3,272 research outputs found
Domain-specific queries and Web search personalization: some investigations
Major search engines deploy personalized Web results to enhance users'
experience, by showing them data supposed to be relevant to their interests.
Even if this process may bring benefits to users while browsing, it also raises
concerns on the selection of the search results. In particular, users may be
unknowingly trapped by search engines in protective information bubbles, called
"filter bubbles", which can have the undesired effect of separating users from
information that does not fit their preferences. This paper moves from early
results on quantification of personalization over Google search query results.
Inspired by previous works, we have carried out some experiments consisting of
search queries performed by a battery of Google accounts with differently
prepared profiles. Matching query results, we quantify the level of
personalization, according to topics of the queries and the profile of the
accounts. This work reports initial results and it is a first step a for more
extensive investigation to measure Web search personalization.Comment: In Proceedings WWV 2015, arXiv:1508.0338
On the Robustness of Topics API to a Re-Identification Attack
Web tracking through third-party cookies is considered a threat to users'
privacy and is supposed to be abandoned in the near future. Recently, Google
proposed the Topics API framework as a privacy-friendly alternative for
behavioural advertising. Using this approach, the browser builds a user profile
based on navigation history, which advertisers can access. The Topics API has
the possibility of becoming the new standard for behavioural advertising, thus
it is necessary to fully understand its operation and find possible
limitations.
This paper evaluates the robustness of the Topics API to a re-identification
attack where an attacker reconstructs the user profile by accumulating user's
exposed topics over time to later re-identify the same user on a different
website. Using real traffic traces and realistic population models, we find
that the Topics API mitigates but cannot prevent re-identification to take
place, as there is a sizeable chance that a user's profile is unique within a
website's audience. Consequently, the probability of correct re-identification
can reach 15-17%, considering a pool of 1,000 users. We offer the code and data
we use in this work to stimulate further studies and the tuning of the Topic
API parameters.Comment: Privacy Enhancing Technologies Symposium (PETS) 202
On the Robustness of Topics API to a Re-Identification Attack
Web tracking through third-party cookies is considered a threat to users' privacy and is supposed to be abandoned in the near future. Recently, Google proposed the Topics API framework as a privacy-friendly alternative for behavioural advertising. Using this approach, the browser builds a user profile based on navigation history, which advertisers can access. The Topics API has the possibility of becoming the new standard for behavioural advertising, thus it is necessary to fully understand its operation and find possible limitations. This paper evaluates the robustness of the Topics API to a re-identification attack where an attacker reconstructs the user profile by accumulating user's exposed topics over time to later re-identify the same user on a different website. Using real traffic traces and realistic population models, we find that the Topics API mitigates but cannot prevent re-identification to take place, as there is a sizeable chance that a user's profile is unique within a website's audience. Consequently, the probability of correct re-identification can reach 15-17%, considering a pool of 1,000 users. We offer the code and data we use in this work to stimulate further studies and the tuning of the Topic API parameters
Content Reuse and Interest Sharing in Tagging Communities
Tagging communities represent a subclass of a broader class of user-generated
content-sharing online communities. In such communities users introduce and tag
content for later use. Although recent studies advocate and attempt to harness
social knowledge in this context by exploiting collaboration among users,
little research has been done to quantify the current level of user
collaboration in these communities. This paper introduces two metrics to
quantify the level of collaboration: content reuse and shared interest. Using
these two metrics, this paper shows that the current level of collaboration in
CiteULike and Connotea is consistently low, which significantly limits the
potential of harnessing the social knowledge in communities. This study also
discusses implications of these findings in the context of recommendation and
reputation systems.Comment: 6 pages, 6 figures, AAAI Spring Symposium on Social Information
Processin
Towards memory supporting personal information management tools
In this article we discuss re-retrieving personal information objects and relate the task to recovering from lapse(s) in memory. We propose that fundamentally it is lapses in memory that impede users from successfully re-finding the information they need. Our hypothesis is that by learning more about memory lapses in non-computing contexts and how people cope and recover from these lapses, we can better inform the design of PIM tools and improve the user's ability to re-access and re-use objects. We describe a diary study that investigates the everyday memory problems of 25 people from a wide range of backgrounds. Based on the findings, we present a series of principles that we hypothesize will improve the design of personal information management tools. This hypothesis is validated by an evaluation of a tool for managing personal photographs, which was designed with respect to our findings. The evaluation suggests that users' performance when re-finding objects can be improved by building personal information management tools to support characteristics of human memory
- …