Amit Datta, Michael Carl Tschantz and Anupam Datta
 J. R. Mayer and J. C. Mitchell, “Third-party web tracking: Policy and technology,” in IEEE Symposium on Security and Privacy, 2012, pp. 413-427.
 B. Ur, P. G. Leon, L. F. Cranor, R. Shay, and Y. Wang, “Smart, useful, scary, creepy: Perceptions of online behavioraladvertising,” in Proceedings of the Eighth Symposium on Usable Privacy and Security. ACM, 2012, pp. 4:1-4:15.
 Google, “About ads settings,” https://support.google.com/ ads/answer/2662856, accessed Nov. 21, 2014.
Justin Brookman, Phoebe Rouge, Aaron Alva and Christina Yeung
 Federal Trade Comm’n, “Privacy Online: Fair Information Practices in the Electronic Marketplace,” https://www.ftc.gov/sites/default/files/documents/reports/privacy-online-fair-information-practices-electronic-marketplace-federal-trade-commission-report/privacy2000.pdf , May 2000.
 Federal Trade Comm’n, “Self-Regulatory Principles for Online BehavioralAdvertising,” https://www.ftc.gov/sites/default/files/documents/reports/federal-trade-commission-staff-report-self-regulatory-principles-online-behavioral-advertising/p085400
Irwin Reyes, Primal Wijesekera, Joel Reardon, Amit Elazari Bar On, Abbas Razaghpanah, Narseo Vallina-Rodriguez and Serge Egelman
 X. Cai and X. Zhao. Online Advertising on Popular Children’s Websites: Structural Features and Privacy Issues. Computers in Human Behavior, 2013.
 P. Carter, C. Mulliner, M. Lindorfer, W. Robertson, and E. Kirda. CuriousDroid: Automated User Interface Interaction for Android Application Analysis Sandboxes. In Proc. of FC, 2016.
 L. Cavallaro, P. Saxena, and R. Sekar. On the Limits of Information Flow Techniques for Malware Analysis and Containment. In Proc. of DIMVA, pages 143-163. Springer- Verlag, 2008
insight into public opinions during public health events ( Finch et al., 2016 ). The microblog users who contribute information during crises play the role of “digital volunteers” ( Starbird & Palen, 2011 ).
The massive information storage capacity of the microblog platforms provides sufficient open source information for relevant studies on public health emergencies. So far, scholars have conducted a huge volume of research using the information related to public emergencies, such as emergency monitoring, emergency information dissemination, and user behavior during
Kurt Rothermel. User centric walk: An integrated approach for modeling the browsing behavior of users on the web. In Annual Symposium on Simulation , April 2005.
 Aaron Cahn, Scott Alfeld, Paul Barford, and S. Muthukrishnan. An empirical study of web cookies. In Proc. of WWW , 2016.
 Juan Miguel Carrascosa, Jakub Mikians, Ruben Cuevas, Vijay Erramilli, and Nikolaos Laoutaris. I always feel like somebody’s watching me: Measuring online behaviouraladvertising. In Proc. of ACM CoNEXT , 2015.
 Big Commerce. Understanding Impressions in
Vasilios Mavroudis, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel and Giovanni Vigna
, G. Wang, W. Zhang, Y. Jiang, and Z. Chen. How much can behavioral targeting help online advertising? In Proceedings of the 18th international conference on World wide web , pages 261–270. ACM, 2009.
 Y. Yuan, F. Wang, J. Li, and R. Qin. A survey on real time bidding advertising. In Service Operations and Logistics, and Informatics (SOLI), 2014 IEEE International Conference on , pages 418–423. IEEE, 2014.
 W. Zhang, L. Chen, and J. Wang. Implicit look-alike modelling in display ads: Transfer collaborative filtering to ctr estimation. arXiv
westin’s and altman’s theories of privacy. Journal of Social Issues , 59(2):411–429, 2003.
 J. D. Morris, C. Woo, J. A. Geason, and J. Kim. The power of affect: Predicting intention. Journal of Advertising Research , 42(3):7–17, 2002.
 K. A. Neuendorf. The content analysis guidebook . Sage, 2002.
 P. A. Norberg, D. R. Horne, and D. A. Horne. The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs , 41(1):100–126, 2007.
 A. Nosko, E. Wood, and S. Molema. All about me
Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Anirban Mahanti and Balachandar Krishnamurthy
. Shay, Y. Wang, R. Balebako, and L. Cranor.Why Johnny Can’T Opt out: A Usability Evaluation of Tools to Limit Online BehavioralAdvertising. In SIGCHI, 2012.
 B. Liu, Y. Dai, X. Li, W. S. Lee, and P. S. Yu. Building Text Classifiers Using Positive and Unlabeled Examples.ICDM, 2003.
 J. R. Mayer and J. C. Mitchell. Third-Party Web Tracking: Policy and Technology. IEEE S&P, 2012.
 H. Metwalley, S. Traverso, and M. Mellia. The Online Tracking Horde: a View from Passive Measurements. TMA, 2015
Oleksii Starov, Phillipa Gill and Nick Nikiforakis
 S. Sunam. Google Plus post on December 8, 2012, (accessed February 23, 2015). https://plus.google.com/+SumitSuman01/posts/2jLJ5B4yPYF.
 The Wall Street Journal. What They Know. http://www.wsj.com/public/page/what-they-know-digital-privacy.html.
 Trend Micro Site Safety Center. http://global.sitesafety.trendmicro.com/.
 B. Ur, P. G. Leon, L. F. Cranor, R. Shay, and Y. Wang. Smart, useful, scary, creepy: Perceptions of online behavioraladvertising. In Proceedings of the