Skip to content

Commit

Permalink
Started writing the planning report
Browse files Browse the repository at this point in the history
  • Loading branch information
joelpurra committed Mar 14, 2014
1 parent 95a440f commit a5342db
Showing 1 changed file with 111 additions and 0 deletions.
111 changes: 111 additions & 0 deletions report/report.lyx
Expand Up @@ -345,6 +345,117 @@ The combined topics of DNS, IP, web and e-mail are too broad for this thesis,
field, potentially comparing it to historical data, or another ccTLD.
\end_layout

\begin_layout Section*
Problem description
\end_layout

\begin_layout Standard
[The problem description shall be detailed and include a background and
a motivation to why it is important.
Expected results shall also be described.
The problem description shall be grounded in the literature base and the
state‐of‐practice of the provider of the thesis (company, research group).
Plan for adjustment of the problem description along with the progress
of the literature studies and pre‐ study of the provider.]
\end_layout

\begin_layout Standard
In everyday web browsing, browers routinely access a lot of material from
other domains or services than the one visited.
These exernal resources vary from content that the user explicitly want
to obtain, to implicitly loaded third party services, ads, and non-visible
resources with the sole purpose of collecting statistical material.
All are downloaded on behalf of the user with no or few limitations, and
oftentimes without the user's need, understanding and explicit consent.
These external resources can all be seen as browsing habit trackers, whose
knowledge and power increase with any additional visits to other domains
or services loading the same resources.
\end_layout

\begin_layout Standard
While online privacy has been in the spotlight due to recently uncovered
large-scale spying operations, the focus has been on national government
intelligence agencies collecting information around the globe.
They have been able to traffic data and metadata by, among several techniques,
covertly hooking into the internet infrastructure.
In contrast, external resources are approved by or actively installed by
site and service owners, and presented openly to users with some technical
skills.
\end_layout

\begin_layout Section*
Approach
\end_layout

\begin_layout Standard
[The approach is a preliminary description of how the problem will be solved.
This section shall also include a description of a method to evaluate that
the problem is solved in a satisfactory way.]
\end_layout

\begin_layout Section*
Literature base
\end_layout

\begin_layout Standard
[The literature base describes the planned literature study and gives examples
of different directions of a good theoretical grounding of the work.]
\end_layout

\begin_layout Section*
Time plan
\end_layout

\begin_layout Standard
[The time plan describes the activities and milestones of the work with
the resolution of a week.
Dates for planned final seminar are included.
For degree projects on advanced level (e.g.
Master level) dates for half‐time checkpoint are also included.
For these degree projects the expected results for the half‐time checkpoint
are also explicitly described.
This plan is updated in cooperation with the tutor.]
\end_layout

\begin_layout Standard
Direction and scope
\end_layout

\begin_layout Standard
Currently, we're thinking of looking at external domains used by the .SE
domains already in the health status report (government, media, banks,
larger websites).
Domain-specific resources (images, css, domain scripts) from external but
private top level domains are secondary to resources loaded from external
services/companies (file hosting services, CDNs, advertising, analytics,
third party content providers).
The assumption is that all external resources can act as trackers, tracking
users across domains.
\end_layout

\begin_layout Standard
Questions, to be answered primarily from a Swedish perspective.
\end_layout

\begin_layout Standard
What are the general kinds of trackers, how many and which trackers are
there?
\end_layout

\begin_layout Standard
To what extent can the average internet user's browsing habits be correlated
across the most commonly visited webpages?
\end_layout

\begin_layout Standard
Are you as tracked using secure HTTPS as insecure HTTP?
\end_layout

\begin_layout Standard
How does this compare to historical data (if readily available from earlier
.SE status checks) or other ccTLDs/newTLDs?
\end_layout

\begin_layout Section*
Relevant courses taken at LiU
\end_layout
Expand Down

0 comments on commit a5342db

Please sign in to comment.