SlideShare una empresa de Scribd logo
1 de 27
Targeted Online Advertising
Foundation of privacy
Topics


Introduction to online advertisement






Privacy Issues
Solutions





Understanding the participants and their roles.
Targeted advertising.

User based solutions
Collaborative solutions

Conclusions
Introduction




Online Advertising plays a critically important role in
the Internet world.
advertising is the main way of profiting from the
Internet, the history of Internet advertising developed
alongside the growth of the medium itself
Facts and short history








First internet banner, 1994, AT&T.

Also in 1994, the first commercial spam, a
"Green Card Lottery".
The first ad server was developed by FocaLink
Media Services and introduced on 1995.
In March 2008, Google acquired DoubleClick
for US$3.1 billion in cash.
Parties


Advertiser





Publisher





Got content, wants money
Cnn.com

Ad-network





Got money, wants publicity
e.g., Coca-Cola

Got advertising infrastructure, wants money
e.g., Google AdSense, Yahoo

Consumer


Wants free content
Business Model




CPM = Cost Per thousand impressions
 Impression: user just sees the ad.
 Rates vary from $0.25 to $100
CPC = Cost Per Click
 This is the cost charged to an advertiser
every time their ad is "clicked" on
 Rates around 0.3$ per click
Click fraud




clicking on an ad for the purpose of generating
a charge per click without having actual
interest.
Might be:






The publisher
Advertiser’s competitor
The publisher’s competitor

Ad-networks deal with it by trying to identify
who clicks on the ads.
Online behavioral advertising




Online behavioral advertising refers to the
practice of ad-networks tracking users across
web sites in order to learn user interests and
preferences.
Benefits
 Advertisers targets a more focused audience
which increases the effectively.
 Consumer is “bothered” by more relevant
and interesting ads.
How ad-networks match ads




Most behavioral targeting systems work by
categorizing users into one or more audience
segments.
Profiling users based on collected data







Search history – analyzing search keywords
Browse history - analyzing content of visited
pages
Purchase history
Social networks
Geography
How Ad-Networks track users


Cookies







3rd Party cookies
Flash cookies

Web bug
IP address
User-agent Headers



Browser + OS
More than 24,000 signatures
Levis.com case study
Privacy






Tracking and categorizing users by the adnetworks tend to violate user’s privacy.
The gathered information, linked with the
users real identity, form a violation of privacy in
its most basic form.
For example, if a person is searching the web
for information on a serious genetic disease,
that information can be collected and stored
along with that consumer's other information including information that can uniquely identify
the consumer.
So… What we have so far?



User - Preserve his privacy
Ad-Network & Publisher –





Maintain targeting and preserve their
effectiveness and income
Still want to be able to fight click fraud

Questions:



Do the two goals necessarily conflict?
Or can they be both achieved?
Naive (paranoid) solution


Surf only across anonymizing proxies.





Surf in private mode
Advantages




TOR

Effective from the user’s perspective.

Disadvantages





Are proxies really anonymizing?
Very awkward
Slower
Damages targeted advertising
TrackMeNot (Howe, Nissenbaum, 2005)







Implemented as a Firefox plugin.
Achieves privacy through obfuscation.
Generates noisy queries.
Starts with fixed a seed query list and evolve
queries base on previous results.
Mimics user behavior so fake queries be
indistinguishable:



Query timing
Click through behavior
TrackMeNot


Advantages




Simple

Disadvantages





Still the real queries can be connected to real
identity.
Might have problems with offensive contents.
Again, damages targeted advertising
Privad (Guha, Reznichenko, Tang , et al., 2009)


Require client software:
 saves locally database of ads (served by the
ad-network)
 Learn user interests in order to match ads.
 Match add from the local database
according
to the User interests.
Privad


Introduce new party – Dealer:
 Proxies anonymously all communication
between the user and the ad-network.
 might be government regulatory agency.
 hides user’s identity from the ad-network,
but itself does not learn any profile
information about the user since all
messages between the user and ad-network
are encrypted.
Privad


Advantages




Ad-Networks can still target ads without violates
user privacy.

Disadvantages



Complicated to add the new party.
Ad-Network has to trust the dealer in order to fight
click-fraud which might unmotivated them to
cooperate.
Adnostic (Toubina, Narayanan, Boneh, et al., 2009)


Two party solution:







Client side: Implemented as a Firefox plugin.
Server side: requires Ad-Network support

User’s preferences and interests are stored
locally by the plugin, instead of at the Adnetwork.
The targeted ad is selected by the plugin
locally at the users computer, instead of at the
Ad-Network servers.
Adnostic - Accounting




“charge per click” model remains unchanged.
“charge per impression” is harder.
It uses homomorphic encryption scheme.




given the public key
and ciphertexts
, anyone can calculate
given the public key
and ciphertexts
and scalar c ,
c a n b e c a lc ula te d .

,
Adnostic - charge per impression protocol







Client: Track user activity and maintains the
data locally.
Visits an Ad supported website.
Server: Sends a list of n a d s id s a lo ng with
p ublic ke y
The browser chooses an ad to display to the
user.
Then creates
that matches the
selected ad, then send
, Along with zero-knowledge proof that
and each is 0 or 1.
Adnostic - charge per impression protocol






Validates the proof. If the proof is valid then
using homomorphic encryption calculates

when c is the price of viewing the ad.
The server save encrypted counter for each ad
and add to it the previous values. Only one
counter’s real value change.
At the end of the billing period, say a month,
each counter is decrypted (should be done by
trusted authority) and the advertisers pays for
Adnostic


Advantages






Ad-networks can still target ads without violates
user privacy.
Ad-networks can still detect click fraud though it
will be difficult without gathering information on IP
even for a short time.

Disadvantages



Ad-networks become weaker.
Ad-networks can still track user if they are willing
to, and the protocol is built on trust.
Conclusions




In my opinion, It is hard to believe that adnetworks will give up the power of tracking
users without legislation.
Nevertheless, There are reasonable solutions
that still support targeted advertising without
violating users privacy.
References








[1] Daniel c. Howe and Helen Nissenbaum. Trackmenot:
resisting surveillance in web search. 2005.
[2] Saikat Guha, Bin Cheng, Alexey Reznichenko,
Hamed
Haddadi,
and
Paul
Francis.
Privad:
Rearchitecting online advertising for privacy. 2009.
[3] Vincent Toubiana, Arvind Narayanan Dan Boneh,
Helen Nissenbaum, and Solon Barocas. Adnostic:
Privacy preserving targeted advertising. 2009.
[4] Catherine Dwyer. Behavioral targeting: A case study
of consumer tracking on levis.com. In 15th Americas
Conference on Information Systems, 2009..

Más contenido relacionado

La actualidad más candente

Social media and networking
Social media and networkingSocial media and networking
Social media and networkinggdeboe
 
COLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentationCOLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentationBhadra Gowdra
 
Crop prediction using machine learning
Crop prediction using machine learningCrop prediction using machine learning
Crop prediction using machine learningdataalcott
 
Presentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksAshish Arora
 
Presentation on Sentiment Analysis
Presentation on Sentiment AnalysisPresentation on Sentiment Analysis
Presentation on Sentiment AnalysisRebecca Williams
 
Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam FilteringiNazneen
 
Phone book with project report for BCA,MCA
Phone book with project report for BCA,MCAPhone book with project report for BCA,MCA
Phone book with project report for BCA,MCASp Gurjar
 
python project ppt.pptx
python project ppt.pptxpython project ppt.pptx
python project ppt.pptxAkshatGoswami3
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hackingAyush Upadhyay
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGijcsit
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissanceNishaYadav177
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data miningDataminingTools Inc
 

La actualidad más candente (20)

Social media and networking
Social media and networkingSocial media and networking
Social media and networking
 
Safety app for woman
Safety app for womanSafety app for woman
Safety app for woman
 
COLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentationCOLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentation
 
Mobile security
Mobile securityMobile security
Mobile security
 
Crop prediction using machine learning
Crop prediction using machine learningCrop prediction using machine learning
Crop prediction using machine learning
 
Presentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social NetworksPresentation-Detecting Spammers on Social Networks
Presentation-Detecting Spammers on Social Networks
 
Presentation Slides
Presentation SlidesPresentation Slides
Presentation Slides
 
Presentation on Sentiment Analysis
Presentation on Sentiment AnalysisPresentation on Sentiment Analysis
Presentation on Sentiment Analysis
 
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
 
ISOC (internet society)
ISOC (internet society)ISOC (internet society)
ISOC (internet society)
 
Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam Filtering
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Detecting fake news .pptx
Detecting fake news .pptxDetecting fake news .pptx
Detecting fake news .pptx
 
Phone book with project report for BCA,MCA
Phone book with project report for BCA,MCAPhone book with project report for BCA,MCA
Phone book with project report for BCA,MCA
 
python project ppt.pptx
python project ppt.pptxpython project ppt.pptx
python project ppt.pptx
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
 
Web fundamentals - part 1
Web fundamentals - part 1Web fundamentals - part 1
Web fundamentals - part 1
 

Destacado

Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...
Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...
Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...TRUSTe
 
How to use privacy seals to improve privacy practices and increase sales
How to use privacy seals to improve privacy practices and increase salesHow to use privacy seals to improve privacy practices and increase sales
How to use privacy seals to improve privacy practices and increase salesTRUSTe
 
TNS-TRUSTe Study: Consumer Attitudes about Biometrics in ID Documents
TNS-TRUSTe Study: Consumer Attitudes about Biometrics in ID DocumentsTNS-TRUSTe Study: Consumer Attitudes about Biometrics in ID Documents
TNS-TRUSTe Study: Consumer Attitudes about Biometrics in ID DocumentsTRUSTe
 
Beyond the Website: Privacy on Web 2.0 Platforms
Beyond the Website: Privacy on Web 2.0 PlatformsBeyond the Website: Privacy on Web 2.0 Platforms
Beyond the Website: Privacy on Web 2.0 PlatformsTRUSTe
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun LiYunLi
 
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceOnline Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceAdler Law Group
 
com 548 presentation 2
com 548 presentation 2com 548 presentation 2
com 548 presentation 2YunLi
 
Better Targeted Advertising Real World Examples
Better Targeted Advertising   Real World ExamplesBetter Targeted Advertising   Real World Examples
Better Targeted Advertising Real World ExamplesSteveVirgin
 
TRUSTe whitepaper- A Checklist of Practices that Impact Consumer Trust
TRUSTe whitepaper- A Checklist of Practices that Impact Consumer TrustTRUSTe whitepaper- A Checklist of Practices that Impact Consumer Trust
TRUSTe whitepaper- A Checklist of Practices that Impact Consumer TrustTRUSTe
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information securityUMaine
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ictAten Kecik
 
Advertisement
AdvertisementAdvertisement
AdvertisementKalahub
 
Ppt on types of advertising
Ppt on types of advertisingPpt on types of advertising
Ppt on types of advertisingphaneendra u
 
Advertisement ppt
Advertisement pptAdvertisement ppt
Advertisement pptarathymalz
 
Network secuirty & encryption techniques
Network secuirty & encryption techniquesNetwork secuirty & encryption techniques
Network secuirty & encryption techniquesmanoj kumar
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 

Destacado (20)

Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...
Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...
Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...
 
How to use privacy seals to improve privacy practices and increase sales
How to use privacy seals to improve privacy practices and increase salesHow to use privacy seals to improve privacy practices and increase sales
How to use privacy seals to improve privacy practices and increase sales
 
TNS-TRUSTe Study: Consumer Attitudes about Biometrics in ID Documents
TNS-TRUSTe Study: Consumer Attitudes about Biometrics in ID DocumentsTNS-TRUSTe Study: Consumer Attitudes about Biometrics in ID Documents
TNS-TRUSTe Study: Consumer Attitudes about Biometrics in ID Documents
 
Beyond the Website: Privacy on Web 2.0 Platforms
Beyond the Website: Privacy on Web 2.0 PlatformsBeyond the Website: Privacy on Web 2.0 Platforms
Beyond the Website: Privacy on Web 2.0 Platforms
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
 
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceOnline Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
 
com 548 presentation 2
com 548 presentation 2com 548 presentation 2
com 548 presentation 2
 
Better Targeted Advertising Real World Examples
Better Targeted Advertising   Real World ExamplesBetter Targeted Advertising   Real World Examples
Better Targeted Advertising Real World Examples
 
Advertising
AdvertisingAdvertising
Advertising
 
TRUSTe whitepaper- A Checklist of Practices that Impact Consumer Trust
TRUSTe whitepaper- A Checklist of Practices that Impact Consumer TrustTRUSTe whitepaper- A Checklist of Practices that Impact Consumer Trust
TRUSTe whitepaper- A Checklist of Practices that Impact Consumer Trust
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Chapter 1-introduction to ict
Chapter 1-introduction to ictChapter 1-introduction to ict
Chapter 1-introduction to ict
 
Advertisement
AdvertisementAdvertisement
Advertisement
 
Ppt on types of advertising
Ppt on types of advertisingPpt on types of advertising
Ppt on types of advertising
 
Ict ppt
Ict pptIct ppt
Ict ppt
 
Types of Advertisement
Types of AdvertisementTypes of Advertisement
Types of Advertisement
 
Advertisement ppt
Advertisement pptAdvertisement ppt
Advertisement ppt
 
Network secuirty & encryption techniques
Network secuirty & encryption techniquesNetwork secuirty & encryption techniques
Network secuirty & encryption techniques
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 

Similar a Targeted Online Advertising

A radical solution for broken digital advertising
A radical solution for broken digital advertisingA radical solution for broken digital advertising
A radical solution for broken digital advertisingMando Liussi
 
What Is Behavioral Targeting? - CBS News
What Is Behavioral Targeting? - CBS NewsWhat Is Behavioral Targeting? - CBS News
What Is Behavioral Targeting? - CBS Newsboorishvictim1493
 
Field Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryField Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryDistil Networks
 
What Is Behavioral Targeting? - CBS News
What Is Behavioral Targeting? - CBS NewsWhat Is Behavioral Targeting? - CBS News
What Is Behavioral Targeting? - CBS Newszonkedwrinkle5781
 
What Is Behavioral Targeting? - CBS News
What Is Behavioral Targeting? - CBS NewsWhat Is Behavioral Targeting? - CBS News
What Is Behavioral Targeting? - CBS Newsmaterialisticfa91
 
WTF Programmatic Dictionary
WTF Programmatic DictionaryWTF Programmatic Dictionary
WTF Programmatic Dictionarycpxmarketing
 
Behavioral Targeting Webinar
Behavioral Targeting WebinarBehavioral Targeting Webinar
Behavioral Targeting WebinarRemko Zuiderwijk
 
Fernando Bermejo: Mapping Online Advertising, From Anxiety to Method
Fernando Bermejo: Mapping Online Advertising, From Anxiety to MethodFernando Bermejo: Mapping Online Advertising, From Anxiety to Method
Fernando Bermejo: Mapping Online Advertising, From Anxiety to MethodNiemanLab
 
Challenges Of Online Audience Measurement
Challenges Of Online Audience MeasurementChallenges Of Online Audience Measurement
Challenges Of Online Audience MeasurementVincent Maher
 
Capture - Day 1 - 10:15 - "Existential Threats and the “Standards” Imperative"
Capture - Day 1 - 10:15 - "Existential Threats and the “Standards” Imperative"Capture - Day 1 - 10:15 - "Existential Threats and the “Standards” Imperative"
Capture - Day 1 - 10:15 - "Existential Threats and the “Standards” Imperative"PerformanceIN
 
Targeted Advertisements & Privacy
Targeted Advertisements & Privacy Targeted Advertisements & Privacy
Targeted Advertisements & Privacy Afnan Rjoub
 
Module3 offsite webanalytics
Module3   offsite webanalyticsModule3   offsite webanalytics
Module3 offsite webanalyticsGayathri Choda
 
The Programmatic Jargon Buster, 3rd Edition
The Programmatic Jargon Buster, 3rd EditionThe Programmatic Jargon Buster, 3rd Edition
The Programmatic Jargon Buster, 3rd EditionSociomantic Labs
 
Ad fraud & Programmatic
Ad fraud & ProgrammaticAd fraud & Programmatic
Ad fraud & ProgrammaticNeeraj Mishra
 
DLS_Electronic_Notice_Audit_Report
DLS_Electronic_Notice_Audit_ReportDLS_Electronic_Notice_Audit_Report
DLS_Electronic_Notice_Audit_ReportTodd B. Hilsee
 
Sales Presentation India 2016 v1
Sales Presentation India 2016 v1Sales Presentation India 2016 v1
Sales Presentation India 2016 v1Aakash Gulati
 

Similar a Targeted Online Advertising (20)

A radical solution for broken digital advertising
A radical solution for broken digital advertisingA radical solution for broken digital advertising
A radical solution for broken digital advertising
 
What Is Behavioral Targeting? - CBS News
What Is Behavioral Targeting? - CBS NewsWhat Is Behavioral Targeting? - CBS News
What Is Behavioral Targeting? - CBS News
 
Field Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryField Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad Inventory
 
What Is Behavioral Targeting? - CBS News
What Is Behavioral Targeting? - CBS NewsWhat Is Behavioral Targeting? - CBS News
What Is Behavioral Targeting? - CBS News
 
What Is Behavioral Targeting? - CBS News
What Is Behavioral Targeting? - CBS NewsWhat Is Behavioral Targeting? - CBS News
What Is Behavioral Targeting? - CBS News
 
WTF Programmatic Dictionary
WTF Programmatic DictionaryWTF Programmatic Dictionary
WTF Programmatic Dictionary
 
Behavioral Targeting Webinar
Behavioral Targeting WebinarBehavioral Targeting Webinar
Behavioral Targeting Webinar
 
a6-zhao
a6-zhaoa6-zhao
a6-zhao
 
Fernando Bermejo: Mapping Online Advertising, From Anxiety to Method
Fernando Bermejo: Mapping Online Advertising, From Anxiety to MethodFernando Bermejo: Mapping Online Advertising, From Anxiety to Method
Fernando Bermejo: Mapping Online Advertising, From Anxiety to Method
 
Online Advertising
Online AdvertisingOnline Advertising
Online Advertising
 
Challenges Of Online Audience Measurement
Challenges Of Online Audience MeasurementChallenges Of Online Audience Measurement
Challenges Of Online Audience Measurement
 
Capture - Day 1 - 10:15 - "Existential Threats and the “Standards” Imperative"
Capture - Day 1 - 10:15 - "Existential Threats and the “Standards” Imperative"Capture - Day 1 - 10:15 - "Existential Threats and the “Standards” Imperative"
Capture - Day 1 - 10:15 - "Existential Threats and the “Standards” Imperative"
 
Targeted Advertisements & Privacy
Targeted Advertisements & Privacy Targeted Advertisements & Privacy
Targeted Advertisements & Privacy
 
Module3 offsite webanalytics
Module3   offsite webanalyticsModule3   offsite webanalytics
Module3 offsite webanalytics
 
Retargeting
RetargetingRetargeting
Retargeting
 
The Programmatic Jargon Buster, 3rd Edition
The Programmatic Jargon Buster, 3rd EditionThe Programmatic Jargon Buster, 3rd Edition
The Programmatic Jargon Buster, 3rd Edition
 
Ad fraud & Programmatic
Ad fraud & ProgrammaticAd fraud & Programmatic
Ad fraud & Programmatic
 
DLS_Electronic_Notice_Audit_Report
DLS_Electronic_Notice_Audit_ReportDLS_Electronic_Notice_Audit_Report
DLS_Electronic_Notice_Audit_Report
 
Online advertising
Online advertisingOnline advertising
Online advertising
 
Sales Presentation India 2016 v1
Sales Presentation India 2016 v1Sales Presentation India 2016 v1
Sales Presentation India 2016 v1
 

Más de Gautam Verma

Telemedicine helping doctors and patients in pandemic
Telemedicine helping doctors and patients in pandemicTelemedicine helping doctors and patients in pandemic
Telemedicine helping doctors and patients in pandemicGautam Verma
 
Email Marketing- Changes in Gmail
Email Marketing- Changes in GmailEmail Marketing- Changes in Gmail
Email Marketing- Changes in GmailGautam Verma
 
Mobile App- User Retention Strategy: Simple Steps to Retain App users!
Mobile App- User Retention Strategy: Simple Steps to Retain App users!Mobile App- User Retention Strategy: Simple Steps to Retain App users!
Mobile App- User Retention Strategy: Simple Steps to Retain App users!Gautam Verma
 
Internet Marketing Mashup- Social Media for Research
Internet Marketing Mashup- Social Media for ResearchInternet Marketing Mashup- Social Media for Research
Internet Marketing Mashup- Social Media for ResearchGautam Verma
 
Business plan template
Business plan templateBusiness plan template
Business plan templateGautam Verma
 
Latest Internet Trends; Report: 2014
Latest Internet Trends; Report: 2014Latest Internet Trends; Report: 2014
Latest Internet Trends; Report: 2014Gautam Verma
 
What is Media Planning? Single presentation to answer all your questions!
What is Media Planning? Single presentation to answer all your questions!What is Media Planning? Single presentation to answer all your questions!
What is Media Planning? Single presentation to answer all your questions!Gautam Verma
 
Presentaion template
Presentaion templatePresentaion template
Presentaion templateGautam Verma
 

Más de Gautam Verma (10)

Telemedicine helping doctors and patients in pandemic
Telemedicine helping doctors and patients in pandemicTelemedicine helping doctors and patients in pandemic
Telemedicine helping doctors and patients in pandemic
 
Email Marketing- Changes in Gmail
Email Marketing- Changes in GmailEmail Marketing- Changes in Gmail
Email Marketing- Changes in Gmail
 
Mobile App- User Retention Strategy: Simple Steps to Retain App users!
Mobile App- User Retention Strategy: Simple Steps to Retain App users!Mobile App- User Retention Strategy: Simple Steps to Retain App users!
Mobile App- User Retention Strategy: Simple Steps to Retain App users!
 
Internet Marketing Mashup- Social Media for Research
Internet Marketing Mashup- Social Media for ResearchInternet Marketing Mashup- Social Media for Research
Internet Marketing Mashup- Social Media for Research
 
Business plan template
Business plan templateBusiness plan template
Business plan template
 
Latest Internet Trends; Report: 2014
Latest Internet Trends; Report: 2014Latest Internet Trends; Report: 2014
Latest Internet Trends; Report: 2014
 
What is Media Planning? Single presentation to answer all your questions!
What is Media Planning? Single presentation to answer all your questions!What is Media Planning? Single presentation to answer all your questions!
What is Media Planning? Single presentation to answer all your questions!
 
Presentaion template
Presentaion templatePresentaion template
Presentaion template
 
Dolce & Gabbana
Dolce & GabbanaDolce & Gabbana
Dolce & Gabbana
 
Internet Trends
Internet TrendsInternet Trends
Internet Trends
 

Último

Best 5 Graphics Designing Course In Chandigarh
Best 5 Graphics Designing Course In ChandigarhBest 5 Graphics Designing Course In Chandigarh
Best 5 Graphics Designing Course In Chandigarhhamitthakurdma01
 
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdfMicro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdfPiyush Kumar
 
Busty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Choosing the Right White Label SEO Services to Boost Your Agency's Growth.pdf
Choosing the Right White Label SEO Services to Boost Your Agency's Growth.pdfChoosing the Right White Label SEO Services to Boost Your Agency's Growth.pdf
Choosing the Right White Label SEO Services to Boost Your Agency's Growth.pdfAutus Digital
 
Brand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdfBrand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdftbatkhuu1
 
Cash payment girl 9257726604 Hand ✋ to Hand over girl
Cash payment girl 9257726604 Hand ✋ to Hand over girlCash payment girl 9257726604 Hand ✋ to Hand over girl
Cash payment girl 9257726604 Hand ✋ to Hand over girlCall girl Jaipur
 
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best PracticesInstant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best PracticesMedia Logic
 
BDSM⚡Call Girls in Sector 44 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 44 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 44 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 44 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Enhancing Business Visibility PR Firms in San Francisco
Enhancing Business Visibility PR Firms in San FranciscoEnhancing Business Visibility PR Firms in San Francisco
Enhancing Business Visibility PR Firms in San Franciscosanfranciscoprfirms
 
2024 Social Trends Report V4 from Later.com
2024 Social Trends Report V4 from Later.com2024 Social Trends Report V4 from Later.com
2024 Social Trends Report V4 from Later.comnmislamchannal
 
Rise and fall of Kulula.com, an airline won consumers by different marketing ...
Rise and fall of Kulula.com, an airline won consumers by different marketing ...Rise and fall of Kulula.com, an airline won consumers by different marketing ...
Rise and fall of Kulula.com, an airline won consumers by different marketing ...ssusereaa7d9
 
[Expert Panel] New Google Shopping Ads Strategies Uncovered
[Expert Panel] New Google Shopping Ads Strategies Uncovered[Expert Panel] New Google Shopping Ads Strategies Uncovered
[Expert Panel] New Google Shopping Ads Strategies UncoveredSearch Engine Journal
 
Press Release Distribution Evolving with Digital Trends.pdf
Press Release Distribution Evolving with Digital Trends.pdfPress Release Distribution Evolving with Digital Trends.pdf
Press Release Distribution Evolving with Digital Trends.pdfPR Wires
 
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15SearchNorwich
 
Unlocking the Mystery of the Voynich Manuscript
Unlocking the Mystery of the Voynich ManuscriptUnlocking the Mystery of the Voynich Manuscript
Unlocking the Mystery of the Voynich Manuscriptelizabethella096
 
Alpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptxAlpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptxDave McCallum
 
How consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their livesHow consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their livesMathuraa
 
BDSM⚡Call Girls in Vaishali Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Vaishali Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Vaishali Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Vaishali Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Labour Day Celebrating Workers and Their Contributions.pptx
Labour Day Celebrating Workers and Their Contributions.pptxLabour Day Celebrating Workers and Their Contributions.pptx
Labour Day Celebrating Workers and Their Contributions.pptxelizabethella096
 

Último (20)

Best 5 Graphics Designing Course In Chandigarh
Best 5 Graphics Designing Course In ChandigarhBest 5 Graphics Designing Course In Chandigarh
Best 5 Graphics Designing Course In Chandigarh
 
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 150 Noida Escorts >༒8448380779 Escort Service
 
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdfMicro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
 
Busty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
 
Choosing the Right White Label SEO Services to Boost Your Agency's Growth.pdf
Choosing the Right White Label SEO Services to Boost Your Agency's Growth.pdfChoosing the Right White Label SEO Services to Boost Your Agency's Growth.pdf
Choosing the Right White Label SEO Services to Boost Your Agency's Growth.pdf
 
Brand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdfBrand experience Peoria City Soccer Presentation.pdf
Brand experience Peoria City Soccer Presentation.pdf
 
Cash payment girl 9257726604 Hand ✋ to Hand over girl
Cash payment girl 9257726604 Hand ✋ to Hand over girlCash payment girl 9257726604 Hand ✋ to Hand over girl
Cash payment girl 9257726604 Hand ✋ to Hand over girl
 
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best PracticesInstant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
 
BDSM⚡Call Girls in Sector 44 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 44 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 44 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 44 Noida Escorts >༒8448380779 Escort Service
 
Enhancing Business Visibility PR Firms in San Francisco
Enhancing Business Visibility PR Firms in San FranciscoEnhancing Business Visibility PR Firms in San Francisco
Enhancing Business Visibility PR Firms in San Francisco
 
2024 Social Trends Report V4 from Later.com
2024 Social Trends Report V4 from Later.com2024 Social Trends Report V4 from Later.com
2024 Social Trends Report V4 from Later.com
 
Rise and fall of Kulula.com, an airline won consumers by different marketing ...
Rise and fall of Kulula.com, an airline won consumers by different marketing ...Rise and fall of Kulula.com, an airline won consumers by different marketing ...
Rise and fall of Kulula.com, an airline won consumers by different marketing ...
 
[Expert Panel] New Google Shopping Ads Strategies Uncovered
[Expert Panel] New Google Shopping Ads Strategies Uncovered[Expert Panel] New Google Shopping Ads Strategies Uncovered
[Expert Panel] New Google Shopping Ads Strategies Uncovered
 
Press Release Distribution Evolving with Digital Trends.pdf
Press Release Distribution Evolving with Digital Trends.pdfPress Release Distribution Evolving with Digital Trends.pdf
Press Release Distribution Evolving with Digital Trends.pdf
 
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
Five Essential Tools for International SEO - Natalia Witczyk - SearchNorwich 15
 
Unlocking the Mystery of the Voynich Manuscript
Unlocking the Mystery of the Voynich ManuscriptUnlocking the Mystery of the Voynich Manuscript
Unlocking the Mystery of the Voynich Manuscript
 
Alpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptxAlpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptx
 
How consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their livesHow consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their lives
 
BDSM⚡Call Girls in Vaishali Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Vaishali Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Vaishali Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Vaishali Escorts >༒8448380779 Escort Service
 
Labour Day Celebrating Workers and Their Contributions.pptx
Labour Day Celebrating Workers and Their Contributions.pptxLabour Day Celebrating Workers and Their Contributions.pptx
Labour Day Celebrating Workers and Their Contributions.pptx
 

Targeted Online Advertising

  • 2. Topics  Introduction to online advertisement     Privacy Issues Solutions    Understanding the participants and their roles. Targeted advertising. User based solutions Collaborative solutions Conclusions
  • 3. Introduction   Online Advertising plays a critically important role in the Internet world. advertising is the main way of profiting from the Internet, the history of Internet advertising developed alongside the growth of the medium itself
  • 4. Facts and short history     First internet banner, 1994, AT&T. Also in 1994, the first commercial spam, a "Green Card Lottery". The first ad server was developed by FocaLink Media Services and introduced on 1995. In March 2008, Google acquired DoubleClick for US$3.1 billion in cash.
  • 5. Parties  Advertiser    Publisher    Got content, wants money Cnn.com Ad-network    Got money, wants publicity e.g., Coca-Cola Got advertising infrastructure, wants money e.g., Google AdSense, Yahoo Consumer  Wants free content
  • 6. Business Model   CPM = Cost Per thousand impressions  Impression: user just sees the ad.  Rates vary from $0.25 to $100 CPC = Cost Per Click  This is the cost charged to an advertiser every time their ad is "clicked" on  Rates around 0.3$ per click
  • 7. Click fraud   clicking on an ad for the purpose of generating a charge per click without having actual interest. Might be:     The publisher Advertiser’s competitor The publisher’s competitor Ad-networks deal with it by trying to identify who clicks on the ads.
  • 8. Online behavioral advertising   Online behavioral advertising refers to the practice of ad-networks tracking users across web sites in order to learn user interests and preferences. Benefits  Advertisers targets a more focused audience which increases the effectively.  Consumer is “bothered” by more relevant and interesting ads.
  • 9. How ad-networks match ads   Most behavioral targeting systems work by categorizing users into one or more audience segments. Profiling users based on collected data      Search history – analyzing search keywords Browse history - analyzing content of visited pages Purchase history Social networks Geography
  • 10. How Ad-Networks track users  Cookies      3rd Party cookies Flash cookies Web bug IP address User-agent Headers   Browser + OS More than 24,000 signatures
  • 12. Privacy    Tracking and categorizing users by the adnetworks tend to violate user’s privacy. The gathered information, linked with the users real identity, form a violation of privacy in its most basic form. For example, if a person is searching the web for information on a serious genetic disease, that information can be collected and stored along with that consumer's other information including information that can uniquely identify the consumer.
  • 13. So… What we have so far?   User - Preserve his privacy Ad-Network & Publisher –    Maintain targeting and preserve their effectiveness and income Still want to be able to fight click fraud Questions:   Do the two goals necessarily conflict? Or can they be both achieved?
  • 14. Naive (paranoid) solution  Surf only across anonymizing proxies.    Surf in private mode Advantages   TOR Effective from the user’s perspective. Disadvantages     Are proxies really anonymizing? Very awkward Slower Damages targeted advertising
  • 15. TrackMeNot (Howe, Nissenbaum, 2005)      Implemented as a Firefox plugin. Achieves privacy through obfuscation. Generates noisy queries. Starts with fixed a seed query list and evolve queries base on previous results. Mimics user behavior so fake queries be indistinguishable:   Query timing Click through behavior
  • 16. TrackMeNot  Advantages   Simple Disadvantages    Still the real queries can be connected to real identity. Might have problems with offensive contents. Again, damages targeted advertising
  • 17. Privad (Guha, Reznichenko, Tang , et al., 2009)  Require client software:  saves locally database of ads (served by the ad-network)  Learn user interests in order to match ads.  Match add from the local database according to the User interests.
  • 18. Privad  Introduce new party – Dealer:  Proxies anonymously all communication between the user and the ad-network.  might be government regulatory agency.  hides user’s identity from the ad-network, but itself does not learn any profile information about the user since all messages between the user and ad-network are encrypted.
  • 19.
  • 20. Privad  Advantages   Ad-Networks can still target ads without violates user privacy. Disadvantages   Complicated to add the new party. Ad-Network has to trust the dealer in order to fight click-fraud which might unmotivated them to cooperate.
  • 21. Adnostic (Toubina, Narayanan, Boneh, et al., 2009)  Two party solution:     Client side: Implemented as a Firefox plugin. Server side: requires Ad-Network support User’s preferences and interests are stored locally by the plugin, instead of at the Adnetwork. The targeted ad is selected by the plugin locally at the users computer, instead of at the Ad-Network servers.
  • 22. Adnostic - Accounting    “charge per click” model remains unchanged. “charge per impression” is harder. It uses homomorphic encryption scheme.   given the public key and ciphertexts , anyone can calculate given the public key and ciphertexts and scalar c , c a n b e c a lc ula te d . ,
  • 23. Adnostic - charge per impression protocol     Client: Track user activity and maintains the data locally. Visits an Ad supported website. Server: Sends a list of n a d s id s a lo ng with p ublic ke y The browser chooses an ad to display to the user. Then creates that matches the selected ad, then send , Along with zero-knowledge proof that and each is 0 or 1.
  • 24. Adnostic - charge per impression protocol    Validates the proof. If the proof is valid then using homomorphic encryption calculates when c is the price of viewing the ad. The server save encrypted counter for each ad and add to it the previous values. Only one counter’s real value change. At the end of the billing period, say a month, each counter is decrypted (should be done by trusted authority) and the advertisers pays for
  • 25. Adnostic  Advantages    Ad-networks can still target ads without violates user privacy. Ad-networks can still detect click fraud though it will be difficult without gathering information on IP even for a short time. Disadvantages   Ad-networks become weaker. Ad-networks can still track user if they are willing to, and the protocol is built on trust.
  • 26. Conclusions   In my opinion, It is hard to believe that adnetworks will give up the power of tracking users without legislation. Nevertheless, There are reasonable solutions that still support targeted advertising without violating users privacy.
  • 27. References     [1] Daniel c. Howe and Helen Nissenbaum. Trackmenot: resisting surveillance in web search. 2005. [2] Saikat Guha, Bin Cheng, Alexey Reznichenko, Hamed Haddadi, and Paul Francis. Privad: Rearchitecting online advertising for privacy. 2009. [3] Vincent Toubiana, Arvind Narayanan Dan Boneh, Helen Nissenbaum, and Solon Barocas. Adnostic: Privacy preserving targeted advertising. 2009. [4] Catherine Dwyer. Behavioral targeting: A case study of consumer tracking on levis.com. In 15th Americas Conference on Information Systems, 2009..

Notas del editor

  1. Older models of pay-for-content by the user, have been replaced by free content and funding by advertisement
  2. Both behavioral tracking and behavioral targeting is done by the plugin locally