Internet Privacy, Cookies, and Data Mining Practices

:: 12 Works Cited
Length: 1034 words (3 double-spaced pages)
Rating: Excellent
Open Document
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Text Preview

More ↓

Continue reading...

Open Document

     Abstract     Technology has progressed to the point where a user's web usage can be tracked between sessions by almost anyone. Text files dropped on a user's machine, known as cookies, can give certain corporations personal information about the user, and can even keep track of what sites the user has visited. Such personal information can subsequently be sold or exploited, jeopardizing the user's privacy.

            In recent years and months, use of the Internet, specifically the world-wide web, has grown by leaps and bounds. An aspect of web-usage that has become nearly ubiquitous is web-advertising, specifically, banner advertising. However, in recent times, data mining techniques applied to data collected through web advertising have progressed to the point where individual privacy is at risk. The threat of  personally identifiable information being linked to individuals is a clear and present danger and various privacy organizations have filed complaints with the Federal Trade Commission regarding these issues (Federal Trade Commission). This paper is an examination of the privacy issues surrounding web advertising.

Banner advertising should be examined in a different light from static advertising because banner advertising is directed to individual consumers. Although static advertising, which is when an advertisement is coded into a web site, is fairly common, banner advertising is far more common because it allows advertisers the opportunity to both customize advertisements to individual users as well as collect data on those consumers. Web advertising has grown to a level where it has become a $934.3 million industry ( article/0,1401,7561_231431,00.html).  Furthermore, customization has become a very serious priority for advertisers (and content-producers in general) as repeat business now comprises more than half of all e-business transactions ( article/0,1401,7561_231431,00.html).

In addition to customization, the other advantage of banner advertising is that it allows the firms in question to practice data mining techniques that can significantly add to their revenues. "By merging the information gathered from their web site traffic analysis tools with other data sources, such as customer databases, savvy online marketers can mine their web site traffic data to maximize the effectiveness and the return on investment (ROI) of their web sites."  ( The difference between data mining techniques and traditional data extraction techniques is that data mining "extracts information from a database that the user did not know existed" (Thearling), as opposed to traditional data extraction, where the user is rarely surprised by the information gleaned.

            Although these

How to Cite this Page

MLA Citation:
"Internet Privacy, Cookies, and Data Mining Practices." 26 May 2017
Title Length Color Rating  
Data Mining and Privacy-an ethical look Essay - Data Mining and Privacy-an ethical look I. Introduction In 2001, the MIT Technology Review listed data mining as one of the top 10 technologies that will change the world.[i] So, what is data mining. For many people, the simple answer is that data mining is the collecting of people’s information when logged onto the Internet. But Webopedia emphasizes that data mining is not the collection of data itself, but the statistical interpretation of it – allowing people to obtain new information or find hidden patterns within that collected data.[ii] It is the combination of these, collection and analysis, which are cause for concern....   [tags: Data Mining Technology Technological Essays]
:: 13 Works Cited
3249 words
(9.3 pages)
Strong Essays [preview]
Essay about Data Mining Benefits and Drawbacks - Data Mining Benefits and Drawbacks Introduction In a world where computers are becoming as essential to daily life as the cars we drive or the telephones we use to communicate, it is difficult to find a person who doesn’t have some particular use for computers. Computers have become the information stores of the world. If you take a moment to think about all the kinds of information a person can and does hold on their computer it is staggering. I myself have all the passwords to my email and bank accounts, the history of every web page I’ve visited in the last 3 weeks, my credit card numbers, the complete history of all my banking transactions for the last three years stored on my comput...   [tags: Internet Data Mining Businesses Essays]
:: 5 Works Cited
2696 words
(7.7 pages)
Powerful Essays [preview]
The Privacy Invasion of Consumers Through the Internet and Bluetooth Devices - The Privacy Invasion of Consumers Through the Internet and Bluetooth Devices ABSTRACT Faster, easier, and cheaper access to a plethora of information, products and people is a primary stimulus for the growing number of online consumers who use the Internet to fulfill information foraging, communication and commerce needs. Oddly enough, these conveniences appear to override users concerns of privacy invasion. As the mechanisms behind information technologies become increasingly transparent, users must trust the companies producing the products to protect them from privacy invasion and refrain from deceitful consumer information practices....   [tags: Internet Privacy Web Cyberspace Essays]
:: 15 Works Cited
4206 words
(12 pages)
Powerful Essays [preview]
Essay about Big Data: ‘Mined’ My Business? - Imagine someone told you that every bit of personal information you have exchanged with an individual or company through any digital interface such as the internet, cell phone, GPS devices, and electronic payment systems has been piled upon millions of other people’s personal information in datasets that are unfathomably large and incomprehensible to any human mind. Would you believe it. What if the same individual continued to tell you that these data sets are “mined” using complex algorithms to discover subtle patterns, correlations, and relationships among citizens....   [tags: technology, abundance of data]
:: 5 Works Cited
1209 words
(3.5 pages)
Strong Essays [preview]
Essay on Privacy in a Digital World - Privacy in a Digital World The history of privacy in the United States is a storied one. The context of the 4 th Amendment to the Constitution has been debated for years to determine if the “right to privacy” is a constitutionally guaranteed right. Additionally, many people are technologically ignorant of what behaviors and activities will put them at risk. The “Carnivore” is a good example of an historic digital technology that generated privacy concerns. The Carnivore was a digital intelligence gathering tool that was supposed to be used by the FBI to fight crime....   [tags: Privacy America] 855 words
(2.4 pages)
Better Essays [preview]
Essay on Data Mining - Data Mining With the increased and widespread use of technologies, interest in data mining has increased rapidly. Companies are now utilized data mining techniques to exam their database looking for trends, relationships, and outcomes to enhance their overall operations and discover new patterns that may allow them to better serve their customers. Data mining provides numerous benefits to businesses, government, society as well as individual persons. However, like many technologies, there are negative things that caused by data mining such as invasion of privacy right....   [tags: Hackers Computers Technology Essays]
:: 12 Works Cited
4464 words
(12.8 pages)
Strong Essays [preview]
Essay on Internet: Compromising Personal Privacy - A part of the American dream for a lot of people is the right to have privacy. Americans are constantly worrying about the Government taking away personal the personal privacy of citizens. But people may not realize that in society today a person’s privacy is tested when it comes to using the Internet. Although the Internet can be fun and is convenient in many ways, there are many dangers associated with it. Including, but not limited to, Spyware affecting a person’s computer, the threat of credit card theft, the dangers of uploading personal photos onto the Internet, and also the dangers of putting personal information on a social networking site....   [tags: spyware, social networking]
:: 10 Works Cited
1905 words
(5.4 pages)
Term Papers [preview]
Privacy Issues with the Internet Essay - Privacy Issues with the Internet Privacy has long been as elusive as the mythical Fountain of Youth. The very idea of "protecting" information about family stirs up ominous images of powerful agencies stealing our individuality and even our identity. The fears about privacy have grown exponentially with the Web. But who are we protecting ourselves from. The government. Not likely, at least in the Orwellian sense that most of us imagine it. While Congress passes the laws and regulatory bodies enforce them, media focus of late has been on the private sector, particularly commercial Websites....   [tags: Exploratory Essays Research Papers] 654 words
(1.9 pages)
Better Essays [preview]
Is Government Surveillance a Violation of the Fourth Amendment Essay - The government is always watching to ensure safety of their country, including everything and everyone in it. Camera surveillance has become an accepted and almost expected addition to modern safety and crime prevention (“Where” para 1). Many people willingly give authorization to companies like Google and Facebook to make billions selling their personal preferences, interests, and data. Canada participates with the United States and other countries in monitoring national and even global communications (“Where” para 2)....   [tags: crime prevention, privacy, personal data]
:: 8 Works Cited
1253 words
(3.6 pages)
Strong Essays [preview]
Essay about Limited Privacy on Social Networks - Social networking sites are used by millions of people in today’s world. With reasons varying from connecting with a few old friends to sharing photos and videos, it is plain to say that social networks are a part of many individual’s lives. Sometimes the usage of social networks areusage of social networks is required for business and other times, it is just for leisure. With various individuals constantly sharing personal information or even photos from a wild party on the Internet, exactly whose hands does all of this end up in....   [tags: Facebook, Twitter]
:: 5 Works Cited
1636 words
(4.7 pages)
Strong Essays [preview]

Related Searches">practices can provide users with a fair amount of customization, there exist certain risks to individual privacy. According to the Department of Energy's Computer Incident Advisory Capability, "the vulnerability of systems to damage or snooping by using web browser cookies is essentially nonexistent." (Department of Energy) Even so, the privacy of individuals is threatened whenever users are not informed of the usage of their personal information. Individual privacy is further threatened when individuals are not even aware of the information that is being collected about them. Although DoubleClick, which along with AdForce and the Excite@Home coalition comprises 90% of banner advertising in the United States (Electronic Privacy Information Center), claims in its Privacy Policy to remove all personally identifiable information from individual data (, Privacy Policy), enough privacy rights organizations found sufficient cause for concern to file a complaint with the Federal Trade Commision in January 2000 (Federal Trade Commission).

            A problem with the current situation regarding web advertising is that although many firms have policies which allow users to opt out of their data mining practices, they are generally buried in several layers of legal padding. A good example of this is DoubleClick's policy, which allows users to opt out of receiving customized advertisements as well as avoid having their personal information go through their data mining practices (, Opt Out Policy), however, it is difficult to find, and may also prevent several non-related web-services from working. Another technology that is available to users is the use of third-party software which prevents advertisers from pulling information off a user's machine (

            In response to the January 2000 complaint against DoubleClick, the Federal Trade Commission released a report to Congress which recommended the enaction of legislation which limits the extraction of personal information from web-traffic data. (Federal Trade Commission) Currently, the Online Privacy Protection Act of 2001, sponsored by Representative Rodney Frelinghuysen, is under consideration by the House Committee on Energy and Commerce. Similarly, the same committee is also considering the Electronic Privacy Protection Act of 2001. The two bills, if enacted, would require total disclosure of all information that is extracted via electronic means and place limits on data-extraction technologies, respectively (Electronic Privacy Information Center). However, the Network Advertising Initiative, which accounts for 90% of online advertising has agreed to self-regulate and already complies with the provisions of both bills (Network Advertising Initiative Privacy Policy).

            In conclusion, although very few material threats currently exist for users who are subjected to banner advertising on the world-wide web, the implicit attacks on personal privacy that web advertising technology allows are a threat to individual rights. The fact that personally identifiable information on individual consumers exists and can be linked to individuals using data-mining techniques is a highly disturbing development. Although legislation is currently in the works (Electronic Privacy Information Center), there exists no real recourse for consumers other than to understand the technologies used and be careful about their internet usage.


Analysis Services Data Mining. SQL Server Magazine. Government Speaks Out on Cookies.

Data Mining: An Introduction.

Data Mining on the Web.

Department of Energy, Computer Incident Advisory Capability. I-034: Internet Cookies
March 12, 1998 23:00 GMT. Opt-Out Policy. Privacy Policy.

Eichelberger, Lori. "The Cookie Controversy."

EPIC's complaint against DoubleClick for violating anonymity of internet user data.

Federal Trade Commission. Issues Report on Online Profiling.

Junnarkar, Sandeep. Cnet January 28, 2000, 10:10 a.m. PT. DoubleClick accused of unlawful consumer data use.

Mining Your Web Site Traffic Data.

Network Advertising Initiative: Principles not Privacy.

Network Advertising Initiative Privacy Policy.

Repeat Business Generates Nearly Half of Web Advertising Value.,1401,7561_231431,00.html.

Thearling, Kurt. Understanding Data Mining: It's All in the Interaction.

Return to