Privacy Concerns and the Use of Internet Cookies

In: Computers and Technology

Submitted By JGarcia13106
Words 1746
Pages 7
Privacy concerns and the use of internet cookies

Jose Omar Garcia
IFSM 201
October 21, 2012

Cookies evolved because they solve a big problem for the people who create web sites. They are small files stored on a user's computer as a text file and placed on the hard disk by a web page server. Designed to hold a modest amount of data specific to a particular client and website, they can be accessed either by the web server or the client computer. This allows the server to deliver a page tailored to a particular user, or the page itself can contain some script that allows the cookie to carry information from one website visit to the next. They are not used to run programs or to deliver viruses to your computer. Moreover, they are uniquely assigned to one computer in particular, and can only be read by a web server in the domain that issued the cookie to the user.
One of the biggest concerns with cookies is they potentially violate an internet user's privacy, many times without his or her knowledge. Even though many websites guarantee protection of personal information, many people do not like the idea of their passwords or other sensitive data being stored. Therefore, internet browsers provide various privacy settings so a user can prevent the installation of cookies or clear them at any time. This paper will explore some of the ethical implication of using cookies in the internet environment, particularly regarding protection of personal information.
The use of internet cookies has many benefits, which is why they have become so pervasive. They have allowed marketers and advertisers to gather numeric information from particular cookies files with unique identifiers. When the user surfs the internet, a cookie is assigned to track his or her preferences during website visits. Because advertisers need to measure the reach and appeal of the…...

Similar Documents

Internet Privacy

...Internet Privacy Abstract As more and more people continue to use the Internet and disclose their personal information, privacy concerns are paramount. Marketing companies are fiercely competing for their share of the booming e-commerce industry estimated at 75 billion dollars in 2010. Government agencies after 9/11 are using personal communications such as e-mail and social networking sites to scrutinize and evaluate potential threats to the United States. Legislation including the Patriot Act has empowered a new generation of public officials with information gathering capabilities on demand. In some cases a court order is not needed to inspect all of a person’s electronic communications. Exploitation of highly sensitive personal information is a reality as companies routinely sell this information to third parties without an individual’s consent. Opting out is a disclaimer written into privacy statements on websites that are often buried in the fine print. Many Americans assume that privacy is included in the operating system they purchase. It is the collating of personal information from multiple data sources on the Internet that remains a key point of contention among those who view privacy as fundamental American right implicit in the Constitution. In this sense, privacy is deeply personal to the dignity and respect of our society. Yet, the relevance of security issues must seek a balance and address the notion of the possibility of abuse. One......

Words: 4923 - Pages: 20

Internet Privacy

...Internet Privacy XBIS 219 Internet Privacy To Whom It May Concern: This email addresses internet privacy and security in the workplace as well as at home. When using the internet it is very important to ensure that all steps are being taken to ensure that information is safe guarded and protected. At home as well as in the workplace, anti-virus software can be used to ensure that people are not potentially hacking into someone’s personal information. Technology ethics in the workplace can be a big issue. Information that is meant for certain parties can be accessed by people that it is not intended for if precautions are not taken to ensure that information is locked away and accessible only by those that need access to it. Privacy in the home and privacy in the workplace is definitely two different perspectives. At home one might have the luxury of locking their computer off to anyone and making sure that important information is not left lying around for anyone to see. However there is always a chance of someone stealing the computer or the information, and that could be detrimental, depending on what that information was and what it was used for. Now in the workplace privacy is a little more secure, however there are downfalls to the workplace as well. Employees can walk past and hear you discussing private and personal information, also if you have a desk and you leave it unlocked, there is a chance someone can go looking through it.......

Words: 347 - Pages: 2

Internet Privacy

...Internet Privacy (Check Point) My expectation for internet privacy has always been skeptical for home, work and especially public places. My reasoning may rely on the fact I know several people who are IT specialist and listening to their stories are quite frightening. Even though I know these hackers can get into my accounts I am guilty when it comes to shopping and paying bills online. The growth of social networking has to be the easiest way to your identity stolen or any public information about you out there. The worst thing is we are just pouring this information out there, and it only takes seconds for it to go global. The only thing I really do is change our passwords frequently and make sure we have the best firewall protection. At work my computer is regulated and many sites are prohibited and blocked. I don’t blame them or complain about it; I feel they have the right to protect their company. We were hired to work no to be surfing or playing games. Public computers are a scary thought. When using them need to be extra careful who is around you, need to make sure you log off completely. My opinion using someone else’s WI-FI signal is not a crime. Most places offer and even advertise they have WI-FI available. I do not have a problem allowing my friends or whoever is near to hook up as long as they are not abusing or doing anything illegal. I am sure the cable companies are not happy and believe it is unethical, since they are losing business....

Words: 270 - Pages: 2

Internet Privacy

...Internet Privacy Amanda Rheaume XBIS/219 May 11, 2012 Internet Privacy Should you walk up to any random person in today’s society and ask them how much they do online many if not most would say that they do a lot. Most of the uses for the internet now a day include shopping, work (both business and personal), schooling and bill paying. The reason people use the internet so much is mainly convenience purposes. It allows them to do what needs to be done when it works best for them, For example should a person work an evening job and get out when everything is closed they can go home and do just about everything they need to do. However with every positive there are negatives. In the case of using the internet there are much higher risks of both fraud and privacy invasion such as identity theft. Of course you may be thinking that accessing your information at home is safer because only the people you know have access to it. When in actuality any place you try to access the internet is considered to be risky. One major internet item that is considered extremely risky is Wi-Fi Zones. This is because anyone within that given zone can hack into their neighbor’s internet connection(s) and access their information. While some people may be ok with this the majority are not (Rainer &Turban, 2009). For example I allow my grandmother who lives in my downstairs apartment to share off my Wi-Fi where as my neighbor in the next house would not have permission, but they still......

Words: 332 - Pages: 2

Internet Privacy

...Internet privacy xbis / 219 may 18, 2013 Internet Privacy My expectations of using the internet in different settings differ depending on the setting. When I am at home using the internet I would except to have a higher level of security and Privacy. I have developed my own network at home so that I have good security on my network And on the information that is on my computer. I have personal things on them that I do not want Other people to have access to. Using the internet in a public setting such as a library or public café or using a wireless Hotspot in the same setting, my expectations are much lower. I do not know anything about the Security settings on these networks, so I would not look up personal information there. Many People are connected to these networks at the same time as I would be, and there are people out There that could easily get to your personal information. With these networks, no one should Assume that they are getting privacy, and/or good security on the pages that they are visiting. I have a neighbor that does not secure their wireless network and I could easily use their Network. By not securing their network they could easily set themselves up for someone hacking Their computers. I do not believe it is legal, or ethical to use another person’s wireless network Without getting permission. This is the same as stealing from your neighbor, because they are Paying for those services. I would not want anyone......

Words: 314 - Pages: 2

Security and Privacy on the Internet

...Security and Privacy on the Internet There are a lot of articles in the newspapers these days about databases hacked, personal information stolen, bank accounts “cleaned out”, or credit cards erroneously charged. When it comes to security and privacy on the Internet, how well does the system protect the public? Are certificate based security protocols as safe as one is lead to believe? Will modifying the Internet Explorer’s settings provide adequate privacy? As the “tech” world evolves and smart phones and other wireless devices become the norm, how secure are the Wi-Fi networks? Part of the problem is the technology is moving so fast, the rules cannot even keep up. Encryption is considered one of the better ways to help keep personal information secure, and give the user a “warm fuzzy” when the closed lock is displayed. Mr. Miguel Helft, New York Times, expresses a concern with the certificates issued by a third-party organization to guarantee a websites authenticity. According to the Electronic Frontier Foundation, more than 650 organizations can issue certificates used by Microsoft’s Internet Explorer and Mozilla’s Firefox for encryption. These organizations are located across the globe, like Russia and China which are suspected of internal public surveillance, and raise the question if the issuing organization is misusing certificates to eavesdrop on internet activity. Peter Eckersley, a senior staff technologist at the Electronic Frontier Foundation, tells of...

Words: 1110 - Pages: 5

Internet Privacy

...Internet Privacy Deborah Elser XBIS/219 BUSINESS INFORMATION SYSTEMS March 31, 2010 Veronica Sims My expectations for Internet privacy differ greatly depending on where I am using the Internet. When at home, I know who is using my computer and who has access to the Internet. When I am on the Internet, I use what I believe to be secure websites. I pay my bills online and use the various companies secure sites. I expect these companies to use my information that I provide to pay the bill and for nothing else. I have not allowed these companies to take my information and sell it. These company sites guarantee that my information is protected. I do not open e-mails from unknown senders and I do not go to questionable sites. I have security measures in place on my computer; firewalls and antivirus software that I update regularly. My administrative laptop that I use at work is for work related e-mails and Internet use only. My expectations for Internet privacy on-the-job are strictly work related. I know that I do not go outside of the parameters, so there is no problem. I know that my email account for work is protected, as I work, indirectly, for a government agency. I do not use library computers or go to Wi-Fi zones, but if I did, I would know to be careful and only access sites that I know are secure. I also would not be free with my personal information. I personally, do not trust using these public computers. I have used the computers at the......

Words: 402 - Pages: 2

Use of Cookies

...Use of Cookies: Data Collection and Privacy Concerns Merle E. Jones, Jr. UMUC IFSM 201 Abstract This paper explores the uses and privacy issues of cookies a user’s internet browser in tracking daily activity for use of companies for online behavioral advertising (OBA). Using the information gathered, this paper examines the growth of the use of cookies to the eventual privacy control issues that have become common place. Sullivan (2012) discusses the personal data economy and online programs that allow companies to track the online and offline actions of their customers. Kuehn (2013) and Gervais (2014) both go into the government’s reaction and eventual lax policy toward cookies. Kuehn (2013) compares the use of current cookies to the use of deep packet inspection (DPI) that was eventually eliminated, even though cookies raise similar privacy concerns. Keywords: browser cookies, privacy, government, regulation, advertising, information policy Use of Cookies: Data Collection and Privacy Concerns The continued and growing use of the internet has allow the collection of data on a broad spectrum. The gathering of everyday activities online, paired with complex algorithms, has allowed a company to predict what an individual is looking for or what they may be interested in buying in the future. These cookies used for advertising purposes don’t pose that much of a threat, but in the hands of a government or government entity, the privacy concerns become more......

Words: 937 - Pages: 4

Internet Privacy

...Internet Privacy The expectations I have towards internet privacy differs depending on where the user is accessing the Internet from. If the user is accessing the internet at home, on his or hers private network computer, I do not believe there is no reason for Internet privacy with the exception of outside hacking from the public. In the modern world we live in, we have notice an increase of identify theft through the Internet and this is the only caution I suggest people should consider. Taking the necessary tools to ensure your privacy is not interfered from the public will on the Internet can be simply by securing your internet connection through your internet provider. In a work setting the internet privacy should be in favor of the corporation and not the employee or person accessing the web. I think monitoring controls should be used. I think a work setting is for employees to conduct work tasks and unrelated internet usage should be screen and controlled by the employer. I do not think there should be any privacy when someone is accessing internet at work and the employee should be made aware of the policy from the beginning. I have a different view about the public setting such as a library. I think a library is a place that someone in the community can go to access information and research. Especially if they are members, the public library should install software and controls to allow the users access to the web with privacy rights. Using the neighbors......

Words: 314 - Pages: 2

Privacy Concerns on Facebook

...Privacy Concerns on Facebook With the increasing use of online social networks such as Facebook in recent years, a lot of research has been focusing on the privacy issue of the network. The main question being asked is: how do users navigate their privacy on Facebook? In Facebook’s short history it has quickly become a repeat offender on privacy and plays loose and easy with our data which means that we need to be even more vigilant about privacy issues (Malik, 2013). The concept of privacy can be defined in several ways, both legally and philosophically. Also, privacy has been found to be culturally relative, based on economic and cultural factors. Privacy is a form of protection and it can protect the general population as well as individuals. (Moor, 1997). However, one definition that seems especially applicable to this paper is the one put forth by Alan Westin in his 1967 book Privacy and Freedom. He defines privacy as “The claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.” (Westin, 1967). By this definition, Facebook has infringed upon this right on several occasions. I believe Facebook has an ethical responsibility to provide its users with a high degree of privacy. I believe the company should engage in what privacy advocate Michael Zimmer calls “value-conscious design.” (Zimmer, 2007) This type of design can be related to a virtue-based model of ethics. Under......

Words: 2790 - Pages: 12

Internet Privacy

...Internet privacy Concerns about privacy on the Internet are becoming a subject of international controversy. Citizens are concerned that the most intimate details of their daily lives are being monitored, searched and searched. According to the Encyclopedia Britannica 81 percent of Internet users are concerned about threats to their privacy while online. With today's increasing use of computers and the Internet has a new world knows cyberspace has taken shape. This electronic environment does not obey the same rules as the physical environment in which we live. People have now to access opportunity an infinite series of information or to communicate with people on the ground or in space. The technology of this world is moving to a deep rhythm and it seems like something revolutionary is being implemented all the time. But along with this innovative technology in a world of few regulations, see many opportunities for violation of user rights that have been implemented in the real world. Internet and Computers are more than tools to access this medium between users and the massive amounts of information available. A survey conducted by Business Week in March 1999 showed that 57 percent of respondents said the government should pass laws that modify how personal information may be collected and used on the Internet. The effort to pass comprehensive legislation privacy in the United States has been disturbed by the fact that those who enjoy......

Words: 619 - Pages: 3

Privacy and the Internet

...------------------------------------------------- Privacy and the impact of the internet Assignment #4 June 20, 2014 June 20, 2014 Privacy Rights Federally and provincially there are laws set out to protect our rights as individuals. Privacy is a right not a privilege. Privacy and Governments in Canada The 1983 federal Privacy Act puts limits and obligations on over 150 federal government departments and agencies on the collection, use and disclosure of personal information. It also gives Canadians the right to find out what personal information the federal government has about them by making a formal request under the Privacy Act. The Office of the Privacy Commissioner of Canada has the authority to investigate complaints. The governments of all provinces and territories in Canada also have privacy offices and laws governing the collection, use and disclosure of personal information. The legislation varies from province to province, but the general right to access and correct personal information exists in all, and each has a commissioner or ombudsman who is authorized to handle complaints. In Ontario we have the Freedom of Information and Protection of Privacy Act (FIPPA) Governed and enforces by the Information and Privacy Commissioner Ontario, Canada. The Freedom of Information and Protection of Privacy Act (FIPPA) and the Municipal Freedom of Information and Protection of Privacy Act (MFIPPA) protect the privacy of individuals with respect to their......

Words: 2284 - Pages: 10

Internet Privacy

...Internet Privacy XBIS/219 January 13, 2012 In society today, almost all individuals have used the internet for shopping, work, college and some use the internet just to pay bills. Most people use the internet as it is a convenient way of getting tasks done on time. Although using the internet is convenient, there are high risks of fraud and privacy invasion. Using the internet at home I feel more secure than using the internet at work or in a public place such as library or school. At home I feel more secure as I have passwords to protect my personal information and also anti-virus to protect my computer from viruses. At work I do not like to use the internet as my personal information can be accessed other employees that it privacy invasion. Using the internet anywhere can be a risky knowing that there are people that can hack into your personal information and steal your identity for other purposes. Included in these risks are also Wi-Fi zones and all other public areas that are not secure. Using Wi-Fi is extremely at high risk regarding that an individual is possibly using their neighbor’s internet. In some instances your neighbor may be ok with letting someone use their service as some neighbor’s may not know at......

Words: 255 - Pages: 2

Internet Privacy

...subject of internet privacy is a very well-known and explosive subject. Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet. Privacy can entail both Personally Identifying Information (PII) and non-PII information such as a site visitor's behavior on a website. PII refers to any information that can be used to identify an individual. For example, age and physical address alone could identify who an individual is without explicitly disclosing their name, as these two factors are unique enough to typically identify a specific person. People with only a casual concern for Internet privacy need not achieve total anonymity. Internet users may protect their privacy through controlled disclosure of personal information. The revelation of IP addresses, non-personally-identifiable profiling, and similar information might become acceptable trade-offs for the convenience that users could otherwise lose using the workarounds needed to suppress such details rigorously. On the other hand, some people desire much stronger privacy. In that case, they may try to achieve Internet anonymity to ensure privacy — use of the Internet without......

Words: 3257 - Pages: 14

Google and Internet Privacy

...Google and Internet Privacy In this exercise on ethics and privacy policy we focus our studies on an oft occurring situation in offices that have multiple employees sharing office resources that may lead to intrusive instances. The case refers to a couple of employee’s complaints of unwarranted pop-ups on their computers from unsolicited advertisers. In particular, the ads pertain to some sorts of HIV/AIDS medications that stimulate recovery from this fatal disease or at least help cope with it. The immediate suspicion goes toward targeted marketing carried out by many online advertisers today using pervious browsing history and other such tools available to them. The employees delve about the possibility of who these ads were targeted to without questioning their basic premise of whether these were targeted ads at all. They go on to narrow down the list of suspects to two individuals who also use the computer in question. In the discussion, they list out the personality traits of these individuals that they have been able to perceive based on their short interactions with them. (Since they work in different shifts the interactions would not have been detailed). These cursory definitions lead to them zeroing in on Charlie Patton as the culprit behind the pop-up ads. They suspect him of having AIDS and are now pondering on how to tackle the situation. However, the basic questions here aren’t being asked. They are, if it was indeed a problem, or just a marketing blitz with...

Words: 710 - Pages: 3