Digital Ethics

Lauren Raymond
   CMSY 129
Privacy
 Precautions need to made when
  using the internet due to many
  threats and privacy issues.
 Privacy can be defined as the
  condition of being secret.
Privacy
 Computers have risked the privacy of many
  users.
 Common ways for computer technology to invade
  privacy is through:
   Social media sites
   Hackers
   Tracking devices
   Spy satellites


  (MIT.edu)
Behavioral Targeting
 Behavioral targeting is a user is tracked using
 their internet history. This information to put into
 a cookie and the cookie is stored on the user’s
 hard drive. When the user revisits site, the
 cookie is sent to the server
   Pcmag.com
Behavioral Targeting
 Behavioral targeting may seem as
 though it is harmless, web sites and
 cookies can store important information
 that could threaten personal privacy.
Souces
 The Computer Language Company. "Behavioral Targeting." PC
    Mag. The Computer Language Company, n.d. Web. 11 Feb.
    2013.
    <http://www.pcmag.com/encyclopedia_term/0,1237,t=behavioral
    +targeting&i=58438,00.asp>.
   Farlex. The Free Dictionary. Farlex, n.d. Web. 11 Feb. 2013.
    <http://www.thefreedictionary.com/privacy>.
   Infusionsoft Team. "Is Behavioral Targeting Evil?" Big Ideas Blog.
    Infusionsoft, 3 Sept. 2009. Web. 11 Feb. 2013.
    <http://bigideasblog.infusionsoft.com/is-behavioral-targeting-
    evil/>.
   Marx, Gary. "Privacy and Technology." Privacy and Technology.
    MIT, 1 Nov. 1999. Web. 11 Feb. 2013.
    <http://web.mit.edu/gtmarx/www/privantt.html>.
   Privacy. N.d. Photograph.
    Http://www.galvserv.com/assets/images/Privacy.JPG, n.p.
   Target. N.d. Photograph. Google Images. Google. N.p.: n.p., n.d.
    N. pag. Web. 11 Feb. 2013.

Digital ethics

  • 1.
  • 2.
    Privacy  Precautions needto made when using the internet due to many threats and privacy issues.  Privacy can be defined as the condition of being secret.
  • 3.
    Privacy  Computers haverisked the privacy of many users.  Common ways for computer technology to invade privacy is through:  Social media sites  Hackers  Tracking devices  Spy satellites (MIT.edu)
  • 4.
    Behavioral Targeting  Behavioraltargeting is a user is tracked using their internet history. This information to put into a cookie and the cookie is stored on the user’s hard drive. When the user revisits site, the cookie is sent to the server  Pcmag.com
  • 5.
    Behavioral Targeting  Behavioraltargeting may seem as though it is harmless, web sites and cookies can store important information that could threaten personal privacy.
  • 6.
    Souces  The ComputerLanguage Company. "Behavioral Targeting." PC Mag. The Computer Language Company, n.d. Web. 11 Feb. 2013. <http://www.pcmag.com/encyclopedia_term/0,1237,t=behavioral +targeting&i=58438,00.asp>.  Farlex. The Free Dictionary. Farlex, n.d. Web. 11 Feb. 2013. <http://www.thefreedictionary.com/privacy>.  Infusionsoft Team. "Is Behavioral Targeting Evil?" Big Ideas Blog. Infusionsoft, 3 Sept. 2009. Web. 11 Feb. 2013. <http://bigideasblog.infusionsoft.com/is-behavioral-targeting- evil/>.  Marx, Gary. "Privacy and Technology." Privacy and Technology. MIT, 1 Nov. 1999. Web. 11 Feb. 2013. <http://web.mit.edu/gtmarx/www/privantt.html>.  Privacy. N.d. Photograph. Http://www.galvserv.com/assets/images/Privacy.JPG, n.p.  Target. N.d. Photograph. Google Images. Google. N.p.: n.p., n.d. N. pag. Web. 11 Feb. 2013.