Shopping Online, Privacy, Data Protection and Third-Party Tracking

In the wake of yet another e-commerce data breach in which the names and email addresses of millions of online shoppers and credit card users have been accessed illegally, researchers in the US suggest that privacy discussions, and ultimately legislation must urgently focus on the expanding roles of third-parties handling pervasive online customer profiles.

Nancy King of the College of Business, at Oregon State University, in Corvallis, explains in the latest issue of the International Journal of Private Law that marketers have long created market segments in an effort to create more relevant advertising and efficiently spend advertising dollars.

What has changed in recent years is that in the online world of e-commerce, tracking technologies allow advertisers to construct personal profiles and use them to individually target consumers much more effectively than ever before. As such, network advertising associations, the owners of consumer databases and data mining services and advertising exchanges are now playing a more and more important role in the online behavioral advertising industry.

This paradigm shift in how we, as consumers, are marketed to should become high on the agenda in discussions of privacy in the European Union, the USA and elsewhere as legislation to cope with e-commerce is drafted. Continue reading…

Related Posts

Dissecting the Android KorBanker malware KorBanker is a malware currently making the rounds on Android devices. It's only targeting banking customers in South Korea, especially customers ...
Interactive Data Science with R in Apache Zeppelin Notebook The objective of this blog post is to help you get started with Apache Zeppelin notebook for your R data science requirements. Zeppelin is a web-based...
The K Desktop Environment is 15 Editor: The title of this article is misleading, but trust me, it was not intentional. KDE is actually 16, but KDE e. V., the non-profit organization ...
Technique Turns Computer Chip Defects Into an Advantage Physicists at Ohio State University have discovered that tiny defects inside a computer chip can be used to tune the properties of key atoms in the ch...
Distributed R brings scalable, high-performance Big Data analytics to R The R statistical and programming language is a single-threaded language, a factor that counts against it when it comes to analyzing massive datasets....
Quad-core Android SmartTV on a stick A new USB stick-sized Android SmartTV from Sanko Co., Ltd of Japan features a quad-core 1.2 GHz Freescale i.mx6 processor. I think that's more power t...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*