INTERNET PRIVACY Marketing companies www.doubleclick.net The cookie leak security hole in the HTML Email messages The Web Bug Can we trust the privacy.

Slides:



Advertisements
Similar presentations
Tracking and Tracking Systems. » What are tracking systems? » What are Impressions, Clicks, Leads and Sales? » Tracking Impressions » Tracking Clicks.
Advertisements

The Web Wizards Guide to Freeware/Shareware Chapter Four Essential Tools for Web Page Authors.
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
Small Business Resource Power Point Series Web Site Development – A Beginners Guide.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
$200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $500 $100 Category One Category Two Category.
Unit 12 Using the Internet & Browsing the Web.  Understand the difference between the Internet and the World Wide Web  Identify items on a web page.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
Copyright © 2004 Pearson Education, Inc. Slide 7-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
17 April Using Technology. Where Can You Use Technology? Product Sales Marketing Operations Finances Salaries Inventory Logistics Analysis Market Customer.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Internet Cookies: Changing Internet Use and Privacy Lindsay Maidment & Katherine Hollander November 8, 2006.
The Internet. What is the Internet? A community with about 100 million users Available in almost every country about 160,000 people are added each month.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP does not maintain state. State Information can be passed using: HTTP Headers.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
 Communicating with friends is now easier than ever, for example on Facebook you can connect with all your friends and chat to them very easily and instantly.
Behavior Tracking Dhaval Patel.
Jared Cinque Section 6.  Internet tracking is the process of following internet activity backwards from recipient to user through a special type of software.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
Chapter 16 The World Wide Web Chapter Goals ( ) Compare and contrast the Internet and the World Wide Web Describe general Web processing.
Chapter 16 The World Wide Web. 2 The Web An infrastructure of information combined and the network software used to access it Web page A document that.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Internet Basics A management-level overview of the Internet, its architecture, capabilities, and protocols. Copyright 2011 SPMI / Online Development.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Internet Vocabulary 1-21 State Test Vocabulary. Address address, Internet address, and web address. A code or series of letters numbers and/or.
Informatics Computer School CS114 Web Publishing HTML Lesson 2.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Canadian Advertising in Action, 6th ed. Keith J. Tuckwell ©2003 Pearson Education Canada Inc Elements of the Internet World Wide Web World.
COOKIES. INTERNET COOKIES What are they Where are they found What should you do about them.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
UNESCO ICTLIP Module 1. Lesson 61 Introduction to Information and Communication Technologies Lesson 6. What is the Internet?
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
How To Automate At Least 80% Of Your Online Business With.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
Application Layer Honolulu Community College Cisco Academy Training Center Semester 1 Version
Internet Security and Your Computer Welcome to Boot Camp.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP Headers Client IP Address HTTP User Login FAT URLs Cookies.
Lesson 15 : Networks And The Internet
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
 Internet –INTERnational NETwork is the network of computer networks.  It is a Wide Area Network(WLAN).You can have unlimited access to internet. 
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
(class #2) CLICK TO CONTINUE done by T Batchelor.
Hyperlinks Links for Other Pages. Hyperlink (aka Link) Text (or image) user can click Takes user to different location In general, location can be: On.
Web Content And Customer Relationship Management Solution. Transforming web sites into a customer-focused, revenue generating channel with less stress.
CS 115: COMPUTING FOR THE SOCIO-TECHNO WEB TECHNOLOGIES FOR PRIVATE (AND NOT-SO-PRIVATE) COMMUNICATIONS.
IT Security  .
Personal spaces.
ComputerScience Security and Privacy Concerns of Starbucks.com
E-commerce Business uses of internet, e-commerce & e-business, e-marketing, e-payments etc.
Unit 12 Using the Internet & Browsing the Web
How To Automate At Least 80% Of Your Online Business With
Internet and security.
COOKIES.
Latest Updates on BlackHawk Mines Music : Privacy Policy
Navigating the Internet
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
ONE® Pages Training Presentation
Digital $$ Quiz Test your knowledge.
Internet.
Chapter 16 The World Wide Web.
Presentation transcript:

INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy policies of Web sites Web police Some tips to eliminate the fears of web security References

Double click is a banner ad company, it provides it’s address so when any one click on that address most of the information about that person will be transferred from the user computer to the DoubleClick server. These information can be any thing like: personal identifiable information or transactional data. Personal data like: address Full name Mailing address Phone number Transactional data like: Names of movies a user searches for Detail of a plane trip Health conditions

The cookie leak security hole in Html messages A cookie is a small text file that a website can place on the computer’s hard drive in order for example to collect information about the user activities on the site or to make possible for the user to use online “shopping cart”. The cookie transmits this information back to the Web site’s computer.

The Web Bug Web Bug is a graphic on a Web page or in an message that is designed to monitor who is reading the Web page or the message. Web Bugs are invisible because they are very small in size, they are only 1x1 pixel. They are represented As HTML IMG tags. When a Web Bug is viewed these information will be sent to a server: The IP address of the computer that fetched the Bug The URL of the page that the Bug is located on The URL of the Bug image The time the Bug was viewed The type of browser that fetched the Bug A previously set cookie value

CONT. Here are two examples of a web bug <IMG WIDTH=1 HEIGHT=1 border=0 SRC=" t_1x1_RunOfSite_A ny&db_afcr=4B31-C2FB- 10E2C&event=reghome&group=register&time= ">

Can we trust the privacy policies of Web sites? Most of the web site providers give assurances that they will never share or give any information about their customers. But most of the time these companies can’t keep up with their promises. One example is InfoBeat, a news letter published by Sony Music. In InfoBeat privacy policy, they promised to never to give out a subscriber’s address: ( We will NEVER release, sell or give a subscriber's name or address to any other party or organization, without the subscriber's explicit permission). I think the people at the InfoBeat were at some sense honest, but what they forget about was the banner ads companies that appear in the newsletter. And we know from previous examples what these companies will do to get the information they want.

Web police It is an international organization dedicated to protecting and serving the users of the Internet community. It has 61 agencies world wide. It provides services such as: investigation, tracking, recording, prosecution, termination of the criminal activities on the Internet. The organization has a database that contains records of every criminal reported since These records help the organization to develop new procedures to prevent future Internet crimes.

Some tips to eliminate the fears of Web security Encrypt your Emial; there is a software that allows you to convert your file into a secret code that looks like random garbage. Get a free account, and use that address, because it is easier to cancel and/or change that than your real one. Caution your kids never to give away addresses, last names or phone numbers. Use undercover shoppers like ( Public Eye ) to investigate websites Use an uneasy guess password.

References Web programming/ Internet privacy ( Web programming/ Internet privacy/cookie ( International web police an agency of interGOV ( Your guide to the best of the web ( Web bug FAQ (