Preview

Search Engine Data Collection Paper

Good Essays
Open Document
Open Document
989 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Search Engine Data Collection Paper
Search Engine Data Collection

Citizens’ personal information has always been actively sought by government authorities and by private businesses, and up until recently, has been kept exclusively by the institutions requesting the information. However, those days of confidentiality are over, as the world becomes increasingly structured upon the evolution of the Internet. Today, government authorities and private businesses have a multitude of ways to access personal information that is submitted through the World Wide Web, one of these methods being the surveillance and tracking of search requests through online search engines such as Google (Search Engine Privacy). The collection of personally identifiable data by search engines threatens
…show more content…
Search engine data analysis provides companies with crucial knowledge about their consumers, allowing businesses to maximize their profits by catering to their consumers’ needs and desires. An example of this is the analysis of search request trends to predict when prom dresses would sell best. One would assume that with most school proms taking place in May that March through April would be the ideal time to display prom dress content online; however, search engine data research concludes that the month with the most searches for “prom dress” is January. Companies can then take this information and capitalize by making wise choices in terms of timing (Tancer 59-68). Using consumers’ search request information to predict trends to maximize profits is a relatively benign example of how data entered into search engines can be used. Search requests contain highly personal information about consumers, such as their medical issues, religious background, political partiality, and sexual orientation, opening the door to behavioral marketing (Search Engine Privacy). By collecting information about consumer interests and habits, companies essentially have a portal into the minds of their target market, which they can use and abuse at their …show more content…
Although data collection companies claim that they screen their clients thoroughly before providing them with information, critics say that the industry's screening process is negligent (Electronic Privacy). In May 1996, for example, a television reporter based in California requested the personal information of 5,000 children from Metromail Corp., using the name of Richard Allen Davis, a well-known convicted child murderer in the state. The company released a list of more than 5,000 children's names, ages, addresses and phone numbers to this undercover reporter at the cost of $277 (Electronic Privacy). This incident exemplifies the potential dangers of releasing information to third parties and the risks of not employing a thorough screening practice in the process. Another incident of leaked information involves a 62-year-old widow, Thelma Arnold, who, along with 657,000 others, had her personal search inquiries leaked by AOL. AOL had intended the release of this information to benefit academic researchers and assigned numbers in place of names to protect the anonymity of users; however, they did not consider how easy it was to determine the identities of these users through simple investigation. As a result of this lapse in foresight by AOL detailed records of the personal search inquiries of Thelma Arnold and 657,000 other

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Websites are routinely collecting information about customers and visitors to understand and serve their customers better. Personal information is collected and administrated with integrity, responsibility, and security.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    With the development of digital technology, our data is not only being monitored, but it is being gathered and stored in such a way that makes it searchable. Daniel J. Solove had it right when he wrote, “Until recently, public records were difficult to access—finding information about a person often involved a scavenger hunt through local offices to dig up records. But with the Internet, public records are increasingly being posted online, where anybody anywhere can easily obtain and search them.”[1] Is there a form of protection against this invasion of privacy? Are we to trust these data controllers, the person or persons who control the functions and methods of the processing of our personal data? Are the government regulations decreasing our right to privacy? What is considered private these days?…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    “Terms and Conditions May Apply” offers an illuminating look at privacy in the digital age, and the potential dangers of it as our online information (data) is shared with the government, and sold to the highest bidder. In the documentary, Cullen Hoback shows how those “terms and conditions” and agreed policies allows corporations to do things with our personal information that we could never imagine. What are we really agreeing to when we click “I agree”? Through Interviews with tech enthusiasts and futurists such as Facebook’s Mark Zuckerberg, Google’s Chief Engineer Ray Kurzweil, Eric Schmidt, Christopher Soghoian and more, the documentary brilliantly examines and documents the erosion of online privacy and how the government and private…

    • 960 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Mining customer databases raises the ethical issue of customer privacy. Companies who collect data such as name, age, marital status, address, shopping habits, and geographic location without informing their customers makes their customers feel invaded. For example, when Target started sending coupons for baby items to customers according to their pregnancy prediction scores, expecting mothers felt spied on. Women were uncomfortable with the idea that Target knew about their personal lives. To correct this ethical issue, Target merged their pregnancy coupons items with items pregnant mothers would never purchase. This formula became a closely guarded secret. There are no privacy laws Target is violating, thus, they found a way around the ethical…

    • 120 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    TMA02

    • 995 Words
    • 4 Pages

    Google is useful but invades its user’s privacy. Everyone’s concerns about the Governments ‘secret’ involvement with Google, ‘Big brother’ dystopia.…

    • 995 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    The World Wide Web was created far enough back for most people not to care about the specific date. It is a great asset for school, work, and general entertainment. But, with all the good things it brings, there are some negatives as well. The internet, once a new place of discovery, is now a place of caution with danger lurking around every corner. Lori Andrews writes about the privacy issues of the web in her essay, “George Orwell…Meet Mark Zuckerburg.” Already, in her title she emphasizes Orwell’s rational fear of “Big Brother” is happening now on Zuckerburg’s social media site, Facebook. It is not just Facebook that has fallen to data aggregators invading the privacy of anyone online. Andrews describes data aggregators as people or companies…

    • 1630 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Surveillance In 1984

    • 540 Words
    • 3 Pages

    Today, the advancement in surveillance secretly results in control of one’s life by the government and is hard to avoid in modern American society. The government collects phone and internet records from technology and communications companies. They track every phone call, purchases, emails, text messages, internet searches, social media communications, and more. If one wants privacy then it is best said by David Von Drehle that “Privacy is mostly an illusion”. It is a fact that over 85% of computers worldwide are being monitored by government agencies, banks, corporations, and others too.…

    • 540 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 252 Words
    • 2 Pages

    Sangani asserts that Google’s browser computed a program that would initially concoct pictures of almost all streets located along with 30 countries between the year of 2006 and 2010. The program was addressed as “Google Streetview” (Sangani, par. 4). “Civil-rights advocates” alleged that Google forced rules upon what one could broadcast or search on the Web. Therefore, the newly designed program had quickly failed amidst the campaigners. The cameras of Google Streetview did not only capture pictures. Unfortunately, users of the program were being scammed by having their personal information swiped through “public and unprotected Wi-Fi access routers.” The personal information was combined with previously frequented Web sites and also emails. The “router owners” did not know that any of this information was being compiled at the…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    There are many Americans that worry about the invasion of their privacy. An American’s privacy can be lost by- an IP address internet cookies, government surveillance cameras, and social networking sites. There are many ways Americans can control their privacy, but sometimes the invasion of privacy is out of their control. For example, computers save all of the American’s private information without their consent.…

    • 1379 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Due to the technology available today children of all ages have access to the internet. In the 1960’s the internet became a major source of marketing, sales, and distribution of both products and services. Unfortunately many of these services were used by children under the age of 13 years old (Children's Online Privacy Protection Act (COPPA), 2011). Marketers were able to collect personal information from children through chat room and/or discussion board registration to track behavior of web suffers through advertisement and the promise of gifts in exchange for advertisement (Children's Online Privacy Protection Act (COPPA), 2011). These marketers collected this information about children and their families and compiled it into files then sold it to third parties for various commercial purposes (Koby). Also discovered were dangerous list marketing abuses. Investigative reports revealed how easily this list can be purchased and the power that can be exercised over individuals through the use of their personal information. On December 14, 1995 CNN reported that look up services could be used to locate children: “There is no law on the books that prevent a stranger from calling a 900-number and getting information about your children. In fact, until a few weeks ago, a subsidiary of R. Donnelley provided a service that did just that.” A CBS television reporter was able to purchase a list of children’s names using the name of a notorious killer (Children's Online Privacy Protection Act (COPPA), 2011). On May 12, 1996 the San Francisco Examiner reported: “To prove how…

    • 800 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Privacy is a person’s right to control access to his or her personal information. Everybody value the protection of their personal information. No one wants to see some of their personal information made public, especially on the internet. However, the recent evolution of technology has started to threaten every individual’s privacy by reducing the amount of control that they had over their personal data and making it possible for people who do not have the proper authority to access them. According to Zalta (2014), the 21st century has become the century of Big Data and advanced Information Technology allows for the storage and processing of exabytes of data. The combination of increasing power of new technology and the declining clarity and agreement on privacy give…

    • 480 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Data has become a prominent source for information about people to be discovered over the past few years. While the collection of personal data is no immediate harm to anyone, it becomes an issue when the data is used for malicious purposes. This includes spying and tracking people based on their internet history. Furthermore, data can be used by police forces to predict crimes and their victims before they occur. Although this may seem like a flawless idea, it can have harmful side-effects, such as removing the opportunity for decisions to be made by the person.…

    • 1537 Words
    • 7 Pages
    Better Essays
  • Better Essays

    The type of information over the last thirty years has changed to fit wants and needs of the public. The invention of computers and cellular phones has dramatically changed how information is able to be attained and provided. People all over the world are able to research information on subjects they are interested in regardless of location, nationality, language and personality. There are many government conspiracies on tracking and storage of information through the computer ISP (Internet Service Provider) that help monitor trends. “Many ISPs compile anonymous browsing logs and sell them to marketing companies,” in other words, if marketing companies can use private information to their benefit why wouldn’t the government use the same information as a benefit to further their policies (privacypolicies.com).…

    • 1575 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    The Internet is capable of many things but undoubtedly its main purpose is to provide the world with unlimited information. Rather than look something up in a book, today many people just ‘Google’ it, a phrase that was coined because of the dominance of Google as the world’s leading search engine. The vast amount of material on…

    • 1113 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    “More than half of all adult internet users have used a search engine to follow others’ footprints” (Pew / Internet, 2007)…

    • 531 Words
    • 3 Pages
    Good Essays