Behavioral Targeting: A Case Study of Consumer Tracking
Behavioral Targeting: A Case Study of Consumer Tracking
Behavioral Targeting: A Case Study of Consumer Tracking
Keywords
Trust, Privacy, Behavioral Targeting, Web beacons, E-Commerce, Risk Analysis
INTRODUCTION
Behavioral targeting involves the collection of information about a consumer’s online activities in order to deliver advertising
targeted to their potential upcoming purchases. It is conducted by companies that are generically identified as advertising
networks. By observing the Web activities of millions of consumers, advertising networks can closely match advertising to
potential customers. Data collected includes what web sites you visit, how long you stay there, what pages you view, and
where you go next. The typical data gathered does not include your name, address, email address, phone number and so forth.
In this sense, the data collected is ‘anonymous.’ However, the clear intent of behavioral targeting is to track consumers over
time, to build up digital dossiers of their interests and shopping activities. Even though names are not collected, these
companies do continually try to tag consumers with a unique identifier used to aggregate their web activity. The most well
known method for tagging consumers is with cookies, although methods such as Web beacons and Flash cookies are actively
used.
In a report released in 2000, the Federal Trade Commission (FTC) offers the following scenario describing behavioral
targeting. A consumer from Washington, DC shops online for airline tickets to New York City. She searches for flights, but
doesn’t make any purchases yet. She subsequently visits the web site of the local newspaper, where she sees a targeted ad
offering flights between Washington, DC and New York City. While the consumer has not been identified by name, her
interest in airline tickets has been noted, both by placing a cookie on her computer, and logging her airline shopping behavior
with the advertising network.
In the years since the FTC released that report, behavioral targeting has increased in scope and sophistication. The iWatch
web crawler, a tool developed to document online tracking methods, has shown about six percent of Web sites in the US
deploy third party cookies, and 36 % deploy Web beacons (Jensen, Sarkar, Jensen and Potts, 2007). While these results show
the use of behavioral targeting is widespread, the nature of behavioral targeting within a specific site has not been examined
in depth. Therefore, this study was conducted to look at behavioral targeting as carried out on the Levis.com web site.
The rest of the paper is organized as follows. The next section describes the technology used in behavioral targeting. That is
followed by a review of relationship between trust and privacy. The next section presents the results of a study of behavioral
targeting on the Levis site. This is followed by a discussion of the risks to Levis and e-commerce sites in general. The final
section offers recommendations for addressing these risks by changing the nature of behavioral targeting.
Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6th-9th 2009 1
Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6th-9th 2009 2
Page 4 of 11 Americas Conference on Information Systems
should be valued. A focus on definitions provides a descriptive account of privacy, and a focus on value leads to a normative
account of privacy (Waldo, Lin and Millett, 2007).
Within e-commerce the most influential account of privacy has been Westin’s definition: “Privacy is the claim of individuals,
groups, or institutions to determine for themselves when, how, and to what extend information about them is communicated
to others,” (Westin, 1967). Here, privacy equals control over information, and private information “belongs” to an individual,
as a type of property right. Like other property, an individual can keep (conceal) or dispose of privacy (disclose or make
public). The conceptualization of privacy as a property right has been quite influential within e-commerce privacy policies
(Solove, 2004).
Figure 1: The Levis Home Page, and log of resource requests associated with loading that page.
Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6th-9th 2009 3
Americas Conference on Information Systems Page 5 of 11
your IP address), what online articles you read, and what keywords you enter into a search engine are excluded from official
considerations of online privacy. Under the control definition of privacy, you only need to control your information if you
can be identified. As long as you are treated anonymously, then you have no privacy concerns.
Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6th-9th 2009 4
Page 6 of 11 Americas Conference on Information Systems
Figure 2: This short JavaScript downloads from the Levis site, and quickly creates seven Web beacons for various advertising
networks, including Yield Manager, TribalFusion, and Advertising.com.
To begin data collection, the main page of the Levis site was accessed, and the resource requests generated by the Levis page
were recorded using TamperData. These logs revealed instances of JavaScript code downloaded to the client machine. The
JavaScript code displayed in Figure 2 comes from the URL http://switch.atdmt.com/jaction/2008_Levis_Homepage, and
originates from Atlas, a behavioral targeting company (2009b). This code creates seven different one by one image files with
tracking information – in other words, seven Web beacons. Several of these beacons connect to competitors of Atlas. For
example there is a TribalFusion Web beacon (number 7, as labeled in figure 2) and one from advertising.com (number 2).
This suggests competing advertising networks are cooperating in their data collection techniques.
Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6th-9th 2009 5
Americas Conference on Information Systems Page 7 of 11
Figure 3: The tag value from a cookie is passed back to Omniture using a Web beacon.
Next, cookies from Levis were examined for evidence of tagging. Figure 3 shows a cookie named browser_id. The host for
this cookie is us.levis.com, and it expires on February 15, 2019. The cookie has a tag value, 62217632133. The TamperData
logs revealed a beacon from Omniture, a web analytics company (2009n), referencing this tag value. Figure 3 show the tag
value from the Levis cookie being passed back to Omniture, along with an extensive list of software installed on the client
machine. One potential use of the installed software list is to enable Omniture to retrieve tags from other local data stores, for
example from the Silverlight plug-in (Dixon, 2007).
An example of a Web beacon loaded by the Levis site is displayed in Figure 4. This Web beacon, named
http://beacon.afy11.net, links to the Adify Corporation (2009m). It contains a P3P compact privacy policy in its http header
fields (the last line of the response headers, CP= “NOI DSP…”). P3P, an acronym for Platform for Privacy Preferences, is a
mechanism for creating machine readable privacy settings developed by the World Wide Web Consortium (2009h).
Compact P3P policies are strings of three letter tokens describing the data handling intentions of a cookie or other data
collection tool. This P3P policy states that it will be used to collect non-identified data (NOI), will use a pseudonymous
identifier to create a record of browsing activities (PSAa), will keep this information for an indeterminate amount of time
(IND), and will collect other types of data that are not currently specified under the P3P protocol (OTC). For a description of
all available P3P tokens refer to (2009i).
Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6th-9th 2009 6
Page 8 of 11 Americas Conference on Information Systems
Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6th-9th 2009 7
Americas Conference on Information Systems Page 9 of 11
Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6th-9th 2009 8
Page 10 of 11 Americas Conference on Information Systems
Behavioral targeting without consent threatens the autonomy of consumers, and can undermine the trust and expectations of
benevolence that customers associate with a name brand.
Another concern behavioral targeting triggers is its resemblance to techniques employed by hackers and viruses. Compare the
case of Levis.com planting Web beacons in their customer’s browsers to the virus technique known as a Trojan horse. Like a
Trojan horse, a seemingly benign file from Levis.com web site is downloaded. It then releases its payload – no less than
seven Web beacons connecting the unsuspecting visitor to multiple advertising networks. For a firm like Levis, whose brand
has been carefully crafted to align with American symbols of individualism and independence, its role as an enabler of
widespread consumer tracking could be very damaging.
FUTURE RESEARCH
Many streams of research arise from these findings. This case study looks at a single web site. The next objective is a detailed
profile by industry as to the levels of use of behavioral targeting methods.
Another important question is awareness by consumers, as to their exposure and susceptibility to behavioral targeting. This
can be illuminated by a study of the level of awareness consumers have regarding these practices, and whether an increased
level of awareness is related to a decrease in trust in e-commerce.
In the meantime, what can consumers do to protect their privacy? Right now there are few options. Conti suggests that
abstinence or withdrawal from the online world is the only method guaranteed to work (Conti, 2009), but it is not a practical
alternative. One simple and relatively effective method is to clear both cookies and temporary Internet files at the end of each
browsing session. This will delete both third party cookies and the Web bugs saved in the browser cache. In order to develop
other methods a research project has been planned to examine the types targeting tags obtained through Web browsing. The
goal will be to discover behavior targeting tags associated with specific browsers, and develop reliable methods to block and
erase those tags.
REFERENCES
1. (2007). "Supplemental Statement In Support of Complaint and Request for Inquiry and Injunctive Relief Concerning
Unfair and Deceptive Online Marketing Practices." Center for Digital Democracy. Accessed on February 15, 2009,
<http://www.democraticmedia.org/files/FTCsupplemental_statement1107.pdf>.
2. (2009a). "Add N Edit Cookies Project." mozdev.org. Accessed on February 21, 2009,
<http://addneditcookies.mozdev.org/>.
3. (2009b). "Atlas Solutions - Online Advertising: Advertiser and Publisher Ad Serving Solutions." Atlas Solutions.
Accessed on February 21, 2009, <http://www.atlassolutions.com/index.aspx>.
Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6th-9th 2009 9
Americas Conference on Information Systems Page 11 of 11
4. (2009c). "FTC Staff Report: Self-Regulatory Principles For Online Behavioral Advertising." Federal Trade
Commission. Accessed on February 15, 2009, <http://www.ftc.gov/os/2009/02/P085400behavadreport.pdf>.
5. (2009d). "The Future of Privacy Forum." The Future of Privacy Forum. Accessed on February 16, 2009,
<http://www.futureofprivacy.org/>.
6. (2009e). "The Leader in Online Channel Management Solutions and Services | ChannelAdvisor." Channel Advisor.
Accessed on February 23, 2009, <http://www.channeladvisor.com/>.
7. (2009f). "Levi Strauss & Co.'s Commitment to Privacy." Levis.com. Accessed on February 20, 2009,
<http://us.levi.com/helpdesk/index.jsp?display=safety&subdisplay=privacy&clickid=botnav_privacy_img>.
8. (2009g). "Network Advertising Initiative." Network Advertising Initiative. Accessed on February 15, 2009,
<http://www.networkadvertising.org/index.asp>.
9. (2009h). "P3P - The Platform for Privacy Preferences." World Wide Web Consortium. Accessed on February 21,
2009, <http://www.w3.org/P3P/>.
10. (2009i). "P3P Compact Policies." P3P Writer. Accessed on February 21, 2009,
<http://www.p3pwriter.com/LRN_111.asp>.
11. (2009j). "Razorfish: The Agency for Marketing, Experience & Enterprise Design for the Digital World."
Razorfish.com. Accessed on February 23, 2009, <http://www.razorfish.com/>.
12. (2009k). "The TamperData Project." mozdev.org. Accessed on February 21, 2009, <http://tamperdata.mozdev.org/>.
13. (2009l). "Tracking Macromedia Flash Movies." Adobe. Accessed on February 19, 2009,
<http://www.adobe.com/resources/richmedia/tracking/>.
14. (2009m). "Vertical Ad Network Solutions by Adify." Adify. Accessed on February 21, 2009,
<http://www.adify.com/>.
15. (2009n). "Web Analytics | Online Business Optimization by Omniture." Omniture. Accessed on February 21, 2009,
<http://www.omniture.com/en/>.
16. Ackerman, M. (2000). "The Intellectual Challenge of CSCW: The Gap between Social Requirements and Technical
Feasibility." Human-Computer Interaction 15(2/3): 179-203.
17. Cohen, N. (2009). "As Data Collecting Grows, Privacy Erodes." The New York Times, February 16, 2009.
18. Conti, G. (2009). Googling Security. Boston, MA, Pearson Education, Inc.
19. Dixon, P. (2007). "The Network Advertising Initiative: Failing at Consumer Protection and at Self-Regulation."
World Privacy Forum. Accessed on February 15, 2009,
<http://www.worldprivacyforum.org/pdf/WPF_NAI_report_Nov2_2007fs.pdf>.
20. Fukuyama, F. (1995). The social virtues and the creation of prosperity. New York, Free Press.
21. Gefen, D., Karahanna, E. and Straub, D. W. (2003). "Trust and TAM in Online Shopping: An Integrated Model."
MIS Quarterly 27(1): 51-90.
22. Jackson, C., Bortz, A., Boneh, D. and Mitchell, J. C. (2006). "Protecting browser state from web privacy attacks."
Proceedings of the 15th international conference on World Wide Web, Edinburgh, Scotland, ACM.
23. Jensen, C., Sarkar, C., Jensen, C. and Potts, C. (2007). "Tracking website data-collection and privacy practices with
the iWatch web crawler." Proceedings of the 3rd symposium on Usable privacy and security, Pittsburgh, Pennsylvania,
ACM.
24. Leggiere, P. (2009). "Targeting For Value." MediaPost Publications. Accessed on February 15, 2009,
<http://www.mediapost.com/publications/?fa=Articles.showArticle&art_aid=98826>.
25. Petronio, S. (2002). Boundaries of Privacy: Dialectics of Disclosure. Albany, State University of New York Press.
26. Solove, D. J. (2004). The Digital Person: Technology and Privacy in the Information Age New York, New York
University Press.
27. Story, L. (2007). "FTC Member Vows Tighter Control of Online Ads." The New York Times, November 2, 2007.
28. Sullivan, J. (2006). Jeans: a cultural history of an American icon. New York, Gotham Books.
29. Waldo, J., Lin, H. S. and Millett, L. I. (2007). Engaging Privacy and Information Technology in a Digital Age.
Washington, DC, National Academies Press.
30. Westin, A. (1967). Privacy and Freedom. New York, Atheneum.
Proceedings of the Fifteenth Americas Conference on Information Systems, San Francisco, California August 6th-9th 2009 10