Internet Cookies: Changing Internet Use and Privacy Lindsay Maidment & Katherine Hollander November 8, 2006.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Presented by: Your Name Your Phone Number Your Website Address How Your Local Business Can ATTRACT and KEEP Customers Through Mobile Marketing.
Organizing Your Argument The Argumentative Essay.
Back to Table of Contents
6/10/2015Cookies1 What are Cookies? 6/10/2015Cookies2 How did they do that?
17 April Using Technology. Where Can You Use Technology? Product Sales Marketing Operations Finances Salaries Inventory Logistics Analysis Market Customer.
What are cookies? Cookies are text files stored on one’s computer after visiting a website Used for: -Storing information such as a unique visitor ID -Allowing.
Web-tracking and Adware Hannah Muihrienne Julie Chris.
PayPal as an Additional Payment Option How Merchants Can Benefit When They Accept PayPal on Their Site.
Customer Service and Web Site Personalization Back to Table of Contents.
Creating a Web Site Back to Table of Contents. Creating a Web Site Conceiving a Web Site Planning a Web Site 2 Creating a Web Site Section 9-1 Section.
REALTOR.com ® /Internet Facts & Figures The Power to Sell Your Home.
Behavior Tracking Dhaval Patel.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
O VERVIEW What is information security? Cell Phone Fun Facts General Use of Cell Phones Cell Phone Safety Tips Internet Fun Facts General Use of Internet.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Online Goods and Services. Topics Online Shops and Physical Goods Online Shops and Physical Goods Booking Systems Banking Education and Training Gaming.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Near East University Department of Computer Engineering E-COMMERCE FOR LAPTOPS SELLING COMPANY Abdul Halim Abu Kuwaik
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
CSCI-100 Introduction to Computing Privacy & Security Part II.
By: Elizabeth Scruggs Digital Citizenship Project.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Web Metrics Terminology & Measurement. Visit A visit is a Web user with a unique address entering a Web site at some page for the first time that day.
Target relevant customers. Remarketing with Google Remarketing with Google. Target customers who have already shown an interest in your business.
Internet Safety Internet Safety LPM
Online Safety 2.02 Remember the rules of online safety.
PAYPAL PRESENTED TO:SIR ADNAN PRESENTED BY:SAIMA ASGHAR
Cookies By: Kendra Alvarez. Concepts of Cookies Cookies are pieces of information generated by a Web server and stored in the user's computer, ready for.
. There are 2 ways in which Cable Ties can use the technicians smartphone to track their current location. 1. GPS – uses satellites to triangulate the.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer-made Cookies Presented by Helal Lutfi. What is a Computer Cookie?  A small text file which contains a unique ID tag.  Placed on your computer.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Reach people on mobile. Mobile Search Ads Reach people with Mobile Search Ads.
Chapter 1: Internet Marketing Foundations. Chapter Objectives Describe how computers and servers communicate to enable people to interact with webpages.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
E commerce Online Shopping Website at Rs. 7920/-.
COOKIES Gloria Soria Network Security COSC 356. What is a Cookie? A cookie is a piece of text that a Web Server can store on a user's hard disk. Cookies.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Some from Chapter 11.9 – “Web” 4 th edition and SY306 Web and Databases for Cyber Operations Cookies and.
Internet Marketing Company How To Find Diamond From Clutter Internet marketing is the usage of the World Wide Web to provide online shopping or advertisement.
CSCI-235 Micro-Computer Applications Privacy & Security I.
Fox Scientific, Inc. ONLINE ORDERING 101. Welcome to our website On our main page you can find current promotions, the vendors we offer, technical references.
Personal spaces.
The Internet Industry Week Two.
Ways to protect yourself against hackers
Internet and security.
Importance of Privacy Internet Safety
Google Privacy Policy Karen Tao.
Computer Security.
E-COMMERCE Learning Unit 4: ADVERTISING IN E-C0MMERCE
Do You Have Multiple Amazon Seller Accounts? Amazon Knows it! By EsellersCare Contact : +1 (855)
Presentation transcript:

Internet Cookies: Changing Internet Use and Privacy Lindsay Maidment & Katherine Hollander November 8, 2006

Why talk about Cookies?  We wanted to choose a topic that we did not know much about  As a technologically advanced generation, we use the internet virtually everyday  Read about DoubleClick Inc. and its business tactics

Which best describes an internet cookie?  A) A hacker breaks into your computer and looks at your files.  B) The telephone number that dials into an online service.  C) Files downloaded onto your computer that track your online habits.  D) I have no idea.

Business Week Survey…  A) Hacker – 6%  B) Phone number – 4%  C) Tracking file – 75%  D) Didn’t know – 15% **This survey was a telephone survey of 1,014 randomly selected adults between March 2 and March 6 of 2000, by Harris Interactive.

Knowing the Basics:  In the Business Week survey in 2000, only 40% of the randomly selected knew what an internet cookie was. **This survey was a telephone survey of 1,014 randomly selected adults between March 2 and March 6 of 2000, by Harris Interactive.

What is a cookie?  A text file which a website can store on its visitors’ hard drives  Made up of numbers and letters  Generally, cookies are a simple ID file  Sometimes they can store more complicated information  Also called “name-value pairs”

What’s the point?  Sites use cookies to…  Track number of visitors  First timers vs. returning visitors  How often the user visits the site  Why?  Frequent Buyer example  $$$ from Advertisers

Where are cookies?  You can find cookie files on your hard drive, your “C” drive.

Mmmm! cookies…  They remember usernames for various sites that require log-in  Also have the option to remember your passwords for you!  They allow you to shop as you browse via online shopping carts!  Cookies provide user customization of sites, like weather.com & msn.com

Bittersweet: the problems  Multiple users on the same hard drive  Family computer, internet cafes  Credit card fraud Credit card fraud Credit card fraud  Easily erasable  Throw off site’s total counts  Can contain spyware!  Can pass on personal information without user’s permission ( address, phone number, credit card number, etc.)

DoubleClick Inc.  Developed cookie program that can follow and save user internet browsing  Such cookie files are saved into text profiles  Profiles can be extensive and detailed  Serves over 200 billion ads per month

Benefits of DoubleClick:  Advertisers!  Allows internet advertisers to place their ads on sites or pages which will reach their target audiences  Online Shoppers!  Can provide easy access to interesting products without the hassle of a long search  Jeans Example

Doubts behind Doubleclick:  Announced plan to link anonymous cookie profiles to personal user information without user’s permission.  Invasion of privacy! (In depth look at DoubleClick litigation) Invasion of privacy! Invasion of privacy!  DoubleClick planned to turn around and sell the comprehensive profiles to other companies.  Spam & Spyware can be found within cookie files without user’s knowledge.  Samantha Jones example

Life without cookies…  Many sites are heavily dependent on cookies and may not function well without them  Some may not function at all  Erasing cookies prevents visitors from making use of certain amenities sites offer

Questions? Or Comments?