HOME

TheInfoList



OR:

Web tracking is the practice by which operators of
website A website (also written as a web site) is a collection of web pages and related content that is identified by a common domain name and published on at least one web server. Examples of notable websites are Google Search, Google, Facebook, Amaz ...
s and third parties collect, store and share information about visitors’ activities on the
World Wide Web The World Wide Web (WWW), commonly known as the Web, is an information system enabling documents and other web resources to be accessed over the Internet. Documents and downloadable media are made available to the network through web se ...
. Analysis of a user's behaviour may be used to provide content that enables the operator to infer their preferences and may be of interest to various parties, such as advertisers. Web tracking can be part of visitor management.


Uses of web tracking

The uses of web tracking include the following: * Advertising companies actively collect information about users and make profiles that are used to individualize advertisements. User activities include websites visited, watched videos, interactions on social networks, and online transactions. Websites like
Netflix Netflix, Inc. is an American subscription video on-demand over-the-top streaming service and production company based in Los Gatos, California. Founded in 1997 by Reed Hastings and Marc Randolph in Scotts Valley, California, it offers a fil ...
,
YouTube YouTube is a global online video platform, online video sharing and social media, social media platform headquartered in San Bruno, California. It was launched on February 14, 2005, by Steve Chen, Chad Hurley, and Jawed Karim. It is owned by ...
collect information about what shows users watch, which helps them suggest more shows that they might like. Search engines like
Google Google LLC () is an American multinational technology company focusing on search engine technology, online advertising, cloud computing, computer software, quantum computing, e-commerce, artificial intelligence, and consumer electronics. ...
will keep a record of what users search for, which could help them suggest more relevant searches in the future. *
Law enforcement agencies A law enforcement agency (LEA) is any government agency responsible for the enforcement of the laws. Jurisdiction LEAs which have their ability to apply their powers restricted in some way are said to operate within a jurisdiction. LEAs ...
may use web tracking to spy on individuals and solve crimes. *
Web analytics Web analytics is the measurement, data collection, collection, analysis, and reporting of web Data (computing), data to understand and optimize web usage. Web analytics is not just a process for measuring web traffic but can be used as a tool fo ...
focuses more on the performance of a website as a whole. Web tracking will give insight on how a website is being used and see how long a user spends on a certain page. This can be used to see who may have the most interest in the content of the website. * Usability tests is the practice of testing how easy a design is to use. Users are observed as they complete tasks. This would help identify usability problems with a website's design so they can be fixed for easier navigation.


Methods of web tracking


IP address

Every device connected to the Internet is assigned a unique
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
, which is needed to enable devices to communicate with each other. With appropriate software on the host website, the IP address of visitors to the site can be logged and can also be used to determine the visitor’s
geographical location In geography, location or place are used to denote a region (point, line, or area) on Earth's surface or elsewhere. The term ''location'' generally implies a higher degree of certainty than ''place'', the latter often indicating an entity with an ...
. Logging the IP address can, for example, monitor if a person voted more than once, as well as their viewing pattern. Knowing the visitor’s location indicates, besides other things, the country. This may, for example, result in prices being quoted in the local currency, the price or the range of goods that are available, special conditions applying and in some cases requests from or responses to a certain country being blocked entirely. Internet users may circumvent censorship and
geo-blocking Geo-blocking or geoblocking is technology that Internet filter, restricts access to Internet content based upon the user's geographical location. In a geo-blocking scheme, the user's location is determined using Internet geolocation techniques, su ...
and protect personal identity and location to stay anonymous on the internet using a
VPN A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The be ...
connection.


HTTP cookie

A
HTTP cookie HTTP cookies (also called web cookies, Internet cookies, browser cookies, or simply cookies) are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's w ...
is code and information embedded onto a user’s device by a website when the user visits the website. The website might then retrieve the information on the cookie on subsequent visits to the website by the user. Cookies can be used to customise the user’s browsing experience and to deliver targeted ads. Some browsing activities that cookies can store are: * pages and content a user browsed, * what a user searched online, * when a user clicked on an online advertisement, * what time a user visited a site.


First- and third-party cookies

A first-party cookie is created by the website the user is visiting. These cookies are considered "good" since they help the user rather than spy on them. The main goal of first-party cookies is to recognize the user and their preferences so that their desired settings can be applied. A third-party cookie is created by websites other than the one a user visits. They insert additional tracking code that can record a user's online activity. On-site analytics refers to data collection on the current site. It is used to measure many aspects of user interactions including the number of times a user visits. Restrictions on third-party cookies introduced by
web browser A web browser is application software for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's screen. Browsers are used on ...
s are bypassed by some tracking companies using technique called CNAME cloaking, where a third-party tracking service is assigned a
DNS The Domain Name System (DNS) is a hierarchical and distributed naming system for computers, services, and other resources in the Internet or other Internet Protocol (IP) networks. It associates various information with domain names assigned to ...
record in the first-party origin domain (usually
CNAME A Canonical Name record (abbreviated as CNAME record) is a type of resource record in the Domain Name System (DNS) that maps one domain name (an alias) to another (the canonical name). This can prove convenient when running multiple services (li ...
) so that it's masqueraded as first-party even though it's a separate entity in legal and organisational terms. This technique is blocked by some browsers and ad blockers using block lists of known trackers.


Other methods

*
Canvas fingerprinting Canvas fingerprinting is one of a number of browser fingerprinting techniques for tracking online users that allow websites to identify and track visitors using the HTML5 canvas element instead of browser cookies or other similar means. The techni ...
allows websites to identify and track users using HTML5 canvas elements instead of using a browser cookie. *
Cross-device tracking Cross-device tracking refers to technology which enables the tracking of users across multiple devices such as smartphones, television sets, smart TVs, and personal computers. More specifically, cross-device tracking is a technique in which techno ...
are used by advertisers to help identify which channels are most successful in helping convert browsers into buyers. *
Click-through rate Click-through rate (CTR) is the ratio of users who click on a specific link to the number of total users who view a page, email, or advertisement. It is commonly used to measure the success of an online advertising campaign for a particular we ...
is used by advertisers to measure the number of clicks they receive on their ads per number of impressions. *
Mouse tracking Mouse tracking (also known as cursor tracking) is the use of software to collect users' mouse cursor positions on the computer. This goal is to automatically gather richer information about what people are doing, typically to improve the design of ...
collects the users mouse cursor positions on the computer. *
Browser fingerprinting A device fingerprint or machine fingerprint is information collected about the software and hardware of a remote computing device for the purpose of identification. The information is usually assimilated into a brief identifier using a fingerprinti ...
relies on your browser and is a way of identifying users every time they go online and track your activity. Through fingerprinting, websites can determine the users operating system, language, time zone, and browser version without your permission. * Supercookies or "
evercookie Evercookie (also known as supercookie) is a JavaScript application programming interface (API) that identifies and reproduces intentionally deleted cookies on the clients' browser storage. It was created by Samy Kamkar in 2010 to demonstrate the ...
s" can not only be used to track users across the web, but they are also hard to detect and difficult to remove since they are stored in a different place than the standard cookies. *
Session replay Session replay is the ability to replay a visitor's journey on a web site or within a mobile application or web application. Replay can include the user's view (browser or screen output), user input (keyboard and mouse inputs), and logs of netwo ...
scripts allows the ability to replay a visitor's journey on a
web site A website (also written as a web site) is a collection of web pages and related content that is identified by a common domain name and published on at least one web server. Examples of notable websites are Google, Facebook, Amazon, and Wikipe ...
or within a
mobile application A mobile application or app is a computer program or software application designed to run on a mobile device such as a phone, tablet, or watch. Mobile applications often stand in contrast to desktop applications which are designed to run on de ...
or
web application A web application (or web app) is application software that is accessed using a web browser. Web applications are delivered on the World Wide Web to users with an active network connection. History In earlier computing models like client-serve ...
. * "Redirect tracking" is the use of
redirect page URL redirection, also called URL forwarding, is a World Wide Web technique for making a web page available under more than one URL address. When a web browser attempts to open a URL that has been redirected, a page with a different URL is opened ...
s to track users across websites. *
Web beacon A web beaconAlso called web bug, tracking bug, tag, web tag, page tag, tracking pixel, pixel tag, 1×1 GIF, or clear GIF. is a technique used on web pages and email to unobtrusively (usually invisibly) allow checking that a user has accessed s ...
s are commonly used to check whether or not an individual who received an email actually read it. *
Favicon A favicon (; short for favorite icon), also known as a shortcut icon, website icon, tab icon, URL icon, or bookmark icon, is a file containing one or more small icons, associated with a particular website or web page. A web designer can create s ...
s can be used to track users since they persist across browsing sessions. *''
Federated Learning of Cohorts Federated Learning of Cohorts (FLoC) is a type of web tracking. It groups people into "cohorts" based on their browsing history for the purpose of interest-based advertising. FLoC was being developed as a part of Google's Privacy Sandbox ini ...
'' (FLoC), trialed in
Google Chrome Google Chrome is a cross-platform web browser developed by Google. It was first released in 2008 for Microsoft Windows, built with free software components from Apple WebKit and Mozilla Firefox. Versions were later released for Linux, macOS ...
in 2021, which intends to replace existing behavioral tracking which relies on tracking individual user actions and aggregating them on the server side with web browser declaring their membership in a behavioral cohort.
EFF EFF or eff may refer to: Politics * Economic Freedom Fighters, a South African communist political party * Economic Freedom Fund, an American political organization * Election Fighting Fund, a British suffragist organization supporting the ear ...
has criticized FLoC as retaining the fundamental paradigm of surveillance economy, where "each user’s behavior follows them from site to site as a label, inscrutable at a glance but rich with meaning to those in the know".


Controversy

Web browsing is linked to a user's personal information. Location, interests, purchases, and more can be revealed just by what page a user visits. This allows them to draw conclusions about a user, and analyse patterns of activity. Use of web tracking can be controversial when applied in the context of a private individual; and to varying degrees is subject to legislation such as the EU's eCommerce Directive and the UK's Data Protection Act. When it is done without the knowledge of a user, it may be considered a breach of
browser security Browser security is the application of Internet security to web browsers in order to protect networked data and computer systems from breaches of privacy or malware. Security exploits of browsers often use JavaScript, sometimes with cross-site s ...
.


Justification

In a
business-to-business Business-to-business (B2B or, in some countries, BtoB) is a situation where one business makes a commercial transaction with another. This typically occurs when: * A business is sourcing materials for their production process for output (e.g., a ...
context, understanding a visitor's behaviour in order to identify buying intentions is seen by many commercial organisations as an effective way to
target Target may refer to: Physical items * Shooting target, used in marksmanship training and various shooting sports ** Bullseye (target), the goal one for which one aims in many of these sports ** Aiming point, in field artillery, fi ...
marketing Marketing is the process of exploring, creating, and delivering value to meet the needs of a target market in terms of goods and services; potentially including selection of a target audience; selection of certain attributes or themes to emph ...
activities. Visiting companies can be approached, both online and offline, with marketing and sales
propositions In logic and linguistics, a proposition is the meaning of a declarative sentence. In philosophy, " meaning" is understood to be a non-linguistic entity which is shared by all sentences with the same meaning. Equivalently, a proposition is the no ...
which are relevant to their current requirements. From the point of view of a sales organisation, engaging with a potential customer when they are actively looking to buy can produce savings in otherwise wasted marketing funds.


Prevention

Users can control third-party web tracking. Opt-out cookies enables users to block websites from installing future cookies. Websites may be blocked from installing third party advertisers or cookies on a browser which will prevent tracking on the users page.
Do Not Track Do Not Track (DNT) is a formerly official HTTP header field, designed to allow internet users to opt-out of tracking by websites—which includes the collection of data regarding a user's activity across multiple distinct contexts, and the retent ...
is a web browser setting that can request a web application to disable the tracking of a user. Enabling this feature will send a request to the website users are on to disable their cross-site user tracking. Contrary to popular belief, browser
privacy mode Private browsing is a privacy feature in some web browsers. When operating in such a mode, the browser creates a temporary session that is isolated from the browser's main session and user data. Browsing history is not saved, and local data as ...
does not prevent (all) tracking attempts because it usually only blocks the storage of information on the visitor site (
cookies A cookie is a baked or cooked snack or dessert that is typically small, flat and sweet. It usually contains flour, sugar, egg, and some type of oil, fat, or butter. It may include other ingredients such as raisins, oats, chocolate chips, nuts ...
). It does not help, however, against live data transmissions like the various
fingerprinting A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfac ...
methods. Such fingerprints can be easily de-anonymized. Many times, the functionality of the website fails. For example, one may not be able to log in to the site, or preferences are lost. Some web browsers use "tracking protection" or "tracking prevention" features to block web trackers.


See also

*
Behavioral analytics Behavioral analytics is a recent advancement in business analytics that reveals new insights into the behavior of consumers on eCommerce platforms, online games, web and mobile applications, and IoT. The rapid increase in the volume of raw event ...
provides insight into the actions of people when they are online, usually when they purchase products online. *
Consumer Data Industry Association The Consumer Data Industry Association (CDIA) is the trade association for the various consumer reporting companies in the United States. It represents around 200 consumer data companies that provide fraud prevention and risk management products ...
*
Employee monitoring Employee monitoring is the (often automated) surveillance of workers' activity. Organizations engage in employee monitoring for different reasons such as to track performance, to avoid legal liability, to protect trade secrets, and to address other ...
is the use of workplace surveillance to gather information on the activities and locations of employees. * Gemini space and
Gopher Pocket gophers, commonly referred to simply as gophers, are burrowing rodents of the family Geomyidae. The roughly 41 speciesSearch results for "Geomyidae" on thASM Mammal Diversity Database are all endemic to North and Central America. They are ...
as alternatives serving mostly textual content without tracking * Google Chrome#User tracking concerns *
GPS tracking A GPS tracking unit, geotracking unit, satellite tracking unit, or simply tracker is a navigation device normally on a vehicle, asset, person or animal that uses satellite navigation to determine its movement and determine its WGS84 UTM ge ...
can track the location of an entity or object remotely *
Internet privacy Internet privacy involves the right or mandate of personal privacy concerning the storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via Internet. Internet privacy is a subset of data privacy. Pr ...
is the level of privacy an individual has while they are connected to the internet *
Internet tracking Internet privacy involves the right or mandate of personal privacy concerning the storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via Internet. Internet privacy is a subset of data privacy. Pri ...
*
Information privacy Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data pr ...
*
Network surveillance Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be comple ...
*
Track and trace In the distribution and logistics of many types of products, track and trace or tracking and tracing concerns a process of determining the current and past locations (and other information) of a unique item or property. This concept can be s ...
is used to track a product's status and monitor their location when transported *
Web analytics Web analytics is the measurement, data collection, collection, analysis, and reporting of web Data (computing), data to understand and optimize web usage. Web analytics is not just a process for measuring web traffic but can be used as a tool fo ...
is the reporting and analysis of website data to improve the user's experience *
Web beacon A web beaconAlso called web bug, tracking bug, tag, web tag, page tag, tracking pixel, pixel tag, 1×1 GIF, or clear GIF. is a technique used on web pages and email to unobtrusively (usually invisibly) allow checking that a user has accessed s ...
is an invisible graphic that is placed on a website to monitor the behavior of the user visiting.


References


External links

* ** {{cite web, url=https://github.com/citp/OpenWPM, title=OpenWPM – A privacy measurement framework, website=
GitHub GitHub, Inc. () is an Internet hosting service for software development and version control using Git. It provides the distributed version control of Git plus access control, bug tracking, software feature requests, task management, continuous ...
, access-date=2018-02-20 Internet privacy Web analytics Tracking Mass surveillance Privacy