CALT Encyclopedia
The Encyclopedia of Learning Approaches & Technologies



related terms: data mining, KDD?, digital identity, digital traces, behavioral targeting

Events collapse


  • ICDM

    • IEEE International Conference on Data Mining
  • KDD

    • International conference on knowledge discovery and data mining

    • A conference and expo designed for marketers and agencies, AD:TECH focuses on providing the big picture about the market numbers, market trends and issues for interactive, integrated marketing that leverages all that technology and the internet provide.
  • Workshop on Implicit Measures of User Interests and Preferences

    • ACM SIGIR Conference, Toronto, Canada, Friday, August 1, 2003

Interesting documents collapse

Interesting documents

Starting points

  • Data Mining

    • This site has been created to log references to technology issues in data mining


  • Gates to demonstrate new search software

    • by Ina Fried, CNET, May 16, 2006
    • Microsoft's technology tries to ease that task by looking through workers' e-mail and other data and then automatically generating working profiles.
  • Phishers get personal

    • by Joris Evers, CNET, May 26, 2005
    • Web sites that use e-mail addresses as identifiers for password reminders and registration are open to exploitation by scammers to generate detailed profiles of people, security company Blue Security said in a research report. By matching e-mail addresses with Web sites, cybercriminals can uncover the gender, sexual preference, political orientation, geographic location, hobbies and the online stores that have been used by the person behind an e-mail address.
  • ComScore: Spyware or 'researchware'?

    • by Stefanie Olsen, CNET, December 20, 2004
    • ComScore Networks' Marketscore application is installed on more than 1 million PCs in the United States, forming the backbone of a well-regarded research service used by Fortune 500 companies, universities and media outlets, including CNET
    • Now the software is in the privacy spotlight, tied to warnings from some universities and computer security experts about secretive and invasive software, sometimes known as adware or spyware, that can take over a PC with little or no warning.
  • Net advertising on a road revisited

    • by Stefanie Olsen, CNET, May 25, 2004
    • So-called behaviorally targeted advertising is a method of compiling data on Web visitors, such as their surfing history, gender, age and personal preference, to later target them with tailored ads. The form of advertising was hyped during the Internet heyday as the promise of a one-to-one medium, but failed to deliver because of technology limitations and privacy concerns
  • "Total Information Overload"

    • Jonietz, Erika; Technology Review (08/03) Vol. 106, No. 6, P. 68;
    • Privacy advocates allege that the Defense Department's Terrorism Information Awareness (TIA) project would merge public and private databases into a vast "metabase" that would be mined to gather data on innocent American citizens, but Robert L. Popp of the Defense Advanced Research Projects Agency's (DARPA) Information Awareness Office denies these allegations, insisting that TIA's purpose "is developing a variety of information technologies into a prototype system/network to detect and preempt foreign terrorist attacks."
  • Start-up's tracking software sets off privacy alarm

    • by Jim Hu, CNET, May 1, 2000
    • Predictive Networks today released a software product that can precisely track online behavior and then use the information to send targeted advertisements to individual Web surfers.
  • Online marketer gains second "profiling" patent

    • by Evan Hansen, CNET, December 6, 1999
    • Online marketer Be Free has been granted a second patent covering certain methods of profiling consumer purchasing preferences (titled "Computer Program Apparatus for Determining Behavioral Profiles of a Computer User").

Documents & books

  • Hostile Consumer Profiling

    • Blue Security, research Paper, May 2005
    • The trick in the registration or password reminder attack is in the response. Many online businesses return a specific message--such as "This address is already subscribed"--when an e-mail address is registered with the site. If an attacker gets that response, they know that address represents a valid customer.
  • Profiling Machines (Mapping the Personal Information Economy)

    • by Greg Elmer, The MIT Press, ISBN 0-262-05073-0, January 2004
    • In this book Greg Elmer brings the perspectives of cultural and media studies to the subject of consumer profiling and feedback technology in the digital economy. He examines the multiplicity of processes that monitor consumers and automatically collect, store, and cross-reference personal information.
  • The Power of Knowledge

    • Ethical, Legal, and Technological Aspects of Data Mining and Group Profiling in Epidemiology
    • Bart Custers, Wolf Legal Publishers, 2004
    • ISBN 90-5850-085-3
    • Resource indicated by Mireille Hildebrandt?, VUB?

Journals & magazines

People and organizations collapse

People and organizations

Describe profiling/People and organizations? here.

Systems collapse



  • Mediaplex

    • Profiling tools for advertising.
  • ComScore
  • LinkedIn company-profiles

    • Company Profiles on LinkedIn? is a succinct overview of a company's industry data in combination with LinkedIn? data along certain key metrics
  • Purchase Circles

    • is now calculating thousands of specialized bestseller lists. No matter where you work, live, or go to school, we'll likely have a Purchase Circle for you. For example, check out the Purchase Circles for Oracle Corporation, Massachusetts Institute of Technology, and New York City.
    • Note: Purchase Circles has been suspended.


  • Orvell Monitoring

    • by Protectcom
    • Orvell Monitoring is an invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs.
    • Orvell Monitoring logs every detail a spy utility should, including keystrokes, Web sites, launched applications and opened windows. It can record text copied to the clipboard as well as monitor operating system-level activities such as File Deleted and Folder Created. It also can capture screenshots for visual surveillance.


  • VALS

    • The Values and LifeStyles? Framework, SRIC-BI
    • The VALS model identifies current and future opportunities by segmenting the consumer marketplace on the basis of the personality traits that drive consumer behavior.
  • ...

back to Cybrary

Notice: "WARNING: InterWikiMap page is unlocked, so not using those links."