Preview

Internet Tracking

Better Essays
Open Document
Open Document
1529 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internet Tracking
Electronic passage through the Internet leaves a trail that can be traced. Tracing is a process that follows the Internet activity backwards, from the recipient to the user. As well, a user's Internet activity on web sites can also be tracked on the recipient site i.e., what sites are visited and how often. Sometimes this tracking and tracing ability is used to generate email to the user promoting a product that is related to the sites visited. User information, however, can also be gathered covertly. This leaves us wondering if tracking devices violates the user's privacy.
There are different types of tracking devices; most common one is called cookies. Cookies are computer files that are stored on a user's computer during a visit to a web site. When the user electronically enters the web site, the host computer automatically loads the file(s) to the user's computer.
The cookie is a tracking device, which records the electronic movements made by the user at the site, as well as identifiers such as a username and password. Commercial web sites make use of cookies to allow a user to establish an account on the first visit to the site and so to avoid having to enter account information i.e., address, credit card number, financial activity on subsequent visits. User information can also be collected unbeknown to the user and subsequently used for whatever purpose the host intends.
Cookies are files, and so can be transferred from the host computer to another computer. This can occur legally i.e., selling of a subscriber mailing list or illegally i.e., "hacking in" to a host computer and copying the file. Also, cookies can be acquired as part of a law enforcement investigation.
A program called Adware could potentially be another source of tracking device. Adware is software integrated into or bundled with a program. It is any software package which automatically plays, displays, or downloads advertising material to a computer after the software is installed on it



Cited: 1. Olsen,Stefanie. "Nearly undetectable tracking device raises concern." 12 July 2000. CNET News.com 2. Intoduction to Business Law 3. "Internet privacy." 8 December 2006. http://en.wikipedia.org/wiki/Internet_privacy. 4. Web bug.. 14 November 2006. http://en.wikipedia.org/wiki/Web_bug 5. Holtzman, David H. Privacy Lost: How Technology Is Endangering Your Privacy. Jossey-Bass: San Francisco, CA, 2006. 6. Walker, Andy Absolute Beginner 's Guide to Security, Spam, Spyware & Viruses Nov 9, 2005

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The trusted site feature. It ensures that the sites which provides our personal information takes precautions to protect our data by giving limited access to foreign users.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. Describe how cookie crumbs could be used in this system. Are cookie crumbs a desirable navigation aid for this system? Why or why not?…

    • 482 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    6. Cookie: A line of identifying text, assigned and retrieved by a given Web server and stored by your browser, that can be used to build a profile associated with your Web activities.…

    • 2817 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    He starts the essay by explaining rather than overreacting about their data being passed around the web, they "should get smart and learn how to control personal information," instead of insisting that this collecting of information be stopped altogether (535). He also points out that websites and advertising companies use these cookies to personalize your web experience, which makes the life of the user easier. He provides a concession to this point by citing the dangers of "'surreptitious' use of cookies," before going into a long rebuttal (536). Harper delivers some interesting points on why cookies are necessary for the web user. His essay is well supported with multiple relatable and identifiable examples, one even from his own experience. He concludes his article declaring that cookie controls will be more easily attainable and abundant in the future, but "the conversation should continue," suggesting that even with privacy filters, users must continue to provide information to keep the internet free and enjoyable…

    • 794 Words
    • 4 Pages
    Good Essays
  • Good Essays

    AIS Chapter 3 P 3-7

    • 416 Words
    • 2 Pages

    Cookies: Cookies are unique identifiers that we transfer to your device to enable our systems to recognize your device and to provide features such as 1-Click purchasing, Recommended for You, personalized advertisements on other Web sites (e.g., Amazon Associates with content served by Amazon.com and Web sites using Checkout by Amazon payment service), and storage of items in your Shopping Cart between visits.…

    • 416 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Petries Week 5

    • 372 Words
    • 2 Pages

    3. Describe how cookie crumbs could be used in this system. Are cookie crumbs a desirable navigation aid for this system? Why or why not?…

    • 372 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Spyware

    • 2042 Words
    • 9 Pages

    Spy-ware is a program that is inadvertently installed on the user’s computer without their knowledge the program covertly obtains data from the computer and transmits it to another. Spy-ware can track the websites that the user visits, collect information on the user’s clicks, gather keystrokes and obtain sign in and passwords. Spy-ware can be of a conspicuous nature where the user is somewhat aware of; additional pop-up advertising, slowing down of computer processing, and computer setting changes. The most concerning type of spy-ware has traits that are…

    • 2042 Words
    • 9 Pages
    Better Essays
  • Good Essays

    This website typically collects information either voluntarily-provided by you or automatically collected when you visit our website, which may include cookies, third party tracking technologies and server logs. Voluntarily provided information may include your name, address, email address, billing and credit card information, and are usually obtained when you fill out our contact forms.…

    • 631 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. Can you identify examples of decision about each part of the mix that are being made in the cookie program?…

    • 411 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Essay On Internet Privacy

    • 611 Words
    • 3 Pages

    Privacy is defined as the state of being free from public attention (Oxforddictionaries.com). Microsoft, a multinational billion dollar technology company, defines internet privacy as personal information that one provides on the internet and can only be accessed by an exclusive group (Microsoft.com). In short, personal information includes anything from first and last name, address, email, telephone number, or social security number (coppa.org). Keeping this information safe will in turn keep you safe, that is why there are some laws in place to enforce internet privacy.…

    • 611 Words
    • 3 Pages
    Good Essays
  • Good Essays

    government tracking

    • 1009 Words
    • 5 Pages

    Do you know who is tracking your movements when your turn on your cell phone, or what is being done with that information? These are questions that I recently had to ask myself after reading two insightful articles. The first was by Ronald Bailey called “Your Cellphone is Spying on You” and the other was by Terry J. Allen entitled “Reach Out and Track Someone”. In Ronald Bailey’s article, he explores the use of cellular phone tracking technology by law enforcement and their recent attempts to expand the surveillance laws to include more use of cell phones to track users’ movements without their knowledge. In addition he gives us some perspective on the idea of a big brother watching over us by examining what a future built on limited privacy expectations might look like. Allen gives us his personal perspective on tracking technology and explores abuses that might arise if we continue down the current path. Both of these articles have given me insight into the use of tracking technology and make me question both the moral and legal ramifications of sharing information related to personal movement. There is in fact a moral and legal balance that satisfies the need to protect the privacy of law abiding citizens, prosecute criminals, and protect family and friends through the use of cell phone tracking all at the same time, and the name we give to that solution is the constitution.…

    • 1009 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Contemporary information systems technology, including internet technologies, challenges traditional regimens for protecting individual privacy and intellectual property. Data storage and data analysis technology enables companies to easily gather personal data about individuals from many different sources and analyze these data to create detailed electronic profiles about individuals and their behaviors. Data flowing over the Internet can be monitored at many points. The activities of website visitors can be closely tracked using cookies and other web monitoring tools. Not all websites have strong privacy protection policies, and they do not always allow for informed consent regarding the use of personal information.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    * Spyware- Malware used to collect information about a user’s browsing habits or to intercept personal data.…

    • 642 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Glossary of New Media Terms

    • 4397 Words
    • 18 Pages

    · Cookie- message sent from a website, stored on a user’s computer as a file, accessed by the website on subsequent visits.…

    • 4397 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    In today’s online market, some of the best companies do not make that much money off of their products. Instead, they make money off of gathering information about their clients/customers. People may ask, “How do they do this?” But the answer is simple, they track your cookies that you leave behind when you browse a website. Have you ever noticed that you went to look up a product, and you decided not to buy it that same day? But then, you go online, then next day and see ads all over websites with the product that you were thinking of buying. They call this cookie proliferation, and the Executive Editor of PCWorld, Melissa Riofrio, wrote an online article “The 5 Biggest Online Privacy Threats of 2013,” in which she says that “It’s totally invisible to users. They have no idea what’s happening” (Riofrio para 9). Meaning…

    • 756 Words
    • 4 Pages
    Good Essays