c Molz, Jennie Germann (2006). "'Watch us wander': mobile surveillance and the surveillance of mobility". Environment and Planning A. 38 (2): 377–393. doi:10.1068/a37275. ISSN 0308-518X.
  22. ^ Razaghpanah, Abbas; Nithyanand, Rishab; Vallina-Rodriguez, Narseo; Sundaresan, Srikanth; Allman, Mark; Kreibich, Christian; Gill, Phillipa. "Apps, Trackers, Privacy and Regulators: A Global Study of the Mobile Tracking Ecosystem". www.icsi.berkeley.edu. Retrieved 11 April 2019.
  23. ^ a b c d e f g h Malgieri, Gianclaudio; Bart Custers (April 2018). "ScienceDirect". Computer Law & Security Review. 34 (2): 289–303. doi:10.1016/j.clsr.2017.08.006.
  24. ^ a b c d Zuboff, Shoshana (2015). "Big other: Surveillance Capitalism and the Prospects of an Information Civilization". Journal of Information Technology. 30 (1): 75–89. doi:10.1057/jit.2015.5. ISSN 0268-3962.
  25. ^ a b c Huckvale, Kit; Prieto, José Tomás; Tilney, Myra; Benghozi, Pierre-Jean; Car, Josip (25 September 2015). "Unaddressed privacy risks in accredited health and wellness apps: a cross-sectional systematic assessment". BMC Medicine. 13 (1): 214. doi:10.1186/s12916-015-0444-y. PMC 4582624. PMID 26404673.
  26. ^ "ScienceDirect". Computer Law & Security Review. 34 (2): 289–303. April 2018. doi:10.1016/j.clsr.2017.08.006.
  27. ^ a b c d Lyall, Ben; Robards, Brady (1 March 2018). "Tool, toy and tutor: Subjective experiences of digital self-tracking". Journal of Sociology. 54 (1): 108–124. doi:10.1177/1440783317722854. ISSN 1440-7833.
  28. ^ a b Gross, Shad; Bardzell, Jeffrey; Bardzell, Shaowen; Stallings, Michael (2 November 2017). "Persuasive Anxiety: Designing and Deploying Material and Formal Explorations of Personal Tracking Devices". Human–Computer Interaction. 32 (5–6): 297–334. doi:10.1080/07370024.2017.1287570. ISSN 0737-0024.
  29. ^ a b c d e f Sipior, Janice C.; Ward, Burke T.; Mendoza, Ruben A. (30 March 2011). "Online Privacy Concerns Associated with Cookies, Flash Cookies, and Web Beacons". Journal of Internet Commerce. 10 (1): 1–16. doi:10.1080/15332861.2011.558454. ISSN 1533-2861.
  30. ^ a b c d e f g West, Sarah Myers (5 July 2017). "Data Capitalism: Redefining the Logics of Surveillance and Privacy". Business & Society. 58 (1): 20–41. doi:10.1177/0007650317718185. ISSN 0007-6503.
  31. ^ a b c d e f "A Contextual Approach to Privacy Online". American Academy of Arts & Sciences. Retrieved 18 April 2019.
  32. ^ a b c Sipior, Janice C.; Ward, Burke T.; Mendoza, Ruben A. (30 March 2011). "Online Privacy Concerns Associated with Cookies, Flash Cookies, and Web Beacons". Journal of Internet Commerce. 10 (1): 1–16. doi:10.1080/15332861.2011.558454. ISSN 1533-2861.
  33. ^ a b c d e f g h i Hoofnagle, Chris Jay (1 September 2017). "FTC Regulation of Cybersecurity and Surveillance". Rochester, NY.
  34. ^ a b c d e f g h Fairfield, Joshua A.T. (2012). "Mixed Reality: How the Laws of Virtual Worlds Govern Everyday Life". Berkeley Technology Law Journal. 27 (1): 55–116. ISSN 1086-3818. JSTOR 24119476.
  35. ^ Zuboff, Shoshana (2015). "Big other: Surveillance Capitalism and the Prospects of an Information Civilization". Journal of Information Technology. 30 (1): 75–89. doi:10.1057/jit.2015.5. ISSN 0268-3962.

External links[edit]