Privacy |
2. Nothing is free. 3. By reading this you are generating advertising and other commercial revenue (but not for me). My domain host, Yahoo! (briefly Aabaco; formerly GeoCities), forces me to allow Lexity to track and data mine my visitors with hidden code like this (see below for details):
|
I am trying to find a way to avoid this data mining of my website visitors, but it could take a while. DitoMorales.com has always been a non-commercial site supporting my research and teaching. After a few years as GeoCities sites (.../Athens/Olympuss/3883, Rock Art Research and Art History, and .../Athens/Styx/1116, Art History Forum) DitoMorales.com became part of Yahoo! in 1999 when they acquired GeoCities. Data mining of my visitors (you) accelerated after Yahoo! purchased the e-commerce platform Lexity in 2013. Yahoo!'s web site hosting service was bundled into a new company called "Luminate, from Aabaco Small Business" in preparation for a spin-off of that entire product line — that never happened. On June 13, 2017, Verizon Communications purchased Yahoo and bundled it and AOL into their digital content subsidiary, Oath Inc. After twenty years online I am now trying to find a host for DitoMorales.com who won't spy on my visitors and turn them into Big Data laborers for Third Party lucre. That spying and monetization means, against my intentions, that DitoMorales.com is essentially a commercial web site. That sucks.
Classroom Privacy & Intellectual Property My lectures and presentations are my intellectual property—they are original or inventive in-and-of themselves — and may not be recorded or otherwise monitored under any circumstances without my written permission. My lectures and presentations may not be documented, reproduced, hosted, stored, modified, used to create derivative works (like translations, adaptations or illustrations), communicated, published, publicly performed, publicly displayed or distributed, under any circumstances without written permission. Students who need special accommodations will receive all necessary materials and assistance. Your personal class notes, whether typed or handwritten, remain your property and may be used for the purpose of your personal study. However, transmitting my intellectual property to/via any third party, like sending them via web-based email, social media, peer-to-peer, or other online services, or any other unauthorized use of my course content, may violate intellectual property rights and expose persons who participate in such activities to significant legal entanglements. My course content, in any form, may not be used for or exposed to any commercial exploitation. Digital apps and services like email, messaging and cloud storage include specific legal Terms of Service that explain how they use content for commercial purposes, inlcuding advertising, product improvement, and promotion. Sharing my intellectual property with any app and/or service that exploits that content for any commercial purpose would violate legal rights, and may have very serious consequences. Students who need special accommodations will receive all necessary materials and assistance. See: American Association of University Professors – Intellectual Property Issues for Faculty
The Privacy Policy for this web site (I think): The Terms of Service for this web site (I think):
|
I am told by Yahoo! (TOS§6g) to post My Privacy Policy if I sell or promote products or services (if I have customers): I do not use DitoMorales.com to sell or promote products or services — you are not my customer — so the light-hearted Privacy Policy I provide at the top of this page shall suffice, even though its dark humor might seem excessively satirical. I think Chris Hoofnagle would get it. His page opens with this (read it):
I don't know what The Company's partners will do with all the data they mine from your visit, although I am provided with some handy dandy numbers and graphs : I hope to find a host that will allow more privacy. This is the best I can do today. Please feel freet to block any tracking devices, scripts, or code you can block. It should not affect my site's functionality at all.
|
How to Block Tracking & Data Mining Privacy Tools: How to Block Online Tracking How to keep data miners from invading your privacy How to disable third-party cookies in all major web browsers How to turn off Cortana and stop personal data gathering in Windows 10 Disable third-party cookies in IE, Firefox, and Google Chrome (c|net How To) The paranoid's guide to the internet: 13 easy ways to make sure you're not hacked or tracked Everyone's Trying to Track What You Do on the Web: Here's How to Stop Them Use Their App, Keep Your Data
Below is a brief sample of the current literature on surreptitious tracking and the significant privacy issues this commercially irresistible and unstoppable trend presents.
|
A Bibliography of Details & Techniques 2018 Abbas Razaghpanah, Rishab Nithyanand, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Mark Allman, Christian Kreibich, and Phillipa Gill, "Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem" (Network and Distributed Systems Security [NDSS] Symposium 2018). dx.doi.org/10.14722/ndss.2018.23353). haystack.mobi/papers/ndss18_ats.pdf
Terrell McSweeny (Commissioner, Federal Trade Commission) and Mignon Clyburn (Commissioner, Federal Communications Commission), "The commissioners of the FTC and FCC are worried about your online privacy," Los Angeles Times, Mar 31, 2017. beta.latimes.com/opinion/op-ed/la-oe-mcsweeny-clyburn-internet-privacy-20170331-story.html (also linked from ftc.gov/public-statements/2017/03/blog-post-commissioners-ftc-fcc-are-worried-about-your-online-privacy). Jay Coen Gilbert, "Is Data The New Oil? How One Startup Is Rescuing The World's Most Valuable Asset" (Forbes, Social Entrepreneurs, August 23, 2017). forbes.com/sites/jaycoengilbert/2017/08/23/rescuing-the-worlds-most-valuable-stranded-asset-the-company-democratizing-data-the-new-oil Cross-Device Tracking: A Federal Trade Commission Staff Report (January 2017).
Arthur Baxter, "The Truth About Data Mining: How Online Trackers Gather Your Info and What They See" (The Observer, July 21, 2016). observer.com/2016/07/the-truth-about-data-mining-how-online-trackers-gather-your-info-and-what-they-see Englehardt, Steven, and Arvind Narayanan. "Online Tracking: A 1-million-site Measurement and Analysis." Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 1388-1401 (New York: Association for Computing Machinery, 2016). ftc.gov/system/files/documents/public_comments/2016/10/00045-129154.pdf Oleksii Starov, Phillipa Gill, and Nick Nikiforakis, "Are You Sure You Want to Contact Us? Quantifying the Leakage of PII via Website Contact Forms" (Proceedings on Privacy Enhancing Technologies, 2016). cyber-investigator.org/wp-content/uploads/2016/02/contactus_pets2016.pdf Narseo Vallina-Rodriguez, Srikanth Sundaresan, Abbas Razaghpanah, Rishab Nithyanand, Mark Allman, Christian Kreibich, Phillipa Gill, "Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem" (FTC Public Comments, Consumer Privacy and Security Issues #38) ftc.gov/system/files/documents/public_comments/2016/10/00038-129143.pdf Lisa Weintraub Schifferle, "Online tracking – more than cookies" (Federal Trade Commission, Division of Consumer & Business Education, June 23, 2016). consumer.ftc.gov/blog/2016/06/online-tracking-more-cookies Amy Hebert, "Getting tracked online even after you try to stop it" (Federal Trade Commission, December 20, 2016). consumer.ftc.gov/blog/2016/12/getting-tracked-online-even-after-you-try-stop-it General Online Tracking info from the FTC: consumer.ftc.gov/articles/0042-online-tracking
Chris Jay Hoofnagle, Ashkan Soltani, Nathaniel Good, Dietrich J. Wambach, and Mika D. Ayenson, "Behavioral Advertising: The Offer You Cannot Refuse" (Public Comment, FTC Workshop on Cross-Device Tracking Nov. 16, 2015, Submission #00048). ftc.gov/system/files/documents/public_comments/2015/10/00048-97807.pdf
(FTC landing page: ftc.gov/policy/public-comments/2015/10/07/comment-00048) Public Comments #603: FTC Workshop on Cross-Device Tracking; Matter Number: P155403. ftc.gov/policy/public-comments/2015/03/initiative-603 Amit Datta, Michael Carl Tschantz, and Anupam Datta, "Automated Experiments on Ad Privacy Settings" (Privacy Enhancing Technologies 2015, 1 [2015]: 92-112). andrew.cmu.edu/user/danupam/dtd-pets15.pdf Andreas Kuehn, "Cookies versus Clams: Clashing Tracking Technologies and Online Privacy" (info 15, no. 6 [2013], 19-31, DOI 10.1108/info-04-2013-0013). Natasha Singer, "Sharing Data, but Not Happily" (New York Times, Technology, June 4, 2015). nytimes.com/2015/06/05/technology/consumers-conflicted-over-data-mining-policies-report-finds.html
Jennifer M. Urban, Chris Jay Hoofnagle, and Su Li, "Mobile Phones and Privacy" (Public Comment, FTC Workshop on Mobile Device Tracking, February 19, 2014, Submission #00048) ftc.gov/system/files/documents/public_comments/2013/12/00007-89101.pdf Public Comments #516: FTC Workshop on Mobile Device Tracking; Matter Number: P145401
Claude Castelluccia, "Behavioural Tracking on the Internet: A Technical Perspective," in European Data Protection in Good Health, edited by Serge Gutwirth, Ronald Leenes, Paul de Hert, Yves Poullet, 21-33 (Dordrecht: Springer Netherlands, 2012). Jonathan R. Mayer and John C. Mitchell, "Third-Party Web Tracking: Policy and Technology" (IEEE Symposium on Security and Privacy, 2012). jonathanmayer.org/papers_data/trackingsurvey12.pdf Franziska Roesner, Tadayoshi Kohno, and David Wetherall, "Detecting and Defending Against Third-Party Tracking on the Web" (9th USENIX Symposium on Networked Systems Design and Implementation, 2012). usenix.org/system/files/conference/nsdi12/nsdi12-final17.pdf Stephen Cobb, "Google's data mining bonanza and your privacy: an infographic" (welivesecurity.com, 2012).
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav Shacham, "An Empirical Study of Privacy-Violating Information Flows in JavaScript Web Applications" (CCS '10, Proceedings of the 17th ACM Conference on Computer and Communications Security, New York: ACM, 2010). dl.acm.org/ft_gateway.cfm?id=1866339&ftid=849805&dwn=1&CFID=847363526&CFTOKEN=38377694 (also at: goto.ucsd.edu/~rjhala/papers/an_empirical_study_of_privacy_violating_flows_in_javascript_web_applications.ps and via the Table of Contents tab at dl.acm.org/citation.cfm?id=1866307)
Mireille Hildebrandt, "Profiling: From Data to Knowledge" (DuD: Datenschutz und Datensicherheit 30, no. 9 [2012]: 548-552).
|
I hope this helps.
DM