, About Customer Match

, About Potential Reach

A. Targeting,

A. Targeting,

M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti et al., Abusing Social Networks for Automated User Profiling. RAID, 2010.

T. S. Bernard, T. Hsu, N. Perlroth, and R. Lieber, Equifax Says Cyberattack May Have Affected 143 Million in the U

C. Dwork, Differential Privacy. ICALP, 2006.

, Facebook Ads Preferences

U. Facebook-leaks, User IDs, and Personal Details to Advertisers

, Facebook Messenger Chatbots Can Leak Your Private Information

D. Guarini, Experts Say Facebook Leak of 6 Million Users' Data Might Be Bigger Than We Thought

O. Goga, Matching User Accounts Across Online Social Networks: Methods and Applications, 2014.
URL : https://hal.archives-ouvertes.fr/tel-01165052

O. Goga, H. Lei, S. H. Parthasarathi, G. Friedland, R. Sommer et al., Exploiting Innocuous Activity for Correlating Users Across Sites, 2013.
DOI : 10.1145/2488388.2488428

URL : https://hal.archives-ouvertes.fr/hal-00827649

O. Goga, P. Loiseau, R. Sommer, R. Teixeira, and K. P. Gummadi, On the Reliability of Profile Matching Across Large Online Social Networks, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01162402

N. Z. Gong and B. Liu, You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors, 2016.

, How Google uses Customer Match data

T. Iofciu, P. Fankhauser, F. Abel, and K. Bischoff, Identifying Users Across Social Tagging Systems. AAAI ICWSM, 2011.

A. Korolova, Privacy Violations Using Microtargeted Ads: A Case Study, Journal of Privacy and Confidentiality, vol.3, issue.1, 2011.

B. Krishnamurthy and C. E. Wills, On the Leakage of Personally Identifiable Information via Online Social Networks, ACM SIGCOMM WOSN, 2009.

B. Krishnamurthy, K. Naryshkin, and C. E. Wills, Privacy leakage vs. Protection measures: the growing disconnect, IEEE W2SP, 2011.

S. Liu, S. Wang, F. Zhu, J. Zhang, and R. Krishnan, HYDRA: Largescale Social Identity Linkage via Heterogeneous Behavior Modeling, 2014.

A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel, You Are Who You Know: Inferring User Profiles in Online Social Networks, 2010.

T. Minkus, Y. Ding, R. Dey, and K. W. Ross, The City Privacy Attack: Combining Social Media and Public Records for Detailed Profiles of Adults and Children, 2015.

A. Marketing,

R. Nazarian, Facebook Loophole Exposes Private Phone Numbers, Here's How to Close It

, New Targeting Tools Make Pinterest Ads Even More Effective

N. Popper, Identity Thieves Hijack Cellphone Accounts to Go After Virtual Currency

T. Peterson, How Facebook's Custom Audiences Won Over Adland

S. E. Rasmussen and J. C. Wong, Facebook Was Where Pakistan Could Debate Religion. Now it's a Tool to Punish 'blasphemers, Protecting Privacy with Referrers. Facebook Engineering's Notes

D. Storm, Hacker Says He Can Get Phone Numbers on Facebook Which Are Not Supposed to be Public

K. Thomas, C. Grier, and D. M. Nicol, Unfriendly: Multi-party Privacy Risks in Social Networks, PETS, 2010.

C. E. Tucker, Social Networks, Personalized Advertising, and Privacy Controls, Journal of Marketing Research, 2014.

, Target Facebook Ads to People on Your Contact List

, Target Custom Groups of Twitter Users

, Upload Data Files and Manage Your Customer Match Audiences

J. Vosecky, D. Hong, and V. Y. Shen, User Identification Across Multiple Social Networks, 2009.

, What Are Mobile Advertising IDs and When Should I Use Them with Custom Audiences?

, What Happens When I Upload My Customer List to Facebook?

, What's the Difference Between Estimated Daily Reach and Potential Reach?