Skip to main content

State of Online Privacy: A Technical Perspective

  • Chapter
Internet Privacy

Part of the book series: acatech Studie ((ACATECHSTUD))

Abstract

Recentyears have seen an unprecedented growth of Internet-based applications and offerings that have a huge impact on individuals’ daily lives and organisations’ (businesses and governments) practices. These applications are bound to bring large-scale data collection, long-term storage, and systematic sharing of data across various data controllers i.e., individuals, partner organizations, and scientists. This creates new privacy issues. For instance, emerging Internet-based applications and the underlying technologies provide new ways to track and profile individual users across multiple Internet domains, often without their knowledge or consent. In this section, we present the current state of privacy on the Internet. The section proposes a review and analysis of current threats to individual privacy on the Internet as well as existing countermeasures. Our analysis considers five emerging Internet-based applications, namely personalized web and E-commerce services, online social networks, cloud computing applications, cyber-physical systems, and Big data. It outlines privacy-threatening techniques, with a focus on those applications. We conclude with a discussion on technologies that could help address different types of privacy threats and thus support privacy on the Web.

Zusammenfassung

Internetbasierte Anwendungen und Angebote haben in den vergangenen Jahren enorme Verbreitung gefunden und prägen heutzutage sowohl die Lebensgestaltung Einzelner als auch Vorgänge in Unternehmen und öffentlichen Einrichtungen. Diese Anwendungen gehen einher mit umfassender Datensammlung, langjähriger Datenspeicherung sowie gezielter Datenweitergabe zwischen Einzelpersonen, Partnerunternehmen und Wissenschaftlern. Hierdurch entstehen noch nie dagewesene Datenschutzprobleme. Beispielsweise ermöglichen internetbasierte Anwendungen und die hierin genutzten Technologien die Profilbildung und Verfolgung einzelner Nutzer über mehrere Internetzonen hinweg - oftmals ohne Wissen oder Einverständnis der Nutzer. In diesem Abschnitt gehen wir auf den aktuellen Stand der Technik im Hinblick auf Privatsphäre und Datenschutz im Internet ein. Hierzu werden die gegenwärtigen Bedrohungen im Hinblick auf Privatsphäre sowie existierende Gegenmaßnahmen beschrieben und analysiert. Die Analyse basiert auf fünf neuartigen internetbasierten Anwendungen: personalisierte Web- und E-Commerce-Angebote, soziale Online-Netzwerke, Cloud Computing, Cyber-Physical Systems und Big Data. Nach Beschreibung dieser Anwendungen werden zunächst die Privatsphäre-bedrohenden Techniken, die verstärkt im Internet eingesetzt werden, erläutert. Anschließend werden Technologien erörtert, die bei entsprechendem Einsatz den Bedrohungen entgegenwirken können und somit Privatsphäre im Internet fördern.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  1. AbuHmed, Tamer/ Mohaisen, Abedelaziz/ Nyang, DaeHun: Magazine of Korea Telecommunication Society, Vol. 24, No. 11:25–36, 2007.

    Google Scholar 

  2. acatech (Hrsg.): Cyber-Physical Systems-Innovationsmotor für Mobilität, Gesundheit, Energie und Produktion (acatech POSITION), Heidelberg u.a.: Springer Verlag 2011. http://www.acatech.de/fileadmin/use_upload/Baumstruktu_nach_Website/Acatech/root/de/Material_fuer_Sonderseiten/cps/acatech_POSITION_CPS_web.pdf

    Google Scholar 

  3. Acquisti, Alessandro/ Gross, Ralph/ Stutzman, Fred: Face Recognition Study, 2011. URL: http://www.heinz.cmu.edu/~acquisti/face-recognition-study-FAQ/

  4. Acquisti, Alessandro/ Gross, Ralph: Predicting Social Security Numbers from Public Data, 106 PROC. NAT’L, ACAD, SCI. 10975-80, 2009.

    Google Scholar 

  5. Abdul-Rahman, Alfarez: The pgp trust model, EDI-Forum, the Journal of Electronic: 1–6. 1997.

    Google Scholar 

  6. Albanesius, Chloe: Web Surfing Activity Vulnerable to ‘History Sniffing’, Report Says. PCMAC, 2010. Alsaid/martin 2002

    Google Scholar 

  7. Alsaid, Adil/ Martin, David: Detecting web bugs with Bugnosis: Privacy advocacy through education, Proceedings of Workshop on Privacy Enhancing Technologies, Springer-Verlag, 2002.

    Google Scholar 

  8. Andersen, David G./ Balakrishnan, Hari/ Feamster, Nick/ Koponen, Teemu/ Moon, Daekyeong/ Shenker, Scott: Accountable Internet Protocol (AIP), Proceedings of the ACM SIGCOMM conference on Data communication SIGCOMM 08 38(4): 339–350, 2008.

    Google Scholar 

  9. Anderson, Matt/Brusa, Jennifer/ Price, Jerell/ Sims, Jo: Turning “Like” to “Buy”: Social Media Emerges as a Commerce Channel, 2011. URL: http://www.booz.com/global/home/what_we_think/reports_and_white_papers/ic-display/49009342 http://www.booz.com/media/uploads/BaC-Turning_Like_to_Buy.pdf

  10. Anderson, Ross/ Fuloria, Shailendra: Who controls the off switch?, First IEEE International Conference Smart Grid Communications (SmartGridComm): 96–101, 2010. URL: http://www.cl.cam.ac.uk/_rja14/Papers/meters-offswitch.pdf

  11. Ansari, Sabeel/ Rajeev, S. G./ Chandrashekar, H. S.: Packet sniffing: a brief introduction, Potentials, IEEE, Vol. 21, No. 5: 17–19, Dec 2002/Jan 2003.

    Google Scholar 

  12. Arshad, Fahd: Privacy Fox-A JavaScript-based P3P Agent for Mozilla Firefox, 2004.

    Google Scholar 

  13. Adolphs, Christoph/ Winkelmann, Axel: A rigorous literature review on personalization research in e-commerce (2000–2008), In Journal of Electronic Commerce Research, Vol. 11: 326–341, 2010.

    Google Scholar 

  14. Adomavicius, Gediminas/ Tuzhilin, Alexander: Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions, Knowledge and Data Engineering, IEEE, Vol. 17, No. 6: 734–749, 2005.

    Article  Google Scholar 

  15. Sarwar, Badrul/ Karypis, George/ Konstan, Joseph/ Riedl, John: Analysis of Recommendation Algorithms for E-Commerce, Proceedings of the 2nd ACM conference on Electronic commerce (EC,00): 158–167, 2000.

    Google Scholar 

  16. Baker/Shah/Rosenthal/Roussopoulos/Maniatis/Giuli/Bungale 2006 Baker, Mary/ Shah, Mehul/ Rosenthal, David S. H./ Rousso-poulos, Mema/ Maniatis, Petros/ Giuli, TJ/Bungale, Prashanth: A Fresh Look at the Reliability of Long-term Digital Storage, Proceedings of Computer systems (Euro-Sys): 221–234, 2006.

    Google Scholar 

  17. Barbaro, Michael/ Zeller, Tom Jr.: A Face Is Exposed for AOL Searcher No. 4417749, The New York Times, 09/08/2006. URL: http://www.nytimes.com/2006/08/09/technology/09aol.html?pagewanted=all

  18. Bender, Adam/ Spring, Neil/ Levin, Dave/ Bhattacharjee, Bobby: Accountability as a service, Proceedings of the 3rd USENIX workshop on Steps to reducing unwanted traffic on the internet, USENIX Association, Article 5, 2007.

    Google Scholar 

  19. Bermann, S.: Privacy and Access to Public Records in the Information Age, Bepress Legal Series, page 1303, 2006.

    Google Scholar 

  20. Besmer, Andrew/ Watson, Jason/ Lipford, Heather Richter: The Impact of Social Navigation on Privacy Policy Configuration, Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS 2010), 2010.

    Google Scholar 

  21. Bittau, Andrea/ Hamburg, Michael/ Handley, Mark/ Mazieres, David/ Boneh, Dan: The case for ubiquitous transport-level encryption, Proceedings of the 19th USENIX conference on Security, 2010.

    Google Scholar 

  22. Bollier, D.: The Promise and Peril of Big Data, Program: 1–66, 2010. URL: http://www.aspeninstitute.org/sites/default/files/content/docs/pu bs/I nfoTech09.pdf

  23. Boutin, Paul: You Are What You Search-AOL’s data leak reveals the seven ways people search the Web, 2006. URL: http://www.slate.com/articles/technology/technology/2006/08/you_are_what_you_search.html

  24. boyd, danah M./ Ellison, Nicole: Social network sites: Definition, history, and scholarship, Journal of Computer-Mediated Communication, Vol. 13, No. 1: 210–230, 2007.

    Article  Google Scholar 

  25. boyd, d, Crawford, K.: Six Provocations for Big Data, Computer: 1–17, 2011. URL: http://ssrn.com/paper=1926431.

  26. Bradley, Tony: Introduction to Packet Sniffing. URL: http://netsecurity.about.com/cs/hackertools/a/aa121403.htm/ [12/1/2012].

  27. Breese, J. S., Heckerman, D., and Kadie, C.: Empirical analysis of predictive algorithms for collaborative filtering, Proceedings of the Fourteenth Conference on University in Artificial Intelligence, Madison, WI, 1998.

    Google Scholar 

  28. Brueckner, Lars/ Voss, Marco: MozPETs-a privacy enhanced Web Browser, Conference on Privacy, Security and Trust, 2005.

    Google Scholar 

  29. Federal Office for Information Security (BSI): White Paper Security Recommendations for Cloud Computing Providers (Minimum information security requirements), 22/06/2011. URL: https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Minimum_information/SecurityRecommendationsCloudComputingProviders.pdf?__blob=publicationFile

  30. S. Buchegger/ D. Schiöberg/ L.H. Vu/ A. Datta: PeerSoN: P2P Social Networking-Early Experiences and Insights, Proceedings of the Second ACM Workshop on Social Network Systems Social Network Systems, 2009.

    Google Scholar 

  31. Buchmann, Johannes / May, Alexander/ Vollmer, Ulrich: Perspectives for cryptographic long-term security, Commun. ACM, Vol. 49, Issue 9: 50–55, 2006.

    Google Scholar 

  32. Calandrino, Joseph A./ Kilzer, Ann/ Narayanan, Arvind/ Felten, Edward W./ Shmatikov, Vitaly: “You Might Also Like:“ Privacy Risks of Collaborative Filtering, Proceedings of the IEEE Symposium on Security and Privacy (SP’11, 2011.

    Google Scholar 

  33. Callas, J./ Donnerhacke, L./ Finney, H./ Shaw, D./ Thayer, R.: RFC 4880: OpenPGP Message Format, The Internet Engineering Task Force, 2007.

    Google Scholar 

  34. Canetti, Ran: Universally Composable Signature, Certification, and Authentication, Proceedings of the 17th IEEE workshop on Computer Security Foundations: 219–233, IEEE Computer Society, Washington, DC, USA, 2004.

    Google Scholar 

  35. Carneiro, Herman Anthony/ Mylonakis, Eleftherios: Google Trends: A Web-Based Tool for Real-Time Surveillance of Disease Outbreaks, 2009/11/15. URL: http://cid.oxfordjournals.org/content/49/10/1557. abstract

  36. Cashmore, P.: Should Facebook add a dislike button?, CNN.com, 22/07/2010. URL:http://edition.cnn.com/2010/TECH/social.media/07/22/facebook.dislike.cashmore/

  37. Castelluccia, Claude: Behavioural Tracking on the Internet: A Technical Perspective, book chapter of European Data Protection: In Good Health?, Springer Netherlands, 2012.

    Google Scholar 

  38. Castelluccia, Claude/ De Cristofaro, Emiliano/ Perito, Daniele: Private Information Disclosure from Web Searches, PETS’10 Proceedings of the 10th international conference on Privacy enhancing technologies Springer-Verlag Berlin, 2010.

    Google Scholar 

  39. Castellucia, Claude/ Druschel, Peter/ Fischer Hübner, Simone/ Pasic, Aljosa/ Preneel, Bart / Tschofenig, Hannes: Privacy, Accountability and Trust — Challenges and Opportunities, European Network and information Security Agency (ENISA), 2010.

    Google Scholar 

  40. Caviglione, L./ Coccoli, M.: Privacy problems with Web 2.0, Computer Fraud Security: 19–16, 2011.

    Google Scholar 

  41. Chaum, David L.: Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, Vol. 24 Issue 2: 84–90, 1981.

    Article  Google Scholar 

  42. Chapple, Mike: Data Mining: An Introduction. URL: http://databases.about.com/od/datamining/a/datamining.htm/ [11/12/2011].

  43. Chellappa, Ramnath K./ Sin, Raymond G.: Personalization versus Privacy: An Empirical Examination of the Online Consumer’s Dilemma, Inf. Technol. and Management, Vol. 6: 181–202,2005.

    Article  Google Scholar 

  44. G. Chen and F. Rahman. Analysing Privacy Designs of Mobile Social Networking Applications, Proc. Int’l. Symp. Trust, Security and Privacy for Pervasive Applications, 2008.

    Google Scholar 

  45. Clarke, Ian/ Miller, Scott G./ Hong, Theodore W./ Sandberg Oskar/ Wiley, Brandon: Protecting Free Expression Online with Freenet. In: IEEE Internet Computing, Vol. 6 Issue 1: 40–49, 2002.

    Article  Google Scholar 

  46. Clauss, Sebastian/ Koehntopp, Marit: Identity management and its support of multilateral security, Computer Networks, Vol. 37, Issue 2: 205–219, 2001.

    Article  Google Scholar 

  47. Clifton, Brian: Web Analiytics-Web Traffic Data Sources & Vendor Comparison, White paper in conjunction with Omega Digital Media Ltd, 2008.

    Google Scholar 

  48. Cloer, Thomas: E-Commerce wird mobiler und sozialer, Computerwoche, 20/10/2011. URL:http://www.computerwoche.de/netzwerke/web/2498237/

  49. Constantin, Lucian: Facebook Spam Worm Propagates via Persistent XSS Vulnerability, Softpedia, 10/03/2011. URL http://news.softpedia.com/news/Facebook-Spam-Worm-Propagates-via-Persistent-XSS-Vulnerability-188934.shtml/ [23/05/2012].

  50. Cranor, Lorrie Faith/ Arjula, Manjula/ Guduru, Praveen: Use of a P3P user agent by early adopters, Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society: 1–10, ACM, 2002.

    Google Scholar 

  51. Cranor, Lorrie Faith: I didn’t buy it for myself’ privacy and ecommerce personalization, In Proceedings of ACM workshop on Privacy in the electronic society (WPES 03): 111–117, 2003.

    Google Scholar 

  52. Cranor, Lorrie Faith/ McDonald, Aleecia M./ Egelman, Serge/ Sheng, Steve: Privacy Policy Trends Report, CyLab Privacy Interest Group, 2007.

    Google Scholar 

  53. Center for Retail Research: Online Retailing: Britain and Europe 2012, 2012. URL: http://www.retailresearch.org/onlineretailing.php, [30/01/2012]

  54. Cloud Security Alliance: Security Guidance for Critical Areas of Focus in Cloud Computing V2.1, 12/2009. URL: http://www.cloudsecurityalliance.org/csaguide.pdf

  55. Cloud Security Alliance: Top Threats to Cloud Computing, 03/2010. URL:http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf

  56. Cutillo, Leucio/ Molva, Refik/ Strufe, Thorsten: Safebook: A privacy-preserving online social network leveraging on real-life trust, IEEE Communications Magazine, Vol. 47,: 94–101, 2009.

    Article  Google Scholar 

  57. Cubrilovic, Nik: URL: https://plus.google.com/105854725972317368943/posts/ [30/05/2012].

  58. Daemen, Joan/ Rijmen, Vincent: The Design of Rijndael: AES-The Advanced Encryption Standard, Springer-Verlag New York, Inc., Secaucus, 2002.

    Book  MATH  Google Scholar 

  59. Daly, Angela: The Legality of Deep Packet Inspection, 2010. URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1628024.

  60. Carmel, David/ Zwerdling, Naama/ Guy, Ido/ Ofek-Koifman, Shila/ Har’el, Nadav /Ronen, Inbal/ Uziel, Erel/ Yogev, Sivan/ Chernov, Sergey: Personalized social search based on the user’s social network, Proceedings of the 18th ACM conference on Information and knowledge management (CIKM,09): 1227–1236, ACM, 2009.

    Google Scholar 

  61. Davison, H. K./Maraist, C./ Bing, M. N.: Friend or Foe? The Promise and Pitfalls of Using Social Networking Sites for HR Decisions, Journal of Business and Psychology, Vol. 26, Issue: 2: 153–159,2011.

    Article  Google Scholar 

  62. The World Economic Forum: Big Data, Big Impact: New Possibilities for International Development, 2012. URL: http://www.weforum.org/reports/big-data-big-impact-new-possibilitiesinternational-development

  63. Deloitte: Social network advertising: how big can it get?, 2011. URL: http://www.deloitte.com/view/en_GX/global/industries/technology-media-telecommunications/tmt-predictions-2011/media-2011/eab5bcd1ed47d210VgnVCM2000001b-56f00aRCRD.htm, [Last visited 30/01/2012].

  64. Dierks, Tim/ Rescorla, Eric: RFC 5246: The Transport Layer Security (TLS) Protocol Version 1.2. IETF., The Internet Engineering Task Force, 2008.

    Google Scholar 

  65. Diesburg, Sarah M./ Wang, An-I Andy: A survey of confidential data storage and deletion methods, ACM Computing Surveys, Vol. 43 Issue 1, Article No. 2, 2010.

    Google Scholar 

  66. Dingledine, Roger/ Mathewson, Nick/ Syverson Paul: Tor: The second-generation onion router, Proceedings of the 13th conference on USENIX Security Symposium, Vol. 13: 303–320, 2004.

    Google Scholar 

  67. EU Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the EC, 23, 1995.

    Google Scholar 

  68. Dobias, Jaromir: Privacy Effects of Web Bugs Amplified by Web 2.0, Book Chapter of Privacy and Identity Management for Life, Springer Boston, 2011.

    Google Scholar 

  69. Douceur, John R: The Sybil Attack, International Workshop on Peer-To-Peer Systems, Lecture Notes in Computer Science, Vol. 2429: 251–260, Springer Berlin/Heidelberg, 2002.

    Google Scholar 

  70. Duc, Guillaume/ Keryell, Ronan: CryptoPage: An Efficient Secure Architecture with Memory Encryption, Integrity and Information Leakage Protection, Computer Security Applications Conference: 483–492, 2006.

    Google Scholar 

  71. Dumitru, Bogdan: The Risks of Social Networking and the Corporate Network, 2009. URL: http://www.itbusinessedge.com/cm/community/features/guestopinions/blog/the-risks-of-social-networking-and-the-corporatenetwork/?cs=33877

  72. Dwork, Cynthia: Differential Privacy: A Survey of Results, Theory and Applications of Models of Computation, Lecture Notes in Computer Science Vol. 4978: 1–19, Springer Berlin/Heidelberg, 2008.

    Google Scholar 

  73. Dwork, Cynthia/Smith, Adam: Differential Privacy for Statistics: What we Know and What we Want to Learn, Journal of Privacy and Confidentiality, Vol. 1 Issue 2: 135–154, 2009.

    Google Scholar 

  74. Eckersley, Peter: How Unique Is Your Web Browser?, Privacy Enhancing Technologies: 1-18, 2010.

    Google Scholar 

  75. Edelman, Benjamin: Adverse selection in online “trust” certifications, Proceedings of the 11th International Conference on Electronic Commerce: 205–212, ACM New York, 2009.

    Google Scholar 

  76. Edwards, Cliff/ Riley, Michael: Sony Data Breach Exposes Users to Years of Identity-Theft Risk. Bloomberg, 03/05/2011. URL: http://www.bloomberg.com/news/2011-05-03/sonybreach-exposes-users-to-identity-theft-as-credit-card-threatrecedes.Html

  77. Egele, Manuel/ Moser, Andreas/ Kruegel, Christopher/Kirda, Engin: PoX: Protecting users from malicious Facebook applications, IEEE PERCOM Workshops, 2011.

    Google Scholar 

  78. Eirinaki, Magdalini/ Vazirgiannis, Michalis: Web mining for web personalization, ACM Trans. Internet Technol. 3, 1: 1–27, 2003.

    Article  Google Scholar 

  79. El Gamal, Taher: A public key cryptosystem and a signature scheme based on discrete logarithms, Proceedings of CRYPTO 84 on Advances in cryptology: 10–18, Springer-Verlag New York, Inc., 1985.

    Google Scholar 

  80. E-Marketer: US M-Commerce Sales to Grow 91% to $6.7 Billion in 2011,01/12/2011. URL:http://www.emarketer.com/PressRelease.aspx?R=1008716

  81. Enck, William/ Butler, Kevin/ Richardson, Thomas/ McDaniel, Patrick/ mith, Adam: Defending Against Attacks on Main Memory Persistence, Proceedings of the 2008 Annual Computer Security Applications Conference: 65–74, IEEE Computer Society, 2008.

    Google Scholar 

  82. Enev, Miro / Gupta, Sidhant / Kohno, Tadayoshi/ Patel, Shwetak: Televisions, Video Privacy, and Powerline Electromagnetic Interference, http://abstract.cs.washington.edu/~miro/docs/ccs2011.pdf

  83. ENISA: Security Issues and Recommendations for Online Social Networks, Position Paper,11/2007. URL:http://fredstutzman.com/papers/ENISA2007.pdf

  84. ENISA: Cloud Computing Risk Assessment, 2009. URL: http://www.enisa.europa.eu/act/rm/files/deliverables/cloudcomputing-risk-assessment/at_download/fullReport

  85. Re-identification. URL: http://epic.org/privacy/reidentification/ [23/05/2012].

  86. Del Sesto, Ronald W. Jr./ Frankel, Jon: How deep Packet Inspection changed the Privacy debate, Bingham (Law Firm), 2008. URL: http://www.bingham.com/Publications/Files/2008/09/How-Deep-Packet-Inspection-Changed-the-Privacy-Debate/ [30/5/2012].

  87. Facebook: The Value of a Liker by Facebook + Media, 29/09/2010. URL: http://www.facebook.com/notes/facebook-media/value-of-a-liker/150630338305797

  88. Fletcher, Dan: How Facebook Is Redefining Privacy, Time Magazine, 20/05/2010. URL: http://www.time.com/time/magazine/article/0,9171,1990798,00.html#ixzz1lpfqrijz

  89. Federal Trade Commission: Online Profiling: A Report to Congress-Part 2-Recommendations, 2000.

    Google Scholar 

  90. Federal Trade Commission, FTC Staff Report: Self-Regulatory Principles For Online Behavioral Advertising-Behavioral Advertising Tracking, Targeting, & Technology, 02/2009. URL: http://www.ftc.gov/os/2009/02/P085400behavadreport.pdf

  91. Federal Trade Commission: Protecting Consumer Privacy in an Era of Rapid Change, 2010. URL: http://www.ftc.gov// [23/05/2012].

  92. Freudiger, J./ Shokri, R./ Hubaux, J.-P.: Evaluating the Privacy Risk of Location-Based Services, Financial Cryptography and Data Security (FC), 2011.

    Google Scholar 

  93. Friedland, G./ Sommer, R.: Cybercasing the joint: On the privacy implications of geo-tagging, USENIX Workshop on Hot Topics in Security, 2010.

    Google Scholar 

  94. Shen et al.: Dataquest Insight: The Top 10 Consumer Mobile Applications in 2012, Gartner Research, 2009.

    Google Scholar 

  95. Gartner, Inc.: Forecast: Public Cloud Services, Worldwide and Regions, Industry Sectors, 2009-2014. 02/6/2010. URL: http://www.gartner.com/resId=1378513

  96. Gerck, Ed.: Trust as Qualified Reliance on Information Trust as Qualified, Reading: 1071–6327, 2002. URL: http://nma.com/papers/it-trust-part1.pdf

  97. Geyer, Werner/ Freyne, Jill/ Mobasher, Bamshad/ Anand, Sarabjot Singh/ Dugan, Casey: Recommender Systems and the Social Web, 2nd workshop on recommender systems and the social web, Proceedings of the fourth ACM conference on Recommender systems (RecSys, 10): 379–380, ACM, 2010.

    Google Scholar 

  98. Ginsberg, Jeremy/ Mohebbi, Matthew H./ Patel, Rajan S./ Brammer, Lynnette/ Smolinski, Mark S./ Brilliant, Larry: Detecting influenza epidemics using search engine query data, Nature, Vol. 457, Macmillan Publishers, 2009.

    Google Scholar 

  99. Goldschlag, David/ Reed, Michael/ Syverson, Paul: Onion routing, Communications of the ACM, Vol. 42 Issue 2: 39–41, 1999.

    Article  Google Scholar 

  100. Beware! Google Reader Notifier for Firefox Is Now Crap-wared. URL: http://www.howtogeek.com/howto/2585/beware-google-reader-notifierfor-firefox-is-now-crapware/ [30/05/2012].

  101. Goy, Anna/ Ardissono, Liliana/ Petrone, Giovanna: Personalization in e-commerce applications. In the adaptive web, Peter Brusilovsky, Alfred Kobsa, and Wolfgang Nejdl (Eds.), Lecture Notes In Computer Science, Vol. 4321, Springer-Verlag, 2007.

    Google Scholar 

  102. Gotz, Michaela/ Machanavajjhala, Ashwin/ Wang, Guozhang/ Xiao, Xiaokui/ Gehrke, Johannes: Publishing Search Logs — A Comparative Study of Privacy Guarantees, IEEE Trans. On Knowl. and Data Eng. Vol. 24:520–532, 2012.

    Article  Google Scholar 

  103. Grance, T./ Jansen, W.: Guidelines on Security and Privacy in Public Cloud Computing, NIST, NIST SP-800-144, 2011. URL: http://www.nist.gov/manuscript-publicationsearch.cfm?pub_id=909494

  104. Grandison, Tyrone/ Sloman, Morris: A survey of trust in internet applications, IEEE Communications Surveys & Tutorials, Vol. 3 No. 4: 2–16, 2000.

    Article  Google Scholar 

  105. Griffiths, Sarah: Mobile social networking apps spark privacy concerns, Hexus, 2010. URL: http://hexus.net/business/news/internet/25288-mobile-social-networkingapps-spark-privacy-concerns// [23.05.2012].

  106. Gross, R./ Acquisti, A.: Privacy and Information Revelation in Online Social Networks, ACM Workshop on Privacy in the Electronic Society: 71–80, 2005.

    Google Scholar 

  107. Guarda, P./ Zannone, N.: Towards the development of privacy-aware systems, Inf. Softw. Technol., Vol. 51: 337–350, 2009.

    Article  Google Scholar 

  108. Hagen, P. R./ Manning, H./ Souza, R.: Smart personalization, Technical report, Forrester Research, Cambridge, MA, 1999.

    Google Scholar 

  109. Halderman, J. Alex/ Schoen, Seth D./ Heninger, Nadia/ Clarkson, William/ Paul, William/ Calandrino, Joseph A./ Feldman, Ariel J./ Appelbaum, Jacob/ Felten, Edward W.: Lest we remember: cold-boot attacks on encryption keys, Communications of the ACM, Vol. 52 Issue 5:91–98, 2009.

    Article  Google Scholar 

  110. Hansen, Marit/ Schwartz, Ari/Cooper, Alissa: Privacy and Identity Management, IEEE Security & Privacy, Vol. 6 No. 2: 38–45, 2008.

    Article  Google Scholar 

  111. Hansen, Marit/ Pfitzmann, Andreas/ Steinbrecher, Sandra: Identity management throughout one’s whole life, Inf. Secur. Tech., Vol. 13, No. 2: 83–94, 2008.

    Article  Google Scholar 

  112. Hansen, Marit: Putting Privacy Pictograms into Practice-a European Perspective, GI Jahrestagung 2009, 2009

    Google Scholar 

  113. Head, Milena/ Yuan, Yufei: Privacy Protection in Electronic Commerce: A Theoretical Framework, Human Systems Management, 20: 149–160, 2001.

    Google Scholar 

  114. Hedbom, Hans: iA Survey on Transparency Tools for Enhancing Privacy. In: The Future of Identity in the Information Society, Springer, Vol. 298: 67–82, 2009.

    Article  Google Scholar 

  115. Heuston, George Z.: Privacy concerns: From social media aggregation to aggravation. URL: http://www.oregonlive.com/argus/index.ssf/2011/01/privacy_concerns_from_social_m.html/ [03/02/2012].

  116. Hilty, Manuel/ Pretschner, Alexander/ Basin, David/ Schaefer, Christian/ Walter, Thomas: Monitors for usage control. In: Trust Management, Springer, Vol. 238: 411–414, 2007.

    Article  Google Scholar 

  117. Hill, Kashmir: Mark Zuckerberg’s private photos exposed due to Facebook flaw, Forbes, 12/06/2011. URL: http://www.forbes.com/sites/kashmirhill/2011/12/06/mark-zuckerbergs-private-photos-exposed-thanks-to-facebookflaw/ [23/05/2012].

  118. Congress of the USA: The Health insurance portability and accountability act, In: Congress of the USA, 1996.

    Google Scholar 

  119. Ho, Shuk Ying/ Kwok, Sai Ho: The attraction of personalized service for users in mobile commerce: an empirical study, SIGecom Exch. 3, 4:10–18, 2003.

    Article  Google Scholar 

  120. Ho, S. Y./ Tam, K. Y: An Empirical Examination of the Effects of Web Personalization at Different Stages of Decision Making, International Journal of Human-Computer Interaction, Vol. 19, Issue 1:95–112,2005.

    Article  MathSciNet  Google Scholar 

  121. Hoffman, P: RFC 3207: SMTP service extension for secure SMTP over Transport Layer Security, The Internet Engineering Task Force, 2002.

    Google Scholar 

  122. Hu, Hongxin/ Ahn, Gail-Joon: Multiparty authorization framework for data sharing in online social networks, Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy (DBSec’11):, 29–43, Yingjiu Li (Ed.). Springer-Verlag, Berlin/Heidelberg, 2011.

    Google Scholar 

  123. Hu, Wen-Chen/ Zong, Xuli / Lee, Chung-wei/ Yeh, Jyh-haw: World Wide Web usage mining systems and technologies, Journal on Systemics, Cybernetics, and Informatics, 1(4): 53–59, 2003.

    Google Scholar 

  124. Hull, Gordon/ Lipford, Heather Richter/ Latulipe, Celine: Contextual gaps: privacy issues on Facebook, Ethics and Inf. Technol. Vol. 13,4: 289–302, 2011.

    Article  Google Scholar 

  125. Interactive Advertising Bureaux (IAB) Europe, Europe’s online ad market continues to grow despite the recession, 2010. URL: http://www.iabeurope.eu/news/europe%27s-onlinead-market-continues-to-grow-despite-the-recession.aspx/ [26/05/2012].

  126. Interactive Advertising Bureaux (IAB) Europe, ONLINE DISPLAY ADVERTISING BOUNCES BACK, 2011. URL:http://www.iabeurope.eu/news/online-display-advertisingbounces-back.aspx/ [26/05/2012].

  127. PricewaterhouseCoopers, IAB Internet Advertising Revenue Report, 2011. URL:http://www.iab.net/insights_research/industry_data_and_landscape/adrevenuereport/ [26/05/2012].

  128. International Telecommunication Union, Measuring the Information Society, Geneva 2011.

    Google Scholar 

  129. Internet World Stats, World Internet Usage and Population statistics, 31/12/2011. URL: http://www.internetworldstats.com/stats.htm/ [26/07/2012].

  130. Invoke, Invoke Live! Social Commerce, Key Findings Report, 15/10/2010. URL: http://www.invoke.com/sites/default/files/m-files/lnvokeLive-2010-SocialCommerceReport.pdf/ [26/07/2012].

  131. Irani, Danesh/ Webb, Steve/ Li, Kang/ Pu, Calton: Large Online Social Footprints—An Emerging Threat, International Conference on Computational Science and Engineering 3: 271–276, 2009.

    Google Scholar 

  132. Irani, Danesh/ Webb, Steve/ Pu, Calton/ Li, Kang: Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks, Internet Computing, IEEE, Vol. 15, No. 3:13–19, 2011.

    Article  Google Scholar 

  133. Tom N. Jagatic, Nathaniel A. Johnson, Markus Jakobsson, and Filippo Menczer. 2007. Social phishing. Commun. ACM 50,10 (October 2007), 94–100.

    Article  Google Scholar 

  134. Jang, Dongseok/ Jhala, Ranjit/ Lerner, Sorin/ Shacham, Hovav: An empirical study of privacy-violating information flows in JavaScript web applications, Proceedings of ACM conference on Computer and communications security (CCS, 10):270–283, 2010.

    Google Scholar 

  135. Jendricke, Uwe/ Markotten, Daniela Gerd: Usability meets security-the Identity-Manager as your personal security assistant for the Internet, Proceedings of the 16th Annual Computer Security Applications Conference, IEEE Computer Society, 2000.

    Google Scholar 

  136. Johnson III, Clay: Safeguarding against and responding to the breach of personally identifiable information, Office of Management and Budget Memorandum, 2007.

    Google Scholar 

  137. Jones, Rosie/ Kumar, Ravi/ Pang, Bo/ Tomkins, Andrew: „I know what you did last summer”: query logs and user privacy, Proceedings of the sixteenth ACM conference on Conference on information and knowledge management (CIKM,07): 909–914, ACM, 2007.

    Google Scholar 

  138. John, Jean: Facebook CSRF and XSS vulnerabilities Destructive worms on a social network, 05/10/2010. URL: http://www.john-jean.com/blog/advisories/facebook-csrf-and-xssvulnerabilities-destructive-worms-on-a-social-network-350/ [26/07/2012].

  139. Josang, Audun/ Ismail, Roslan/ Boyd, Colin: A survey of trust and reputation systems for online service provision. In: Decision Support Systems, Vol. 43 Issue 2: 618–644, Elsevier Science Publishers, 2007.

    Article  Google Scholar 

  140. Kamkar, Samy: Evercookie-never forget, URL: http://samy.pl/evercookie/ [23/02.2012].

  141. Kaushik, Avinash: Web Analytics: An Hour a Day. SYBEX Inc., 2007.

    Google Scholar 

  142. Kaushik, Avinash: Web Analytics 2.0: The Art of Online Accountability and Science of Customer Centricity, Wiley Publishing, Inc., 2010.

    Google Scholar 

  143. Kent, S./ Seo K.: RFC 4301: Security Architecture for the Internet Protocol. Internet Engineering Task Force, 2005.

    Google Scholar 

  144. Ko, Moo Nam/ Cheek, Gorrell P./ Shehab, Mohamed/Sand-hu, Ravi: Social-Networks Connect Services, Computer, Vol. 43, No.8: 37–43, 2010.

    Article  Google Scholar 

  145. Kobsa/ Alfred: Tailoring Privacy to Users’ Need, Proceedings of the 8th International Conference on User Modeling 2001 (UM,01): 303–313, Mathias Bauer, Piotr J. Gmytrasiewicz, and Julita Vassileva (Eds.). Springer-Verlag, London, 2001.

    Google Scholar 

  146. Kobsa, Alfred: A Component Architecture for Dynamically Managing Privacy Constraints in Personalized Web-Based Systems, Privacy Enhancing Technologies: 177–188, 2003.

    Google Scholar 

  147. Kobsa, Alfred: Privacy-enhanced web personalization, In The adaptive web, Peter Brusilovsky, Alfred Kobsa, and Wolfgang Nejdl (Eds.), Lecture Notes In Computer Science, Vol. 4321: 628–670, Springer-Verlag, Berlin/Heidelberg, 2007.

    Chapter  Google Scholar 

  148. Kolovski, Vladmimir/ Hendler, James: XACML Policy Analysis Using Description Logics, Proceedings of the 15th International World Wide Web Conference: 494–497, 2007.

    Google Scholar 

  149. Krishnamurthy, Balachander/ Wills, Craig: Characterizing privacy in online social networks, WOSN'08: Proceedings of the first workshop on Online social networks, 2008.

    Google Scholar 

  150. Krishnamurthy, Balachander/ Wills, Craig: On the Leakage of Personally Identifiable Information Via Online Social Networks, Proceedings of ACM SIGCOMM Workshop on Online Social Networks, 2009.

    Google Scholar 

  151. Krishnamurthy, Balachander/ Wills, Craig.E.: Privacy leakage in mobile online social networks, Proceedings of the 3rd conference on Online social networks, 4–4, 2010.

    Google Scholar 

  152. Kristol, David M.: HTTP Cookies: Standards, privacy, and politics, ACM Trans. Internet Techn. 1(2): 151–198, 2001.

    Article  Google Scholar 

  153. Kuhlmann, Dirk/ Gehring, Robert A.: Trusted Platforms, DRM, and Beyond, In E. Becker, W. Buhse, D. Günnewig, & N. Rump (Eds.), Digital Rights Management Technological Economic Legal and Political Aspects: 178–205, Springer Berlin/Heidelberg, 2003.

    Chapter  Google Scholar 

  154. Kundra, Vivek (US Chief Information Officer): Federal Cloud Computing Strategy, 8/2/2011. URL: http://www.cio.gov/documents/Federal-Cloud-Computing-Strategy.pdf/ [26/07/2012].

  155. Korolova, A.: Privacy Violations Using Microtargeted Ads: A Case Study, Impressions: 27–49, 2010.

    Google Scholar 

  156. Köpsell, Stefan: Entwicklung und Betrieb eines Anonymisierungsdienstes für das WWW, Dissertation, Technische Universität Dresden, 2010.

    Google Scholar 

  157. Landesman, Mary: Browser History Sniffing and Other Tracking Techniques. URL: http://antivirus.about.com/od/securitytips/a/historysniffing.htm/ [23/02/2012].

  158. F. Lardinois: PleaseRobMe and the Dangers of Location-Based Social Networks, ReadWriteWeb, 02/2010. URL:http://www.readwriteweb.com/archives/pleaserobme_and_the_dangers_of_location-aware_social_networks.php/ [26/07/2012].

  159. Langheinrich, Marc/ Karjoth, Günter: Social Networking and the Risk to Companies and Institutions, In Information Security Technical Report, Special Issue: Identity Reconstruction and Theft, Issue 15 (2010):51–56, Elsevier, 2011.

    Google Scholar 

  160. Larsen, Niels Elgaard: Privacy in The Polippix Project, IT-Political Association of Denmark (IT-POL), 2008.

    Google Scholar 

  161. Lee, E.A: Cyber-Physical Systems — Are Computing Foundations Adequate? 1–6, 2006.

    Google Scholar 

  162. Lee, E.: Cyber physical systems: Design challenges, IEEE International Symposium Object Oriented Real-Time Distributed Computing (ISORC): 363–369, 2008.

    Google Scholar 

  163. Leech, M/ Ganis, M/ Lee, Y/ Kuris, R/ Koblas, D/ Jones, L: RFC 1928: SOCKS Protocol Version 5. The Internet Engineering Task Force, 1996.

    Google Scholar 

  164. Leenes, Ronald/ Schallaböck, Jan/ Hansen, Marit: PRIME White Paper. PRIME (Privacy and Identity Management for Europe), 2008.

    Google Scholar 

  165. Li, Ninghui/ Li, Tiancheng/ Venkatasubramanian, Suresh: t-closeness: Privacy beyond k-anonymity and ldiversity, Data Engineering, Vol. 3: 106–115, 2007.

    Google Scholar 

  166. Li, Nan/ Chen, Guanling: Sharing location in online social networks, Network, IEEE, Vol. 24, No. 5: 20–25, 2010.

    Article  Google Scholar 

  167. Löhr, Hans/Ramasamy, HariGovind V./ Sadeghi, Ahmad-Reza/ Schulz, Stefan/ Schunter, Matthias/ Stüble, Christian: Enhancing Grid Security Using Trusted Virtualization, Lecture Notes in Computer Science, Vol. 4610:372–384, 2007.

    Article  Google Scholar 

  168. Lotan, G./ Graeff, E./ Ananny, M./ Gaffney, D./ Pearce, I.,/ boyd, d.: The Revolutions Were Tweeted: Information Flows During the 2011 Tunisian and Egyptian Revolutions. International Journal of Communications, Vol. 5: 1375–1405, 2011.

    Google Scholar 

  169. Ma, Hao/ Zhou, Tom Chao/ Lyu, Michael R./ King, Irwin: Improving Recommender Systems by Incorporating Social Contextual Information, ACM Trans. Inf. Syst. 29, Vol. 2, Article 9, 2011.

    Google Scholar 

  170. Machanavajjhala, Ashwin/ Gehrke, Johannes/ Kifer, Daniel: L-diversity: Privacy beyond k-anonymity, ACM Transactions on Knowledge Discovery from Data (TKDD), Vol. 1, Issue 1, 2007.

    Google Scholar 

  171. Machanavajjhala, Ashwin/ Kifer, Daniel/ Gehrke, Johannes/ Venkitasubramaniam, Muthuramakrishnan: L-diversity: Privacy beyond k-anonymity, ACM Transactions on Knowledge Discovery from Data, Vol. 1, Issue 1, 2007.

    Google Scholar 

  172. Machanavajjhala, Ashwin/ Korolova, Aleksandra/ Das Sarma, Atish: Personalized Social Recommendations-Accurate or Private?, Journal Proceedings of the VLDB Endowment, Vol. 4, Issue 7, April 2011.

    Google Scholar 

  173. Madria, Sanjay Kumar/ Bhowmick, Sourav S./ Ng, Wee Keong/ Lim, Ee-Peng: Research Issues in Web Data Mining, in Proceedings of Data Warehousing and Knowledge Discovery, DaWaK 1999.

    Google Scholar 

  174. Madejski, Michelle/ Johnson, Maritza/ Bellovin, Steven M.: The failure of online social network privacy settings, Technical Report CUCS-010-11, Department of Computer Science, Columbia University, 2011.

    Google Scholar 

  175. Manyika, James/ Chui, Michael/ Brown, Brad/ Bughin, Jacques/ Dobbs, Richard/ Roxburgh, Charles/Byers, Angela Hung: Big data: The next frontier for innovation, competition, and productivity, McKinsey Global Institute, 2011. URL: http://www.mckinsey.com/Insights/MGI/Research/Technology_and_Innovation/Big_data_The_next_frontier_for_innovation

  176. Masiello, Betsy/ Whitten, Alma: Engineering Privacy in an Age of Information Abundance, Intelligent Information Privacy Management: 119–24, 2010.

    Google Scholar 

  177. Marlinspike, M.: New Techniques for Defeating SSL/TLS, Black Hat DC, 2009. URL:http://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf

  178. Madden, Mary: “Privacy Management on Social Media Sites,” The Pew Research Center’s Internet and American Life Project, 2012.

    Google Scholar 

  179. McCallister, E./ Grance, T.,/ Scarfone, K.: Guide to Protecting the Confidentiality of Personally Identifiable Information (PII), NIST Special Publication. U.S. Dept. of Commerce, National Institute of Standards and Technology, 2010.

    Google Scholar 

  180. McCoy, Damon/ Bauer, Kevin/ Grunwald, Dirk/ Kohno, Tadayoshi/ Sicker, Douglas: Shining Light in Dark Places: Understanding the Tor Network, Proceedings of the 8th international symposium on Privacy Enhancing Technologies: 63–76, Springer-Verlag, Berlin, Heidelberg, 2008.

    Google Scholar 

  181. McDonald, A./ Cranor, L.: The Cost of Reading Privacy Policies, In Technology Policy Research Conf., 2008.

    Google Scholar 

  182. McKinley, Katherine: Cleaning Up After Cookies Version 1.0, San Francisco 2008.

    Google Scholar 

  183. McSherry, Frank/ Mironov, Ilya: Differentially private recommender systems: building privacy into the ne, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD,09): 627–636, ACM, 2009.

    Google Scholar 

  184. Menezes, Alfred J/ Van Oorschot, Paul C/ Vanstone, Scott A: Handbook of Applied Cryptography, CRC Press, 1996.

    Google Scholar 

  185. Meyer, David: The Schleswig-Holstein Question, BBC News. 10/09/2011. URL: http://www.bbc.co.uk/news/technology-14859813

  186. Mills, Elinor: Hackers release credit card, other data from Stratfor breach, CNET News, 30/12/2011. URL: http://news.cnet.com/8301-27080_3-57350361-245/hackersrelease-credit-card-other-data-from-stratfor-breach/ [26/07/2012].

  187. Mobasher, Bamshad/ Dai, Honghua/ Luo, Tao/ Sun Yuqing/ Zhu, Jiang: Integrating Web Usage and Content Mining for More Effective Personalization, Proceedings of the First International Conference on Electronic Commerce and Web Technologies (EC-WEB,00),. Springer-Verlag, London, 2000.

    Google Scholar 

  188. Mobasher, Bamshad: Data Mining for Web Personalization, In The Adaptive Web: Methods and Strategies of Web Personalization, Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.). Lecture Notes in Computer Science, Vol. 4321: 90–135, Springer, Berlin/ Heidelberg, 2007.

    Chapter  Google Scholar 

  189. Mochalski, Klaus/ Schulze, Hendrik: Deep Packet Inspection-Technology, Applications & Net Neutrality, Forum American Bar Association, Vol. 24, Issue 1, 2010.

    Google Scholar 

  190. Mui, Lik/ Mohtashemi, Mojdeh/ Halberstadt, Ari: A Computational Model of Trust and Reputation for E-businesses, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, Volume 7: 2431–2439, IEEE Computer Society, 2002.

    Article  Google Scholar 

  191. Murphy, Glen D./ Salomone, Sonia: Using Enterprise 2.0 tools to facilitate knowledge transfer in complex engineering environments, 2010.

    Google Scholar 

  192. Narayanan, Arvind/ Shmatikov, Vitaly: Robust Deanonymization of Large Sparse Datasets, Proceedings of the IEEE Symposium on Security and Privacy (SP,08): 111–125, IEEE Computer Society, 2008.

    Google Scholar 

  193. Narayanan, Arvind/ Shmatikov, Vitaly: De-anonymizing Social Networks, IEEE S&P 2009.

    Google Scholar 

  194. Newman, C: RFC 2595: Using TLS with IMAP, POP3 and ACAP, 1999.

    Google Scholar 

  195. Ni, Qun/ Bertino, Elisa/ Lobo, Jorge/ Calo, Seraphin B: Privacy-Aware Role Based Access Control, IEEE Security & Privacy, Vol. 7, Issue 4: 35–43, 2009.

    Article  Google Scholar 

  196. The Nielsen Company, Social Networking and Blog Sites Capture More Internet Time and Advertising, 2009. URL:http://blog.nielsen.com/nielsenwire/online_mobile/social-networking-and-blog-sites-capture-more-internet-time-and-advertisinga/ [23/05/2012].

  197. Nielsenwire, Social Networks/Blogs Now Account for One in EveryFour and a Half Minutes Online, 2010. URL:http://blog.nielsen.com/nielsenwire/global/social-mediaaccounts-for-22-percent-of-time-online/ [23/05/2012].

  198. Nielsen: Social Media Report: Q3, 2011. URL: http://blog.nielsen.com/nielsenwire/social/ [23/05/2012].

  199. Nissenbaum/ Helen: Privacy in Context: Technology, Policy, and the Integrity of Social Life, Palo Alto, CA: Stanford University Press, 2010.

    Google Scholar 

  200. National Energy Technology Laboratory (NETL), The Modern Grid Strategy Vision, 2009. URL: http://www.netl.doe.gov/moderngrid/vision.html/ [23/05/2012].

  201. The Smart Grid Interoperability Panel-Cyber Security Working Group, Smart grid cyber security strategy and requirements (draft nistir 7628), The National Institute of Standards and Technology (NIST), Tech. Rep., 2010.

    Google Scholar 

  202. Nofer, Michael/ Hinz, Oliver/ Muntermann, Jan/ Roßnagel, Heiko: Assessing the Economic Impact of Privacy Violations and Security Breaches-The Case of the Financial Industry, TU Darmstadt, Germany, 2011.

    Google Scholar 

  203. nVision: E-commerce across Europe-Progress and prospects, London, UK, 2008.

    Google Scholar 

  204. Owad, Tom: Data Mining 101: Finding Subversives with Amazon Wishlists, 04/01/2006. URL: http://www.applefritter.com/bannedbooks

  205. Page, Lawrence/ Brin, Sergey/ Motwani, Rajeev/ Winograd, Terry: The PageRank Citation Ranking: Bringing Order to the Web, Technical Report, Stanford InfoLab, 1998.

    Google Scholar 

  206. Pamnani, Rajni/ Chawan, Pramila: Web Usage Mining: A Research Area in Web Mining, International Conference on Recent Trends in Computer Engineering, ISCET, RIMT, 2010.

    Google Scholar 

  207. Park, Jaehong/ Sandhu, Ravi: Towards usage control models: beyond traditional access control, Proceedings of the seventh ACM symposium on Access control models and technologies: 57–64, ACM, New York, NY, USA, 2002.

    Google Scholar 

  208. Peterson, P.A.H.: Cryptkeeper: Improving security with encrypted RAM, IEEE International Conference on Technologies for Homeland Security: 120–126, 2010.

    Google Scholar 

  209. Executive Office of the President President’s Council of Advisors on Science and Technology (PCAST), REPORT TO THE PRESIDENT AND CONGRESS DESIGNING A DIGITAL FUTURE: FEDERALLY FUNDED RESEARCH AND DEVELOPMENT IN NETWORKING AND INFORMATION TECHNOLOGY, DECEMBER 2010, http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-nitrd-report-2010.pdf

  210. Pfitzmann, Andreas/ Hansen, Marit: A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management, Internet-Draft, 2010.

    Google Scholar 

  211. Pike Research, Smart Grid Data Analytics, 2011. URL: http://www.pikeresearch.com/research/smart-grid-data-analytics

  212. Powers, Calvin S/ Ashley Paul/ Schunter Matthias: Privacy Promises, Access Control, and Privacy Management. Enforcing Privacy Throughout an Enterprise by Extending Access Control, Proceedings Third International Symposium on Electronic Commerce: 13–21, IEEE, 2002.

    Google Scholar 

  213. Raggett, Dave (ed.): Privacy Enhancing Browser Extensions Deliverable: D 1.2.3., 28/2/2011. URL: http://www.w3.org/2011/D1.2.3/

  214. Jacobson, David: Digital mobility drives you-You drive digital mobility, PricewaterhouseCoopers, 2011. URL: http://www.pwc.com/ca/en/technology-consulting/technology-advisory/digita l-mobility-white-paper.jhtml

  215. E. L. Quinn: Privacy and the new energy infrastructure, 2/2009. URL: http://ssrn.com/abstract=1370731.

  216. Ramakrishnan, Naren/ Keller, Benjamin J./ Mirza, Batul J./ Grama, Ananth Y./ Karypis, George: Privacy Risks in Recommender Systems, Journal IEEE Internet Computing, Volume 5, Issue 6, IEEE Educational Activities Department Piscata-way, 2001.

    Google Scholar 

  217. Raice, Shayndi: LinkedIn Retreats in Privacy Flap, The Wall Street Journal, 8/2011. URL: http://online.wsj.com/article/SB10001424053111904823804576502860557223074.html

  218. Rao, Josyula R./ Rohatgi, Pankaj: Can Pseudonymity Really Guarantee Privacy?, Proceedings of the 9th conference on USENIX Security Symposium, Vol. 9: 85–96, USENIX Association, 2000.

    Google Scholar 

  219. Reed, Michael/ Syverson, Paul/ Goldschlag, David: Anonymous connections and onion routing, IEEE Journal on Selected Areas in Communications, Vol. 16, Issue 4:482–494, 1998.

    Article  Google Scholar 

  220. Rescorla, Eric: RFC 2818: HTTP Over TLS. The Internet Engineering Task Force, 2000.

    Google Scholar 

  221. Resnick, P./ Varian, H. R.: Recommender Systems, Magazine Communications of the ACM, Vol. 40, Issue 3, ACM, 1997.

    Google Scholar 

  222. Resnick, Paul/ Kuwabara, Ko/ Zeckhauser, Richard/ Friedman, Eric: Reputation systems, Communications of the ACM, Vol. 43 Issue 12: 45–48, 2000.

    Article  Google Scholar 

  223. Rifkind, Malcolm: WikiLeaks: Do they have a right to privacy?, The Telegraph, 30/11/2010. URL: http://www.telegraph.co.uk/news/worldnews/wikileaks/8169712/WikiLeaks-Do-they-have-a-right-to-privacy.html

  224. Rivest, Ronald L/ Shamir, Adi/ Adleman, Leonard: A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol. 21 Issue 2: 120–126, 1978.

    Article  MathSciNet  MATH  Google Scholar 

  225. Rosen, Jeffrey: The Web Means the End of Forgetting, The New York Times, 25/ 07/2010. URL:http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html?pagewanted=all/ [23.02.2012].

  226. Rosteck, Thomas: Die Trusted Computing Group, Trusted Computing: 15–20, Vieweg+Teubner, 2008.

    Google Scholar 

  227. Sabater, Jordi/ Sierra, Carles: Review on Computational Trust and Reputation Models, Artificial Intelligence Review, Vol. 24 Issue 1:33–60, 2005.

    Article  MATH  Google Scholar 

  228. Sackmann, Stefan/ Strüker, Jens/ Accorsi, Rafael: Personalization in privacy-aware highly dynamic systems. In: Communications of the ACM-Privacy and security in highly dynamic systems, Vol. 49 Issue 9: 32–38, ACM, 2006.

    Google Scholar 

  229. Sandhu, Ravi S/ Coyne, Edward J/ Feinstein, Hal L/ Youman, Charles E: Role-Based Access Control Models. In: Journal Computer, Vol. 29 Issue 2: 38–47,1996.

    Article  Google Scholar 

  230. Sandhu, Ravi S/ Samarati, Pierangela: Access control: principle and practice. In: Communications Magazine, IEEE, Vol. 32 No. 9:40–48, 1994.

    Article  Google Scholar 

  231. SOX (2002) Sarbanes-Oxley act, In: Congress of the USA, 2002.

    Google Scholar 

  232. Schäfers, B.: E-Commerce in der Otto-Group am Beispiel des Social Shopping-Portals, Handbuch Kundenmanagement: 677–685, 2008.

    Google Scholar 

  233. Schenker, Adam: Graph-Theoretic Techniques for Web Content Mining, dissertation for the degree of Doctor of Philosophy, Department of Computer Science and Engineering, College of Engineering, University of South Florida, 2003.

    Google Scholar 

  234. Schmücker, Niklas: Web Tracking, SNET2 Seminar Paper, TU Berlin, Germany, 2011.

    Google Scholar 

  235. Schneier, Bruce: Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish), Fast Software Encryption, Cambridge Security Workshop: 191–204, Springer, London, 1993.

    Google Scholar 

  236. Schneier, Bruce: A Taxonomy of Social Networking Data, In Journal IEEE Security and Privacy, Vol. 8, Issue 4, 2010.

    Google Scholar 

  237. Schoemaker, René: LinkedIn’s Privacy Slip-up Draws Legal Scrutiny, (PCWorld), 2011. URL: http://www.pcworld.com/article/237849/linkedins_privacy_slipup_draws_legal_scrutiny.htm

  238. Seneviratne, Oshani/ Kagal, Lalana: Usage Restriction Management for Accountable Data Transfer on the Web, 2011.

    Google Scholar 

  239. Sheng, Hong/ Nah, Fiona Fui-Hoon/ Siau, Keng: An Experimental Study on U-commerce Adoption: The Impact of Personalization and Privacy Concerns, Journal of Associations for Information Systems (JAIS), Vol. 9, Issue 6, Article 15, 2008.

    Google Scholar 

  240. Shmatikov, Vitaly/ Talcott, Carolyn: Reputation-based trust management, Journal of Computer Security, Vol. 13 No.: 167–190, 2005.

    Google Scholar 

  241. Smith, Alan Jay: Cache Memories, ACM Computing Surveys (CSUR), Vol. 14, No. 3, 1982.

    Google Scholar 

  242. Smyth, Barry/ Coyle, Maurice/ Briggs, Peter: Communities, Collaboration, and Recommender Systems in Personalized Web Search, Recommender Systems Handbook, Part 4: 579–614, Springer Verlag, 2011.

    Google Scholar 

  243. Singel, Ryan: You Deleted Your Cookies? Think Again. URL: http://www.wired.com/business/2009/08/you-deleted-your-cookies-think-again/ [23.02.2012].

  244. Soghoian, C./ Stamm, S.: Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL, papersssrncom: 1-19, 2010. URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1591033

  245. Solove, Daniel J.: Understanding Privacy, Harvard University Press, 1972 (New Edition 2008).

    Google Scholar 

  246. Soltani, Ashkan/ Canty, Shannon/ Mayo, Quentin/ Thomas, Lauren/ Hoofnagle, Chris Jay: Flash Cookies and Privacy, SSRN, 2009.

    Google Scholar 

  247. Sophos, Facebook Worm-Likejacking, 31/05/2010. URL:http://nakedsecurity.sophos.com/2010/05/31/facebook-likejacking-worm/ [26/072012].

  248. How do I use cookies to store users’ recent site history (PHP)? URL: http://stackoverflow.com/questions/2813659/how-do-i-usecookies-to-store-users-recent-site-historyphp/ [23.02.2012].

  249. Steinbrecher, Sandra/ Koepsell, Stefan: Modelling Unlinkability, Privacy Enhancing Technologies, Vol. 2760: 32–47, Springer Berlin/Heidelberg, 2003.

    Chapter  Google Scholar 

  250. Steindel, Tracy A.: A Path Toward User Control of Online Profiling, 17 Mich. Telecomm. Tech. L. Rev. 459, 2010.

    Google Scholar 

  251. Sweeney, Latanya: Weaving Technology and Policy Together to Maintain Confidentiality, 25 J.L. MED. & ETHICS 98, 100, 1997. (“The term anonymous implies that the data cannot be manipulated or linked to identify an individual.” (emphasis in original)).

    Google Scholar 

  252. Sweeney, Latanya: Achieving k-Anonymity Privacy Protection Using Generalization and Suppression, 10 INT’L J. on Uncertainty, Fuzziness and Knowledge-based Systems: 571–572, 2002.

    Google Scholar 

  253. Sweeney, Latanya: k-anonymity: A model for protecting privacy, International Journal on Uncertainty Fuzziness and Knowledge-based Systems, Vol. 10, Issue 5: 557–570, 2002.

    Article  MathSciNet  MATH  Google Scholar 

  254. Tam, KarYan/ Ho, ShukYing: Web personalization: is it effective?, IT Professional, Vol. 5, No. 5: 53–57, 2003.

    Article  Google Scholar 

  255. Tam, Kar Yan/ Ho, Shuk Ying: Web Personalization as a Persuasion Strategy: An Elaboration Likelihood Model Perspective, Information Systems Research, Vol. 16, Issue 3, INFORMS Institute for Operations Research and the Management Sciences (INFORMS), Linthicum, 2005.

    Google Scholar 

  256. Tan, Pang-Ning/ Steinbach, Michael/ Kumar, Vipin: Introduction to Data Mining, Addison Wesley, 2005.

    Google Scholar 

  257. Tarasewich, Peter/ Nickerson, Robert C./ Warkentin, Merrill: Issues in Mobile E-Commerce, Communications of the Association for Information Systems: Vol. 8, Article 3, 2002.

    Google Scholar 

  258. Tene, Omer/ Polonetsky, Jules: To Track or ‘Do Not Track’: Advancing Transparency and Individual Control in Online Behavioral Advertising, 2011. URL: http://ssrn.com/abstract=1920505

  259. Teltzrow, Maximilian/ Kobsa, Alfred: Impacts of user privacy preferences on personalized systems: a comparative study, Designing personalized user experiences in eCommerce, Kluwer Academic Publishers, 2004.

    Google Scholar 

  260. Thearling, Kurt: Data warehousing, 2000. URL: http://www.thearling.com/text/hrdotcom/dw.htm/ [23/05/2012].

  261. Tirtea, Rodica/ Castelluccia, Claude/ Ikonomou, Demosthenes: Bittersweet cookies, Some security and privacy considerations, European Network, and information Security Agency (ENISA), 2011.

    Google Scholar 

  262. Thompson, K. D. Catherine/ Hall, Jim: Privacy by Design: Achieving the Gold Standard in Data Protection for the Smart Grid, June 2010.

    Google Scholar 

  263. Tomlinson, Allan/ Yau, Po-Wah/ MacDonald, John A.: Privacy threats in a mobile enterprise social network, Information Security, Technical Report 15: 57–66, 2010.

    Google Scholar 

  264. Toubiana, Vincent/ Narayanan, Arvind/ Boneh, Dan/ Nissen-baum, Helen: Adnostic: Privacy preserving targeted advertising, Proceedings of the Network and Distributed Systems Symposium, 2010.

    Google Scholar 

  265. Toubiana, Vincent/ Nissenbaum, Helen: An Analysis of Google Log Retention Policies, Journal of Privacy and Confidentiality, Vol. 3, Issue 1, Article 2, 2011.

    Google Scholar 

  266. Trowbridge, Chris: An Overview of Remote Operating System Fingerprinting, Sans Institute, 2003.

    Google Scholar 

  267. M. Tuffield: NHS.uk allowing Google, Facebook, and others to track you. URL: http://mmt.me.uk/blog/2010/11/21/nhs-and-tracking/ [26/072012].

  268. Turow, Joseph/ King, Jennifer/ Hoofnagle, Chris Jay/ Bleakley, Amy/ Hennessy, Michael: Americans Reject Tailored Advertising and Three Activities that Enable It, Social Science Research Network, Vol. 104, Issue 30: 1–27, 2009.

    Google Scholar 

  269. Unabhängige Landeszentrum für Datenschutz Schleswig-Holstein (ULD): Wer ist datenschutzrechtlich verantwortlich für Facebook-Fanpages und Social-Plugins? URL:https://www.datenschutzzentrum.de/facebook/facebookverantwortlichkeit.Html/ [02/01/2012]

  270. Stacey Snyder Plaintiff v. Millersville University et al., The US District Court for the Eastern District of Pennsylvania (NO.07-1660), 3/12/2008. URL: http://www.paed.uscourts.gov/documents/opinions/08d1410p.pdf

  271. Vaas, Lisa: “Deleted” Facebook photos survive online three years later, Sophos security blog, 8/02/2012. URL: http://nakedsecurity.sophos.com/2012/02/08/deleted-facebook-photos-survive/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29

  272. Vascellaro, Jessica E.: Facebook’s About-Face on Data, The Wall Street Journal, 19/02/2009. URL: http://online.wsj.com/article/SB123494484088908625.html

  273. Vega, Tanzina: AT&T Begins Service to Text Users in Certain Locations, The New York Times, 27/02/2011. URL: http://mediadecoder.blogs.nytimes.com/2011/0 2/27/att-beginsservice-to-text-users-in-certain-locations/?ref=business/ [26/072012].

  274. Venzke, Sven: Social Media Marketing: Eine daten-schutzrechtliche Orientierungshilfe, 2011. URL: http://www.datenschutz-nord.de/presse/download/Rahmenbedingungen_Social_Media_Marketing_DuD_062011.pdf

  275. Vratonjic, N./ Manshaei, M./ Raya, M.,/ Hubaux, J. P.: ISPs and Ad Networks Against Botnet Ad Fraud, Proceedings of the First international conference on Decision and game theory for security (GameSec’10): 149–167, Springer-Verlag, Berli/Heidelberg, 2010

    Google Scholar 

  276. W3C, Same Orighin Policy, 2010. URL: http://www.w3.org/Security/wiki/Same_Origin_Policy/ [23.02.2012].

  277. Walters, Chris: Facebook’s New Terms Of Service: “We Can Do Anything We Want With Your Content. Forever.“, 2/2009. URL: http://consumerist.com/2009/02/facebooks-new-termsof-service-we-can-do-anything-we-want-with-yourcontentforever.html/ [26/072012].

  278. Weinberg, Zachary/ Chen, Eric Y./ Jayaraman, Pavithra Ramesh/ Jackson, Collin: I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks, IEEE Security and Privacy (SP) Symposium: 147–161, 2011.

    Google Scholar 

  279. Weitzner, Daniel J./ Abelson, Harold/ Berners-Lee, Tim/ Hanson, Chris/ Hendler, James/ Kagal, Lalana/ McGuinness, Deborah L/ Sussman, Gerald Jay/ Waterman, K Krasnow: Transparent Accountable Data Mining: New Strategies for Privacy Protection, Computer Science and Artificial Intelligence Laboratory, Technical Report MIT-CSAIL-TR-2006-007, 2006.

    Google Scholar 

  280. David Whalen: The Unofficial Cookie FAQ, Version 2.6. URL: http://www.cookiecentral.com/faq/ [23.02.2012].

  281. William E. Winkler/ William E. Winkler/ P. Nov: Overview of record linkage and current research directions, Technical report, Bureau of the Census, 2006.

    Google Scholar 

  282. Wondracek, G./ Holz, T./ Kirda, E./ Kruegel, C.: A practical attack to de-anonymize social network users, IEEE Symposium on Security and Privacy: 223–238, 2010.

    Google Scholar 

  283. Wong, Raymond Chi-Wing/ Fu, Ada Wai-Chee/ Wang, Ke/ Yu, Philip/ Pei, Jian: Can the Utility of Anonymized Data be used for Privacy Breaches?, ACM Transactions on Knowledge Discovery from Data (TKDD), Vol. 5, Issue 3, 2011.

    Google Scholar 

  284. Yung, Moti: Trusted computing platforms: the good, the bad, and the ugly. In: Computer Aided Verification, Lecture Notes in Computer Science, Vol. 2742: 250–254, Springer, 2003.

    Article  Google Scholar 

  285. Zarsky, Tal Z.: Thinking Outside the Box: Considering Transparency, Anonymity, and Pseudonymity as Overall Solutions to the Problems of Information Privacy in the Internet Society. In University of Miami Law Review, Vol. 58, Issue 4: 1301–1354, 2004.

    Google Scholar 

  286. Zeh, Reimar: Wie viele Fans hat Angela Merkel? Wahlkampf in Social Network Sites, Die Massenmedien im Wahlkampf, VS Verlag für Sozialwissenschaften, 2010.

    Google Scholar 

  287. Zeller, Tom Jr.: AOL Executive Quits After Posting of Search Data, New York Times, 2010.

    Google Scholar 

  288. Zheleva, E./ Getoor, L.: To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles, International World Wide Web Conference (WWW), 2009.

    Google Scholar 

  289. Philip Zimmermann: PGP Source Code and Internals, MIT Press, 1995.

    Google Scholar 

  290. Zimmermann, Hubert: OSI Reference Model-The ISO Model of Architecture for Open Systems Interconnection, IEEE Transactions on Communications, Vol. 28, Issue 4: 425–432, 1980.

    Article  Google Scholar 

  291. Zwass, Vladimir: Electronic commerce: structures and Issues, In Journal International Journal of Electronic Commerce, Vol. 1:3–23, 1996.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Kelbert, F. et al. (2012). State of Online Privacy: A Technical Perspective. In: Buchmann, J. (eds) Internet Privacy. acatech Studie. Springer Vieweg, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31943-3_4

Download citation

Publish with us

Policies and ethics