SlideShare a Scribd company logo
1 of 23
Online PrivacyOnline Privacy
Justify your paranoia today!Justify your paranoia today!
Trey PedenTrey Peden
Our goals for todayOur goals for today
Learn how online advertising worksLearn how online advertising works
Discuss online privacy concerns andDiscuss online privacy concerns and
expectationsexpectations
Look at some ways to protect your privacyLook at some ways to protect your privacy
onlineonline
AgendaAgenda
Online Advertising 101Online Advertising 101
Privacy OnlinePrivacy Online
Tips & TricksTips & Tricks
Online Advertising 101Online Advertising 101
Double You Tee Eff (dotcom)Double You Tee Eff (dotcom)
Contextual AdvertisingContextual Advertising
TargetedTargeted
RetargetedRetargeted
PublisherPublisherAdvertiserAdvertiser
Ad NetworkAd Network
Ad ExchangeAd Exchange
Where does data comeWhere does data come
from?from?
YouYou
Your actionsYour actions
Offline (you again)Offline (you again)
Privacy OnlinePrivacy Online
See also: government intelligenceSee also: government intelligence
What is “privacy?”What is “privacy?”
(In an online context)(In an online context)
Online FearOnline Fear
Who knows what?Who knows what?
Will this be used to embarrass me?Will this be used to embarrass me?
Could it be used against me?Could it be used against me?
Expectations vs RealityExpectations vs Reality
TransparencyTransparency
Respect for ContextRespect for Context
SecuritySecurity
Access and AccuracyAccess and Accuracy
Focused CollectionFocused Collection
AccountabilityAccountability
Robots, Remnant Inventory,Robots, Remnant Inventory,
and Incompetenceand Incompetence
A Legitimate Privacy ConcernA Legitimate Privacy Concern
Big BrotherBig Brother
Tips & TricksTips & Tricks
Delete your cookiesDelete your cookies
Correct your dataCorrect your data
http://google.com/ads/preferenceshttp://google.com/ads/preferences
http://bluekai.com/registryhttp://bluekai.com/registry
http://youradchoices.comhttp://youradchoices.com
Custodiet te ipsosCustodiet te ipsos
custodescustodes
http://www.ghostery.com/http://www.ghostery.com/ http://getfirebug.com/http://getfirebug.com/
Thank you!Thank you!
Thank you very much!Thank you very much!
ReferencesReferences
http://badcontextualads.tumblr.com/http://badcontextualads.tumblr.com/
http://hiddenaudience.com/blog/retargeting/30-exampleshttp://hiddenaudience.com/blog/retargeting/30-examples
http://www.whitehouse.gov/sites/default/files/privacy-finahttp://www.whitehouse.gov/sites/default/files/privacy-fina
http://bluekai.com/registry/http://bluekai.com/registry/
http://www.google.com/ads/preferenceshttp://www.google.com/ads/preferences
http://ghostery.comhttp://ghostery.com
http://getfirebug.com/http://getfirebug.com/

More Related Content

Viewers also liked

Gamestorming Workshop: The Uses of Story - DRS Chicago, June 2015
Gamestorming Workshop: The Uses of Story - DRS Chicago, June 2015Gamestorming Workshop: The Uses of Story - DRS Chicago, June 2015
Gamestorming Workshop: The Uses of Story - DRS Chicago, June 2015Digiday
 
SalesEdge - Delighting
SalesEdge - DelightingSalesEdge - Delighting
SalesEdge - DelightingMindTickle
 
The Secret Sauce of Agile- a Culture of Great Meetings agile2015
The Secret Sauce of Agile- a Culture of Great Meetings agile2015The Secret Sauce of Agile- a Culture of Great Meetings agile2015
The Secret Sauce of Agile- a Culture of Great Meetings agile2015Jean Tabaka
 
How to Market Your Startup to the Enterprise
How to Market Your Startup to the EnterpriseHow to Market Your Startup to the Enterprise
How to Market Your Startup to the EnterpriseWork-Bench
 
Millennials, Xers and Boomers: How to capitalize on where and when they shop ...
Millennials, Xers and Boomers: How to capitalize on where and when they shop ...Millennials, Xers and Boomers: How to capitalize on where and when they shop ...
Millennials, Xers and Boomers: How to capitalize on where and when they shop ...Digiday
 
3 Steps To Bettering Your Staff's Phone Skills Without A Script
3 Steps To Bettering Your Staff's Phone Skills Without A Script3 Steps To Bettering Your Staff's Phone Skills Without A Script
3 Steps To Bettering Your Staff's Phone Skills Without A ScriptCentury Interactive
 
Learning from the dreams in the bible
Learning from the dreams in the bibleLearning from the dreams in the bible
Learning from the dreams in the bibleLearning to Prophesy
 
Not All Data is Created Equal
Not All Data is Created EqualNot All Data is Created Equal
Not All Data is Created EqualiMedia Connection
 
E Marketing Ethical and Legal Issues
E Marketing Ethical and Legal IssuesE Marketing Ethical and Legal Issues
E Marketing Ethical and Legal Issueskarthik indrajit
 

Viewers also liked (10)

Gamestorming Workshop: The Uses of Story - DRS Chicago, June 2015
Gamestorming Workshop: The Uses of Story - DRS Chicago, June 2015Gamestorming Workshop: The Uses of Story - DRS Chicago, June 2015
Gamestorming Workshop: The Uses of Story - DRS Chicago, June 2015
 
SalesEdge - Delighting
SalesEdge - DelightingSalesEdge - Delighting
SalesEdge - Delighting
 
Wrangle the tech!
Wrangle the tech!Wrangle the tech!
Wrangle the tech!
 
The Secret Sauce of Agile- a Culture of Great Meetings agile2015
The Secret Sauce of Agile- a Culture of Great Meetings agile2015The Secret Sauce of Agile- a Culture of Great Meetings agile2015
The Secret Sauce of Agile- a Culture of Great Meetings agile2015
 
How to Market Your Startup to the Enterprise
How to Market Your Startup to the EnterpriseHow to Market Your Startup to the Enterprise
How to Market Your Startup to the Enterprise
 
Millennials, Xers and Boomers: How to capitalize on where and when they shop ...
Millennials, Xers and Boomers: How to capitalize on where and when they shop ...Millennials, Xers and Boomers: How to capitalize on where and when they shop ...
Millennials, Xers and Boomers: How to capitalize on where and when they shop ...
 
3 Steps To Bettering Your Staff's Phone Skills Without A Script
3 Steps To Bettering Your Staff's Phone Skills Without A Script3 Steps To Bettering Your Staff's Phone Skills Without A Script
3 Steps To Bettering Your Staff's Phone Skills Without A Script
 
Learning from the dreams in the bible
Learning from the dreams in the bibleLearning from the dreams in the bible
Learning from the dreams in the bible
 
Not All Data is Created Equal
Not All Data is Created EqualNot All Data is Created Equal
Not All Data is Created Equal
 
E Marketing Ethical and Legal Issues
E Marketing Ethical and Legal IssuesE Marketing Ethical and Legal Issues
E Marketing Ethical and Legal Issues
 

Similar to ATLOSCon 2013: Online marketing and privacy

BCTIA "The Third Generation" Jan 15, 1998 by Tod Maffin
BCTIA "The Third Generation" Jan 15, 1998 by Tod MaffinBCTIA "The Third Generation" Jan 15, 1998 by Tod Maffin
BCTIA "The Third Generation" Jan 15, 1998 by Tod MaffinTod Maffin (tod@engageQ.com)
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyeBoost Consulting
 
DEFCON 23 - Mark Ryan Talabis - The Bieber Project
DEFCON 23 - Mark Ryan Talabis - The Bieber ProjectDEFCON 23 - Mark Ryan Talabis - The Bieber Project
DEFCON 23 - Mark Ryan Talabis - The Bieber ProjectFelipe Prado
 
SES Amsterdam 17 maart 2009: Eduard Blacquiere
SES Amsterdam 17 maart 2009: Eduard BlacquiereSES Amsterdam 17 maart 2009: Eduard Blacquiere
SES Amsterdam 17 maart 2009: Eduard BlacquiereWebanalisten .nl
 
CONFIDENCIALIDAD DE LA INFORMACION
CONFIDENCIALIDAD DE LA INFORMACIONCONFIDENCIALIDAD DE LA INFORMACION
CONFIDENCIALIDAD DE LA INFORMACIONrios abogados
 
Ghostery Data Privacy Day 2014
Ghostery Data Privacy Day 2014Ghostery Data Privacy Day 2014
Ghostery Data Privacy Day 2014Ghostery
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
 
iConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudiConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudJim Adler
 
Mkb cyber advies nederland / Roel van Rijsewijk Deloitte
Mkb cyber advies nederland / Roel van Rijsewijk DeloitteMkb cyber advies nederland / Roel van Rijsewijk Deloitte
Mkb cyber advies nederland / Roel van Rijsewijk DeloitteMKBcyberadvies Nederland
 
Ken Courtright at LaCosta GMP
Ken Courtright at LaCosta GMPKen Courtright at LaCosta GMP
Ken Courtright at LaCosta GMPKen Courtright
 
Digital marketing Tips (Facebook, Linkedin, Twitter Marketing)
Digital marketing Tips (Facebook, Linkedin, Twitter Marketing)Digital marketing Tips (Facebook, Linkedin, Twitter Marketing)
Digital marketing Tips (Facebook, Linkedin, Twitter Marketing)Dilouar Hossain
 
Iwtc 2008 Tom Raftery Why Blog
Iwtc 2008 Tom Raftery Why BlogIwtc 2008 Tom Raftery Why Blog
Iwtc 2008 Tom Raftery Why BlogIrishDev.com
 
Earn your Sleep Sales Technology
Earn your Sleep Sales TechnologyEarn your Sleep Sales Technology
Earn your Sleep Sales Technologysayedsayed31
 
Baretzky & Associates Presentation.
Baretzky & Associates Presentation.Baretzky & Associates Presentation.
Baretzky & Associates Presentation.Ricardo Bn. Baretzky
 

Similar to ATLOSCon 2013: Online marketing and privacy (20)

BCTIA "The Third Generation" Jan 15, 1998 by Tod Maffin
BCTIA "The Third Generation" Jan 15, 1998 by Tod MaffinBCTIA "The Third Generation" Jan 15, 1998 by Tod Maffin
BCTIA "The Third Generation" Jan 15, 1998 by Tod Maffin
 
Some presentation
Some presentationSome presentation
Some presentation
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet Privacy
 
DEFCON 23 - Mark Ryan Talabis - The Bieber Project
DEFCON 23 - Mark Ryan Talabis - The Bieber ProjectDEFCON 23 - Mark Ryan Talabis - The Bieber Project
DEFCON 23 - Mark Ryan Talabis - The Bieber Project
 
58th ICCA Congress | Cyber Security
58th ICCA Congress | Cyber Security58th ICCA Congress | Cyber Security
58th ICCA Congress | Cyber Security
 
SES Amsterdam 17 maart 2009: Eduard Blacquiere
SES Amsterdam 17 maart 2009: Eduard BlacquiereSES Amsterdam 17 maart 2009: Eduard Blacquiere
SES Amsterdam 17 maart 2009: Eduard Blacquiere
 
CONFIDENCIALIDAD DE LA INFORMACION
CONFIDENCIALIDAD DE LA INFORMACIONCONFIDENCIALIDAD DE LA INFORMACION
CONFIDENCIALIDAD DE LA INFORMACION
 
Ghostery Data Privacy Day 2014
Ghostery Data Privacy Day 2014Ghostery Data Privacy Day 2014
Ghostery Data Privacy Day 2014
 
Sam Headhunting V4
Sam Headhunting V4Sam Headhunting V4
Sam Headhunting V4
 
sanfranAIG3
sanfranAIG3sanfranAIG3
sanfranAIG3
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
iConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the CloudiConference 2011: Reputation in the Cloud
iConference 2011: Reputation in the Cloud
 
Digital marketing
Digital marketingDigital marketing
Digital marketing
 
Mkb cyber advies nederland / Roel van Rijsewijk Deloitte
Mkb cyber advies nederland / Roel van Rijsewijk DeloitteMkb cyber advies nederland / Roel van Rijsewijk Deloitte
Mkb cyber advies nederland / Roel van Rijsewijk Deloitte
 
Ken Courtright at LaCosta GMP
Ken Courtright at LaCosta GMPKen Courtright at LaCosta GMP
Ken Courtright at LaCosta GMP
 
Digital marketing Tips (Facebook, Linkedin, Twitter Marketing)
Digital marketing Tips (Facebook, Linkedin, Twitter Marketing)Digital marketing Tips (Facebook, Linkedin, Twitter Marketing)
Digital marketing Tips (Facebook, Linkedin, Twitter Marketing)
 
Iwtc 2008 Tom Raftery Why Blog
Iwtc 2008 Tom Raftery Why BlogIwtc 2008 Tom Raftery Why Blog
Iwtc 2008 Tom Raftery Why Blog
 
Why Blog?
Why Blog?Why Blog?
Why Blog?
 
Earn your Sleep Sales Technology
Earn your Sleep Sales TechnologyEarn your Sleep Sales Technology
Earn your Sleep Sales Technology
 
Baretzky & Associates Presentation.
Baretzky & Associates Presentation.Baretzky & Associates Presentation.
Baretzky & Associates Presentation.
 

Recently uploaded

Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryWhittensFineJewelry1
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsGOKUL JS
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 

Recently uploaded (20)

Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebs
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 

ATLOSCon 2013: Online marketing and privacy

Editor's Notes

  1. Introduction Goal: Provide an overview of internet marketing and discuss some of the privacy concerns
  2. First, let’s talk about three basic types of display advertising. “ Display” refers to the type of online advertising that uses banners and images usually seen in the margins of a page. The first type of display ads: Contextual advertising. Contextual ads are banners loaded to a page based on the content of the page. The assumption is that if you are interested in this content, then you may be interested in these contents. The way it typically works is that an advertiser buys keywords from the websites selling the space. Unfortunately, as you can see from these examples, that doesn’t always work out so well. To avoid this, advertisers will often also specify contexts in which their ads should NOT be displayed.
  3. Targeted ads are ones where the advertisers show ads to you based on data collected on you and stored in your cookies. (More on this data in a bit.) Here, we’re looking at two types of targeting ads. In the top example, Amazon is recommending products to me based on products I’ve looked at in the past. In the second, State Farm is showing me insurance probably based the fact that I have (fairly recently) been looking at new car. In both cases, it was probably my behavior (although it could just be my data) that put me in the segment to be targeted for these ads. This is also called behavioral targeting.
  4. Another form of behavioral display is called retargeting. Retargeting is done when you visit a site and look at a particular product or type of product and then it shows up in banner ads elsewhere. (The above example is not actual retargeting. I just pulled these screenshots to illustrate how it might look.)
  5. This image appears in pretty much every presentation you will ever see about online marketing. It’s a diagram by a company called Luma, so it’s called the “Lumascape” of Ad Tech and it shows a lot of the different companies involved in online marketing.
  6. Let’s simplify the online advertising landscape and do a quick review of how this ecosystem evolved. 1) An advertiser wants to sell you stuff, so they buy ad space from publishers. A publisher sells ad space, which is also called “inventory.” And originally, advertisers would go directly to publishers to buy ad space. 2) With the proliferation of websites, it became too difficult for advertisers to talk to all the publishers in direct buys and lots of publishers had a hard time making money selling space, so they organized into Ad Networks. So, the advertisers could just buy inventory from a collection of publishers all at once. 3) Then, of course, advertisers wanted to be able to reach more people and still not have to talk to a bunch of different publishers and networks. And so Ad Exchanges were invented. These are just like stock exchanges in that publishers are notifying the exchange that a visitor is on their site and advertisers bid on how much they want to pay to have their ad displayed to that visitor. This happens in MILLISECONDS. Very fast. So, lots of times advertisers just have set rules for how much they will pay, or they have computers to execute complex buying strategies for them. So, how do advertisers decide how much they’ll pay to show an ad to a particular visitor? It’s based on the data stored in your cookies.
  7. Where does data come from? 1) You! The information you volunteer when you register for sites is often used to target ads to you. 2) Your actions. We talked about how your online behavior is used to make inferences about your interests. 3) Offline sources. There are public sources of information, but also as you interact with businesses, they may bring that information online. OPTIONAL DISCUSSION: How does offline data onboarding work?
  8. Open discussion here. But everyone should be aware, that when you go online, your computer isn’t talking directly to just one other computer. Your computer is talking to manymanymany other computers. OPTIONAL DISCUSSION: How do tracking pixels work? How do cookies get set in the first place?
  9. Why do you think people are concerned about privacy online at all? 1) They don’t know who knows what about them based on what they’re doing because they don’t know how online tracking works and who is doing it. 2) They don’t want to be embarrassed. [Trey’s opinion: this is the primary motivation among the general public to be concerned about privacy] 3) Some worry that it will be used against them. For example, some are worried about discriminatory practices in targeting ads. Or that they won’t get the best price offered to them: http://lifehacker.com/5973689/how-web-sites-vary-prices-based-on-your-information-and-what-you-can-do-about-it
  10. In February of 2012, the White House issued recommendations to the online marketing industry. Transparency: consumers should be aware that their information is being used for marketing and what information is being used. Respect for Context: Data should be used appropriately and shared on a very limited basis. Don’t be a stalker! Security: Online data should be protected appropriately. Access & Accuracy: Consumers should be able to see what data is collected and correct it if it is wrong. Focused Collection: Only as much data as necessary should be collected. Accountability: Consumers should have some recourse to pursue when abuse is spotted. While these goals are nice, there are some inherent challenges: - The online marketing industry tries to protect user “anonymity” online. This makes it hard to know EXACTLY who each individual is online. [OPTIONAL DISCUSSION: Third-party vs First-party cookies] - Some data points reflect proprietary/competitive practices - Not all consumers are satisfied opting out or removing their data - Malicious entities will not follow the rules. But the industry does have practices to try to reach for these goals. [OPTIONAL DISCUSSION] Current legislative activity and landscape around data collection, practices, and privacy
  11. In spite of supposed amazing ability to identify individuals online, compose incredibly detailed profiles, and target them with ads (This is actually not true, per discussion on previous slide.) Why do we still see ads for crazy things? 1) Segmentation algorithms necessarily include an element of probability and inference. Just because it’s wrong for you doesn’t mean it’s not exactly right for a lot of other people. 2) Remnant inventory is left over, unsold ad space. When a publisher isn’t sure what to show you -- perhaps you deleted your cookies or no advertisers bid on you -- then they may choose an ad at random to show. 3) Sometimes marketers make mistakes.
  12. Here’s where I think there is a legitimate concern regarding one’s privacy online.
  13. What can you do to protect your privacy online? 1) Delete your cookies 2) You can also change your browser settings to not allow third-party cookies... or any cookies at all. But be warned: this will affect your browsing experience. And if ads targeted to you annoy you, how will you feel about being shown untargeted ads?
  14. Some companies, like Google and Blue Kai shown here, actually show you the data associated with the cookie they have on you. You can correct this data or delete it completely. These companies usually also offer the ability to opt-out, so they will not target you with ads any more. (That doesn’t mean other people won’t, though!)
  15. YourAdChoices.com is a program established by various industry groups to educate consumers about online advertising and does also offer a means to opt-out of being tracked by member companies. Pro: you can opt out of lots of companies all at once. Cons: It adds a do not target cookie to your machine, if you delete your cookies, you’ll have to opt out again. Also, not everyone is a member of these industry groups.
  16. I never delete my cookies. Instead, I am comfortable just being aware of what’s going on and here are two browser plugins that will show you when pixels are firing and for whom they are firing. They usually also allow you to block pixels and cookies wholesale or individually.