skip to main content
article
Free Access

Taking the byte out of cookies: privacy, consent, and the Web

Authors Info & Claims
Published:01 June 1998Publication History
Skip Abstract Section

Abstract

We consider the privacy of personal information on the World Wide Web, emphasizing a concept of privacy as an aspect of social relationships between individuals. We make three contributions to understanding the right to privacy on the Web: (1) we highlight the role of informed consent as an important consideration for privacy, (2) we identify conditions under which the collection and centralization of personal information can be ethically justified, and (3) we offer an interpretation of a "reasonable expectation of privacy" for Internet cookies, a mechanism used by Web sites to remember information about visits to that site.The views, opinions, and conclusions of this paper are not necessarily those of the University of Illinois. Preliminary versions of this paper were presented at the Seventh Annual Meeting of the Association for Practical and Professional Ethics, Dallas, TX, February 26[28, 1998, and the ACM Policy 98 Conference, Washington D.C., May 10-12, 1998.Address for correspondence: Michael C. Loui, Graduate College, 801 S. Wright Street, Champaign, IL 61820-6210, e-mail: [email protected], telephone: (217) 333-6715, fax: (217) 333-8019.

References

  1. 1 Morin, Richard, "Cruising the ...... in The ... Post lnternet..out warny, wasmngwn National Weekly Edition. June 23, 1997, page 35.Google ScholarGoogle Scholar
  2. 2 ivloor, james ra., lowarus a lneory of n: __ 111iniormaLiOll ill {lie /-xge, r rivacy Computers and Socie#. September 1997, pp. 27-32. r91 xvr .... o .... a r# ,, Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 warren, oamueiL#, andLouis# " .. a_. ,,'T'L_ D'_L._ I"LI ... inC_L OLIIO#III#LII, L/. D{RIIL{eiS, I IIC l%l.#llk UJ r{lvat.y. Ferdinand David, ed., Philosophical Dimensions of Privacy: An Anthology, (-'___L_'J__ }k,f ... L .... (-'___L_:A__TT_: ... :#_D .. I#OA --_ "7# 1/#52 l-ic#, 13F. / .)-# kJkilllOllU#(3, IVlitbbiiL.llLlSCttb: #.,H.IIIL)IIU#C UIIIVUIblLy 15/O"-1, UO.Google ScholarGoogle Scholar
  4. 4 Fried, Charles. "Privacy." in Schoeman, Ferdinand David, ed., Philosophical .lift %Jd.lll L31 IU#IT, s..#al 111.31 lUg)k, .rl rt # rJ u tu#, , zJtrrtcrtaturta uj x ,#v, ty. University Press, 1984, pp. 203-222.Google ScholarGoogle Scholar
  5. 5 XYL#,-#-:,., A 1.,-. 1#' D,,: .... ./ C.,..,.-.l#.,.,., 1%1 .. V.-,,-b- A ,-K ... 1 QC"/ L.)j 1~!~%.,o1.111, 11Atall 1. I ! lllUl.ff UItCA# I ICC~.#UI~I} ~ #M, YV 1Oil'S, .L ILII#,II*.#U.III, I JUI ~Google ScholarGoogle Scholar
  6. 6 Beardsley, Elizabeth. "Privacy: Autonomy and selective disclosure,'> in Pennock, J.R .hA l \YT #k .. n .#A# AT.#,.# YTTT. D 4.,.., NT .. V,-.,-b. Arl#rtnn Pr,#cc 1 O71Google ScholarGoogle Scholar
  7. 7 Parent, W.A. "Privacy, Morality, and the Law," in Philosophy and Public Affairs, ~ ,,-,I 19 n,-, A 1:;oll l t)R:# nn 9#t'}_#RR ... , ... , ... i,-,.,., VV" ""'# ..Google ScholarGoogle Scholar
  8. 8 Gavison, Ruth. "Privacy and the Limits of Law," in johnson, Deborah G. and T-Tel@n 1#T1#cenl#a,lm oA# (-Tnmqnutpr~ 1#t#lir~ #.#nrin/ l/r#/,J#~ T Inner Raclclle River_ New jersey: Prentice Hail, i995, pp. jJ2-J)u.Google ScholarGoogle Scholar
  9. 9 'k/root Iame# M "The F rhic# nfPriwcv Prnrecrinn " in library Trand.c vnl qq. t-- a ... ,., ..... , .......... I ...... # ..... J .... ' ... ' nos. i and 2, Summer/Fall i 990, pp. 69-82.Google ScholarGoogle Scholar
  10. 10 Rzcheiv lame.# "Whv Privacy i# lmnortanr." in lahn.#on. Deborah G and Helen u- #a ..... ' .# ...... d ... ~ ... C .... , --- a ..... , Nissenbaum, eds., Computers, Ethics & Social Values. Upper Saddle River, New Jersey: Prentice Hall, !995, pp. 351-357.Google ScholarGoogle Scholar
  11. 11 Benn, Stanley I. "Privacy,rreectom, # ' and respect for persons, in acnoeman, Ferdinand David, ed., Philosophical Dimensions of Privacy: An Anthology, D .. L__'_J__ Xi_ _1 ..... # .. L_.'J__ il_." ... .'#_n .. #lo/, __ q'-)'# ")9/, /-. A. D-#,.9"-t. warn- pp. ivlassacllUSe{ts: 1-17C55, oriugc #lnvcrslty 70% #amoriL{gc, IGoogle ScholarGoogle Scholar
  12. 12 Faden, Ruth R. and Tom L. Beauchamp. A History and Theory ofln#rmed .... RT .. V--I. I#.~#.A T T--: ... :.-. D .. 1 DO/L k.#U{lJg{l#. INUW IUIK#, U.,KIUIH WlllVK;lbll.y 1.7)'OO,Google ScholarGoogle Scholar
  13. 13 Gorovitz, Samuel. "Informed Consent and Patient Autonomy," in Caliahan, Joan c# #a mh:.# r. ... "" Pro#ssi it/o .. #J., cu., #tr#tcttt xaattca trt onal r ~# # .. v_.l., c#.c_.a Wnivers l.,tl#. J.,#k.w iUll#. UAIUIU I Ik.Oo, 988, pp. 182-187.Google ScholarGoogle Scholar
  14. 14 rlAI T;A#. W'k.,,.i,#o AI,,,# K#f,#;#l 17.,;.,,-,.,. 7 .. k .. I kff.,,-,, (-'.,,-,-o,- D.,-.;,#.# kff ~,=o,-.,b t 1 "-xj J.#lU/-,, %..#lld.l ILO, I i.lO.ll l~lLl)lk, l, l.a~ l(#L1-al L.aM.I UL#-'I ~ hi, J.VI(I.I f %J61 U#.,l, X#.b#lli(l. ~VI. d#.O tdA{#, and Loren H. Roth. In#rmed Consent: A Stuei# in Decisionmakinz in Psychiat#. n,t=,, v.,t. Tr,# #,,;i~.,A O .. #o#A 1#1#.#~~ 1o1_1%. i 11#., UBIIIUI#.AL 1 l#..dld, lJUT.Google ScholarGoogle Scholar
  15. 15 Martin, Mike W. and Roland Schinzinger. Ethics in Engineering. McGraw-Hill P,,kllol-,ln,-, (-" .... 1 ORO i I.,kOlldLLJ.lll#) %..J#.#lll#./(#kll}, I }l J}.Google ScholarGoogle Scholar
  16. 16 johnson, Deborah G. ComPuter Ethics, 2nd ed., Upper Saddle River, New jersey, Prentice Ha!l, !994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17 Forester, Tom and Perry Morrison. Computer Ethics: Cautionary Tales andEthicai IDilvmma~ ;. C#mm, tina 9net ed Camhrictae_ Ma#ch#,#err#, The MTT Pre#. .......... "_t" ... "&, .... , O#, ................ ' i994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18 O,#aittner, Ja#h,,a "Invasion of Privacy" in Time, AL, gust 25, ! 997, pp. 28-35.Google ScholarGoogle Scholar
  19. 19 Barlow, john P. "Private Life in Cyberspace," in johnson, Deborah G. and Helen Nissenbaum, eds, Computer Ethics & Social Values, Upper Saddle River, New jersey: Prenticerlan, .. 1995, pp. 310-313.Google ScholarGoogle Scholar
  20. 20 Laudon, Kenneth C. Dossier SocieW Value Choices in the Design of National T__Z"_ .,:___ o ... kT_ '%T_._I_ ,~-#_1 ... k-'_ IT_-" ... .'--_ TI .. ('tO{ 9/'% IOYK: #OO. L, OlUInOla Du Jnjormarwn oysrem5, in ew U lliVe{sl ty r ross, I Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. 21 Shattuck, John. "Computer Matching is a Serious Threat to Individual Rights," ill T_L .. 1-#_L _-_L t"# _--A LI_I __ 1%.T: .. L ... A- N ...... #/,Otcau*l-'-" #.#")# Out/atC--''l UUb., UCLIUIH.I.I #J. dilL{ KICICII INIS,.NCIIURUIII, J 011115011, Values. Upper Saddle River, New Jersey: Prentice Hall, 1995, pp. 305-309. r,-1,-i1 ~"#.1___ X,f I __,.1 T_T l C#:,-L "T ... I#,T__I .. I .. l._l ... L._IA# #iGoogle ScholarGoogle Scholar
  22. 22 bUlllkt, ll, ivi.j, dllU 1 l.j. Olllltll. butua lVlilllkCtpliik, ia. I iuuai;llul#a.. M#,,# ,,s Information Privacy. Concerns," in Johnson, Deborah G. and Helen Nissenbaum, #A# I# ... ,,#_. 12+h'#.J#q#;#ll/.L,. IT .. (2.AAI.#D; .. N.T .. j D,-,#,#,-;,-= #u#., #,,,{,,,c,,, vt , ersey: ~ ,#,,t.# Hail, 1995, pp. 269-277.Google ScholarGoogle Scholar
  23. 23 #----#roal "XX#ere is our Data?" in &cure Compudng: .... TD, Magazine #r tlo, ProtecHon of information., August l #/, pp. i 8-22.Google ScholarGoogle Scholar
  24. 24 Hunter, Larry. "p,,hl;~ lmag# " in Johnson, Deborah G. and Helen Nissenbaum, eds., Computers, Ethics & Social "values. Upper Saddle River, New jersey: Prentice Mall l qqq nn ?t')#-?qR .. ' .. # UtGoogle ScholarGoogle Scholar
  25. 25 Parker, Donn B., Ethical Conflicts in Computer Science and Technology, Arlington, Virginia: AF!PS Press, !979.Google ScholarGoogle Scholar
  26. 26 "fibre, Willis H., "The New Faces of Privacy," in The information Socie{y, vol. 9, ! 993, pp. ! 95-211. A 1 . n_: ~ n I 17(#1_ _11 ... CGoogle ScholarGoogle Scholar
  27. 27 Nissenbaum, Helen. "Toward an #pproacn t'rivacy in Ol YUDIIC: to k.,ll#l.lleDg#S Information Technolo#," in Ethics and Behavior. vol. 7, no. 3, 1997, pp. 207- 219.Google ScholarGoogle ScholarCross RefCross Ref
  28. 28 Gerety, Tom. "Redefining Privacy," in Harvard Civil Rights- Civil Liberties Law /3_.: .... 1 -- 2, 1 (#--/.-/ #v#w, vo,. 12, .o. #,//.Google ScholarGoogle Scholar
  29. 29 Malcolm's Guide to Persistent Cookies http://www.em~net/.-mal/cookiesinfo.htmiGoogle ScholarGoogle Scholar
  30. 30 #qdy ta#D ~'#^^1.:# NT ... L. .. // .... :!1.--; ..... /...-.I.;.# ,C-.,-,.; Lo#Jf:2/#l 'S ~ ~ I I I %.#UUI%J.IL, i "NULls.}. 111.1.1.3.11 w w 10~.IIIUllIIII(:IL1.UO.M, ka)III/ #i.,ta)Ulklt..l#.#)lGoogle ScholarGoogle Scholar
  31. 31 Mayer-Schoenberger, Viktor. "The Internet and Privacy. Legislation: Cookies for d. 1 lK.d.1.i lit w#,.)l, r t~#)#~ttuj u#~ ctub uj #),, y UI. I, zool.,i.t# 1, XVlOLI M, IX I / , 1997, at http://www.wvjoit.wvu.edu/wvjoit/current/issue 1/articles/mayer/ llldy M.I,II 1-111,Google ScholarGoogle Scholar
  32. 32 Cranor, Lorrie Faith. "'The Role of Technoiogy in Seif Reguiatory Privacy Regimes," .... A ~,-,,. ,-I# NT.,t;,-,n.d T,4 .... ;,-,#r; ... A ln#r#rmqtinn AAmlnlcrr.#rlnn l.Jll#.~-- #l%.#u llk#I 1.11%.# .1. lllOklk.llk#lll#.l. Jl#l#l.#lk.#llllllL.lkllll#.l#lLlllkJlld I#kllll.l l.LlJklk.#llllKll-lk-l%JJl*l .# #k#. .... OIk.lK.II.#l%.#all., December i 996, at http://www.research.att.com/-iorrie/pubs/NTiA.htmi. 3 iGoogle ScholarGoogle Scholar
  33. 33 rag,1 (-'#-#n{r,=l qi ... ;r}# (-#.n# qna#4"nrA lo{/rv}a qamxritm .1.,.} I'#nmmarea CI'R#Illy Ld.,,j #.a#.#,l# ... , ,_., .......... V ......... ")' ........ , v = , Associates, inc., i997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. 34 .{#}*, ... pd .... # ..... r;o, at http://#.cookiecentral.com/javacoo#A.htm.Google ScholarGoogle Scholar
  35. 35 johnson, Deborah G. and Helen Nissenbaum, eds, Computers Ethics & Social l/a/,xa~_ 1 Inner SactAle River. New Jersey: Prentice Hall. 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. 36 Nissenbaum, Helen, "Can We Protect Privacy in Public?" in ACM SIGCAS Con#rence in Computer Ethics. June 1997, Rotterdamn, The Netherlands. ~ T ,,'I"I7"7"1Google ScholarGoogle Scholar
  37. 37 Moor, james, m., wnat is Computerr_.mlcs, ... in jonnson, ....... weooran v,. and Helen Nissenbaum, eds., Computers~ Ethics~ & Social Values. Upper Saddle River, XT t _ n ... : t t _11 nn# e#ew jersey: rrenuce man, I :,v.#, pp. 7-14.Google ScholarGoogle Scholar

Index Terms

  1. Taking the byte out of cookies: privacy, consent, and the Web

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in

                Full Access

                • Published in

                  cover image ACM SIGCAS Computers and Society
                  ACM SIGCAS Computers and Society  Volume 28, Issue 2
                  June 1998
                  92 pages
                  ISSN:0095-2737
                  DOI:10.1145/276758
                  Issue’s Table of Contents
                  • cover image ACM Conferences
                    ACM POLICY '98: Proceedings of the ethics and social impact component on Shaping policy in the information age
                    June 1998
                    94 pages
                    ISBN:1581130384
                    DOI:10.1145/276755

                  Copyright © 1998 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 1 June 1998

                  Check for updates

                  Qualifiers

                  • article

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader