Abstract
Electronic communication and commerce facilitate the collection of information about individual use of the Internet. Focusing on the case of Comet Systems Inc. and its data gathering practices, this paper explores the technical details of gathering personal information in databases in general and the special character of the privacy issue raised by 'anonymous' information about individual behavior on the Internet. The case analysis suggests new insights for our understanding of privacy and frames a discussion of policy alternatives with respect to the privacy of Internet communication.
- Cometsystems.com (2000) Comet Systems Privacy Policy. http://www.cometsystems.com/contact/privacy.shtml (Accessed January 28, 2000).Google Scholar
- Cometsystems.com, (2000) How many people have the Comet Cursor software? http://www.cometsystems.com/what/faq.shtml#cost (Accessed Jan. 28, 2000).Google Scholar
- EPIC (1999) Electronic Privacy Information Center. Surfer beware III: Privacy policies without privacy protection. http://www.epic.org/reports/surfer-beware3.html (December, 1999), (Accessed Jan. 31, 2000).Google Scholar
- Standard (1999) Privacy story moves like a comet. The Standard. http://www.thestandard.com/article/display/0,1151,8100,00.html (Dec. 6, 1999), (Accessed Jan. 31, 2000).Google Scholar
- Tran, K.T.L. (1999) Emachines to Buy Free-PC in stock deal. The Wall Street Journal (Nov. 30, 1999), B6.Google Scholar
- TRUSTe (2000) The TRUSTe story. http://www.truste.org/about/about_truste.html (Accessed Jan. 29, 2000).Google Scholar
- Wall Street Journal (1999) Popular software for computer cursors logs Web visits, raising privacy issues. The Wall Street Journal (Nov. 30, 1999), B6.Google Scholar
- Van den Hoven. M.L. (1999) "Privacy and the Varieties of Informational Wrongdoing" Australian Journal of Professional and Applied Ethics Vol. 1 No. 1 (July 1999), 30-43.Google Scholar
- Wallace, K. A. (1999) Anonymity. Ethics and Information Technology 1 (1):21-31. Google ScholarDigital Library
- Whatis.com (2000) Relational database. http://whatis.com/relation.htmGoogle Scholar
Index Terms
- The ties that bind: connections, comet cursors, and consent
Recommendations
Walking the Line: The Everyday Security Ties that Bind
Human Aspects of Information Security, Privacy and TrustAbstractIn this paper we argue that in contemporary society a form of security emerges that is qualitatively neither technological nor social but that is truly sociotechnical. We argue that everyday security is a form of sociotechnical security co-...
Comments