How Cookies Invade Privacy
Name
Institution
Course
Instructor
Date
How Cookies Invade Privacy
Cookies are files that are saved on a computer or mobile device. The files consist of information that web servers send when a computer user visits a website. Cookies are used to identify returning visitors to provide personalized experiences. Cookies achieve this by assessing past user activities on a website. Generally, cookies track a user’s browsing activities and store the information, which includes personal data. Therefore, when a user visits the website again, he or she gets a tailored experience based on past actions.
Privacy concerns have been raised regarding cookies as the collect web users’ information without their authorization. Therefore, cookies present a significant threat to online privacy. For instance, some types of cookies, such as tracking cookies are used track the activities of individuals across websites, rather than enhance their experiences (Miyazaki, 2008). The information collected is often used create browsing history profiles so that users can get targeted ads.
Cybercriminals can also malware and viruses as cookies. A hacker can send supercookies to a website that he controls to interrupt user requests in another website with similar features. This allows the hacker to login as a legitimate user and use users’’ personal information for malicious activities.
Cookies are beneficial to both internet users and business people as they can collect information to help businesses tailor unique customer experiences that meets individual needs. Users can benefit from cookies and still protect their online privacy. One way to achieve privacy is to prevent cookies from tracking every activity. Users can use their web browsers’ privacy mode (Gralla, 2007). Private browsing ensures that the browser cannot store internet cookies or browsing history. The private browsing approach is also essential for computers with multiple users because it ensures that other users cannot use other users’ information for malicious activities.
References
Gralla, P. (2007). How to Surf Anonymously Without a Trace, Computerworld.
Miyazaki, D.A. (2008). Online privacy and the disclosure of cookie use: Effects on consumer
trust and anticipated patronage. Journal of Public Policy and Marketing, 27(1).