IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Tracking and Fingerprinting in E-Business: New Storageless Technologies and Countermeasures

Tracking and Fingerprinting in E-Business: New Storageless Technologies and Countermeasures
View Sample PDF
Author(s): Károly Boda (Budapest University of Technology and Economics, Hungary), Ádám Máté Földes (Budapest University of Technology and Economics, Hungary), Gábor György Gulyás (Budapest University of Technology and Economics, Hungary)and Sándor Imre (Budapest University of Technology and Economics, Hungary)
Copyright: 2013
Pages: 33
Source title: Research and Development in E-Business through Service-Oriented Solutions
Source Author(s)/Editor(s): Katalin Tarnay (University of Pannonia, Hungary & Budapest University of Technology and Economics, Hungary), Sandor Imre (Budapest University of Technology and Economics, Hungary)and Lai Xu (Bournemouth University, UK)
DOI: 10.4018/978-1-4666-4181-5.ch007

Purchase

View Tracking and Fingerprinting in E-Business: New Storageless Technologies and Countermeasures on the publisher's website for pricing and purchasing information.

Abstract

Online user tracking is a widely used marketing tool in e-business, even though it is often neglected in the related literature. In this chapter, the authors provide an exhaustive survey of tracking-related identification techniques, which are often applied against the will and preferences of the users of the Web, and therefore violate their privacy one way or another. After discussing the motivations behind the information-collecting activities targeting Web users (i.e., profiling), and the nature of the information that can be collected by various means, the authors enumerate the most important techniques of the three main groups of tracking, namely storage-based tracking, history stealing, and fingerprinting. The focus of the chapter is on the last, as this is the field where both the techniques intended to protect users and the current legislation are lagging behind the state-of-the-art technology; nevertheless, the authors also discuss conceivable defenses, and provide a taxonomy of tracking techniques, which, to the authors’ knowledge, is the first of its kind in the literature. At the end of the chapter, the authors attempt to draw the attention of the research community of this field to new tracking methods.

Related Content

Emrah Arğın. © 2022. 16 pages.
Ebru Gülbuğ Erol, Mustafa Gülsün. © 2022. 17 pages.
Yeşim Şener. © 2022. 18 pages.
Salim Kurnaz, Deimantė Žilinskienė. © 2022. 20 pages.
Dorothea Maria Bowyer, Walid El Hamad, Ciorstan Smark, Greg Evan Jones, Claire Beattie, Ying Deng. © 2022. 29 pages.
Savas S. Ates, Vildan Durmaz. © 2022. 24 pages.
Nusret Erceylan, Gaye Atilla. © 2022. 20 pages.
Body Bottom