I. Amazon, P. Barford, I. Canadi, D. Krushevskaja, Q. Ma et al., Amazon taxonomy http://serv ices.amazon.com/services/soa-approvalcategory .htm#openCategories, Adscape: Harvesting and Analyzing Online Display Ads. WWW '14: Proceedings of the 23nd international conference on World Wide Web

B. Beizer, Black Box Testing: Techniques for Functional Testing of Software and Systems, IEEE Software, vol.13, issue.5, 1995.
DOI : 10.1109/MS.1996.536464

D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano, Public Key Encryption with Keyword Search, Proc. of the ACM European Conference on Computer Systems (EuroSys), pp.506-522, 2004.
DOI : 10.1007/978-3-540-24676-3_30

C. Castelluccia, M. A. Kaafar, and M. Tran, Betrayed by your ads! PETS, Proceedings of the 12th international conference on Privacy enhancing technologies, 2012.

W. Cheng, Q. Zhao, B. Yu, and S. Hiroshige, TaintTrace: Efficient Flow Tracing with Dynamic Binary Rewriting, 11th IEEE Symposium on Computers and Communications (ISCC'06), 2006.
DOI : 10.1109/ISCC.2006.158

V. Dave, S. Guha, and Y. Zhang, Measuring and fingerprinting click-spam in ad networks, SIGCOMM '12: Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies , architectures, and protocols for computer communication. ACM Request Permissions, 2012.

N. Diakopoulos, Algorithmic accountability reporting: On the investigation of black boxes. Tow Center for Digital Journalism, Columbia University, 2014.

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The second-generation onion router, 2004.

W. Enck, P. Gilbert, B. Gon-chun, L. P. Cox, J. Jung et al., TaintDroid, Proc. of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2010.
DOI : 10.1145/2619091

M. Fredrikson and B. Livshits, RePriv: Re-imagining Content Personalization and In-browser Privacy, 2011 IEEE Symposium on Security and Privacy, pp.131-146, 2011.
DOI : 10.1109/SP.2011.37

R. Geambasu, T. Kohno, A. Levy, and H. M. Levy, Vanish: Increasing data privacy with self-destructing data, Proc. of USENIX Security, 2009.

C. Gentry, Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, 2009.
DOI : 10.1145/1536414.1536440

D. B. Giffin, A. Levy, D. Stefan, and D. Terei, Hails: Protecting data privacy in untrusted web applications. 10th Symposium on, 2012.

I. Google, Adsense categories. https://support.googl e.com/adsense, 3016459.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006.
DOI : 10.1145/1180405.1180418

T. Guardian, Snapchat's expired snaps are not deleted, just hidden ? media network -partner zone infosecurity ? guardian professional. http://www.theguardian.com/media- network/partner-zone-infosecurity/snapcha t-photos-not-deleted-hidden

S. Guha, B. Cheng, and P. Francis, Challenges in measuring online advertising systems, Proceedings of the 10th annual conference on Internet measurement, IMC '10, 2010.
DOI : 10.1145/1879141.1879152

A. Hannak, P. Sapiezynski, A. M. Kakhki, B. Krishnamurthy, D. Lazer et al., Measuring personalization of web search, Proceedings of the 22nd international conference on World Wide Web, WWW '13, 2013.
DOI : 10.1145/2488388.2488435

A. L. Hughes and L. Palen, Twitter adoption and use in mass convergence and emergency events, International Journal of Emergency Management, vol.6, issue.3/4, 2009.
DOI : 10.1504/IJEM.2009.031564

S. and J. Gould, Safegov.org -google admits data mining student emails in its free education apps. http://safego v.org/2014/1/31/google-admits-data-mining- student-emails-in-its-free-education-apps

A. Korolova, Privacy Violations Using Microtargeted Ads: A Case Study, 2010 IEEE International Conference on Data Mining Workshops, 2010.
DOI : 10.1109/ICDMW.2010.137

A. Korolova, Privacy Violations Using Microtargeted Ads: A Case Study, 2010 IEEE International Conference on Data Mining Workshops, pp.474-482, 2010.
DOI : 10.1109/ICDMW.2010.137

B. Krishnamurthy and C. E. Wills, On the leakage of personally identifiable information via online social networks, Proceedings of the 2Nd ACM Workshop on Online Social Networks, WOSN '09, pp.7-12, 2009.

J. Lanier, Who owns the future? p112-114, Who Owns the Future? Simon and Schuster, 2013.

B. Liu, A. Sheth, U. Weinsberg, J. Chandrashekar, and R. Govindan, AdReveal, Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, HotNets-XII, 2013.
DOI : 10.1145/2535771.2535783

C. Llp, Declaration of kyle c. wong in support of google inc.'s opposition to plaintiffs' motion for class certification

J. Mikians, L. Gyarmati, V. Erramilli, and N. Laoutaris, Detecting price and search discrimination on the internet, Proceedings of the 11th ACM Workshop on Hot Topics in Networks, HotNets-XI, pp.79-84
DOI : 10.1145/2390231.2390245

L. Olejnik, T. Minh-dung, and C. Castelluccia, Selling off Privacy at Auction, Proceedings 2014 Network and Distributed System Security Symposium, 2013.
DOI : 10.14722/ndss.2014.23270

URL : https://hal.archives-ouvertes.fr/hal-01087557

R. A. Popa, C. M. Redfield, N. Zeldovich, and H. Balakrishnan, CryptDB, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pp.85-100, 2011.
DOI : 10.1145/2043556.2043566

F. Roesner, Sharemenot. https://sharemenot.cs.was hington

F. Roesner, T. Kohno, and D. Wetherall, Detecting and defending against third-party tracking on the web, NSDI'12: Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation. USENIX Association, 2012.

A. Sadilek and H. Kautz, Modeling the impact of lifestyle on health at scale, Proceedings of the sixth ACM international conference on Web search and data mining, WSDM '13, 2013.
DOI : 10.1145/2433396.2433476

L. Sweeney, Discrimination in online ad delivery, Communications of the ACM, vol.56, issue.5, 2013.

V. Toubiana, A. Narayanan, and D. Boneh, Adnostic: Privacy preserving targeted advertising, Proc. NDSS, 2010.

]. X. Wang, M. Gerber, and D. Brown, Automatic Crime Prediction Using Events Extracted from Twitter Posts, Social Computing, Behavioral -Cultural Modeling and Prediction, pp.231-238, 2012.
DOI : 10.1007/978-3-642-29047-3_28

A. Whitten and J. D. Tygar, Why Johnny can't encrypt: A usability evaluation of PGP 5.0, Proc. of USENIX Security, 1999.

C. E. Wills and C. Tatar, Understanding what they do with what they know, Proceedings of the 2012 ACM workshop on Privacy in the electronic society, WPES '12
DOI : 10.1145/2381966.2381969

X. Xing, W. Meng, D. Doozan, N. Feamster, W. Lee et al., Exposing Inconsistent Web Search Results with Bobble. Passive and Active Measurements Conference, 2014.

Y. Zhu, J. Jung, D. Song, T. Kohno, and D. Wetherall, Privacy scope: A precise information flow tracking system for finding application leaks, 2009.

P. R. Zimmermann, The official PGP user's guide, 1995.