Preview

Targeted Advertisement

Best Essays
Open Document
Open Document
1973 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Targeted Advertisement
Targeted advertisement through data mining and privacy issue.

Introduction
A computer user sits in front of a screen and starts browsing their favourite website while their child similarly does the same. While this peaceful pastime activity is being enjoyed, however, they are unaware of the hidden pathways through which every detail about them is being disclosed. Because of these pathways, there are people that can get hold of the users’ names, phone numbers, IP addresses of the computers and their households. They have access to information about any users’ income, medical history, gender and age, not to mention what they searched on search-engines and which websites the users visited. They can even learn which online shopping purchases were performed by the users on any recent website.
They, who know every detail of users, are not the Big Brothers of “1984” nor are they hackers; they are online advertisers who deliver advertisement on the Internet. The computer user is vulnerable to online advertising companies that value that specific personal data. The focus of this paper is to convince advertising companies that they should enforce regulation by providing an opt-out mechanism and practice permission based data mining in order to protect consumer’s privacy. Moreover, notifying and protecting users before distributing and taking advantage of their personal information is significant to company’s accountability and furthermore allow establishing a long term relationship with customers. I will explore the issue from consumer and also an advertiser’s perspective. As a design student who has been designed companies’ logos, it is significant to gain valuable insight from this topic. By gaining the necessary information in this issue, I can navigate the internet in a more safe and secure manner as a consumer.
Background of Data Mining
Online advertising is a growing industry that is based upon the traffic from online views. “Fifty-six of the top



References: Attaran, M. (2000), “Managing Legal Liability of the Net: a Ten Step Guide for IT Managers”, Information Management and Computer Security, 8(2)2. Brown, M. & Muchira, R. (2004). Investigating the Relationship between Internet Privacy Concerns and Online Purchase Behavior 5(1),62- 71 Buchholz A., and Rosenthal B.S.(2002), Internet Privacy: Individual Rights and the Common Charters, D. (2002). Electronic Monitoring and Privacy Issues in Business-Marketing: The Ethics of the DoubleClick Experience Drumwright, E.M., Murphy, P.E., (2009). The current state of advertising ethics: industry and academic perspectives Evans, S.D. (2009). The Online Advertising Industry: Economics, Evolution, and Privacy. Journal of Economic Perspectives, 23(3), 37-60 Goldfarb, A. & Tucker C.E. (2011). Privacy regulation and online advertising. Management Science, 57(1) Korgaonkar, P & Wolin, L.(1999), “A Multivariate Analysis of Web Usage”, Journal of Advertising Research, 39(2), 53-70. Tavani, H.T. (1999) Informational privacy, data mining, and the Internet. Ethics and Information Technology

You May Also Find These Documents Helpful

  • Powerful Essays

    The year is 2010, the era is the 21st century; and we, citizens of the world, are living in the Information Age. Our information is made available on the Internet where it can be viewed by millions. The days where our data was recorded on scraps of paper and left in a box in an office along with thousands of other registers are long gone. Our personal data is permanently recorded in the hard drives of computers where they can be analysed and exploited by anyone with access to that computer; or worse, identity thieves and hackers may get their hands on the data.…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Plummer, J. T., Books24x7, I., & Advertising Research Foundation. (2007). The online advertising playbook: Proven strategies and tested tactics from the advertising research foundation. Hoboken, N.J: John Wiley & Sons, Inc.…

    • 1186 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    In 1962 history was made. An employee of Dayton Dry Goods Company named John. F. Geisse thought of the idea of an upscale discount-relating store. The Dayton Company used Geisse’s idea and opened its first store in Minnesota called “Target,” currently owned by Target Corporation. With more than 1,934 stores across the country, Target has grown into a household staple brand. In fact, Target mega-brand is second only to Wal-Mart. It’s amazing how successful Target has become in such a short period of time, but the question on everyone's mind is how? What makes Target so successful? Do they scam their everyday shoppers or are they genuinely that good? Whether it’s the colors or the adorable dog as their mascot Target is doing something…

    • 1251 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Applied Management Project

    • 13570 Words
    • 55 Pages

    12. Forrester Researchers, 2001, “European Online Advertising Will Growth”, Available At http://www.forrester.com/ER/Press/Release/0,1769,721,00.html, (Accessed: 25th July, 2010).…

    • 13570 Words
    • 55 Pages
    Powerful Essays
  • Powerful Essays

    Final English 122

    • 1481 Words
    • 6 Pages

    Protecting your personal information both on your personal computer and in other places such as your bank, or your job, has become more difficult with the massive growth of the internet and the expertise of some unsavory characters called hackers, crackers, and phreakers. Whatever they choose to call themselves, they are all thieves, plan and simple. Some people still question whether or not hacking should be illegal. It’s obvious that what hackers do is illegal. A personal computer is personal, and the information on it private. When a hacker invades that privacy, he is trespassing, and when they take your personal information, their committing a form of thievery. In addition to hackers, we now have marketers invading our privacy through the use of cookies.…

    • 1481 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    This paper will look at the ethical issues and use of Personally Identifiable Information, commonly known as PII, in computer systems, applications, and the internet. We will discuss what PII is and how it is used. There will be information on why Personally Identifiable Information is used and what can happen if it is misused. We will also discuss and look at some sample polices from the government and other large companies that address the use and safeguarding of Personally Identifiable Information. The next section will discuss what you can do to protect your Personally Identifiable Information. Finally we will look at how everything discussed can affect you and who is ultimately responsible for protecting Personally Identifiable Information.…

    • 2169 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    These days, the internet has become the center of livelihood for countless people around the world. As we continue down this path of interconnectivity throughout our businesses, educational institutions, and home life, we are leaving trails of information wherever the internet superhighway takes us. That trail of information, or web cookie, is utilized by companies to help track usage in an attempt to tailor your visits to their webpages. With those crumbs of information being stored, privacy ultimately becomes a concern but is often an afterthought. What are these companies discovering about us and what other entity could be applying this data toward less-than-noble causes? How does one react to the possibility of having one’s personally identifiable information stolen? I analyzed two…

    • 794 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Using the Internet often comprises the use of social networking sites, email facilities and the browse of various other websites. Internet privacy comes on the scene when it comes to website users giving out their personal details on the Internet. For certain websites, which facilitate online shopping, the users are made to input their credit card numbers. In case of emailing sites, there are issues about whether third parties should be allowed to store or read emails without informed consent. Whether or not, the third parties should be permitted to track the visitors on a website, is another major privacy concern. The other important Internet privacy issue is whether the sites that gather personally identifiable information from the users should store or share it.…

    • 884 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Privacy is a growing concern in the United States and around the world. As we increasingly use the Internet and the seemingly boundary less options for collecting, saving, sharing, and comparing information trigger consumer’s worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives.…

    • 1849 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    It is difficult to control and protect individual computer users as there are many different ideas of what the concept of privacy means in different countries. However, there are some basic activities that are considered an invasion of privacy no matter where you live in the world. Examples of these are as follows:…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Personal Privacy

    • 813 Words
    • 4 Pages

    The purpose of this paper is to explain what I use to protect my personal privacy. There are many different things that can be use to protect someone’s information and keep hackers from accessing their computer. Some people use anti-virus, firewalls and anti-spam software to help protect their personal privacy. As we all know with today’s technology having just anti-virus or firewalls are not good enough, but having something is better than nothing. They do not protect you from new or custom-made viruses and evil-scripts. There is no one solution to protect you from Identity Theft, it’s just too many threats to keep up with, and having one software will not do the job for you. One key to protecting your information would be multi-layer protection; this means having more than one program monitoring you computer for different reasons.…

    • 813 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Data Breach

    • 3998 Words
    • 16 Pages

    In today’s digital world, most Americans leave long electronic trails of private information wherever they go. But too often, that data is compromised. When they shop—whether online or at brick and mortar stores—retailers gain access to their credit card numbers. Medical institutions maintain patient records, which are increasingly electronic. Corporations store copious customer lists and employee Social Security numbers. These types of data frequently get loose. Hackers gain entry to improperly protected networks, thieves steal employee laptops or disgruntled workers pilfer company information.…

    • 3998 Words
    • 16 Pages
    Better Essays
  • Good Essays

    Internet Privacy.

    • 1148 Words
    • 5 Pages

    In the past thirty years computer technology has been developing very rapidly. Internet in last decade has revolutionized the way how we conduct our lives and businesses. Internet has become a daily necessity we cannot live without. Development of Internet and wireless technologies together with advancement in miniature technology has made it possible for us to have access the internet on the go. Every year we expect new and more advance models of smart phones, or new more sophisticated window systems, or new and more reliable internet security program in hope that this time advancements in technologies not only help to improve our life, but help to protect our privacy while using the internet. It seems the more advance computer and internet technologies get, the more our privacy gets violated. There is a parallel connection between internet privacy and advancements in computer technologies. Future of computer and digital technology is unlimited, and it is impossible to predict. However we should recognize the consequences of using the internet for different aspects of our lives, this will in turn help us to understand internet privacy and how to protect our privacy. Until then violation of the internet privacy will increase, and it is okay because we all learn in a process.…

    • 1148 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Langford D, 2000. Chapter 4: Privacy and Security, page-67 Internet Ethics. Published by, McMillan Press Ltd, USA…

    • 2037 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    When people think about privacy and the internet, what do they think? Do they feel secure? Or, do they feel vulnerable when it comes to using the internet at their house or in a public place? The answer to some of these questions may surprise people because some think they are completely safe at home on their home networks. But the truth is, your security/privacy is taken advantage of on the daily basis by companies and third parties.…

    • 756 Words
    • 4 Pages
    Good Essays

Related Topics