StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Use of Web Bugs at Home Connection - Case Study Example

Cite this document
Summary
The aim of the paper “The Use of Web Bugs at Home Connection” is to analyze the use of HomeConnection’s web bug violated the privacy of those who agreed to display the ads on their personal computers because there were many complaints from many irate customers…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.1% of users find it useful
The Use of Web Bugs at Home Connection
Read Text Preview

Extract of sample "The Use of Web Bugs at Home Connection"

Case Study-Privacy Pressures: The Use of Web Bugs at Home Connection The use of HomeConnection’s web bug violated theprivacy of those who agreed to display the ads on their personal computers because there were many complaints from many irate customers (Spinello, 2002). Most of them complained of having their personal information intruded without their consent. This is mainly because the use of the web bugs enabled HomeConnection to track information from their customer’s web pages through the access they had to their personal computers (Josang, Maseng & Knapskog, 2009).

Though the bugs were intended to collect information regarding their promotion, most of their subscribers were not informed of the intention behind the company’s venture. This therefore makes their illegal access to their subscriber’s personal information a violation of their privacy rights (Chander, Gelman & Radin, 2008). The company made no deliberate efforts aimed at ensuring that their customers knew of their intention of having the bugs placed on their personal computers. This also amounted to an infringement of their personal rights leading many of them to consider cancelling their subscriptions with the company (Josang, Maseng & Knapskog, 2009).

In addition, the privacy of those who click on the ads has also been violated since they are also not aware of their activities being tracked down. They also have not consented to having their personal information revealed or intruded in any manner (Chander, Gelman & Radin, 2008). 2 The web bugs have been placed on the personal computers of the subscribers of HomeConnection to gather results about an ongoing promotion. This has however been done without neither informing nor obtaining the consent of the subscribers (Josang, Maseng & Knapskog, 2009).

The subscribers have a right to opt out of the company’s arrangement since it infringes on their rights by disclosing their activities (Spinello, 2002). They also have the right to refuse the web bug installation into their web pages since it could end up divulging information to intruders. The internet has a lot of criminals who are out to acquire vital personal information for the purpose of stealing finances and performing other dubious activities (Chander, Gelman & Radin, 2008). The company should have taken the initiative of informing the subscribers concerning their placement of the web bugs on their web sites.

These actions would have prevented the company from receiving the complaints and threats of withdrawal they had experienced after their customers received knowledge concerning their activities and information being monitored (Spinello, 2002). The subscribers have additionally not been bound by any form of agreement that allows the company to intrude into their personal information and therefore have the liberty of opting out of this arrangement (Josang, Maseng & Knapskog, 2009). 3 Should a person displaying the ads agree to the web bug he should place a statement on his or her web site indicating that persons clicking on the ad may receive further advertisements from a number of sources.

This is because the users of the web page could end up having their personal information which includes their preferences being easily accessed by intruders (Spinello, 2002). The consent of the people visiting the web sites should be obtained to ensure that their rights are not infringed. The other sources sending advertisements to these web sites may end up obtaining information that was not intended to be revealed (Josang, Maseng & Knapskog, 2009). The people displaying the ads should therefore inform their clients of the possibility of receiving information and sharing theirs with other unintended persons (Chander, Gelman & Radin, 2008).

References Chander, A, Gelman, L & Radin, M. J. (2008). Securing Privacy In The Internet Age. Stanford: Stanford University Press. Josang, A, Maseng, T & Knapskog, S. J. (2009). Identity And Privacy In The Internet Age: 14th Nordic Conference On Secure IT Systems, Nordsec 2009, Oslo, Norway, 14-16 October 2009, Proceedings. New York: Springer. Spinello, R. A. (2002). Case Studies In Information Technology Ethics. Upper Saddle River, New Jersey: Pearson Education Inc.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Use of Web Bugs at Home Connection Case Study”, n.d.)
Retrieved from https://studentshare.org/information-technology/1599615-the-use-of-web-bugs-at-home-connection
(The Use of Web Bugs at Home Connection Case Study)
https://studentshare.org/information-technology/1599615-the-use-of-web-bugs-at-home-connection.
“The Use of Web Bugs at Home Connection Case Study”, n.d. https://studentshare.org/information-technology/1599615-the-use-of-web-bugs-at-home-connection.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Use of Web Bugs at Home Connection

Embedded Web Server

This system assures connection between two partners and is capable to provide a guaranteed safeguarded communication system.... Here the solder paste is applied to provide better circuit connection among pins of the components present on a PCB.... The paper "Embedded web Server" tells us about the program in computer devices that is capable to provide a web page to the user of the device.... In another word, this is the system which can serve the internet with a suitable web page or website....
10 Pages (2500 words) Essay

Talisker Insurance Agency

Second, the cost of web development, maintenance, and hosting has reduced drastically over the past years.... First, no forward-looking company with a vast client base can afford to not to have a web presence in the present times.... The paper “Talisker Insurance Agency” analyses the issue when Mr....
16 Pages (4000 words) Essay

California vs Greenwood Challenges the Fourth Amendment Privacy of Search and Seizure

In order to investigate these complaints, surveillance of the Greenwood's home was necessary.... She then conveyed the information that she had found within the trash in order to obtain a warrant to search Greenwood's home.... When the warrant was served at Greenwood's home, both suspects were present from both residences.... They discovered quantities of Cocaine and Hashish during the search of the home.... On May 4, 1984 Investigator Robert Rahaeuser again obtained garbage from the regular trash collector at Greenwood's home in the same manner as Stracner....
4 Pages (1000 words) Research Paper

Sowftware design problem

The complexity involved in the process of software development leads to software bugs.... Late completion, low quality, lack of reliability and software not satisfying the stated demand are the symptoms of software bugs.... Such systems are exceedingly difficult to debug....
4 Pages (1000 words) Research Paper

The Becoming Company

the use of ring topology involve connecting nodes to form a single closed data path, these enable the system to achieve high transmission rates than when connections made using bus topology.... The company has managed to increase and maintain its performance by combining the three topologies to form 3 Internet Gateway web servers S1, S2, and S3....
6 Pages (1500 words) Case Study

Fashion marketing research

In order to understand dynamics of fashion market, the study has selected two UK based fashion retailers as case organizations such as French connection and jigsaw.... In the last part, based on the analysis, suitable suggestions will be made for improving value proposition for French connection and jigsaw.... In order to conduct primary research, author of this essay has visited Jigsaw store located in Duke Street, London and French connection store located in oxford street, London....
7 Pages (1750 words) Essay

A Survey for an Additional Bus Service on Colinton Road

Our results show that out of 100, only 45% of students use the buses for their transport.... 41% of these bus users alight at the stop near campus, while the rest 59% prefer to use the bus which makes them get down at the bus stop at some distance from the campus....
10 Pages (2500 words) Research Proposal

Steps Used in Designing Building Access to Databases

Identification of Audience – the design begun by identifying the audience that was going to use the program.... Some of the strategies discussed as indexing use spiders and robots to gather necessary materials on the greenstone collections.... The paper "Steps Used in Designing Building Access to Databases" is to develop a program that will be used for testing whether the story is fake or real, arrange it in table form, and stores it....
9 Pages (2250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us