The paper “ Internet Enhanced Concern on Data Mining, Internet Cookies, Search Engines, and Google Privacy Issues” is a pathetic variant of an essay on information technology. As the internet has evolved, it has become a part of our daily life. The use of the internet has increased with connections getting cheaper. The rise of internet use in daily life has led to privacy concerns (Smith, Dinev & Xu, 2011). The privacy debate that has been raised by internet users is mostly based on the two issues known as internet-specific and internet enhanced concerns.
The use of search engines and cookies has led to more concern for privacy. Data mining technology on the internet has made it vulnerable to violations of privacy. The use of the internet has blurred the line between public and private information leading to debate (Acquisti, John & Lowenstein, 2009). For internet users, their information privacy is a major issue of concern. In some cases, users are unaware that their personal information is revealed when they go online (Belanger & Crossler, 2011). In some cases, there has been the use of confidential information online by entrepreneurs who sell to marketing companies.
The research paper looks at the ways in which the internet has caused an ethical debate on our information privacy. PrivacyLaw prohibits one from sharing personal private information without consent. But internet privacy is not well defined by law. The rise of the internet has led to this law being disregarded and personal information is being shared through unauthorized means. For individuals, they have a vested interest to protect their personal information. Privacy of information prohibits intrusion to private information (Fogel & Nehmad, 2009). Internet enhanced concern Data mining The use of data gathering tools on the internet has been on the rise (Fogel & Nehmad, 2009).
Companies have been using the tools to gather data on online users, which poses a threat to privacy for online users. In some cases, there is a sale of personal data online without the owner’ s knowledge by online entrepreneurs. Data mining technology has led to users being more vulnerable to violations of privacy. The technology uses artificial intelligence and patterns. This makes it possible to match patterns and form relationships which extract data that was hidden.
The company places advertisements on any host website. When a user visits the website that the company has placed its advert, a cookie is sent from both the advertising system and the requested site. The cookie in the user system is then used by the company to conduct its marketing by gaining access to personal data. Access to the user system enables the company to construct a user profile that can be used for direct advertisement (Belanger & Crossler, 2011). There has been debate by those advocating for internet privacy that cookies violate user privacy.
This is due to the fact that they record and monitor internet users without their consent (Peace & Hartzel, 2002). To respond to privacy violations by cookies, there has been the development of privacy-enhancing tools. One f the tools developed earlier is pgcookie. There are also features on the search engines which allow users to block cookies. This is an internet-specific concern that has led to internet debate on privacy (Acquisti, John & Lowenstein, 2009).
Acquisti, A., John, L & Lowenstein, G 2009, What is privacy worth? Workshop on Information Systems and Economics (WISE).
Belanger, F & Crossler, R.E 2011, “Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems”, MIS Quarterly, Vol. 35, No.4, p. 1017-1041.
Fogel, J & Nehmad, E 2009, "Internet Social Network Communities: Risk-taking, Trust, and Privacy Concerns", Computers in Human Behavior, Vol.25, no.1, pp.153-160.
Peace, A.G & Hartzel, K.S 2002, “Ethical concerns raised by the use of the internet in academia”, Journal of Information Ethics, Fall, pp.17-32.
Ribble, M.S & Bailey, G.D 2005, “Developing ethical direction”, Learning & Leading with Technology, Vol.32, no.7, p.36-38.
Smith, H Dinev, T & Xu, H 2011, “Information Privacy Research: An Interdisciplinary Review”, MIS Quarterly, Vol.35, no.4, pp. 989-1015.