Problem regarding the web browsing privacy

Assignment Help Basic Computer Science
Reference no: EM131095436

Web Browsing Privacy

The crackdown on Web browsing privacy is resulting in a tense situation between advertisers and the public. In addition to restricting third-party cookies, several Web browsers now provide functionality to limit tracking by online advertisers. The US government has even suggested that a Do Not Track (DNT) list be created that would prohibit Web sites and advertising networks from monitoring a Web surfer's actions. This could allow for greater privacy and perhaps better security. Based on the national Do Not Call list that is designed to prevent telemarketers from making telephone calls to homes, DNT would allow users to sign up for this protection. Because it could not be implemented by users signing up based on their computer's IP address (because it can frequently change on a computer), another proposal is to have a persistent opt-out cookie, meaning that if a specific piece of code similar to a cookie is present on a user's computer, then it would indicate a user's agreement to be tracked or not.

However, online advertisers have responded by saying that their ads "pay the bills" for Web sites, and to restrict tracking would be like requiring television programs to eliminate commercials or magazines to stop accepting print advertisements. The end result would be a dramatic change in browsing. Users who accept tracking would see all of the Web site's material, while those who opt out would only see more generalized content. Some Web sites may begin to charge customers a monthly fee to read their full content.

Should tracking be restricted? Would you sacrifice viewing your favorite Web sites in return for no tracking? Should Web sites be able to restrict the content that you view based on your choices regarding tracking? If this is not the only solution, what would you propose?

In each discussion board assignment, you must do at least one post with a minimum of 200 words or more to the question and one reply to at least two other posts for a total of three posts for the week.   The replies must move the conversation forward and cannot be "I agree" or "good job" type of posts. The initial post must be created by the third day of this week so your peers don't have to wait until the last day to complete this assignment. Points will be deducted if you post on only one day. Post on a minimum of two different days.

Reference no: EM131095436

Questions Cloud

Explain macintosh file structures and the boot process : Explain Macintosh file structures and the boot process. Be sure to give good detail. Explain UNIX and Linux disk structures and boot processes. Be sure to give good detail.
Resources to gain an understanding : Review industry websites, and academic resources to gain an understanding of the most commonly used methods to illegally access network assets and business and personal data.
What concentration of chlorine is required : What concentration would be required if you used chlorine dioxide instead?
What is the after-tax return on bills corporate bonds : What is the after-tax return on Bills corporate bonds for the current year?
Problem regarding the web browsing privacy : The crackdown on Web browsing privacy is resulting in a tense situation between advertisers and the public. In addition to restricting third-party cookies, several Web browsers now provide functionality to limit tracking by online advertisers.
Write a report on the tcpIp protocol : Write a report on the tcp/ip protocol
How many countries rely on the standards issued : Which of the following statements is not one of the roles of the audit committee? How many countries rely on the standards issued by the International Auditing and Assurance Standards Board?
Calculate the amount of chlorine required at the end : Next calculate the amount of chlorine required at the end of the pipe if a sand filter (direct filtration) is installed.
Calculate the consumer surplus with subsidy : Econ 4010-090 - How does the diagram now look like and what is Billie's marginal rate of substitution? Is Billie's marginal rate of substitution of coffee for tea decreasing?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Oracle-database programming and sql

1. Define the terms COMMIT, ROLLBACK, and SAVEPOINT as they relate to data transactions. 2. What data will be committed after the following statements are issued?

  Calculate time required to transmit frame and receive

Suppose an 802.11 b station is configured to always reserve the channel with the RTS/CTS sequence. Suppose this station suddenly wants to transmit 1,000 bytes of data, and all other stations are idle at this time.

  Perform a heuristic evaluation to critically evaluate

perform a heuristic evaluation to critically evaluate the selected application.

  Find some examples of tools that use snmp

How widely used is SNMP now? Find some examples of tools that use SNMP.

  Explain program manager for human services program

Write down 200- to 300-word email to friend describing new position and its responsibilities, incorporating all vocabulary words.

  Draw the entity-relationship diagram for the above scenario

Prepare a document of requirement analysis and justify the need to create the system for the above case study. Draw the entity-relationship diagram for the above scenario

  Generations of computer programming languages

Briefly describe the four generations of computer programming languages, concentrating on the major differences among the generations. How does object-oriented programming fit into these generations? How does HTML fit into these generations?

  Identify and prioritize it security controls

Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization

  Discuss the deferred update technique of recovery

What are the advantages and disadvantages of this technique? Why is it called the NO-UNDO/REDO method?

  Calorie management

Option 1: Calorie Management Develop an algorithm in pseudocode that shows the tasks and subtasks for each program module component that was in the simple algorithm you developed in Week 2

  What types of error are unlikely to be discovered

What types of error are unlikely to be discovered through inspections?

  Good coding practices with a meaningful coding example

Documentation of good coding practices with a meaningful coding example

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd