Browse > Article
http://dx.doi.org/10.7472/jksii.2016.17.2.77

A Study on Invasion of Privacy and Right to be forgotten by Internet Cookie Technology  

Choi, Younsung (Department of Cyber Security, Howon University)
Kwon, Oh-Geol (Department of Law, Kyungpook National University)
Won, Dongho (Department of Computer Engineering, Sungkyunkwan University)
Publication Information
Journal of Internet Computing and Services / v.17, no.2, 2016 , pp. 77-85 More about this Journal
Abstract
Internet cookie technology is designed for solving unreliable problem of HTTP's inherent property and notifying user's previous activity to web site's server, so it is useful to provide suitable service for individual user. However, the cookie techniques are becoming more sophisticated such as the third cookie and super cookie. And its included information is applied for advertisement and target marketing strategy, so the problem occurs that user's personal information is collected excessively. However, our law does not recognize the internet cookie as personal information so user cannot know where own internet cookie is stored and applicable. Therefore, in this paper, we explain the internet cookie technology, the privacy invasion and right to be forgotten for solving problem due to the internet cookie. And we analysis the relationship between the information of internet cookie and personal information, and then present the improvement requirement on the law and technology to use internet cookie securely and conveniently.
Keywords
Internet cookie technology; Personal information security; Privacy; Right to be forgotten;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Turkington, Richard C. "Legacy of the Warren and Brandeis Article: The Emerging Unencumbered Cons titutional Right to Informational Privacy." N. Ill. UL Rev. 10, pp.479, 1989. http://heinonline.org/HOL/Lan dingPage?handle=hein.journals/niulr10&div=25&id= &page=
2 Wankyu Park, "Some Thoughts on the Advancement of Science Technology and the Changes of Privacy protection criteria", Kyungpook Natl. Univ. Law Journal Vol.49, pp.33-62, 2015. http://www.dbpia.co.kr/ Article/NODE06218383
3 Prosser, William L. Law of torts. 1971. http://www.jstor.org/stable/42890338
4 Junwoo Park, "A Comparative Study on the protecti on of privacy" Law Review on Industrial Property Right, 37, pp.301-335, 2012. http://www.dbpia.co.kr/ Article/NODE01843104
5 Microsoft, "Maintaining session state with cookies". Microsoft Developer Network. Retrieved 2012.10.22.
6 Filings, Regulatory. "Tracking the trackers: Microsoft advertising.", cyberlaw.stanford.edu, 2011. https://cyb erlaw.stanford.edu/comment/613
7 Debussere Frederic, "The EU E-Privacy Directive: A Monstrous Attempt to Starve the Cookie Monster?" International Journal of Law and Information Technology, 13(1), pp. 73-76, 2005. http://www.law.kuleuve n.be/citip/en/docs/publications/657fredericdebussereco okies2f90.pdf
8 Haksoo Ko, Sangmin Lee, "Analysis on the state ha d collected private information of local Internet sites ", Law and economics research, Society on Law and Economic, 10(2), pp.181-216, 2013. http://scholar.dk yobobook.co.kr/searchDetail.laf?barcode=4010023665 302
9 Ashkan Soltani, Shannon Canty, Quentin Mayo, Laur en Thomas, and Chris Jay Hoofnagle, "Flash Cooki es and Privacy." AAAI Spring Symposium: Intellige nt Information Privacy Management", 2010. http://www.aaai.org/ocs/index.php/SSS/SSS10/paper/downloa d/1070/1505/
10 Ayenson, Mika, Mika D Ayenson, Dietrich James W ambach, Ashkan Soltani, Nathan Good, Chris Jay Ho ofnagle , "Flash cookies and privacy II: Now with H TML5 and ETag respawning." Available at SSRN 18 98390, 2011. http://papers.ssrn.com/sol3/papers.cfm?a bstract_id=1898390
11 Minjung Kim, Jonggeun An, Heesook Yoon, "The legal issues on Infringement of Personal Information through Cookies used in the Internet", Legal research, 24, pp. 79-103, 2006. http://www.dbpia.co.kr/Artic le/NODE01964576
12 Google privacy policy(Cookie and other similar tech nology, https://www.google.com/policies/privacy/
13 Soltani, Ashkan, Andrea Peterson, and Barton Gellman. "NSA uses Google cookies to pinpoint targets for hacking." The Switch. The Washington Post 10, 2013. https://www.washingtonpost.com/news/the-switch/ wp/2013/12/10/nsa-uses-google-cookies-to-pinpoint-ta rgets-for-hacking/
14 Sung Jai Choi, A Study on the Two Sided Markets Theory and its Role in the Korean Antitrust Law inc lusive of Google's acquisition of Double Click, Korean competition law association 17. pp.225-265, 2008. http://www.competitionlaw.or.kr/board.php?kind=vie w&uid=184&page=1&tname=1225985138&s_per=100
15 Fomitchev, Max I. "How google analytics and conve ntional cookie tracking techniques overestimate uniq ue visitors." Proceedings of the 19th internat ional conference on World wide web. ACM, 2010. http://dl.acm.org/citation.cfm?id=1772820
16 Rosen, Jeffrey. "The right to be forgotten." Stanford law review online 64, 2012. http://www.stanfordlawreview.org/online/privacy-paradox/right-to-be-forgotte n?em_x=22
17 Mayer-Schonberger, Delete: The Virtue of Forgetting in the Digital Age, Princeton, New Jersey: Princeton University Press, 2009. ISBN: 9780691150369
18 Barbaro, Michael, Tom Zeller, and Saul Hansell. "A face is exposed for AOL searcher no. 4417749." New York Times, 2008. https://w2.eff.org/Privacy/AOL/ exhibit_d.pdf
19 Kristol, David M., and Lou Montulli. "HTTP state m anagement mechanism.", 2000. http://tools.ietf.org/html/rfc2965
20 Mi-Hyang Yang, Donghoon Lee and Dongho Won " Risk Analysis for the Web Cookies used in Collecting Internet User's Behavior Information", 2014 Korean Society for Internet Information Conference, pp.117-118, 2014. http://www.dbpia.co.kr/Article/NODE0 6140774
21 Joobong Jang, "The Meanging and Protection Scope of Personal information", Law Review, pp.34-64, 2012. http://www.dbpia.co.kr/Article/NODE02110932
22 Hillyard, Daniel, and Mark Gauen. "Issues around th e protection or revelation of personal information." Knowledge, Technology & Policy 20.2 pp.121-124, 2007. http://link.springer.com/article/10.1007/s12130- 007-9013-9#page-1
23 Eunbyul Ko et al., Comparison of 'right to be forgotten' implemented in Korea and eu, Communication of the Korea Information Science Society 30(10), pp. 34-41, 2012. http://www.dbpia.co.kr/Article/NODE01984087
24 Barbaro, Michael, Tom Zeller, and Saul Hansell. "A face is exposed for AOL searcher no. 4417749." New York Times, 2006. http://www.nytimes.com/2006/08/09/technology/09aol.html?_r=1&