related terms: data mining, KDD?, digital identity, digital traces, behavioral targeting
- This site has been created to log references to technology issues in data mining
Gates to demonstrate new search software
- by Ina Fried, CNET News.com, May 16, 2006
- Microsoft's technology tries to ease that task by looking through workers' e-mail and other data and then automatically generating working profiles.
Phishers get personal
- by Joris Evers, CNET News.com, May 26, 2005
- Web sites that use e-mail addresses as identifiers for password reminders and registration are open to exploitation by scammers to generate detailed profiles of people, security company Blue Security said in a research report. By matching e-mail addresses with Web sites, cybercriminals can uncover the gender, sexual preference, political orientation, geographic location, hobbies and the online stores that have been used by the person behind an e-mail address.
ComScore: Spyware or 'researchware'?
- by Stefanie Olsen, CNET News.com, December 20, 2004
- ComScore Networks' Marketscore application is installed on more than 1 million PCs in the United States, forming the backbone of a well-regarded research service used by Fortune 500 companies, universities and media outlets, including CNET News.com.
- Now the software is in the privacy spotlight, tied to warnings from some universities and computer security experts about secretive and invasive software, sometimes known as adware or spyware, that can take over a PC with little or no warning.
Net advertising on a road revisited
- by Stefanie Olsen, CNET News.com, May 25, 2004
- So-called behaviorally targeted advertising is a method of compiling data on Web visitors, such as their surfing history, gender, age and personal preference, to later target them with tailored ads. The form of advertising was hyped during the Internet heyday as the promise of a one-to-one medium, but failed to deliver because of technology limitations and privacy concerns
"Total Information Overload"
- Jonietz, Erika; Technology Review (08/03) Vol. 106, No. 6, P. 68;
- Privacy advocates allege that the Defense Department's Terrorism Information Awareness (TIA) project would merge public and private databases into a vast "metabase" that would be mined to gather data on innocent American citizens, but Robert L. Popp of the Defense Advanced Research Projects Agency's (DARPA) Information Awareness Office denies these allegations, insisting that TIA's purpose "is developing a variety of information technologies into a prototype system/network to detect and preempt foreign terrorist attacks."
Start-up's tracking software sets off privacy alarm
- by Jim Hu, CNET News.com, May 1, 2000
- Predictive Networks today released a software product that can precisely track online behavior and then use the information to send targeted advertisements to individual Web surfers.
Online marketer gains second "profiling" patent
- by Evan Hansen, CNET News.com, December 6, 1999
- Online marketer Be Free has been granted a second patent covering certain methods of profiling consumer purchasing preferences (titled "Computer Program Apparatus for Determining Behavioral Profiles of a Computer User").
Documents & books
Journals & magazines
|People and organizations
People and organizations
Describe profiling/People and organizations? here.
- by Protectcom
- Orvell Monitoring is an invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs.
- Orvell Monitoring logs every detail a spy utility should, including keystrokes, Web sites, launched applications and opened windows. It can record text copied to the clipboard as well as monitor operating system-level activities such as File Deleted and Folder Created. It also can capture screenshots for visual surveillance.
- The Values and LifeStyles? Framework, SRIC-BI
- The VALS model identifies current and future opportunities by segmenting the consumer marketplace on the basis of the personality traits that drive consumer behavior.
back to Cybrary