{"id":247,"date":"2018-06-14T19:05:03","date_gmt":"2018-06-14T19:05:03","guid":{"rendered":"https:\/\/pressbooks.ccconline.org\/bus3060\/chapter\/ch14-7\/"},"modified":"2026-02-17T19:26:54","modified_gmt":"2026-02-17T19:26:54","slug":"ch14-7","status":"publish","type":"chapter","link":"https:\/\/pressbooks.ccconline.org\/bus3060\/chapter\/ch14-7\/","title":{"raw":"14.7 Customer Profiling and Behavioral Targeting","rendered":"14.7 Customer Profiling and Behavioral Targeting"},"content":{"raw":"<div id=\"slug-14-7-customer-profiling-and-behavioral-targeting\" class=\"chapter standard\">\r\n<div class=\"ugc chapter-ugc\">\r\n<div id=\"fwk-38086-ch08_s07_n01\" class=\"bcc-box bcc-highlight\">\r\n<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\"><span style=\"font-family: 'Cormorant Garamond', serif; font-size: 1em; font-style: normal; font-weight: bold;\">Learning Objectives<\/span><\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<p id=\"fwk-38086-ch08_s07_p01\" class=\"nonindent para\">After studying this section you should be able to do the following:<\/p>\r\n\r\n<ol id=\"fwk-38086-ch08_s07_l01\" class=\"orderedlist\">\r\n \t<li>Be familiar with various tracking technologies and how they are used for customer profiling and ad targeting.<\/li>\r\n \t<li>Understand why customer profiling is both valuable and controversial.<\/li>\r\n \t<li>Recognize steps that organizations can take to help ease consumer and governmental concerns.<\/li>\r\n<\/ol>\r\n<\/div>\r\n<\/div>\r\n&nbsp;\r\n\r\n<\/div>\r\n<p id=\"fwk-38086-ch08_s07_p02\" class=\"nonindent para editable block\">Advertisers are willing to pay more for ads that have a greater chance of reaching their target audience, and online firms have a number of targeting tools at their disposal. Much of this targeting occurs whenever you visit a Web site, where a behind-the-scenes software dialogue takes place between Web browser and Web server that can reveal a number of pieces of information, including IP address, the type of browser used, the computer type, its operating system, and unique identifiers, called <span class=\"margin_term\"><a class=\"glossterm\">cookies<\/a><\/span>.<\/p>\r\n<p id=\"fwk-38086-ch08_s07_p03\" class=\"indent para editable block\">And remember, <em class=\"emphasis\">any<\/em> server that serves you content can leverage these profiling technologies. You might be profiled not just by the Web site that you\u2019re visiting (e.g., nytimes.com), but also by any ad networks that serve ads on that site (e.g., Platform-A, DoubleClick, Google AdSense, Microsoft adCenter).<\/p>\r\n<p id=\"fwk-38086-ch08_s07_p04\" class=\"indent para editable block\">IP addresses are leveraged extensively in customer profiling. An IP address not only helps with geolocation, it can also indicate a browser\u2019s employer or university, which can be further matched with information such as firm size or industry. IBM has used IP targeting to tailor its college recruiting banner ads to specific schools, for example, \u201cThere Is Life After Boston College, Click Here to See Why.\u201d That campaign garnered click-through rates ranging from 5.0 to 30 percent (Moss, 1999) compared to average rates that are currently well below 1 percent for untargeted banner ads. DoubleClick once even served a banner that included a personal message for an executive at then-client Modem Media. The ad, reading \u201cCongratulations on the twins, John Nardone,\u201d was served across hundreds of sites, but was only visible from computers on the Modem Media corporate network (Moss, 1999).<\/p>\r\n<p id=\"fwk-38086-ch08_s07_p05\" class=\"indent para editable block\">The ability to identify a surfer\u2019s computer, browser, or operating system can also be used to target tech ads. For example, Google might pitch its Chrome browser to users detected running Internet Explorer, Firefox, or Safari; while Apple could target those \u201cI\u2019m a Mac\u201d ads just to Windows users.<\/p>\r\n<p id=\"fwk-38086-ch08_s07_p06\" class=\"indent para editable block\">But perhaps the greatest degree of personalization and targeting comes from cookies. Visit a Web site for the first time, and in most cases, a behind-the-scenes dialogue takes place that goes something like this:<\/p>\r\n<p id=\"fwk-38086-ch08_s07_p07\" class=\"indent para editable block\">Server: <em class=\"emphasis\">Have I seen you before?<\/em><\/p>\r\n<p id=\"fwk-38086-ch08_s07_p08\" class=\"indent para editable block\">Browser: <em class=\"emphasis\">No.<\/em><\/p>\r\n<p id=\"fwk-38086-ch08_s07_p09\" class=\"indent para editable block\">Server: <em class=\"emphasis\">Then take this unique string of numbers and letters (called a cookie). I\u2019ll use it to recognize you from now on.<\/em><\/p>\r\n<p id=\"fwk-38086-ch08_s07_p10\" class=\"indent para editable block\">The cookie is just a line of identifying text assigned and retrieved by a given Web server and stored on your computer by your browser. Upon accepting this cookie your browser has been tagged, like an animal. As you surf around the firm\u2019s Web site, that cookie can be used to build a profile associated with your activities. If you\u2019re on a portal like Yahoo! you might type in your zip code, enter stocks that you\u2019d like to track, and identify the sports teams you\u2019d like to see scores for. The next time you return to the Web site, your browser responds to the server\u2019s \u201c<em class=\"emphasis\">Have I see you before?<\/em>\u201d question with the equivalent of \u201c<em class=\"emphasis\">Yes, you know me;<\/em>,\u201d and it presents the cookie that the site gave you earlier. The site can then match this cookie against your browsing profile, showing you the weather, stock quotes, sports scores, and other info that it thinks you\u2019re interested in.<\/p>\r\n<p id=\"fwk-38086-ch08_s07_p11\" class=\"indent para editable block\">Cookies are used for lots of purposes. Retail Web sites like Amazon use cookies to pay attention to what you\u2019ve shopped for and bought, tailoring Web sites to display products that the firm suspects you\u2019ll be most interested in. Sites also use cookies to keep track of what you put in an online \u201cshopping cart,\u201d so if you quit browsing before making a purchase, these items will reappear the next time you visit. And many Web sites also use cookies as part of a \u201cremember me\u201d feature, storing user IDs and passwords. Beware this last one! If you check the \u201cremember me\u201d box on a public Web browser, the next person who uses that browser is potentially using <em class=\"emphasis\">your<\/em> cookie, and can log in as you!<\/p>\r\n<p id=\"fwk-38086-ch08_s07_p12\" class=\"indent para editable block\">An organization can\u2019t read cookies that it did not give you. So businessweek.com can\u2019t tell if you\u2019ve also got cookies from forbes.com. But you can see all of the cookies in your browser. Take a look and you\u2019ll almost certainly see cookies from dozens of Web sites that you\u2019ve never visited before. These are <span class=\"margin_term\"><a class=\"glossterm\">third-party cookies<\/a><\/span> (sometimes called <em class=\"emphasis\">tracking cookies<\/em>), and they are usually served by ad networks or other customer profiling firms.<\/p>\r\n\r\n<div style=\"text-align: center; font-size: .8em; max-width: 497px;\">\r\n<p class=\"nonindent title\"><span class=\"title-prefix\">Figure 14.12<\/span><\/p>\r\n<p class=\"indent\"><a>\r\n<img style=\"max-width: 497px;\" src=\"https:\/\/pressbooks.ccconline.org\/wp-content\/uploads\/sites\/324\/2018\/06\/415473de2fd38c6d098b1545899c9355.jpg\" alt=\"The Preferences setting in most Web browsers allows you to see its cookies. This browser has received cookies from several ad networks, media sites, and the University of Minnesota Carlson School of Management.\" \/>\r\n<\/a><\/p>\r\n<p class=\"indent para\">The Preferences setting in most Web browsers allows you to see its cookies. This browser has received cookies from several ad networks, media sites, and the University of Minnesota Carlson School of Management.<\/p>\r\n\r\n<\/div>\r\n<p id=\"fwk-38086-ch08_s07_p13\" class=\"indent para editable block\">By serving and tracking cookies in ads shown across partner sites, ad networks can build detailed browsing profiles that include sites visited, specific pages viewed, duration of visit, and the types of ads you\u2019ve seen and responded to. And that surfing might give an advertising network a better guess at demographics like gender, age, marital status, and more. Visit a new parent site and expect to see diaper ads in the future, even when you\u2019re surfing for news or sports scores!<\/p>\r\n\r\n<div id=\"fwk-38086-ch08_s07_n02\" class=\"bcc-box bcc-highlight\">\r\n<div class=\"textbox shaded\">\r\n<h4 class=\"title\">But What If I Don\u2019t Want a Cookie!<\/h4>\r\n<p id=\"fwk-38086-ch08_s07_p14\" class=\"nonindent para\">If all of this creeps you out, remember that you\u2019re in control. The most popular Web browsers allow you to block all cookies, block just third-party cookies, purge your cookie file, or even ask for your approval before accepting a cookie. Of course, if you block cookies, you block any benefits that come along with them, and some Web site features may require cookies to work properly. Also note that while deleting a cookie breaks a link between your browser and that Web site, if you supply identifying information in the future (say by logging into an old profile), the site might be able to assign your old profile data to the new cookie.<\/p>\r\n\r\n<\/div>\r\n&nbsp;\r\n\r\n<\/div>\r\n<p id=\"fwk-38086-ch08_s07_p15\" class=\"indent para editable block\">While the Internet offers targeting technologies that go way beyond traditional television, print, and radio offerings, none of these techniques is perfect. Since users are regularly assigned different IP addresses as they connect and disconnect from various physical and Wi-Fi networks, IP targeting can\u2019t reliably identify individual users. Cookies also have their weaknesses. They\u2019re assigned by browsers and associated with a log-in account profile on that computer. That means that if several people use the same browser on the same computer without logging on to that machine as separate users, then all their Web surfing activity may be mixed into the same cookie profile. (One solution is to create different log-in accounts on that computer. Your PC will then keep separate cookies for each account.) Some users might also use different browsers on the same machine, or use different computers. Unless a firm has a way to match up these different cookies with a single user account or other user-identifying information, a site may be working with multiple, incomplete profiles.<\/p>\r\n\r\n<div id=\"fwk-38086-ch08_s07_n03\" class=\"bcc-box bcc-success\">\r\n<div class=\"textbox textbox--key-takeaways\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\"><span style=\"font-family: 'Cormorant Garamond', serif; font-size: 1em; font-style: normal; font-weight: bold;\">Key Takeaways<\/span><\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul id=\"fwk-38086-ch08_s07_l02\" class=\"itemizedlist\">\r\n \t<li>The communication between Web browser and Web server can identify IP address, the type of browser used, the computer type, its operating system, time and date of access, and duration of Web page visit, and can read and assign unique identifiers, called cookies\u2014all of which can be used in customer profiling and ad targeting.<\/li>\r\n \t<li>An IP address not only helps with geolocation; it can also be matched against other databases to identify the organization providing the user with Internet access (such as a firm or university), that organization\u2019s industry, size, and related statistics.<\/li>\r\n \t<li>A cookie is a unique line of identifying text, assigned and retrieved by a given Web server and stored on a computer by the browser, that can be used to build a profile associated with your Web activities.<\/li>\r\n \t<li>The most popular Web browsers allow you to block all cookies, block just third-party cookies, purge your cookie file, or even ask for your approval before accepting a cookie.<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n&nbsp;\r\n\r\n<\/div>\r\n<div id=\"fwk-38086-ch08_s07_n04\" class=\"bcc-box bcc-info\">\r\n<div class=\"textbox textbox--exercises\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\"><span style=\"font-family: 'Cormorant Garamond', serif; font-size: 1em; font-style: normal; font-weight: bold;\">Questions and Exercises<\/span><\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ol id=\"fwk-38086-ch08_s07_l03\" class=\"orderedlist\">\r\n \t<li>Give examples of how the ability to identify a surfer\u2019s computer, browser, or operating system can be used to target tech ads.<\/li>\r\n \t<li>Describe how IBM targeted ad delivery for its college recruiting efforts. What technologies were used? What was the impact on click-through rates?<\/li>\r\n \t<li>What is a cookie? How are cookies used? Is a cookie a computer program? Which firms can read the cookies in your Web browser?<\/li>\r\n \t<li>Does a cookie accurately identify a user? Why or why not?<\/li>\r\n \t<li>What is the danger of checking the \u201cremember me\u201d box on a public Web browser?<\/li>\r\n \t<li>What\u2019s a third-party cookie? What kinds of firms might use these? How are they used?<\/li>\r\n \t<li>How can users restrict cookie use on their Web browsers? What is the downside of blocking cookies?<\/li>\r\n \t<li>Work with a faculty member and join the Google Online Marketing Challenge (held spring of every year\u2014see http:\/\/www.google.com\/onlinechallenge). Google offers ad credits for student teams to develop and run online ad campaigns for real clients and offers prizes for winning teams. Some of the experiences earned in the Google Challenge can translate to other ad networks as well; and first-hand client experience has helped many students secure jobs, internships, and even start their own businesses.<\/li>\r\n<\/ol>\r\n<\/div>\r\n<\/div>\r\n&nbsp;\r\n\r\n<\/div>\r\n<h2>References<\/h2>\r\n<p class=\"nonindent\">Moss, M., \u201cThese Web Sites Know Who You Are,\u201d <em class=\"emphasis\">ZDNet UK<\/em>, October 13, 1999.<\/p>\r\n\r\n<\/div>\r\n<\/div>","rendered":"<div id=\"slug-14-7-customer-profiling-and-behavioral-targeting\" class=\"chapter standard\">\n<div class=\"ugc chapter-ugc\">\n<div id=\"fwk-38086-ch08_s07_n01\" class=\"bcc-box bcc-highlight\">\n<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\"><span style=\"font-family: 'Cormorant Garamond', serif; font-size: 1em; font-style: normal; font-weight: bold;\">Learning Objectives<\/span><\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p id=\"fwk-38086-ch08_s07_p01\" class=\"nonindent para\">After studying this section you should be able to do the following:<\/p>\n<ol id=\"fwk-38086-ch08_s07_l01\" class=\"orderedlist\">\n<li>Be familiar with various tracking technologies and how they are used for customer profiling and ad targeting.<\/li>\n<li>Understand why customer profiling is both valuable and controversial.<\/li>\n<li>Recognize steps that organizations can take to help ease consumer and governmental concerns.<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<p id=\"fwk-38086-ch08_s07_p02\" class=\"nonindent para editable block\">Advertisers are willing to pay more for ads that have a greater chance of reaching their target audience, and online firms have a number of targeting tools at their disposal. Much of this targeting occurs whenever you visit a Web site, where a behind-the-scenes software dialogue takes place between Web browser and Web server that can reveal a number of pieces of information, including IP address, the type of browser used, the computer type, its operating system, and unique identifiers, called <span class=\"margin_term\"><a class=\"glossterm\">cookies<\/a><\/span>.<\/p>\n<p id=\"fwk-38086-ch08_s07_p03\" class=\"indent para editable block\">And remember, <em class=\"emphasis\">any<\/em> server that serves you content can leverage these profiling technologies. You might be profiled not just by the Web site that you\u2019re visiting (e.g., nytimes.com), but also by any ad networks that serve ads on that site (e.g., Platform-A, DoubleClick, Google AdSense, Microsoft adCenter).<\/p>\n<p id=\"fwk-38086-ch08_s07_p04\" class=\"indent para editable block\">IP addresses are leveraged extensively in customer profiling. An IP address not only helps with geolocation, it can also indicate a browser\u2019s employer or university, which can be further matched with information such as firm size or industry. IBM has used IP targeting to tailor its college recruiting banner ads to specific schools, for example, \u201cThere Is Life After Boston College, Click Here to See Why.\u201d That campaign garnered click-through rates ranging from 5.0 to 30 percent (Moss, 1999) compared to average rates that are currently well below 1 percent for untargeted banner ads. DoubleClick once even served a banner that included a personal message for an executive at then-client Modem Media. The ad, reading \u201cCongratulations on the twins, John Nardone,\u201d was served across hundreds of sites, but was only visible from computers on the Modem Media corporate network (Moss, 1999).<\/p>\n<p id=\"fwk-38086-ch08_s07_p05\" class=\"indent para editable block\">The ability to identify a surfer\u2019s computer, browser, or operating system can also be used to target tech ads. For example, Google might pitch its Chrome browser to users detected running Internet Explorer, Firefox, or Safari; while Apple could target those \u201cI\u2019m a Mac\u201d ads just to Windows users.<\/p>\n<p id=\"fwk-38086-ch08_s07_p06\" class=\"indent para editable block\">But perhaps the greatest degree of personalization and targeting comes from cookies. Visit a Web site for the first time, and in most cases, a behind-the-scenes dialogue takes place that goes something like this:<\/p>\n<p id=\"fwk-38086-ch08_s07_p07\" class=\"indent para editable block\">Server: <em class=\"emphasis\">Have I seen you before?<\/em><\/p>\n<p id=\"fwk-38086-ch08_s07_p08\" class=\"indent para editable block\">Browser: <em class=\"emphasis\">No.<\/em><\/p>\n<p id=\"fwk-38086-ch08_s07_p09\" class=\"indent para editable block\">Server: <em class=\"emphasis\">Then take this unique string of numbers and letters (called a cookie). I\u2019ll use it to recognize you from now on.<\/em><\/p>\n<p id=\"fwk-38086-ch08_s07_p10\" class=\"indent para editable block\">The cookie is just a line of identifying text assigned and retrieved by a given Web server and stored on your computer by your browser. Upon accepting this cookie your browser has been tagged, like an animal. As you surf around the firm\u2019s Web site, that cookie can be used to build a profile associated with your activities. If you\u2019re on a portal like Yahoo! you might type in your zip code, enter stocks that you\u2019d like to track, and identify the sports teams you\u2019d like to see scores for. The next time you return to the Web site, your browser responds to the server\u2019s \u201c<em class=\"emphasis\">Have I see you before?<\/em>\u201d question with the equivalent of \u201c<em class=\"emphasis\">Yes, you know me;<\/em>,\u201d and it presents the cookie that the site gave you earlier. The site can then match this cookie against your browsing profile, showing you the weather, stock quotes, sports scores, and other info that it thinks you\u2019re interested in.<\/p>\n<p id=\"fwk-38086-ch08_s07_p11\" class=\"indent para editable block\">Cookies are used for lots of purposes. Retail Web sites like Amazon use cookies to pay attention to what you\u2019ve shopped for and bought, tailoring Web sites to display products that the firm suspects you\u2019ll be most interested in. Sites also use cookies to keep track of what you put in an online \u201cshopping cart,\u201d so if you quit browsing before making a purchase, these items will reappear the next time you visit. And many Web sites also use cookies as part of a \u201cremember me\u201d feature, storing user IDs and passwords. Beware this last one! If you check the \u201cremember me\u201d box on a public Web browser, the next person who uses that browser is potentially using <em class=\"emphasis\">your<\/em> cookie, and can log in as you!<\/p>\n<p id=\"fwk-38086-ch08_s07_p12\" class=\"indent para editable block\">An organization can\u2019t read cookies that it did not give you. So businessweek.com can\u2019t tell if you\u2019ve also got cookies from forbes.com. But you can see all of the cookies in your browser. Take a look and you\u2019ll almost certainly see cookies from dozens of Web sites that you\u2019ve never visited before. These are <span class=\"margin_term\"><a class=\"glossterm\">third-party cookies<\/a><\/span> (sometimes called <em class=\"emphasis\">tracking cookies<\/em>), and they are usually served by ad networks or other customer profiling firms.<\/p>\n<div style=\"text-align: center; font-size: .8em; max-width: 497px;\">\n<p class=\"nonindent title\"><span class=\"title-prefix\">Figure 14.12<\/span><\/p>\n<p class=\"indent\"><a><br \/>\n<img decoding=\"async\" style=\"max-width: 497px;\" src=\"https:\/\/pressbooks.ccconline.org\/wp-content\/uploads\/sites\/324\/2018\/06\/415473de2fd38c6d098b1545899c9355.jpg\" alt=\"The Preferences setting in most Web browsers allows you to see its cookies. This browser has received cookies from several ad networks, media sites, and the University of Minnesota Carlson School of Management.\" \/><br \/>\n<\/a><\/p>\n<p class=\"indent para\">The Preferences setting in most Web browsers allows you to see its cookies. This browser has received cookies from several ad networks, media sites, and the University of Minnesota Carlson School of Management.<\/p>\n<\/div>\n<p id=\"fwk-38086-ch08_s07_p13\" class=\"indent para editable block\">By serving and tracking cookies in ads shown across partner sites, ad networks can build detailed browsing profiles that include sites visited, specific pages viewed, duration of visit, and the types of ads you\u2019ve seen and responded to. And that surfing might give an advertising network a better guess at demographics like gender, age, marital status, and more. Visit a new parent site and expect to see diaper ads in the future, even when you\u2019re surfing for news or sports scores!<\/p>\n<div id=\"fwk-38086-ch08_s07_n02\" class=\"bcc-box bcc-highlight\">\n<div class=\"textbox shaded\">\n<h4 class=\"title\">But What If I Don\u2019t Want a Cookie!<\/h4>\n<p id=\"fwk-38086-ch08_s07_p14\" class=\"nonindent para\">If all of this creeps you out, remember that you\u2019re in control. The most popular Web browsers allow you to block all cookies, block just third-party cookies, purge your cookie file, or even ask for your approval before accepting a cookie. Of course, if you block cookies, you block any benefits that come along with them, and some Web site features may require cookies to work properly. Also note that while deleting a cookie breaks a link between your browser and that Web site, if you supply identifying information in the future (say by logging into an old profile), the site might be able to assign your old profile data to the new cookie.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<p id=\"fwk-38086-ch08_s07_p15\" class=\"indent para editable block\">While the Internet offers targeting technologies that go way beyond traditional television, print, and radio offerings, none of these techniques is perfect. Since users are regularly assigned different IP addresses as they connect and disconnect from various physical and Wi-Fi networks, IP targeting can\u2019t reliably identify individual users. Cookies also have their weaknesses. They\u2019re assigned by browsers and associated with a log-in account profile on that computer. That means that if several people use the same browser on the same computer without logging on to that machine as separate users, then all their Web surfing activity may be mixed into the same cookie profile. (One solution is to create different log-in accounts on that computer. Your PC will then keep separate cookies for each account.) Some users might also use different browsers on the same machine, or use different computers. Unless a firm has a way to match up these different cookies with a single user account or other user-identifying information, a site may be working with multiple, incomplete profiles.<\/p>\n<div id=\"fwk-38086-ch08_s07_n03\" class=\"bcc-box bcc-success\">\n<div class=\"textbox textbox--key-takeaways\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\"><span style=\"font-family: 'Cormorant Garamond', serif; font-size: 1em; font-style: normal; font-weight: bold;\">Key Takeaways<\/span><\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul id=\"fwk-38086-ch08_s07_l02\" class=\"itemizedlist\">\n<li>The communication between Web browser and Web server can identify IP address, the type of browser used, the computer type, its operating system, time and date of access, and duration of Web page visit, and can read and assign unique identifiers, called cookies\u2014all of which can be used in customer profiling and ad targeting.<\/li>\n<li>An IP address not only helps with geolocation; it can also be matched against other databases to identify the organization providing the user with Internet access (such as a firm or university), that organization\u2019s industry, size, and related statistics.<\/li>\n<li>A cookie is a unique line of identifying text, assigned and retrieved by a given Web server and stored on a computer by the browser, that can be used to build a profile associated with your Web activities.<\/li>\n<li>The most popular Web browsers allow you to block all cookies, block just third-party cookies, purge your cookie file, or even ask for your approval before accepting a cookie.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<div id=\"fwk-38086-ch08_s07_n04\" class=\"bcc-box bcc-info\">\n<div class=\"textbox textbox--exercises\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\"><span style=\"font-family: 'Cormorant Garamond', serif; font-size: 1em; font-style: normal; font-weight: bold;\">Questions and Exercises<\/span><\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ol id=\"fwk-38086-ch08_s07_l03\" class=\"orderedlist\">\n<li>Give examples of how the ability to identify a surfer\u2019s computer, browser, or operating system can be used to target tech ads.<\/li>\n<li>Describe how IBM targeted ad delivery for its college recruiting efforts. What technologies were used? What was the impact on click-through rates?<\/li>\n<li>What is a cookie? How are cookies used? Is a cookie a computer program? Which firms can read the cookies in your Web browser?<\/li>\n<li>Does a cookie accurately identify a user? Why or why not?<\/li>\n<li>What is the danger of checking the \u201cremember me\u201d box on a public Web browser?<\/li>\n<li>What\u2019s a third-party cookie? What kinds of firms might use these? How are they used?<\/li>\n<li>How can users restrict cookie use on their Web browsers? What is the downside of blocking cookies?<\/li>\n<li>Work with a faculty member and join the Google Online Marketing Challenge (held spring of every year\u2014see http:\/\/www.google.com\/onlinechallenge). Google offers ad credits for student teams to develop and run online ad campaigns for real clients and offers prizes for winning teams. Some of the experiences earned in the Google Challenge can translate to other ad networks as well; and first-hand client experience has helped many students secure jobs, internships, and even start their own businesses.<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<h2>References<\/h2>\n<p class=\"nonindent\">Moss, M., \u201cThese Web Sites Know Who You Are,\u201d <em class=\"emphasis\">ZDNet UK<\/em>, October 13, 1999.<\/p>\n<\/div>\n<\/div>\n","protected":false},"author":217,"menu_order":7,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[49],"contributor":[],"license":[],"class_list":["post-247","chapter","type-chapter","status-publish","hentry","chapter-type-numberless"],"part":222,"_links":{"self":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/chapters\/247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/wp\/v2\/users\/217"}],"version-history":[{"count":3,"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/chapters\/247\/revisions"}],"predecessor-version":[{"id":793,"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/chapters\/247\/revisions\/793"}],"part":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/parts\/222"}],"metadata":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/chapters\/247\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/wp\/v2\/media?parent=247"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/pressbooks\/v2\/chapter-type?post=247"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/wp\/v2\/contributor?post=247"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.ccconline.org\/bus3060\/wp-json\/wp\/v2\/license?post=247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}