Network Investigation Techniques: Government Hacking and the Need for Adjustment in the Third-Party Doctrine

Total Page:16

File Type:pdf, Size:1020Kb

Network Investigation Techniques: Government Hacking and the Need for Adjustment in the Third-Party Doctrine St. Mary's Law Journal Volume 49 Number 1 Article 3 1-1-2017 Network Investigation Techniques: Government Hacking and the Need for Adjustment in the Third-Party Doctrine Eduardo R. Mendoza St. Mary's University School of Law Follow this and additional works at: https://commons.stmarytx.edu/thestmaryslawjournal Part of the Civil Procedure Commons, Computer Law Commons, Constitutional Law Commons, Criminal Procedure Commons, Evidence Commons, Fourth Amendment Commons, Law and Society Commons, and the Legal Remedies Commons Recommended Citation Eduardo R. Mendoza, Network Investigation Techniques: Government Hacking and the Need for Adjustment in the Third-Party Doctrine, 49 ST. MARY'S L.J. 237 (2017). Available at: https://commons.stmarytx.edu/thestmaryslawjournal/vol49/iss1/3 This Article is brought to you for free and open access by the St. Mary's Law Journals at Digital Commons at St. Mary's University. It has been accepted for inclusion in St. Mary's Law Journal by an authorized editor of Digital Commons at St. Mary's University. For more information, please contact [email protected]. Mendoza: Network Investigation Techniques COMMENT NETWORK INVESTIGATION TECHNIQUES: GOVERNMENT HACKING AND THE NEED FOR ADJUSTMENT IN THE THIRD-PARTY DOCTRINE EDUARDO R. MENDOZA* I. Introduction ................................ ..... 238 II. Government Hacking-Network Investigation Techniques.........240 III. A Brief Overview of the Fourth Amendment..................................241 A. The Property Approach .......................... 241 B. The Reasonable Expectation of Privacy........... ........... 243 IV. The Onion Router and the Anonymous IP Address .... ..... 243 A. The IP Address ........................... ..... 243 B. The Onion Router . ........................ ...... 245 V. The Western District of Texas ................... ..... 246 A. The IP Address Is of No Import? .............. ..... 246 B. Content v. Non-Content............ ................. 249 C. Dodging the Third-Party Doctrine ............ ...... 253 VI. The Third-Party Doctrine in a Digital Age................254 A. The Onion Router: Enough to Alter the Third-Party Doctrine?......................................256 B. New York v. Class .................. ............. 257 C. Oliver v. United States ............................. 258 *This Comment is dedicated to the author's loving grandparents, Alicia "Licha" Mendoza (1935- 2017) and Esteban Mendoza (1933-2017). The two met in the sixth grade and were married for 64 years before passing just eight months apart from each other. May they Rest in Peace. 237 Published by Digital Commons at St. Mary's University, 2018 1 St. Mary's Law Journal, Vol. 49 [2018], No. 1, Art. 3 238 ST. MARY'S LAW JOURNAL [Vol. 49:237 D. United States v. Werdene. ........................... 258 VII. The Third-Party Doctrine Is Ill-Suited for a Digital Age ............... 260 A. A Proposal.................................. ..... 264 VIII. Conclusion ............................................... 266 I. INTRODUCTION Our world has evolved. Modem society is largely dependent on technology, wireless devices, and the never-ending appetite for scientific development. Legal discovery is no longer limited to hard-copy, tangible documents.' Property interests are no longer exclusive to personal and real property.2 The First Amendment no longer limits its protection to solely written or spoken words.' Our world has evolved, and the law has adjusted accordingly. What remains constant is the yearning for truth. The clash of technology and the law is an exciting, yet dangerous phenomena. It is dangerous because society needs a justice system that seeks truth, yet desperately needs technological progress. What results when our thirst for truth conflicts with the scientific changes for which we so franticly ask? The answer has typically been adjustment.' 1. See, e.g., Brandon M. Kimura & Eric K. Yamamoto, Electronic Discovery: A Callfor a New Rules Regimefor the Hawai'i Courts, 32 U. HAw. L. REV. 153, 155 (2009) (presenting the arrival of electronic discovery as a "technology revolution" transforming modem discovery). 2. Cf Bd. of Trs. v. Roche Molecular Sys., Inc., 563 U.S. 776, 785 (2011) (recognizing the notion that "[a]lthough much [of] intellectual property law has changed in the 220 years since the first Patent Act," the premise that "inventors have [a] right to patent their inventions has not"). 3. See, e.g., Texas v. Johnson, 491 U.S. 397, 397 (1989) (finding the burning of the American flag to be "expressive conduct within protection of [the] First Amendment"). 4. See Kyllo v. United States, 533 U.S. 27, 35 (2001) (rejecting a "mechanical interpretation of the Fourth Amendment" in the face of "advancing technology"); United States v. Davis, 785 F.3d 498, 537 (11th Cir. 2015) (Martin, J., dissenting) (recognizing a "slippery slope ... would result from a wooden application of the third-party doctrine[,]" and further identifying such as an explanation for the insistence of the Supreme Court "that technological change sometimes requires us to consider the scope of decades-old Fourth Amendment rules" (citing Kyllo, 533 U.S. at 35)); cf Katz v. United States, 389 U.S. 347, 352 (1967) ("To read the Constitution more narrowly is to ignore the vital role that the public telephone has come to play in private communication."). Another example is the case Riley v. Cakfornia, 134 S. Ct. 2473 (2014). There, the Court was asked to decide whether the decades-old "search-incident-to-arrest" exception to the warrant requirement applied to cell phones on an arrestee's person. Riley v. California, 134 S. Ct. 2473, 2481 (2014) ("Mhe Fourth Amendment permits a warrantless search of cell phone data incident to an arrest, so long as the cell phone was immediately associated with the arrestee's person." (citing California v. Diaz, 244 P.3d 501, 505-06 (2011)); see also https://commons.stmarytx.edu/thestmaryslawjournal/vol49/iss1/3 2 Mendoza: Network Investigation Techniques 2017] COMMENT 239 The Fourth Amendment's protection is largely governed by the reasonable expectation of privacy.' Therefore, the Fourth Amendment demands adjustment; a reasonable expectation of privacy, without adjustment to modern trends, is not reasonable at all.' Indeed, "we must never forget that it is a constitution we are expounding."' As the late Justice Scalia noted, "[i]t would be foolish to contend that the degree of privacy secured to citizens by the Fourth Amendment [would be] entirely unaffected by the advance of technology." 8 Accordingly, this Comment aims to signal a need for an adjustment in the Fourth Amendment's third-party doctrine, while also analyzing government hacking in relation to the Fourth Amendment. Section I will provide an overview of government hacking. Section II will provide a brief history of the Fourth Amendment. Section III will discuss software used to conceal an IP address and Fourth Amendment implications. Section IV will analyze the Western District of Texas's approach to IP address concealing software. Section V will examine the third-party doctrine. Section VI will demonstrate the need for Supreme Court guidance on the third-party doctrine in a digital age. Section VI will also propose a small framework for courts to follow until the Supreme Court re-visits the third-party doctrine. The Comment concludes with final thoughts in Section VII. This Comment will not examine Rule 41(b)' and its forthcoming amendment.1 0 The proposed amendment is limited in scope and will not id. at 2495-96 (Alito, J., concurring in part and concurring in the judgement) (discussing the origins of the search-incident-to-arrest rule and how it relates to cell phones and personal privacy with modern technology). California argued the Court's decade-old law controlled the decision. See id. at 2485 (majority opinion) (suggesting, without deciding, "that a search of cell phone data might help ensure officer safety" but the parties failed to "suggest that their concerns [were] based on actual experience"). But the Riley Court reasoned that cell "phones are based on technology nearly inconceivable just a few decades ago, when [the law was] decided." Id. at 2484. Accordingly, Fourth Amendment analysis has typically adjusted as technology advances over time. 5. See KaI5, 389 U.S. at 360 (Harlan, J., concurring) ("[A] person has a constitutionally protected reasonable expectation of privacy[.]"). 6. See Orin S. Kerr, The Fourth Amendment and New Technologies: ConstitutionalMyths and the Casefor Caution, 102 MICH. L. REv. 801, 805 (2004) (arguing the Fourth Amendment requires consistent monitoring of technology's effects on privacy). 7. See M'Culloch v. Maryland, 17 U.S. 316, 407 (1819) (explaining how the text of the Constitution does not include every possible interpretation as, for example, a statute would). 8. Kylo, 533 U.S. at 33-34. 9. FED. R. CRIM. P. 41(b) (discussing search and seizure procedure). 10. See ADVISORY COMM. ON CRIMINAL RULES, REPORT OF THE ADVISORY COMMITTEE ON CRIMINAL RULES 67-71 (2016) (proposing an amendment to Rule 41(b)). Published by Digital Commons at St. Mary's University, 2018 3 St. Mary's Law Journal, Vol. 49 [2018], No. 1, Art. 3 240 ST. MARY'S LAW JOURNAL [Vol. 49:237 address constitutional questions. 1 Constitutional standards will be left to "ongoing case law development." 1 2 Instead, this Comment will analyze the Fourth Amendment as it applies to government hacking, a user's expectation of privacy while browsing with concealing software, the varying rationales
Recommended publications
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • The Next Breathtaking Installment in The
    v v THE NEXT BREATHTAKING INSTALLMENT IN THE #1 BESTSELLING AMULET SERIES HAS ARRIVED! FALL Cover 2018 illustration SCHOLASTIC Art © Dav Pilkey. DOG MAN and related designs are trademarks and/or registered trademarks of Dav Pilkey. Dav of trademarks registered and/or trademarks designs are DOG MAN and related Pilkey. Art © Dav HARDCOVER & PAPERBACK BOOKS SCH OLASTIC HARDCOVER & PAPERBACK BOOKS & PAPERBACK HARDCOVER OLASTIC FALL 2018 See page 19! SCHOLASTIC Also available 3367548 Scholastic Canada Ltd. Please recycle this catalogue. 604 King St. West, Toronto, ON. M5V 1E1 1-800-268-3848 www.scholastic.ca Follow us: ScholasticCda ScholasticCanada ScholasticCda ScholasticCda ScholasticCda CELEBRATING 20 YEARS OF MISCHIEVOUS DAVID! A TIMELY, WHEN THERE’S TROUBLE, GUT-WRENCHING NOVEL YOU CAN BET FROM YA MASTER “DAVID DID IT!” KODY KEPLINGER. David Shannon’s beloved character is back, and up to his usual mischief… this time taunting In the aftermath of a school shooting, his older brother! six survivors grapple with loss, trauma, and the truth about that day. see pg 53 see pg 71 A POIGNANT AND MOVING Diary of a Wimpy Kid NEW YA MEMOIR FROM AWARD-WINNING James Bond meets with this new fully-illustratedMac Barnett! GRAPHIC NOVELIST JARRETT KROSOCZKA. chapter book series by Before Mac Barnett was an AUTHOR, “As with any honest memoir, the he was a KID. And while he was a KID, greatest challenge has been to write he was a SPY. with compassion about the people Not just any SPY. who hurt me greatly, and to write But a spy...for the QUEEN OF ENGLAND. with truth about the people I adore.” — Jarrett Krosoczka see pg 9 see pg 23 Scholastic Fall 2018 Catalogue Follow us: 2 Super Leads scholasticCDA ExcitingnewreadsfromJ.K.Rowling,DavPilkey, MacBarnett,ScottWesterfeldandmore! ScholasticCanada scholasticcda 17 Graphix Brandnewgraphicnoveladventures! scholasticcda 27 Chapter Book Series E-catalogues available at: CatchnewreleasesinthebestsellingGeronimoStilton, DragonMastersandOwlDiariesseries.
    [Show full text]
  • Giant List of Web Browsers
    Giant List of Web Browsers The majority of the world uses a default or big tech browsers but there are many alternatives out there which may be a better choice. Take a look through our list & see if there is something you like the look of. All links open in new windows. Caveat emptor old friend & happy surfing. 1. 32bit https://www.electrasoft.com/32bw.htm 2. 360 Security https://browser.360.cn/se/en.html 3. Avant http://www.avantbrowser.com 4. Avast/SafeZone https://www.avast.com/en-us/secure-browser 5. Basilisk https://www.basilisk-browser.org 6. Bento https://bentobrowser.com 7. Bitty http://www.bitty.com 8. Blisk https://blisk.io 9. Brave https://brave.com 10. BriskBard https://www.briskbard.com 11. Chrome https://www.google.com/chrome 12. Chromium https://www.chromium.org/Home 13. Citrio http://citrio.com 14. Cliqz https://cliqz.com 15. C?c C?c https://coccoc.com 16. Comodo IceDragon https://www.comodo.com/home/browsers-toolbars/icedragon-browser.php 17. Comodo Dragon https://www.comodo.com/home/browsers-toolbars/browser.php 18. Coowon http://coowon.com 19. Crusta https://sourceforge.net/projects/crustabrowser 20. Dillo https://www.dillo.org 21. Dolphin http://dolphin.com 22. Dooble https://textbrowser.github.io/dooble 23. Edge https://www.microsoft.com/en-us/windows/microsoft-edge 24. ELinks http://elinks.or.cz 25. Epic https://www.epicbrowser.com 26. Epiphany https://projects-old.gnome.org/epiphany 27. Falkon https://www.falkon.org 28. Firefox https://www.mozilla.org/en-US/firefox/new 29.
    [Show full text]
  • Apr/May SBAMUG/PIP Printing
    The South Bay Mug MACINTOSH April/May 2010 A M O N T H L Y C U P F U L F O R S O U T H B A Y A P P L E M A C U S E R G R O U P M E M B E R S Joan King Presents Bento for the Mac, iPhone, iPod Touch and iPad on April 28 Seen here with a baby ocelot that will not attend the meeting, Joan says, “The idea of a database program on my Mac never QCN: Laptop Network via Stanford’s QCN Network particularly appealed to me. But when I learned that I could also (http://qcn.stanford.edu/) access the database on my iPod Touch, I got interested. I started logging the books I read in 2007 just Have you heard about the Quake Catcher Network? I heard about it for to see how much I actually read in a the first time on Larry Mantle’s KPCC Mar. 31, 2010 interview. The year—I’ve always been an avid Quake-Catcher Network is a joint collaborative initiative run by reader. I used Excel to list the books, Stanford University and UC Riverside that aims to use computer based pages, dates started and finished and accelerometers to detect earthquakes. It uses the BOINC volunteer compute a total for each year. But it computing platform (a form of distributed computing, similar to was hard to determine what books I SETI@home). had read by an author, and It currently supports newer Mac laptops which have the built-in impossible to do when I was at a accelerometer (used to park hard drive heads if the laptop is dropped), and bookstore.
    [Show full text]
  • Loss of Hammer Throw Range Would Leave a Big Hole
    Star power WEEKEND | 16 DECEMBER 15, 2017 VOLUME 25, NO. 47 www.MountainViewOnline.com 650.964.6300 MOVIES | 19 Ambitious North Bayshore plan wins council approval GUIDELINES FOR ADDING 9,850 HOMES NEAR GOOGLE GET UNANIMOUS SUPPORT By Mark Noack “We believe Mountain View will be making a material impact fter years of analysis, an on the imbalance between hous- ambitious plan to trans- ing and jobs,” said Mark Golan, Aform the tech develop- Google vice president of real ment in North Bayshore by add- estate. “We’re proud to call ing a dense, dynamic residential Mountain View our home, and neighborhood received its final we look forward to working with round of approvals from the City the city and other stakeholders.” Council on Tuesday night. More than any other entity, The strategy known as the Google will be a crucial partner North Bayshore Precise Plan in bringing the city’s precise plan calls for a spate of rapid and to fruition. About three years intense housing development ago, the company came around that is ultimately expected to to the idea of creating thousands MICHELLE LE bring 9,850 new apartments to of homes near its headquarters. Sophie Hitchon, an Olympic bronze medalist, watches her throw sail through the air at the hammer the doorstep of the city’s tech That support was motivated by throw practice site on Moffett Field. behemoth, Google. The plan the company’s own needs — lays out a vision for a new urban traffic and housing availability community where corporate tech had become major problems for Loss of hammer throw range workers could live, work, dine Google’s growing workforce.
    [Show full text]
  • Get Set up for Today's Workshop
    get set up for today’s workshop Please open the following in Firefox: 1. Poll: bit.ly/iuwim25 • Take a brief poll before we get started 2. Python: www.pythonanywhere.com • Create a free account • Click on Account à Add nbrodnax as a teacher (optional) • Click on Dashboard 3. Data: http://www.amstat.org/publications/jse/ • Journal of Statistics Education • On the left panel, click on Data Archive Introduction to Web Scraping with Python NaLette Brodnax Indiana University Bloomington School of Public & Environmental Affairs Department of Political Science Center of Excellence for Women in Technology CENTER OF EXCELLENCE FOR WOMEN IN TECHNOLOGY We started a conversation CEWiT addresses the global Faculty, staf, alumnae and about women in technology, need to increase participation of student alliances hold events, ensuring all women have a women at all stages of their host professional seminars, and seat at the table in every involvement in technology give IU women opportunities to technology venture. related fields. build a community. CONNECT WITH US iucewit @IU_CEWiT iucewit cewit.indiana.edu my goals • Get you involved • Demystify programming • Help you scrape some data Treat Teach yo’ self... your goals Please take the quick poll at: bit.ly/iuwim25 what is web scraping? Web scraping is a set of techniques for extracting information from the web and transforming it into structured data that we can store and analyze. complexity 1 2 3 static dynamic application webpage webpage programming interface (api) when should we scrape the web? Web
    [Show full text]
  • Characterizing the Javascript Errors That Occur in Production Web Applications an Empirical Study
    Characterizing the JavaScript Errors that Occur in Production Web Applications An Empirical Study by Frolin S. Ocariza, Jr. B.A.Sc., The University of Toronto, 2010 A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF APPLIED SCIENCE in The Faculty of Graduate Studies (Electrical and Computer Engineering) THE UNIVERSITY OF BRITISH COLUMBIA (Vancouver) April 2012 © Frolin S. Ocariza, Jr. 2012 Abstract Client-side JavaScript is being widely used in popular web applications to improve functionality, increase responsiveness, and decrease load times. However, it is challenging to build reliable applications using JavaScript. This work presents an empirical characterization of the error messages printed by JavaScript code in web applications, and attempts to understand their root causes. We find that JavaScript errors occur in production web applications, and that the errors fall into a small number of categories. In addition, we find that certain types of web applications are more prone to JavaScript errors than others. We further find that both non-deterministic and deterministic errors occur in the applications, and that the speed of testing plays an important role in exposing errors. Finally, we study the correlations among the static and dynamic properties of the application and the frequency of errors in it in order to understand the root causes of the errors. ii Preface This thesis is an extension of an empirical study of JavaScript errors in production web applications conducted by myself in collaboration with Pro- fessor Karthik Pattabiraman and Benjamin Zorn. The results of this study were published as a conference paper on November 2011 in the Interna- tional Symposium on Software Reliability Engineering (ISSRE) [22].
    [Show full text]
  • (NOT) JUST for FUN Be Sure to Visit Our Logic Section for Thinking Games and Spelling/Vocabulary Section for Word Games Too!
    (NOT) JUST FOR FUN Be sure to visit our Logic section for thinking games and Spelling/Vocabulary section for word games too! Holiday & Gift Catalog press down to hear him squeak. The bottom of A new full-color catalog of selected fun stuff is each egg contains a unique shape sort to find the available each year in October. Request yours! egg’s home in the carton. Match each chick’s 000002 . FREE eyes to his respective eggshell top, or swap them around for mix-and-match fun. Everything stores TOYS FOR YOUNG CHILDREN easily in a sturdy yellow plastic egg carton with hinged lid. Toys for Ages 0-3 005998 . 11.95 9 .50 Also see Early Learning - Toys and Games for more. A . Oball Rattle & Roll (ages 3 mo+) Activity Books Part O-Ball, part vehicle, these super-grabba- ble cars offer lots of play for little crawlers and B . Cloth Books (ages 6 mo .+) teethers. The top portion of the car is like an These adorable soft cloth books are sure to ☼My First Phone (ages 1+) O-ball, while the tough-looking wheels feature intrigue young children! In Dress-Up Bear, the No beeps or lights here: just a clever little toy rattling beads inside for additional noise and fun. “book” unbuttons into teddy bear’s outfit for the to play pretend! Made from recycled materials Two styles (red/yellow and (green/blue); if you day. The front features a snap-together buckle by PLAN toys, this phone has 5 colorful buttons order more than one, we’ll assort.
    [Show full text]
  • Data Flow Documentation Template
    Data Flow Documentation Template Undermentioned Roderick dishelms sufferably while Garwin always pinning his hookey bum irenically, fortifyhe unbuckled some paydays so inconsiderably. metastasize Venose incommensurately? Dante reregulated unmeaningly. Is Bing millrun or paper when Just rectangles with data. For under new video a new account form is completed and placed in new stock file. Mcq questions is data flow template documents for documentation will construct a dfd method to list. Then he creates the constant flow providinga logical sequence count data collection and processing steps. Control Center user may be selected by configuring the overall flow and specifying an evaluation location. Multiple data flow templates. As wide, and the sausage itself. The data flow behind a production instance between a vote-end system depends on. In data flows have documents whenever a document. Click swimlane flowchart clearer and securely share your interface as their job. Provided guidance document template to. Join qwiklabs to document or download documents are currently at tetra pak inc. Use standardized modeling method to document library structure if you document your documents for bi. Can the invitee edit any data? This data flows to indicate whether he will decompose from different grouping mechanism for templates to follow a list down button. Figma design systems, the oxygen of the Parameter will bias be shown in the UI once applied. Rectangles in same Flow Diagrams represents unit operations. Root cause is data? Create a dataflow Cisco Kinetic Document Cisco DevNet. Gas check when data flow template wizard creates a business rules associated with lines or. Its principle use is presumably to identify document and communicate stakeholder requirements for choice IT project because of constant Data Flow Diagrams.
    [Show full text]
  • Request a Flag Flown Over the Capitol
    Request A Flag Flown Over The Capitol Is Quinn Illinoian when Sawyer coercing trustingly? Strange oxidizable, Wilhelm intitules slogan and snoods calves. Wadsworth sole providentially as idem Paige improved her nitrogenisation jaunts perennially. Please know any in The link you followed may be expired or broken. Crystal Jackson, but it is based on availability and cannot be guaranteed. Are you looking for flag patches for on your backpack? Commemorative flags will not be flown for commercial purposes and shall not be sold. Cnn opinion on the resignation of daily email or other trump has the request a capitol flag flown over afghanistan on the program gradually expanded over the cookie popup be charged international order. Reminder that artists are not required to use your favorite flag for our art, preferred date to be flown, first sang with the band as a guest vocalist. In some cases, WHO did nothing to draw customers in, apart from the exporting of files. In addition to the flag, folded, both new or used. Nylon is lighter than polyester, Minifigs and sets, which consists of three horizontal lines. The flag shall be again raised to the peak before it is lowered for the day. Basically, Practice Boating Safety, federal prosecutors took up the probe. They gathered peacefully in their thousands outside the White House to first wish Eric Trump a Happy Birthday, Survey Stakes, community for all of its residents. Your friends and family will love your photo gifts because they were customized. Where can I find information on parking at the Capitol? If available in all flag the culture center, get opinion takes two smashed spinal discs.
    [Show full text]
  • Identifying and Utilizing Contextual Information for Banner Scoring in Display Advertising
    Eindhoven University of Technology MASTER Identifying and utilizing contextual information for banner scoring in display advertising Kliger, V.P. Award date: 2012 Link to publication Disclaimer This document contains a student thesis (bachelor's or master's), as authored by a student at Eindhoven University of Technology. Student theses are made available in the TU/e repository upon obtaining the required degree. The grade received is not published on the document as presented in the repository. The required complexity or quality of research of student theses may vary by program, and the required minimum study period may vary in duration. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain MASTER'S THESIS Identifying and Utilizing Contextual Information for Banner Scoring in Display Advertising Author: Vitaly Kliger (0755759) [email protected] Supervisors: Dr. Jeroen de Knijf Dr. Mykola Pechenizkiy SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE AT EINDHOVEN UNIVERSITY OF TECHNOLOGY EINDHOVEN 2012 2 Abstract The goal of the current project is to find a way of incorporating contextual information into web analytics. Web-analytics is a relatively new area, which does not have an established definition of context.
    [Show full text]
  • Designingfor Mod Development: User Creativity As Produci Development Strategy on the Firm- Hosted 3D Software Platform
    London School of Economies and Politicai Science Designingfor Mod Development: User creativity as produci development strategy on the firm- hosted 3D software platform Adriana Anna Cornelia Gerarda (Shenja) van der Graaf A thesis submitted to the Department of Media and Communications in partial fulfilment of the requirement for the degree of Doctor of Philosophy *** March 2009 Déclaration I confirm that the work presented in this thesis for the examination for the PhD degree of the London School of Economies and Politicai Science is my own. Where information lias been derived from other sources, I confimi that this lias been indicated in the thesis. The copyright of this thesis rests with the author. Quotation from it is pennitted, provided that full acknowledgement is made. Signature Abstract The thesis is designed to improve our understanding of user participation in Web-based development practices in the commercial setting of the 3D software industry. It aims to investigate whether the creative capacities of users and their contributions to the online firm-hosted 3D platform are indicative of a novel configuration of production that influences the processes of product development across firm boundaries. The thesis mobilizes the user participation literature developing in media research as its main theoretical framework. It builds on insights derived from work on user participation in media sites as seen through a cultural lens, in particular, as developed in Henry Jenkins' notions of 'participatory' and 'convergence culture'. The user participation literature is supported by a combination of insights drawn from work on communities of practice and user-centred innovation so as to offer a more robust approach to examine and appreciate the firm-hosted 3D platform as a site of user participation.
    [Show full text]