Free Essay

Privacy Concerns and the Use of Internet Cookies

In:

Submitted By JGarcia13106
Words 1746
Pages 7
Privacy concerns and the use of internet cookies

Jose Omar Garcia
IFSM 201
October 21, 2012

Cookies evolved because they solve a big problem for the people who create web sites. They are small files stored on a user's computer as a text file and placed on the hard disk by a web page server. Designed to hold a modest amount of data specific to a particular client and website, they can be accessed either by the web server or the client computer. This allows the server to deliver a page tailored to a particular user, or the page itself can contain some script that allows the cookie to carry information from one website visit to the next. They are not used to run programs or to deliver viruses to your computer. Moreover, they are uniquely assigned to one computer in particular, and can only be read by a web server in the domain that issued the cookie to the user.
One of the biggest concerns with cookies is they potentially violate an internet user's privacy, many times without his or her knowledge. Even though many websites guarantee protection of personal information, many people do not like the idea of their passwords or other sensitive data being stored. Therefore, internet browsers provide various privacy settings so a user can prevent the installation of cookies or clear them at any time. This paper will explore some of the ethical implication of using cookies in the internet environment, particularly regarding protection of personal information.
The use of internet cookies has many benefits, which is why they have become so pervasive. They have allowed marketers and advertisers to gather numeric information from particular cookies files with unique identifiers. When the user surfs the internet, a cookie is assigned to track his or her preferences during website visits. Because advertisers need to measure the reach and appeal of the advertisements they place, as well as better target their ads, they gain valuable information when they use cookies to estimate the number of visitors to a website and how many users click on their links. This benefits both marketers and web surfers so that the latter are not bombarded with extensive advertising they are very unlikely to be interested in. Web updates, large data base, assigned cookie files, tracking a web user, are some of the methods that web developers use to for statistical purposes. This approach identifies the moves of an internet user by tracking entries, exits and new comers. Computer users can customize their websites and save special preferences for future visits, enabling them to skip information input and allowing for personalization of web preferences. This also permits them to store confidential information separately and privately, such as screen names, password, and shopping-related information (Hormozi, 2005, p. 53).
Some computer users describe cookies as an intrusive way of collecting valuable information without their consent. Because cookies are placed directly onto a user’s hard drive, many are worried about the extent to which cookies may provide personal information to third parties. Because cookies single text files, they can gather personal information of many computer users all over the world in large databases for the purpose of delivering and selling it to third parties. As a result, third parties may have more detailed personal information at hand and may be able to acquire email and personal accounts or relate data from many different sources via identifying information like email addresses. Third party cookies are a particular concern, as when visiting one website, a cookie may be placed by that company that feeds information to an entirely different company. Personal information such as credit cards, phone numbers, and home and billing addresses should be selectively kept in secure location (Hormozi, 2005, p. 54). Because companies failed to disclose the way cookies retrieves internet users’ information, there have been several lawsuits brought against them. In 2000, many companies were required to give the user the option of accepting or rejecting the use of cookies. Furthermore, many methods of collecting internet users’ information by companies were banned because cookies were used to track users’ web navigation. Therefore, most websites furnish users with specific information on what is being compiled. If a website identifies a user as a child, it is required comply with the Federal Trade Commission (FTC) regulations, which require that the site ask permission to gather information and inform the user of how it will be utilized. However, such information can only be collected if the parent has given consent. Esurance, an auto insurance company, was held accountable for its misuse of cookies. As a result of a lawsuit brought against by the FTC, Esurance now notifies internet users on regarding third parties’ involvement and how information will be used. Another example can be found in a marketing company, Avenue A, Inc. Even though the company has a very detailed privacy policy that complies with, W3C’s platform for Privacy Preferences Project specifications notifying web surfers of the use of cookies, Avenue A, Inc. was also accused of violating commonly accepted protocols regarding collection of private information about internet users (Hormozi, 2005, p. 56).
In view of the positives and negatives for the use of cookies, especially for privacy protection, one solution to strengthen internet surfers’ privacy protection would be to look for privacy seals, from entities such as TRUSTe, 3rd Party, or BBB Online. For example, the Better Business Bureau (BBB), a nonprofit organization focused on advancing marketplace trust, is attempting to provide internet users with protection and peace of mind when surfing the internet via the BBB Online privacy seal, which may be obtained by companies that have their website privacy policies vetted by the BBB. This seal indicates that the company follows its own privacy policy and that the policy meets BBB standards. If an internet user feels that his or her information is being furnished inappropriately or that a website does not acknowledge its privacy policy, the user has the right to contact both online Better Business Bureau and TRUSTEDe. Given that internet cookie use is unlikely to be limited to their initial intended use and the FTC ruling from 2000 that users are responsible for managing their own information based on companies’ privacy policies, reading and understanding web privacy policies is essential and can help users to understand which information is appropriate to share, knowing that internet cookies are utilized by the website being accessed (Hormozi, 2005, p. 57).
The privacy related issues described above prompted the passage of a law in 2009 in the European Union that has been slowly implemented by member countries, banning the use of cookies. Some believe that privacy concerns and legislators’ desire to respond to constituent anxiety could lead to additional laws being passed elsewhere attempting to regulate the use of cookies. While privacy issues continue to concern internet users, several recent trends may affect their relative importance. For example, the prevalence of social networking sites like Facebook and LinkedIn, and the expanding ability to associate demographic, other information about users' likes and interests and status updates or Tweets with their email addresses could eventually be connected to decision making processes by credit agencies, health care providers or others according to privacy experts (Spring, 2010). With the emergence of HTML5, other capacities are now available to developers to cache large amounts of client data on devices and access it without having to do expensive web requests, requiring information going beyond the functionality of a cookie (Cox, 2009, p. 18). Another trend worth mentioning is the increasing percentage of users who access the internet from mobile devices, including smartphones, iPads, and others. This has prompted the development of secure browsers on many different platforms to increase security on mobile devices, for the Andriod platform, for example. This is particularly important for business users, guaranteeing adequate internet security even from those devices, capable of encrypting cookies, browsing history, and bookmarks and controlling how their content interacts with the rest of the applications and information contained in the device (“Data loss,” 2012).
The use of internet cookies can be considered beneficial to a computer user. It can also be worrisome to computer owners that an uninvited information capturing file is introduced onto their machine. Allowing the use of cookies is up to the user; however, many computer users are completely unaware of when and how a cookie has been placed on their hard drive. Internet cookies were initially introduced as a convenience to the user to save information so that they do not continuously repeat the same processes when making repeated visits to websites. Internet users desire strong protection of personal information, not only online but in general. Although companies have a moral obligation and an interest in aggressively protecting users’ private information in order to maintain their business, the strong incentives to track web surfers’ information requires both that users be vigilant and responsible regarding privacy risks, and that agencies such as the FTC continue to adapt the regulatory framework to respond to developments in information technology.

References Chartier D. (2011, February). HTML5: What Does It Mean for You?. Macworld, 28(3): 90-91. Cox, J. (2009). Heady days for mobile web apps. Network World, 26(23), 10-10,18. Retrieved from http://ezproxy.umuc.edu/login?url=http://search.proquest.com/docview/215990957?accountid=14580 Data loss; good technology announces the industry's first secure browser for android devices: Good mobile access. (2012). Computers, Networks & Communications, 375. Retrieved from http://ezproxy.umuc.edu/login?url=http://search.proquest.com/docview/963976181?accountid=14580
Hormozi, A. M. (2005). Cookies and Privacy. Information Systems Security, 13(6), 51-59. Platform for Privacy Preferences (P3P) Project. (2007). Enabling smarter Privacy Tools for the Web. Retrieved from: http://www.w3.org/P3P/ Spring, T. (2010). Good-bye to privacy? PC World, 28, 10-12. Retrieved from http://ezproxy.umuc.edu/login?url=http://search.proquest.com/docview/521443671?accountid=14580

--------------------------------------------
[ 1 ]. The Privacy Preference Project provides a standard privacy policy format that can be applied by a variety of companies or websites. The adoption of this tool streamlines for users privacy policy analysis and decision making process via the standard tool. (http://www.w3.org/P3P/)
[ 2 ]. HTML5 is the fifth version of Hypertext Markup (HTML). HTML is the principal means by which the web browser receives instructions on where to retrieve and how to organize content that the user views. (Chartier, 2011, p. 90)

Similar Documents

Free Essay

Use of Cookies

...Use of Cookies: Data Collection and Privacy Concerns Merle E. Jones, Jr. UMUC IFSM 201 Abstract This paper explores the uses and privacy issues of cookies a user’s internet browser in tracking daily activity for use of companies for online behavioral advertising (OBA). Using the information gathered, this paper examines the growth of the use of cookies to the eventual privacy control issues that have become common place. Sullivan (2012) discusses the personal data economy and online programs that allow companies to track the online and offline actions of their customers. Kuehn (2013) and Gervais (2014) both go into the government’s reaction and eventual lax policy toward cookies. Kuehn (2013) compares the use of current cookies to the use of deep packet inspection (DPI) that was eventually eliminated, even though cookies raise similar privacy concerns. Keywords: browser cookies, privacy, government, regulation, advertising, information policy Use of Cookies: Data Collection and Privacy Concerns The continued and growing use of the internet has allow the collection of data on a broad spectrum. The gathering of everyday activities online, paired with complex algorithms, has allowed a company to predict what an individual is looking for or what they may be interested in buying in the future. These cookies used for advertising purposes don’t pose that much of a threat, but in the hands of a government or government entity, the privacy concerns become more noticeable. ...

Words: 937 - Pages: 4

Free Essay

Ethicial Diliemia

...Metz0 Chance Metz Internet Policy and Ethics Professor Golden Ethical Dilemma Paper February 11, 2013 Metz1 Internet tracking on sites like Facebook is very common place these days. It goes on behind the scenes and is rarely noticed by anyone. Advertisers use this info to sell you products. The concern is this an ethical thing to do and what can do the user do about it. That is the point of this paper to understand how internet tracking works and if it is an ethical thing for companies to be doing. If understanding how tracking works has made you uneasy, what can you do about it? Well, if this makes you drastically paranoid, you can disable cookies completely in your browser's settings and avoid the sites listed in the Wall Street Journal's web tracking investigation materials (there's more on that in my previous post, by the way). If you just want a clean slate, you can clear out your existing cookies. But, here's the really bad news: Some of the third-party trackers (including those from Dictionary.com) use a newer technology called a "Flash cookie," which was initially created to enable media players to remember unique user settings, like your preferred volume, to regenerate a tracker after you've deleted it. You just can't win with those. It's this kind of tracking practice, above all others, this has truly crossed the line from questionable to straight up wrong. If the intrusion of Flash cookies wasn't problematic enough, more particular...

Words: 1799 - Pages: 8

Premium Essay

Cookies

...Is the use of technologies, such as "cookies", strategic to marketing goods and services online? What is the impact, if any, on consumer privacy? A few years ago, the combination of technology and marketing was not a common term. Even a very successful marketing model that was followed by software giant Microsoft, was neglected in many top ranking business schools. According to them what Microsoft was doing was a fad. But time has proved that they were wrong. Marketing guru Kotler has agreed that traditional marketing is not working any more. The economic power has shifted from marketers to customers. This shift happens in the market place due to the technology. Today customers have the access to information that lets them make much more informed decisions. Customers are increasingly telling companies what type of product or services they want and when, where and how they want to buy them. Before purchase a product or service, they compare each of the competitors' product and their pricing, availability and value for money. So customers are now in control. Customer's action and their demands are profoundly impacting every industry in the market. The use of technologies such as cookies is paramount to the implementation of such marketing practices, which ultimately benefit both the retailer and the consumer. Without these, retailers would not be able to fine-tune their marketing strategies and focus, and consumers would not be able to provide, through their actions...

Words: 6638 - Pages: 27

Free Essay

Internet Privacy

...subject of internet privacy is a very well-known and explosive subject. Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information (PII) and non-PII information such as a site visitor's behavior on a website. PII refers to any information that can be used to identify an individual. For example, age and physical address alone could identify who an individual is without explicitly disclosing their name, as these two factors are unique enough to typically identify a specific person. People with only a casual concern for Internet privacy need not achieve total anonymity. Internet users may protect their privacy through controlled disclosure of personal information. The revelation of IP addresses, non-personally-identifiable profiling, and similar information might become acceptable trade-offs for the convenience that users could otherwise lose using the workarounds needed to suppress such details rigorously. On the other hand, some people desire much stronger privacy. In that case, they may try to achieve Internet anonymity to ensure privacy — use of the Internet without giving...

Words: 3257 - Pages: 14

Premium Essay

Security and Privacy on the Internet

...Security and Privacy on the Internet There are a lot of articles in the newspapers these days about databases hacked, personal information stolen, bank accounts “cleaned out”, or credit cards erroneously charged. When it comes to security and privacy on the Internet, how well does the system protect the public? Are certificate based security protocols as safe as one is lead to believe? Will modifying the Internet Explorer’s settings provide adequate privacy? As the “tech” world evolves and smart phones and other wireless devices become the norm, how secure are the Wi-Fi networks? Part of the problem is the technology is moving so fast, the rules cannot even keep up. Encryption is considered one of the better ways to help keep personal information secure, and give the user a “warm fuzzy” when the closed lock is displayed. Mr. Miguel Helft, New York Times, expresses a concern with the certificates issued by a third-party organization to guarantee a websites authenticity. According to the Electronic Frontier Foundation, more than 650 organizations can issue certificates used by Microsoft’s Internet Explorer and Mozilla’s Firefox for encryption. These organizations are located across the globe, like Russia and China which are suspected of internal public surveillance, and raise the question if the issuing organization is misusing certificates to eavesdrop on internet activity. Peter Eckersley, a senior staff technologist at the Electronic Frontier Foundation, tells of...

Words: 1110 - Pages: 5

Premium Essay

Critical Thinking

...(30%) Twitter to use cookies, other spy technology to target ads 1. Cookie is one fragment text that the one Web are not save in the hard link of the user. Cookie allow an website save the all the information in the machine of user name and then getting redistribute it. The stub the information will be saved such as pair name and value. For example, an website you can make a zero ID unique cho per guest access and save the numbers ID where on each the computer user name in a file cookie. (83Words) 2. The twitter's main arguments for doing this are it it has many benefits for users. In the case of Twitter, the company will allow retailers to attach unknowed versions of their customers' email addresses, to Twitter's advertising engine to individually target their customer base. For example, cookie files, placed on web surfers' computers by the websites they visit, contain information about the user such as what sites they have visited or where they are logging in from. (77 Words) 3. An increasing number of people are using the Internet, in many instances unaware of the information being collected about them. In contrast, other people concerned about the privacy and security issues are limiting their use of the Internet, abstaining from purchasing products online. Businesses should be aware that consumers are looking for privacy protection and a privacy statement can help to ease consumers' concerns. Cookies are used in e-commerce...

Words: 874 - Pages: 4

Premium Essay

Google Case Study

...Introduction On a broader perspective, privacy can be defined as the state of being away of public attention. However, this meaning can be altered according to specific situation. The difference in the definition arises due to wide range of topics existing in connection with privacy. Some of these topics encompass physical, informational, organizational, spiritual, intellectual matters, etc. Due to the increasing awareness of the people with regards to this concept of privacy, importance was given in preserving as well as protecting the rights of the public. Some laws are enacted to address this concern, but the privacy laws differ in many countries in terms of the scopes and limitation caused by the variations in interpretations. The culture differences and norms among countries, which greatly influence the public’s perception, significantly affect the interpretation of privacy. It is evident, nowadays, that advancement in technology is faster than what was expected. It can also be observed that the technologies invented have contributed substantial improvements in the society as this made the lives of the people easier and better. However, it cannot be denied that it has a negative side that outweighs some of its benefits. In relation to the privacy issue mentioned above, these technological advancements create threats, specifically to the preservation of its users’ privacy. The rapid increase in the number of users can be associated with the increase of information flow...

Words: 2705 - Pages: 11

Premium Essay

Internet Privacy Policy Violations and Regulations. Social Media Context.

...SCHOOL OF ECONOMICS Internet privacy policy: violations and regulations. Social media context Natalia Wójcik Index number: 51149 1 TABLE OF CONTENT 1. Introduction………………………………………………………………………….3 2. Theoretical background…………………………………………………………...4 3. E-commerce and e-marketing influence on privacy violations…………….5 4. Social networking, Web 2.0……………………………………………………….7 5. Social media privacy policy………………………………………………………8 6. Privacy policy concerns based on a particular social media example….13 7. Process of implementation of social networking regulations…………….17 8. Conclusions and final remarks…………………………………………………22 9. Bibliography………………………………………………………………………..24 2 1.INTRODUCTION Throughout the last 20 years the role of the Internet has grown enormously is every individual’s life. The Internet has its roots in 1960, when the US government attempted to build robust, fault-tolerant and distributed computer networks. However, the beginning of the worldwide process of Internet expansion may be dated to 1980 and was triggered by the development of new networking technologies and mergers of many less significant networks with the financial support of the National Science Foundation and other private commercial funding. This led to further advancement in technological improvements and their incorporations as well as wider participation of ordinary users all over the world. The Web rapid expansion reaches back to the 90’. According to the Internet World Stats: Miniwatts...

Words: 6024 - Pages: 25

Free Essay

Create User Policy

...POLICIES AND PROCEDURES 14 CREATE USER POLICY UNIT 5 ASSIGNMENT 1 To: Hospital Administrators From: IT Security Specialist Subject: User Policy We understand the type of security policies that you currently have in place. However we are here to present to you what security, users, and possible threats to your mainframe issues can impose. In today’s society we deal with many types of hackers and they are not like the 1980’s. Today we deal with threats unlike ever before, some examples would be: The stakes are high as the Institute of Medicine (IOM) highlights in its recent publication related to privacy: “Breaches of an individual’s privacy and confidentiality may affect a person’s dignity and cause irreparable harm” and “[unauthorized disclosures] can result in stigma, embarrassment, and discrimination.” IOM: Beyond the HIPAA Privacy Rule—Enhancing Privacy, Improving Health Through Research, February 4, 2009” 1. So Many Mobile Devices, So Much Risk Mobile devices are ubiquitous in today's society, and the number and types of devices used by physicians, nurses, clinicians, specialists, administrators and staff – as well as patients and visitors – is growing at healthcare organizations across the country. Providing anywhere/anytime network access is essential, particularly when instant communication is required to ensure quality patient care. But these devices are launched daily with upgraded versions of operating systems that are ripe for infection. 2. Embedded...

Words: 2047 - Pages: 9

Premium Essay

Nt1330 Unit 3

...Do you think it is possible to get a computer virus from browsing websites? Criteria Frequency Percentage Yes 85 85% No 9 9% Not Sure 6 6% . Analysis: 85% respondents thinks that you can get virus by browsing websites where 9% does not thinks so, where 6% are not sure about it. Interpretation: One can get virus is the computer while browsing the internet. If they have not installed the proper virus scanners and fire walk is their system. Therefore it is must to install the virus scanners to frequent the virus infect on your system. Also switch on the firewalls of your systems.   Q7. How "anonymous" do you feel you are while using the Internet (such as browsing the web)? Criteria Frequency Percentage Completely anonymous 30 30% Mostly anonymous...

Words: 1355 - Pages: 6

Premium Essay

2222

...(electronic business) is running a business on the internet. It is not only buying and selling but also providing services to customers and collaborating with business partners. The first one using this word was IBM when it launched the thematic campaign around the term in October, 1997. Recent years, many companies are rethinking their business in terms of the new culture of the Internet and capabilities. They are using the Web to buy supplies from suppliers, to make sales promotions, and to do the marketing research. In order to understand the moral, ethical and legal issue, it’s necessary to fully understand the advantages and disadvantages compared to the traditional business (The Economist, 2000b). For the buyers, the main advantage is the sale price will be 9% - 16% lower than in brick-and-mortar store (Varian, 2000). Other factors such as vast goods and services offering are also benefits. However, there is a drawback for some people; the cheaper prices are superficially an advantage because online shopping could not provide them with a gratifying social contract. For the seller, there are two significant advantages which should not be forgotten. It can allow interactive communication among user and distance-collapsing. Companies do not have to pay for the higher rent for the retail stores and warehouses. Most e-business companies use the computer to cut the cost of employees’ wages. Companies do not have to wait for cash as they can use electronic payment. There is also a disadvantage...

Words: 3437 - Pages: 14

Premium Essay

Management Planning Presentation

...COOPER BIS/220 OCTOBER 31, 2013 BRIAN BOHLMAN The invention of the internet and the growing use of it by children brought about the implementation of new protection acts. Among those acts are the Children’s Online Privacy Protection Act (COPPA), which passed into law in 1998, and the Children’s Internet Protection Act (CIPA), which became law in 2000. This paper will discuss the advances in information technology that resulted in new ethical issues necessitating the creation of these acts. As the internet grew in popularity among the public, children began to use it more and more for everything from homework, to communicating, to searching for whatever information is out there (surfing). In most cases, websites required the users to put in their personal contact information and, in many cases, allow the website upload tracking cookies to the user’s computer. Almost anyone could then find, buy, and/or use that information for whatever reason. Children’s personal information could be accessed by pedophiles, bullies, or any other type of creep. According to L. Fair of the Federal Trade Commission, COPPA puts parents in control of what information children put online. Whether studying, shopping, surfing or chatting, today’s kids take advantage of everything the Internet has to offer. But when it comes to their personal information, parents are in the driver’s seat. According to the Children’s Online Privacy Protection Act (COPPA) and regulations enforced by the Federal Trade...

Words: 975 - Pages: 4

Free Essay

To Consent or Not to Consent

...February 07, 2016 To Consent or Not To Consent “ You have no privacy – get over it”, declared CEO of Sun Microsystems ( now Oracle) Scott McNealy in 1999; according to Parent (2007). When strong statements are made proclaiming consumer privacy is being compromised, that's justification for concerns. With on-line activities and communications on the rise, consumers need to be aware of what they are consenting to with the aide of government regulations. In the following paragraphs, we'll discuss consumer concerns, possible fixes to these issues and explain why further regulations are needed. Consumer awareness is very important. The majority of the time, consumers just click accept when gaining access to sites on-line. According to Meinert, Peterson, Criswell II, & Crossland (2006) consumers rarely read privacy policies. One reason for the lack of interest, could be the legal jargon written throughout the policies. Another reason for not reading policies is that in order to use the services being offered, you must agree to the terms and conditions. Once the terms are accepted, consumer privacies are being exploited. Data gathering or collecting starts when you agree to the terms of the consent policy (Farah, & Higby, 2001). Using cookies and a application called a sniffer, marketers gather data to build a profile of every consumer using their site. This anonymous data mining can be seen as a form of privacy violation. With these kind of tactics , it is not difficult to...

Words: 846 - Pages: 4

Free Essay

Webdisgne

...|Security and Confidentiality On the Internet | |You have to create a report on Security and Confidentiality on the Internet. Find 10 appropriate websites on the Internet on this topic and | |list them below. These websites will be used throughout your assignment: | |[1 X 10 = 10 Marks] | | | |1. www.livinginternet.com/tindex_s.htm | |2. www.jmir.org/2002/2/e12/ | |3. www.aib.ie/personal/home/Security-Policy | |4. www.fetac.ie/doc/WelcomeServlet?DocId=0901df9e80001f99 | |5. www.globalmednet.net/privacy.html | |6. technet.microsoft.com/en-us/library/cc780167(v=ws...

Words: 2358 - Pages: 10

Premium Essay

Nt1310 Unit 2 Term Paper

...Question A What are privacy policies and what are privacy protection features? “A statement that declares a firm’s or website’s policy on collecting and releasing information about a visitor. It usually declares what specific information is collected and whether it is kept confidential or shared with or sold to other firms, researchers or sellers”. (Business directory, 23rd of May) Electronic commerce websites must ensure that they have a strict set of privacy protection policies implemented to maintain consumer trust. For example, one of the most important features of privacy protection is giving the consumer the choice of whether their information can be collected by the e-commerce website. In addition to this, if information is collected by the website they have ensure that it’s protected and that all usage of that information has to be communicated to the...

Words: 1779 - Pages: 8