Explain how third-party cookies are created

Assignment Help Management Information Sys
Reference no: EM132173504

Case Study : Hadoop the Cookie Cutter

Questions

1. 9-16.Using your own words, explain how third-party cookies are created.

2. 9-17.Suppose you are an ad-serving company, and you maintain a log of cookie data for ads you serve to Web pages for a particular vendor (say, Amazon).

a. How can you use this data to determine which are the best ads?

b. How can you use this data to determine which are the best ad formats?

c. How could you use records of past ads and ad clicks to determine which ads to send to a given IP address?

d. How could you use this data to determine how well the technique you used in your answer to question c was working?

e. How could you use this data to determine that a given IP address is used by more than one person?

f. How does having this data give you a competitive advantage vis-à-vis other ad-serving companies?

3. 9-18.Suppose you are an ad-serving company, and you have a log of cookie data for ads served to Web pages of all your customers (Amazon, Facebook, etc.).

a. Describe, in general terms, how you can process the cookie data to associate log entries for a particular IP address.

b. Explain how your answers to question 9-10 change, given that you have this additional data.

c. Describe how you can use this log data to determine users who consistently seek the lowest price.

d. Describe how you can use this log data to determine users who consistently seek the latest fashion.

e. Explain why users like those in parts c and d above are only possible with MapReduce or a similar technique.

4. 9-19.As stated, third-party cookies usually do not contain, in themselves, data that identifies you as a particular person. However, Amazon, Facebook, and other first-party cookie vendors know who you are because you signed in.

Only one of them needs to reveal your identity to the ad-server, and your identity can then be correlated with your IP address.

At that point, the ad-server and potentially all of its clients know who you are. Are you concerned about the invasion of your privacy that third-party cookies enable? Explain your answer.

Attachment:- Case Study.rar

Reference no: EM132173504

Questions Cloud

Learning management system from sumtotal systems : what reasons did Health Net’s director of workforce planning give for deciding to implement a learning management system from SumTotal Systems?
What minimum rate of interest should he shop for : If he is looking to invest his $100,000 where he can get an inflation adjusted rate (i.e., net, after inflation is taken into account) of 12%.
Difference between cost-push and demand-pull inflation : Explain the difference between cost-push and demand-pull inflation (use a model to illustrate your answer).
Discuss about the inflation adjusted : An investor has two opportunities. An investment project in country A involving an initial investment of $100,000 and an income of $30,000 for six years.
Explain how third-party cookies are created : How could you use records of past ads and ad clicks to determine which ads to send to a given IP address?
Employer violated employee privacy : Post a news article regarding a situation where an employer violated an employee’s privacy through use of a polygraph,
What price do you charge the public : Your market research suggests that the price elasticity of demand in the general public is -1.1. a. What price do you charge the public?
Calculate depreciation schedule using straight-line method : The initial cost of a heavy-duty truck is $140,000 It is assumed that its resale value after five years is $30,000. Calculate its depreciation schedule using.
What is the corresponding amount of profits : If the firm wishes to maximize profits how much Q should it produce and what is the corresponding amount of profits.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Write a term paper on the topic byod policies

You must write a 5 pages term paper on the topic BYOD Policies, In addition to the 5 pages of the paper itself.

  Consider the security systems life cycle

Write a evaluation (not including the title and reference pages) of the security systems life cycle.Evaluate the key phases that comprise the security life cycle.Analyze the specific steps that occur in each phase,Classify both management and non-man..

  Discuss about the delphi technique

Review of a scholarly article on one of the following brainstorming techniques, the Delphi technique, brainstorming, or nominal group technique.

  What are the risks involved

Which emerging IT trend is currently impacting your business or could impact your business in the future? Should your organization respond by being an early adopter or wait to see what transpires?

  Moving target defenses to network security

Application of Moving Target Defenses to Network Security Resource Mapping System Adaptation Engine Analysis Engine

  Discuss exertion of one of the sources of power

Elect four people currently in the media and discuss their exertion of one of the sources of power - you are required to write an initial post

  Prepare a business report for the client

HI5019 - conduct research on AIS/ERP Systems for your client. Your team is required to pick a case study in one of the areas mentioned

  List three types of sensitive information involved

List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.

  Research physical security incidents and write a paper

Research physical security incidents and write a paper on one which interests you the most. A

  Review the various project management frameworks

List the activities that must be performed to complete the requirements definition of an IT project based on the provided articles. Compare the listed activities with the processes described in Figure 3.2 Process - flow of Requirements Engineering..

  What leadership or management violation has victor committed

What ethical leadership and management violation has Victor committed? Explain. What white-collar crimes, if any, did Victor and John commit?

  Describe the current it environment at this business

A successful IT administration strategy requires the continuous enforcement of policies, standards, and practices (procedures) within the organization.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd