• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Phorm and its Webwise Scheme.

Free essay example:

Phorm and it’s ‘Webwise’ Scheme.

Phorm is an American company which is working with British internet service providers (ISP)[1], to introduce a new scheme called ‘Webwise’, where it would collect information on an individual’s web browsing behaviour. This information would be used to deliver targeted advertising to the end users. The system would collect information by deep packet inspection which would inspect the contents of each webpage requests by a user. This would done through your ISP servers. This information would be used to build a profile of this user and the individual information about requests discarded[2]. For example, if I was to request information on holidays in Spain, the system would record that it may be beneficial to provide holiday provider advertising. Phorm stipulated it does not obtain details from secure web pages or collect personal data.

Phishing & Fraud Protection:

The ‘Webwise’ scheme will offer anti-fraud and anti- Phishing protection to its participants. Phishing is when a fraudulent website masquerades as a genuine website and attempts to get personal details from the user. For example pretending to be a bank and obtaining your bank account. ‘Webwise’ will check all websites against a ‘blacklist’ of known fraudulent sites and warn the user. Phishing is becoming a growing concern to internet users and is an example of social engineering.

Phorm state:

Webwise can help to reduce the numbers of consumers online who are hurt by these attacks.

We think that's being web wise[3]

Advertising:

Advertising is an essential part of any business wanting to sell its product. The World Wide Web has become a fresh challenge for advertisers, enjoying additional benefits over traditional advertising[4]. As internet users become more familiar, they tend to ignore banner ads. Advertisers had to introduce a new approach. Behavioural targeted Advertising increased the effectiveness of their campaigns. This is done by monitoring a users browsing activity, the sites he used and the searches he makes. This information is data based and analysed. The scheme, matches the user’s profile with relevant advertising. This decreases irrelevant unhelpful advertisements and can make the browsing experience more relevant and more enjoyable.  Advertisers will benefit from the scheme as their information will be delivered to interested relevant customers and not annoy the disinterested. This is currently done using tracking cookies, subscriptions to mailing lists and search engines like ‘Google’. The Phorm scheme aims to build an accurate profile as it has collected information on all websites, a user accessed.

Increased Privacy:

Phorm’s Chief Executive, Kent Ertugrul states that the ‘Webwise’ scheme is a ‘revolution for people concerned about privacy’[5]. Search engines not only collect information on a user’s browsing but also IP addresses, which is a privacy concern. Phorm claim, however, claim they do not collect IP addresses and their approach is ‘industry leading’[6]. Phorm uses a unique tracking identifier (UID) and ignores any numbers over 3 digits. It does not store any search histories or URLs unlike other behavioral targeting profiling.

Concerns

One of the concerns is user privacy. A discussion in the House of Lords, by Baroness Miller on 11-02-2009, highlighted that a user’s browsing history reveals sensitive data. For example, a user might search for health information, debt advice in times of crisis or ever issues concerning their sexuality[7]. This information is highly confidential, the internet has been compared to the postal service and we certainly wouldn’t tolerate the post office reading our mail at the sorting office.  Accessing internet packets ‘is equivalent to wiretapping a phone or opening sealed postal mail’[8].

Many campaigners argue that Phorm’s scheme breaches data protection. Many people were concerned when British Telecom trialled ‘Webwise’ without its customer's knowledge[9]. On 9th April 2008, the Information Commissioner’s office decided that Phorm is only legal if customers opt in to the scheme.

Another concern is that users concerned with privacy may start encrypting their browsing with SSL and this will increase central processing unit cycles and may slow down the user’s computer and possibly the whole internet eventually. Web access is also assisted by the use of HTTP proxies which would not be possible.

Phorm have assured that its scheme doesn’t collect personal information but the system is open to abuse. We have experienced crackers accessing information they shouldn’t and human error resulting in personal information entering the public arena so does the Phorm scheme leave the public vulnerable to this.

Spyware has been described ‘a program that monitors and gathers user information for different purposes[10] and ‘Software that transmits personal information to a third party without the user's knowledge or consent[11]It is often installed on a personal computer with shareware( free often helpful software) without the user’s consent.  Spyware is not like viruses and worms as it does not self-replicate or transmit to other computers.  It uses the computer’s resources. It can create unwanted CPU activity, disk usage and network traffic. An infected PC may freeze and have difficulty accessing the internet. Ad-ware is advertising supported software; it automatically plays and displays advertisements. A common example is ‘MSN Messenger Plus live’ a common used application.

I would conclude that Phorm’s scheme is a form of spyware, although it is not installed on a user’s computer directly. It is almost certainly transmitting and monitoring information. The trials in 2007 by BT were done without its customers consent.

(999 words)

Bibliography:

HowStuffWorks, Inc. © 1998-2009  Available at:http://www.howstuffworks.com/web-advertising.htm

inphormationdesk.org(2008) Available at :http://www.inphormationdesk.org/

PhoneCallsUK.co.uk, © Copyright 2008  Available at:http://www.phonecallsuk.co.uk/bt-webwise.html

Phorm, Inc. Copyright © 2008 Available at : http://phorm.com/

Darren Waters, Technology editor, BBC News website Available at: :http://news.bbc.co.uk/1/hi/technology/8021661.stm


[1] Wikipedia (2009) ‘Phorm’ available from: http://en.wikipedia.org/wiki/Phorm (accessed on 24.05.2009).

Cross referenced with:

Phorm, Inc. (2009) Available at: http://www.phorm.com/ (accessed 24.05.2009).

[2]

[3] Phorm, Inc. (2009) Available at: http://webwise.phorm.com/ (accessed 24.05.2009).

[4] Wikipedia (2009) ‘Online Advertising’ Available at: http://en.wikipedia.org/wiki/Online_advertising (accessed 24.05.2009.

[5] BBC Radio 4 interview - 16 April 2008, Available at: http://www.bbc.co.uk/radio4/today/listenagain/ram/today2_internet_20080416.ram

[6] Phorm, Inc. (2009) Available at: http://privacy.phorm.com/ (accessed 24.05.2009)

[7]

 Tim Berners-Lee ,  (2009-03-09), ‘ No snooping’ Available at: http://www.w3.org/DesignIssues/NoSnooping.html (accessed 24.05.2009)

[8] Tim Berners-Lee ,  (2009-03-09), ‘ No snooping’ Available at: http://www.w3.org/DesignIssues/NoSnooping.html (accessed 24.05.2009)

[9] The Register (1998-2009) Available at: http://www.theregister.co.uk/2008/02/27/bt_phorm_121media_summer_2007/ (accessed 24.05.2009)

[10] Trendmicro (2009) Available at: http://us.trendmicro.com/us/threats/enterprise/glossary/s/spyware/index.php (accessed on 24.05.2009)

[11] Mcfee (2009) Available at: http://www.mcafee.com/us/security_wordbook/spyware.html ( accessed on 24.05.2009)

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

(?)
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Related AS and A Level ICT Skills and Knowledge Essays

See our best essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    So therefore the cart gets saved to the IP address for a certain amount of time. How effective are the techniques used to attract customers and retain their loyalty? The major ways that LatestDVD9.com uses to entice and retain customers is by being always up to date.

  2. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    Town/City, Postcode, Telephone Number, Balance �, Balance � Order Details Order ID, Customer ID, VAT, Order Date, Delivery Price, Total �, Total � Items Ordered Order ID, Product ID, Quantity, Total Price Product Details Name, Colour, Stock, Price, Image Outputs Reports A list of customers and payment details A list

  1. The different aspects of the design of my website for Hatch end cars.

    extra 8200 bytes Total size required- 90200 bytes Car table: Bytes for table- 3+14+2+30+4+10+5= 68 bytes Number of cars by the total bytes for table- 68*800 Total size required for table- 54400 bytes Plus 10% extra 5440 bytes Total size required- 59840 bytes RENTALS and OLD RENTALS table: Bytes for

  2. Personal effectiveness

    self-development phase and can be incorporated effectively in your performance in social and work environments. Good communication encourages team spirit, higher performance and greater job satisfaction amongst employees. There are three basic components of any form of communication: facts, emotion and needs.

  1. Database Coursework on a Rental System: Design

    user will detect this as a letter cannot be entered when the input mask requires a digit, and vice versa. Validation Rules: - Validation rules are techniques used in the process of data validation. These rules check that data falls within the parameters defined by the systems analyst.

  2. Database Analysis & Design

    both program and create a database as well as use one Disadvantages The disadvantages of a Hierarchical database are, * Very rigid strict structure, a new table is needed if a new field is needed. This means changing the database to add one simple field, this is a lot of work.

  1. Website Design, Creation and Evaluation

    impressions glance at the site as it appears in our browser: I think that the site clearly reflects the nature of a business. Everywhere you look there are products on offer. Let us now assess the site against the principles listed previously: 1.

  2. AO3 Investigate how search engines work

    These search engines filter out filthy things on the internet such as swear words and sexual content and instead is dominated by children sites displaying facts and information's kids can ask simple questions such as "why how far is the moon from the earth ?and can also go on games and stuff.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work