Understanding Emerging Threats to Online Advertising
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Economic and Social Impacts of Google Cloud September 2018 Economic and Social Impacts of Google Cloud |
Economic and social impacts of Google Cloud September 2018 Economic and social impacts of Google Cloud | Contents Executive Summary 03 Introduction 10 Productivity impacts 15 Social and other impacts 29 Barriers to Cloud adoption and use 38 Policy actions to support Cloud adoption 42 Appendix 1. Country Sections 48 Appendix 2. Methodology 105 This final report (the “Final Report”) has been prepared by Deloitte Financial Advisory, S.L.U. (“Deloitte”) for Google in accordance with the contract with them dated 23rd February 2018 (“the Contract”) and on the basis of the scope and limitations set out below. The Final Report has been prepared solely for the purposes of assessment of the economic and social impacts of Google Cloud as set out in the Contract. It should not be used for any other purposes or in any other context, and Deloitte accepts no responsibility for its use in either regard. The Final Report is provided exclusively for Google’s use under the terms of the Contract. No party other than Google is entitled to rely on the Final Report for any purpose whatsoever and Deloitte accepts no responsibility or liability or duty of care to any party other than Google in respect of the Final Report and any of its contents. As set out in the Contract, the scope of our work has been limited by the time, information and explanations made available to us. The information contained in the Final Report has been obtained from Google and third party sources that are clearly referenced in the appropriate sections of the Final Report. -
Understanding Emerging Threats to Online Advertising
Understanding Emerging Threats to Online Advertising Ceren Budak Sharad Goel Justin Rao University of Michigan Stanford University Microsoft Research Georgios Zervas Boston University Questrom School of Business June 11, 2016 Abstract Two recent disruptions to the online advertising market are the widespread use of ad-blocking software and proposed restrictions on third-party tracking, trends that are driven largely by consumer concerns over privacy. Both primarily impact display advertising (as opposed to search and native social ads), and affect how retailers reach customers and how content producers earn revenue. It is, however, unclear what the consequences of these trends are. We investigate using anonymized web browsing his- tories of 14 million individuals, focusing on \retail sessions" in which users visit online sites that sell goods and services. We find that only 3% of retail sessions are initiated by display ads, a figure that is robust to permissive attribution rules and consistent across widely varying market segments. We further estimate the full distribution of how retail sessions are initiated, and find that search advertising is three times more important than display advertising to retailers, and search advertising is itself roughly three times less important than organic web search. Moving to content providers, we find that display ads are shown by 12% of websites, accounting for 32% of their page views; this reliance is concentrated in online publishing (e.g., news outlets) where the rate is 91%. While most consumption is either in the long-tail of websites that do not show ads, or sites like Facebook that show native, first-party ads, moderately sized web publishers account for a substantial fraction of consumption, and we argue that they will be most affected by changes in the display advertising market. -
Commercial Data Privacy and Innovation in the Internet Economy: a Dynamic Policy Framework
COMMERCIAL DATA PRIVACY AND INNOVATION IN THE INTERNET ECONOMY: A DYNAMIC POLICY FRAMEWORK THE DEPARTMENT OF COMMERCE INTERNET POLICY TASK FORCE MESSAGE FROM SECRETARY OF COMMERCE GARY LOCKE The Internet is an extraordinary platform for innovation, economic growth, and social communication. Using the Internet, entrepreneurs reach global markets, political groups organize, and major companies manage their supply chains and deliver services to their customers. Simply stated, the Internet is becoming the central nervous system of our information economy and society. Over the last 15 years, personal computers, mobile phones, and other devices have transformed how we access and use information. As powerful, exciting, and innovative as these developments are, they also bring with them new concerns. New devices and applications allow the collection and use of personal information in ways that, at times, can be contrary to many consumers’ privacy expectations. Addressing these issues in a way that protects the tremendous economic and social value of the Internet without stifling innovation requires a fresh look at Internet policy. For this reason, in April 2010, I launched an Internet Policy Task Force (IPTF), which brings together the technical, policy, trade, and legal expertise of the entire Department. The following report – or green paper – recommends consideration of a new framework for addressing online privacy issues in the United States. It recommends that the U.S. government articulate certain core privacy principles—in order to assure baseline consumer protections—and that, collectively, the government and stakeholders come together to address specific privacy issues as they arise. We believe this framework will both improve the state of affairs domestically and advance interoperability among different privacy regimes around the world so that, globally, Internet services can continue to flourish. -
Security Now! #514 - 06-30-15 Tor’S Astoria Client
Security Now! #514 - 06-30-15 Tor’s Astoria Client This week on Security Now! ● Abode issues an emergency out-of-cycle patch for FLASH, ● Microsoft updates its root certificate store and ruffles a few feathers, ● An update to Google's Chrome browser unnerves some, ● Samsung's original solution to driver collision, ● An AM radio that steals nearby Crypto keys, ● A truly FABULOUS siteof Privacy tools, ● New evidence that major ISPs are not being net-neutral, ● Managing NoScript, ● Some miscellaneous notes, ● A look at efforts to increase Tor’s privacy. Is that Pita Bread spying on you? Security News Adobe issues emergency (out-of-cycle) FLASH player update ● https://www.fireeye.com/blog/threat-research/2015/06/operation-clandestine-wolf-adobe -flash-zero-day.html ● Operation Clandestine Wolf – Adobe Flash Zero-Day in APT3 Phishing Campaign ● In June, FireEye’s FireEye as a Service team in Singapore uncovered a phishing campaign exploiting an Adobe Flash Player zero-day vulnerability. The attackers’ emails included links to compromised web servers that served either benign content or a malicious Adobe Flash Player file that exploits the vulnerability (CVE-2015-3113). ● CVE-2015-3113: ○ Heap-based buffer overflow in Adobe Flash Player before 13.0.0.296 and 14.x through 18.x before 18.0.0.194 on Windows and OS X and before 11.2.202.468 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in June 2015. ● APT3 ○ The China-based threat group FireEye tracks as APT3, aka UPS, is responsible for this exploit and activity. -
Regulating Online Behavioral Advertising, 44 J. Marshall L. Rev
The John Marshall Law Review Volume 44 | Issue 4 Article 2 Summer 2011 Regulating Online Behavioral Advertising, 44 J. Marshall L. Rev. 899 (2011) Steven C. Bennett Follow this and additional works at: http://repository.jmls.edu/lawreview Part of the Computer Law Commons, Consumer Protection Law Commons, Internet Law Commons, Marketing Law Commons, and the Privacy Law Commons Recommended Citation Steven C. Bennett, Regulating Online Behavioral Advertising, 44 J. Marshall L. Rev. 899 (2011) http://repository.jmls.edu/lawreview/vol44/iss4/2 This Article is brought to you for free and open access by The oJ hn Marshall Institutional Repository. It has been accepted for inclusion in The oJ hn Marshall Law Review by an authorized administrator of The oJ hn Marshall Institutional Repository. REGULATING ONLINE BEHAVIORAL ADVERTISING STEVEN C. BENNETT* Online behavioral advertising ("OBA"), sometimes known as profiling or behavioral targeting, can be used by on-line publishers and internet marketers to increase the efficiency and effectiveness of their advertising campaigns.' OBA works by collecting data on a user's behavior on the Internet including browsing habits, search queries, and web site viewing history. OBA generally seeks to in- crease the relevance of advertising displayed to the user, based on data collected about the user, with the aim of increasing the strength of the connection between advertising efforts and pur- chasing behavior. Recently, the Federal Trade Commission ("FTC"), the De- partment of Commerce ("DOC"), and congressional leaders have suggested a need for more intensive regulation of OBA. The chief objective of such regulation is to ensure that consumer privacy is protected and that abuses of consumer information do not occur. -
VAASAN AMMATTIKORKEAKOULU International Business
Hoang-Mai Nguyen A FAREWELL TO ADS? On the conflict between online advertisements and adblockers Business Economics 2016 ACKNOWLEDGEMENT My friend Mathieu once told me, “Beautiful places are everywhere, but it is the people that make a place special. Therefore, whenever I travel somewhere, it is not the place that I want to visit; it is the people that I want to meet.” And so I would like to dedicate this thesis to the great friends, teachers, and strangers that I have met during the last four years. Thank you for showing me what it is like to live, care and matter. I am grateful to my supervisor, Satu Lautamäki, for her endless support and en- couragement. Thank you for never giving up on me. Và dĩ nhiên, con cảm ơn bố. Con cảm ơn mẹ. Cảm ơn bố mẹ vì đã đồng ý cho con ra đi và trưởng thành. Summer 2016, Vaasa. Mai. VAASAN AMMATTIKORKEAKOULU International Business TIIVISTELMÄ Tekijä: Hoang-Mai Nguyen Opinnäytetyön nimi Hyvästit mainoksille? Ristiriita verkkomainononnan ja mainoksenestoliitännäisten välillä Vuosi 2016 Kieli Englanti Sivumäärä 68 + 8 Liitettä Ohjaaja Satu Lautamäki Opinnäytetyön tarkoitus on analysoida mainoksenestoliitännäisten vaikutusta verkkomainontateollisuuteen. Päämääränä on (1) selvittää mainoksenestoliitännäisiä käyttävien henkilöiden käyttäjäprofiili, (2) luotettujen sivustojen listaukseen erikoistuneiden tahojen motivaatiot ja (3) tutkia ihmisten halukkuutta luotettujen sivustojen listausliitännäisten käyttöön ja maksettuun sisältöön internetissä. Kattava ymmärrys verkkomainonnan nykytilanteesta kartoitettiin -
Security Now! #615 - 06-06-17 Legacy’S Long Tail
Security Now! #615 - 06-06-17 Legacy’s Long Tail This week on Security Now! This week we discuss an embarrassing high-profile breach of an online identity company, an over-hyped problem found in Linux's sudo command, the frightening software used by the UK's Trident nuclear missile submarine launch platforms, how emerging nations prevent high school test cheating, another lesson about the danger of SMS authentication codes, another worrisome SHODAN search result, high-penetration dangerous adware from a Chinese marketer, another "that's not a bug" bug in Chrome allowing websites to surreptitiously record audio and video without the user's knowledge, the foreseeable evolution of hybrid crypto-malware, the limp return of Google Contributor, Google continues to work on end-to-end eMail encryption, a follow-up on straight-to-voicemail policy, “homomorphic encryption” (what the heck is that?), and "closing the loop" follow up from recent discussions. Our Picture of the Week Security News OneLogin Breach: ● OneLogin is a single-sign-on provider using OAuth. ● So rather than "sign in with Google" it's "Sign in with OneLogin." ● OneLogin implemented their cloud-based infrastructure using Amazon AWS cloud services. ● Around 9pm PST in the evening last Wednesday, they detected that odd usage patterns had been occurring within their database instances for the previous seven hours. ● They shutdown the unauthorized access and began to look at what had been happening. ● The bottom line is: It doesn't get any worse. ● Many have criticized their public response for being opaque and deliberately lacking in detail because they provided much more information non-publicly via eMail to their subscribers. -
It's Not Personal: the Dangers of Misapplied Privacy Policies To
Policy Study 414 March 2013 It’s Not Personal: The Dangers of Misapplied Privacy Policies to Search, Social Media and Other Web Content By Steven Titch Project Director: Julian Morris Reason Foundation Reason Foundation’s mission is to advance a free society by developing, applying and promoting libertarian principles, including individual liberty, free markets and the rule of law. We use journalism and public policy research to influence the frameworks and actions of policymakers, journalists and opinion leaders. Reason Foundation’s nonpartisan public policy research promotes choice, competition and a dynamic market economy as the foundation for human dignity and progress. Reason produces rigorous, peer-reviewed research and directly engages the policy process, seeking strategies that emphasize cooperation, flexibility, local knowledge and results. Through practical and innovative approaches to complex problems, Reason seeks to change the way people think about issues, and promote policies that allow and encourage individu- als and voluntary institutions to flourish. Reason Foundation is a tax-exempt research and education organization as defined under IRS code 501(c)(3). Reason Foundation is supported by voluntary contributions from individuals, foundations and corporations. Copyright © 2013 Reason Foundation. All rights reserved. Reason Foundation It’s Not Personal: The Dangers of Misapplied Privacy Policies to Search, Social Media and Other Web Content By Steven Titch Project Director: Julian Morris Executive Summary Millions of people have come to understand the Internet as a new media platform. For the government, unfortunately, basic comprehension of the business models and consumer demand that drive this platform remains elusive. Traffic and usage statistics show the public is enthusiastically embracing the Internet as a two-way information medium. -
On the Security of Single Sign-On
On the Security of Single Sign-On Vladislav Mladenov (Place of birth: Pleven/Bulgaria) [email protected] 30th June 2017 Ruhr-University Bochum Horst G¨ortz Institute for IT-Security Chair for Network and Data Security Dissertation zur Erlangung des Grades eines Doktor-Ingenieurs der Fakult¨atf¨urElektrotechnik und Informationstechnik an der Ruhr-Universit¨atBochum First Supervisor: Prof. Dr. rer. nat. J¨org Schwenk Second Supervisor: Prof. Dr.-Ing. Felix Freiling www.nds.rub.de Abstract Single Sign-On (SSO) is a concept of delegated authentication, where an End- User authenticates only once at a central entity called Identity Provider (IdP) and afterwards logs in at multiple Service Providers (SPs) without reauthenti- cation. For this purpose, the IdP issues an authentication token, which is sent to the SP and must be verified. There exist different SSO protocols, which are implemented as open source libraries or integrated in commercial products. Google, Facebook, Microsoft and PayPal belong to the most popular SSO IdPs. This thesis provides a comprehensive security evaluation of the most popular and widely deployed SSO protocols: OpenID Connect, OpenID, and SAML. A starting point for this research is the development of a new concept called malicious IdP, where a maliciously acting IdP is used to attack SSO. Generic attack classes are developed and categorized according to the requirements, goals, and impact. These attack classes are adapted to different SSO proto- cols, which lead to the discovery of security critical vulnerabilities in Software- as-a-Service Cloud Providers, eCommerce products, web-based news portals, Content-Management systems, and open source implementations. -
Paper, We Present a Adblockers
Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis Shitong Zhu∗, Xunchao Huy, Zhiyun Qian∗, Zubair Shafiqz and Heng Yin∗ ∗University of California, Riverside Email: [email protected], [email protected], [email protected] ySyracuse University, Email: [email protected] zUniversity of Iowa, Email: zubair-shafi[email protected] Abstract—Millions of people use adblockers to remove in- Millions of users worldwide now use adblockers [51] that trusive and malicious ads as well as protect themselves against are available as browser extensions (e.g., Adblock, Adblock tracking and pervasive surveillance. Online publishers consider Plus, and uBlock) and full-fledged browsers (e.g., Brave and adblockers a major threat to the ad-powered “free” Web. They Cliqz). Even Chrome has now included a built-in adblocker in have started to retaliate against adblockers by employing anti- its experimental version — Chrome Canary [7]. According to adblockers which can detect and stop adblock users. To counter PageFair [26], 11% of the global Internet population is block- this retaliation, adblockers in turn try to detect and filter anti-adblocking scripts. This back and forth has prompted an ing ads as of December 2016. A recent study by comScore [40] escalating arms race between adblockers and anti-adblockers. reported that 18% of Internet users in the United States use adblockers. Moreover, the prevalence of adblockers is much We want to develop a comprehensive understanding of anti- higher for certain locations and demographics. For instance, adblockers, with the ultimate aim of enabling adblockers to approximately half of 18-34 year old males in Germany use bypass state-of-the-art anti-adblockers. -
PRIVACY in ONLINE ADVERTISING PLATFORMS a Dissertation
PRIVACY IN ONLINE ADVERTISING PLATFORMS a dissertation submitted to the department of telematics engineering and the committee on graduate studies of universitat politecnica` de catalunya in partial fulfillment of the requirements for the degree of doctor of philosophy Jos´eAntonio Estrada Jim´enez July 2020 c Copyright by Jos´eAntonio Estrada Jim´enez2020 All Rights Reserved ii I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. (Jordi Forn´eMu~noz) Principal Co-Adviser I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. (Javier Parra Arnau) Principal Co-Adviser Approved for the University Committee on Graduate Studies. iii iv A A. A. v Abstract Online advertising is consistently considered as the pillar of the \free" content on the Web. By giving websites a way of financing their operation, advertising would be preventing users from being charged for the content consumed on the Web. Besides promoting content creation, this revolution of the marketing business created a myriad of new opportunities for advertisers to reach potential customers at the right time. Furthermore, the option of delivering personalized ads has turned advertising into a service that can be really valuable for end users, who thank receiving ads tailored to their interests. Given its apparent success in getting paying customers, online advertising is fueling a billionaire business in which the largest tech companies are involved. -
Comments of Techfreedom1 Berin Szoka, President Tom Struble
Comments of TechFreedom1 Berin Szoka, President Tom Struble, Legal Fellow International Center for Law and Economics2 Geoffrey Manne, Executive Director Ben Sperry, Associate Director In the Matter of Big Data and Consumer Privacy in the Internet Economy Docket No. 140514424–4424–01 August 5, 2014 1 Berin Szoka is President of TechFreedom, a nonprofit, nonpartisan technology policy think tank. He can be reached at [email protected]. Tom Struble is a Legal Fellow at TechFreedom. He can be reached at [email protected]. 2 Geoffrey A. Manne is the founder and Executive Director of the nonprofit, nonpartisan International Center for Law and Economics (ICLE), based in Portland, Oregon. He is also Senior Fellow at TechFreedom. He can be reached at [email protected]. Ben Sperry is ICLE’s Associate Director. He can be reached at [email protected]. If the purpose of this enterprise is for, as the White House’s Big Data Report ordered, NTIA to “devise draft legislative text for consideration by stakeholders and submission by the President to Congress,”3 the agency has simply missed the key questions: 1. What is wrong with U.S. privacy law, whether in substance or process, that needs fixing? 2. How should we go about assessing whether propose legislative reforms would actually be worth adopting? 3. What evidence do we have to inform such assessments? A serious assessment of the need for new privacy legislation, and the right way to frame it, would not begin by assuming the premise that a particular framework is necessary. Specifically, before recommending any new legislation, the NTIA should do – or ensure that someone does – what the Federal Trade Commission has steadfastly refused to do: carefully assess what is and is not already covered by existing U.S.