{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:55:29Z","timestamp":1755838529880,"version":"3.41.0"},"reference-count":36,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T00:00:00Z","timestamp":1470355200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001602","name":"Science Foundation Ireland","doi-asserted-by":"crossref","award":["11\/PI\/11771"],"award-info":[{"award-number":["11\/PI\/11771"]}],"id":[{"id":"10.13039\/501100001602","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2016,8,5]]},"abstract":"<jats:p>From buying books to finding the perfect partner, we share our most intimate wants and needs with our favourite online systems. But how far should we accept promises of privacy in the face of personalized profiling? In particular, we ask how we can improve detection of sensitive topic profiling by online systems. We propose a definition of privacy disclosure that we call \u03b5-indistinguishability, from which we construct scalable, practical tools to assess the learning potential from personalized content. We demonstrate our results using openly available resources, detecting a learning rate in excess of 98% for a range of sensitive topics during our experiments.<\/jats:p>","DOI":"10.1145\/2937754","type":"journal-article","created":{"date-parts":[[2016,8,8]],"date-time":"2016-08-08T13:10:44Z","timestamp":1470661844000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Don\u2019t Let Google Know I\u2019m Lonely"],"prefix":"10.1145","volume":"19","author":[{"given":"P\u00f3l Mac","family":"Aonghusa","sequence":"first","affiliation":[{"name":"IBM Research and Trinity College Dublin, Ireland"}]},{"given":"Douglas J.","family":"Leith","sequence":"additional","affiliation":[{"name":"Trinity College Dublin, Ireland"}]}],"member":"320","published-online":{"date-parts":[[2016,8,5]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501612"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1929820.1929828"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.25"},{"key":"e_1_2_1_4_1","volume-title":"Natural Language Processing with Python","author":"Bird Steven","unstructured":"Steven Bird , Ewan Klein , and Edward Loper . 2009. Natural Language Processing with Python ( 1 st ed.). O\u2019Reilly Media, Inc. Steven Bird, Ewan Klein, and Edward Loper. 2009. Natural Language Processing with Python (1st ed.). O\u2019Reilly Media, Inc.","edition":"1"},{"key":"e_1_2_1_5_1","unstructured":"Danah Boyd. June 6 2011. Networked Privacy. (June 6 2011).  Danah Boyd. June 6 2011. Networked Privacy. (June 6 2011)."},{"key":"e_1_2_1_6_1","volume-title":"Types of Discrimination. (2015). (Retrieved on","author":"U.S. Equal Employment Opportunity Commission","year":"2015","unstructured":"U.S. Equal Employment Opportunity Commission . 2015. Types of Discrimination. (2015). (Retrieved on March 21, 2015 , from http:\/\/www.eeoc.gov\/laws\/types\/). U.S. Equal Employment Opportunity Commission. 2015. Types of Discrimination. (2015). (Retrieved on March 21, 2015, from http:\/\/www.eeoc.gov\/laws\/types\/)."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04483-5_5"},{"volume-title":"Proceedings of the 31st Symposium on Information Theory in the Benelux, WIC 2010. IEEE Benelux Information Theory Chapter, 35--42","author":"Erkin Zekeriya","key":"e_1_2_1_8_1","unstructured":"Zekeriya Erkin , Michael Beye , Thijs Veugen , and Reginald L. Lagendijk . 2010. Privacy enhanced recommender system . In Proceedings of the 31st Symposium on Information Theory in the Benelux, WIC 2010. IEEE Benelux Information Theory Chapter, 35--42 . http:\/\/doc.utwente.nl\/87258\/. Zekeriya Erkin, Michael Beye, Thijs Veugen, and Reginald L. Lagendijk. 2010. Privacy enhanced recommender system. In Proceedings of the 31st Symposium on Information Theory in the Benelux, WIC 2010. IEEE Benelux Information Theory Chapter, 35--42. http:\/\/doc.utwente.nl\/87258\/."},{"volume-title":"Proceedings of the 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 5864--5867","author":"Erkin Zekeriya","key":"e_1_2_1_9_1","unstructured":"Zekeriya Erkin , Michael Beye , Thijs Veugen , and Reginald L. Lagendijk . 2011. Efficiently computing private recommendations . In Proceedings of the 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 5864--5867 . Zekeriya Erkin, Michael Beye, Thijs Veugen, and Reginald L. Lagendijk. 2011. Efficiently computing private recommendations. In Proceedings of the 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 5864--5867."},{"key":"e_1_2_1_10_1","volume-title":"https:\/\/www.eff.org\/privacybadger. (Retrieved","author":"Foundation Electronic Frontier","year":"2015","unstructured":"Electronic Frontier Foundation . 2015a. https:\/\/www.eff.org\/privacybadger. (Retrieved Sept. 25, 2015 ). Electronic Frontier Foundation. 2015a. https:\/\/www.eff.org\/privacybadger. (Retrieved Sept. 25, 2015)."},{"key":"e_1_2_1_11_1","volume-title":"https:\/\/www.google.com\/intl\/en\/policies\/privacy\/?fg&equals;1. (Retrieved","author":"Foundation Electronic Frontier","year":"2015","unstructured":"Electronic Frontier Foundation . 2015b. https:\/\/www.google.com\/intl\/en\/policies\/privacy\/?fg&equals;1. (Retrieved Sept. 25, 2015 ). Electronic Frontier Foundation. 2015b. https:\/\/www.google.com\/intl\/en\/policies\/privacy\/?fg&equals;1. (Retrieved Sept. 25, 2015)."},{"key":"e_1_2_1_12_1","unstructured":"Google. 2015. Google Trends. http:\/\/www.google.com\/trends\/. (Retrieved March 21 2015).  Google. 2015. Google Trends. http:\/\/www.google.com\/trends\/. (Retrieved March 21 2015)."},{"key":"e_1_2_1_13_1","volume-title":"http:\/\/googleblog.blogspot.co.uk\/2012\/05\/introducing-knowledge-graph- things-not.html. (Retrieved","author":"Graph Google Knowledge","year":"2015","unstructured":"Google Knowledge Graph . 2015. http:\/\/googleblog.blogspot.co.uk\/2012\/05\/introducing-knowledge-graph- things-not.html. (Retrieved Sept. 30, 2015 ). Google Knowledge Graph. 2015. http:\/\/googleblog.blogspot.co.uk\/2012\/05\/introducing-knowledge-graph- things-not.html. (Retrieved Sept. 30, 2015)."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879152"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (NSDI\u201911)","author":"Guha Saikat","year":"2011","unstructured":"Saikat Guha , Bin Cheng , and Paul Francis . 2011 . Privad: Practical privacy in online advertising . In Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (NSDI\u201911) . USENIX Association, Berkeley, CA, 169--182. http:\/\/dl.acm.org\/citation.cfm?id&equals; 1972457.1972475 Saikat Guha, Bin Cheng, and Paul Francis. 2011. Privad: Practical privacy in online advertising. In Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (NSDI\u201911). USENIX Association, Berkeley, CA, 169--182. http:\/\/dl.acm.org\/citation.cfm?id&equals;1972457.1972475"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488435"},{"key":"e_1_2_1_17_1","volume-title":"mrl. nyu. edu\/dhower\/trackmenot","author":"Howe Daniel C.","year":"2009","unstructured":"Daniel C. Howe , Helen Nissenbaum , and Vincent Toubiana . 2009. TrackMeNot. mrl. nyu. edu\/dhower\/trackmenot ( 2009 ). Daniel C. Howe, Helen Nissenbaum, and Vincent Toubiana. 2009. TrackMeNot. mrl. nyu. edu\/dhower\/trackmenot (2009)."},{"key":"e_1_2_1_18_1","unstructured":"Ivan Idris. 2012. NumPy Cookbook. Packt Publishing.   Ivan Idris. 2012. NumPy Cookbook. Packt Publishing."},{"volume-title":"http:\/\/www.isense.net. (Retrieved","year":"2015","key":"e_1_2_1_19_1","unstructured":"iSense. 2015. http:\/\/www.isense.net. (Retrieved Sept. 30, 2015 ). iSense. 2015. http:\/\/www.isense.net. (Retrieved Sept. 30, 2015)."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22910"},{"key":"e_1_2_1_21_1","volume-title":"Meyer","author":"Langville Amy N.","year":"2006","unstructured":"Amy N. Langville and Carl D . Meyer . 2006 . Google\u2019s PageRank and Beyond: The Science of Search Engine Rankings. Princeton University Press , Princeton, NJ. Amy N. Langville and Carl D. Meyer. 2006. Google\u2019s PageRank and Beyond: The Science of Search Engine Rankings. Princeton University Press, Princeton, NJ."},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium (SEC\u201914)","author":"L\u00e9cuyer Mathias","year":"2014","unstructured":"Mathias L\u00e9cuyer , Guillaume Ducoffe , Francis Lan , Andrei Papancea , Theofilos Petsios , Riley Spahn , Augustin Chaintreau , and Roxana Geambasu . 2014 . XRay: Enhancing the web\u2019s transparency with differential correlation . In Proceedings of the 23rd USENIX Conference on Security Symposium (SEC\u201914) . USENIX Association, Berkeley, CA, 49--64. http:\/\/dl.acm.org\/citation.cfm?id&equals;2671225.2671229. Mathias L\u00e9cuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Chaintreau, and Roxana Geambasu. 2014. XRay: Enhancing the web\u2019s transparency with differential correlation. In Proceedings of the 23rd USENIX Conference on Security Symposium (SEC\u201914). USENIX Association, Berkeley, CA, 49--64. http:\/\/dl.acm.org\/citation.cfm?id&equals;2671225.2671229."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-005-5661-0"},{"key":"e_1_2_1_24_1","volume-title":"https:\/\/www.mozilla.org\/en-US\/lightbeam\/. (Retrieve","author":"Foundation Mozilla","year":"2015","unstructured":"Mozilla Foundation . 2015c. https:\/\/www.mozilla.org\/en-US\/lightbeam\/. (Retrieve Sept. 25, 2015 ). Mozilla Foundation. 2015c. https:\/\/www.mozilla.org\/en-US\/lightbeam\/. (Retrieve Sept. 25, 2015)."},{"key":"e_1_2_1_25_1","first-page":"1701","article-title":"Broken promises of privacy: Responding to the surprising failure of anonymization","volume":"57","author":"Ohm Paul","year":"2010","unstructured":"Paul Ohm . 2010 . Broken promises of privacy: Responding to the surprising failure of anonymization . UCLA Law Review 57 (2010), 1701 . Paul Ohm. 2010. Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review 57 (2010), 1701.","journal-title":"UCLA Law Review"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466470"},{"volume-title":"The Filter Bubble: What the Internet Is Hiding from You","author":"Pariser Eli","key":"e_1_2_1_27_1","unstructured":"Eli Pariser . 2011. The Filter Bubble: What the Internet Is Hiding from You . Penguin Group . Eli Pariser. 2011. The Filter Bubble: What the Internet Is Hiding from You. Penguin Group."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030139"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/4236.968832"},{"key":"e_1_2_1_31_1","volume-title":"Kantor","author":"Ricci Francesco","year":"2010","unstructured":"Francesco Ricci , Lior Rokach , Bracha Shapira , and Paul B . Kantor . 2010 . Recommender Systems Handbook (1st ed.). Springer-Verlag New York , Inc., New York. Francesco Ricci, Lior Rokach, Bracha Shapira, and Paul B. Kantor. 2010. Recommender Systems Handbook (1st ed.). Springer-Verlag New York, Inc., New York."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242643"},{"key":"e_1_2_1_33_1","first-page":"1814","article-title":"PII problem: Privacy and a new concept of personally identifiable information, the","volume":"86","author":"Schwartz Paul M.","year":"2011","unstructured":"Paul M. Schwartz and Daniel J. Solove . 2011 . PII problem: Privacy and a new concept of personally identifiable information, the . NYUL Review 86 (2011), 1814 . Paul M. Schwartz and Daniel J. Solove. 2011. PII problem: Privacy and a new concept of personally identifiable information, the. NYUL Review 86 (2011), 1814.","journal-title":"NYUL Review"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-012-0257-y"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2460276.2460278"},{"volume-title":"http:\/\/www.zemanta.com. (Retrieved","year":"2015","key":"e_1_2_1_36_1","unstructured":"Zemanta. 2015. http:\/\/www.zemanta.com. (Retrieved Sept. 30, 2015 ). Zemanta. 2015. http:\/\/www.zemanta.com. (Retrieved Sept. 30, 2015)."}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2937754","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2937754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:38:20Z","timestamp":1750282700000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2937754"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,5]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,8,5]]}},"alternative-id":["10.1145\/2937754"],"URL":"https:\/\/doi.org\/10.1145\/2937754","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"type":"print","value":"2471-2566"},{"type":"electronic","value":"2471-2574"}],"subject":[],"published":{"date-parts":[[2016,8,5]]},"assertion":[{"value":"2015-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-05-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-08-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}