Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji...
-
Upload
flora-blair -
Category
Documents
-
view
214 -
download
0
Transcript of Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji...
![Page 1: Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji Takeda Keio University W3C / MIT 2015/9/17 W3C Web and.](https://reader035.fdocuments.us/reader035/viewer/2022062718/56649e8e5503460f94b92167/html5/thumbnails/1.jpg)
Copyright © 2008 Keio University
Digital Marketing AntiPattern
- in security and privacy -
Keiji Takeda
Keio University
W3C / MIT
2015/9/17 W3C Web and Digital Marketing Convergence
![Page 2: Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji Takeda Keio University W3C / MIT 2015/9/17 W3C Web and.](https://reader035.fdocuments.us/reader035/viewer/2022062718/56649e8e5503460f94b92167/html5/thumbnails/2.jpg)
2
Background and Motivation
Background:Recursive Failure in Digital Marketing Practices.
Motivation:By sharing knowledge on bad practices in digital marketing, similar risks can be managed or mitigated.
Objective: Develop a catalog of common failures/misunderstanding
in digital marketing practices.
Clarify border between what should be avoided or what can be done.
![Page 3: Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji Takeda Keio University W3C / MIT 2015/9/17 W3C Web and.](https://reader035.fdocuments.us/reader035/viewer/2022062718/56649e8e5503460f94b92167/html5/thumbnails/3.jpg)
3
AntiPattern
“a literary form that describes a commonly occurring solution to a problem that generates decidedly negative consequences.
The AntiPattern may be the result of a manager or developer not knowing any better, not having sufficient knowledge or experience in solving a particular type of problem, or having applied a perfectly good pattern in the wrong context. “
W. J. Brown, R. C. Malveau, H. W. McCormick, and T. J. Mowbray. AntiPatterns: Refactoring Software, Architectures, and Projects in Crisis. Wiley, 1998.
![Page 4: Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji Takeda Keio University W3C / MIT 2015/9/17 W3C Web and.](https://reader035.fdocuments.us/reader035/viewer/2022062718/56649e8e5503460f94b92167/html5/thumbnails/4.jpg)
4
Digital Marketing AntiPattern Examples
Malvertising
Inescapable Tracking
User Data Inspection
Accidental Data Exposure
Local Optimum
... and more
![Page 5: Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji Takeda Keio University W3C / MIT 2015/9/17 W3C Web and.](https://reader035.fdocuments.us/reader035/viewer/2022062718/56649e8e5503460f94b92167/html5/thumbnails/5.jpg)
5
Malvertising
Malvertising (Malicious Advertising)Name
AntiPattern Problem
Solution
An online criminal methodologyuse of advertising networks to spread malicious software
Screening of advertiserDevelop detection mechanismDevelop secure advertising network technology
DoubleClick, AppNexus, engage:BDR, ExoClick (2015/8 )Yahoo!(2015/8)
![Page 6: Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji Takeda Keio University W3C / MIT 2015/9/17 W3C Web and.](https://reader035.fdocuments.us/reader035/viewer/2022062718/56649e8e5503460f94b92167/html5/thumbnails/6.jpg)
6
Malvertising
DoubleClick, AppNexus, engage:BDR, ExoClick (2015/8 )Yahoo!(2015/8)
(SC Magazine, 2015/09/07) (Fox News, 2015/08/24)
![Page 7: Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji Takeda Keio University W3C / MIT 2015/9/17 W3C Web and.](https://reader035.fdocuments.us/reader035/viewer/2022062718/56649e8e5503460f94b92167/html5/thumbnails/7.jpg)
7
Inescapable Tracking
Inescapable TrackingName
AntiPattern Problem
Solution
Use of unchangeable persistent ID for user tracking.
Avoid using unchangable persistent unique ID for user trackingUse Cookie or temporal ID that user can delete or reset
(UDID/IMEI, MAC, SerialNumber, SIM, SIM Number, social security number, fingerprint/biometrics, super cookie)2011 IMEI Docomo Media Player2012 UDID leakage from Apple
![Page 8: Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji Takeda Keio University W3C / MIT 2015/9/17 W3C Web and.](https://reader035.fdocuments.us/reader035/viewer/2022062718/56649e8e5503460f94b92167/html5/thumbnails/8.jpg)
8
User Data Inspection
User Data InspectionName
AntiPattern Problem
Solution
Inspect user data (DPI, storage, installed application etc.) for marketing or advertisement.
Ask explicit user permission or consent for private data access.Or limit data access in minimum scope for purpose.
DPI advertisement (NebuAd, Phorm)Use of address book(contact list) on smart phones.Retrieving application Listing on smart phones
![Page 9: Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji Takeda Keio University W3C / MIT 2015/9/17 W3C Web and.](https://reader035.fdocuments.us/reader035/viewer/2022062718/56649e8e5503460f94b92167/html5/thumbnails/9.jpg)
9
Accidental Data Exposure
Accidental Data ExposureName
AntiPattern Problem
Solution
Information leakage caused by putting data or application program as accessible to public on web servers.Sending e-mail message with enumerated addresses.
Avoid placing valuable data on front end web server.Configure proper permission setting and use compartmentalization mechanisms. (chroot, jail, etc.) Use special applications to send bulk messages.
Google Hacking
![Page 10: Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji Takeda Keio University W3C / MIT 2015/9/17 W3C Web and.](https://reader035.fdocuments.us/reader035/viewer/2022062718/56649e8e5503460f94b92167/html5/thumbnails/10.jpg)
10
Local Optimum
Local OptimumName
AntiPattern Problem
Solution
Construct a platform with too much optimization to local (technological, legal) environment. It becomes not able to deploy globally.
Use standard technology.Avoid using localized technology.
Web services for Japanese feature phone
![Page 11: Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji Takeda Keio University W3C / MIT 2015/9/17 W3C Web and.](https://reader035.fdocuments.us/reader035/viewer/2022062718/56649e8e5503460f94b92167/html5/thumbnails/11.jpg)
11
Browser Share ( US )
Source: http://gs.statcounter.com/
![Page 12: Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji Takeda Keio University W3C / MIT 2015/9/17 W3C Web and.](https://reader035.fdocuments.us/reader035/viewer/2022062718/56649e8e5503460f94b92167/html5/thumbnails/12.jpg)
12
Browser Share ( JP )
Source: http://gs.statcounter.com/
![Page 13: Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji Takeda Keio University W3C / MIT 2015/9/17 W3C Web and.](https://reader035.fdocuments.us/reader035/viewer/2022062718/56649e8e5503460f94b92167/html5/thumbnails/13.jpg)
13
Browser Share ( CN )
Source: http://gs.statcounter.com/
![Page 14: Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji Takeda Keio University W3C / MIT 2015/9/17 W3C Web and.](https://reader035.fdocuments.us/reader035/viewer/2022062718/56649e8e5503460f94b92167/html5/thumbnails/14.jpg)
14
Search Engine ( US )
Source: http://gs.statcounter.com/
![Page 15: Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji Takeda Keio University W3C / MIT 2015/9/17 W3C Web and.](https://reader035.fdocuments.us/reader035/viewer/2022062718/56649e8e5503460f94b92167/html5/thumbnails/15.jpg)
15
Search Engine ( JP )
Source: http://gs.statcounter.com/
![Page 16: Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji Takeda Keio University W3C / MIT 2015/9/17 W3C Web and.](https://reader035.fdocuments.us/reader035/viewer/2022062718/56649e8e5503460f94b92167/html5/thumbnails/16.jpg)
16
Search Engine ( CN )
Source: http://gs.statcounter.com/
![Page 17: Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji Takeda Keio University W3C / MIT 2015/9/17 W3C Web and.](https://reader035.fdocuments.us/reader035/viewer/2022062718/56649e8e5503460f94b92167/html5/thumbnails/17.jpg)
17
Social Media ( US )
Source: http://gs.statcounter.com/
![Page 18: Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji Takeda Keio University W3C / MIT 2015/9/17 W3C Web and.](https://reader035.fdocuments.us/reader035/viewer/2022062718/56649e8e5503460f94b92167/html5/thumbnails/18.jpg)
18
Social Media ( JP )
Source: http://gs.statcounter.com/
![Page 19: Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji Takeda Keio University W3C / MIT 2015/9/17 W3C Web and.](https://reader035.fdocuments.us/reader035/viewer/2022062718/56649e8e5503460f94b92167/html5/thumbnails/19.jpg)
19
Social Media ( CN )
Source: http://gs.statcounter.com/
![Page 20: Copyright © 2008 Keio University Digital Marketing AntiPattern - in security and privacy - Keiji Takeda Keio University W3C / MIT 2015/9/17 W3C Web and.](https://reader035.fdocuments.us/reader035/viewer/2022062718/56649e8e5503460f94b92167/html5/thumbnails/20.jpg)
20
Conclusion
Share issues and bad experience in digital
marketing
AntiPattern for risk avoidance and mitigation
Malvertisement is significant threats and an
intersection of marketing, security and
technology.
Environment and premise varies by countries
but standardization would help digital
marketing.