A Sociotechnical Exploration of Online Behavioural Tracking and Advertising Technologies and Practices

Total Page:16

File Type:pdf, Size:1020Kb

A Sociotechnical Exploration of Online Behavioural Tracking and Advertising Technologies and Practices UNIVERSITY OF SOUTHAMPTON A Sociotechnical Exploration of Online Behavioural Tracking and Advertising Technologies and Practices by Faranak Hardcastle A thesis submitted in partial fulfilment for the degree of Doctor of Philosophy in the Faculty of Engineering, Science and Mathematics School of Electronics and Computer Science 2019 UNIVERSITY OF SOUTHAMPTON ABSTRACT FACULTY OF ENGINEERING, SCIENCE AND MATHEMATICS SCHOOL OF ELECTRONICS AND COMPUTER SCIENCE Doctor of Philosophy by Faranak Hardcastle As the Web evolved and extended to its current scale it has been driven by a range of di- vergent and competing visions about its constitution, purpose and future. The original vision of a global knowledge sharing system is now subsumed by a range of business models driven largely by monetising consumer data and metadata. Online Behavioural Tracking and Advertising (OBTA) constitute major business models underlying the Web today. Therefore, understanding OBTA is critical for thinking about the future of the Web. However, lack of transparency in OBTA technologies and practices has made developing such understanding challenging. This thesis explores if and how a sociotech- nical intervention for systematic communication of operational details in OBTA can be imagined. Informed by social theory and Science and Technologies Studies (STS), this exploration involves conceptualising a model for documenting and querying provenance of analytic and administrative operational details behind a targeted ad within the frame- work of speculative design using software engineering methods and W3C PROV, and conducting key informant interviews to explore if and how the model could be imagined to come to use, and provoke wider discussions. The research contributes to a sociotech- nical understanding of OBTA and the dynamics of its present state that is required for a sociotechnical future making for the Web. Contents Acknowledgements xiii 1 Introduction1 1.1 Statement of the problem...........................3 1.2 About this thesis................................6 1.3 Research rationale and questions.......................7 1.4 Contribution..................................9 1.5 Outline..................................... 10 2 Theoretical Approach 13 2.1 OBTA as sociotechnical assemblages..................... 14 2.2 Accounting for sociotechnical agency..................... 20 2.3 Conclusion: An integrated approach..................... 24 3 Online Behavioural Tracking and Advertising 29 3.1 Definitions.................................... 30 3.1.1 Tracking................................. 30 3.1.2 Targeted Advertising.......................... 31 3.1.3 OBTA, Contingency, & Interpretive Flexibility........... 32 3.2 Common technologies and practices...................... 34 3.2.1 Tracking................................. 34 3.2.1.1 Cookies............................ 35 3.2.1.2 Stateless Tracking...................... 38 3.2.2 Targeted advertising.......................... 39 3.3 The historical context of OBTA........................ 41 3.3.1 Mutually constitutive heterogeneous relations............ 42 3.3.2 Data brokers.............................. 45 3.3.3 The co-production attention economy................ 46 3.4 Conclusion.................................... 47 4 Critical questions surrounding OBTA technologies and practices 51 4.1 The wider picture................................ 52 4.1.1 Promises and challenges of Big Data for social science research.. 53 4.1.2 Critical questions surrounding algorithmic knowing and decision making................................. 55 4.2 Bias, inaccuracies, and lack of reflexivity................... 56 4.3 Discrimination, exclusion and redlining.................... 59 4.4 Privacy harms.................................. 61 v vi CONTENTS 4.5 Click-fraud, brand damage, market concentration and spread of problem- atic information................................. 64 4.6 Trust....................................... 66 4.7 Conclusion.................................... 67 5 Previous interventions 71 5.1 A history of previous interventions...................... 72 5.2 Notice and choice/consent model....................... 78 5.3 Beyond notice and choice........................... 81 5.4 Algorithmic transparency........................... 82 5.5 Conclusion.................................... 87 6 Designing a sociotechnical intervention 89 6.1 Designing the research and theoretical inspirations............. 89 6.1.1 Speculative Design........................... 90 6.1.2 Sociotechnical imaginaries....................... 92 6.2 Methodology.................................. 93 6.2.1 Conceptualising a model (TATE)................... 94 6.2.1.1 Imagined users and uses................... 94 6.2.1.2 Documenting and querying provenance of analytic and administrative processes................... 97 6.2.2 Key informant interviews....................... 100 6.2.2.1 Data Collection....................... 101 6.2.2.2 Analysis............................ 106 6.3 Conclusion.................................... 108 7 Speculative design of TATE 111 7.1 Overview.................................... 111 7.1.1 Early Stakeholder Analysis...................... 112 7.1.2 Use Case Scenario........................... 114 7.1.2.1 Alice first visiting...................... 115 7.1.2.2 Alice revisiting........................ 115 7.1.3 General Requirements......................... 116 7.1.4 Abstraction............................... 116 7.1.4.1 Actors............................. 117 7.1.4.2 Environment......................... 117 7.1.4.3 Sequence of Interactions................... 119 7.1.4.4 Data flow- cookie sync.................... 124 7.1.5 Early Requirements.......................... 126 7.2 Provenance................................... 127 7.2.1 PROV.................................. 128 7.2.2 Core types................................ 129 7.2.3 Representation in PROV........................ 131 7.2.4 Validating Requirements........................ 132 7.3 Speculating explanations............................ 137 7.4 Conclusion.................................... 138 8 Speculations about TATE’s affordances 141 CONTENTS vii 8.1 Overview.................................... 141 8.2 Perceptions of the concerns surrounding OBTA............... 143 8.2.1 Framing the future........................... 144 8.2.2 Overlaps and gaps in consumer and industry concerns....... 146 8.3 No affordances................................. 147 8.4 Speculations about TATE’s affordances for imagined users and uses.... 151 8.4.1 Individuals/researchers......................... 151 8.4.2 OBTA Companies........................... 153 8.4.3 Governance and public policy..................... 162 8.5 Revisiting features, and design of the conceptualised model........ 168 8.5.1 Stakeholder analysis, scenario, and sequence diagram........ 168 8.5.2 Current imagined use on the web user level............. 169 8.5.3 Other imagined users and uses.................... 171 8.6 Conclusion.................................... 172 9 Conclusion 175 9.1 Introduction................................... 175 9.2 Returning to the theoretical approach.................... 178 9.3 Recommendations and Future Work..................... 181 Bibliography 183 List of Figures 7.1 Early Stakeholder Analysis.......................... 113 7.2 Sequence Diagram of Scenario 7.1.2.1 (first 6 steps)............ 119 7.3 Sequence Diagram of Scenario 7.1.2.1 (step 7-19).............. 121 7.4 Sequence Diagram of Scenario 7.1.2.1 (steps 20-22)............. 121 7.5 Sequence Diagram of Scenario 7.1.2.1 (step 23-27)............. 123 7.6 Sequence Diagram of Scenario 7.1.2.1..................... 125 7.7 Data Flow Diagram of cookie syncing in an extended version of scenario 7.1.2.1 building upon Englehardt(2014); Acar et al.(2014) and Google(e).125 7.8 Three Different Views of the Core of PROV by Moreau and Groth(2013, pp.22-Figure 3.1)................................. 128 7.9 A UML diagram of the Entity-Activity-Agent model from PROV standard Moreau et al.(2013a).............................. 129 7.10 Abstracting core activities from Figure 7.9.................. 130 7.11 PROV graph of step 24 in Figure 7.6..................... 131 7.12 PROV graph extending entity ‘Request’ of step 24 in Figure 7.6...... 132 7.13 Instantiated PROV graph of step 25 in Figure 7.6.............. 133 7.14 A Provenance graph visualising the activity ’collect’ and the data from an http request as its input............................. 134 7.16 Query and results validating Req 1 and 3................... 134 7.15 A sub-graph generated by a template and binding.............. 135 7.17 Query and results validating Req 6-1...................... 136 7.18 Speculating basic explanations-web user level................. 138 ix List of Tables 6.1 Interview Details................................. 103 xi Acknowledgements I am incredibly grateful to my supervisors Susan Halford and Luc Moreau for guiding me throughout this research, constructive feedback, extensive conversations, and patience during the difficult times. Your feedback and guidance have been central in shaping this research, and your support has been key to empowering me to carry on. The feedback I received from my examiners, Rob Kitchin and Nick Gibbins has been critical to improving this thesis. I am also very grateful to Les Carr, and, my recent supervisor, Mark Weal, for their feedback, discussions, collaborations, advice, and con- tinuous support. I have also greatly benefited from the support of the
Recommended publications
  • Wolverhampton & Black Country Cover
    Wolverhampton Cover Online.qxp_Wolverhampton & Black Country Cover 30/03/2017 09:31 Page 1 LAURA MVULA - Your FREE essential entertainment guide for the Midlands INTERVIEW INSIDE WOLVERHAMPTON & BLACK COUNTRY WHAT’S ON WHAT’S COUNTRY BLACK & WOLVERHAMPTON Wolverhampton & Black Country ISSUE 376 APRIL 2017 ’ WhatFILM I COMEDY I THEATRE I GIGS I VISUAL ARTS I EVENTSs I FOOD Onwolverhamptonwhatson.co.uk APRIL 2017 APRIL inside: Your 16-pagelist week by week listings guide ENGLISH presentsTOURING two classic OPERA works PART OF WHAT’S ON MEDIA GROUP GROUP MEDIA ON WHAT’S OF PART in Wolverhampton StrictlyPASHA star KOVALEVbrings the romance of the rumba to the Midlands TWITTER @WHATSONWOLVES WOLVERHAMPTONWHATSON.CO.UK @WHATSONWOLVES TWITTER celebratingDISNEY 100 ON years ICE of magic at the Genting Arena TIM RICE AND ANDREW LLOYD WEBBER’S SMASH HIT MUSICAL AT THE GRAND Contents April Shrops.qxp_Layout 1 22/03/2017 20:10 Page 1 Birmingham@WHATSONBRUM Wolverhampton @WHATSONWOLVES Shropshire @WHATSONSHROPS staffordshire @WHATSONSTAFFS Worcestershire @WHATSONWORCS warwickshire @WHATSONWARWICKS Contents April Wolves.qxp_Layout 1 22/03/2017 21:16 Page 2 April 2017 Contents Russell Brand - contemplates the responsibilities of parenting at Victoria Hall, Stoke more on page 25 Laura Whitmore New Model Army La Cage aux Folles the list stars in brand new thriller at Yorkshire rock band bring John Partridge talks about his Your 16-page Shrewsbury’s Theatre Severn Winter to Bilston role in the hit West End musical week by week listings guide Interview page 8 page 17 Interview page 26 page 51 inside: 4. First Word 11. Food 16. Music 24. Comedy 28.
    [Show full text]
  • Data Privacy: the Current Legal Landscape February 2016
    DATA PRIVACY: THE CURRENT LEGAL LANDSCAPE FEBRUARY 2016 By Mark C. Mao, Ronald Raether, Ashley Taylor, Sheila Pham, Sofia Jeong, Reade Jacob, Ryan Lewis, Julie Hoffmeister, and Jessica Lohr troutmansanders.com TROUTMAN SANDERS LLP DATA PRIVACY: THE CURRENT LEGAL LANDSCAPE • FEBRUARY 2016 I. Introduction P. 3 A. An Overview of Privacy Law In The United States B. Trends In 2015 Continue Into 2016 II. New U.S. Legislation, Amendments, And Updates P. 5 A. USA Freedom Act B. Cyber Information Security Act C. Other Significant Legislative Developments 1. Driverless And “Smart” Cars 2. Power Grids 3. Education Privacy 4. California III. Evolving Case Law P. 8 A. Data Breach Litigation 1. Motions to Dismiss: Standing And Damages 2. New Trends & Arguments: a. Defending On The Standard of Care b. Derivative Liability c. Business to Business Litigation B. Impermissible “Tracking” Cases 1. Expanding The Definition of “PII” 2. Persistent Identifiers, URL Tracking, And “Content Scanning” 3. Cross-Device Tracking 4. The Video Privacy Protection Act (VPPA) And The Use of Pseudonyms 5. Consumer Profiling IV. Developments In Regulatory Enforcement P.12 A. The Federal Trade Commission B. The Federal Communications Commission C. HIPAA Enforcement D. State Attorneys General E. Other Administrative Enforcement Efforts V. Notable International Developments P.17 A. The “Privacy Shield” for Transatlantic Data Protection Framework B. General Data Protection Regulation (GDPR) C. The Network Information Security (NIS) Directive D. The Trans-Pacific Partnership (TPP) Agreement VI. Conclusion P.20 Page 2 TROUTMAN SANDERS LLP DATA PRIVACY: THE CURRENT LEGAL LANDSCAPE • FEBRUARY 2016 I. INTRODUCTION 1 A. An Overview of Privacy Law In The United States Privacy law in the United States is generally viewed as Telecommunication entities such as “(telecommunication) following a “sectoral model.” Unlike the European Union (EU) carriers,” cable television, and “video tape service providers” are and Canada, the US does not have comprehensive national also subject to federal legislation.
    [Show full text]
  • Privacy and Data Security Update 2016
    Privacy & Data Security Update: 2016 Federal Trade Commission January 2016 - December 2016 The Federal Trade Commission (FTC or Commission) is an independent U.S. law enforcement agency charged with protecting consumers and enhancing competition across broad sectors of the economy. The FTC’s primary legal authority comes from Section 5 of the Federal Trade Commission Act, which prohibits unfair or deceptive practices in the marketplace. The FTC also has authority to enforce a variety of sector specific laws, including the Truth in Lending Act, the CAN-SPAM Act, the Children’s Online Privacy Protection Act, the Equal Credit Opportunity Act, the Fair Credit Reporting Act, the Fair Debt Collection Practices Act, and the Telemarketing and Consumer Fraud and Abuse Prevention Act. This broad authority allows the Commission to address a wide array of practices affecting consumers, including those that emerge with the development of new technologies and business models. How Does the FTC Protect Consumer Privacy and Ensure Data Security? The FTC uses a variety of tools to protect consumers’ privacy and personal information. The FTC’s principal tool is to bring enforcement actions to stop law violations and require companies to take affirmative steps to remediate the unlawful behavior. This includes, when appropriate, implementation of comprehensive privacy and security programs, biennial assessments by independent experts, monetary redress to consumers, disgorgement of ill-gotten gains, deletion of illegally obtained consumer information, and provision of robust transparency and choice mechanisms to consumers. If a company violates an FTC order, the FTC can seek civil monetary penalties for the violations. The FTC can also obtain civil monetary penalties for violations of certain privacy statutes and rules, including the Children’s Online Privacy Protection Act, the Fair Credit Reporting Act, and the Telemarketing Sales Rule.
    [Show full text]
  • Ultrasound-Based Cross-Device Tracking
    Vasilios Mavroudis*, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, and Giovanni Vigna On the Privacy and Security of the Ultrasound Ecosystem Abstract: Nowadays users often possess a variety of elec- Keywords: Ultrasounds, Deanonymization, tronic devices for communication and entertainment. In Privacy Violation, Cross-device Linking. particular, smartphones are playing an increasingly central role in users’ lives: Users carry them everywhere they go and often use them to control other devices. This trend pro- vides incentives for the industry to tackle new challenges, 1 Introduction such as cross-device authentication, and to develop new monetization schemes. A new technology based on ultra- Modern users have been increasingly relying on multi- sounds has recently emerged to meet these demands. Ul- ple devices and frequently switch between them in their trasound technology has a number of desirable features: it daily lives: Browsing the Internet from computers, playing is easy to deploy, flexible, and inaudible by humans. This mobile games on tablets, or watching shows on televi- technology is already utilized in a number of different real- sions. A recent survey has shown that a single user carries world applications, such as device pairing, proximity detec- 2.9 electronic devices on average [44]. Among the others, tion, and cross-device tracking. smartphones play a prominent role since users carry them This paper examines the different facets of ultrasound- everywhere they go, and they are often used to control based technology. Initially, we discuss how it is already used other devices. The trend of engaging with multiple digital in the real world, and subsequently examine this emerging platforms brought to the demand for new technologies to technology from the privacy and security perspectives.
    [Show full text]
  • Cross-Device Tracking: Measurement and Disclosures
    Proceedings on Privacy Enhancing Technologies ; 2017 (2):113–128 Justin Brookman, Phoebe Rouge, Aaron Alva, and Christina Yeung Cross-Device Tracking: Measurement and Disclosures Abstract: Internet advertising and analytics technology share common attributes — such as the same lo- companies are increasingly trying to find ways to link cal network and IP address — those services may behavior across the various devices consumers own. This be able to correlate user activity across devices. In cross-device tracking can provide a more complete view visiting 100 sites on two virtual devices, we con- into a consumer’s behavior and can be valuable for a nected to 861 different third party domains on both range of purposes, including ad targeting, research, and devices, including domains operated by dedicated conversion attribution. However, consumers may not be cross-device tracking companies. aware of how and how often their behavior is tracked – 96 out of 100 of the sites we tested allowed con- across different devices. We designed this study to try sumers to submit a username or email address that to assess what information about cross-device tracking could be shared to correlate users across devices. (including data flows and policy disclosures) is observ- – Six companies that collect login information as a able from the perspective of the end user. Our paper first party also collect extensive behavioral data as demonstrates how data that is routinely collected and a third party on other websites. shared online could be used by online third parties to – 16 out of 100 sites shared personally identifying in- track consumers across devices.
    [Show full text]
  • Zero-Permission Acoustic Cross-Device Tracking
    Zero-Permission Acoustic Cross-Device Tracking Nikolay Matyunin Jakub Szefer Stefan Katzenbeisser Technical University of Darmstadt, CYSEC Yale University Technical University of Darmstadt, CYSEC Darmstadt, Germany New Haven, CT, USA Darmstadt, Germany [email protected] [email protected] [email protected] Abstract—Adversaries today can embed tracking identifiers and detect them in a mobile application to show location- into ultrasonic sound and covertly transmit them between de- relevant content. The company Silverpush developed means of vices without users realizing that this is happening. To prevent embedding tracking identifiers into TV streams. Meanwhile, such emerging privacy risks, mobile applications now require a request for an explicit user permission, at run-time, to get researchers [4] demonstrated how the uXDT technology can access to a device’s microphone. In this paper, however, we be used for web-tracking purposes, e.g., for transmitting a show that current defenses are not enough. We introduce a tracking ID from the Tor browser to an application on the novel approach to acoustic cross-device tracking, which does not user’s smartphone in order to de-anonymize the web session. require microphone access, but instead exploits the susceptibility Due to privacy concerns, uXDT technology raised the atten- of MEMS gyroscopes to acoustic vibrations at specific (ultrasonic) frequencies. Currently, no permissions are needed to access the tion of public media [5] and the security community [4], [6]. gyroscope’s data, and the gyroscope can be accessed from apps or In response, the Federal Trade Commission issued warning even from a web browser.
    [Show full text]
  • Governing Machine Learning That Matters
    Doctoral thesis Governing Machine Learning that Matters Michael Veale 2019 A dissertation submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Science, Technology, Engineering and Public Policy Department of Science, Technology, Engineering and Public Policy (STEaPP) University College London 84,570 words 2019 Declaration of Authorship I, Michael Veale, confirm that the work presented in this thesis is my own. Wherein- formation has been derived from other sources, I confirm that this has been indicated in the thesis. Signed: Declaration of Integrated Publications This section acknowledges the integration of work of the Author into the different sec- tions of this thesis. All work integrated into the thesis was undertaken during the period in which the Author was registered with the University as working towards the doctorate. The work is acknowledged here as, since publication, other researchers have responded to and engaged with these works in this fast-moving field, and this thesis represents both a statement of the original arguments and findings in those works, as well as a partial response to the research field as it stands at the time of sub- mission. Chapter 1, Hello, World!, includes some content from the following articles: 1. Vasilios Mavroudis and Michael Veale, ‘Eavesdropping Whilst You’re Shopping: Balancing Personalisation and Privacy in Connected Retail Spaces’ in Proceedings of the 2018 PETRAS/IoTUK/IET Living in the IoT Conference (IET 2018) DOI: 10/gffng2; 2. Lilian Edwards and Michael Veale, ‘Slave to the Algorithm? Why a ‘Right to an Explanation’ is Probably Not The Remedy You Are Looking For’ (2017) 16 Duke L.
    [Show full text]
  • September 2015 M&A and Investment Summary Table of Contents
    September 2015 M&A and Investment Summary Table of Contents 1 About Petsky Prunier 3 2 Overview of Monthly M&A and Investment Activity 6 3 Monthly M&A and Investment Activity by Industry Segment 12 4 Additional Monthly M&A and Investment Activity Data 42 Securities offered through Petsky Prunier Securities, LLC, member of FINRA. This M&A and Investment Summary has been prepared by and is being distributed in the United States by Petsky Prunier, a broker dealer registered with the U.S. SEC and a member of FINRA. Petsky Prunier is not affiliated with Altium Capital Ltd, but has partnered with Altium to expand its international presence. Altium has not prepared or verified the information in this Summary. Persons in the United States should contact Petsky Prunier for further information or services. This M&A and Investment Summary is not being distributed by Altium Capital Ltd in the United States and Altium Capital Ltd is not offering any services to persons in the United States. 2 | M&A and Investment Summary September 2015 Petsky Prunier: Maximizing Shareholder Value . Top-ranked, global investment bank dedicated to digital advertising and marketing, eCommerce, digital media, technology, information, business services, and healthcare services industries . Extensive sell-side M&A and capital raise expertise, with a transaction closing rate unmatched at our level of deal volume . Founded in 1999 . More than 50 focused professionals; growth of 40% since 2011 . New York, Palo Alto, Las Vegas, Chicago, Boston, Tampa . Deep relationships across a broad spectrum of strategic buyers, as well as private equity, growth equity, and VC groups and lenders .
    [Show full text]
  • BBC Group Annual Report and Accounts 2018/19
    BBC Group Annual Report and Accounts 2018/19 BBC Group Annual Report and Accounts 2018/19 Laid before the National Assembly for Wales by the Welsh Government Return to contents © BBC Copyright 2019 The text of this document (this excludes, where present, the Royal Arms and all departmental or agency logos) may be reproduced free of charge in any format or medium provided that it is reproduced accurately and not in a misleading context. The material must be acknowledged as BBC copyright and the document title specified. Photographs are used ©BBC or used under the terms of the PACT agreement except where otherwise identified. Permission from copyright holders must be sought before any photographs are reproduced. You can download this publication from bbc.co.uk/annualreport Designed by Emperor emperor.works Prepared pursuant to the BBC Royal Charter 2016 (Article 37) Return to contents OVERVIEW Contents About the BBC 2 Inform, Educate, Entertain 4 Highlights from the year p.2 6 Award-winning content Strategic report 8 A message from the Chairman About the BBC 10 Director-General’s statement 16 Delivering our creative remit Highlights from the year and 18 – Impartial news and information award-winning content 22 – Learning for people of all ages 26 – Creative, distinctive, quality output 34 – Reflecting the UK’s diverse communities 48 – Reflecting the UK to the world 55 Audiences and external context 56 – Audience performance and market context 58 – Performance by Service 61 – Public Service Broadcasting expenditure p.8 62 – Charitable work
    [Show full text]
  • Cross-Device Tracking: Measurement and Disclosures
    Proceedings on Privacy Enhancing Technologies ; 2017 (2):133–148 Justin Brookman, Phoebe Rouge, Aaron Alva, and Christina Yeung Cross-Device Tracking: Measurement and Disclosures Abstract: Internet advertising and analytics technology share common attributes — such as the same lo- companies are increasingly trying to find ways to link cal network and IP address — those services may behavior across the various devices consumers own. This be able to correlate user activity across devices. In cross-device tracking can provide a more complete view visiting 100 sites on two virtual devices, we con- into a consumer’s behavior and can be valuable for a nected to 861 different third party domains on both range of purposes, including ad targeting, research, and devices, including domains operated by dedicated conversion attribution. However, consumers may not be cross-device tracking companies. aware of how and how often their behavior is tracked – 96 out of 100 of the sites we tested allowed con- across different devices. We designed this study to try sumers to submit a username or email address that to assess what information about cross-device tracking could be shared to correlate users across devices. (including data flows and policy disclosures) is observ- – Six companies that collect login information as a able from the perspective of the end user. Our paper first party also collect extensive behavioral data as demonstrates how data that is routinely collected and a third party on other websites. shared online could be used by online third parties to – 16 out of 100 sites shared personally identifying in- track consumers across devices.
    [Show full text]
  • 18 May 2018 Page 1 of 10 SATURDAY 12 MAY 2018 in This, the Final Programme of the Series, Neil Considers How Best Newcomer 2017 Nominee
    Radio 4 Extra Listings for 12 – 18 May 2018 Page 1 of 10 SATURDAY 12 MAY 2018 In this, the final programme of the series, Neil considers how Best Newcomer 2017 nominee. William Shakespeare made the transition from successful Written and Performed by Bilal Zafar SAT 00:00 Terry Pratchett (b010v5f8) playwright to possibly the greatest dramatist the world has Additional Material from Glenn Moore Night Watch, Episode 5 known Produced by Daisy Knight Commander Sam Vimes of the City Watch, thrown back into Programme 20 SHAKESPEARE GOES GLOBAL - The An Avalon production for BBC Radio 4. his own past, has little time left there to undo the harm done by publication of the First Folio of Shakespeare's collected plays in SAT 06:00 Don Taylor - Underworld (b008wd17) his arch-enemy Carcer, before coming back to his present... 1623 began the process of turning an early modern playwright Harry is out of work. Myra is worried about money and Ted is The conclusion of Terry Pratchett's Discworld novel dramatised into a global phenomenon. An annotated copy of the Collected worried about Socialism. Harry decides to retreat to his study, by Robin Brooks. Works of Shakespeare reveals the extent to which Shakespeare to translate Virgil book six, the famous visit to the Underworld. Stars Philip Jackson as Sam Vimes, Carl Prekopp as Young has inspired and influenced audiences across the globe and But then the broom cupboard opens and 17th century poet John Sam, Paul Ritter as Carcer, Clare Corbett as Rosie, Sam Dale as through the ages. Milton appears, to take him on a very particular journey..
    [Show full text]
  • Annual Deal Tracker
    Annual Deal List February 2020 Contents Section Page M&A 04 Domestic 05 Mergers and internal restructuring 16 M&A: Inbound 17 M&A: Outbound 21 Private equity 25 IPO 62 QIP 64 Disclaimer This document captures the list of deals announced based on information available in the public domain and based on public announcements. Grant Thornton India LLP does not take any responsibility for the information, any errors or any decision by the reader based on this information. This document should not be relied upon as a substitute for detailed advice and hence, we do not accept responsibility for any loss as a result of relying on the material contained herein. Further, our analysis of the deal values is based on publicly available information and based on appropriate assumptions (wherever necessary). Hence, if different assumptions were to be applied, the outcomes and results would be different. This document contains the deals announced and closed as of 20 December 2019. 02 Industry 4.0: Transforming the manufacturing landscape Annual Deal List 2019 0 3 M&A 04 Annual Deal List 2019 I. Domestic Acquirer Target Sector USDm % Stake Reliance Strategic Business Asteria Aerospace Pvt. Ltd. Aerospace and defence 3.30 52% Ventures Limited Ashok Leyland Ltd. Ashley Aviation Ltd. Aerospace and defence 0.08 27% PI Industries Ltd. Isagro (Asia) Agrochemicals Private Limited Agriculture and forestry 49.00 100% Luxmi Tea Co. Pvt. Ltd. Mcleod Russel India Ltd. - Specified assets of Agriculture and forestry 21.43 100% Addabarie Tea Estate, Mahakali Tea Estate and Dirai Tea Estate Mahindra CIE Automotive Ltd.
    [Show full text]