28.06.2013 Views

Papers in PDF format

Papers in PDF format

Papers in PDF format

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

server not to cache that object. However, due to the misuse of the header by content providers, many proxy<br />

cache adm<strong>in</strong>istrators have resorted to ignor<strong>in</strong>g the header and cach<strong>in</strong>g the resource anyway. Cache bust<strong>in</strong>g<br />

methods <strong>in</strong>clude append<strong>in</strong>g a random segment to the URL which confuses the cache <strong>in</strong>to th<strong>in</strong>k<strong>in</strong>g that all the<br />

resources are different, and generat<strong>in</strong>g all pages dynamically through a cgi-script, the results of which do not<br />

get cached.<br />

Work<strong>in</strong>g with the cache implies that you allow the proxy to cache your resources, and you are supplied with a<br />

log of cache-served resources orig<strong>in</strong>at<strong>in</strong>g from your server. This is not feasible without some form of<br />

automated system, as the number of proxy-cache servers is huge, and the structure of the proxies is completely<br />

uncontrolled. Such systems are under development, and when ready, it may be <strong>in</strong> the proxy cache's best <strong>in</strong>terest<br />

to supply such <strong>in</strong><strong>format</strong>ion, as it might help the cache-busters <strong>in</strong> their defection from enemy to ally! To send<br />

<strong>in</strong><strong>format</strong>ion about each request to the orig<strong>in</strong> server of every resource <strong>in</strong> the cache would severely impact on<br />

Internet bandwidth, and reduce the benefit of runn<strong>in</strong>g a cache <strong>in</strong> the first place. It may be feasible however to<br />

consider some form of periodic batched transfer of <strong>in</strong><strong>format</strong>ion to selected orig<strong>in</strong> servers that requested the<br />

<strong>in</strong><strong>format</strong>ion by sett<strong>in</strong>g a special header when the resource was first requested from the server.<br />

It is worth tak<strong>in</strong>g a paragraph to consider the impact of proxy caches on the unavailable image and Java applet<br />

solutions presented above. Based on experiments with NCSA httpd 1.5.1, proxies do not cache 404 unavailable<br />

responses, which means that this solution will work to track users beh<strong>in</strong>d proxy caches and firewalls.<br />

Furthermore, it will not impact on the network as much as cache bust<strong>in</strong>g algorithms, because no data is be<strong>in</strong>g<br />

transferred - only the request for the unavailable image. Java applets are cached by the proxy, but they are still<br />

allowed to communicate directly with the track<strong>in</strong>g server. There have been some problems with runn<strong>in</strong>g<br />

networked Java applets from with<strong>in</strong> Netscape from beh<strong>in</strong>d firewalls. At the time of writ<strong>in</strong>g, the author knows<br />

no solution to this particular problem.<br />

This concludes our discussion of current and possible techniques for track<strong>in</strong>g users as they access the World<br />

Wide Web. The follow<strong>in</strong>g section now briefly discusses some of the ethical issues that arise as a result of this<br />

idea.<br />

Privacy and Ethical Considerations<br />

Techniques for track<strong>in</strong>g users, as discussed <strong>in</strong> this paper, raise a number of ethical issues concern<strong>in</strong>g privacy<br />

and security. Such issues are complex and hardly ever clear cut. However, they are also of great importance<br />

and so warrant discussion and consideration dur<strong>in</strong>g the technical development process. We beg<strong>in</strong> by<br />

identify<strong>in</strong>g the k<strong>in</strong>ds of <strong>in</strong><strong>format</strong>ion that might be gathered about the presence and activity of users on the<br />

WWW. These <strong>in</strong>clude:<br />

• Monitor<strong>in</strong>g general access trends - record<strong>in</strong>g patterns of access by groups of people.<br />

• Anonymous monitor<strong>in</strong>g of <strong>in</strong>dividuals - record<strong>in</strong>g details of an <strong>in</strong>dividual's access but ignor<strong>in</strong>g their<br />

identity.<br />

• Non-anonymous monitor<strong>in</strong>g of <strong>in</strong>dividuals - also record<strong>in</strong>g the identities of people access<strong>in</strong>g the WWW.<br />

• Persistent record<strong>in</strong>g vs <strong>in</strong>stantaneous awareness - decid<strong>in</strong>g whether monitor<strong>in</strong>g <strong>in</strong><strong>format</strong>ion is recorded for<br />

subsequent storage, analysis and use or whether it is only made available at the time of access (e.g. to<br />

enable chance encounters and stimulate social <strong>in</strong>teraction).<br />

There are may also be many possible uses of such <strong>in</strong><strong>format</strong>ion. For example:<br />

• Mak<strong>in</strong>g colleagues generally aware of each other's presence <strong>in</strong> much the same way the shared build<strong>in</strong>gs<br />

and offices support the coord<strong>in</strong>ation of activity through casual awareness between their occupants.<br />

• Encourag<strong>in</strong>g chance encounters between people brows<strong>in</strong>g the same or related <strong>in</strong><strong>format</strong>ion.<br />

• By <strong>in</strong><strong>format</strong>ion and service providers <strong>in</strong> order to enhance services (e.g. develop<strong>in</strong>g new paths through<br />

<strong>in</strong><strong>format</strong>ion based on analysis of patterns of use) or as part of bill<strong>in</strong>g and account<strong>in</strong>g.<br />

• To enhance security by provid<strong>in</strong>g better awareness of who is access<strong>in</strong>g which sites and <strong>in</strong><strong>format</strong>ion (<strong>in</strong> the<br />

same way that video surveillance improves the security or many urban areas).<br />

• It may be made available to third parties such as advertisers and government agencies.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!