{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:00:26Z","timestamp":1740099626186,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811533792"},{"type":"electronic","value":"9789811533808"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-3380-8_23","type":"book-chapter","created":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T19:04:40Z","timestamp":1583175880000},"page":"260-270","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Improving the Robustness of the Cross-Domain Tracking Process"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1744-716X","authenticated-orcid":false,"given":"Bede Ravindra","family":"Amarasekara","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9124-2536","authenticated-orcid":false,"given":"Anuradha","family":"Mathrani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7452-5481","authenticated-orcid":false,"given":"Chris","family":"Scogings","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,3]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Kristol, D.M.: HTTP State Management Mechanism (RFC 2109). Internet RFCs 2109 (1997)","DOI":"10.17487\/rfc2109"},{"key":"23_CR2","unstructured":"Amarasekara, B.R., Mathrani, A.: Exploring risk and fraud scenarios in affiliate marketing technologies from the advertiser\u2019s perspective. In: Australasian Conference in Information Systems 2015, Adelaide (2015)"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Chachra, N., Savage, S., Voelker, G.M.: Affiliate crookies: characterizing affiliate marketing abuse. In: IMC 2015 Proceedings of the 2015 ACM Conference on Internet Measurement Conference, pp. 41\u201347. ACM, New York (2015)","DOI":"10.1145\/2815675.2815720"},{"key":"23_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1509\/jmr.13.0472","volume":"LII","author":"B Edelman","year":"2015","unstructured":"Edelman, B., Brandi, W.: Risk, information, and incentives in online affiliate marketing. J. Market. Res. LII, 1\u201312 (2015)","journal-title":"J. Market. Res."},{"key":"23_CR5","unstructured":"W3C: W3C Recommendation - Web Storage (2013). 20130730. \nhttps:\/\/www.w3.org\/TR\/2013\/REC-webstorage-20130730\/"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Englehardt, S., Narayanan, A.: Online tracking: a 1-million-site measurement and analysis. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (2016)","DOI":"10.1145\/2976749.2978313"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Laperdrix, P., Rudametkin, W., Baudry, B.: Beauty and the beast: diverting modern web browsers to build unique browser fingerprints. In: 37th IEEE Symposium on Security and Privacy, San Jose (2016)","DOI":"10.1109\/SP.2016.57"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Fielding, R., Reschke, J.: Hypertext Transfer Protocol (HTTP\/1.1): Conditional Requests. Internet RFCs RFC 7232 (2014)","DOI":"10.17487\/rfc7232"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Ayenson, M.D., Wambach, D.J., Soltani, A., Good, N., Hoofnagle, C.J.: Flash cookies and privacy II: now with HTML5 and ETag respawning. In: World Wide Web Internet and Web Information Systems (2011)","DOI":"10.2139\/ssrn.1898390"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Soltani, A., Canty, S., Mayo, Q., Thomas, L., Hoofnagle, C.J.: Flash cookies and privacy. In: AAAI Spring Symposium: Intelligent Information Privacy Management, pp. 158\u2013163 (2010)","DOI":"10.2139\/ssrn.1446862"},{"key":"23_CR11","unstructured":"Adobe: Adobe Flash Player - Local Settings Manager (2015). \nhttps:\/\/help.adobe.com\/archive\/en_US\/FlashPlayer\/LSM\/flp_local_settings_manager.pdf"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Brear, D., Barnes, S.J.: Assessing the value of online affiliate marketing in the UK financial services industy. Int. J. Electron. Finance (2008)","DOI":"10.1504\/IJEF.2008.016881"},{"issue":"1","key":"23_CR13","doi-asserted-by":"publisher","first-page":"299","DOI":"10.17261\/Pressacademia.2017.604","volume":"5","author":"Ali Norouzi","year":"2017","unstructured":"Norouzi, A.: An integrated survey in affiliate marketing network. In: Press Academia Procedia, pp. 299\u2013309 (2017)","journal-title":"Pressacademia"},{"key":"23_CR14","unstructured":"Libert, T.: Exposing the invisible web: an analysis of third-party HTTP requests on 1 million websites. Int. J. Commun. (2015)"},{"key":"23_CR15","unstructured":"Hoofnagle, C.J., Urban, J., Li, S.: Privacy and modern advertising: most us internet users want \u2018Do Not Track\u2019 to stop collection of data about their online activities. In: Amsterdam Privacy Conference (2012)"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Baumann, A., Haupt, J., Gebert, F., Lessmann, S.: The price of privacy: an evaluation of the economic value of collecting clickstream data. Bus. Inf. Syst. Eng., 1\u201319 (2018)","DOI":"10.1007\/s12599-018-0528-2"},{"issue":"2","key":"23_CR17","first-page":"528","volume":"11","author":"A Richterich","year":"2018","unstructured":"Richterich, A.: How data-driven research fuelled the Cambridge Analytica controversy. Open J. Sociopolitical Stud. 11(2), 528\u2013543 (2018)","journal-title":"Open J. Sociopolitical Stud."},{"issue":"1","key":"23_CR18","doi-asserted-by":"publisher","first-page":"75","DOI":"10.2307\/25148625","volume":"28","author":"AR Hevner","year":"2004","unstructured":"Hevner, A.R., March, S.T., Park, J., Ram, S.: Design science in information systems research. MIS Q. 28(1), 75\u2013105 (2004)","journal-title":"MIS Q."},{"issue":"4","key":"23_CR19","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0167-9236(94)00041-2","volume":"15","author":"ST March","year":"1995","unstructured":"March, S.T., Smith, G.: Design and natural science research on information technology. Decis. Support Syst. 15(4), 251\u2013266 (1995)","journal-title":"Decis. Support Syst."},{"issue":"3","key":"23_CR20","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1080\/07421222.1990.11517898","volume":"7","author":"J Nunamaker","year":"1991","unstructured":"Nunamaker, J., Chen, M., Pruding, T.D.M.: Systems development in information systems research. J. Manag. Inf. Syst. 7(3), 89\u2013106 (1991)","journal-title":"J. Manag. Inf. Syst."},{"key":"23_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-14527-8_1","volume-title":"Privacy Enhancing Technologies","author":"P Eckersley","year":"2010","unstructured":"Eckersley, P.: How unique is your web browser? In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 1\u201318. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-14527-8_1"}],"container-title":["Communications in Computer and Information Science","Intelligent Information and Database Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-3380-8_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T19:07:30Z","timestamp":1583176050000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-3380-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811533792","9789811533808"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-3380-8_23","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"3 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACIIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Intelligent Information and Database Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Phuket","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 March 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 March 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aciids2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aciids.pwr.edu.pl\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}