2011
DOI: 10.2139/ssrn.1852644
|View full text |Cite
|
Sign up to set email alerts
|

Audience Selection for On-Line Brand Advertising: Privacy-Friendly Social Network Targeting

Abstract: This paper describes and evaluates privacy-friendly methods for extracting quasi-social networks from browser behavior on user-generated content sites, for the purpose of finding good audiences for brand advertising (as opposed to click maximizing, for example). Targeting social-network neighbors resonates well with advertisers, and on-line browsing behavior data counterintuitively can allow the identification of good audiences anonymously. Besides being one of the first papers to our knowledge on data mining … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
67
0
1

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 51 publications
(69 citation statements)
references
References 20 publications
(28 reference statements)
1
67
0
1
Order By: Relevance
“…We conjecture that these techniques also will be quite useful in other high-dimensional classification problems, which are becoming increasingly important to modern business. For example, it may not be obvious, but classifying web users based on the web pages they visit (Provost et al 2009) could be cast in the same framework as document classification.…”
Section: Discussion and Limitationsmentioning
confidence: 99%
“…We conjecture that these techniques also will be quite useful in other high-dimensional classification problems, which are becoming increasingly important to modern business. For example, it may not be obvious, but classifying web users based on the web pages they visit (Provost et al 2009) could be cast in the same framework as document classification.…”
Section: Discussion and Limitationsmentioning
confidence: 99%
“…Earlier work on privacy breaches has shown how people can be uniquely identified using information such as postal codes, gender, and dates and places of birth (12)(13)(14), as well as the contents of search engine queries and online reviews and discussion (15)(16)(17). Other work has shown how social network structure can be exposed by analyzing anonymized versions of it (18,19) or by looking for commonalities in online behavior, such as covisitations to web sites (20) and tagging shared content with similar textual keywords (21). Our findings here differ from these studies by establishing a strong form of leakage from sparse individual information about activities in the physical world into pairwise information about links in the underlying social network.…”
Section: Discussionmentioning
confidence: 99%
“…The use of high dimensional raw user log data as features in classification models was introduced in earlier work by Provost et al [17] as well as Chen et al in [6]. Further work, such as that by [15] and [13] describes in finer detail how features can be constructed from raw user event data.…”
Section: Background On M6d Display Advertising and Related Workmentioning
confidence: 99%
“…Each of these criteria may be approximated with a good ranking of potential purchasers in terms of their likelihood of purchasing. These problems have been described in detail previously [17,16,19]. A primary source of feature data is a consumer's browsing history, captured as a collection of anonymized (hashed) URLs that the consumer has visited in the past.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation