Advanced SearchSearch Tips
A Study on Invasion of Privacy and Right to be forgotten by Internet Cookie Technology
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
A Study on Invasion of Privacy and Right to be forgotten by Internet Cookie Technology
Choi, Younsung; Kwon, Oh-Geol; Won, Dongho;
  PDF(new window)
Internet cookie technology is designed for solving unreliable problem of HTTP`s inherent property and notifying user`s previous activity to web site`s server, so it is useful to provide suitable service for individual user. However, the cookie techniques are becoming more sophisticated such as the third cookie and super cookie. And its included information is applied for advertisement and target marketing strategy, so the problem occurs that user`s personal information is collected excessively. However, our law does not recognize the internet cookie as personal information so user cannot know where own internet cookie is stored and applicable. Therefore, in this paper, we explain the internet cookie technology, the privacy invasion and right to be forgotten for solving problem due to the internet cookie. And we analysis the relationship between the information of internet cookie and personal information, and then present the improvement requirement on the law and technology to use internet cookie securely and conveniently.
Internet cookie technology;Personal information security;Privacy;Right to be forgotten;
 Cited by
Kristol, David M., and Lou Montulli. "HTTP state m anagement mechanism.", 2000.

Mi-Hyang Yang, Donghoon Lee and Dongho Won " Risk Analysis for the Web Cookies used in Collecting Internet User's Behavior Information", 2014 Korean Society for Internet Information Conference, pp.117-118, 2014. 6140774

Barbaro, Michael, Tom Zeller, and Saul Hansell. "A face is exposed for AOL searcher no. 4417749." New York Times, 2008. exhibit_d.pdf

Joobong Jang, "The Meanging and Protection Scope of Personal information", Law Review, pp.34-64, 2012.

Turkington, Richard C. "Legacy of the Warren and Brandeis Article: The Emerging Unencumbered Cons titutional Right to Informational Privacy." N. Ill. UL Rev. 10, pp.479, 1989. dingPage?handle=hein.journals/niulr10&div=25&id= &page=

Wankyu Park, "Some Thoughts on the Advancement of Science Technology and the Changes of Privacy protection criteria", Kyungpook Natl. Univ. Law Journal Vol.49, pp.33-62, 2015. Article/NODE06218383

Prosser, William L. Law of torts. 1971.

Junwoo Park, "A Comparative Study on the protecti on of privacy" Law Review on Industrial Property Right, 37, pp.301-335, 2012. Article/NODE01843104

Microsoft, "Maintaining session state with cookies". Microsoft Developer Network. Retrieved 2012.10.22.

Filings, Regulatory. "Tracking the trackers: Microsoft advertising.",, 2011. https://cyb

Debussere Frederic, "The EU E-Privacy Directive: A Monstrous Attempt to Starve the Cookie Monster?" International Journal of Law and Information Technology, 13(1), pp. 73-76, 2005. okies2f90.pdf

Haksoo Ko, Sangmin Lee, "Analysis on the state ha d collected private information of local Internet sites ", Law and economics research, Society on Law and Economic, 10(2), pp.181-216, 2013. 302

Ashkan Soltani, Shannon Canty, Quentin Mayo, Laur en Thomas, and Chris Jay Hoofnagle, "Flash Cooki es and Privacy." AAAI Spring Symposium: Intellige nt Information Privacy Management", 2010. d/1070/1505/

Ayenson, Mika, Mika D Ayenson, Dietrich James W ambach, Ashkan Soltani, Nathan Good, Chris Jay Ho ofnagle , "Flash cookies and privacy II: Now with H TML5 and ETag respawning." Available at SSRN 18 98390, 2011. bstract_id=1898390

Minjung Kim, Jonggeun An, Heesook Yoon, "The legal issues on Infringement of Personal Information through Cookies used in the Internet", Legal research, 24, pp. 79-103, 2006. le/NODE01964576

Google privacy policy(Cookie and other similar tech nology,

Soltani, Ashkan, Andrea Peterson, and Barton Gellman. "NSA uses Google cookies to pinpoint targets for hacking." The Switch. The Washington Post 10, 2013. wp/2013/12/10/nsa-uses-google-cookies-to-pinpoint-ta rgets-for-hacking/

Sung Jai Choi, A Study on the Two Sided Markets Theory and its Role in the Korean Antitrust Law inc lusive of Google's acquisition of Double Click, Korean competition law association 17. pp.225-265, 2008. w&uid=184&page=1&tname=1225985138&s_per=100

Fomitchev, Max I. "How google analytics and conve ntional cookie tracking techniques overestimate uniq ue visitors." Proceedings of the 19th internat ional conference on World wide web. ACM, 2010.

Rosen, Jeffrey. "The right to be forgotten." Stanford law review online 64, 2012. n?em_x=22

Mayer-Schonberger, Delete: The Virtue of Forgetting in the Digital Age, Princeton, New Jersey: Princeton University Press, 2009. ISBN: 9780691150369

Eunbyul Ko et al., Comparison of 'right to be forgotten' implemented in Korea and eu, Communication of the Korea Information Science Society 30(10), pp. 34-41, 2012.

Barbaro, Michael, Tom Zeller, and Saul Hansell. "A face is exposed for AOL searcher no. 4417749." New York Times, 2006.

Hillyard, Daniel, and Mark Gauen. "Issues around th e protection or revelation of personal information." Knowledge, Technology & Policy 20.2 pp.121-124, 2007. 007-9013-9#page-1