Comments on: Privacy in the use of Keyword-Based Advertising http://nsdl.library.cornell.edu/websites/expertvoices/info2040/archives/1920 This is a supplemental blog for a course which will cover how the social, technological, and natural worlds are connected, and how the study of networks sheds light on these connections. Fri, 08 Mar 2013 14:27:22 +0000 http://wordpress.org/?v=2.3.3 By: Cornell Info 204 Digest » Blog Archive » Privacy, Multimedia Search, and Neural Networks http://nsdl.library.cornell.edu/websites/expertvoices/info2040/archives/1920#comment-1296 Cornell Info 204 Digest » Blog Archive » Privacy, Multimedia Search, and Neural Networks Thu, 15 Mar 2007 22:12:07 +0000 http://nsdl.library.cornell.edu/websites/expertvoices/info2040/archives/1920#comment-1296 [...] A recent post by babaganoush discussed the issue of privacy in keyword-based advertising. As touched on in class, maintaining privacy is one of the chief concerns moving forward as we develop more sophisticated methods of targeted advertising. A recent paper by Chopra and White discusses various implications of privacy as automated agents become increasingly sophisticated. Consider the following scenario where Google’s technology becomes advanced enough such that it can discern that terrorists are using Gmail to plot an attack on a major city. One can imagine the government’s desire to create laws to leverage this technology (analog of a human failing to report a crime being a criminal act). As agents become more sophisticated, one can imagine companies such as Google facing increasing pressure to protect the privacy of their users. [...] […] A recent post by babaganoush discussed the issue of privacy in keyword-based advertising. As touched on in class, maintaining privacy is one of the chief concerns moving forward as we develop more sophisticated methods of targeted advertising. A recent paper by Chopra and White discusses various implications of privacy as automated agents become increasingly sophisticated. Consider the following scenario where Google’s technology becomes advanced enough such that it can discern that terrorists are using Gmail to plot an attack on a major city. One can imagine the government’s desire to create laws to leverage this technology (analog of a human failing to report a crime being a criminal act). As agents become more sophisticated, one can imagine companies such as Google facing increasing pressure to protect the privacy of their users. […]

]]>