Skip to main content

Personal Privacy and Information Management

  • Chapter
  • First Online:
Facebook Nation
  • 1143 Accesses

Abstract

In March 2018, whistleblower Christopher Wylie disclosed that the British political consulting firm Cambridge Analytica purchased Facebook data on tens of millions of Americans without their knowledge in order to build a “psychological warfare tool” on behalf of clients who intended to interfere in the 2016 U.S. presidential election in Donald Trump’s favor (1).

“Awareness is an effective weapon against many forms of identity theft.”

– U.S. Federal Trade Commission (April 2007)

“As we go through our lives we create vast amounts of data. It’s more than just data. It represents our actions, interests, intentions, communications, relationships, locations, behaviors and creative and consumptive efforts.”

– The Locker Project (May 2011)

“I divide the entire set of Fortune Global 2000 firms into two categories: those that know they’ve been compromised and those that don’t yet know.”

– Cybersecurity Executive Dmitri Alperovitch (August 2011)

“There are only two types of companies: those that have been hacked, and those that will be. Even that is merging into one category: those that have been hacked and will be again.”

– FBI Director Robert Mueller (March 2012)

“Advertising that respects privacy is not only possible, it was the standard until the growth of the Internet.”

– Apple (November 2020)

“Advertising is essential to keeping the web open for everyone, but the web ecosystem is at risk if privacy practices do not keep up with changing expectations. People want assurances that their identity and information are safe as they browse the web.”

– Google Product Manager Chetna Bindra (January 2021)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lapowsky, Issie. How Cambridge Analytica Sparked the Great Privacy Awakening. [Online] Wired, March 17, 2019. https://www.wired.com/story/cambridge-analytica-facebook-privacy-awakening/.

  2. Duffy, Clare. 500 million LinkedIn users’ data is for sale on a hacker site. [Online] CNN Business, April 8, 2021. https://www.cnn.com/2021/04/08/tech/linkedin-data-scraped-hacker-site/index.html.

  3. Intelius. Intelius Facts. [Online] Intelius. [Cited: January 25, 2012.] http://www.intelius.com/corp/intelius-facts.

  4. The Associated Press. U.K. phone hacking leads to arrest of ex-Cameron aide. [Online] The Associated Press, July 8, 2011. http://www.cbc.ca/news/world/story/2011/07/08/phone-hacking-cameron.html.

  5. Cieply, Michael. Actress’s Suit Against IMDb for Publishing Her Actual Age Can Go to Trial. [Online] The New York Times, March 19, 2013. http://mediadecoder.blogs.nytimes.com/2013/03/19/actresss-suit-against-imdb-for-publishing-her-actual-age-can-go-to-trial/.

  6. Haley, Kevin. Introducing the Symantec Smartphone Honey Stick Project. [Online] Symantec Official Blog, March 9, 2012. http://www.symantec.com/connect/blogs/introducing-symantec-smartphone-honey-stick-project.

  7. Symantec Corporation. The Symantec Smartphone Honey Stick Project. [Online] Symantec Corporation, 2012. http://www.symantec.com/content/en/us/about/presskits/b-symantec-smartphone-honey-stick-project.en-us.pdf.

  8. Sager, Mike. What I’ve Learned: Andy Grove. [Online] Esquire Magazine, May 1, 2000. http://www.esquire.com/features/what-ive-learned/learned-andy-grove-0500.

  9. Gross, Doug. Manage (and make cash with?) your data online. [Online] CNN, February 27, 2012. http://www.cnn.com/2012/02/24/tech/web/owning-your-data-online/index.html.

  10. Constine, Josh. Facebook Could Slow Down A Tiny Bit As It Starts Switching All Users To Secure HTTPS Connections. [Online] TechCrunch, November 18, 2012. http://techcrunch.com/2012/11/18/facebook-https/.

  11. pzdupe1 and pzdupe2. You can now connect to Facebook on your phone without leaving a digital trail. [Online] Business Insider, January 19, 2016. https://www.businessinsider.com/facebook-tor-android-2016-1.

  12. Szoldra, Paul. 1 million people are now connecting to Facebook without leaving a digital trail. [Online] Business Insider India, April 22, 2016. https://www.businessinsider.in/1-million-people-are-now-connecting-to-Facebook-without-leaving-a-digital-trail/articleshow/51948910.cms.

  13. Pagliery, Jose. Half of American adults hacked this year. [Online] CNNMoney, May 28, 2014. http://money.cnn.com/2014/05/28/technology/security/hack-data-breach/.

  14. O’Sullivan, Donie. Half a billion Facebook users’ information posted on hacking website, cyber experts say. [Online] CNN Business, April 4, 2021. https://www.cnn.com/2021/04/04/tech/facebook-user-info-leaked/index.html.

  15. Duffy, Clare. Facebook will not notify the 533 million users exposed in online database. [Online] CNN Business, April 9, 2021. https://www.cnn.com/2021/04/09/tech/facebook-hack-user-notification/index.html.

  16. Jewell, Mark. TJX breach could top 94 million accounts. [Online] NBC News, October 24, 2007. http://www.msnbc.msn.com/id/21454847/ns/technology_and_science-security/t/tjx-breach-could-top-million-accounts/.

  17. Cubrilovic, Nik. RockYou Hack: From Bad To Worse. [Online] TechCrunch, December 14, 2009. http://techcrunch.com/2009/12/14/rockyou-hack-security-myspace-facebook-passwords/.

  18. Krebs, Brian. PlentyofFish.com Hacked, Blames Messenger. [Online] KrebsOnSecurity.com, January 31, 2011. http://krebsonsecurity.com/2011/01/plentyoffish-com-hacked-blames-messenger/.

  19. Hickins, Michael and Clark, Don. Questions Over Break-In at Security Firm RSA. [Online] The Wall Street Journal, March 18, 2011. http://online.wsj.com/article/SB10001424052748703512404576208983743029392.html.

  20. Wingfield, Nick, Sherr, Ian and Worthen, Ben. Hacker Raids Sony Videogame Network. [Online] The Wall Street Journal, April 27, 2011. http://online.wsj.com/article/SB10001424052748703778104576287362503776534.html.

  21. Smith, Aaron. Citi: Millions stolen in May hack attack. [Online] CNNMoney, June 27, 2011. http://money.cnn.com/2011/06/27/technology/citi_credit_card/index.htm.

  22. Zakaria, Tabassum and Hosenball, Mark. Stratfor Hack: Anonymous-Affiliated Hackers Publish Thousands Of Credit Card Numbers. [Online] Huffington Post, December 30, 2011. http://www.huffingtonpost.com/2011/12/30/stratfor-hack-anonymous_n_1176726.html.

  23. Acohido, Byron. Credit card processor hit by hackers. [Online] USA Today, March 30, 2012. http://www.usatoday.com/money/industries/banking/story/2012-03-30/mastercard-security-breach/53887854/1.

  24. Goldman, David. More than 6 million LinkedIn passwords stolen. [Online] CNNMoney, June 7, 2012. http://money.cnn.com/2012/06/06/technology/linkedin-password-hack/index.htm.

  25. eHarmony.com. Update on Compromised Passwords. [Online] eHarmony Blog, June 6, 2012. http://www.eharmony.com/blog/2012/06/06/update-on-compromised-passwords/#.U5ynqssU914.

  26. Gross, Doug. Yahoo hacked, 450,000 passwords posted online. [Online] CNN, July 13, 2012. http://www.cnn.com/2012/07/12/tech/web/yahoo-users-hacked/index.html.

  27. Riley, Charles. Barnes & Noble customer data stolen. [Online] CNNMoney, October 24, 2012. http://money.cnn.com/2012/10/24/technology/barnes%2D%2Dnoble-hack/index.html.

  28. Lord, Bob. Keeping our users secure. [Online] Twitter Blog, February 1, 2013. http://blog.twitter.com/2013/02/keeping-our-users-secure.html.

  29. Bull, Alister and Finkle, Jim. Fed says internal site breached by hackers, no critical functions affected. [Online] Reuters, February 6, 2013. http://www.reuters.com/article/2013/02/06/net-us-usa-fed-hackers-idUSBRE91501920130206.

  30. Engberg, Dave. Security Notice: Service-wide Password Reset. [Online] The Evernote Blog, March 2, 2013. http://blog.evernote.com/blog/2013/03/02/security-notice-service-wide-password-reset/.

  31. Arkin, Brad. Important Customer Security Announcement. [Online] Adobe Featured Blogs, October 3, 2013. http://blogs.adobe.com/conversations/2013/10/important-customer-security-announcement.html.

  32. Wallace, Gregory. Neiman Marcus hack hit 1.1 million customers. [Online] CNNMoney, January 23, 2014. http://money.cnn.com/2014/01/23/news/companies/neiman-marcus-hack/.

  33. Isidore, Chris. Target: Hacking hit up to 110 million customers. [Online] CNNMoney, January 11, 2014. http://money.cnn.com/2014/01/10/news/companies/target-hacking/index.html.

  34. Lobosco, Katie. Michaels hack hit 3 million. [Online] CNN, April 18, 2014. http://money.cnn.com/2014/04/17/news/companies/michaels-security-breach/.

  35. Gross, Doug. Millions of accounts compromised in Snapchat hack. [Online] CNN, January 2, 2014. http://www.cnn.com/2014/01/01/tech/social-media/snapchat-hack/.

  36. eBay. eBay Inc. To Ask eBay Users To Change Passwords. [Online] ebay inc., May 21, 2014. http://investor.ebayinc.com/releasedetail.cfm?ReleaseID=849396.

  37. AOL Mail Team. AOL Security Update. [Online] Aol Blog, April 28, 2014. http://blog.aol.com/2014/04/28/aol-security-update/.

  38. Smith, Aaron. P.F. Chang’s confirms credit data was stolen. [Online] CNNMoney, June 13, 2014. http://money.cnn.com/2014/06/13/technology/security/pf-changs-security/index.html.

  39. Perlroth, Nicole and Gelles, David. Russian Hackers Amass Over a Billion Internet Passwords. [Online] The New York Times, August 5, 2014. http://www.nytimes.com/2014/08/06/technology/russian-gang-said-to-amass-more-than-a-billion-stolen-internet-credentials.html.

  40. Cooper, Charles. Celebs, beware: Those nude selfies will be hacked and shared. [Online] CNet, September 2, 2014. http://www.cnet.com/news/the-new-price-of-celebrity-careful-before-taking-that-nudie-selfie/.

  41. Perlroth, Nicole. Home Depot Data Breach Could Be the Largest Yet. [Online] The New York Times, September 8, 2014. http://bits.blogs.nytimes.com/2014/09/08/home-depot-confirms-that-it-was-hacked/.

  42. Terhune, Chad. UCLA Health System data breach affects 4.5 million patients. [Online] Los Angeles Times, July 17, 2015. https://www.latimes.com/business/la-fi-ucla-medical-data-20150717-story.html.

  43. Williams, Martyn. OPM hackers stole data on 21.5M people, including 1.1M fingerprints. [Online] Computerworld, July 9, 2015. https://www.computerworld.com/article/2946031/opm-hackers-stole-data-on-215m-people-including-11m-fingerprints.html.

  44. Pagliery, Jose. Instagram-tracking app actually stole your password. [Online] CNN Business, November 12, 2015. https://money.cnn.com/2015/11/12/technology/instaagent-instagram/index.html.

  45. Kan, Michael. Yahoo reports massive data breach involving 1 billion accounts. [Online] PC World, December 14, 2016. https://www.pcworld.com/article/3150670/yahoo-reports-massive-data-breach-involving-1-billion-accounts.html.

  46. Larson, Selena. Stuffed toys leak millions of voice recordings from kids and parents. [Online] CNN Business, February 27, 2017. https://money.cnn.com/2017/02/27/technology/cloudpets-data-leak-voices-photos/index.html.

  47. Profis, Sharon. Equifax data breach: Find out if you were one of 143 million hacked. [Online] CNet, September 11, 2017. https://www.cnet.com/how-to/equifax-data-breach-find-out-if-you-were-one-of-143-million-hacked/.

  48. Etherington, Darrell. Uber data breach from 2016 affected 57 million riders and drivers. [Online] TechCrunch, November 21, 2017.

    Google Scholar 

  49. England, R. Hackers gain access to millions of T-Mobile customer details. [Online] Engadget, August 24, 2018. https://www.engadget.com/2018-08-24-hackers-access-millions-t-mobile-customer-details.html.

  50. McLean, Rob. A hacker gained access to 100 million Capital One credit card applications and accounts. [Online] CNN Business, July 30, 2019. https://www.cnn.com/2019/07/29/business/capital-one-data-breach/index.html.

  51. Scroxton, Alex. Carnival cruise lines hit by ransomware, customer data stolen. [Online] Computer Weekly, August 18, 2020. https://www.computerweekly.com/news/252487779/Carnival-cruise-lines-hit-by-ransomware-customer-data-stolen.

  52. Scullion, Chris. The entirety of Twitch has reportedly been leaked. Video Games Chronicle. [Online] October 6, 2021. https://www.videogameschronicle.com/news/the-entirety-of-twitch-has-reportedly-been-leaked/.

  53. Perlroth, Nicole. Some Victims of Online Hacking Edge Into the Light. [Online] The New York Times, February 20, 2013. http://www.nytimes.com/2013/02/21/technology/hacking-victims-edge-into-light.html.

  54. John P. Mello, Jr. McAfee Warns of Massive 5-Year Hacking Plot. [Online] PCWorld, August 3, 2011. http://www.pcworld.com/article/237163/McAfee_Warns_of_Massive_5_Year_Hacking_Plot.html.

  55. Cowley, Stacy. FBI Director: Cybercrime will eclipse terrorism. [Online] CNNMoney, March 2, 2012. http://money.cnn.com/2012/03/02/technology/fbi_cybersecurity/index.htm.

  56. Ozawa, Nancy and Sullivan, Lesley. A New Identity Fraud Victim Every Two Seconds in 2013 According to Latest Javelin Strategy & Research Study. [Online] Javelin Strategy and Research, February 5, 2014. https://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/.

  57. Federal Trade Commission. About Identity Theft. [Online] Federal Trade Commission, April 16, 2007. https://web.archive.org/web/20070416061102/http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html.

  58. —. Deter. Detect. Defend. Fighting Back Against Identity Theft. [Online] Federal Trade Commission. [Cited: May 14, 2012.] http://www.ftc.gov/bcp/edu/pubs/consumer/idtheft/idt01.pdf.

  59. Federal Bureau of Investigation. Malware Installed on Travelers’ Laptops Through Software Updates on Hotel Internet Connections. [Online] Federal Bureau of Investigation, May 8, 2012. http://www.fbi.gov/scams-safety/e-scams.

  60. Tuerk, Andreas. Giving you more insight into your Google Account activity. [Online] Google Official Blog, March 28, 2012. http://googleblog.blogspot.com/2012/03/giving-you-more-insight-into-your.html#!/2012/03/giving-you-more-insight-into-your.html.

  61. Google. What are Google Alerts? [Online] Google Alerts. [Cited: May 25, 2012.] https://support.google.com/alerts/bin/answer.py?hl=en&answer=175925.

  62. Hoonakker, Peter, Bornoe, Nis and Carayon, Pascale. Password Authentication from a Human Factors Perspective: Results of a Survey among End-Users. [Online] Proceedings of the Human Factors and Ergonomics Society 53Rd Annual Meeting, 2009. http://www.hfes.org/web/Newsroom/HFES09-Hoonaker-CIS.pdf.

  63. Kotadia, Munir. Microsoft security guru: Jot down your passwords. [Online] CNet, May 23, 2005. http://news.cnet.com/Microsoft-security-guru-Jot-down-your-passwords/2100-7355_3-5716590.html.

  64. Cheng, Roger and McCullagh, Declan. Yahoo breach: Swiped passwords by the numbers. [Online] CNet, July 12, 2012. http://news.cnet.com/8301-1009_3-57470878-83/yahoo-breach-swiped-passwords-by-the-numbers/.

  65. Ebrahimji, Alisha. Yes, people are still using ‘123456’ and ‘password’ as their password. [Online] CNN, November 19, 2020. https://www.cnn.com/2020/11/19/tech/common-passwords-2020-trnd/index.html.

  66. Timmer, John. 30 years of failure: the username/password combination. [Online] Ars Technica, October 31, 2009. http://arstechnica.com/business/2009/10/30-years-of-failure-the-user-namepassword-combination/.

  67. Verizon RISK Team. 2012 Data Breach Investigations Report. [Online] Verizon, 2012. http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf.

  68. Fung, Brian and Sands, Geneva. Former SolarWinds CEO blames intern for ‘solarwinds123’ password leak. [Online] CNN, January 26, 2021. https://www.cnn.com/2021/02/26/politics/solarwinds123-password-intern/index.html.

  69. Anderson, Nate. How I became a password cracker: Cracking passwords is officially a “script kiddie” activity now. [Online] Ars Technica, March 24, 2013. http://arstechnica.com/security/2013/03/how-i-became-a-password-cracker/.

  70. The LastPass Team. LastPass Security Notification. [Online] LastPass, May 4, 2011. http://blog.lastpass.com/2011/05/lastpass-security-notification.html.

  71. Lee, Newton. Counterterrorism and Cybersecurity: Total Information Awareness. [Online] Springer Science+Business Media, April 30, 2013. http://www.amazon.com/Counterterrorism-Cybersecurity-Total-Information-Awareness/dp/1461472040.

  72. —. Read Me First: Password Protection and Identity Theft Prevention (2nd Edition). [Online] CreateSpace Independent Publishing Platform, July 13, 2013. http://www.amazon.com/Read-Me-First-Protection-Prevention/dp/1490988874.

  73. IMDB. Now You See Me (2013). [Online] IMDB, May 31, 2013. http://www.imdb.com/title/tt1670345/.

  74. Danchev, Dancho. Attacker: Hacking Sarah Palin’s email was easy. [Online] ZDNet, September 18, 2008. http://www.zdnet.com/blog/security/attacker-hacking-sarah-palins-email-was-easy/1939.

  75. The Mad Dog. tinkerbell hack. [Online] Urban Dictionary, March 15, 2010. http://www.urbandictionary.com/define.php?term=tinkerbell%20hack.

  76. Federal Trade Commission. National Do Not Call Registry. [Online] Federal Trade Commission. [Cited: May 29, 2012.] https://www.donotcall.gov/.

  77. Gahran, Amy. Getting text spam? New service helps you report it. [Online] CNN, March 19, 2012. http://www.cnn.com/2012/03/19/tech/mobile/text-spam-gahran/index.html.

  78. Siegel+Gale. Survey Finds Facebook and Google Privacy Policies Even More Confusing Than Credit Card Bills and Government Notices. [Online] Siegel+Gale Press Releases, April 24, 2012. http://www.siegelgale.com/media_release/survey-finds-facebook-and-google-privacy-policies-even-more-confusing-than-credit-card-bills-and-government-notices/.

  79. Ember, Sydney. Facebook’s $16 Billion Deal for WhatsApp. [Online] The New York Times, February 20, 2014. http://dealbook.nytimes.com/2014/02/20/morning-agenda-facebooks-16-billion-deal-for-whatsapp/.

  80. Alkemade, Thijs. Piercing Through WhatsApp’s Encryption. [Online] xnyhps’ blog, October 8, 2013. https://blog.thijsalkema.de/blog/2013/10/08/piercing-through-whatsapp-s-encryption/.

  81. Essers, Loek. German privacy regulator: WhatsApp users should switch to a more secure service. [Online] PC World, February 20, 2014. http://www.pcworld.com/article/2099700/whatsapp-users-should-switch-to-a-more-secure-service-german-privacy-regulator-urges.html.

  82. Cheng, Jacqui. Over 3 years later, “deleted” Facebook photos are still online. [Online] CNN, February 7, 2012. http://www.cnn.com/2012/02/06/tech/social-media/deleted-facebook-photos-online/index.html.

  83. Facebook Privacy. Facebook Basics. Manage Your Account. Privacy. [Online] Facebook Help Center. [Cited: May 14, 2012.] http://www.facebook.com/help/?page=187475824633454.

  84. Facebook. Sharing and finding you on Facebook. Facebook Data Use Policy. [Online] Facebook. [Cited: May 15, 2012.] http://www.facebook.com/about/privacy/your-info-on-fb.

  85. Facebook Privacy. How do I turn on the option to review posts and photos I’m tagged in before they appear on my profile? [Online] Facebook Help Center. [Cited: May 15, 2012.] http://www.facebook.com/help/?faq=223100381057791.

  86. Mitchell, Justin. Making Photo Tagging Easier. [Online] The Facebook Blog, June 30, 2011. http://blog.facebook.com/blog.php?post=467145887130.

  87. Johnston, Casey. On Facebook, deleting an app doesn’t delete your data from their system. [Online] Ars Technica, May 13, 2012. http://arstechnica.com/gadgets/2012/05/on-facebook-deleting-an-app-doesnt-delete-your-data-from-their-system/.

  88. Hockenson, Lauren. 7 Big Privacy Concerns for New Facebook and the Open Graph. [Online] Mashable, January 27, 2012. http://mashable.com/2012/01/27/facebook-privacy-open-graph/.

  89. Facebook. Open Graph. [Online] Facebook Developers. [Cited: May 15, 2012.] https://developers.facebook.com/docs/opengraph/.

  90. —. Sharing with other websites and applications. [Online] Facebook Data Use Policy. [Cited: May 15, 2012.] http://www.facebook.com/about/privacy/your-info-on-other.

  91. Facebook Privacy. How do I prevent search engines (e.g., Google) from showing my public search listing? [Online] Facebook Help Center. [Cited: May 15, 2012.] http://www.facebook.com/help/?faq=131026496974464.

  92. Facebook. Create a Facebook Page to build a closer relationship with your audience and customers. [Online] Facebook. [Cited: June 29, 2012.] http://www.facebook.com/pages/create.php.

  93. Spehar, Jeffrey. The New Facebook Login and Graph API 2.0. [Online] Facebook, April 30, 2014. https://developers.facebook.com/blog/post/2014/04/30/the-new-facebook-login/.

  94. Goldman, David. Facebook turns its users into anti-phishing detectives. [Online] CNN, August 9, 2012. http://money.cnn.com/2012/08/09/technology/facebook-phishing/index.html.

  95. Protalinski, Emil. Facebook faces nationwide class action tracking cookie lawsuit. [Online] ZDNet, February 29, 2012. http://www.zdnet.com/blog/facebook/facebook-faces-nationwide-class-action-tracking-cookie-lawsuit/9747.

  96. Blue, Violet. Facebook turns user tracking ‘bug’ into data mining ‘feature’ for advertisers. [Online] ZDNet, June 17, 2014. http://www.zdnet.com/facebook-turns-user-tracking-bug-into-data-mining-feature-for-advertisers-7000030603/.

  97. Google. About personalized ads on Google Search and Gmail. [Online] Google Inside Search. [Cited: May 15, 2012.] http://support.google.com/websearch/bin/answer.py?hl=en&answer=1634057.

  98. Google+. Find my Face. [Online] Google. [Cited: May 15, 2012.] http://support.google.com/plus/bin/answer.py?hl=en&p=name_suggest_promo&answer=2370300.

  99. Kelly, Heather. Why your face might appear in Google ads, and how to stop it. [Online] CNN, October 11, 2013. http://www.cnn.com/2013/10/11/tech/social-media/google-plus-ads-profiles/index.html.

  100. Vega, Tanzina and Wyatt, Edward. U.S. Agency Seeks Tougher Consumer Privacy Rules. [Online] New York Times, March 26, 2012. http://www.nytimes.com/2012/03/27/business/ftc-seeks-privacy-legislation.html.

  101. Mayer, Jonathan and Narayanan, Arvind. Do Not Track. Universal Web Tracking Opt Out. [Online] DoNotTrack.Us. [Cited: May 15, 2012.] http://donottrack.us/.

  102. Hachamovitch, Dean. Windows Release Preview: The Sixth IE10 Platform Preview. [Online] MSDN Blogs, May 31, 2012. http://blogs.msdn.com/b/ie/archive/2012/05/31/windows-release-preview-the-sixth-ie10-platform-preview.aspx.

  103. Chen, Hanqing. How to Block Online Tracking. [Online] Pacific Standard, July 7, 2014. http://www.psmag.com/navigation/nature-and-technology/block-online-tracking-85243/.

  104. Google. Google Accounts & Web History. [Online] Google. [Cited: May 16, 2012.] http://www.google.com/goodtoknow/data-on-google/web-history/.

  105. Bindra, Chetna. Building a privacy-first future for web advertising. [Online] Google, January 25, 2021. https://blog.google/products/ads-commerce/2021-01-privacy-sandbox/.

  106. Google. Remove content from someone else’s site. [Online] Google Webmaster Tools, February 15, 2012. https://support.google.com/webmasters/bin/answer.py?hl=en&answer=1663688.

  107. —. Privacy Complaint Process. [Online] YouTube. [Cited: May 27, 2012.] http://support.google.com/youtube/bin/answer.py?hl=en&answer=142443.

  108. Privoxy Developers. Privoxy. [Online] privoxy.org. [Cited: May 15, 2012.] http://www.privoxy.org/.

  109. Tor Developers. Tor. [Online] torproject.org. [Cited: May 15, 2012.] https://www.torproject.org/.

  110. Anonymizer Developers. Anonymizer. [Online] anonymizer.com. [Cited: May 15, 2012.] http://www.anonymizer.com/.

  111. Newman, Jared. 8 Tools for the Online Privacy Paranoid. [Online] TIME Magazine, May 4, 2012. http://techland.time.com/2012/05/04/8-tools-for-the-online-privacy-paranoid/.

  112. Gross, Doug. How your movements create a GPS ‘fingerprint’. [Online] CNN, March 26, 2013. http://www.cnn.com/2013/03/26/tech/mobile/mobile-gps-privacy-study/index.html.

  113. Gahran, Amy. ACLU: Most police track phones’ locations without warrants. [Online] CNN, April 3, 2012. http://www.cnn.com/2012/04/03/tech/mobile/police-phone-tracking-gahran/index.html.

  114. Segall, Laurie. Oops! Russian soldier Instagrams himself in Ukraine. [Online] CNNMoney, August 1, 2014. http://money.cnn.com/2014/08/01/technology/social/russian-soldier-ukraine-instagram/index.html.

  115. MacMillan, Douglas. Foursquare Now Tracks Users Even When the App Is Closed. [Online] The Wall Street Journal, August 6, 2014. http://blogs.wsj.com/digits/2014/08/06/foursquare-now-tracks-users-even-when-the-app-is-closed/.

  116. Talbot, David. Android App Warns When You’re Being Watched. [Online] MIT Technology Review, January 30, 2014. http://www.technologyreview.com/news/523981/android-app-warns-when-youre-being-watched/.

  117. Mello, John P. Carrier IQ Test: Android App Detects Controversial Software. [Online] PC World, December 2, 2011. http://www.pcworld.com/article/245371/carrier_iq_test_android_app_detects_controversial_software.html.

  118. Vijayan, Jaikumar. FBI never sought Carrier IQ data, director says. [Online] Computerworld, December 14, 2011. http://www.computerworld.com/s/article/9222678/FBI_never_sought_Carrier_IQ_data_director_says.

  119. Cipriani, Jason. Stop Android 4.3 from always scanning for Wi-Fi networks. [Online] CNet, August 2, 2013. http://www.cnet.com/how-to/stop-android-4-3-from-always-scanning-for-wi-fi-networks/.

  120. Fink, Erica. Stalker: A creepy look at you, online. [Online] CNNMoney, June 13, 2014. http://money.cnn.com/2014/06/13/technology/security/stalker/index.html.

  121. Kopytoff, Verne. Stores Sniff Out Smartphones to Follow Shoppers. [Online] MIT Technology Review, November 12, 2013. http://www.technologyreview.com/news/520811/stores-sniff-out-smartphones-to-follow-shoppers/.

  122. Pagliery, Jose. How the NSA can ‘turn on’ your phone remotely. [Online] CNNMoney, June 6, 2014. http://money.cnn.com/2014/06/06/technology/security/nsa-turn-on-phone/index.html.

  123. Fight for the Future. Privacy Pack. [Online] Reset the Net, June 5, 2014. https://pack.resetthenet.org/.

  124. Talbot, David. A $629 Ultrasecure Phone Aims to Protect Personal Dat. [Online] MIT Technology Review, February 24, 2014. http://www.technologyreview.com/news/524906/a-629-ultrasecure-phone-aims-to-protect-personal-data/.

  125. Szoldra, Paul. The Smartphone Even The NSA May Have Trouble Hacking Is Coming Soon. [Online] Business Insider, June 18, 2014. http://www.businessinsider.com/silent-circle-blackphone-2014-6.

  126. Dey, Sanorita, et al. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. [Online] Internet Society NDSS ’14, February 23–26, 2014. http://synrg.csl.illinois.edu/papers/AccelPrint_NDSS14.pdf.

  127. Talbot, David. Now Your Phone’s Tilt Sensor Can Identify You. [Online] MIT Technology Review, May 1, 2014. http://www.technologyreview.com/news/527031/now-your-phones-tilt-sensor-can-identify-you/.

  128. Guardian Professional. Recycled mobile phones retain previous owner data. [Online] The Guardian. [Cited: May 31, 2014.] http://www.theguardian.com/media-network/partner-zone-infosecurity/mobile-phones-previous-owner-data.

  129. BlackBelt. DataWipe. [Online] BlackBelt. [Cited: May 31, 2014.] https://www.blackbeltdefence.com/datawipe/.

  130. The Baltimore Sun. Where digital secrets go to die. [Online] Phys.org, January 30, 2014. http://phys.org/news/2014-01-digital-secrets-die.html.

  131. Pagliery, Jose. Naked celeb hack lesson: ‘Delete’ doesn’t mean delete. [Online] CNNMoney, September 2, 2014. http://money.cnn.com/2014/09/02/technology/security/cloud-delete/index.html?hpt=hp_t4.

  132. Clover, Juli. Apple Confirms Commitment to App Tracking Transparency in Letter Condemning Facebook’s Data Collection [Updated]. [Online] MacRumors, November 19, 2020. https://www.macrumors.com/2020/11/19/apple-app-tracking-transparency-letter/.

  133. App Store. App privacy details on the App Store. [Online] Apple. [Cited: April 26, 2021.] https://developer.apple.com/app-store/app-privacy-details/.

  134. Krynsky, Mark. The Locker Project Website has Launched. [Online] Lifestream Blog, May 26, 2011. https://lifestreamblog.com/the-locker-project-website-has-launched/.

  135. Gross, Doug. Manage (and make cash with?) your data online. [Online] CNN, February 27, 2012. http://www.cnn.com/2012/02/24/tech/web/owning-your-data-online/index.html.

  136. Hamlin, Kaliya. What is the Personal Data Ecosystem? [Online] Personal Data Ecosystem Consortium, June 1, 2011. http://personaldataecosystem.org/category/about/.

  137. Singly. Singly. [Online] singly.com. [Cited: August 15, 2014.] http://blog.singly.com/.

  138. Shute, Tish. The Locker Project: data for the people. [Online] O’Reilly Radar, February 11, 2011. http://radar.oreilly.com/2011/02/singly-locker-project-telehash.html.

  139. Personal. It’s your data. Own it. [Online] personal.com. [Cited: August 15, 2014.] https://www.personal.com/our-story.

  140. Delo, Cotton. Here’s My Personal Data, Marketers. What Do I Get For it? . [Online] Advertising Age., November 28, 2011. http://adage.com/article/digital/web-data-startups-bank-consumers-controlling-data/231208/.

  141. McNally, Steve. The Locker Project and Your Digital Wake. [Online] Forbes, June 30, 2011. http://www.forbes.com/sites/smcnally/2011/06/30/your-digital-wake/.

  142. Imam, Jareen. Want to get fit? Pull out your phone. [Online] CNN, June 29, 2012. http://www.cnn.com/2012/06/29/tech/social-media/tech-fitness-irpt/index.html.

  143. Swallow, Erica. How Nike Outruns the Social Media Competition. [Online] Mashable, September 22, 2011. http://mashable.com/2011/09/22/nike-social-media/.

  144. Solon, Olivia. Personal analytics could lead to ‘designed’ lifestyles. [Online] Wired, November 28, 2011. http://www.wired.co.uk/news/archive/2011-11/28/martin-blinder-personal-analytics.

  145. Joh, Jae Won. What Do Doctors Think Of Apple’s HealthKit? [Online] Forbes, June 9, 2014. http://www.forbes.com/sites/quora/2014/06/09/what-do-doctors-think-of-healthkit/.

  146. Morris, Alexandra. Why Apple Wants to Help You Track Your Health. [Online] MIT Technology Review, June 9, 2014. http://www.technologyreview.com/news/527921/why-apple-wants-to-help-you-track-your-health/.

  147. Rojahn, Susan Young. PatientsLikeMe Gives Genentech Full Access. [Online] MIT Technology Review, April 8, 2014. http://www.technologyreview.com/view/526266/patientslikeme-gives-genentech-full-access/.

  148. PatientsLikeMe. Genentech and PatientsLikeMe Enter Patient-Centric Research Collaboration. [Online] PatientsLikeMe Newsroom, April 7, 2014. http://news.patientslikeme.com/press-release/genentech-and-patientslikeme-enter-patient-centric-research-collaboration.

  149. Singer, Emily. Patients’ Social Network Predicts Drug Outcomes. [Online] MIT Technology Review, May 11, 2010. http://www.technologyreview.com/news/418874/patients-social-network-predicts-drug-outcomes/.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Newton Lee .

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Science+Business Media, LLC, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Lee, N. (2021). Personal Privacy and Information Management. In: Facebook Nation. Springer, New York, NY. https://doi.org/10.1007/978-1-0716-1867-7_17

Download citation

  • DOI: https://doi.org/10.1007/978-1-0716-1867-7_17

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-0716-1866-0

  • Online ISBN: 978-1-0716-1867-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics