1. Internet Privacy
Many web sites deposit data about an individuals visit onto his own hard drive while he is surfing the web in the form of cookies. ... Marketers utilize this data to develop highly targeted lists of online users with related likes and behaviors. ... These techniques jumble sensitive information so that it can only be converted with a key code, a passkey that unlocks the scrambled electronic data. ... The process that most commonly uses this technique is know as data mining and is become ever so popular today (Computer Privacy Presentation). ... They must execute specific laws protecting use...
- Word Count: 1548
- Approx Pages: 6
- Grade Level: Undergraduate