The use of web bugs at Homeconnection - Speech or Presentation Example

Comments (1) Cite this document
Name Institution Course Date The Uses of Web Bugs in Home Connections Introduction A web bug is a graphic on a web page or in an electronic mail communication that is developed to check people who are reading the web page or electronic mail message. Web Bugs are usually undetectable since they are characteristically only 1-by-1 pixel in dimension…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
The use of web bugs at Homeconnection
Read TextPreview

Extract of sample "The use of web bugs at Homeconnection"

The Uses of Web Bugs in Home Connections Introduction A web bug is a graphic on a web page or in an electronic mail communication that is developed to check people who are reading the web page or electronic mail message. Web Bugs are usually undetectable since they are characteristically only 1-by-1 pixel in dimension. They are symbolized as HTML tags. They are usually invisible in the web page or electronic mail so as to conceal the fact that the page is in fact being monitored. However, bugs are not always invisible because any images that are used in the web page can actually be considered web bugs. Information is usually sent to a server when a web bug is viewed by people. Firstly, the IP address of the computer system that viewed the bug. An IP address is a unique number that is developed when the computer system has been manufactured, and it is usually for communication purposes with the servers when the computer is connected to the internet. The other information sent to the server is website details where the bug is located, the URL of the web page graphic and lastly the kind of browser that viewed that web bug graphic(Stefanie Olsen 76). Web bugs are usually by advertising networks to key in information to people’s personal profiles of the websites a person is viewing. The individual profile is usually determined by the browser cookie of the advertising networks. In addition, web bugs are usually used to collect data relating to how many people have viewed a particular website, and this helps the website’s developers to determine whether the web page is of any meaning to the general world. Last but not least, web bugs are used to collect statistics about the usage of web browsers at varied locations on the internet (Wendell  531). The other use of a web bug is that it can be utilized to determine whether a certain message sent was actually read by the recipient. This enables the sender of the message to evaluated whether the information that he/she was passing on to the recipient whether it was actually received. In addition to this, some people always try to be anonymous when sending information. As stated earlier, the server collects the IP address is provided by the web bug. This IP address can be used to get the location of the sender of the message. This helps in preventing cyber crimes. When used in organizations, web bugs usually give computer specialists an idea of how many times a message has been read and distributed to other persons inside or outside the organization. Web bugs are used to accumulate little amounts of data on the user’s hard disc and swap it with the website server every time the web page is opened. Presently, the principal confidentiality risk is the capability to keenly followed website visitors by giving an exclusive label that is kept in the server and preserved by the website. As a consequence, each time the web user opens the web page, the exclusive label stored in the server is harmonized with a label kept in a database on the website, arising from browsing routine information being stored and maintained on particular web visitors and therefore web bugs can be used to identify new visitors to the website while other collect specific user information which can be used by website developers to improve on the contents of their websites (Garfinkel 47). Web bugs can as well be utilized to protect information against illegal use and copying of other people’s written arts of work. If a webmaster puts a bug on every page in a website and an unauthorized individual copies the content to their pwersonal website, each moment a person at the distant website clicks to study that content, the fixed web bug will trace the content to the initial website. The webmaster can find confirmation of this by analyzing server data. Conclusion The use of web bugs in web pages is usually contentious. This is because they permit citizens to be checked when they least expect it, they undoubtedly can be extremely disturbing. For instance, most computer users will always be distressed to discover that an unknown person is monitoring when they read their mails. To some people, it is unethical to use web bugs, but to others it is advantageous to use them for security reasons among others. While to others, they are not even aware that web bugs actually exist. Works Cited Wendell O. Computer Networking, New York, Cisco Press, 2004. Garfinkel S., Spafford G., Web Security, Privacy and Commerce, USA, O'Reilly Media Inc,2000. Richard M. Smith, Web Bug Basics, New York Macmillan Publishers, 1999. Read More
Cite this document
  • APA
  • MLA
(“The use of web bugs at Homeconnection Speech or Presentation”, n.d.)
The use of web bugs at Homeconnection Speech or Presentation. Retrieved from
(The Use of Web Bugs at Homeconnection Speech or Presentation)
The Use of Web Bugs at Homeconnection Speech or Presentation.
“The Use of Web Bugs at Homeconnection Speech or Presentation”, n.d.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
connellyviolett added comment 11 months ago
Student rated this paper as
I had an issue with a speech or presentation types of works. All until I came across this website and this particular essay. Even though "The use of web bugs at Homeconnection" is far from my studies, the structure is so great that I use it all the time as an example for my own works.

CHECK THESE SAMPLES OF The use of web bugs at Homeconnection

Controversial Issue of Use of Cookies in Web Browsers

...Controversial Issue of Use of Cookies in Web Browsers Summary Whereas information technology has brought remarkable changes in the modern society, the same has come with its challenges and controversies. Cookies are used to make browsing faster, easier and efficient by analyzing, recording, and storing the activities of an internet browser. Virtually all sites especially commercial sites use cookies to make it more efficient for users to access and navigate the sites. However, unethical use of cookies for personal benefits has brought a lot of controversy. Ethical use of cookies lies in the hands of the programmers and site owners. It is even more controversial that cookies affect the privacy of the internet user and the cookies... ...
3 Pages(750 words)Essay

Fireflies (lightening bugs)

... and increasing light pollution, their habitats are getting destroyed and they are not able to communicate among each other through their light signals anymore. This is posing great risk to their survival. Works Cited “Disappearing Fireflies.” Firefly. N.p., 2013. Web. 25 Sep 2013. . Hadley, Debbie. “Life Cycle of Fireflies and Lightning Bugs.” Insects., 2013. Web. 25 Sep 2013. . “How Do Fireflies Light Up?” Howstuffworks. How Stuff Works Inc., 2013. Web. 25 Sep 2013. . Megasko, Cherri. Where Have All the Fireflies (Lightning Bugs) Gone? Yahoo Inc., 2013. Web. 25 Sep 2013. bugs-gone-12161034.html?cat=7>.... ?[Your full September 23, Fireflies (Lightening Bugs) Fireflies (lightening bugs) belong to thenocturnal family...
3 Pages(750 words)Essay

Web Technology: Web Development

...? Web Technology: Web Development Web Technology: Web Development This paper will discuss two theories, two best practices, and two technologies that relate to web technology. To achieve this, I will describe the Graphic Design and the Gestalt Principle theories and relate them to how they specifically influence the creation of digital media in web technology. I will then describe CSS and SEO practices and explain why each practice is a best practice, and then relate them to how they specifically influences the creation of digital media in web technology. Ultimately, I will describe the Web 2.0 and HTML 5...
5 Pages(1250 words)Research Paper

Habituation in sow bugs

...containers that are sealed with a ventilated lid. Use damp soil and decaying organic materials like wood, leaves, compost, etc. Put in an adequate amount of water to keep the habitat humid. Place paper towel in the container to aid in maintaining the humidity. If molds should appear, increase the ventilation or reduce the quantity of water use to make the habitat humid and cool. Keep the container in a dimly lit area of a room which has a temperature of 68 to 77 degrees Fahrenheit. If a large number of sow bugs are to be kept in a single container it is best to change the soil from time to time to keep them in a healthy condition (Carolina Teamed with Teachers, 1-2). Caring...
2 Pages(500 words)Essay

Bugs, Inc

...BUG, Inc. Paper In this net savvy world, BUG. Inc can strike rich; if it does e-commerce and sells products through internet. But certain restrictions come in the form of intellectual property rights and external threats. So, this paper will analyze both these problems facing BUG. Inc Types of legal protections BUG should have for its intellectual property If any innovative thing of immense use is invented, it should be protected under the Intellectual property (IP) rights, so that the creator has some rights over it. In the case of BUG, Inc, the software, created by its employees and which runs all its surveillance and interception devices, should be covered under legal protections and by IP rights. World Intellectual Property... the...
2 Pages(500 words)Essay


...JavaScript, Java and DHTML Web development and the use of JavaScript, Java and DHTML September 07, 2009 Web development and the use of JavaScript, Java and DHTML JavaScript is a type of scripting language used in web page development. It provides a easy way to access certain features of an application. Some common examples are popup that are opened when one clicks a hyperlink. The popup would have some information on the parent page or may be displayed as a separate page or window. JavaScript is a client-side scripting language used for adding functionality and extra features to web pages. Though it has...
2 Pages(500 words)Essay

Web Media and Web Application

...Introduction Website is the information delivered over the Web that combines characteristics of both Web media and Web application. Websites may be deployed instantly worldwide without any delay. They grow very fast compared to the traditional information sharing medias that makes them indispensible part of today’s business and industry (Philips 2004). High-performance websites are used widely for promoting and expanding businesses and a number of services. This is basically an information technology project to develop website for a tourism operator. The aim is to develop an interactive website allowing customers to see real time weather, wind surf and other relating...
21 Pages(5250 words)Assignment

The Use of Web Bugs at Home Connection

...Case Study-Privacy Pressures: The Use of Web Bugs at Home Connection The use of HomeConnection’s web bug violated theprivacy of those who agreed to display the ads on their personal computers because there were many complaints from many irate customers (Spinello, 2002). Most of them complained of having their personal information intruded without their consent. This is mainly because the use of the web bugs enabled HomeConnection to track information from their customer’s web pages through the access they had to their personal computers...
2 Pages(500 words)Case Study

Fair Use of Web Content

...Fair Use of Web Content Fair Use of Web Content As with different rights, such as liberty and organization, intellectual property (IP) rights are frequently ignored or neglected basically on the grounds that they are intangible. Yet, IP rights are crucial to the workings of our general public, and maintaining them implies more amazing opportunity to design, create, and development. (Hughes,1988). Academic integrity and copyright are the moral and legitimate sides of the same coin; they both address how protected innovation might be utilized in a research environment. Indeed those making utilization of a work under the Fair Use rules must offer credit to...
2 Pages(500 words)Essay

Nurse-Authored features that use Web 2.0 applications

...Nurse ed Features That Use Web 2.0 Applications al Affiliation) Web 2.0 describes the last generation of world web that enables people around the world to share information online. It also refers to the use of more dynamic web pages compared to the previously used HTML web page that only allowed the user to read the content. In nursing schools, the web 2.0 tools are now part of the curriculum where it has provided a link of communication between medical librarians and the faculty (Lemley & Burnham, 2009). Web 2.0 enhances online collaboration in medical and nursing...
1 Pages(250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Speech or Presentation on topic The use of web bugs at Homeconnection for FREE!

Contact Us