To observe a user’s behavior on a website and remember their preferences, websites download small text files called cookies to the user’s computer. People engage in virtually every kind of Internet activity, from logging on to generating targeted advertisements with cookies. A “cookie” is a short piece of information passed between programs that have its roots in early computer terminology. Despite its longevity, cookies are now often referred to as HTTP/HTTPS cookies, browser cookies, internet cookies, and browser cookies in today’s lexicon.

Despite the user’s awareness that cookies collect data, the user doesn’t have any meaningful control over the data collection. The use of so-called dark patterns to influence the privacy decisions of Internet users on the collection of data continues to be successful for companies who use these techniques. The general process of privacy decisions is often influenced by methods beyond the perception of the users. It is also complicated that the primary means of notice and consent have been privacy policies and opt-in/out interfaces, in addition to the use of privacy notices for websites. Privacy notices, or policies, are the most common way for companies to notify customers. This notice is an express requirement of the Central consumer protection authority, and businesses must update it each year.

Don't use plagiarized sources. Get Your Custom Essay on
Data Collection and Cookies Discussion
Just from $13/Page
Order Essay

Cookies: Internet users can be identified and remembered by cookies. Cookies are essential to the provision of certain services. A webserver cannot match previous requests a user has made to that server with a request from that user for a given page. Certain services do, however, need some memory. For example, shopping portals must remember the contents of the virtual shopping cart after they are placed. A cookie is a small text file that the server sends the individual when that individual request a page. The browser automatically sends back a cookie stored earlier after it contacts the server again. Thus, the shopping cart allocated to the person is the right one.

Ever cookies: In general, most users dislike tracking while browsing the internet. A lot of web surfers refuse to be tracked over the long run by their browsers. The advertising and tracking networks are therefore evolving their algorithms to identify each user more precisely. Since the beginning of the internet, Flash Cookies (LSOs) have been used for recovering deleted cookies that have properties very similar to those of cookies. Using this technique successfully, XYZ, Inc. collected precise data on 200 million Internet users (until it was sued in 20XX).

Active web contents: The web becomes more dynamic and colorful, but it is also more dangerous when personal lows browser plugins such as Java, Silverlight, etc., to add to the browsing experience. They allow the person to send many technical details about the computer and network configuration to a remote server when they execute them. Additionally, hackers can use certain techniques to view and edit the computer’s files and even gain total control over the machine in a special case.

JavaScript: Compared with plugins, JavaScript offers better protection against attacks on users’ privacy. Despite this, it isn’t fully safe. The JavaScript programming language is distinct from java and java’s active plugin, completely different despite their identical names. Through software exploits or a maliciously crafted website, one can compromise the browser or operating system. Web admins can access an array of information about the browser-based on JavaScript and the desktop settings and hardware. A fingerprint of a particular user may be created using all of this data.

Fingerprinting of Browser (HTTP) Header: As part of HTTP requests for webpages, a website being visited sends a variety of information to the server, such as the visitor’s language, browser name and version, operating system and version, and any data sets, files, or codecs required. Although not usually required to render websites, these headers can be exploited to re-identify users, profile them, and analyze their behavior. A browser fingerprinting demonstration was conducted by the XYZ project. Can use a unique browser fingerprint to track the location of most surfers.