<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462020000401581</article-id>
<article-id pub-id-type="doi">10.13053/cys-24-4-3490</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Overview of Methods to Avoid User Profiling]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Nicolás Sayago]]></surname>
<given-names><![CDATA[Abigail]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Sánchez Valencia]]></surname>
<given-names><![CDATA[Sergio Gabriel]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Kolesnikova]]></surname>
<given-names><![CDATA[Olga]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Instituto Politécnico Nacional Escuela Superior de Cómputo ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2020</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2020</year>
</pub-date>
<volume>24</volume>
<numero>4</numero>
<fpage>1581</fpage>
<lpage>1588</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462020000401581&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462020000401581&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462020000401581&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: Nowadays online communication services have obtained a stronger impact in our world. Some companies that provide communication services take advantage of them to create user profiles, which they further use to send undesired advertisements (Ads), or spam, to their users. This article explores several methods, developed based on different areas of knowledge including natural language processing, steganography, cryptography, which can help a user to avoid being profiled while sending and receiving texts over the internet.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[User profiling]]></kwd>
<kwd lng="en"><![CDATA[natural language processing]]></kwd>
<kwd lng="en"><![CDATA[cryptography]]></kwd>
<kwd lng="en"><![CDATA[steganography]]></kwd>
<kwd lng="en"><![CDATA[security]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Biller]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Moving forward with the new normal]]></article-title>
<source><![CDATA[Focus on Powder Coatings]]></source>
<year>2020</year>
<volume>2020</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Atallah]]></surname>
<given-names><![CDATA[M.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Raskin]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Crogan]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hempelmann]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Kerschbaum]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Mohamed]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Naik]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Natural language watermarking: Design, analysis, and a proof-of-concept implementation]]></article-title>
<source><![CDATA[International Workshop on Information Hiding]]></source>
<year>2001</year>
<page-range>185&#8211;200</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chand]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Orgun]]></surname>
<given-names><![CDATA[C.O.]]></given-names>
</name>
</person-group>
<source><![CDATA[Exploiting linguistic features in lexical steganography: Design and proof-of-concept implementation]]></source>
<year>2006</year>
<conf-name><![CDATA[ 39th Annual Hawaii International Conference on System Sciences (HICSS&#8217;06)]]></conf-name>
<conf-loc> </conf-loc>
<page-range>126b&#8211;126b</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jones]]></surname>
<given-names><![CDATA[K.S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A statistical interpretation of term specificity and its application in retrieval]]></article-title>
<source><![CDATA[Journal of Documentation]]></source>
<year>1972</year>
<volume>28</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>11&#8211; 21</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kushwaha]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Sharma]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Ambhaikar]]></surname>
<given-names><![CDATA[D.A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Selective encryption using natural language processing for text data in mobile ad hoc network]]></article-title>
<source><![CDATA[Modeling, Simulation, and Optimization]]></source>
<year>2017</year>
<page-range>5&#8211;26</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mahajan]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Sachdeva]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A study of encryption algorithms AES, DES and RSA for security]]></article-title>
<source><![CDATA[Global Journal of Computer Science and Technology]]></source>
<year>2013</year>
<volume>13</volume>
<numero>15E</numero>
<issue>15E</issue>
<page-range>14&#8211;18</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mihalcea]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Tarau]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Text rank: Bringing order into text]]></source>
<year>2004</year>
<conf-name><![CDATA[ 2004 Conference on Empirical Methods in Natural Language Processing]]></conf-name>
<conf-loc> </conf-loc>
<page-range>404&#8211;411</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nithyapriya]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Anandha-Jothi]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Palanisamy]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Securing Data with Selective Encryption Based DAC Scheme for MANET]]></source>
<year>2020</year>
<volume>31</volume>
<conf-name><![CDATA[ International conference on Computer Networks, Big data and IoT]]></conf-name>
<conf-loc> </conf-loc>
<page-range>133&#8211;139</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Paik]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Y&#305;lmazel]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Brown]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Poulin]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Dubon]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Amice]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Applying natural language processing (NLP) based metadata extraction to automatically acquire user preferences]]></source>
<year>2003</year>
<conf-name><![CDATA[ 1st International Conference on Knowledge Capture]]></conf-name>
<conf-loc> </conf-loc>
<page-range>116&#8211;122</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Patiburn]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Iranmanesh]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Teh]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Text steganography using daily emotions monitoring]]></article-title>
<source><![CDATA[International Journal of Education and Management Engineering]]></source>
<year>2017</year>
<volume>7</volume>
<page-range>1&#8211;14</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Por]]></surname>
<given-names><![CDATA[L.Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Wong]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Chee]]></surname>
<given-names><![CDATA[K.O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Unispach: A text-based data hiding method using unicode space characters]]></article-title>
<source><![CDATA[Journal of Systems and Software]]></source>
<year>2012</year>
<volume>85</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>1075&#8211;1082</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Prasanna]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Rao]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Text classification using artificial neural networks]]></article-title>
<source><![CDATA[International Journal of Engineering and Technology (UAE)]]></source>
<year>2018</year>
<page-range>603&#8211; 606</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rose]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Engel]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Cramer]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Cowley]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Automatic keyword extraction from individual documents]]></article-title>
<source><![CDATA[Text Mining: Applications and Theory]]></source>
<year>2010</year>
<page-range>1&#8211;20</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schiaffino]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Amandi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Intelligent User Profiling]]></source>
<year>2009</year>
<page-range>193&#8211;216</page-range><publisher-loc><![CDATA[Berlin, Heidelberg ]]></publisher-loc>
<publisher-name><![CDATA[Springer Berlin Heidelberg]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sidorov]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Syntactic n-grams in computational linguistics]]></source>
<year>2019</year>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Taleby-Ahvanooey]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Alazab]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Anitw: A novel intelligent text watermarking technique for forensic identification of spurious information on social media]]></article-title>
<source><![CDATA[Computers Security]]></source>
<year>2020</year>
<volume>90</volume>
<page-range>1&#8211;16</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
