Preview

Personally Identifiable Information (Pii) and Ethics: Use of Cookies

Good Essays
Open Document
Open Document
693 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Personally Identifiable Information (Pii) and Ethics: Use of Cookies
Personally Identifiable Information (PII) and Ethics: Use of Cookies

Cookie Trails
In today’s era of technology, many people are concerned about internet privacy. Most concerns are usually sparked by misinformation. One piece of technology that is most misunderstood is the cookie and its uses.
Many people believe that cookies are programs that can transfer viruses onto their computers. This is absolutely false. Cookies are typically harmless. Cookies are little text files left on your hard disk by some websites you visit (Williams & Stacy C. Sawyer, 2013, p.105). These text files store information about the user like preferences, log-in name, and password.
Cookies can be very beneficial for users who frequent many sites. It is very convenient to forgo having to remember every user name or password for every site you visit on a regular basis. Another convenience is using the shopping cart feature of a retail site. For instance, you have added items to your cart, and suddenly lose internet connection. Once internet connection is restored and you return to the site, your shopping cart items are still listed there. Websites also benefit from using cookies. Sites can store user preferences with the purpose of having a unique appearance for each user. Sites can also use cookies to track how many visitors a site receives. This particular piece of information is vital for sites who offer free access.
Lately, many consumers have been distressed over how websites are using tracking cookies. Tracking cookies could potentially amass a compilation of all your browsing habits. Marketing companies such as DoubleClick have taken tracking cookies a step further. “The cookie it dispatches will come alive every time you visit another site that does business with DoubleClick” (Peneberg, 2005). DoubleClick can then take that information it has gathered and pair it with personally identifiable information like a phone number or email, and most troubling



References: Peneberg, A. L. (2005, November 7). Cookie Monsters: The innocuous Text Files that Web Surfers love to hate. Retrieved November 5, 2012, from Slate: http://www.slate.com/articles/technology/technology/2005/11/cookie_monsters.html Williams, B. K., & Stacy C. Sawyer. (2013). USING INFORMATION TECHNOLOGY: A PRACTICAL INTRODUCTION TO COMPUTERS & COMMUNICATIONS (10th ed.). Boston: The McGraw-Hill Companies, Inc. -------------------------------------------- [ 1 ]. Text files are stored as name-value pairs. [ 2 ]. Tracking cookies are third-party cookies placed by a marketing or advertising company that is interested in tagging visitors. Often they make sure a user won 't be hit with the same ad twice.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Rainer, R. K. & Cegielski, C.G. (2011). Introduction to Information systems: Supporting and Transforming Business. Chapter 2, Information Systems, Concepts and Management.…

    • 654 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    6. Cookie: A line of identifying text, assigned and retrieved by a given Web server and stored by your browser, that can be used to build a profile associated with your Web activities.…

    • 2817 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It/205 Week 9 Quiz

    • 596 Words
    • 3 Pages

    A cookie is a small file containing information about you and your Web activities that is…

    • 596 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Rainer, R. K. & Cegielski, C. G. (2011). Introduction to Information Systems: Supporting and Transforming Business (3rd ed.). Hoboken, NJ: John Wiley & Sons.…

    • 546 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bis/220 Proposal

    • 315 Words
    • 2 Pages

    Rainer, R. K. & Cegielski, C. G. (2011). Introduction to information systems: Supporting and transforming business (3rd ed.). Hoboken, NJ: John Wiley & Sons.…

    • 315 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    AIS Chapter 3 P 3-7

    • 416 Words
    • 2 Pages

    Cookies: Cookies are unique identifiers that we transfer to your device to enable our systems to recognize your device and to provide features such as 1-Click purchasing, Recommended for You, personalized advertisements on other Web sites (e.g., Amazon Associates with content served by Amazon.com and Web sites using Checkout by Amazon payment service), and storage of items in your Shopping Cart between visits.…

    • 416 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    Protecting your personal information both on your personal computer and in other places such as your bank, or your job, has become more difficult with the massive growth of the internet and the expertise of some unsavory characters called hackers, crackers, and phreakers. Whatever they choose to call themselves, they are all thieves, plan and simple. Some people still question whether or not hacking should be illegal. It’s obvious that what hackers do is illegal. A personal computer is personal, and the information on it private. When a hacker invades that privacy, he is trespassing, and when they take your personal information, their committing a form of thievery. In addition to hackers, we now have marketers invading our privacy through the use of cookies.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    1. Can you identify examples of decision about each part of the mix that are being made in the cookie program?…

    • 411 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The advantages of cookie usage is mainly being able to present the customer with a better user experience, such as saving preferences or offering similar items for purchase…

    • 557 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Internet Exercise

    • 1886 Words
    • 8 Pages

    * Internet marketers use browser cookies to keep track of consumers’ behavior. Browser cookie is a small piece of data sent from a website and stored in a user’s web browser while a user is browsing a website.…

    • 1886 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    This paper will look at the ethical issues and use of Personally Identifiable Information, commonly known as PII, in computer systems, applications, and the internet. We will discuss what PII is and how it is used. There will be information on why Personally Identifiable Information is used and what can happen if it is misused. We will also discuss and look at some sample polices from the government and other large companies that address the use and safeguarding of Personally Identifiable Information. The next section will discuss what you can do to protect your Personally Identifiable Information. Finally we will look at how everything discussed can affect you and who is ultimately responsible for protecting Personally Identifiable Information.…

    • 2169 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    In Minority Report, John Anderton is in a mall and is bombarded with personalized ad’s. A woman selling an American Express blue card states to Anderton, “Need to escape? Blue can take you”. He is also offered a Guinness (Minority Report). People on social media or on the internet often do not realize that the ad’s that one see’s while exploring the internet are personalized. When we search up something on Amazon, Ebay, or Google, it gets saved using the tool called “Cookies” and often shows up when the user is on Facebook. Down the sidebar, Facebook displays ad’s that you have personally been interested in. Cookies allow companies to watch what you do on the internet so that social media accounts can suit your interests and attract you. In the movie, people’s eyes are scanned to show advertisements related with that person whereas people in our generation can sit behind a device to have our online identities corresponded…

    • 927 Words
    • 4 Pages
    Good Essays
  • Good Essays

    When privacy browsing is enabled on a web browser, it prevents the browser from storing information like browsing history, form data, usernames, and passwords. Without this enabled, browsers are able to store this information to be recovered at a later date. There are many reasons to use this feature. A few of these reasons are planning surprises, logging in on someone else’s computer, and using multiple accounts simultaneously.…

    • 304 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Information gathering, through networking, social media, and both on and offline storage have made it easier to collect information about an individual than ever before, with many concerns having arisen over the years about privacy and the ability to protect that privacy. As debates over personally identifiable information continue, one cornerstone remains a constant, ethics. Ethics are defined as “the standard by which human actions can be judged right and wrong (Online, 2012)”, but even that can be debated when discussed within the realm of information technology. Have you ever been to an internet shopping site and “trusted” the secure connection? Essentially, you are entrusting an inanimate system developed by an individual or group of them that may or may not believe in an ethical code. Knowing this, could there be an adverse impact on you or someone you know through personally identifiable information?…

    • 908 Words
    • 4 Pages
    Good Essays