• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Precise analysis about The legal or illegal utilization of Internet cookies

Extracts from this document...

Introduction

Customers’ privacy:  Precise analysis about

The legal or illegal utilization of

 Internet cookies

----------------------------------------------------------------------------------------------------

Introduction

Increasingly, dependencies to the Internet and online shopping are being placed among People. Every wise business man can quickly realize this opportunity and its profitable commercial potential. According to Gilbert (cited in Palmer 2005, paras 2-3), in recent years, Internet sales have grown incredibly, by 2002, 67 million American were buying their goods via internet.  Beside this potential place for businesses, marketers are always like to identify and track highly active customers. By growing the importance of commerce in the Internet, some of annoying marketing techniques such as cookies and spamming has been rapidly grown among marketers which are problem for most Internet users. It is clear that the most important thing in Internet for every user is privacy. These years, Cookies (not edible or delicious one), has been a controversial debate among users in case of Internet privacy threat.

Despite apparent disaffection of Internet users about cookies it is still firmly used by most marketers. The problem is there is not any firm legislation and clear explanation about cookies. As Swartz argues (cited in Palmer 2005, paras 2-3), recent high level of attempts to perform legislation about cookies performance, show public sense of concerns among Internet users about Electronic Commerce new techniques. It must be completely clear for every user that how and when their information are used by marketers and most important thing is what kind of information do usually marketers use for their business profits.

However, it have been done a lot of research about cookies and also most of Internet users have at least primary knowledge about Internet cookies but most users do not know about cookies threat and also they even do not know how can they completely block or delete the cookies.

...read more.

Middle

    N

    Y

     91% Y

Familiarity

with

cookies

   N

   Y

   N

   Y

    Y

   N

    Y

    Y

    Y

    Y

    Y

    Y

     75% Y

Viewpoint

on

cookies

   ---

  Neg

   ---

  Neu

  Pos

   ---

 Neg

 Neu

 Pos

 Neg

 Neg

  Pos

  33% Neg

Getting data without permission

Disag.

Disag.

Disag.

Disag.

Agree

Disag.

Disag.

Agree.

Agree.

Disag.

Disag.

Agree

66% Disag.

Table 1 provides the number of important various aspects about Internet cookies.  First (refer to the first row of table 1) it demonstrates measure of online shopping popularity among some Internet users. According to the result, all of the interviewees except one of them have online shopping experience (91%), which means these days most Internet users have been rapidly trended toward online shopping. This result is similar to those of Gilbert (cited in Palmer 2005, paras 2-3), who says Internet sales and online shopping has grown quickly in recent years.

Table 1.  Internet users’ information about Internet cookies and their experience.[1]

Secondly (refer to the second row of table 1), this table demonstrates Internet users’ familiarity with cookies. As stated by results, 75% of 12 users are familiar with Internet cookies which it is a good result about Internet users’ awareness about cookies. This result may also exhibit their consciousness about privacy in Internet. Consequently, at the first glance, it might appear that most of Internet users are careful about cookies threat and also have a negative outlook about cookies but according the third results of table 1 (third row), almost 40% of respondents have neutral or even positive point of view about cookies. User 5 (pers. Comm. June 20, 2007) says “I think the threat the threat to your privacy is overrated. I do not think they are dangerous unless you are buying from a dangerous website and if you want to buy anything from that sort of website then serves you right if you get in trouble”.

...read more.

Conclusion

If more questionnaires had been replied by respondents, it would have been easier to reach a more comprehensive conclusion about Internet cookies. There were some obstacles such as lack of time and limited number of respondents which caused my research not to be as accurate as it could be.

Reference list:

Bennett, C 2001, `Cookies, Web bugs, Webcams and Cue Cats: Patterns of

     Surveillance on the World Wide Web`, Ethics and Information Technology

     3(3), 197-210.

Berteau, S 2007, Berteau, S, viewed 10 June 2007,

     <http://www.ca.com/au/blogs/posting.aspx?pid=133127 >.

Fasser, S n.d., Fasser, S, viewed 8 June 2007,

     <http://www.sas.com/success/avenuea.html >.

Freedman, E 2005, Cookies for Your Firms, viewed 10 June 2007,

     <http://www.pa-lawfirmconsulting.com/pdfs/technology/

     COOKIES_FOR_YOUR_FIRM.pdf >

Lin, D & Loui, M 1998, Taking the Byte out of Cookies, viewed 17 June 2007,

     <http://cpe.njit.edu/dlnotes/CIS/CIS350/TakingTheByteOutOfCookies.pdf >.

Mason, N 2006, Mason, N, viewed 12 June 2007,

     <http://www.clickz.com/showPage.html?page=3576146 >.

Nash, S 2002, Nash, S, viewed 8 June 2007,

    < http://www.sitepronews.com>.

Palmer, D 2005, `Pop-Ups, Cookies, and Spam: Toward a Deeper Analysis of the    

     Ethical Significance of Internet Marketing Practices`, Journal of Business Ethics,  

     Vol.58, DOI 10.1007/s10551-005-1421-8, pp. 271-280.

Scott, A n.d., Scott, A, viewed 9 June 2007,

     <http://www.aereal.com/cookies/ >.

Schneider, G 2002, New perspectives on E-commerce: Thomson learning, Boston.


[1]   Y=yes, N=no, Neg=negative, Pos=positive, Neu=neutral, Disag=disagree

[2]  Y=yes, N=no

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    Contingency approaches are alternative methods when conducting systems development. This approach enables a customized approach to be developed which applies to the organisation and development in question. This approach is useful as it enables flexibility within the development process, taking into account the system users, socio-technical and political aspects.

  2. Lifecycle Management Of Information Technology Project In Construction

    to define and work with other ?econdary view? in order to maximize their own effectivene??. Variou? view? are candidate? for primary view?. For example, UML-ba?ed Unified Proce?? mentioned earlier i? organized around view? de?cribing the functional breakdown (workflow?), ?equential pha?e?, and de?ign artifact? (model? and document?). In con?truction, however, the few view?

  1. Interactive Web Apps - Ajax

    other two tables that have been created from the database people.mdb : <%@ Register Src="player.ascx" TagName="player" TagPrefix="uc2" %> <%@ Register Src="linktable.ascx" TagName="linktable" TagPrefix="uc3" %> <uc2:player ID="Player" title="Players" runat="server" /> <uc3:linktable ID="linktable" title="Contact Details" runat="server" /> These grid views are also created in the web user controls and one is a

  2. Implementation of Path Finding Techniques in Homeland Security Robots

    = g(n) + h(n) . Since g(n) gives the path cost from the start node to node n, and h(n) is the estimated cost of the cheapest path from n to the goal, we have f(n) = estimated cost of the cheapest solution through n .

  1. Create an online catalogue system that specialises in children's toys and enables users to ...

    because it allows users to integrate data from multiple sources (Orfali et al 1996). It is also possible to modify a tier without affecting any of the other tiers. Scalability is increased because the middle tier can share database connections across clients and so the application server can be deployed

  2. Develop a Puzzle Website for users of three different age groups, Kids, Teenagers and ...

    and the technologies that could be used. The majority of functions in the system that we had planned to develop have, in the main, been developed but how we had planned to achieve it has been modified. We envisaged a system with a user interface that could easily be navigated and was intuitive.

  1. Introduction to Internet Report- - creating a website

    { if (i<10) { i="0" + i; } return i; } </script> <!--End of Java Script--> <!--CSS Code Name--> <body onload="startTime()"> <div id="txt"></div> </h1> <!--Header Image--> <img src="images/sideways.jpg" alt="" width="801" height="144" /> <ul id="navigation"> <!--Links to next page--> <li><a href="index.html" title="?">Home</a></li> <li><a href="sidew.html" title="?">SideW News </a></li> <li><a href="videos.html" title="?">Videos</a></li> <li><a

  2. Precautions against internet scamming

    E-commerce requires high security for it to be effective. This is because some people perceive internet to be a channel of realizing big gains and valuables from foreigners and they may end up compromising E-commerce (Burrel, 2011). Attorney Bill Rathford told Ecommerce times that "Blatant fraud, like the fake-news diet promotions and other online scams that have sprouted in

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work