{"id":"https://openalex.org/W6927107831","doi":"https://doi.org/10.26190/unsworks/19458","title":"Privacy-preserving mechanisms for targeted mobile advertising","display_name":"Privacy-preserving mechanisms for targeted mobile advertising","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W6927107831","doi":"https://doi.org/10.26190/unsworks/19458"},"language":"en","primary_location":{"id":"pmh:oai:unsworks.library.unsw.edu.au:1959.4/57412","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.4/57412","pdf_url":null,"source":{"id":"https://openalex.org/S4306401737","display_name":"UNSWorks (University of New South Wales, Sydney, Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I40053085","host_organization_name":"Australian Defence Force Academy","host_organization_lineage":["https://openalex.org/I40053085"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"http://purl.org/coar/resource_type/c_db06"},"type":"dissertation","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.26190/unsworks/19458","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Ullah, Imdad","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ullah, Imdad","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T12688","display_name":"Microbial metabolism and enzyme function","score":0.5206999778747559,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T12688","display_name":"Microbial metabolism and enzyme function","score":0.5206999778747559,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10284","display_name":"Anaerobic Digestion and Biogas Production","score":0.06210000067949295,"subfield":{"id":"https://openalex.org/subfields/2215","display_name":"Building and Construction"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12824","display_name":"Infections and bacterial resistance","score":0.032099999487400055,"subfield":{"id":"https://openalex.org/subfields/1310","display_name":"Endocrinology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/targeted-advertising","display_name":"Targeted advertising","score":0.6782000064849854},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.5554999709129333},{"id":"https://openalex.org/keywords/online-advertising","display_name":"Online advertising","score":0.5408999919891357},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.5378000140190125},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4742000102996826},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4697999954223633},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.4399000108242035},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.42809998989105225},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4262999892234802},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.3953000009059906}],"concepts":[{"id":"https://openalex.org/C2777459780","wikidata":"https://www.wikidata.org/wiki/Q1628411","display_name":"Targeted advertising","level":2,"score":0.6782000064849854},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6309000253677368},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5992000102996826},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.5554999709129333},{"id":"https://openalex.org/C512338625","wikidata":"https://www.wikidata.org/wiki/Q624902","display_name":"Online advertising","level":3,"score":0.5408999919891357},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.5378000140190125},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4742000102996826},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4697999954223633},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.4399000108242035},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.42809998989105225},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4262999892234802},{"id":"https://openalex.org/C112698675","wikidata":"https://www.wikidata.org/wiki/Q37038","display_name":"Advertising","level":1,"score":0.39730000495910645},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.3953000009059906},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35839998722076416},{"id":"https://openalex.org/C2778656907","wikidata":"https://www.wikidata.org/wiki/Q5164712","display_name":"Consumer privacy","level":3,"score":0.35580000281333923},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.35530000925064087},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.35120001435279846},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.34700000286102295},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.3398999869823456},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.31679999828338623},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.2935999929904938},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.2924000024795532},{"id":"https://openalex.org/C70133500","wikidata":"https://www.wikidata.org/wiki/Q1815904","display_name":"Contextual advertising","level":4,"score":0.29100000858306885},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.2881999909877777},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.28060001134872437},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.2773999869823456},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.267300009727478},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.26260000467300415},{"id":"https://openalex.org/C110350745","wikidata":"https://www.wikidata.org/wiki/Q1761818","display_name":"Advertising campaign","level":2,"score":0.25999999046325684},{"id":"https://openalex.org/C56408696","wikidata":"https://www.wikidata.org/wiki/Q6980087","display_name":"Native advertising","level":4,"score":0.2578999996185303},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.2574000060558319},{"id":"https://openalex.org/C516764902","wikidata":"https://www.wikidata.org/wiki/Q1043805","display_name":"Mobile Web","level":4,"score":0.2531999945640564},{"id":"https://openalex.org/C160949748","wikidata":"https://www.wikidata.org/wiki/Q1365703","display_name":"Mobile payment","level":3,"score":0.24709999561309814},{"id":"https://openalex.org/C2985706004","wikidata":"https://www.wikidata.org/wiki/Q1043805","display_name":"Mobile internet","level":3,"score":0.2320999950170517},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.22470000386238098},{"id":"https://openalex.org/C60952562","wikidata":"https://www.wikidata.org/wiki/Q6887246","display_name":"Mobile technology","level":3,"score":0.21850000321865082},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.21330000460147858},{"id":"https://openalex.org/C175968658","wikidata":"https://www.wikidata.org/wiki/Q839447","display_name":"Privacy laws of the United States","level":3,"score":0.21050000190734863},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.21040000021457672},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.20880000293254852}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:unsworks.library.unsw.edu.au:1959.4/57412","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.4/57412","pdf_url":null,"source":{"id":"https://openalex.org/S4306401737","display_name":"UNSWorks (University of New South Wales, Sydney, Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I40053085","host_organization_name":"Australian Defence Force Academy","host_organization_lineage":["https://openalex.org/I40053085"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"http://purl.org/coar/resource_type/c_db06"},{"id":"doi:10.26190/unsworks/19458","is_oa":true,"landing_page_url":"https://doi.org/10.26190/unsworks/19458","pdf_url":null,"source":{"id":"https://openalex.org/S7407053176","display_name":"University of New South Wales","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"thesis"}],"best_oa_location":{"id":"doi:10.26190/unsworks/19458","is_oa":true,"landing_page_url":"https://doi.org/10.26190/unsworks/19458","pdf_url":null,"source":{"id":"https://openalex.org/S7407053176","display_name":"University of New South Wales","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"thesis"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Targeted":[0],"advertising":[1,62,209,333],"is":[2,79,134],"a":[3,154,186,203],"complex":[4],"mechanism":[5,138],"to":[6,20,26,57,67,71,234,292,322,340],"identify,":[7],"track":[8],"and":[9,19,35,42,61,96,98,124,176,183,198,219,269,277,294,335],"profile":[10],"users":[11,53,161,286],"behaviour":[12],"for":[13,91,128,205,238],"their":[14,27,72,77],"activities":[15],"over":[16,49],"Internet/mobile":[17],"apps":[18,142],"serve":[21],"them":[22,37],"advertisements":[23],"(ads)":[24],"according":[25],"(profile)":[28,73],"interests.":[29],"Advertising":[30],"companies":[31],"develop":[32],"tracking":[33],"technologies":[34],"embed":[36],"into":[38],"user's":[39,88],"Internet":[40],"browsers":[41],"mobile":[43,94,104,208,311],"apps,":[44],"which":[45,116,146],"have":[46],"raised":[47],"concerns":[48],"privacy":[50,100,113,200,206],"issues.":[51],"Mobile":[52],"are":[54],"uncertain":[55],"whether":[56],"trust":[58],"targeted":[59,129,217],"ads":[60,69,95,218,236],"companies,":[63],"however,":[64],"they":[65],"tend":[66],"view":[68],"relevant":[70],"interests":[74,151],"provided":[75],"that":[76,160,211,313],"information":[78,90],"kept":[80],"private.":[81],"This":[82,225,253],"thesis":[83,109,254,301],"focuses":[84],"on":[85,228,317],"collection":[86],"of":[87,93,122,139,192,222,231,251,260,285,297,305,331],"personal":[89],"classification":[92],"characterising":[97],"quantifying":[99],"issues":[101],"arising":[102],"in":[103,153,165,272,288,338],"ads.":[105,224],"In":[106,290],"addition,":[107],"this":[108,261,300],"introduces":[110],"two":[111],"novel":[112],"preserving":[114,207],"mechanisms,":[115,299],"address":[117],"three":[118],"issues:":[119],"privacy,":[120,325],"control":[121],"information,":[123],"private":[125,150,214,220],"user":[126,155,215,324],"profiling":[127],"advertising.":[130],"First,":[131],"the":[132,158,179,190,229,244,247,258,280,303,329],"ProfileGuard,":[133],"an":[135],"app-based":[136],"obfuscation":[137],"suggesting":[140],"obfuscating":[141,196],"via":[143,184],"different":[144],"strategies,":[145],"removes":[147],"prevalence":[148],"amongst":[149],"present":[152],"profile.":[156],"Under":[157],"assumptions":[159],"will":[162],"be":[163,315],"operating":[164],"resource-constrained":[166],"scenarios,":[167],"such":[168],"as":[169],"fixed":[170],"4G":[171],"data":[172],"plan,":[173],"limited":[174],"processing":[175,265],"battery":[177],"powers,":[178],"ProfileGuard":[180],"presents,":[181],"analytically":[182],"experimentations,":[185,257],"good":[187],"trade-off":[188],"between":[189],"level":[191],"efforts":[193],"required":[194],"by":[195,263,308],"strategies":[197],"resulting":[199],"protection.":[201],"Second,":[202],"framework":[204,262],"system":[210],"enables":[212],"device-based":[213],"profiling,":[216],"billing":[221],"retrieved/clicked":[223],"proposal":[226],"relies":[227],"use":[230],"cryptographic":[232],"techniques":[233],"query":[235],"databases":[237,245],"matching":[239],"(to":[240],"profile)":[241],"ads,":[242],"without":[243],"learning":[246],"contents":[248],"or":[249],"result":[250],"queries.":[252],"demonstrates,":[255],"using":[256],"feasibility":[259],"measuring":[264],"times,":[266],"communication":[267],"delays":[268],"bandwidth":[270],"usage,":[271],"addition":[273,291],"to,":[274],"its":[275],"responsiveness":[276],"scalability":[278],"under":[279],"scenario":[281],"where":[282],"huge":[283],"number":[284],"operate":[287,337],"parallel.":[289],"analytical":[293],"experimental":[295],"evaluations":[296],"above":[298],"demonstrates":[302],"practicality":[304],"these":[306],"mechanisms":[307,320],"developing":[309],"prototype":[310],"applications":[312],"can":[314,336],"used":[316],"smartphones.":[318],"These":[319],"guarantee":[321],"protect":[323],"do":[326],"not":[327],"necessitate":[328],"re-design":[330],"current":[332],"systems":[334],"parallel":[339],"existing":[341],"systems.":[342]},"counts_by_year":[],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
