Essay PreviewMore ↓
Student José Amador likes to use his email account at yahoo.com. "I find paper so obsolete," he says. Amador is not worried about the privacy of this account. Perhaps he and the many other people that use yahoo email should be concerned, however. All users of Yahoo mail are having their actions tracked.
Yahoo monitors the actions of users, in part, by using "cookies." Cookies are small files that record visits to web pages. When you open up a cookie dispensing web page, the web server sends one or more of these files to your browser. The cookies will usually contain a number that is unique to that browser. Then the next time that this browser opens that particular page, the web site will both send a new cookie and retrieve the old one. This makes it possible, for sites to compile lists of how often visitors go to a particular page as well as when they visit it.
By themselves, cookies cannot reveal the identity of the user. All these files can do is store information about domain names and the rough location of the visitor. That said, if the site requires registration and a sign in -as is the case with yahoo email, for example- then site administrators can combine the two streams of data with ease. Cookies also cannot send viruses. They are only text files thus preventing that danger. Readers who want to view the cookies stored on their browser should search for a file called on cookies.txt on PCs or a file called MagicCookie on Macs.
Web site administrators say that the primary purpose of cookies is not to track Internet surfing habits. Rather they argue that cookies allow users to customize their experiences on the web. Services like My Yahoo would not work nearly as smoothly without cookies.
How to Cite this Page
"Essay on Internet Privacy - Cookies and Internet Privacy." 123HelpMe.com. 23 Jan 2019
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Cookies and Internet Privacy Student José Amador likes to use his email account at yahoo.com. "I find paper so obsolete," he says. Amador is not worried about the privacy of this account. Perhaps he and the many other people that use yahoo email should be concerned, however. All users of Yahoo mail are having their actions tracked. Yahoo monitors the actions of users, in part, by using "cookies." Cookies are small files that record visits to web pages. When you open up a cookie dispensing web page, the web server sends one or more of these files to your browser.... [tags: Exploratory Essays Research Papers]
1537 words (4.4 pages)
1383 words (4 pages)
- Abstract Technology has progressed to the point where a user's web usage can be tracked between sessions by almost anyone. Text files dropped on a user's machine, known as cookies, can give certain corporations personal information about the user, and can even keep track of what sites the user has visited. Such personal information can subsequently be sold or exploited, jeopardizing the user's privacy. In recent years and months, use of the Internet, specifically the world-wide web, has grown by leaps and bounds.... [tags: Technology Essays]
1034 words (3 pages)
- Abstract: Internet cookies have been around for a few years now, and have become quite widespread in usage. However, their use has attracted criticism from some privacy experts. They claim that cookies give a web site's administrator power to monitor an internet user's travel through the internet - a blatant infraction into the anonymity on the internet. What is being done to counter this claim is also discussed. A cookie is a small text file placed by a Web server on a client's browser for identification purposes. This small text file (usually less than 1K in size) can contain information to identify a user to the Web server.1 The cookie is given during the first meeti... [tags: Essay on Internet Privacy]
3702 words (10.6 pages)
- Cookies Invading Our Privacy Cookies now constitute a real threat to personal privacy, but they are perfectly legal. A cookie is a tiny file that a Web sites place on the user’s hard drive when the user accesses the web page. Each cookie has a specific identification number. The cookie can gather personal information such as email addresses, full names, mailing addresses, and phone numbers, and then it sends the information back to the web site (Samborn 26). Whereas TV, radio, and print record only demographics or neighborhoods, a cookie keeps record of what an individual is actually looking at and doing on the net.... [tags: Internet Technology Computers]
367 words (1 pages)
- ... If you think about it that can be pretty scary and it makes you ponder about what type of privacy do we really have. Digital footprints have a negative aspect on an individual’s life. A damaging aspect would consist of an individual going on a “naughty” website or a photo appearing online that they don’t want others to see. Having “damaging” aspects can affect your life or profession. Once information is entered on the Internet it adds to your preexisting digital footprints. These digital footprints are not permanent but they are not easy to clear up.... [tags: World Wide Web, Internet privacy, Internet]
1089 words (3.1 pages)
- Data Communications “Cookies and their Impact on Privacy” In today’s fast paced world of internet commerce it would be hard to accomplish many of the tasks without the creation of “cookies.” Since their advent, cookies have been given a bad name and associated immediately with a loss of privacy. In April of 2001 a newspaper article defined cookies as, “…programs that Web sites put on your hard disk. They sit on your computer gathering information about you and everything you do on the Internet, and whenever the Web site wants to it can download all of the information the cookie has collected.” (www.howstuffworks.com) This article could not be any farther from the truth.... [tags: essays research papers fc]
558 words (1.6 pages)
- ... This is a clear violation of one’s privacy. Three main characteristics of technology are amplification, routinization and sublimation. “Amplification refers to the ability of technology to extend the ability to gather private information, routinization is the actual process of making intrusion into private life and sublimation is the means by which a technique for privacy invasion becomes increasingly difficult to detect” (Rotenberg). Not too long ago, actress, Jennifer Lawrence’s leaked photos were all over the internet.... [tags: Facebook, Privacy, Twitter, Internet]
1407 words (4 pages)
- As the explosion of internet social media based companies has grown the issue of privacy has been at the forefront of many people’s mind. Privately held information can easily become available to people and be negatively used due to the digital age we are in today. Two of the leading companies in social media are Google and Facebook. This case study analysis explores both Google and Facebook’s privacy policies and issue that has stemmed from it. Google and Facebook recently have taken a lot of backlash from people and governments regarding the way they handle the information they have gathered from the consumers that use their products.... [tags: The Internet]
1214 words (3.5 pages)
- Internet Cookies Most Experienced Web visitors and even new ones know about cookies these days. Cookies are small data files that are being put on your hard drive by Web sites when you visit them. They do this for many different reasons. One of them is to identify you as a distinctive visitor by identifying your Web browser software. When your return to the Web site that has stored a cookie, it will search your computer for those cookies, and they will know what you were doing in the past. It may update your cookie.... [tags: Essays Papers]
567 words (1.6 pages)
Furthermore some argue that cookies allow advertisers to better serve consumers. Josh Quittner made this point in a January 29, 1999 column for Time magazine. (It is available online at http://www.pathfinder.com/time/digital/yourtech/0,2936,19123,00.html.) Quittner says "advertising is unavoidable" so "the smarter the ads, the better." He then closes the column by saying "Now if you'll excuse me, I'm going to go order some books, wine and pharmaceuticals online. And I don't care who knows it."
Various governments have acknowledged these concerns. A number of European countries are considering legislation that would make it illegal for businesses to amass information in this fashion without first warning people. In the United States the opposition is less powerful but it does exist. In March of 1998 the U.S. Department of Energy released a report on cookies with mixed conclusions. On one hand the report said that generally there was no problem with the use of these files. But this would only be the case if businesses remained ethical in how they used cookies.
Proponents of cookies like to brush aside these privacy concerns with a quartet of arguments. They deny that it is possible for cookies to scan hard drives or capture valuable information such as credit card numbers. Furthermore the server that sent the cookie is the only one that can read them. If that is not reassuring enough then users can easily block cookies if they so choose. All it takes is a couple of clicks after opening open preferences from edit menu in both Microsoft Internet Explorer and Netscape Navigator. Finally they point out that web sites can know a lot of things about visitors such as the type of browser being used and the Internet Protocol number of the user regardless of whether cookies are being used.
The main problem with either model is that they fail to consider that a velvet glove tends to cover the iron fist (stare) of surveillance in the real world. Sociologist David Lyon makes this argument in his excellent 1994 book The Electronic Eye: The Rise of the Surveillance Society. The publication date precludes any mention of cookies yet Lyon perfectly describes the ambiguities that surround these files. It is false and wrong to deny that cookies can make surfing the web more fun. At the same time, though, cookies do allow for the increased surveillance of people.
Lyon goes on to explain that this surveillance is not harmless. It is not just about providing people with ads better suited to their interests. Rather this information helps to create electronic identities of people. The information contained in these identities will do a lot to determine whether a person can get a loan or access to credit. Since consumption is the primary means in countries such as the U.S. for people to feel that they are part of the mainstream, Lyon contends that what is at stake is no less than decisions over who are full-fledged citizens and who are not. Of course none of this is new. Businesses have long determined the credit ratings of people and sociologists have argued that this plays an important role in the construction of an underclass. And cookies are far from the only means of monitoring people on the Internet so this process would be going on even if these files never existed.
So are they worth it? There is no simple answer to this question. Mere individual choice is not enough however. It is easy to say that people who want the convenience of cookies should accept them while others should set their browsers to reject these files. Yet, as any electronic commerce enthusiast will say, the standards of the future are be determined on the Internet right now. In the future people might not have the choice on whether to accept cookies or not. For that reason as well as the stakes that are involved, it is necessary to begin a public discussion on what is acceptable about cookies and what is not. Ironically and luckily, the medium that spawned cookies -the World Wide Web- makes it relatively easy to have just such a conversation.