{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T08:11:46Z","timestamp":1747210306385,"version":"3.40.5"},"reference-count":66,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>In the modern online world, users are often asked for a permission to track their actions as a permission to \u201callow cookies\u201d. The gathered information could be very valuable for a potential advertiser. However, online tracking is not only a benefit for a user but also a threat to the user\u2019s privacy. This information combined with a targeted advertisement on a mass scale has potential to alter behaviour of large groups. This study summarises previous academic work on online user tracking and anti-tracking measures. As a result, it describes the current mechanisms used to track a user, as well as some methods that can be applied to reduce tracking. The study concludes that government legislation and open dialog between Internet users and advertisers might be the only way to ensure online privacy.<\/jats:p>","DOI":"10.2478\/acss-2022-0008","type":"journal-article","created":{"date-parts":[[2022,8,24]],"date-time":"2022-08-24T10:00:14Z","timestamp":1661335214000},"page":"75-82","source":"Crossref","is-referenced-by-count":0,"title":["Internet User Trackers and Where to Find Them"],"prefix":"10.2478","volume":"27","author":[{"given":"Vitalijs","family":"Teze","sequence":"first","affiliation":[{"name":"Riga Technical University , Riga , Latvia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1731-989X","authenticated-orcid":false,"given":"Erika","family":"Nazaruka","sequence":"additional","affiliation":[{"name":"Riga Technical University , Riga , Latvia"}]}],"member":"374","published-online":{"date-parts":[[2022,8,23]]},"reference":[{"key":"2024042805550789940_j_acss-2022-0008_ref_001","unstructured":"[1] A. Gutmann, \u201cOnline advertising revenue in the United States from 2000 to 2020,\u201d 2020. [Online]. Available: https:\/\/www.statista.com\/statistics\/183816\/us-online-advertising-revenue-since-2000\/. Accessed on: Jan. 02, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_002","unstructured":"[2] \u201cTotal number of Websites.\u201d [Online]. Available: https:\/\/www.internetlivestats.com\/total-number-of-websites\/#trend. Accessed on: Jan. 02, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_003","unstructured":"[3] G. Dautovic, \u201cThe 45 most important advertising statistics of 2020,\u201d 2020. [Online]. Available: https:\/\/web.archive.org\/web\/20201126090706\/ https:\/\/www.smallbizgenius.net\/by-the-numbers\/advertising-statistics\/. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_004","unstructured":"[4] J. Johnson, \u201cDaily internet usage per capita worldwide 2011\u20132021, by device,\u201d Jan. 27, 2021. [Online]. Available: https:\/\/www.statista.com\/statistics\/319732\/daily-time-spent-online-device\/. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_005","doi-asserted-by":"crossref","unstructured":"[5] G. Broussard, \u201cHow advertising frequency can work to build online advertising effectiveness,\u201d International Journal of Market Research, vol. 42, no. 4, 2000. https:\/\/doi.org\/10.1177\/147078530004200406","DOI":"10.1177\/147078530004200406"},{"key":"2024042805550789940_j_acss-2022-0008_ref_006","unstructured":"[6] H. Beales, \u201cThe value of behavioural targeting,\u201d Director, pp. 1\u201323, 2010. [Online]. Available: http:\/\/www.socialized.fr\/wp-content\/uploads\/2010\/08\/beales-etude-sur-le-ciblage-comportementalsur-internet-ppc4bible.pdf"},{"key":"2024042805550789940_j_acss-2022-0008_ref_007","doi-asserted-by":"crossref","unstructured":"[7] B. Ur, P. G. Leon, L. F. Cranor, R. Shay, and Y. Wang, \u201cSmart, useful, scary, creepy,\u201d in Proceedings of the Eighth Symposium on Usable Privacy and Security \u2013 SOUPS\u201912, Jul. 2012, Art no. 4, pp. 1\u201315. https:\/\/doi.org\/10.1145\/2335356.2335362","DOI":"10.1145\/2335356.2335362"},{"key":"2024042805550789940_j_acss-2022-0008_ref_008","doi-asserted-by":"crossref","unstructured":"[8] T. Dehling, Y. Zhang, and A. Sunyaev, \u201cConsumer perceptions of online behavioral advertising,\u201d in Proceedings \u2013 21st IEEE Conference on Business Informatics, CBI 2019, vol. 1, Moscow, Russia, Aug. 2019, pp. 345\u2013354. https:\/\/doi.org\/10.1109\/CBI.2019.00046","DOI":"10.1109\/CBI.2019.00046"},{"key":"2024042805550789940_j_acss-2022-0008_ref_009","doi-asserted-by":"crossref","unstructured":"[9] J. Estrada-Jim\u00e9nez, J. Parra-Arnau, A. Rodr\u00edguez-Hoyos, and J. Forn\u00e9, \u201cOnline advertising: Analysis of privacy threats and protection approaches,\u201d Computer Communications, vol. 100, pp. 32\u201351, Mar. 2017. https:\/\/doi.org\/10.1016\/j.comcom.2016.12.016","DOI":"10.1016\/j.comcom.2016.12.016"},{"key":"2024042805550789940_j_acss-2022-0008_ref_010","doi-asserted-by":"crossref","unstructured":"[10] J. W. Woensdregt, H. M. Al-Khateeb, G. Epiphaniou, and H. Jahankhani, \u201cAdPExT: Designing a tool to assess information gleaned from browsers by online advertising platforms,\u201d in Proceedings of 12th International Conference on Global Security, Safety and Sustainability, ICGS3 2019, London, UK, Apr. 2019. https:\/\/doi.org\/10.1109\/ICGS3.2019.8688328","DOI":"10.1109\/ICGS3.2019.8688328"},{"key":"2024042805550789940_j_acss-2022-0008_ref_011","doi-asserted-by":"crossref","unstructured":"[11] S. Yuan, J. Wang, and X. Zhao, \u201cReal-time bidding for online advertising,\u201d in Proceedings of the Seventh International Workshop on Data Mining for Online Advertising \u2013 ADKDD\u201913, Aug. 2013, Art no. 3, pp. 1\u20138. https:\/\/doi.org\/10.1145\/2501040.2501980","DOI":"10.1145\/2501040.2501980"},{"key":"2024042805550789940_j_acss-2022-0008_ref_012","doi-asserted-by":"crossref","unstructured":"[12] J. Yan, N. Liu, G. Wang, W. Zhang, Y. Jiang, and Z. Chen, \u201cHow much can behavioral targeting help online advertising?\u201d in Proceedings of the 18th international conference on World wide web \u2013 WWW\u201909, Apr. 2009, pp. 261\u2013270. https:\/\/doi.org\/10.1145\/1526709.1526745","DOI":"10.1145\/1526709.1526745"},{"key":"2024042805550789940_j_acss-2022-0008_ref_013","doi-asserted-by":"crossref","unstructured":"[13] X. Wu, J. Yan, N. Liu, S. Yan, Y. Chen, and Z. Chen, \u201cProbabilistic latent semantic user segmentation for behavioral targeted advertising,\u201d in Proceedings of the Third International Workshop on Data Mining and Audience Intelligence for Advertising \u2013 ADKDD\u201909, Jun. 2009, pp. 10\u201317. https:\/\/doi.org\/10.1145\/1592748.1592751","DOI":"10.1145\/1592748.1592751"},{"key":"2024042805550789940_j_acss-2022-0008_ref_014","doi-asserted-by":"crossref","unstructured":"[14] F. Provost, B. Dalessandro, and R. Hook, \u201cAudience selection for on-line brand advertising: Privacy-friendly social network targeting,\u201d in Proceedings of the Fifteenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Jun. 2009, pp. 707\u2013715. https:\/\/doi.org\/10.1145\/1557019.1557098","DOI":"10.1145\/1557019.1557098"},{"key":"2024042805550789940_j_acss-2022-0008_ref_015","doi-asserted-by":"crossref","unstructured":"[15] S. Muthukrishnan, \u201cAd exchanges: Research issues,\u201d in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5929 LNCS, Springer, Berlin, Heidelberg, 2009, pp. 1\u201312. https:\/\/doi.org\/10.1007\/978-3-642-10841-9_1","DOI":"10.1007\/978-3-642-10841-9_1"},{"key":"2024042805550789940_j_acss-2022-0008_ref_016","doi-asserted-by":"crossref","unstructured":"[16] N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna, \u201cCookieless monster: Exploring the ecosystem of web-based device fingerprinting,\u201d in Proceedings \u2013 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, Jun. 2013, pp. 541\u2013555. https:\/\/doi.org\/10.1109\/SP.2013.43","DOI":"10.1109\/SP.2013.43"},{"key":"2024042805550789940_j_acss-2022-0008_ref_017","unstructured":"[17] N. Confessore, \u201cCambridge analytica and Facebook: The scandal and the fallout so far,\u201d Apr. 04, 2018. [Online]. Available: https:\/\/www.nytimes.com\/2018\/04\/04\/us\/politics\/cambridge-analytica-scandal-fallout.html. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_018","unstructured":"[18] G. Jefferson, \u201cIs Facebook listening to me? Why those ads appear after you talk about things,\u201d 2019. [Online]. Available: https:\/\/phys.org\/news\/2019-06-facebook-ads.html. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_019","unstructured":"[19] C. Bennett, \u201cBehind the one-way mirror: A deep dive into the technology of corporate surveillance,\u201d 2019. [Online]. Available: https:\/\/www.eff.org\/wp\/behind-the-one-way-mirror. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_020","unstructured":"[20] J. Schwartz, \u201cGiving Web a memory cost its users privacy,\u201d 2001. [Online]. Available: https:\/\/www.nytimes.com\/2001\/09\/04\/business\/giving-web-a-memory-cost-its-users-privacy.html. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_021","unstructured":"[21] D. Kristol and L. Montulli, \u201cRequest for comments: 2109,\u201d 1997. [Online]. Available: https:\/\/tools.ietf.org\/html\/rfc2109. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_022","unstructured":"[22] \u201cWhat are cookies?\u201d [Online]. Available: https:\/\/cookiecontroller.com\/what-are-cookies\/. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_023","unstructured":"[23] S. Sternberg, \u201cFseek man page.\u201d [Online]. Available: https:\/\/www.sas.upenn.edu\/~saul\/parasite\/man\/man3\/fseek.3.html. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_024","unstructured":"[24] D. Kristol and L. Montulli, \u201cRequest for comments: 2965,\u201d 2000. [Online]. Available: https:\/\/tools.ietf.org\/html\/rfc2965. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_025","unstructured":"[25] L. Sullivan, \u201c64% of tracking cookies are blocked, deleted by Web browsers,\u201d 2018. [Online]. Available: https:\/\/www.mediapost.com\/publications\/article\/316757\/64-of-tracking-cookies-are-blocked-deleted-by-we.html. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_026","unstructured":"[26] G. Fishback, \u201cGoogle\u2019s new cookie restrictions: A nail in a coffin we should have already buried,\u201d 2021. [Online]. Available: https:\/\/www.spiceworks.com\/marketing\/advertising\/guest-article\/google-new-cookie-restrictions-a-nail-in-a-coffin-we-should-have-already-buried\/. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_027","unstructured":"[27] P. Laperdrix, N. Bielova, B. Baudry, and G. Avoine, \u201cBrowser fingerprinting: A survey,\u201d May 2019. [Online]. Available: http:\/\/arxiv.org\/abs\/1905.01051. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_028","doi-asserted-by":"crossref","unstructured":"[28] O. E. Elejla, B. Belaton, M. Anbar, and B. O. Alijla, \u201cIPv6 OS fingerprinting methods: Review,\u201d in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10645 LNCS, Springer, Cham, Nov. 2017, pp. 661\u2013668. https:\/\/doi.org\/10.1007\/978-3-319-70010-6_61","DOI":"10.1007\/978-3-319-70010-6_61"},{"key":"2024042805550789940_j_acss-2022-0008_ref_029","doi-asserted-by":"crossref","unstructured":"[29] N. Takei, T. Saito, K. Takasu, and T. Yamada, \u201cWeb browser fingerprinting using only cascading style sheets,\u201d in Proceedings \u2013 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2015, Krakow, Poland, Nov. 2015, pp. 57\u201363. https:\/\/doi.org\/10.1109\/BWCCA.2015.105","DOI":"10.1109\/BWCCA.2015.105"},{"key":"2024042805550789940_j_acss-2022-0008_ref_030","unstructured":"[30] K. Mowery and H. Shacham, \u201cPixel perfect: Fingerprinting canvas in HTML5,\u201d Web 2.0 Security & Privacy 20 (W2SP), pp. 1\u201312, 2012. [Online]. Available: http:\/\/www.joelonsoftware.com\/items\/"},{"key":"2024042805550789940_j_acss-2022-0008_ref_031","doi-asserted-by":"crossref","unstructured":"[31] D. Jang, R. Jhala, S. Lerner, and H. Shacham, \u201cAn empirical study of privacy-violating information flows in JavaScript web applications,\u201d in Proceedings of the ACM Conference on Computer and Communications Security, 2010, pp. 270\u2013283. https:\/\/doi.org\/10.1145\/1866307.1866339","DOI":"10.1145\/1866307.1866339"},{"key":"2024042805550789940_j_acss-2022-0008_ref_032","doi-asserted-by":"crossref","unstructured":"[32] J. Parra-Arnau, D. Rebollo-Monedero, and J. Forn\u00e9, \u201cMeasuring the privacy of user profiles in personalized information systems,\u201d Future Generation Computer Systems, vol. 33, pp. 53\u201363, Apr. 2014. https:\/\/doi.org\/10.1016\/j.future.2013.01.001","DOI":"10.1016\/j.future.2013.01.001"},{"key":"2024042805550789940_j_acss-2022-0008_ref_033","doi-asserted-by":"crossref","unstructured":"[33] L. Sweeney, \u201cDiscrimination in online Ad Delivery,\u201d SSRN Electronic Journal, Jan. 2013, pp. 1\u201336. https:\/\/doi.org\/10.2139\/ssrn.2208240","DOI":"10.2139\/ssrn.2208240"},{"key":"2024042805550789940_j_acss-2022-0008_ref_034","doi-asserted-by":"crossref","unstructured":"[34] B. Kitts, N. McCoy, and M. van den Berg, \u201cThe future of online advertising: Thoughts on emerging issues in privacy, information bubbles, and disinformation,\u201d in 2019 IEEE International Symposium on Technology and Society (ISTAS), vol. 2017, Medford, MA, USA, Nov. 2019, pp. 1\u201311. https:\/\/doi.org\/10.1109\/ISTAS48451.2019.8937870","DOI":"10.1109\/ISTAS48451.2019.8937870"},{"key":"2024042805550789940_j_acss-2022-0008_ref_035","unstructured":"[35] E. Mills, \u201cDevice identification in online banking is privacy threat, expert says,\u201d 2009. [Online]. Available: https:\/\/www.cnet.com\/news\/device-identification-in-online-banking-is-privacy-threat-expert-says. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_036","doi-asserted-by":"crossref","unstructured":"[36] L. V. Balakhonskaya, D. P. Gavra, I. V. Beresneva, and K. K. Sadirova, \u201cMarkers of manipulation in the electoral communication in a digital environment,\u201d in Proceedings of the 2020 IEEE Communication Strategies in Digital Society Seminar, ComSDS 2020, St. Petersburg, Russia, 2020, pp. 91\u201398. https:\/\/doi.org\/10.1109\/ComSDS49898.2020.9101306","DOI":"10.1109\/ComSDS49898.2020.9101306"},{"key":"2024042805550789940_j_acss-2022-0008_ref_037","unstructured":"[37] J. R. Mayer, \u201c\u201cAny person... a pamphleteer\u201d. Internet anonymity in the age of Web 2.0,\u201d 2009. [Online]. Available: https:\/\/jonathanmayer.org\/papers_data\/thesis09.pdf"},{"key":"2024042805550789940_j_acss-2022-0008_ref_038","doi-asserted-by":"crossref","unstructured":"[38] P. Eckersley, \u201cHow unique is your web browser?\u201d in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6205 LNCS, Springer, Berlin, Heidelberg, 2010, pp. 1\u201318. https:\/\/doi.org\/10.1007\/978-3-642-14527-8_1","DOI":"10.1007\/978-3-642-14527-8_1"},{"key":"2024042805550789940_j_acss-2022-0008_ref_039","doi-asserted-by":"crossref","unstructured":"[39] C. E. Shannon, \u201cA mathematical theory of communication,\u201d Bell System Technical Journal, vol. 27, no. 4, pp. 623\u2013656, Oct. 1948. https:\/\/doi.org\/10.1002\/j.1538-7305.1948.tb00917.x","DOI":"10.1002\/j.1538-7305.1948.tb00917.x"},{"key":"2024042805550789940_j_acss-2022-0008_ref_040","doi-asserted-by":"crossref","unstructured":"[40] E. Antonio, A. Fajardo, and R. Medina, \u201cTracking browser fingerprint using rule based algorithm,\u201d in Proceedings \u2013 2020 16th IEEE International Colloquium on Signal Processing and its Applications, CSPA 2020, Langkawi, Malaysia, Feb. 2020, pp. 225\u2013229. https:\/\/doi.org\/10.1109\/CSPA48992.2020.9068729","DOI":"10.1109\/CSPA48992.2020.9068729"},{"key":"2024042805550789940_j_acss-2022-0008_ref_041","doi-asserted-by":"crossref","unstructured":"[41] T. D. Laksono, Y. Rosmansyah, B. Dabarsyah, and J. U. Choi, \u201cJavaScript-based device fingerprinting mitigation using personal HTTP proxy,\u201d in 2015 International Conference on Information Technology Systems and Innovation (ICITSI), Bandung, Indonesia, Mar. 2016, pp. 1\u20136. https:\/\/doi.org\/10.1109\/ICITSI.2015.7437697","DOI":"10.1109\/ICITSI.2015.7437697"},{"key":"2024042805550789940_j_acss-2022-0008_ref_042","unstructured":"[42] T. Fosmark, \u201cAdobe Flash end of support on December 31, 2020,\u201d 2020. [Online]. Available: https:\/\/docs.microsoft.com\/enus\/lifecycle\/announcements\/adobe-flash-end-of-support.\/ Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_043","doi-asserted-by":"crossref","unstructured":"[43] K. Boda, \u00c1. M. F\u00f6ldes, G. G. Guly\u00e1s, and S. Imre, \u201cUser tracking on the Web via cross-browser fingerprinting,\u201d in LNCS, vol. 7161, Springer, Berlin, Heidelberg, 2012, pp. 31\u201346. https:\/\/doi.org\/10.1007\/978-3-642-29615-4_4","DOI":"10.1007\/978-3-642-29615-4_4"},{"key":"2024042805550789940_j_acss-2022-0008_ref_044","doi-asserted-by":"crossref","unstructured":"[44] C. Kolbitsch, B. Livshits, B. Zorn, and C. Seifert, \u201cRozzle: De-cloaking Internet malware,\u201d in Proceedings \u2013 IEEE Symposium on Security and Privacy, San Francisco, CA, May 2012, pp. 443\u2013457. https:\/\/doi.org\/10.1109\/SP.2012.48","DOI":"10.1109\/SP.2012.48"},{"key":"2024042805550789940_j_acss-2022-0008_ref_045","unstructured":"[45] S. Baviskar and P. S. Thilagam, \u201cProtection of Web user\u2019s privacy by securing browser from Web privacy attacks,\u201d International Journal of Computer Technology and Applications, vol. 2, no. 4, pp. 1051\u20131057, 2011. [Online]. Available: https:\/\/www.researchgate.net\/publication\/267410556"},{"key":"2024042805550789940_j_acss-2022-0008_ref_046","unstructured":"[46] M. Vaites, \u201cThe effectiveness of a browser fingerprint as a tool for tracking,\u201d M.S. thesis, Open University, UK, 2013."},{"key":"2024042805550789940_j_acss-2022-0008_ref_047","unstructured":"[47] M. Perry, E. Clark, S. Murdoch, and G. Koppen, \u201cThe design and implementation of the Tor browser [DRAFT],\u201d 2018. [Online]. Available: http:\/\/www.torproject.org\/projects\/torbrowser\/design\/"},{"key":"2024042805550789940_j_acss-2022-0008_ref_048","doi-asserted-by":"crossref","unstructured":"[48] N. Kaur, S. Azam, K. Kannoorpatti, K. C. Yeo, and B. Shanmugam, \u201cBrowser fingerprinting as user tracking technology,\u201d in Proceedings of 2017 11th International Conference on Intelligent Systems and Control, ISCO 2017, Coimbatore, India, Jan. 2017, pp. 103\u2013111. https:\/\/doi.org\/10.1109\/ISCO.2017.7855963","DOI":"10.1109\/ISCO.2017.7855963"},{"key":"2024042805550789940_j_acss-2022-0008_ref_049","unstructured":"[49] I. Hickson and D. Hyatt, Eds., \u201cA vocabulary and associated APIs for HTML and XHTML,\u201d 2008. [Online]. Available: https:\/\/www.w3.org\/TR\/2008\/WD-html5-20080122\/. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_050","doi-asserted-by":"crossref","unstructured":"[50] A. Elbanna and N. Abdelbaki, \u201cBrowsers fingerprinting motives, methods, and countermeasures,\u201d in CITS 2018 \u2013 2018 International Conference on Computer, Information and Telecommunication Systems, Alsace, Colmar, Jul. 2018, pp. 1\u20135. https:\/\/doi.org\/10.1109\/CITS.2018.8440163","DOI":"10.1109\/CITS.2018.8440163"},{"key":"2024042805550789940_j_acss-2022-0008_ref_051","doi-asserted-by":"crossref","unstructured":"[51] G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan, and C. Diaz, \u201cThe Web never forgets: Persistent tracking mechanisms in the wild categories and subject descriptors,\u201d in Proceedings of the ACM Conference on Computer and Communications Security, Nov. 2014, pp. 674\u2013689. https:\/\/doi.org\/10.1145\/2660267.2660347","DOI":"10.1145\/2660267.2660347"},{"key":"2024042805550789940_j_acss-2022-0008_ref_052","doi-asserted-by":"crossref","unstructured":"[52] M. Ayenson, D. J. Wambach, A. Soltani, N. Good, and C. J. Hoofnagle, \u201cFlash cookies and privacy II: Now with HTML5 and ETag respawning,\u201d SSRN Electronic Journal, Jul. 2011, pp. 1\u201321. https:\/\/doi.org\/10.2139\/ssrn.1898390","DOI":"10.2139\/ssrn.1898390"},{"key":"2024042805550789940_j_acss-2022-0008_ref_053","doi-asserted-by":"crossref","unstructured":"[53] M. Schwarz, F. Lackner, and D. Gruss, \u201cJavaScript template attacks: Automatically inferring host information for targeted exploits,\u201d in Proceedings 2019 Network and Distributed System Security Symposium, San Diego, CA, USA, Feb. 2019. https:\/\/doi.org\/10.14722\/ndss.2019.23155","DOI":"10.14722\/ndss.2019.23155"},{"key":"2024042805550789940_j_acss-2022-0008_ref_054","unstructured":"[54] European Parliament, \u201cGeneral data protection regulation,\u201d May 25, 2018. [Online]. Available: https:\/\/gdpr-info.eu\/. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_055","unstructured":"[55] J. Porter, \u201cGoogle fined \u20ac50 million for GDPR violation in France,\u201d 2019. [Online]. Available: https:\/\/www.theverge.com\/2019\/1\/21\/18191591\/google-gdpr-fine-50-million-euros-data-consent-cnil. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_056","unstructured":"[56] E. Price, \u201cFrance fines Google $57 million for GDPR violations,\u201d 2019. [Online]. Available: http:\/\/fortune.com\/2019\/01\/21\/france-fines-google-57-million-for-gdpr-violations\/. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_057","unstructured":"[57] C. Page, \u201cOracle and salesforce hit with $10 billion GDPR class-action lawsuit,\u201d 2020. [Online]. Available: https:\/\/www.forbes.com\/sites\/carlypage\/2020\/08\/14\/oracle-andsalesforce-hit-with-10-billion-gdpr-class-action-lawsuit. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_058","doi-asserted-by":"crossref","unstructured":"[58] T. Sakamoto and M. Matsunaga, \u201cAfter GDPR, still tracking or not? Understanding opt-out states for online behavioral advertising,\u201d in 2019 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, May 2019, pp. 92\u201399. https:\/\/doi.org\/10.1109\/SPW.2019.00027","DOI":"10.1109\/SPW.2019.00027"},{"key":"2024042805550789940_j_acss-2022-0008_ref_059","doi-asserted-by":"crossref","unstructured":"[59] P. Laperdrix, W. Rudametkin, and B. Baudry, \u201cBeauty and the beast: Diverting modern Web browsers to build unique browser fingerprints,\u201d in Proceedings \u2013 2016 IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 2016, pp. 878\u2013894. https:\/\/doi.org\/10.1109\/SP.2016.57","DOI":"10.1109\/SP.2016.57"},{"key":"2024042805550789940_j_acss-2022-0008_ref_060","unstructured":"[60] R. Brandom, \u201cGoogle, Microsoft, and Amazon are paying to get around Adblock Plus,\u201d 2015. [Online]. Available: https:\/\/www.theverge.com\/2015\/2\/2\/7963577\/google-ads-get-through-adblock. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_061","unstructured":"[61] A. Henry, \u201cAd-Blocker ghostery actually helps advertisers, if you \u2018support\u2019 it,\u201d 2013. [Online]. Available: https:\/\/lifehacker.com\/ad-blocking-extension-ghostery-actually-sells-data-to-a-514417864. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_062","unstructured":"[62] N. Lomas, \u201cU.K. carrier EE looking at giving users control over mobile ads,\u201d 2015. [Online]. Available: http:\/\/techcrunch.com\/2015\/11\/23\/u-k-carrier-ee-looking-at-giving-users-control-over-mobile-ads. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_063","unstructured":"[63] N. Lomas, \u201cShine signs first European carriers to its network-level ad blocking tech,\u201d 2016. [Online]. Available: https:\/\/techcrunch.com\/2016\/02\/18\/shine-bags-first-european-carrier-as-three-uk-deploys-network-level-ad-blocking\/?guccounter=1. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_064","unstructured":"[64] \u201cBrave Browser.\u201d [Online]. Available: https:\/\/brave.com\/. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_065","unstructured":"[65] Brave, \u201cBrave launches the first advertising platform built on privacy,\u201d 2019. [Online]. Available: https:\/\/brave.com\/brave-ads-launch\/. Accessed on: Jul. 09, 2022."},{"key":"2024042805550789940_j_acss-2022-0008_ref_066","unstructured":"[66] European Parliament, \u201cWhat should I do if I think that my personal data protection rights haven\u2019t been respected?\u201d 2018. [Online]. Available: https:\/\/ec.europa.eu\/info\/law\/law-topic\/data-protection\/reform\/rights-citizens\/redress\/what-should-i-do-if-i-think-my-personal-data-protection-rights-havent-been-respected_en. Accessed on: Jul. 09, 2022."}],"container-title":["Applied Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.sciendo.com\/pdf\/10.2478\/acss-2022-0008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,28]],"date-time":"2024-04-28T05:55:41Z","timestamp":1714283741000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.sciendo.com\/article\/10.2478\/acss-2022-0008"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,1]]},"references-count":66,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,8,23]]},"published-print":{"date-parts":[[2022,6,1]]}},"alternative-id":["10.2478\/acss-2022-0008"],"URL":"https:\/\/doi.org\/10.2478\/acss-2022-0008","relation":{},"ISSN":["2255-8691"],"issn-type":[{"type":"electronic","value":"2255-8691"}],"subject":[],"published":{"date-parts":[[2022,6,1]]}}}