skip to main content
article

The ties that bind: connections, comet cursors, and consent

Published:01 March 2001Publication History
Skip Abstract Section

Abstract

Electronic communication and commerce facilitate the collection of information about individual use of the Internet. Focusing on the case of Comet Systems Inc. and its data gathering practices, this paper explores the technical details of gathering personal information in databases in general and the special character of the privacy issue raised by 'anonymous' information about individual behavior on the Internet. The case analysis suggests new insights for our understanding of privacy and frames a discussion of policy alternatives with respect to the privacy of Internet communication.

References

  1. Cometsystems.com (2000) Comet Systems Privacy Policy. http://www.cometsystems.com/contact/privacy.shtml (Accessed January 28, 2000).Google ScholarGoogle Scholar
  2. Cometsystems.com, (2000) How many people have the Comet Cursor software? http://www.cometsystems.com/what/faq.shtml#cost (Accessed Jan. 28, 2000).Google ScholarGoogle Scholar
  3. EPIC (1999) Electronic Privacy Information Center. Surfer beware III: Privacy policies without privacy protection. http://www.epic.org/reports/surfer-beware3.html (December, 1999), (Accessed Jan. 31, 2000).Google ScholarGoogle Scholar
  4. Standard (1999) Privacy story moves like a comet. The Standard. http://www.thestandard.com/article/display/0,1151,8100,00.html (Dec. 6, 1999), (Accessed Jan. 31, 2000).Google ScholarGoogle Scholar
  5. Tran, K.T.L. (1999) Emachines to Buy Free-PC in stock deal. The Wall Street Journal (Nov. 30, 1999), B6.Google ScholarGoogle Scholar
  6. TRUSTe (2000) The TRUSTe story. http://www.truste.org/about/about_truste.html (Accessed Jan. 29, 2000).Google ScholarGoogle Scholar
  7. Wall Street Journal (1999) Popular software for computer cursors logs Web visits, raising privacy issues. The Wall Street Journal (Nov. 30, 1999), B6.Google ScholarGoogle Scholar
  8. Van den Hoven. M.L. (1999) "Privacy and the Varieties of Informational Wrongdoing" Australian Journal of Professional and Applied Ethics Vol. 1 No. 1 (July 1999), 30-43.Google ScholarGoogle Scholar
  9. Wallace, K. A. (1999) Anonymity. Ethics and Information Technology 1 (1):21-31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Whatis.com (2000) Relational database. http://whatis.com/relation.htmGoogle ScholarGoogle Scholar

Index Terms

  1. The ties that bind: connections, comet cursors, and consent
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGCAS Computers and Society
        ACM SIGCAS Computers and Society  Volume 31, Issue 1
        March 2001
        25 pages
        ISSN:0095-2737
        DOI:10.1145/572277
        Issue’s Table of Contents

        Copyright © 2001 Authors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 March 2001

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader