Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-tn8tq Total loading time: 0 Render date: 2024-06-18T19:02:46.015Z Has data issue: false hasContentIssue false

14 - Privacy Concerns

Published online by Cambridge University Press:  05 June 2012

Robert N. Barger
Affiliation:
University of Notre Dame, Indiana
Get access

Summary

Introduction

There is sometimes a relationship between theft and privacy. Theft and related crimes, such as fraud, often occur after one's personal information has been compromised. In fact, compromised personal information can be the very means used to commit the crimes.

It used to be said that you need not be concerned about privacy unless you have something to hide. Now, most people understand that everyone should have something to hide, that is, personal information that can be used for identity theft or other kinds of fraud. In this chapter we will be talking about matters related to the privacy of information – information that can be used for good, or for bad, purposes.

Cookies

Something as yummy as a cookie doesn't sound like it could be a bad thing, does it? Usually it's not. We're talking here about electronic cookies, of course. They are bits of information sent to a browser by a Web server when contact is first made with it. Some servers place cookies on browsers that contact them, but not all of them do. If placed, the cookie is stored on the browser's computer and the information on it can be accessed the next time the browser is used to visit the Web server that placed the cookie. For instance, have you ever revisited a server and had the server call you by name. How could it do that?

Type
Chapter
Information
Computer Ethics
A Case-based Approach
, pp. 177 - 185
Publisher: Cambridge University Press
Print publication year: 2008

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Privacy Concerns
  • Robert N. Barger, University of Notre Dame, Indiana
  • Book: Computer Ethics
  • Online publication: 05 June 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9780511804151.015
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Privacy Concerns
  • Robert N. Barger, University of Notre Dame, Indiana
  • Book: Computer Ethics
  • Online publication: 05 June 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9780511804151.015
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Privacy Concerns
  • Robert N. Barger, University of Notre Dame, Indiana
  • Book: Computer Ethics
  • Online publication: 05 June 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9780511804151.015
Available formats
×