<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0124-0579</journal-id>
<journal-title><![CDATA[Estudios Socio-Jurídicos]]></journal-title>
<abbrev-journal-title><![CDATA[Estud. Socio-Juríd]]></abbrev-journal-title>
<issn>0124-0579</issn>
<publisher>
<publisher-name><![CDATA[Universidad del Rosario]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0124-05792019000100209</article-id>
<article-id pub-id-type="doi">10.12804/revistas.urosario.edu.co/sociojuridicos/a.6941</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Control de nuestros datos personales en la era del big data: el caso del rastreo web de terceros]]></article-title>
<article-title xml:lang="en"><![CDATA[Control of Our Personal Data in the Big Data Era: The Case of Third Party Web Tracking]]></article-title>
<article-title xml:lang="pt"><![CDATA[Controle de nossos dados pessoais na era do big data: o caso do rastreamento web de terceiros]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[González Guerrero]]></surname>
<given-names><![CDATA[Laura Daniela]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad del Rosario  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2019</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2019</year>
</pub-date>
<volume>21</volume>
<numero>1</numero>
<fpage>209</fpage>
<lpage>244</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S0124-05792019000100209&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S0124-05792019000100209&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S0124-05792019000100209&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN Cientos de corredores de datos instalan tecnologías de rastreo en la web para monitorear la navegación de las personas, lo que se conoce como rastreo web de terceros. Este artículo se divide en dos partes, la primera estudia el rastreo web en el contexto de la gran industria de datos que recoge información de millones de fuentes para perfilar a las personas según sus condiciones demográficas, sus prácticas de consumo, sus intereses políticos, entre otros. Se exponen los principales productos comerciales y riesgos de discriminación que surgen del perfilamiento de datos. En la segunda parte del artículo se revisan diferentes regulaciones que buscan dar control a las personas sobre los datos recolectados con tecnologías de rastreo. En particular, se evalúa la efectividad del modelo de consentimiento informado, para lo que se examinaron las políticas de privacidad de las diez páginas de noticias más visitadas desde Colombia. El estudio reveló un bajo cumplimiento de los estándares mínimos de información y de libertad necesarios para que las personas controlen el uso de los datos recolectados por medio de tecnologías de rastreo.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT Hundreds of data brokers install technologies to track the browsing activities of people, this is called third-party web tracking. This paper is divided into two parts, the first part studies the web tracking in the context of the huge data industry which collects information from millions of sources to make profiles according to people's demographics, consumption practices, and their political interests, among others. We address the main commercial products and discriminatory risks arising from data profiling. In the second part, this paper reviews different regulations that aim at giving control to people over the data they produce through tracking technologies. In particular, the paper evaluates the effectiveness of the informed consent model. For this purpose, we examined the privacy policies of the ten most visited news web pages. This study revealed a low compliance of the minimum liberty and information standards needed to allow people to control the usage over the data collected through tracking technologies.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[RESUMO Centenas de corredores de dados instalam tecnologias de rastreamento na web para monitorar a navegação das pessoas, isto se conhece como rastreamento web de terceiros. Este artigo divide-se em duas partes, a primeira estuda o rastreamento web no contexto da grande indústria de dados que recolhe informação de milhares de fontes para perfilar as pessoas segundo suas condições demográficas, suas práticas de consumo, seus interesses políticos, entre outros. Expõem-se os principais produtos comerciais e riscos de discriminação que surgem do perfilhamento de dados. Na segunda parte do artigo revisam-se diferentes regulações que buscam dar controle as pessoas sobre os dados recoletados com tecnologias de rastreamento. Particularmente, avalia a efetividade do modelo de consentimento informado, para o qual se examinaram as políticas de privacidade das 10 páginas de notícias mais visitadas desde a Colômbia. O estudo revelou um baixo cumprimento dos standards mínimos de informação e de liberdade necessários para que as pessoas controlem o uso dos dados recoletados por meio de tecnologias de rastreamento.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[rastreo web]]></kwd>
<kwd lng="es"><![CDATA[políticas de privacidad]]></kwd>
<kwd lng="es"><![CDATA[consentimiento informado]]></kwd>
<kwd lng="es"><![CDATA[protección de datos]]></kwd>
<kwd lng="es"><![CDATA[big data]]></kwd>
<kwd lng="en"><![CDATA[Web tracking]]></kwd>
<kwd lng="en"><![CDATA[privacy policies]]></kwd>
<kwd lng="en"><![CDATA[informed consent]]></kwd>
<kwd lng="en"><![CDATA[data protection]]></kwd>
<kwd lng="en"><![CDATA[big data]]></kwd>
<kwd lng="pt"><![CDATA[rastreamento web]]></kwd>
<kwd lng="pt"><![CDATA[políticas de privacidade]]></kwd>
<kwd lng="pt"><![CDATA[consentimento informado]]></kwd>
<kwd lng="pt"><![CDATA[proteção de dados]]></kwd>
<kwd lng="pt"><![CDATA[big data]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Angwin]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The web's new gold mine: Your secrets]]></article-title>
<source><![CDATA[The Wall Street Journal]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ayenson]]></surname>
<given-names><![CDATA[M. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Wambach]]></surname>
<given-names><![CDATA[D. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Soltani]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Good]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Hoofnagle]]></surname>
<given-names><![CDATA[C. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Flash cookies and privacy II: Now with html5 and ETag respawning]]></source>
<year>2011</year>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bakos]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Wurgler]]></surname>
<given-names><![CDATA[F. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Trossen]]></surname>
<given-names><![CDATA[D. R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Does anyone read the fine print? Consumer attention to standard form contracts.]]></article-title>
<source><![CDATA[Journal of Legal Studies]]></source>
<year>2014</year>
<volume>43</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-35</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Belli]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Schwartz]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Louzada]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Selling your soul while negotiating the conditions: From notice.]]></article-title>
<source><![CDATA[Health and Technology]]></source>
<year>2017</year>
<volume>7</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>453-67</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chmielewski]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<source><![CDATA[How "Do Not Track" ended up going nowhere]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Christl]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<source><![CDATA[Corporate survelillance in every day life]]></source>
<year>2017</year>
<publisher-loc><![CDATA[Viena ]]></publisher-loc>
<publisher-name><![CDATA[Cracked Labs]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="">
<collab>Comisión Europea</collab>
<source><![CDATA[Propuesta de Reglamento del Parlamento Europeo y del Consejo sobre el respeto de la vida privada y la protección de los datos personales en el sector de las comunicaciones electrónicas y por el que se deroga la Directiva 2002/58/CE]]></source>
<year>2017</year>
<publisher-loc><![CDATA[Bruselas ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="">
<collab>Corte Constitucional de Colombia</collab>
<source><![CDATA[Control constitucional al Proyecto de Ley Estatutaria No. 184 de 2010 "Por la cual se dictan disposiciones generales para la protección de datos personales"]]></source>
<year>2011</year>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="">
<collab>Datacrédito Experian</collab>
<source><![CDATA[¿Quiénes somos?]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="">
<collab>Departamento Nacional de Planeación</collab>
<source><![CDATA[Documento CONPES 3920 sobre la Política Nacional de Explotación de Datos]]></source>
<year>2018</year>
<publisher-loc><![CDATA[Bogotá ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dias]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Natusch]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Te están stalkeando para darte un valor]]></article-title>
<source><![CDATA[Chupa datos de Codingrights]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="">
<source><![CDATA[Directiva 2002/58/CE del Parlamento Europeo y del Consejo relativa al tratamiento de los datos personales y a la protección de la intimidad en el sector de las]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Do Not Track Online Act]]></article-title>
<source><![CDATA[S. 2404-114th Congress]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="">
<collab>El Tiempo</collab>
<source><![CDATA[Política de privacidad]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Englehardt]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Narayanan]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Online tracking: A 1-million-site measurement and analysis]]></article-title>
<source><![CDATA[ACM Conference on Computer and Communications Security]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="">
<collab>Fallabella</collab>
<source><![CDATA[Política de tratamiento de datos personales]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<collab>Federal Trade Comission</collab>
<article-title xml:lang=""><![CDATA[Protecting consumer privacy in an era of rapid change]]></article-title>
<source><![CDATA[Preliminary ftc staff report]]></source>
<year>2010</year>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<collab>Federal Trade Commission</collab>
<article-title xml:lang=""><![CDATA[Data brokers]]></article-title>
<source><![CDATA[A call for transparency and accountability]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="">
<collab>Fundación Karisma</collab>
<source><![CDATA[Análisis confirma relación de Nation Builder, empresa que ayudó a Trump a llegar a la presidencia, con dos campañas presidenciales en Colombia]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="">
<collab>Ghostery</collab>
<source><![CDATA[What are the new tracker categories?]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="">
<collab>Grupo de trabajo Artículo 29</collab>
<source><![CDATA[Working document 02/2013 providing guidance on obtaining consent for cookies]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="">
<collab>Grupo de trabajo Artículo 29</collab>
<source><![CDATA[Guidelines on consent under Regulation]]></source>
<year>2018</year>
<numero>2016/679</numero>
<issue>2016/679</issue>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Helberger]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<source><![CDATA[Profiling and targeting consumers in the Internet of Things - A new challenge for consumer law]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hoofnagle]]></surname>
<given-names><![CDATA[C. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Soltani]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Good]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Wambach]]></surname>
<given-names><![CDATA[D. J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Behavioral advertising: The offer you can't refuse]]></article-title>
<source><![CDATA[Harvard Law and Policy Review]]></source>
<year>2012</year>
<numero>6</numero>
<issue>6</issue>
<page-range>273</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="">
<collab>United States District Court For the District of Delaware 2 de 2 de 2017</collab>
<source><![CDATA[In Re: Google Inc. Cookie Placement Consumer Privacy Litigation, Civ. No. 12-MD-2358 (SLR)]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<collab>Internet Engineering Task Force</collab>
<article-title xml:lang=""><![CDATA[HTTP State Management Mechanism]]></article-title>
<source><![CDATA[Request for Comments: 2109]]></source>
<year>1997</year>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Krishnamurthy]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Wills]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Privacy diffusion on the web: A longitudinal perspective]]></article-title>
<source><![CDATA[Proceedings of the 18th international conference on World wide web]]></source>
<year>2009</year>
<page-range>541-50</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kristol]]></surname>
<given-names><![CDATA[D. M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[HTTP cookies: Standards, privacy and politics]]></article-title>
<source><![CDATA[ACM Transactions on Internet Technology]]></source>
<year>2001</year>
<page-range>151-98</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Leal-Taixé]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Milan]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Schindler]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Cremers]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Reid]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Roth]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[Tracking the trackers: An analysis of the state of the art in multiple object tracking]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Leon]]></surname>
<given-names><![CDATA[P. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Ur]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Balebako]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Cranor]]></surname>
<given-names><![CDATA[L. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Shay]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Why Johnny can't opt out: A usability evaluation]]></article-title>
<source><![CDATA[Proceedings of the SIGCHI Conference on Human Factors in Computing Systems]]></source>
<year>2011</year>
<page-range>589-98</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<collab>Diario Oficial</collab>
<article-title xml:lang=""><![CDATA["Por la cual se dictan las disposiciones generales del hábeas data y se regula el manejo de la información contenida en bases de datos personales, en especial la financiera, crediticia, comercial, de servicios y la proveniente de terceros países"]]></article-title>
<source><![CDATA[Ley 1266 de 2008]]></source>
<year>2008</year>
<numero>47.219</numero>
<issue>47.219</issue>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<collab>Diario Oficial</collab>
<article-title xml:lang=""><![CDATA["Por la cual se dictan disposiciones generales para la protección de datos personales".]]></article-title>
<source><![CDATA[Ley 1581]]></source>
<year>2012</year>
<numero>48.587</numero>
<issue>48.587</issue>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mayer]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Tracking the trackers: To catch a history thief]]></source>
<year>2011</year>
<publisher-name><![CDATA[The Center for Internet and Society at Stanford Law School]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mayer]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Tracking the trackers: Where everybody knows your username]]></source>
<year>2011</year>
<publisher-name><![CDATA[Center for Internet and Society at Stanford Law School]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mayer]]></surname>
<given-names><![CDATA[J. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[J. C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Third-party web tracking: Policy and technology]]></article-title>
<source><![CDATA[Security and Privacy (SP), 2012 IEEE Symposium on]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McDonald]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Cranor]]></surname>
<given-names><![CDATA[L. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Beliefs and behaviors: Internet users' understanding of behavioral advertising]]></article-title>
<source><![CDATA[TPRC]]></source>
<year>2010</year>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Montjoye]]></surname>
<given-names><![CDATA[Y.-A. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Hidalgo]]></surname>
<given-names><![CDATA[C. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Verleysen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Blondel]]></surname>
<given-names><![CDATA[V. D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Unique in the crowd: The privacy bounds of human mobility]]></article-title>
<source><![CDATA[Scientific Reports]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nanji]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Global ad spend forecast for 2018]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Narayanan]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[There is no such thing as anonymous online tracking]]></source>
<year>2011</year>
<publisher-name><![CDATA[The Center for Internet and Society at Stanford Law School]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Narayanan]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[The web tracking arms race: Past, present, and future]]></source>
<year>2018</year>
<publisher-loc><![CDATA[Santa Clara ]]></publisher-loc>
<publisher-name><![CDATA[UsENix Association]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Narayanan]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Shmatikov]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Robust de-anonymization of large datasets (how to break anonymity of the Netflix Prize dataset)]]></article-title>
<source><![CDATA[08 Proceedings of the 2008 IEEE Symposium on Security and Privacy]]></source>
<year>2007</year>
<page-range>111-25</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Obar]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Oeldorf-Hirsch]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The biggest lie on the Internet: Ignoring the privacy policies and terms of service policies of social networking services]]></article-title>
<source><![CDATA[TPRC 44: The 44th Research Conference on Communication, Information and Internet Policy 2016]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="">
<collab>OECD</collab>
<source><![CDATA[The oecd privacy framework]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="">
<collab>Oracle y Datalogix</collab>
<source><![CDATA[Oracle]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<collab>Parlamento y Consejo Europeo</collab>
<article-title xml:lang=""><![CDATA[Directiva 2002/58/ce del 12 de julio de 2002 relativa al tratamiento de los datos personales y a la protección de la intimidad en el sector de las comunicaciones electrónicas (Directiva sobre la privacidad y las comunicaciones electrónicas)]]></article-title>
<source><![CDATA[Diario Oficial]]></source>
<year>2002</year>
<numero>201</numero>
<issue>201</issue>
</nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="">
<collab>Parlamento y Consejo Europeo</collab>
<source><![CDATA[Reglamento (ue) 2016/679 del Parlamento Europeo y del Consejo de 27 de abril de 2016 relativo a la protección de las personas físicas en lo que respecta al tratamiento de datos personales y a la libre circulación de estos datos]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="">
<collab>Red Iberoamericana de Protección de Datos</collab>
<source><![CDATA[Estándares de protección de datos]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="">
<source><![CDATA[Reglamento (UE) 2016/679 del Parlamento Europeo y del Consejo relativo a la protección de las personas físicas en lo que respecta al tratamiento de datos personales]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Scheneider]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Data and Goliath]]></article-title>
<source><![CDATA[The hidden battles to collect your data and control your world.]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[W. W. Norton &amp; Company]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Singel]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Online tracking firm settles suit over undeletable cookies]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sorjen]]></surname>
</name>
</person-group>
<source><![CDATA[The history of online ad targeting]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="">
<collab>Statistic</collab>
<source><![CDATA[Desktop internet browser market share 2017]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="">
<collab>Superintendencia de Indsutria y Comercio</collab>
<source><![CDATA[Concepto radicado No. 16172268 del 9 de agosto de 2016]]></source>
<year>2016</year>
<publisher-loc><![CDATA[Bogota ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Toner]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[With new browser tech, Apple preserves privacy and Google preserves trackers]]></source>
<year>2017</year>
<volume>https://www.eff.org/deeplinks/2017/06/with-new-browser-tech-apple-preserves-privacy-google-preserves-trackers</volume>
</nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="">
<collab>YourAdChoices</collab>
<source><![CDATA[YourAdChoices gives you control]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zuboff]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Big other: surveillance capitalism and the prospects of an information civilization]]></article-title>
<source><![CDATA[Journal of Information Technology]]></source>
<year>2015</year>
<page-range>75-89</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
