Preview

Personally Identifiable Information (Pii) and Ethics: Use of Cookies

Good Essays
Open Document
Open Document
693 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Personally Identifiable Information (Pii) and Ethics: Use of Cookies
Personally Identifiable Information (PII) and Ethics: Use of Cookies

Cookie Trails
In today’s era of technology, many people are concerned about internet privacy. Most concerns are usually sparked by misinformation. One piece of technology that is most misunderstood is the cookie and its uses.
Many people believe that cookies are programs that can transfer viruses onto their computers. This is absolutely false. Cookies are typically harmless. Cookies are little text files left on your hard disk by some websites you visit (Williams & Stacy C. Sawyer, 2013, p.105). These text files store information about the user like preferences, log-in name, and password.
Cookies can be very beneficial for users who frequent many sites. It is very convenient to forgo having to remember every user name or password for every site you visit on a regular basis. Another convenience is using the shopping cart feature of a retail site. For instance, you have added items to your cart, and suddenly lose internet connection. Once internet connection is restored and you return to the site, your shopping cart items are still listed there. Websites also benefit from using cookies. Sites can store user preferences with the purpose of having a unique appearance for each user. Sites can also use cookies to track how many visitors a site receives. This particular piece of information is vital for sites who offer free access.
Lately, many consumers have been distressed over how websites are using tracking cookies. Tracking cookies could potentially amass a compilation of all your browsing habits. Marketing companies such as DoubleClick have taken tracking cookies a step further. “The cookie it dispatches will come alive every time you visit another site that does business with DoubleClick” (Peneberg, 2005). DoubleClick can then take that information it has gathered and pair it with personally identifiable information like a phone number or email, and most troubling



References: Peneberg, A. L. (2005, November 7). Cookie Monsters: The innocuous Text Files that Web Surfers love to hate. Retrieved November 5, 2012, from Slate: http://www.slate.com/articles/technology/technology/2005/11/cookie_monsters.html Williams, B. K., & Stacy C. Sawyer. (2013). USING INFORMATION TECHNOLOGY: A PRACTICAL INTRODUCTION TO COMPUTERS & COMMUNICATIONS (10th ed.). Boston: The McGraw-Hill Companies, Inc. -------------------------------------------- [ 1 ]. Text files are stored as name-value pairs. [ 2 ]. Tracking cookies are third-party cookies placed by a marketing or advertising company that is interested in tagging visitors. Often they make sure a user won 't be hit with the same ad twice.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Rainer, R. K. & Cegielski, C.G. (2011). Introduction to Information systems: Supporting and Transforming Business. Chapter 2, Information Systems, Concepts and Management.…

    • 654 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    6. Cookie: A line of identifying text, assigned and retrieved by a given Web server and stored by your browser, that can be used to build a profile associated with your Web activities.…

    • 2817 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    It/205 Week 9 Quiz

    • 596 Words
    • 3 Pages

    A cookie is a small file containing information about you and your Web activities that is…

    • 596 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Rainer, R. K. & Cegielski, C. G. (2011). Introduction to Information Systems: Supporting and Transforming Business (3rd ed.). Hoboken, NJ: John Wiley & Sons.…

    • 546 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bis/220 Proposal

    • 315 Words
    • 2 Pages

    Rainer, R. K. & Cegielski, C. G. (2011). Introduction to information systems: Supporting and transforming business (3rd ed.). Hoboken, NJ: John Wiley & Sons.…

    • 315 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    AIS Chapter 3 P 3-7

    • 416 Words
    • 2 Pages

    Cookies: The CIA Web site not only gives a brief definition of each type of…

    • 416 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Gummy Research Paper

    • 552 Words
    • 3 Pages

    Cookie data: We use various technologies to collect information when you use our Services, including sending cookies(small text files sent by your computer each time you visit our website).Among other things, cookies support the integrity of our registration process, retain your preferences and account settings, and help evaluate and compile aggregated statistics about user activity.…

    • 552 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Can you identify examples of decision about each part of the mix that are being made in the cookie program?…

    • 411 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Internet Exercise

    • 1886 Words
    • 8 Pages

    * Internet marketers use browser cookies to keep track of consumers’ behavior. Browser cookie is a small piece of data sent from a website and stored in a user’s web browser while a user is browsing a website.…

    • 1886 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    This paper will look at the ethical issues and use of Personally Identifiable Information, commonly known as PII, in computer systems, applications, and the internet. We will discuss what PII is and how it is used. There will be information on why Personally Identifiable Information is used and what can happen if it is misused. We will also discuss and look at some sample polices from the government and other large companies that address the use and safeguarding of Personally Identifiable Information. The next section will discuss what you can do to protect your Personally Identifiable Information. Finally we will look at how everything discussed can affect you and who is ultimately responsible for protecting Personally Identifiable Information.…

    • 2169 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    The advantages of cookie usage is mainly being able to present the customer with a better user experience, such as saving preferences or offering similar items for purchase…

    • 557 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In Minority Report, John Anderton is in a mall and is bombarded with personalized ad’s. A woman selling an American Express blue card states to Anderton, “Need to escape? Blue can take you”. He is also offered a Guinness (Minority Report). People on social media or on the internet often do not realize that the ad’s that one see’s while exploring the internet are personalized. When we search up something on Amazon, Ebay, or Google, it gets saved using the tool called “Cookies” and often shows up when the user is on Facebook. Down the sidebar, Facebook displays ad’s that you have personally been interested in. Cookies allow companies to watch what you do on the internet so that social media accounts can suit your interests and attract you. In the movie, people’s eyes are scanned to show advertisements related with that person whereas people in our generation can sit behind a device to have our online identities corresponded…

    • 927 Words
    • 4 Pages
    Good Essays
  • Good Essays

    When privacy browsing is enabled on a web browser, it prevents the browser from storing information like browsing history, form data, usernames, and passwords. Without this enabled, browsers are able to store this information to be recovered at a later date. There are many reasons to use this feature. A few of these reasons are planning surprises, logging in on someone else’s computer, and using multiple accounts simultaneously.…

    • 304 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Information gathering, through networking, social media, and both on and offline storage have made it easier to collect information about an individual than ever before, with many concerns having arisen over the years about privacy and the ability to protect that privacy. As debates over personally identifiable information continue, one cornerstone remains a constant, ethics. Ethics are defined as “the standard by which human actions can be judged right and wrong (Online, 2012)”, but even that can be debated when discussed within the realm of information technology. Have you ever been to an internet shopping site and “trusted” the secure connection? Essentially, you are entrusting an inanimate system developed by an individual or group of them that may or may not believe in an ethical code. Knowing this, could there be an adverse impact on you or someone you know through personally identifiable information?…

    • 908 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Contemporary information systems technology, including internet technologies, challenges traditional regimens for protecting individual privacy and intellectual property. Data storage and data analysis technology enables companies to easily gather personal data about individuals from many different sources and analyze these data to create detailed electronic profiles about individuals and their behaviors. Data flowing over the Internet can be monitored at many points. The activities of website visitors can be closely tracked using cookies and other web monitoring tools. Not all websites have strong privacy protection policies, and they do not always allow for informed consent regarding the use of personal information.…

    • 385 Words
    • 2 Pages
    Good Essays