{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:31:28Z","timestamp":1765546288253,"version":"3.41.0"},"reference-count":49,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2018,1,27]],"date-time":"2018-01-27T00:00:00Z","timestamp":1517011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union\u2019s Horizon 2020 research","award":["653449"],"award-info":[{"award-number":["653449"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Web"],"published-print":{"date-parts":[[2018,5,31]]},"abstract":"<jats:p>The exponential growth in smartphone adoption is contributing to the availability of vast amounts of human behavioral data. This data enables the development of increasingly accurate data-driven user models that facilitate the delivery of personalized services that are often free in exchange for the use of its customers\u2019 data. Although such usage conventions have raised many privacy concerns, the increasing value of personal data is motivating diverse entities to aggressively collect and exploit the data. In this article, we unfold profiling scenarios around mobile HTTP(S) traffic, focusing on those that have limited but meaningful segments of the data. The capability of the scenarios to profile personal information is examined with real user data, collected in the wild from 61 mobile phone users for a minimum of 30 days. Our study attempts to model heterogeneous user traits and interests, including personality, boredom proneness, demographics, and shopping interests. Based on our modeling results, we discuss various implications to personalization, privacy, and personal data rights.<\/jats:p>","DOI":"10.1145\/3143402","type":"journal-article","created":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T13:48:05Z","timestamp":1517233685000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["When Simpler Data Does Not Imply Less Information"],"prefix":"10.1145","volume":"12","author":[{"given":"Souneil","family":"Park","sequence":"first","affiliation":[{"name":"Telefonica Research"}]},{"given":"Aleksandar","family":"Matic","sequence":"additional","affiliation":[{"name":"Telefonica Alpha"}]},{"given":"Kamini","family":"Garg","sequence":"additional","affiliation":[{"name":"University of Applied Sciences and Arts of Southern Switzerland, Switzerland"}]},{"given":"Nuria","family":"Oliver","sequence":"additional","affiliation":[{"name":"Telefonica Research, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2018,1,27]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2007.0225"},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Albert-Laszlo Barabasi. 2005. The origin of bursts and heavy tails in human dynamics. Nature 435 7039 207--211.  Albert-Laszlo Barabasi. 2005. The origin of bursts and heavy tails in human dynamics. Nature 435 7039 207--211.","DOI":"10.1038\/nature03459"},{"volume-title":"Proceedings of the 5th International Conference on Mobile Ubiquitous Computing, Systems, Services, and Technologies (UBICOMM\u201911)","year":"2011","author":"Bian Li","key":"e_1_2_1_4_1"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944937"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2007.01.019"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836098"},{"volume-title":"Proceedings of the 4th International Conference on Language Resources and Evaluation (LREC\u201904)","year":"2004","author":"Carreras Xavier","key":"e_1_2_1_9_1"},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS\u201914)","year":"2014","author":"Castelluccia Claude","key":"e_1_2_1_10_1"},{"volume-title":"Proceedings of the 3rd Annual Symposium on Document Analysis and Information Retrieval (SDAIR\u201994)","author":"William","key":"e_1_2_1_11_1"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753503"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-011-0490-1"},{"volume-title":"Protection of Personal Data. Retrieved","year":"2017","author":"European Commission","key":"e_1_2_1_14_1"},{"volume-title":"Economics of Information Security and Privacy","author":"Compa\u00f1\u00f3 Ram\u00f3n","key":"e_1_2_1_15_1"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep01376"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37210-0_6"},{"volume-title":"Proceedings of the 29th Inter-American Congress of Psychology, Lima. 13--18","author":"Del Barrio M. V.","key":"e_1_2_1_18_1"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the USENIX Security Symposium","volume":"2","author":"Enck William","year":"2011"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327752jpa5001_2"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2890085"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jrp.2005.08.007"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663744"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/0191-8869(88)90045-1"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.2224\/sbp.2010.38.5.673"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775089"},{"key":"e_1_2_1_28_1","first-page":"1995","article-title":"Addictive use due to personality: Focused on Big Five personality traits and game addiction. International Journal of Social, Behavioral, Educational","volume":"9","author":"Jeong Eui Jun","year":"2015","journal-title":"Economic, Business and Industrial Engineering"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1220433110"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043932.2043964"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718542"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1218772110"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2004.06.001"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501611"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526899"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719970.1719976"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2807530"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2674991"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1162\/DAED_a_00113"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463579.2463581"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2008.03.007"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2636242.2636244"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370266"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632074"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.10.010"},{"key":"e_1_2_1_49_1","first-page":"4","article-title":"Big Five personality traits as predictors of Internet usage categories","volume":"30","author":"Tsao Wen-Chin","year":"2013","journal-title":"International Journal of Management"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.2224\/sbp.2008.36.5.693"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684822.2685287"}],"container-title":["ACM Transactions on the Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3143402","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3143402","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:21Z","timestamp":1750212801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3143402"}},"subtitle":["A Study of User Profiling Scenarios With Constrained View of Mobile HTTP(S) Traffic"],"short-title":[],"issued":{"date-parts":[[2018,1,27]]},"references-count":49,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,5,31]]}},"alternative-id":["10.1145\/3143402"],"URL":"https:\/\/doi.org\/10.1145\/3143402","relation":{},"ISSN":["1559-1131","1559-114X"],"issn-type":[{"type":"print","value":"1559-1131"},{"type":"electronic","value":"1559-114X"}],"subject":[],"published":{"date-parts":[[2018,1,27]]},"assertion":[{"value":"2017-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-01-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}