Lecture 21: Privacy and Online Advertising. References Challenges in Measuring Online Advertising Systems by Saikat Guha, Bin Cheng, and Paul Francis.

Slides:



Advertisements
Similar presentations
Creating an EDS Search Box Using EBSCO’s Search Box Builder Tool
Advertisements

Data Mining and Text Analytics Advertising Laura Quinn.
Itay Gonshorovitz Foundation of privacy Targeted Online Advertising.
Crawling, Ranking and Indexing. Organizing the Web The Web is big. Really big. –Over 3 billion pages, just in the indexable Web The Web is dynamic Problems:
SplitX: High-Performance Private Analytics Ruichuan Chen (Bell Labs / Alcatel-Lucent) Istemi Ekin Akkus (MPI-SWS) Paul Francis (MPI-SWS)
Back to Table of Contents
Internet/Cyber Stalking AND HOW TO AVOID BEING A VICTIM.
Connecting Users across Social Media Sites: A Behavioral-Modeling Approach Jingchi Zhang.
HTML Introduction (cont.) 10/01/ Lecture 8, MAT 279, Fall 2009.
Lecture 20: Privacy in Online Social Networks Xiaowei Yang.
Thank you Prof. Dr. Gerhard Boerner ! Stephen, Thomas, Houjun, Me, Robert Jing.
Lecture 16 Page 1 CS 236 Online Cross-Site Scripting XSS Many sites allow users to upload information –Blogs, photo sharing, Facebook, etc. –Which gets.
Google Online Marketing Challenge (GOMC)
CrowdLogging: Distributed, private, and anonymous search logging Henry Feild James Allan Joshua Glatt Center for Intelligent Information Retrieval University.
PRIVAD: PRACTICAL PRIVACY IN ONLINE ADVERTISING Offense: Arindam Paul.
. Outline 1.About LinkedIn 2.Personal Profile 3.Make Connections 4.Communicate 5.Groups 6.Pages 7.Events 8.Answers 9.Applications 10.Direct Ads.
WEB ANALYTICS Prof Sunil Wattal. Business questions How are people finding your website? What pages are the customers most interested in? Is your website.
Prof. Vishnuprasad Nagadevara Indian Institute of Management Bangalore
HTTP: cookies and advertising Concepts to cover:  web page content (including ads) from multiple site: composition at client  cookies  third-party cookies:
AdWords Instructor: Dawn Rauscher. Quality Score in Action 0a2PVhPQhttp:// 0a2PVhPQ.
 The Shift Towards Digital Branding By Zahra Karim.
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Copyright © 2009 Pearson Education, Inc. Slide 6-1 Chapter 6 E-commerce Marketing Concepts.
CCT356: Online Advertising and Marketing Class 2: Marketing/Online Advertising.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Privacy-Aware Personalization for Mobile Advertising
Display & Remarketing What You Need to Know. PROPRIETARY AND CONFIDENTIAL / COPYRIGHT © 2013 BE FOUND ONLINE, LLC 2 WHAT IS DISPLAY?
Hao Wu Nov Outline Introduction Related Work Experiment Methods Results Conclusions & Next Steps.
Canadian Advertising in Action, 6th ed. Keith J. Tuckwell ©2003 Pearson Education Canada Inc Elements of the Internet World Wide Web World.
Use of Electronic and Internet advertising options Standard 3.4.
CUSTOMER CONVERSION JOURNEY SECTOR: TRAVEL. Contents Background and methodology What we measured – Brands and their activity Results – Web site visitors.
Facebook for Business Greg Clement and Rick Scheeser.
Target relevant customers. Remarketing with Google Remarketing with Google. Target customers who have already shown an interest in your business.
Ads Jim Jansen College of Information Sciences and Technology The Pennsylvania State University
We now will use Advanced Search Builder option. Access to Advanced is from the initial PubMed page or the Search Results page. Advanced Search.
ASP.Net, Web Forms and Web Controls 1 Outline Session Tracking Cookies Session Tracking with HttpSessionState.
© 2010 Deep Web Technologies, Inc. Taking the Library Back from Google Abe Lederman, President and CTO Deep Web Technologies May 12, 2010.
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
Online Marketing. Types Marketing Link Building Content Marketing Search Engine Optimization(SEO) Social Media Marketing Advertising.
Adxstudio Portals Training
Interactions & Automations
Pete LePage Senior Product Manager Microsoft Corporation WUX310.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Chapter 1: Internet Marketing Foundations. Chapter Objectives Describe how computers and servers communicate to enable people to interact with webpages.
1 DATA-DRIVEN SOLUTIONS. 2 KEYWORD-LEVEL SEARCH RETARGETING TARGET USERS BASED ON THEIR RECENT SEARCH HISTORY AND SEARCH QUERIES. A user performs a search.
We help businesses achieve online success! © All rights reserved. 8-digital.com - Proprietary and Confidential.
Local Traffic Mastery Split Testing Ads. What is a Split Test? Testing Ads for performance against each other.
Distributed Web Systems Cookies and Session Tracking Lecturer Department University.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Some from Chapter 11.9 – “Web” 4 th edition and SY306 Web and Databases for Cyber Operations Cookies and.
Use Case Diagrams A Detailed Description. Use Case Diagrams Use case diagrams describe relationships between users and use cases A use case is a (usually.
Introduction to Digital Analytics Keith MacDonald Guest Presentation.
When small data is better data
Automated Experiments on Ad Privacy Settings
Latest Updates on BlackHawk Mines Music : Privacy Policy
Some Common Terms The Internet is a network of computers spanning the globe. It is also called the World Wide Web. World Wide Web It is a collection of.
563.10: Bloom Cookies Web Search Personalization without User Tracking
Overview The promotion of products or brands via Digital media Digital Media  Search Engine Marketing Search Engine Marketing  Social Media Marketing.
Measuring and Fingerprinting Click-Spam in Ad-Networks
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Use of Electronic and Internet advertising options
HP ALM Defects Module To protect the confidential and proprietary information included in this material, it may not be disclosed or provided to any third.
SEO Hand Book.
Information Retrieval and Web Design
The Internet and Electronic mail
Cross Site Request Forgery (CSRF)
Presentation transcript:

Lecture 21: Privacy and Online Advertising

References Challenges in Measuring Online Advertising Systems by Saikat Guha, Bin Cheng, and Paul Francis Serving Ads from localhost for Performance, Privacy, and Profit by Saikat Guha, Alexey Reznichenko, Kevin Tang, Hamed Haddadi, and Paul Francis

Problem Online advertising funds many web services – E.g., all the free stuff we get from Google Ad networks gather much user information How do they use the user information?

Goals Determining how well ad networks target users

Methodology Creating two clients representing two different user types Measuring the different ads each client sees

Challenges How to compare ads How to collect a representative snapshot of ads Quantifying the differences Avoiding measurement artifacts

Comparing Ads is challenging Ads don’t have unique IDs A & B are semantically the same, but with different text A & C are different, but with same display URLs

How to define two ads are the same? Easy but illegal approach: comparing destination URLs – FP: flagged as equal but not – FN: equal but not flagged Display URL has the lowest FNs  Use display URL to define ads equality

Taking a Snapshot More ads can be displayed on any single page How to determine all Ads that may be fed to a user? – Reload the page multiple times – But too many reloads may lead to ads churn: old ads expire, new ads show up

Determining the # of reloads Reloads every 5 seconds Repeated for 200 queries Curve becomes linear > 10 reloads – Ads churns Use 10 reloads as the threshold

Quantifying Change Metrics – Jaccard index: – Extended Jaccard index (cosine similarity)

Comparing Effectiveness Views: # of page reloads containing the ad Value: # of page reloads scaled by the position of the ad Overlap: Jaccard index

Comparing Effectiveness

The winner is Weight: log(views) or log(value)

Avoiding artifacts Different system parameters may lead to different ads view – Browsers used different DNS servers – Browsers receive different cookies – HTTP proxy

Analysis Configure two or more instances to differ by one parameter Comparing results for – Search Ads – Website Ads – Online Social Network Ads

Search Ads A, B: control w/o cookies C, D: w/ cookies enabled. Seeded w/ different personae Google 730 random product-related queries for 5 days No obvious behavioral targeting in search ads. Why? – Keyword based ads bidding Location targeting not studied

Websites Ads Measure 15 websites that show Google ads A, B: control in NY C: SF; D: Germany Location affects web ads

Website Ads A, B: control C: browse 3 out of 15 websites D and E: browse random websites and Google search random websites Google does not use browsing behavior to pick ads

Online social network ads Set up three or more Facebook profiles A, B: control and identical C: differs from A by one profile parameter

Online social network ads Use all profile parameters to customize ads Age and gender are two primary factors Diurnal patterns due to ads churn – Should it increase or decrease? Education and relationship matter less, except for engaged and non-engaged women

Checking Impact of Sexual Preference Six profiles with different sexual preferences Two males interested in females (male control) Two females interested in males (female control) One male interested in male One female interested in female

Ads differ by sexual preferences

Other results Found neutral ads targeted exclusively to gay men Clicking would reveal to the advertiser a user’s sexual preference 66 ads shown exclusively to gay men more than 50 times during experiments

Summary Search ads are largely key-word based so far Websites ads use location but probably not behavior Social network ads use all profile attributes to target users

Question: how can we design a privacy-preserving online advertising system?

Goals Support online advertising – A good revenue source to fund online services Preserve user privacy

PrivAd Serving Ads from a localhost client Actors: user, publisher, advertiser, broker, and dealer

How it works Advertisers upload ads to broker User client subscribes to a set of the ads according to the user’s profile to the broker – Message encrypted with Broker’s public key and contains a symmetric private key The Broker sends filtered ads to the user client – Ads are encrypted with the symmetric key Dealer anonymizes the client’s message to Broker

Ad View/Click Reporting When a user clicks an ad, the user client sends a view/click report containing ad ID and publisher ID to the broker via the dealer Dealer attaches a unique report ID, removes client identity information, maps the ID to the user identity information

Click-fraud defense Broker provides dealer the record IDs if it suspects click-fraud The dealer finds the user The dealer stops relaying ads to user if convinced Questions not answered: how to detect by broker, and what’s the punishment

Defining User Privacy Unlinkability – No single player can link the identity of user with any piece of user’s profile – No single player can link together more than some limited number of pieces of personalization information of a given user The dealer learns User A clicks on some ad The broker learns someone clicked on ad X Not robust to dealer/broker collusion

Scaling PrivAd Ads churn is significant 2GB/month of compressed ad data

Discussion What challenges does PrivAd may face in a practical deployment?