JOURNAL BROWSE
Search
Advanced SearchSearch Tips
A Study on Invasion of Privacy and Right to be forgotten by Internet Cookie Technology
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
A Study on Invasion of Privacy and Right to be forgotten by Internet Cookie Technology
Choi, Younsung; Kwon, Oh-Geol; Won, Dongho;
  PDF(new window)
 Abstract
Internet cookie technology is designed for solving unreliable problem of HTTP's inherent property and notifying user's previous activity to web site's server, so it is useful to provide suitable service for individual user. However, the cookie techniques are becoming more sophisticated such as the third cookie and super cookie. And its included information is applied for advertisement and target marketing strategy, so the problem occurs that user's personal information is collected excessively. However, our law does not recognize the internet cookie as personal information so user cannot know where own internet cookie is stored and applicable. Therefore, in this paper, we explain the internet cookie technology, the privacy invasion and right to be forgotten for solving problem due to the internet cookie. And we analysis the relationship between the information of internet cookie and personal information, and then present the improvement requirement on the law and technology to use internet cookie securely and conveniently.
 Keywords
Internet cookie technology;Personal information security;Privacy;Right to be forgotten;
 Language
Korean
 Cited by
 References
1.
Kristol, David M., and Lou Montulli. "HTTP state m anagement mechanism.", 2000. http://tools.ietf.org/html/rfc2965

2.
Mi-Hyang Yang, Donghoon Lee and Dongho Won " Risk Analysis for the Web Cookies used in Collecting Internet User's Behavior Information", 2014 Korean Society for Internet Information Conference, pp.117-118, 2014. http://www.dbpia.co.kr/Article/NODE0 6140774

3.
Barbaro, Michael, Tom Zeller, and Saul Hansell. "A face is exposed for AOL searcher no. 4417749." New York Times, 2008. https://w2.eff.org/Privacy/AOL/ exhibit_d.pdf

4.
Joobong Jang, "The Meanging and Protection Scope of Personal information", Law Review, pp.34-64, 2012. http://www.dbpia.co.kr/Article/NODE02110932

5.
Turkington, Richard C. "Legacy of the Warren and Brandeis Article: The Emerging Unencumbered Cons titutional Right to Informational Privacy." N. Ill. UL Rev. 10, pp.479, 1989. http://heinonline.org/HOL/Lan dingPage?handle=hein.journals/niulr10&div=25&id= &page=

6.
Wankyu Park, "Some Thoughts on the Advancement of Science Technology and the Changes of Privacy protection criteria", Kyungpook Natl. Univ. Law Journal Vol.49, pp.33-62, 2015. http://www.dbpia.co.kr/ Article/NODE06218383

7.
Prosser, William L. Law of torts. 1971. http://www.jstor.org/stable/42890338

8.
Junwoo Park, "A Comparative Study on the protecti on of privacy" Law Review on Industrial Property Right, 37, pp.301-335, 2012. http://www.dbpia.co.kr/ Article/NODE01843104

9.
Microsoft, "Maintaining session state with cookies". Microsoft Developer Network. Retrieved 2012.10.22.

10.
Filings, Regulatory. "Tracking the trackers: Microsoft advertising.", cyberlaw.stanford.edu, 2011. https://cyb erlaw.stanford.edu/comment/613

11.
Debussere Frederic, "The EU E-Privacy Directive: A Monstrous Attempt to Starve the Cookie Monster?" International Journal of Law and Information Technology, 13(1), pp. 73-76, 2005. http://www.law.kuleuve n.be/citip/en/docs/publications/657fredericdebussereco okies2f90.pdf

12.
Haksoo Ko, Sangmin Lee, "Analysis on the state ha d collected private information of local Internet sites ", Law and economics research, Society on Law and Economic, 10(2), pp.181-216, 2013. http://scholar.dk yobobook.co.kr/searchDetail.laf?barcode=4010023665 302

13.
Ashkan Soltani, Shannon Canty, Quentin Mayo, Laur en Thomas, and Chris Jay Hoofnagle, "Flash Cooki es and Privacy." AAAI Spring Symposium: Intellige nt Information Privacy Management", 2010. http://www.aaai.org/ocs/index.php/SSS/SSS10/paper/downloa d/1070/1505/

14.
Ayenson, Mika, Mika D Ayenson, Dietrich James W ambach, Ashkan Soltani, Nathan Good, Chris Jay Ho ofnagle , "Flash cookies and privacy II: Now with H TML5 and ETag respawning." Available at SSRN 18 98390, 2011. http://papers.ssrn.com/sol3/papers.cfm?a bstract_id=1898390

15.
Minjung Kim, Jonggeun An, Heesook Yoon, "The legal issues on Infringement of Personal Information through Cookies used in the Internet", Legal research, 24, pp. 79-103, 2006. http://www.dbpia.co.kr/Artic le/NODE01964576

16.
Google privacy policy(Cookie and other similar tech nology, https://www.google.com/policies/privacy/

17.
Soltani, Ashkan, Andrea Peterson, and Barton Gellman. "NSA uses Google cookies to pinpoint targets for hacking." The Switch. The Washington Post 10, 2013. https://www.washingtonpost.com/news/the-switch/ wp/2013/12/10/nsa-uses-google-cookies-to-pinpoint-ta rgets-for-hacking/

18.
Sung Jai Choi, A Study on the Two Sided Markets Theory and its Role in the Korean Antitrust Law inc lusive of Google's acquisition of Double Click, Korean competition law association 17. pp.225-265, 2008. http://www.competitionlaw.or.kr/board.php?kind=vie w&uid=184&page=1&tname=1225985138&s_per=100

19.
Fomitchev, Max I. "How google analytics and conve ntional cookie tracking techniques overestimate uniq ue visitors." Proceedings of the 19th internat ional conference on World wide web. ACM, 2010. http://dl.acm.org/citation.cfm?id=1772820

20.
Rosen, Jeffrey. "The right to be forgotten." Stanford law review online 64, 2012. http://www.stanfordlawreview.org/online/privacy-paradox/right-to-be-forgotte n?em_x=22

21.
Mayer-Schonberger, Delete: The Virtue of Forgetting in the Digital Age, Princeton, New Jersey: Princeton University Press, 2009. ISBN: 9780691150369

22.
Eunbyul Ko et al., Comparison of 'right to be forgotten' implemented in Korea and eu, Communication of the Korea Information Science Society 30(10), pp. 34-41, 2012. http://www.dbpia.co.kr/Article/NODE01984087

23.
Barbaro, Michael, Tom Zeller, and Saul Hansell. "A face is exposed for AOL searcher no. 4417749." New York Times, 2006. http://www.nytimes.com/2006/08/09/technology/09aol.html?_r=1&

24.
Hillyard, Daniel, and Mark Gauen. "Issues around th e protection or revelation of personal information." Knowledge, Technology & Policy 20.2 pp.121-124, 2007. http://link.springer.com/article/10.1007/s12130- 007-9013-9#page-1