skip to main content
research-article

Measuring Third-party Tracker Power across Web and Mobile

Published:07 August 2018Publication History
Skip Abstract Section

Abstract

Third-party networks collect vast amounts of data about users via websites and mobile applications. Consolidations among tracker companies can significantly increase their individual tracking capabilities, prompting scrutiny by competition regulators. Traditional measures of market share, based on revenue or sales, fail to represent the tracking capability of a tracker, especially if it spans both web and mobile. This article proposes a new approach to measure the concentration of tracking capability, based on the reach of a tracker on popular websites and apps. Our results reveal that tracker prominence and parent–subsidiary relationships have significant impact on accurately measuring concentration.

References

  1. Gunes Acar, Marc Juarez, Nick Nikiforakis, Claudia Diaz, Seda Gürses, Frank Piessens, and Bart Preneel. 2013. FPDetective: Dusting the web for fingerprinters. In Proceedings of the ACM SIGSAC Conference on Computer 8 Communications Security. ACM, 1129--1140. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Alessandro Acquisti, Curtis R. Taylor, and Liad Wagman. 2016. The economics of privacy. J. Econ. Lit. 54, 2 (2016), 442--492.Google ScholarGoogle ScholarCross RefCross Ref
  3. Jonathan Anderson, Joseph Bonneau, and Frank Stajano. 2010. Inglorious installers: Security in the application marketplace. In WEIS. Citeseer.Google ScholarGoogle Scholar
  4. Julia Angwin. 2016. Google has quietly dropped ban on personally identifiable web tracking. ProPublica. https://www.propublica.org.Google ScholarGoogle Scholar
  5. Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick McDaniel. 2014. Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM SIGPLAN Not. 49, 6 (2014), 259--269. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Arslan Aziz and Rahul Telang. 2015. What Is a Cookie Worth? Technical Report.Google ScholarGoogle Scholar
  7. Brandon Bailey. 2016. WhatsApp is going to share your phone number with Facebook. San Francisco, The Associated Press.Google ScholarGoogle Scholar
  8. Leonid Batyuk, Markus Herpich, Seyit Ahmet Camtepe, Karsten Raddatz, Aubrey-Derrick Schmidt, and Sahin Albayrak. 2011. Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within android applications. In Proceedings of the 2011 6th International Conference on Malicious and Unwanted Software (MALWARE’11). IEEE, 66--72. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ben Bold. 2017. Google and facebook dominate over half of digital media market. Retrieved from https://www.campaignlive.co.uk/article/google-facebook-dominate-half-digital-media-market/1444793.Google ScholarGoogle Scholar
  10. Theodore Book and Dan S. Wallach. 2015. An empirical study of mobile ad targeting. arXiv Preprint arXiv:1502.06577 (2015).Google ScholarGoogle Scholar
  11. Richard Clayton and Tony Mansfield. 2014. A study of Whois privacy and proxy service abuse. In Proceedings of the 13th Workshop on Economics of Information Security.Google ScholarGoogle Scholar
  12. Jay Cline. 2014. U.S. takes the gold in doling out privacy fines. Computerworld, February 17, 2014.Google ScholarGoogle Scholar
  13. James Covert. 2016. Twitter kicked tires on yahoo merger. Retrieved from http://nypost.com/2016/06/02/twitter-talks-to-yahoo-about-merger/.Google ScholarGoogle Scholar
  14. Benjamin Edelman. 2015. Does google leverage market power through tying and bundling? J. Competit. Law Econ. 11, 2 (2015), 365--400.Google ScholarGoogle ScholarCross RefCross Ref
  15. Benjamin G. Edelman and Damien Geradin. 2016. Android and competition law: Exploring and assessing google’s practices in mobile. Euro. Competit. J. 12, 2--3 (2016), 159--194.Google ScholarGoogle Scholar
  16. Manuel Egele, Christopher Kruegel, Engin Kirda, and Giovanni Vigna. 2011. PiOS: Detecting privacy leaks in iOS applications. In Proceedings of the Network and Distributed System Security Symposium (NDSS’11). 177--183.Google ScholarGoogle Scholar
  17. William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. 2014. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. 32, 2 (2014), 5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Steven Englehardt and Arvind Narayanan. 2016. Online tracking: A 1-million-site measurement and analysis. In Proceedings of the ACM Conference on Computer and Communications Security 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Steven Englehardt, Dillon Reisman, Christian Eubank, Peter Zimmerman, Jonathan Mayer, Arvind Narayanan, and Edward W. Felten. 2015. Cookies that give you away: The surveillance implications of web tracking. In Proceedings of the 24th International Conference on World Wide Web. ACM, 289--299. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Nathaniel Fruchter, Hsin Miao, Scott Stevenson, and Rebecca Balebako. 2015. Variations in tracking in relation to geographic location. arXiv Preprint arXiv:1506.04103 (2015).Google ScholarGoogle Scholar
  21. Commissioner Pamela Jones Harbour. 2007. Dissenting Statement in the Matter of Google/Doubleclick. FTC File No. 071-0170. (2007).Google ScholarGoogle Scholar
  22. P. Hustinx. 2014. Privacy and competitiveness in the age of big data. European Data Protection Supervisor, March 26, 2014 (online report).Google ScholarGoogle Scholar
  23. IAB. 2016. IAB Internet Advertising Revenue Report 2015. (2016).Google ScholarGoogle Scholar
  24. Robert H. Lande. 2008. The microsoft-yahoo merger: Yes, privacy is an antitrust concern. University of Baltimore School of Law Legal Studies Research Paper No. 2008-06.Google ScholarGoogle Scholar
  25. Christophe Leung, Jingjing Ren, David Choffnes, and Christo Wilson. 2016. Should you use the app for that? Comparing the privacy implications of app-and web-based online services. (unpublished).Google ScholarGoogle Scholar
  26. Timothy Libert. 2015. Exposing the invisible web: An analysis of third-party HTTP requests on 1 million websites. Int. J. Commun. 9 (2015), 3544--3561.Google ScholarGoogle Scholar
  27. Jialiu Lin, Bin Liu, Norman Sadeh, and Jason I. Hong. 2014. Modeling users’ mobile app privacy preferences: Restoring usability in a sea of permission settings. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS’14). USENIX Association, Menlo Park, CA, 199--212. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Ziang Ma, Haoyu Wang, Yao Guo, and Xiangqun Chen. 2016. LibRadar: Fast and accurate detection of third-party libraries in android apps. In Proceedings of the 38th International Conference on Software Engineering Companion. ACM, 653--656. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Saskia Meier. 2014. Erfolgreicher Anzeigenverkauf in Mobilen Medien: Eine Empirische Analyse Zu Verkaufsindikatoren im Mobile Advertising. Springer-Verlag.Google ScholarGoogle Scholar
  30. Rodrigo Montes, Wilfried Sand-Zantman, and Tommaso M. Valletti. 2015. The value of personal information in markets with endogenous privacy. CEIS Working Paper No. 352.Google ScholarGoogle Scholar
  31. Organisation for Economic Co-operation and Development (OECD). 2015. Data-Driven Innovation: Big Data for Growth and Well-Being. OECD Publishing.Google ScholarGoogle Scholar
  32. Lukasz Olejnik, Tran Minh-Dung, and Claude Castelluccia. 2014. Selling off privacy at auction. Network and Distributed System Security Symposium (NDSS).Google ScholarGoogle ScholarCross RefCross Ref
  33. Frank A. Pasquale. 2013. Privacy, antitrust, and power. George Mason Law Rev. 20, 4 (2013), 1009--1024.Google ScholarGoogle Scholar
  34. Lingzhi Qiu, Zixiong Zhang, Ziyi Shen, and Guozi Sun. 2015. AppTrace: Dynamic trace on android devices. In Proceedings of the 2015 IEEE International Conference on Communications. IEEE, 7145--7150.Google ScholarGoogle ScholarCross RefCross Ref
  35. Jingjing Ren, Ashwin Rao, Martina Lindorfer, Arnaud Legout, and David Choffnes. 2016. Demo: ReCon: Revealing and controlling PII leaks in mobile network traffic. In Proceedings of the International Conference on Mobile Systems, Applications, and Services Companion (MobiSys’16 Companion). 117--117. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Franziska Roesner, Tadayoshi Kohno, and David Wetherall. 2012. Detecting and defending against third-party tracking on the web. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation. USENIX Association, 12--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Sam Schechner. 2017a. Germany says facebook abuses market dominance to collect data. Retrieved from https://www.wsj.com/articles/facebook-abuses-its-dominance-to-harvest-your-data-says-german-antitrust-enforcer-1513680355.Google ScholarGoogle Scholar
  38. Sam Schechner. 2017b. In-app mobile ad spend to reach 45.3bn, facebook and google rejoice. Retrieved from http://adage.com/article/digital/facebook-google-dominate-45-billion-app-ad-market/310761/.Google ScholarGoogle Scholar
  39. Carl Shapiro. 2010. The 2010 horizontal merger guidelines: From hedgehog to fox in forty years. Antitrust Law J. 77, 1 (2010), 49--107.Google ScholarGoogle Scholar
  40. Peter Swire. 2007. Protecting consumers: Privacy matters in antitrust analysis. Cent. Am. Prog. 19, 10 (2007), 7.Google ScholarGoogle Scholar
  41. V. F. Taylor and I. Martinovic. 2017. To update or not to update: Insights from a two-year study of android app evolution. In Proceedings of the ACM Asia Conference on Computer and Communications Security (ASIACCS’17). DOI:http://dx.doi.org/10 Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Narseo Vallina-Rodriguez, Srikanth Sundaresan, Abbas Razaghpanah, Rishab Nithyanand, Mark Allman, Christian Kreibich, and Phillipa Gill. 2016. Tracking the trackers: Towards understanding the mobile advertising and tracking ecosystem. arXiv Preprint arXiv:1609.07190 (2016).Google ScholarGoogle Scholar
  43. Max Van Kleek, Ilaria Liccardi, Reuben Binns, Jun Zhao, Daniel J. Weitzner, and Nigel Shadbolt. 2017. Better the devil you know: Exposing the data sharing practices of smartphone apps. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 5208--5220. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Vincent Verouden. 2004. The role of market shares and market concentration indices in the european commission’s guidelines on the assessment of horizontal mergers under the EC merger regulation. In Comments Prepared for the FTC and US DOJ Merger Enforcement Workshop.Google ScholarGoogle Scholar
  45. Frederick R. Warren-Boulton. 1990. Implications of US experience with horizontal mergers and takeovers for canadian competition policy. The Law and Economics of Competition Policy.Google ScholarGoogle Scholar
  46. Zhonghao Yu, Sam Macbeth, Konark Modi, and Josep M. Pujol. 2016. Tracking the trackers. In Proceedings of the 25th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 121--132. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Ethan Zuckerman. 2014. The internet’s original sin. The Atlantic 14, 8 (2014).Google ScholarGoogle Scholar

Index Terms

  1. Measuring Third-party Tracker Power across Web and Mobile

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Internet Technology
      ACM Transactions on Internet Technology  Volume 18, Issue 4
      Special Issue on Computational Ethics and Accountability, Special Issue on Economics of Security and Privacy and Regular Papers
      November 2018
      348 pages
      ISSN:1533-5399
      EISSN:1557-6051
      DOI:10.1145/3210373
      • Editor:
      • Munindar P. Singh
      Issue’s Table of Contents

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 August 2018
      • Accepted: 1 December 2017
      • Revised: 1 October 2017
      • Received: 1 November 2016
      Published in toit Volume 18, Issue 4

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader