Content deleted Content added
Citation bot (talk | contribs) m Alter: template type. Add: isbn. | You can use this bot yourself. Report bugs here.| Activated by User:Headbomb |
|||
(42 intermediate revisions by 23 users not shown) | |||
Line 1:
{{Use dmy dates|date=
'''Cross-device tracking'''
More specifically, cross-device tracking is a technique in which technology companies and advertisers deploy trackers, often in the form of unique identifiers, cookies, or even ultrasonic signals, to generate a [[profiling (information science)|profile]] of users across multiple devices, not simply one.<ref name=":
This form of tracking is
==Background==
There are many ways in which online tracking has manifested itself. Historically, when companies wanted to track
Eventually, [[Cookies (Internet)|cookies]] were deployed by [[Advertising|advertisers]], providing each user with a [[unique identifier]] in his or her browser so that the
Other technologies such as [[HTTP cookie|supercookies]], which stay on computers long after the user deletes his or her cookies, and [[
Thus, cross-device tracking initially emerged as a means of generating a profile of users across multiple devices, not simply one.
One such tactic for cross-device tracking is called [[Device fingerprint|browser fingerprinting]], and occurs when browsers, which are modifiable to the
Another tactic used by Google is called [[Ad-ID|AdID]] and works on smartphones in tandem with cookies on a
Now, cross-device tracking has evolved into a new, radical form of surveillance technology which enables users to be tracked across multiple devices, including [[
=== Ultrasonic tracking ===
Humans interpret sound by picking up on different frequencies.<ref name=":
[[Ultrasound]], which is shorter wavelengths greater than or equal to
Another integral component of cross-device tracking is the usage of audio beacons. Audio beacons are beacons that are embedded into ultrasound, so they cannot be heard by humans.<ref name=":
In October 2015, the [[Center for Democracy and Technology]] submitted comments to the [[Federal Trade Commission]] (FTC) regarding cross-device tracking technology, specifically mentioning [[SilverPush]].<ref name="cdt">{{cite web |url=https://cdt.org/files/2015/10/10.16.15-CDT-Cross-Device-Comments.pdf |title=Re: Comments for November 2015 Workshop on Cross – Device Tracking |publisher=[[Center for Democracy and Technology]] |
Audio "beacons" can be embedded into television advertisements. In a similar manner to [[radio beacon]]s, these can be picked up by [[mobile app]]s.<ref name="FTC letter">{{cite web |url=https://www.ftc.gov/system/files/attachments/press-releases/ftc-issues-warning-letters-app-developers-using-silverpush-code/160317samplesilverpushltr.pdf |title=FTC letter to app developers |
In March 2016, the FTC issued warning letters to 12 app developers using cross-device tracking in their apps.<ref name=ftc>{{cite web |url=https://www.ftc.gov/news-events/press-releases/2016/03/ftc-issues-warning-letters-app-developers-using-silverpush-code |title=FTC Issues Warning Letters to App Developers Using 'Silverpush' Code |
== Applications ==
Studies have shown that 234 [[Android (operating system)|Android]] applications are eavesdropping on these ultrasonic channels without the
Applications such as [[SilverPush
* [[SilverPush
* [[Shopkick]], another popular application, gives discounts to users who shop at stores which emit these ultrasonic beacons, allowing them to create a profile of the user<ref name=":
* Lisnr
Another study suggested that Apple, Google, and Bluetooth Special Interest groups need to do more to prevent cross-device tracking.
<ref name=":132">{{Cite == Privacy and surveillance concerns ==
=== Ultrasonic tracking ===
Cross-device tracking has [[Internet privacy|privacy]] implications and allows for more detailed tracking of users than traditional tracking methods. Data can be collected from multiple devices used by a single user and correlated to form a more accurate picture of the person being tracked.<ref name=ars/> Moreover, malicious actors may use variants of the technology to
Ultrasonic tracking technologies can pose massive threats to
* The first is ''media tracking'': audio from the
* Another form of tracking permitted by ultrasonic tracking is ''cross-device tracking'', which enables a
* ''[[Location tracking]]'' is yet another privacy concern.<ref name=":15" /> Indeed, ultrasonic signals can convey location information via a location identifier, often placed in stores or businesses.<ref name=":15" />
* Lastly, this new ultrasonic tracking poses a threat to users of [[Bitcoin]] and [[Tor (anonymity network)|Tor]] because it ''[[De-anonymization|
=== Panoptic surveillance and the commodification of users' digital identity ===
From cookies to ultrasonic trackers, some argue that invasive forms of surveillance underscore how users are trapped in a digital [[panopticon]], similar to the concept envisioned by [[Jeremy Bentham]]: a prison in which the prisoners were able to be seen at all times by guards but were unable to detect when, or even if, they were being watched at all, creating a sense of paranoia that drove prisoners to carefully police their own behavior.<ref name=":4">{{Cite journal|
In direct response to the panoptic and invasive forms of tracking manifesting themselves within the digital realm, some have turned to [[sousveillance]]: a form of inverse surveillance in which users can record those who are surveilling them, thereby empowering themselves.<ref name=":142">{{Cite journal|
The television, along with the remote control, is also argued to be conditioning humans into habitually repeating that which they enjoy without experiencing genuine surprise or even discomfort, a critique of the television similar to that of those made against [[
Some scholars have even contended that in an age of increased surveillance, users now participate online through the active generation and curation of online images––a form of control.<ref name=":15" /> In so doing, users can be seen as rejecting the shame associated with their private lives.<ref name=":15" /> Other scholars note that surveillance is fundamentally dependent upon location in both physical and virtual environments.<ref name=":16">{{Cite journal|last=Molz|first=Jennie Germann|title='Watch us wander': mobile surveillance and the surveillance of mobility|url=https://www.academia.edu/507992|journal=Environment and Planning A
In addition, scholars argue that users have the right to know the value of their [[personal data]].<ref name=":17">{{Cite journal
=== Surveillance capitalism ===
The increased usage of cross-device tracking by advertisers is indicative of the rise of a new era of data extraction and analysis as a form of profit, or [[surveillance capitalism]], a term coined by [[Shoshana Zuboff]].<ref name=":
Scholars are beginning to discuss the possibility of quantifying the monetary value of
=== Health and wellness applications ===
In addition, health and wellness applications also have a dearth of privacy protections as well: a study found that many health apps lacked [[encryption]] and that regulators should enforce stronger [[Data privacy
=== Cookies, flash cookies, and web beacons ===
Additionally, privacy concerns surround cookies, flash cookies, and web beacons on websites today.<ref name=":10" /> Ultimately, five main concerns surround the usage of cookies, flash cookies, and web beacons, according to a study:<ref name=":
* Firstly, the authors note that users lack ''[[anonymity]]'' online, with cookies
* Another concern the authors note is ''unintended uses of cookies,'' since cookies were initially designed to benefit the
* Users are likely unaware of how their personal information is being used, reflecting the ''surreptitious nature of data collection''<ref name=":
* Some cookies ''trespass into the web
* Lastly, the authors note that the ''threat of cookie sharing'' underscores how web
=== Data capitalism ===
Other scholars have defined a similarly extractive and destructive phenomenon called [[data capitalism]].<ref name=":18">{{Cite journal|last=West|first=Sarah Myers
* The free and open network: in making products free, large companies make their products more accessible to a larger audience from which they can extract valuable data in exchange.<ref name=":18" />
* The connection between people and machines: data capitalism promotes a connection between people and machines which is derived from the
* The value placed on data: new information asymmetries are proliferating that exacerbate inequality of information and allow only the most powerful access to most
=== Solutions ===
Scholars are convinced the current notice-and-consent model for privacy policies is fundamentally flawed because it assumes users intuitively understand all of the facts in a [[privacy policy]], which is often not the case.<ref name=":21">{{Cite web|url=https://www.amacad.org/publication/contextual-approach-privacy-online|title=A Contextual Approach to Privacy Online|website=American Academy of Arts & Sciences|
== Legal and ethical issues ==
While the United States lacks extensive privacy rights, the [[Fourth Amendment to the United States Constitution|Fourth Amendment]] provides some privacy protections.<ref name=":113"
There are large implications for this technology within the legal field. Legally, The [[Federal Trade Commission]] has a responsibility to prevent deceptive practices by technology companies, such as those that could lead to consumer injury.<ref name=":6">{{Cite
Another scholar believes that the convergence between lived experience and online technology is creating a term called [[Mixed reality
Ethically, Zuboff points to the extraction, commodification, and analysis of private human experiences as well as increased surveillance––which is sometimes hidden––in everyday life as violating users' rights to privacy.<ref name=":52"
▲Ethically, Zuboff points to the extraction, commodification, and analysis of private human experiences as well as increased surveillance––which is sometimes hidden––in everyday life as violating users' rights to privacy.<ref name=":52">{{Cite journal|last=Zuboff|first=Shoshana|date=2015|title=Big other: Surveillance Capitalism and the Prospects of an Information Civilization|journal=Journal of Information Technology|language=en|volume=30|issue=1|pages=75–89|doi=10.1057/jit.2015.5|issn=0268-3962}}</ref> The usage of surreptitious methods, in which the user is unaware of the extent to which he or she is being tracked, brings tracking mechanisms––such as cookies, flash cookies, and web beacons––into the ethical realm as well since users are not being informed of this tracking perhaps as often as they should.<ref name=":113" />
==See also==
*[[Behavioral targeting]]
*[[Internet privacy]]
*[[Surveillance]]
*[[Website visitor tracking]]
▲* [[Privacy concerns with social networking services]]
▲* [[Behavioral analytics]]
==References==
|