To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This chapter focuses on the inner workings of networked services – what technologies they use and how they work – which will enable a deeper understanding of the methods used for corporate surveillance. The chapter first introduces the internet protocol suite and its most important protocols, and then explains the systems and languages used to deliver web-based content and mobile content.
This chapter examines findings from transparency research that shed light on the methods used for corporate surveillance, including tracking, profiling, analytics, and advertising. The chapter focuses on key results obtained for the research questions described in chapter 4 and explains the experimental designs used to achieve them.
This chapter examines the arms race between corporate surveillance and the countermeasures that allow users to defend themselves against advertising, tracking, and profiling. The chapter first explains ad blockers as the most common countermeasure, and shows how the industry is using anti-ad blockers to block ad blocker users. The chapter then discusses specialized blockers for tracking and fingerprinting, as well as countermeasures based on obfuscation and tools that aim to increase user awareness, before closing with a discussion of countermeasures for mobile devices and applications.
This chapter describes methods for executing the designed experiment and recording the response variables. The ethical implications of the experiment have to be considered before starting data collection, with the aim to minimize harmful impacts. Various data sources and data collection methods are available: archival data sources, passive data collection, active data collection with methods to influence input variables, data collection from mobile apps, and data collection via crowdsourcing. The chapter also describes methods to store the collected data.
News headlines about privacy invasions, discrimination, and biases discovered in the platforms of big technology companies are commonplace today, and big tech's reluctance to disclose how they operate counteracts ideals of transparency, openness, and accountability. This book is for computer science students and researchers who want to study big tech's corporate surveillance from an experimental, empirical, or quantitative point of view and thereby contribute to holding big tech accountable. As a comprehensive technical resource, it guides readers through the corporate surveillance landscape and describes in detail how corporate surveillance works, how it can be studied experimentally, and what existing studies have found. It provides a thorough foundation in the necessary research methods and tools, and introduces the current research landscape along with a wide range of open issues and challenges. The book also explains how to consider ethical issues and how to turn research results into real-world change.
Using easy-to-follow mathematics, this textbook provides comprehensive coverage of block codes and techniques for reliable communications and data storage. It covers major code designs and constructions from geometric, algebraic, and graph-theoretic points of view, decoding algorithms, error control additive white Gaussian noise (AWGN) and erasure, and dataless recovery. It simplifies a highly mathematical subject to a level that can be understood and applied with a minimum background in mathematics, provides step-by-step explanation of all covered topics, both fundamental and advanced, and includes plenty of practical illustrative examples to assist understanding. Numerous homework problems are included to strengthen student comprehension of new and abstract concepts, and a solutions manual is available online for instructors. Modern developments, including polar codes, are also covered. An essential textbook for senior undergraduates and graduates taking introductory coding courses, students taking advanced full-year graduate coding courses, and professionals working on coding for communications and data storage.
In general, LDPC codes are classified into two categories based on their construction methods: algebraic methods and graphical methods. LDPC codes constructed based on finite geometries and finite fields are classified as algebraic LDPC codes, such as the cyclic and quasi-cyclic LDPC codes presented into .
Cyclic codes form an important subclass of linear block codes. These codes are attractive for two reasons: first, encoding and syndrome computation can be implemented easily by using simple shift-registers with linear feedback connections, namely, linear feedback shift-registers (LFSRs); and second, because they have considerable inherent algebraic structure, it is possible to devise various practical algorithms for decoding them. Cyclic codes have been widely used in communication and storage systems for error control. They are particularly efficient for error detection.
Finite fields have been applied to construct error-correcting codes for reliable information transmission and data storage [–] since the late 1950s. These codes are commonly called algebraic codes, which have nice structures and large minimum distances. The most well-known classical algebraic codes are BCH and RS codes presented inandwhich can be decoded with the elegant hard-decision Berlekamp–Massey iterative algorithm.
Polar codes, discovered by Arikan [] in 2009, form a class of codes which provably achieve the capacity for a wide range of channels. Construction, encoding, and decoding of these codes are based on the phenomenon of channel polarization. In this chapter, we introduce polar codes from an algebraic point of view.
Apart from the construction of BCH, RS, finite-geometry, and RM codes based on finite fields and finite geometries, there are other methods (or techniques) for constructing long powerful codes from good short codes.