One of the most important advances in the rapidly developing world of electronic commerce is the ability of companies to develop personalized relationships with their customers. Personalization empowers companies to better understand their customers' wants and desires and improve customer service by tailoring offerings to the unique needs of individuals . At the same time, this has become a subject of hot controversy because the technology involves the extensive collection and use of personal data.
Many, if not most, online shoppers and surfers are not aware of the extent of how much and what kind of info can be gathered about a person, even someone who is just visiting and not shopping or signing up for anything. Through the use of the "cookie" technology, a person’s movement through the Web can be tracked to provide information. Using cookies a website assigns each individual a unique identifier (but not the actual identity), so that the he may be recognized in subsequent visits to the site. On each return visit, the site can call up user-specific information, which could include the consumer's preferences or interests, as indicated by documents the consumer accessed in prior visits or items the consumer clicked on while in the site. Websites can also collect information about consumers through hidden electronic navigational software that captures information about site visits, including web pages visited and information downloaded, the types of browser used, and the referring websites' Internet addresses. The result is that a website about gardening that Jane Doe that could sell not only her name to mail-order companies, but also the fact that she spent a lot of time one Saturday nig...
... middle of paper ...
...http://www.personalization.com/soapbox/ [2000, April 24].
Perez, R.K. (June 1998). Sharing of Passwords Angers AdAge Subscribers [7 paragraphs]. Internet World. [On-line]. Available: http://www.iw.com/extra/password.html [2000, April 24].
University of Wisconsin-Madison Writing Center (September 1998). APA Style: Citing Electronic Resources. Writer's Handbook. [On-line]. Available: http://www.wisc.edu/writing/handbook/elecapa.html [2000, March 27].
Unknown author (June 1998). A Little Privacy, Please [9 paragraphs].
PC Magazine Online. [On-line].
Available: http://www.zdnet.com/pcmag/news/trends/t980610b.html [2000, March 27].
Westin, A.F. (November 1999). Personalized Marketing and Privacy on the Net: What Consumers Want. Privacy & American Business Consumer Privacy Survey [On-line].
Available: http://www.pandab.org/pabsurve.htm [2000, March 30].
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- ... Medical records are stringent laws that are privileges given to user access. This is called Medical privacy. Information privacy can be applied in multiple ways. This includes encryption, authentication and data masking. Each of these are intending to make their information secure and only available to whom are authorised access. These protected techniques are aimed towards preventing unauthorised access into their information, which is illegal in most parts around the world. Different types of advanced technology all create newer threats and potentials.... [tags: Privacy, Internet privacy, Internet]
1212 words (3.5 pages)
- In today’s society, if you ask a random person if he or she has a social media like Facebook, Twitter, etc. most likely the answer will be yes. Users upload their personal information online to communicate and inform friends and families about their life, but what they fail to know is how large of a scale that data is watched under surveillance. Corporate companies and government officials are part of the group that uses other people’s information for their own purpose. Computer users are constantly watched whenever they search the Internet.... [tags: Information, Facebook, Internet]
1854 words (5.3 pages)
- Consumer Privacy Introduction Privacy is a complicated concept and it is also relatively new; it only goes back around 400 years. We can see the different ‘layers’ of it through the pass of time, the first one was refers to architecture ‘the bricks and walls layer’, the second one to legislation and laws ‘the paper layer’ and most recently a third layer controlled through digital technology ‘the code layer’. The focus of this paper is the code layer. In the world today, with smart phones, computers and the web, companies are collecting, storing and sharing consumer’s information like never before.... [tags: technology, marketers, legislation]
2611 words (7.5 pages)
- Media Article Dan Tynan, “Your Facebook profile may be sold by a Russian hacker”, PC World website, 26th April 2010. Section A – Presentation of the issue The first decade of the second millennium has seen a technological and communicational boom, something especially seen in everything which is inside or related to the internet. The internet and its facilities has become a very big part of the human of today as it is useful not only to individual people but to groups of people. The most popular form in which users get to use the internet these days is with social-networking.... [tags: Information Technology ]
931 words (2.7 pages)
- With the fast evolving social network technology, the anonymity network identity will ensure that the privacy of the MUs exists. The implementation of this system can help eliminate all the security and privacy problems affecting MSNs at the moment. This is because the network identity of the device plays a major role in establishing connections between devices. If the internet servers adopt this system, the security and privacy concerns in MSNs will be a problem of the past. ComScore reports that social networking takes up about 84% of the internet users in the world.... [tags: social networking]
1682 words (4.8 pages)
- ... Moreover, Brown points out that cognitive biases of users in the privacy issue were existent, which illuminates the need for governmental regulation in a sense that individuals are lured by immediate benefits and make non-optimal privacy decisions (Brown, 2013, pp.6-7). Policy makers should strengthen regulation related to privacy and personal data to protect citizens’ online activities. Intellectual property Policies should stay relevant and in sync with the rapid development of technology.... [tags: Policy, Economics, Government, Human rights]
1261 words (3.6 pages)
How the Growth of Electronic Monitoring Has Changed Employee Expectations of Privacy in the Workplace
- The use of the internet for personal pursuits in the workplace has seen phenomenal growth over the last quarter century. Along with this growth, employers and employees alike have used the internet as a tool to increase profit, manage time and facilitate communications. However, such technological advancement has its issues. The problem investigated is how the growth of electronic monitoring has changed employee expectations of privacy in the workplace. Should employees be able to use the internet for personal items while working.... [tags: Business Management ]
1155 words (3.3 pages)
- ... The code of ethics has to be applied to the IT world as well. The first rule according to Florence Nightingale was not to cause harm to the sick patient (Simpson, Ethics and Information Technology How Nurses Balance When Integrity and Trust are at Stake, 2006). Scientific advances with the use of technology will need to be compatible with the rights of people, dignity and safety (Simpson, e-Ethics New Dilemmas Emerge Alongside New Technologies, 2005). Another principle that plays an important role in nursing informatics is Fidelity.... [tags: privacy, patient, protect]
1151 words (3.3 pages)
- Edward Joseph Snowden popularly known as Edward snowden was born on 21 June 1983 in Elizabeth city, Northern Carolina, who is an anex, who is an American Computer Professional and also a former employee of the National Security Agency NSA. He also worked for Central Intelligence Agency “CIA”. Snowden moved with his family to Ellicott City in the year 1995 where he studied computers at Anne Arundel Community college between the years of 1999 and 2005. During this period he was also in the army for a period of 4 months.... [tags: NSA, security files, privacy]
1026 words (2.9 pages)
- More people can reach one another today than in years past because of social networking sites. The world has become a lot smaller because of sites like Facebook, MySpace, LinkedIn, and many others. There are certainly many advantages to using these resourceful social networks, such as keeping up with friends and family, sharing photos, and staying up to date with current events. Nonetheless, there is a growing concern about privacy, or the lack thereof, because of these sites. The ability to determine your privacy settings is at times confusing, and at other times, simply misleading.... [tags: Social Network Sites, Privacy, Internet]
987 words (2.8 pages)