{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:28:57Z","timestamp":1725902937549},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_41","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T04:02:27Z","timestamp":1499140947000},"page":"435-444","source":"Crossref","is-referenced-by-count":0,"title":["Proposal and Implementation of a Countermeasure Against Event Tracking on the Web"],"prefix":"10.1007","author":[{"given":"Takamichi","family":"Saito","sequence":"first","affiliation":[]},{"given":"Ryohei","family":"Hosoya","sequence":"additional","affiliation":[]},{"given":"Koki","family":"Yasuda","sequence":"additional","affiliation":[]},{"given":"Kazushi","family":"Takahashi","sequence":"additional","affiliation":[]},{"given":"Yuta","family":"Tsunoda","sequence":"additional","affiliation":[]},{"given":"Kazuhisa","family":"Tanabe","sequence":"additional","affiliation":[]},{"given":"Masayuki","family":"Taneoka","sequence":"additional","affiliation":[]},{"given":"Satoshi","family":"Yashiro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"41_CR1","unstructured":"KeymansNet Implementation status of marketing support tool (2015). \nhttp:\/\/www.keyman.or.jp\/at\/30008476"},{"key":"41_CR2","unstructured":"IPA 2015 A survey of awareness of the threat of information security. \nhttps:\/\/www.ipa.go.jp\/files\/000050002.pdf"},{"key":"41_CR3","unstructured":"Hostelry. \nhttps:\/\/www.ghostery.com"},{"key":"41_CR4","unstructured":"NoScript. \nhttps:\/\/noscript.net"},{"key":"41_CR5","unstructured":"Alexa. \nhttp:\/\/www.alexa.com"},{"key":"41_CR6","unstructured":"Google Chrome. \nhttps:\/\/www.google.co.jp\/chrome\/browser\/desktop"},{"key":"41_CR7","unstructured":"Chrome.webrequest. \nhttps:\/\/developer.chrome.com\/extensions\/webRequest"},{"key":"41_CR8","unstructured":"tldjs. \nhttps:\/\/www.npmjs.com\/package\/tldjs"},{"key":"41_CR9","unstructured":"Public Suffix List. \nhttps:\/\/publicsuffix.org\/list"},{"key":"41_CR10","unstructured":"Mozilla. \nhttps:\/\/www.mozilla.jp"},{"key":"41_CR11","unstructured":"trustradius. \nhttps:\/\/www.trustradius.com\/web-analytics"},{"key":"41_CR12","unstructured":"Wappalyzer. \nhttps:\/\/wappalyzer.com"},{"key":"41_CR13","unstructured":"GoSquared. \nhttps:\/\/www.gosquared.com"},{"key":"41_CR14","unstructured":"Chartbeat. \nhttps:\/\/chartbeat.com"},{"key":"41_CR15","unstructured":"Google Analytics. \nhttps:\/\/www.google.com\/intl\/ja_jp\/analytics"},{"key":"41_CR16","unstructured":"AT Internet. \nhttp:\/\/www.atinternet.com"},{"key":"41_CR17","unstructured":"Google Analytics Premium. \nhttps:\/\/www.google.co.jp\/intl\/ja_ALL\/analytics\/premium\/index.html"},{"key":"41_CR18","unstructured":"Woopra. \nhttps:\/\/www.woopra.com"},{"key":"41_CR19","unstructured":"Adobe Analytics. \nhttp:\/\/www.adobe.com\/jp\/marketing-cloud\/web-analytics.html"},{"key":"41_CR20","unstructured":"Piwik. \nhttps:\/\/piwik.org"},{"key":"41_CR21","unstructured":"Mixpanel. \nhttps:\/\/mixpanel.com"},{"key":"41_CR22","unstructured":"Kissmetrics. \nhttps:\/\/www.kissmetrics.com"},{"key":"41_CR23","unstructured":"Digital Analytics Enterprise. \nhttps:\/\/www.comscore.com\/jpn\/Products\/Enterprise-Analytics\/Digital-Analytics-Enterprise"},{"key":"41_CR24","unstructured":"IBM Digital Analytics. \nhttp:\/\/www-03.ibm.com\/software\/products\/ja\/digital-analytics"},{"key":"41_CR25","unstructured":"StatCounter. \nhttps:\/\/statcounter.com"},{"key":"41_CR26","unstructured":"Webtrends Analytics. \nhttps:\/\/www.webtrends.com"},{"key":"41_CR27","unstructured":"Amazon. \nhttps:\/\/www.amazon.co.jp"},{"key":"41_CR28","unstructured":"Report status on vulnerability related information of software (IPA). \nhttps:\/\/www.ipa.go.jp\/security\/vuln\/report\/vuln2012q4.html"},{"key":"41_CR29","volume-title":"Browser Hackers Handbook","author":"W Alcorn","year":"2016","unstructured":"Alcorn, W., Frichot, C., Orru, M.: Browser Hackers Handbook. Shoeisha, Tokyo (2016)"},{"key":"41_CR30","unstructured":"JSFuck. \nhttp:\/\/www.jsfuck.com"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T04:18:53Z","timestamp":1499141933000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_41","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}