Download presentation
Presentation is loading. Please wait.
Published byAdela Johnston Modified over 9 years ago
1
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy
2
Introduction Privacy on the Net Growing concern Much information gathered Who will use it? How will it be used? Three basic technologies of concern Cookies Tracking Bugs
3
Introduction Some technologies have useful purpose Cookies Tracking May be used maliciously also What if government is behind it? “Big Brother”
4
Cookies Small data file placed on your computer May contain Username and password Favorite sites Last time you visited Uses: Identifies your preferences Eliminates need to log on
5
Cookies Name comes from “magic cookie” as used by Unix programmers Packet of data passed between programs Nor meaningful itself Used as an identifier like a coat check ticket Created by Lou Montulli 1994 at Netscape
6
Cookies Why cookies? The Web is basically “stateless” No memory of previous events A site doesn’t “know” that You’re a user You have an ongoing “conversation” Sites only Accept requests Deliver content
7
Cookies Cookies are formatted in a special way Can only be read by the site that placed them Where are cookies stored? Netscape Cookies.txt file Each line is one cookie Internet Explorer Tools … Internet Options … Settings … View Files
10
Cookies How they work You visit a Web site Your browser examines the cookie files If one from that Web site is found Browser sends that file’s information to the site Site now “knows” something about you Servers can place cookies on your hard drive With/without your permission
11
Cookies Example – you’re shopping on the Web Cookie established for you with a unique “shopping session ID” May have an expiration date Every time you put an item in your cart, the site’s server Erases old cookie Stores new cookie (with all your current items) Server can read your cookie at any time to find the current status
12
Tracking Examine log files What pages are most popular? What IP addresses are using a site? How many pages are read in a typical visit? What order are pages read in? What page are users on when they click on a link that brings them to another page Clickthrough
13
Tracking Sniffers Examine packets coming into or out of a site Identifies users Cookies IP addresses
14
Tracking Accumulates data about Who is making requests? Where are the requests coming from? Average amount of time spent on a site Average number of pages read per session Most popular pages Helps make sites better
15
Bugs “Bug” as in “wiretap” Can be included in email Lets others actually view your email Basic purpose is to trace a user’s use of the Web Sites they visit How they get from one site to another Can also be used to intercept email
16
Bugs Works in HTML-enabled email An offer of some service or for a product Email contains two items: JavaScript code that can read the email message A “clear GIF” HTML reference to a tiny graphic One pixel in size Transparent (so you can’t see it)
17
Bugs The JavaScript code reads the email Your browser contacts the server to download the clear GIF Remember what’s in a packet? Identifying information Your IP address The server now knows something about you
18
Bugs The server can place a cookie using identifying information sent by Web bug Can match cookie with identifying information from the email Can now track your use of the Internet Who responded to this offer If that person forwards the email to someone else the process begins again
19
Internet Passports Lets user control Which personal information can be released to a Web site What type of information on surfing habits can be gathered How that information can be used
20
Internet Passports Variety of methods available Platform for Privacy Preferences (P3P) P3P Privacy Finder at Carnegie Mellon University Privacy Finder Privacy Finder Internet Content and Exchange Standard (ICE) ICE Open Profiling Standard (OPS) OPS Starts by filling out a profile For more information search for “internet passport” or go to www.passport.com www.passport.com
21
Privacy Organizations Electronic Privacy Information Center http://www.epic.org/ http://www.epic.org/
22
Internet Passports Starts by filling out a profile Identifies person Name, address, phone, etc. Identifies Surfing data that can be shared Or not! Profile stored in browser When person visits a Web site the passport is sent to that site
23
Internet Passports Site’s server examines data in the passport Might automatically log a person in if they included their username and password in the passport While at site the person reads a sports story and buys a book Profile permits inclusion of sports story but not about the purchase
24
Internet Passports Person visits another site That server “sees” that the person has recently read a sports story But not about the purchase because the passport doesn’t permit it Might then send him an ad about sports memorabilia But not about books on sale
25
Internet Passports At a different site the server “sees” that the person has restricted information about their buying habits Server declines to send Web pages to a user with this kind of profile The user can’t even view the Web site
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.