Web protocols and practice: HTTP/1.1, Networking protocols, caching, and traffic measurement
Web protocols and practice: HTTP/1.1, Networking protocols, caching, and traffic measurement
Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Measuring privacy loss and the impact of privacy protection in web browsing
Proceedings of the 3rd symposium on Usable privacy and security
Googling Security: How Much Does Google Know About You?
Googling Security: How Much Does Google Know About You?
Privacy diffusion on the web: a longitudinal perspective
Proceedings of the 18th international conference on World wide web
De-anonymizing Social Networks
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
How unique is your web browser?
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
How unique and traceable are usernames?
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Loose tweets: an analysis of privacy leaks on twitter
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Betrayed by your ads!: reconstructing user profiles from targeted ads
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Hi-index | 0.00 |
The task of protecting users' privacy is made more difficult by their attitudes towards information disclosure without full awareness and the economics of the tracking and advertising industry. Even after numerous press reports and widespread disclosure of leakages on the Web and on popular Online Social Networks, many users appear not be fully aware of the fact that their information may be collected, aggregated and linked with ambient information for a variety of purposes. Past attempts at alleviating this problem have addressed individual aspects of the user's data collection. In this paper we move towards a comprehensive and efficient client-side tool that maximizes users' awareness of the extent of their information leakage. We show that such a customizable tool can help users to make informed decisions on controlling their privacy footprint.