The most lucrative business on the Internet is marketing. Companies have come up with ingenious ways to generate revenue with very targeted advertising. Each company has their unique method to identify their consumers, some more complicated than others. For example, on a website geared to new mothers the advertisements would reflect that by advertising for baby diapers or formula. This type of targeted advertising is understood and acceptable. The consumer benefits by having advertisements in their interests and the vendor has a higher likelihood of making a sale. The Internet has introduced novel ways to track consumer habits and interests thereby creating smarter advertising. Microsoft employs their browser Internet Explorer using “cookies” to track user habits. Cookies are pieces of text stored by a user’s web browser, they are sent back and forth every time a user accesses a web page. These can be tracked to follow web surfers’ actions. Cookies are used to store...
... middle of paper ...
...egulation may not be a solution, history has proven that the power to resolve this glowing lack of privacy lies within the hands of the people themselves. The manner in which similar issues were resolved in the past, elucidate on the present. The now famous company Truste created the Web Privacy Seal, the little icon that tells you the website is secure. Ten years ago users were to afraid to buy anything in the internet with their credit cards for fear of identity theft, now one can just look for that seal. As mentioned before Facebook’s privacy changes prompted 2.2 million Facebook members to form a group protesting these changes. Consumers are recognizing the threat to their control and in the same way in the past have come up with ingenious ways to protect themselves they will continue to stand up for their rights that will ultimately affect company policies.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
755 words (2.2 pages)
- Privacy: Security, Confidentiality, or Convenience. INTRODUCTION The evolution of the Internet started from the department of defense's project, and rapidly distributed to world wide. With the rise of the Internet age comes with the benefits and the concerns. Because of the easeness to communicate information and displaying data, the first amendment needs to be applied to this communication channel. How are we using and communicating information without offending and harm others. Since the evolution of the Internet, there has been acts from Congress to regulate the use the Internet such as the Communications Decency Act in 1996 and the Child Online Protection Act in 1998.... [tags: Internet Privacy Secure Cyberspace Essays]
3152 words (9 pages)
- Introduction The purpose of this report is to provide information about Radian6's social media monitoring software and the use of their software to manage marketing information. The primary focus of this report is to analyse key issues that face marketing researchers in relation to the use of Radian6's software, and to provide recommendations to marketers who are considering using the software to gather marketing information and engage customers. This report is made up of four key issues: choosing the right tools to gather primary data, ensuring relevance of netnographic data, gaining insight into data and using market data to help manage customer relationships .... [tags: Marketing ]
2495 words (7.1 pages)
- ... Piczo and Flickr revolved around mainly pictures being shared and Mixi was one of Japans top social media sites. At this time, Facebook was only allowed to be used in the Harvard College where it was designed by Mark Zuckerberg. It was not until 2005 when Facebook launched a site for high school students as well. This is where the profits of advertising set in for the social media network and the way we share things online transformed and expanded drastically. In addition,during 2005, is when Youtube took off and started storing and retrieving videos for the public.... [tags: society, connection, rights, laws]
1290 words (3.7 pages)
- Privacy in a Digital World The history of privacy in the United States is a storied one. The context of the 4 th Amendment to the Constitution has been debated for years to determine if the “right to privacy” is a constitutionally guaranteed right. Additionally, many people are technologically ignorant of what behaviors and activities will put them at risk. The “Carnivore” is a good example of an historic digital technology that generated privacy concerns. The Carnivore was a digital intelligence gathering tool that was supposed to be used by the FBI to fight crime.... [tags: Privacy America]
855 words (2.4 pages)
- Privacy of Digitized Personal Information Privacy of personal information is a fundamental right of any person. No one wants his/her private details to be known to other people, especially ones who they are not familiar with. However, human society is based on cooperation between people. Society simply cannot function without this vital interaction between two human beings. No one is that capable or skillful enough to fulfill his/her daily requirements alone. The very fabric of society exists because a person has to depend on other people to get things done.... [tags: Private Privacy Information Argumentative Essays]
3497 words (10 pages)
- Ethical Issues Raised by Privacy Service Providers Abstract: This paper examines the use of Internet technologies (specifically SafeWeb.com) to counteract invasions of personal privacy and censorship. The paper begins by exploring the methods by which governments, corporations, and commercial agents invade personal privacy. It also discusses Internet censorship on the corporate and governmental levels. It then proceeds to discuss SafeWeb.com, a technology that allows Internet users to surf the Web privately and view censored content. The paper finishes by exploring some of the ethical issues raised by Internet privacy and censorship in specific relation to SafeWeb, concluding... [tags: Exploratory Essays Research Papers]
2877 words (8.2 pages)
- Choicepoint: A Case of Privacy in the 21st Century Introduction Since its founding in 1776, America has been a country where the rights of individuals are one of the most important issues. As time has passed and the country progressed, this issue has evolved and taken different forms; the Civil War was fought over whether people of all colors had the right to freedom, in the early 20th century women finally demanded their long overdue right to vote (Wikipedia, 2003), and most recently, in the 1960’s, people of color had to assert their right to equal treatment under the laws of this nation.... [tags: Capitalism Information Privacy Market]
1725 words (4.9 pages)
- Ethical Management of E-mail Privacy As I am sitting at my work station in a crowded office building, I hear the wonderful sound of "You've got mail." In turn I open my E-mail mailbox and find a letter from a nearby employee. This letter contains the usual funny joke of the day and a short joke ridiculing the boss, as usual. Who was to know that my supervisor would eventually find this letter, which would lead to both the termination of my job and my fellow employee. Do you feel this is right.... [tags: Privacy Electronic Email ]
2392 words (6.8 pages)
- Privacy Globalization is the tendency of businesses to spread throughout the world to offer their products and services. To reflect their global market presence, multi-national companies have adopted management models such as region-specific management, and product-specific management to maximize the potential to offer efficient products and services to their customers. One such management model that has been successful in the past few years is the business process outsourcing model. Businesses outsource processes such as back office operations and customer support services offshore.... [tags: Business Information Essays]
2203 words (6.3 pages)