• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Precise analysis about The legal or illegal utilization of Internet cookies

Extracts from this document...

Introduction

Customers’ privacy:  Precise analysis about

The legal or illegal utilization of

 Internet cookies

----------------------------------------------------------------------------------------------------

Introduction

Increasingly, dependencies to the Internet and online shopping are being placed among People. Every wise business man can quickly realize this opportunity and its profitable commercial potential. According to Gilbert (cited in Palmer 2005, paras 2-3), in recent years, Internet sales have grown incredibly, by 2002, 67 million American were buying their goods via internet.  Beside this potential place for businesses, marketers are always like to identify and track highly active customers. By growing the importance of commerce in the Internet, some of annoying marketing techniques such as cookies and spamming has been rapidly grown among marketers which are problem for most Internet users. It is clear that the most important thing in Internet for every user is privacy. These years, Cookies (not edible or delicious one), has been a controversial debate among users in case of Internet privacy threat.

Despite apparent disaffection of Internet users about cookies it is still firmly used by most marketers. The problem is there is not any firm legislation and clear explanation about cookies. As Swartz argues (cited in Palmer 2005, paras 2-3), recent high level of attempts to perform legislation about cookies performance, show public sense of concerns among Internet users about Electronic Commerce new techniques. It must be completely clear for every user that how and when their information are used by marketers and most important thing is what kind of information do usually marketers use for their business profits.

However, it have been done a lot of research about cookies and also most of Internet users have at least primary knowledge about Internet cookies but most users do not know about cookies threat and also they even do not know how can they completely block or delete the cookies.

...read more.

Middle

    N

    Y

     91% Y

Familiarity

with

cookies

   N

   Y

   N

   Y

    Y

   N

    Y

    Y

    Y

    Y

    Y

    Y

     75% Y

Viewpoint

on

cookies

   ---

  Neg

   ---

  Neu

  Pos

   ---

 Neg

 Neu

 Pos

 Neg

 Neg

  Pos

  33% Neg

Getting data without permission

Disag.

Disag.

Disag.

Disag.

Agree

Disag.

Disag.

Agree.

Agree.

Disag.

Disag.

Agree

66% Disag.

Table 1 provides the number of important various aspects about Internet cookies.  First (refer to the first row of table 1) it demonstrates measure of online shopping popularity among some Internet users. According to the result, all of the interviewees except one of them have online shopping experience (91%), which means these days most Internet users have been rapidly trended toward online shopping. This result is similar to those of Gilbert (cited in Palmer 2005, paras 2-3), who says Internet sales and online shopping has grown quickly in recent years.

Table 1.  Internet users’ information about Internet cookies and their experience.[1]

Secondly (refer to the second row of table 1), this table demonstrates Internet users’ familiarity with cookies. As stated by results, 75% of 12 users are familiar with Internet cookies which it is a good result about Internet users’ awareness about cookies. This result may also exhibit their consciousness about privacy in Internet. Consequently, at the first glance, it might appear that most of Internet users are careful about cookies threat and also have a negative outlook about cookies but according the third results of table 1 (third row), almost 40% of respondents have neutral or even positive point of view about cookies. User 5 (pers. Comm. June 20, 2007) says “I think the threat the threat to your privacy is overrated. I do not think they are dangerous unless you are buying from a dangerous website and if you want to buy anything from that sort of website then serves you right if you get in trouble”.

...read more.

Conclusion

If more questionnaires had been replied by respondents, it would have been easier to reach a more comprehensive conclusion about Internet cookies. There were some obstacles such as lack of time and limited number of respondents which caused my research not to be as accurate as it could be.

Reference list:

Bennett, C 2001, `Cookies, Web bugs, Webcams and Cue Cats: Patterns of

     Surveillance on the World Wide Web`, Ethics and Information Technology

     3(3), 197-210.

Berteau, S 2007, Berteau, S, viewed 10 June 2007,

     <http://www.ca.com/au/blogs/posting.aspx?pid=133127 >.

Fasser, S n.d., Fasser, S, viewed 8 June 2007,

     <http://www.sas.com/success/avenuea.html >.

Freedman, E 2005, Cookies for Your Firms, viewed 10 June 2007,

     <http://www.pa-lawfirmconsulting.com/pdfs/technology/

     COOKIES_FOR_YOUR_FIRM.pdf >

Lin, D & Loui, M 1998, Taking the Byte out of Cookies, viewed 17 June 2007,

     <http://cpe.njit.edu/dlnotes/CIS/CIS350/TakingTheByteOutOfCookies.pdf >.

Mason, N 2006, Mason, N, viewed 12 June 2007,

     <http://www.clickz.com/showPage.html?page=3576146 >.

Nash, S 2002, Nash, S, viewed 8 June 2007,

    < http://www.sitepronews.com>.

Palmer, D 2005, `Pop-Ups, Cookies, and Spam: Toward a Deeper Analysis of the    

     Ethical Significance of Internet Marketing Practices`, Journal of Business Ethics,  

     Vol.58, DOI 10.1007/s10551-005-1421-8, pp. 271-280.

Scott, A n.d., Scott, A, viewed 9 June 2007,

     <http://www.aereal.com/cookies/ >.

Schneider, G 2002, New perspectives on E-commerce: Thomson learning, Boston.


[1]   Y=yes, N=no, Neg=negative, Pos=positive, Neu=neutral, Disag=disagree

[2]  Y=yes, N=no

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. The purpose of this assignment is to research about Electronic data interchange and needs ...

    (20) Just in time manufacturing systems, used in many auto assembly plants, it is cannot exist without EDI. The plants need to communicate manufacturing and shipping schedules to their suppliers daily, which is why automotive EDI suppliers are required to be EDI-capable by their automotive customers.

  2. Qualitative Risk Analysis

    Alternative assumptions that may be true should be identified and their impact on the business objectives tested in the qualitative risk analysis process. o Data precision ranking. Qualitative risk analysis requires accurate and unbiased data if it is to be helpful to business management.

  1. Introduction to Internet Report- - creating a website

    450px solid #9D9D9D; } <!--Header 3 size, color and font--> h3 { font-size: 14px; color: #333; font-style: italic; float: left; margin-left: 10px; } <!--This option lets me make specific paragraph style--> #quotes p { font-size: 12px; color: #333; float: right; margin: 2px 20px; } <!--News section--> #introductionnews { float: left;

  2. The project explains various algorithms that are exercised to recognize the characters present on ...

    For example, out of 128 pixel values, if a block consists of 85 black pixels and 43 white pixels, then all pixels in the block are converted to black pixels with the binary value of 0's. Once each block is transformed to 1's or 0's, this digitized format is further used for the vector generation.

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    methodologies and user participation. As research states ISD methodologies provide the development process but don't address specifically how to involve the users. Soft Systems and Multiview Methodologies challenge this issue, however it has been found that philosophical explanations are provided which lack instructional detail for developers.

  2. A bucketing framework for Database security

    that deal with unidimen- sional values have the new attribute columnName to know with witch column they are linked to. 3.3 Indicators In order to perform some measures on the tables and on the partitions, we have implemented the indicators introduced in [4].

  1. Methods and technology used in Computer Forensics

    Altering a disk's HPA (Host Protected Area) and DCO (Device Configuration Overlay) are two methods through which data can be hidden on a hard drive10. The majority of hardware manufacturers incorporate both of these into their disks. HPA sets a hidden partition, or in the case of some vendors, like Dell for example, a recovery partition, which

  2. Precautions against internet scamming

    recent years, only serves to undermine consumer confidence and eventually marketers and business as a whole," (Baker, 2011). The access to resources should be controlled and business transactions should be authenticated. The web pages should be used by users who are registered.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work