Web-tracking and Adware Hannah Muihrienne Julie Chris.

Slides:



Advertisements
Similar presentations
The Web Wizards Guide to Freeware/Shareware Chapter Three Customizing Your Online Experience.
Advertisements

SPYWARE Presented by The State Security Office November 17, 2004.
Spyware and Adware Rick Carback 9/18/2005
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
17 April Using Technology. Where Can You Use Technology? Product Sales Marketing Operations Finances Salaries Inventory Logistics Analysis Market Customer.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Internet Cookies: Changing Internet Use and Privacy Lindsay Maidment & Katherine Hollander November 8, 2006.
 Copyright 1999 Prentice Hall 17-1 Chapter 17 Direct and Online Marketing PRINCIPLES OF MARKETING Eighth Edition Philip Kotler and Gary Armstrong.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
3-1 Chapter Three. 3-2 Secondary Data vs. Primary Data Secondary Data: Data that have been gathered previously. Primary Data: New data gathered to help.
How It Applies In A Virtual World
By: Mr Hashem Alaidaros MKT 445 Lecture 3 Title: Affiliate Marketing.
Introduction Social Implications & EthicsSocial Implications & Ethics Since the introduction of the Internet, many policies have been introduced as a way.
Issues Raised by ICT.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
HTTP: cookies and advertising Concepts to cover:  web page content (including ads) from multiple site: composition at client  cookies  third-party cookies:
Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
By Dina and Sanskriti. Online marketing  is the marketing of products or services over the Internet.  many forms of it. This includes: display advertising,
Robert Crawford, MBA West Middle School.  Summarize the danger of sharing personal information on the internet.  Explain how cookies and global unique.
Staying Safe Online Keep your Information Secure.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Day 2. The norms of appropriate, responsible behavior with regard to technology use Communic ation Commerce Literacy Access Etiquette Law Rights & Responsibi.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
Web-site Design Strategy.  For P4, learners are required to design a website for LocalBiz - Manningham, this is for a specified purpose and a defined.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Protecting Students on the School Computer Network Enfield High School.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
BEHAVIORAL TARGETING IN ADVERTISING By Rita Aliperti.
Chapter Twelve Digital Interactive Media Arens|Schaefer|Weigold Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Marketing / Law / Digital Keith Arrowsmith. Court ActionPress Complaints CommissionTrading StandardsGambling Commission.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Privacy and Data Mining What Do “They” Know About You?
1 Trustworthy Browsing Ian Moulster Software + Services Lead Microsoft Ltd.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
By Alex Mayak.  What is spyware?  History of spyware.  What effect does spyware have on your computer?  What spreads spyware?
E-SAFETY PARENT’S WORKSHOP THURSDAY 5 TH MAY. PASSIVE NO EXCUSES! We can’t be PASSIVE - being unaware or ill-informed is not an excuse!
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Online Advertising You’ve seen millions of these! But you need to know some of the reasons why companies use them And some basic details of how.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Applications Software. Is a software used to carry out a particular task e.g. a game or word processor.
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
Create online Store. If you want to compete the world more efficiently then you have to create online store for your existing business and merge it with.
Internet Basics 10/23/2012. What is the Internet? It’s a world-wide network of computer networks. It grows hourly and involves national governments, communities,
Managing Windows Security
Unit 11 Using the Internet & Browsing the Web
Bab 14 Managing Direct and Online Marketing.
Internet and security.
Privacy or Security Are they the same?
Guide: How to Set, Get, and Delete Cookies in WordPress? Guided By: wpglobalsupportwpglobalsupport.
Direct and Online Marketing
HOW DO I KEEP MY COMPUTER SAFE?
Customer Data.
Chapter 21 Managing Direct and Online Marketing Marketing Management
Privacy and Data Mining
Privacy and Data Mining
Chapter 21 Managing Direct and Online Marketing Marketing Management
The Dark Side of the Internet
Presentation transcript:

Web-tracking and Adware Hannah Muihrienne Julie Chris

Levels of Familiarity Number of Indiv. In Class

Definitions Cookies: are small text files downloaded to a user’s computer that preserves preferences on specific websites Cookies: are small text files downloaded to a user’s computer that preserves preferences on specific websites – First Party Cookies: Used by site host domain – Third Party Cookies: Used by domains other than one currently viewing » 1 st party: » 3 rd party:

Definitions Adware: is a software package that displays advertising materials on to an individual’s computer Spyware: are commercially produced for the purpose of gathering information about computer users

Why Created? Cookies remember customer preferences. Cookies remember customer preferences. Adware increase company profits. Adware increase company profits. – Piggybacks on cookies to target customers Spyware is a type of adware Spyware is a type of adware – Designed to aggregate data across websites

Benefits of Cookies Convenient for users who aren’t computer savvy. Convenient for users who aren’t computer savvy. – Remembers User Names and Passwords – Allows for searches and shopping carts to be saved over multiple visits.

Benefits of Cookies Data collection is made possible. – Online sellers lack the ability to see their customers like the owner of a physical store. Data collection allows them to gain a better understanding of their customers and market their product in order to effectively compete with the physical stores.

Using Cookies Use allows marketers to know their target customers with advertisements. Use allows marketers to know their target customers with advertisements. – Makes online shopping experience more personal. – Example: Similar to VIC Cards – Example: Gmail Gmail o Relationship between Adware and Cookies

Drawbacks Unwanted Effects – Popups – Slow down/Degradation of system o Adware Attack Adware Attack

Drawbacks Adware commercially produced at users expense – Often bundled with “free” software – Costs arise through pop-ups/system slow-downs Many users unintentionally download adware – Because they don’t read EULA

Drawbacks Security Security – Third party access to information. – Hackers – AOL example

Users’ Privacy Is Invaded By These Programs Number of Indiv. In Class

Do Users’ Have the Right to Privacy? Invasion of Privacy Invasion of Privacy – Not aware when information is being stored. – Don’t know how long information is stored. – Example: Gmail Gmail Users agree to privacy agreements. Users agree to privacy agreements. – The information is there, but users rarely read it

Government Should Be Allowed to Collect Information Number of Indiv. In Class

Should the Government Have Access to Information?

Several weeks worth of search queries were subpoenaed by the Justice Department Several weeks worth of search queries were subpoenaed by the Justice Department – Test a filtering system to limit children’s exposure to pornography New statutes now require ISP’s to keep information New statutes now require ISP’s to keep information – Help fight global terrorism – Limit children’s exposure to online pornography

Solutions Do-Not-Track-Me List Opt-in settings Educating users

Group Activity Break up into groups and discuss criticisms of these solutions. – Do you think they will work? Why or why not? Can you think of other possible solutions?

Guide to Protection Protection video

Web-tracking and Adware Hannah Muihrienne Julie Chris