Preview

Targeted Advertisement

Best Essays
Open Document
Open Document
1973 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Targeted Advertisement
Targeted advertisement through data mining and privacy issue.

Introduction
A computer user sits in front of a screen and starts browsing their favourite website while their child similarly does the same. While this peaceful pastime activity is being enjoyed, however, they are unaware of the hidden pathways through which every detail about them is being disclosed. Because of these pathways, there are people that can get hold of the users’ names, phone numbers, IP addresses of the computers and their households. They have access to information about any users’ income, medical history, gender and age, not to mention what they searched on search-engines and which websites the users visited. They can even learn which online shopping purchases were performed by the users on any recent website.
They, who know every detail of users, are not the Big Brothers of “1984” nor are they hackers; they are online advertisers who deliver advertisement on the Internet. The computer user is vulnerable to online advertising companies that value that specific personal data. The focus of this paper is to convince advertising companies that they should enforce regulation by providing an opt-out mechanism and practice permission based data mining in order to protect consumer’s privacy. Moreover, notifying and protecting users before distributing and taking advantage of their personal information is significant to company’s accountability and furthermore allow establishing a long term relationship with customers. I will explore the issue from consumer and also an advertiser’s perspective. As a design student who has been designed companies’ logos, it is significant to gain valuable insight from this topic. By gaining the necessary information in this issue, I can navigate the internet in a more safe and secure manner as a consumer.
Background of Data Mining
Online advertising is a growing industry that is based upon the traffic from online views. “Fifty-six of the top



References: Attaran, M. (2000), “Managing Legal Liability of the Net: a Ten Step Guide for IT Managers”, Information Management and Computer Security, 8(2)2. Brown, M. & Muchira, R. (2004). Investigating the Relationship between Internet Privacy Concerns and Online Purchase Behavior 5(1),62- 71 Buchholz A., and Rosenthal B.S.(2002), Internet Privacy: Individual Rights and the Common Charters, D. (2002). Electronic Monitoring and Privacy Issues in Business-Marketing: The Ethics of the DoubleClick Experience Drumwright, E.M., Murphy, P.E., (2009). The current state of advertising ethics: industry and academic perspectives Evans, S.D. (2009). The Online Advertising Industry: Economics, Evolution, and Privacy. Journal of Economic Perspectives, 23(3), 37-60 Goldfarb, A. & Tucker C.E. (2011). Privacy regulation and online advertising. Management Science, 57(1) Korgaonkar, P & Wolin, L.(1999), “A Multivariate Analysis of Web Usage”, Journal of Advertising Research, 39(2), 53-70. Tavani, H.T. (1999) Informational privacy, data mining, and the Internet. Ethics and Information Technology

You May Also Find These Documents Helpful

  • Powerful Essays

    Plummer, J. T., Books24x7, I., & Advertising Research Foundation. (2007). The online advertising playbook: Proven strategies and tested tactics from the advertising research foundation. Hoboken, N.J: John Wiley & Sons, Inc.…

    • 1186 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    These days, the internet has become the center of livelihood for countless people around the world. As we continue down this path of interconnectivity throughout our businesses, educational institutions, and home life, we are leaving trails of information wherever the internet superhighway takes us. That trail of information, or web cookie, is utilized by companies to help track usage in an attempt to tailor your visits to their webpages. With those crumbs of information being stored, privacy ultimately becomes a concern but is often an afterthought. What are these companies discovering about us and what other entity could be applying this data toward less-than-noble causes? How does one react to the possibility of having one’s personally identifiable information stolen? I analyzed two…

    • 794 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The year is 2010, the era is the 21st century; and we, citizens of the world, are living in the Information Age. Our information is made available on the Internet where it can be viewed by millions. The days where our data was recorded on scraps of paper and left in a box in an office along with thousands of other registers are long gone. Our personal data is permanently recorded in the hard drives of computers where they can be analysed and exploited by anyone with access to that computer; or worse, identity thieves and hackers may get their hands on the data.…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    In 1962 history was made. An employee of Dayton Dry Goods Company named John. F. Geisse thought of the idea of an upscale discount-relating store. The Dayton Company used Geisse’s idea and opened its first store in Minnesota called “Target,” currently owned by Target Corporation. With more than 1,934 stores across the country, Target has grown into a household staple brand. In fact, Target mega-brand is second only to Wal-Mart. It’s amazing how successful Target has become in such a short period of time, but the question on everyone's mind is how? What makes Target so successful? Do they scam their everyday shoppers or are they genuinely that good? Whether it’s the colors or the adorable dog as their mascot Target is doing something…

    • 1251 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Applied Management Project

    • 13570 Words
    • 55 Pages

    12. Forrester Researchers, 2001, “European Online Advertising Will Growth”, Available At http://www.forrester.com/ER/Press/Release/0,1769,721,00.html, (Accessed: 25th July, 2010).…

    • 13570 Words
    • 55 Pages
    Powerful Essays
  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    Protecting your personal information both on your personal computer and in other places such as your bank, or your job, has become more difficult with the massive growth of the internet and the expertise of some unsavory characters called hackers, crackers, and phreakers. Whatever they choose to call themselves, they are all thieves, plan and simple. Some people still question whether or not hacking should be illegal. It’s obvious that what hackers do is illegal. A personal computer is personal, and the information on it private. When a hacker invades that privacy, he is trespassing, and when they take your personal information, their committing a form of thievery. In addition to hackers, we now have marketers invading our privacy through the use of cookies.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    This paper will look at the ethical issues and use of Personally Identifiable Information, commonly known as PII, in computer systems, applications, and the internet. We will discuss what PII is and how it is used. There will be information on why Personally Identifiable Information is used and what can happen if it is misused. We will also discuss and look at some sample polices from the government and other large companies that address the use and safeguarding of Personally Identifiable Information. The next section will discuss what you can do to protect your Personally Identifiable Information. Finally we will look at how everything discussed can affect you and who is ultimately responsible for protecting Personally Identifiable Information.…

    • 2169 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Privacy is a growing concern in the United States and around the world. As we increasingly use the Internet and the seemingly boundary less options for collecting, saving, sharing, and comparing information trigger consumer’s worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives.…

    • 1849 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    It is difficult to control and protect individual computer users as there are many different ideas of what the concept of privacy means in different countries. However, there are some basic activities that are considered an invasion of privacy no matter where you live in the world. Examples of these are as follows:…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Data Breach

    • 3998 Words
    • 16 Pages

    In today’s digital world, most Americans leave long electronic trails of private information wherever they go. But too often, that data is compromised. When they shop—whether online or at brick and mortar stores—retailers gain access to their credit card numbers. Medical institutions maintain patient records, which are increasingly electronic. Corporations store copious customer lists and employee Social Security numbers. These types of data frequently get loose. Hackers gain entry to improperly protected networks, thieves steal employee laptops or disgruntled workers pilfer company information.…

    • 3998 Words
    • 16 Pages
    Better Essays
  • Best Essays

    With the ever-evolving technology to exchange information instantaneously users are able to carry out many of the everyday tasks that previously required a visit to the bank, post office or library. However with all of the conveniences that this robust communication medium brings to our lives, come serious issues concerning safeguarding of users’ private information. There are numerous avenues that a users’ privacy can be compromised, and inevitably, one can not avoid disclosing a certain amount of data when using the Internet. At issue is the absence of federal legislation regulating who, what and where this information may be collected, assimilated and shared with various marketing organizations or governmental authorities. Prior to the advent of the Internet American’s personal matters such as financial records, health information, personal correspondence was stored in the home; it is there that Americans are afforded the privacy protections as set-forth in the constitution. With today’s technology, intimate details regarding our lives are stored on network servers not in the home. The issue of Internet privacy has been brought before congress on numerous occasions in the past decade and to date no federal legislation has been enacted to ensure that users’ private information is governed by the same standards as if it was stored in our homes. Internet users truly are…

    • 3351 Words
    • 14 Pages
    Best Essays
  • Good Essays

    The End Of Privacy

    • 1056 Words
    • 5 Pages

    Imagine a time where a new communication device came out whether it's a new smartphone or a new computer. Better ways to communicate are just over the horizon and humanity has never been closer. Consequently, as humanity gets closer, privacy becomes a distant memory. As humans rely more on technology for everyday life and for communication, more ways open for a person anywhere on the world can access someone else's information. By using a computer, the user opens their house to the entire web, which can also be accessed by anyone else in the world. Suddenly, the user is no longer alone, but anyone can be reached instantly with the push of a few buttons. But while this convenience is great, any other users could be listening…

    • 1056 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Langford D, 2000. Chapter 4: Privacy and Security, page-67 Internet Ethics. Published by, McMillan Press Ltd, USA…

    • 2037 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Internet Privacy.

    • 1148 Words
    • 5 Pages

    In the past thirty years computer technology has been developing very rapidly. Internet in last decade has revolutionized the way how we conduct our lives and businesses. Internet has become a daily necessity we cannot live without. Development of Internet and wireless technologies together with advancement in miniature technology has made it possible for us to have access the internet on the go. Every year we expect new and more advance models of smart phones, or new more sophisticated window systems, or new and more reliable internet security program in hope that this time advancements in technologies not only help to improve our life, but help to protect our privacy while using the internet. It seems the more advance computer and internet technologies get, the more our privacy gets violated. There is a parallel connection between internet privacy and advancements in computer technologies. Future of computer and digital technology is unlimited, and it is impossible to predict. However we should recognize the consequences of using the internet for different aspects of our lives, this will in turn help us to understand internet privacy and how to protect our privacy. Until then violation of the internet privacy will increase, and it is okay because we all learn in a process.…

    • 1148 Words
    • 5 Pages
    Good Essays
  • Good Essays

    When people think about privacy and the internet, what do they think? Do they feel secure? Or, do they feel vulnerable when it comes to using the internet at their house or in a public place? The answer to some of these questions may surprise people because some think they are completely safe at home on their home networks. But the truth is, your security/privacy is taken advantage of on the daily basis by companies and third parties.…

    • 756 Words
    • 4 Pages
    Good Essays

Related Topics