ISYS 250 Lecture Notes - Lecture 4: Web Browser, Web Server, Typosquatting
Document Summary
Users should: conduct business only with web sites that have privacy policies, limit access to personal information to those with authorization. Make sure any data collection has a stated purpose: use veri cation procedures to ensure data accuracy. Small text les with unique id tags that are embedded in a web browser and saved on the user"s hard drive. Log les: record a user"s actions on a web site and are generated by web server software. Organizations can reduce unethical behavior of employees by developing and enforcing codes of ethics. Public information: posted by an organization or public agency, censored for public policy reasons. Private information: posted by a person, uncensored because of constitutional freedom of expression. Industrial property: inventions, trademarks, logos, and industrial designs. Copyrighted material: literary and artistic works, online materials such as web pages, html code, and computer graphics.