Preview

Personally Identifiable Information (Pii) and Ethics: Use of Cookies

Good Essays
Open Document
Open Document
693 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Personally Identifiable Information (Pii) and Ethics: Use of Cookies
Personally Identifiable Information (PII) and Ethics: Use of Cookies

Cookie Trails
In today’s era of technology, many people are concerned about internet privacy. Most concerns are usually sparked by misinformation. One piece of technology that is most misunderstood is the cookie and its uses.
Many people believe that cookies are programs that can transfer viruses onto their computers. This is absolutely false. Cookies are typically harmless. Cookies are little text files left on your hard disk by some websites you visit (Williams & Stacy C. Sawyer, 2013, p.105). These text files store information about the user like preferences, log-in name, and password.
Cookies can be very beneficial for users who frequent many sites. It is very convenient to forgo having to remember every user name or password for every site you visit on a regular basis. Another convenience is using the shopping cart feature of a retail site. For instance, you have added items to your cart, and suddenly lose internet connection. Once internet connection is restored and you return to the site, your shopping cart items are still listed there. Websites also benefit from using cookies. Sites can store user preferences with the purpose of having a unique appearance for each user. Sites can also use cookies to track how many visitors a site receives. This particular piece of information is vital for sites who offer free access.
Lately, many consumers have been distressed over how websites are using tracking cookies. Tracking cookies could potentially amass a compilation of all your browsing habits. Marketing companies such as DoubleClick have taken tracking cookies a step further. “The cookie it dispatches will come alive every time you visit another site that does business with DoubleClick” (Peneberg, 2005). DoubleClick can then take that information it has gathered and pair it with personally identifiable information like a phone number or email, and most troubling



References: Peneberg, A. L. (2005, November 7). Cookie Monsters: The innocuous Text Files that Web Surfers love to hate. Retrieved November 5, 2012, from Slate: http://www.slate.com/articles/technology/technology/2005/11/cookie_monsters.html Williams, B. K., & Stacy C. Sawyer. (2013). USING INFORMATION TECHNOLOGY: A PRACTICAL INTRODUCTION TO COMPUTERS & COMMUNICATIONS (10th ed.). Boston: The McGraw-Hill Companies, Inc. -------------------------------------------- [ 1 ]. Text files are stored as name-value pairs. [ 2 ]. Tracking cookies are third-party cookies placed by a marketing or advertising company that is interested in tagging visitors. Often they make sure a user won 't be hit with the same ad twice.

You May Also Find These Documents Helpful

  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    Protecting your personal information both on your personal computer and in other places such as your bank, or your job, has become more difficult with the massive growth of the internet and the expertise of some unsavory characters called hackers, crackers, and phreakers. Whatever they choose to call themselves, they are all thieves, plan and simple. Some people still question whether or not hacking should be illegal. It’s obvious that what hackers do is illegal. A personal computer is personal, and the information on it private. When a hacker invades that privacy, he is trespassing, and when they take your personal information, their committing a form of thievery. In addition to hackers, we now have marketers invading our privacy through the use of cookies.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Using the Internet often comprises the use of social networking sites, email facilities and the browse of various other websites. Internet privacy comes on the scene when it comes to website users giving out their personal details on the Internet. For certain websites, which facilitate online shopping, the users are made to input their credit card numbers. In case of emailing sites, there are issues about whether third parties should be allowed to store or read emails without informed consent. Whether or not, the third parties should be permitted to track the visitors on a website, is another major privacy concern. The other important Internet privacy issue is whether the sites that gather personally identifiable information from the users should store or share it.…

    • 884 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Internet Exercise

    • 1886 Words
    • 8 Pages

    * Internet marketers use browser cookies to keep track of consumers’ behavior. Browser cookie is a small piece of data sent from a website and stored in a user’s web browser while a user is browsing a website.…

    • 1886 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Privacy and Security

    • 4774 Words
    • 20 Pages

    The purpose of this report is to highlight the risk of internet privacy being breached by malicious persons, groups and organisations and how to mitigate and lessen the impact these risks present. A lot…

    • 4774 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    Websites are routinely collecting information about customers and visitors to understand and serve their customers better. Personal information is collected and administrated with integrity, responsibility, and security.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Gummy Research Paper

    • 552 Words
    • 3 Pages

    Cookie data: We use various technologies to collect information when you use our Services, including sending cookies(small text files sent by your computer each time you visit our website).Among other things, cookies support the integrity of our registration process, retain your preferences and account settings, and help evaluate and compile aggregated statistics about user activity.…

    • 552 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    There are many Americans that worry about the invasion of their privacy. An American’s privacy can be lost by- an IP address internet cookies, government surveillance cameras, and social networking sites. There are many ways Americans can control their privacy, but sometimes the invasion of privacy is out of their control. For example, computers save all of the American’s private information without their consent.…

    • 1379 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    This paper will look at the ethical issues and use of Personally Identifiable Information, commonly known as PII, in computer systems, applications, and the internet. We will discuss what PII is and how it is used. There will be information on why Personally Identifiable Information is used and what can happen if it is misused. We will also discuss and look at some sample polices from the government and other large companies that address the use and safeguarding of Personally Identifiable Information. The next section will discuss what you can do to protect your Personally Identifiable Information. Finally we will look at how everything discussed can affect you and who is ultimately responsible for protecting Personally Identifiable Information.…

    • 2169 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Should Dirt Bike use cookies? What are the advantages of using cookies for both Dirt Bikes and its Web site visitors? What privacy issues do they create for Dirt Bikes?…

    • 5618 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    Information gathering, through networking, social media, and both on and offline storage have made it easier to collect information about an individual than ever before, with many concerns having arisen over the years about privacy and the ability to protect that privacy. As debates over personally identifiable information continue, one cornerstone remains a constant, ethics. Ethics are defined as “the standard by which human actions can be judged right and wrong (Online, 2012)”, but even that can be debated when discussed within the realm of information technology. Have you ever been to an internet shopping site and “trusted” the secure connection? Essentially, you are entrusting an inanimate system developed by an individual or group of them that may or may not believe in an ethical code. Knowing this, could there be an adverse impact on you or someone you know through personally identifiable information?…

    • 908 Words
    • 4 Pages
    Good Essays
  • Good Essays

    In Minority Report, John Anderton is in a mall and is bombarded with personalized ad’s. A woman selling an American Express blue card states to Anderton, “Need to escape? Blue can take you”. He is also offered a Guinness (Minority Report). People on social media or on the internet often do not realize that the ad’s that one see’s while exploring the internet are personalized. When we search up something on Amazon, Ebay, or Google, it gets saved using the tool called “Cookies” and often shows up when the user is on Facebook. Down the sidebar, Facebook displays ad’s that you have personally been interested in. Cookies allow companies to watch what you do on the internet so that social media accounts can suit your interests and attract you. In the movie, people’s eyes are scanned to show advertisements related with that person whereas people in our generation can sit behind a device to have our online identities corresponded…

    • 927 Words
    • 4 Pages
    Good Essays
  • Good Essays

    These days, the internet has become the center of livelihood for countless people around the world. As we continue down this path of interconnectivity throughout our businesses, educational institutions, and home life, we are leaving trails of information wherever the internet superhighway takes us. That trail of information, or web cookie, is utilized by companies to help track usage in an attempt to tailor your visits to their webpages. With those crumbs of information being stored, privacy ultimately becomes a concern but is often an afterthought. What are these companies discovering about us and what other entity could be applying this data toward less-than-noble causes? How does one react to the possibility of having one’s personally identifiable information stolen? I analyzed two…

    • 794 Words
    • 4 Pages
    Good Essays
  • Good Essays

    When privacy browsing is enabled on a web browser, it prevents the browser from storing information like browsing history, form data, usernames, and passwords. Without this enabled, browsers are able to store this information to be recovered at a later date. There are many reasons to use this feature. A few of these reasons are planning surprises, logging in on someone else’s computer, and using multiple accounts simultaneously.…

    • 304 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In today’s online market, some of the best companies do not make that much money off of their products. Instead, they make money off of gathering information about their clients/customers. People may ask, “How do they do this?” But the answer is simple, they track your cookies that you leave behind when you browse a website. Have you ever noticed that you went to look up a product, and you decided not to buy it that same day? But then, you go online, then next day and see ads all over websites with the product that you were thinking of buying. They call this cookie proliferation, and the Executive Editor of PCWorld, Melissa Riofrio, wrote an online article “The 5 Biggest Online Privacy Threats of 2013,” in which she says that “It’s totally invisible to users. They have no idea what’s happening” (Riofrio para 9). Meaning…

    • 756 Words
    • 4 Pages
    Good Essays