Skip to main content

Personal Privacy and Information Management

  • Chapter
  • First Online:
Facebook Nation
  • 3813 Accesses

Abstract

No matter how we safeguard our privacy by turning off our cell phones, avoiding the use of in-vehicle apps, deactivating Facebook accounts, opting out on all data collections, and evading Google and Bing’s social searches, there are still plenty of public records that are obtainable by anyone who is willing to pay. Websites such as Intelius (whose trademark is “Live in the know”) displays the age, past cities of residence, and names of the relatives on any person whom we search for. This and several other websites also sell public records including full name, date of birth, phone, address history, marriage/divorce records, property ownership, lawsuits, convictions, and other public information for a nominal fee (1).

“I divide the entire set of Fortune Global 2000 firms into two categories: those that know they’ve been compromised and those that don’t yet know.”

— Cybersecurity Executive Dmitri Alperovitch (August 2011)

“There are only two types of companies: those that have been hacked, and those that will be. Even that is merging into one category: those that have been hacked and will be again.”

— FBI Director Robert Mueller (March 2012)

“Awareness is an effective weapon against many forms of identity theft.”

– U.S. Federal Trade Commission

“As we go through our lives we create vast amounts of data. It’s more than just data. It represents our actions, interests, intentions, communications, relationships, locations, behaviors and creative and consumptive efforts.”

– The Locker Project

“Personal analytics combined with social networks provide a high-tech mechanism for self-help and self-improvement.”

– Newton Lee

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Intelius. Intelius Facts. [Online] Intelius. [Cited: January 25, 2012.] http://www.intelius.com/corp/intelius-facts.

  2. The Associated Press. U.K. phone hacking leads to arrest of ex-Cameron aide. [Online] The Associated Press, July 8, 2011. http://www.cbc.ca/news/world/story/2011/07/08/phone-hacking-cameron.html.

  3. Cieply, Michael. Actress’s Suit Against IMDb for Publishing Her Actual Age Can Go to Trial. [Online] The New York Times, March 19, 2013. http://mediadecoder.blogs.nytimes.com/2013/03/19/actresss-suit-against-imdb-for-publishing-her-actual-age-can-go-to-trial/.

  4. Haley, Kevin. Introducing the Symantec Smartphone Honey Stick Project. [Online] Symantec Official Blog, March 9, 2012. http://www.symantec.com/connect/blogs/introducing-symantec-smartphone-honey-stick-project.

  5. Symantec Corporation. The Symantec Smartphone Honey Stick Project. [Online] Symantec Corporation, 2012. http://www.symantec.com/content/en/us/about/presskits/b-symantec-smartphone-honey-stick-project.en-us.pdf.

  6. Sager, Mike. What I’ve Learned: Andy Grove. [Online] Esquire Magazine, May 1, 2000. http://www.esquire.com/features/what-ive-learned/learned-andy-grove-0500.

  7. Gross, Doug. Manage (and make cash with?) your data online. [Online] CNN, February 27, 2012. http://www.cnn.com/2012/02/24/tech/web/owning-your-data-online/index.html.

  8. Constine, Josh. Facebook Could Slow Down A Tiny Bit As It Starts Switching All Users To Secure HTTPS Connections. [Online] TechCrunch, November 18, 2012. http://techcrunch.com/2012/11/18/facebook-https/.

  9. Pagliery, Jose. Half of American adults hacked this year. [Online] CNNMoney, May 28, 2014. http://money.cnn.com/2014/05/28/technology/security/hack-data-breach/.

  10. Jewell, Mark. TJX breach could top 94 million accounts. [Online] NBC News, October 24, 2007. http://www.msnbc.msn.com/id/21454847/ns/technology_and_science-security/t/tjx-breach-could-top-million-accounts/.

  11. Cubrilovic, Nik. RockYou Hack: From Bad To Worse. [Online] TechCrunch, December 14, 2009. http://techcrunch.com/2009/12/14/rockyou-hack-security-myspace-facebook-passwords/.

  12. Krebs, Brian. PlentyofFish.com Hacked, Blames Messenger. [Online] KrebsOnSecurity.com, January 31, 2011. http://krebsonsecurity.com/2011/01/plentyoffish-com-hacked-blames-messenger/.

  13. Hickins, Michael and Clark, Don. Questions Over Break-In at Security Firm RSA. [Online] The Wall Street Journal, March 18, 2011. http://online.wsj.com/article/SB10001424052748703512404576208983743029392.html.

  14. Wingfield, Nick, Sherr, Ian and Worthen, Ben. Hacker Raids Sony Videogame Network. [Online] The Wall Street Journal, April 27, 2011. http://online.wsj.com/article/SB10001424052748703778104576287362503776534.html.

  15. Smith, Aaron. Citi: Millions stolen in May hack attack. [Online] CNNMoney, June 27, 2011. http://money.cnn.com/2011/06/27/technology/citi_credit_card/index.htm.

  16. Zakaria, Tabassum and Hosenball, Mark. Stratfor Hack: Anonymous-Affiliated Hackers Publish Thousands Of Credit Card Numbers. [Online] Huffington Post, December 30, 2011. http://www.huffingtonpost.com/2011/12/30/stratfor-hack-anonymous_n_1176726.html.

  17. Acohido, Byron. Credit card processor hit by hackers. [Online] USA Today, March 30, 2012. http://www.usatoday.com/money/industries/banking/story/2012-03-30/mastercard-security-breach/53887854/1.

  18. Goldman, David. More than 6 million LinkedIn passwords stolen. [Online] CNNMoney, June 7, 2012. http://money.cnn.com/2012/06/06/technology/linkedin-password-hack/index.htm.

  19. eHarmony.com. Update on Compromised Passwords. [Online] eHarmony Blog, June 6, 2012. http://www.eharmony.com/blog/2012/06/06/update-on-compromised-passwords/#.U5ynqssU914.

  20. Gross, Doug. Yahoo hacked, 450,000 passwords posted online. [Online] CNN, July 13, 2012. http://www.cnn.com/2012/07/12/tech/web/yahoo-users-hacked/index.html.

  21. Riley, Charles. Barnes & Noble customer data stolen. [Online] CNNMoney, October 24, 2012. http://money.cnn.com/2012/10/24/technology/barnes--noble-hack/index.html.

  22. Lord, Bob. Keeping our users secure. [Online] Twitter Blog, February 1, 2013. http://blog.twitter.com/2013/02/keeping-our-users-secure.html.

  23. Bull, Alister and Finkle, Jim. Fed says internal site breached by hackers, no critical functions affected. [Online] Reuters, February 6, 2013. http://www.reuters.com/article/2013/02/06/net-us-usa-fed-hackers-idUSBRE91501920130206.

  24. Engberg, Dave. Security Notice: Service-wide Password Reset. [Online] The Evernote Blog, March 2, 2013. http://blog.evernote.com/blog/2013/03/02/security-notice-service-wide-password-reset/.

  25. Arkin, Brad. Important Customer Security Announcement. [Online] Adobe Featured Blogs, October 3, 2013. http://blogs.adobe.com/conversations/2013/10/important-customer-security-announcement.html.

  26. Wallace, Gregory. Neiman Marcus hack hit 1.1 million customers. [Online] CNNMoney, January 23, 2014. http://money.cnn.com/2014/01/23/news/companies/neiman-marcus-hack/.

  27. Isidore, Chris. Target: Hacking hit up to 110 million customers. [Online] CNNMoney, January 11, 2014. http://money.cnn.com/2014/01/10/news/companies/target-hacking/index.html.

  28. Lobosco, Katie. Michaels hack hit 3 million. [Online] CNN, April 18, 2014. http://money.cnn.com/2014/04/17/news/companies/michaels-security-breach/.

  29. Gross, Doug. Millions of accounts compromised in Snapchat hack. [Online] CNN, January 2, 2014. http://www.cnn.com/2014/01/01/tech/social-media/snapchat-hack/.

  30. eBay. eBay Inc. To Ask eBay Users To Change Passwords. [Online] ebay inc., May 21, 2014. http://investor.ebayinc.com/releasedetail.cfm?ReleaseID=849396.

  31. AOL Mail Team. AOL Security Update. [Online] Aol Blog, April 28, 2014. http://blog.aol.com/2014/04/28/aol-security-update/.

  32. Smith, Aaron. P.F. Chang’s confirms credit data was stolen. [Online] CNNMoney, June 13, 2014. http://money.cnn.com/2014/06/13/technology/security/pf-changs-security/index.html.

  33. Perlroth, Nicole and Gelles, David. Russian Hackers Amass Over a Billion Internet Passwords. [Online] The New York Times, August 5, 2014. http://www.nytimes.com/2014/08/06/technology/russian-gang-said-to-amass-more-than-a-billion-stolen-internet-credentials.html.

  34. Perlroth, Nicole. Some Victims of Online Hacking Edge Into the Light. [Online] The New York Times, February 20, 2013. http://www.nytimes.com/2013/02/21/technology/hacking-victims-edge-into-light.html.

  35. John P. Mello, Jr. McAfee Warns of Massive 5-Year Hacking Plot. [Online] PCWorld, August 3, 2011. http://www.pcworld.com/article/237163/McAfee_Warns_of_Massive_5_Year_Hacking_Plot.html.

  36. Cowley, Stacy. FBI Director: Cybercrime will eclipse terrorism. [Online] CNNMoney, March 2, 2012. http://money.cnn.com/2012/03/02/technology/fbi_cybersecurity/index.htm.

  37. Ozawa, Nancy and Sullivan, Lesley. A New Identity Fraud Victim Every Two Seconds in 2013 According to Latest Javelin Strategy & Research Study. [Online] Javelin Strategy and Research, February 5, 2014. https://www.javelinstrategy.com/news/1467/92/A-New-Identity-Fraud-Victim-Every-Two-Seconds-in-2013-According-to-Latest-Javelin-Strategy-Research-Study/.

  38. Federal Trade Commission. About Identity Theft. [Online] Federal Trade Commission. [Cited: May 14, 2012.] http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html.

  39. —. Deter. Detect. Defend. Fighting Back Against Identity Theft. [Online] Federal Trade Commission. [Cited: May 14, 2012.] http://www.ftc.gov/bcp/edu/pubs/consumer/idtheft/idt01.pdf.

  40. Federal Bureau of Investigation. Malware Installed on Travelers’ Laptops Through Software Updates on Hotel Internet Connections. [Online] Federal Bureau of Investigation, May 8, 2012. http://www.fbi.gov/scams-safety/e-scams.

  41. Tuerk, Andreas. Giving you more insight into your Google Account activity. [Online] Google Official Blog, March 28, 2012. http://googleblog.blogspot.com/2012/03/giving-you-more-insight-into-your.html#!/2012/03/giving-you-more-insight-into-your.html.

  42. Google. What are Google Alerts? [Online] Google Alerts. [Cited: May 25, 2012.] https://support.google.com/alerts/bin/answer.py?hl=en&answer=175925.

  43. Hoonakker, Peter, Bornoe, Nis and Carayon, Pascale. Password Authentication from a Human Factors Perspective: Results of a Survey among End-Users. [Online] Proceedings of the Human Factors and Ergonomics Society 53Rd Annual Meeting, 2009. http://www.hfes.org/web/Newsroom/HFES09-Hoonaker-CIS.pdf.

  44. Kotadia, Munir. Microsoft security guru: Jot down your passwords. [Online] CNet, May 23, 2005. http://news.cnet.com/Microsoft-security-guru-Jot-down-your-passwords/2100-7355_3-5716590.html.

  45. Cheng, Roger and McCullagh, Declan. Yahoo breach: Swiped passwords by the numbers. [Online] CNet, July 12, 2012. http://news.cnet.com/8301-1009_3-57470878-83/yahoo-breach-swiped-passwords-by-the-numbers/.

  46. Timmer, John. 30 years of failure: the username/password combination. [Online] Ars Technica, October 31, 2009. http://arstechnica.com/business/2009/10/30-years-of-failure-the-user-namepassword-combination/.

  47. Verizon RISK Team. 2012 Data Breach Investigations Report. [Online] Verizon, 2012. http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf.

  48. Anderson, Nate. How I became a password cracker: Cracking passwords is officially a “script kiddie” activity now. [Online] Ars Technica, March 24, 2013. http://arstechnica.com/security/2013/03/how-i-became-a-password-cracker/.

  49. The LastPass Team. LastPass Security Notification. [Online] LastPass, May 4, 2011. http://blog.lastpass.com/2011/05/lastpass-security-notification.html.

  50. Lee, Newton. Counterterrorism and Cybersecurity: Total Information Awareness. [Online] Springer Science+Business Media, April 30, 2013. http://www.amazon.com/Counterterrorism-Cybersecurity-Total-Information-Awareness/dp/1461472040.

  51. —. Read Me First: Password Protection and Identity Theft Prevention (2nd Edition). [Online] CreateSpace Independent Publishing Platform, July 13, 2013. http://www.amazon.com/Read-Me-First-Protection-Prevention/dp/1490988874.

  52. IMDB. Now You See Me (2013). [Online] IMDB, May 31, 2013. http://www.imdb.com/title/tt1670345/.

  53. Danchev, Dancho. Attacker: Hacking Sarah Palin’s email was easy. [Online] ZDNet, September 18, 2008. http://www.zdnet.com/blog/security/attacker-hacking-sarah-palins-email-was-easy/1939.

  54. Federal Trade Commission. National Do Not Call Registry. [Online] Federal Trade Commission. [Cited: May 29, 2012.] https://www.donotcall.gov/.

  55. Gahran, Amy. Getting text spam? New service helps you report it. [Online] CNN, March 19, 2012. http://www.cnn.com/2012/03/19/tech/mobile/text-spam-gahran/index.html.

  56. Siegel+Gale. Survey Finds Facebook and Google Privacy Policies Even More Confusing Than Credit Card Bills and Government Notices. [Online] Siegel+Gale Press Releases, April 24, 2012. http://www.siegelgale.com/media_release/survey-finds-facebook-and-google-privacy-policies-even-more-confusing-than-credit-card-bills-and-government-notices/.

  57. Ember, Sydney. Facebook’s $16 Billion Deal for WhatsApp. [Online] The New York Times, February 20, 2014. http://dealbook.nytimes.com/2014/02/20/morning-agenda-facebooks-16-billion-deal-for-whatsapp/.

  58. Alkemade, Thijs. Piercing Through WhatsApp’s Encryption. [Online] xnyhps’ blog, October 8, 2013. https://blog.thijsalkema.de/blog/2013/10/08/piercing-through-whatsapp-s-encryption/.

  59. Essers, Loek. German privacy regulator: WhatsApp users should switch to a more secure service. [Online] PC World, February 20, 2014. http://www.pcworld.com/article/2099700/whatsapp-users-should-switch-to-a-more-secure-service-german-privacy-regulator-urges.html.

  60. Cheng, Jacqui. Over 3 years later, “deleted” Facebook photos are still online. [Online] CNN, February 7, 2012. http://www.cnn.com/2012/02/06/tech/social-media/deleted-facebook-photos-online/index.html.

  61. Facebook Privacy. Facebook Basics. Manage Your Account. Privacy. [Online] Facebook Help Center. [Cited: May 14, 2012.] http://www.facebook.com/help/?page=187475824633454.

  62. Facebook. Sharing and finding you on Facebook. Facebook Data Use Policy. [Online] Facebook. [Cited: May 15, 2012.] http://www.facebook.com/about/privacy/your-info-on-fb.

  63. Facebook Privacy. How do I turn on the option to review posts and photos I’m tagged in before they appear on my profile? [Online] Facebook Help Center. [Cited: May 15, 2012.] http://www.facebook.com/help/?faq=223100381057791.

  64. Mitchell, Justin. Making Photo Tagging Easier. [Online] The Facebook Blog, June 30, 2011. http://blog.facebook.com/blog.php?post=467145887130.

  65. Johnston, Casey. On Facebook, deleting an app doesn’t delete your data from their system. [Online] Ars Technica, May 13, 2012. http://arstechnica.com/gadgets/2012/05/on-facebook-deleting-an-app-doesnt-delete-your-data-from-their-system/.

  66. Hockenson, Lauren. 7 Big Privacy Concerns for New Facebook and the Open Graph. [Online] Mashable, January 27, 2012. http://mashable.com/2012/01/27/facebook-privacy-open-graph/.

  67. Facebook. Open Graph. [Online] Facebook Developers. [Cited: May 15, 2012.] https://developers.facebook.com/docs/opengraph/.

  68. —. Sharing with other websites and applications. [Online] Facebook Data Use Policy. [Cited: May 15, 2012.] http://www.facebook.com/about/privacy/your-info-on-other.

  69. Facebook Privacy. How do I prevent search engines (e.g., Google) from showing my public search listing? [Online] Facebook Help Center. [Cited: May 15, 2012.] http://www.facebook.com/help/?faq=131026496974464.

  70. Facebook. Create a Facebook Page to build a closer relationship with your audience and customers. [Online] Facebook. [Cited: June 29, 2012.] http://www.facebook.com/pages/create.php.

  71. Spehar, Jeffrey. The New Facebook Login and Graph API 2.0. [Online] Facebook, April 30, 2014. https://developers.facebook.com/blog/post/2014/04/30/the-new-facebook-login/.

  72. Goldman, David. Facebook turns its users into anti-phishing detectives. [Online] CNN, August 9, 2012. http://money.cnn.com/2012/08/09/technology/facebook-phishing/index.html.

  73. Protalinski, Emil. Facebook faces nationwide class action tracking cookie lawsuit. [Online] ZDNet, February 29, 2012. http://www.zdnet.com/blog/facebook/facebook-faces-nationwide-class-action-tracking-cookie-lawsuit/9747.

  74. Blue, Violet. Facebook turns user tracking ‘bug’ into data mining ‘feature’ for advertisers. [Online] ZDNet, June 17, 2014. http://www.zdnet.com/facebook-turns-user-tracking-bug-into-data-mining-feature-for-advertisers-7000030603/.

  75. Google. About personalized ads on Google Search and Gmail. [Online] Google Inside Search. [Cited: May 15, 2012.] http://support.google.com/websearch/bin/answer.py?hl=en&answer=1634057.

  76. Google+. Find my Face. [Online] Google. [Cited: May 15, 2012.] http://support.google.com/plus/bin/answer.py?hl=en&p=name_suggest_promo&answer=2370300.

  77. Kelly, Heather. Why your face might appear in Google ads, and how to stop it. [Online] CNN, October 11, 2013. http://www.cnn.com/2013/10/11/tech/social-media/google-plus-ads-profiles/index.html.

  78. Vega, Tanzina and Wyatt, Edward. U.S. Agency Seeks Tougher Consumer Privacy Rules. [Online] New York Times, March 26, 2012. http://www.nytimes.com/2012/03/27/business/ftc-seeks-privacy-legislation.html.

  79. Mayer, Jonathan and Narayanan, Arvind. Do Not Track. Universal Web Tracking Opt Out. [Online] DoNotTrack.Us. [Cited: May 15, 2012.] http://donottrack.us/.

  80. Hachamovitch, Dean. Windows Release Preview: The Sixth IE10 Platform Preview. [Online] MSDN Blogs, May 31, 2012. http://blogs.msdn.com/b/ie/archive/2012/05/31/windows-release-preview-the-sixth-ie10-platform-preview.aspx.

  81. Chen, Hanqing. How to Block Online Tracking. [Online] Pacific Standard, July 7, 2014. http://www.psmag.com/navigation/nature-and-technology/block-online-tracking-85243/.

  82. Google. Google Accounts & Web History. [Online] Google. [Cited: May 16, 2012.] http://www.google.com/goodtoknow/data-on-google/web-history/.

  83. —. Remove content from someone else’s site. [Online] Google Webmaster Tools, February 15, 2012. https://support.google.com/webmasters/bin/answer.py?hl=en&answer=1663688.

  84. —. Privacy Complaint Process. [Online] YouTube. [Cited: May 27, 2012.] http://support.google.com/youtube/bin/answer.py?hl=en&answer=142443.

  85. Privoxy Developers. Privoxy. [Online] privoxy.org. [Cited: May 15, 2012.] http://www.privoxy.org/.

  86. Tor Developers. Tor. [Online] torproject.org. [Cited: May 15, 2012.] https://www.torproject.org/.

  87. Anonymizer Developers. Anonymizer. [Online] anonymizer.com. [Cited: May 15, 2012.] http://www.anonymizer.com/.

  88. Newman, Jared. 8 Tools for the Online Privacy Paranoid. [Online] TIME Magazine, May 4, 2012. http://techland.time.com/2012/05/04/8-tools-for-the-online-privacy-paranoid/.

  89. Gross, Doug. How your movements create a GPS ‘fingerprint’. [Online] CNN, March 26, 2013. http://www.cnn.com/2013/03/26/tech/mobile/mobile-gps-privacy-study/index.html.

  90. Gahran, Amy. ACLU: Most police track phones’ locations without warrants. [Online] CNN, April 3, 2012. http://www.cnn.com/2012/04/03/tech/mobile/police-phone-tracking-gahran/index.html.

  91. Segall, Laurie. Oops! Russian soldier Instagrams himself in Ukraine. [Online] CNNMoney, August 1, 2014. http://money.cnn.com/2014/08/01/technology/social/russian-soldier-ukraine-instagram/index.html.

  92. MacMillan, Douglas. Foursquare Now Tracks Users Even When the App Is Closed. [Online] The Wall Street Journal, August 6, 2014. http://blogs.wsj.com/digits/2014/08/06/foursquare-now-tracks-users-even-when-the-app-is-closed/.

  93. Talbot, David. Android App Warns When You’re Being Watched. [Online] MIT Technology Review, January 30, 2014. http://www.technologyreview.com/news/523981/android-app-warns-when-youre-being-watched/.

  94. Mello, John P. Carrier IQ Test: Android App Detects Controversial Software. [Online] PC World, December 2, 2011. http://www.pcworld.com/article/245371/carrier_iq_test_android_app_detects_controversial_software.html.

  95. Vijayan, Jaikumar. FBI never sought Carrier IQ data, director says. [Online] Computerworld, December 14, 2011. http://www.computerworld.com/s/article/9222678/FBI_never_sought_Carrier_IQ_data_director_says.

  96. Cipriani, Jason. Stop Android 4.3 from always scanning for Wi-Fi networks. [Online] CNet, August 2, 2013. http://www.cnet.com/how-to/stop-android-4-3-from-always-scanning-for-wi-fi-networks/.

  97. Fink, Erica. Stalker: A creepy look at you, online. [Online] CNNMoney, June 13, 2014. http://money.cnn.com/2014/06/13/technology/security/stalker/index.html.

  98. Kopytoff, Verne. Stores Sniff Out Smartphones to Follow Shoppers. [Online] MIT Technology Review, November 12, 2013. http://www.technologyreview.com/news/520811/stores-sniff-out-smartphones-to-follow-shoppers/.

  99. Pagliery, Jose. How the NSA can ‘turn on’ your phone remotely. [Online] CNNMoney, June 6, 2014. http://money.cnn.com/2014/06/06/technology/security/nsa-turn-on-phone/index.html.

  100. Fight for the Future. Privacy Pack. [Online] Reset the Net, June 5, 2014. https://pack.resetthenet.org/.

  101. Talbot, David. A $629 Ultrasecure Phone Aims to Protect Personal Dat. [Online] MIT Technology Review, February 24, 2014. http://www.technologyreview.com/news/524906/a-629-ultrasecure-phone-aims-to-protect-personal-data/.

  102. Szoldra, Paul. The Smartphone Even The NSA May Have Trouble Hacking Is Coming Soon. [Online] Business Insider, June 18, 2014. http://www.businessinsider.com/silent-circle-blackphone-2014-6.

  103. Dey, Sanorita, et al. AccelPrint: Imperfections of Accelerometers Make Smartphones Trackable. [Online] Internet Society NDSS ‘14, February 23-26, 2014. http://synrg.csl.illinois.edu/papers/AccelPrint_NDSS14.pdf.

  104. Talbot, David. Now Your Phone’s Tilt Sensor Can Identify You. [Online] MIT Technology Review, May 1, 2014. http://www.technologyreview.com/news/527031/now-your-phones-tilt-sensor-can-identify-you/.

  105. Guardian Professional. Recycled mobile phones retain previous owner data. [Online] The Guardian. [Cited: May 31, 2014.] http://www.theguardian.com/media-network/partner-zone-infosecurity/mobile-phones-previous-owner-data.

  106. BlackBelt. DataWipe. [Online] BlackBelt. [Cited: May 31, 2014.] https://www.blackbeltdefence.com/datawipe/.

  107. The Baltimore Sun. Where digital secrets go to die. [Online] Phys.org, January 30, 2014. http://phys.org/news/2014-01-digital-secrets-die.html.

  108. The Locker Project. About The Locker Project. [Online] lockerproject.org. [Cited: May 17, 2012.] http://lockerproject.org/.

  109. Gross, Doug. Manage (and make cash with?) your data online. [Online] CNN, February 27, 2012. http://www.cnn.com/2012/02/24/tech/web/owning-your-data-online/index.html.

  110. Hamlin, Kaliya. What is the Personal Data Ecosystem? [Online] Personal Data Ecosystem Consortium, June 1, 2011. http://personaldataecosystem.org/category/about/.

  111. Singly. Singly. [Online] singly.com. [Cited: August 15, 2014.] http://blog.singly.com/.

  112. Shute, Tish. The Locker Project: data for the people. [Online] O’Reilly Radar, February 11, 2011. http://radar.oreilly.com/2011/02/singly-locker-project-telehash.html.

  113. Personal. It’s your data. Own it. [Online] personal.com. [Cited: August 15, 2014.] https://www.personal.com/our-story.

  114. Delo, Cotton. Here’s My Personal Data, Marketers. What Do I Get For it?. [Online] Advertising Age., November 28, 2011. http://adage.com/article/digital/web-data-startups-bank-consumers-controlling-data/231208/.

  115. McNally, Steve. The Locker Project and Your Digital Wake. [Online] Forbes, June 30, 2011. http://www.forbes.com/sites/smcnally/2011/06/30/your-digital-wake/.

  116. Imam, Jareen. Want to get fit? Pull out your phone. [Online] CNN, June 29, 2012. http://www.cnn.com/2012/06/29/tech/social-media/tech-fitness-irpt/index.html.

  117. Swallow, Erica. How Nike Outruns the Social Media Competition. [Online] Mashable, September 22, 2011. http://mashable.com/2011/09/22/nike-social-media/.

  118. Solon, Olivia. Personal analytics could lead to ‘designed’ lifestyles. [Online] Wired, November 28, 2011. http://www.wired.co.uk/news/archive/2011-11/28/martin-blinder-personal-analytics.

  119. Joh, Jae Won. What Do Doctors Think Of Apple’s HealthKit? [Online] Forbes, June 9, 2014. http://www.forbes.com/sites/quora/2014/06/09/what-do-doctors-think-of-healthkit/.

  120. Morris, Alexandra. Why Apple Wants to Help You Track Your Health. [Online] MIT Technology Review, June 9, 2014. http://www.technologyreview.com/news/527921/why-apple-wants-to-help-you-track-your-health/.

  121. Rojahn, Susan Young. PatientsLikeMe Gives Genentech Full Access. [Online] MIT Technology Review, April 8, 2014. http://www.technologyreview.com/view/526266/patientslikeme-gives-genentech-full-access/.

  122. PatientsLikeMe. Genentech and PatientsLikeMe Enter Patient-Centric Research Collaboration. [Online] PatientsLikeMe Newsroom, April 7, 2014. http://news.patientslikeme.com/press-release/genentech-and-patientslikeme-enter-patient-centric-research-collaboration.

  123. Singer, Emily. Patients’ Social Network Predicts Drug Outcomes. [Online] MIT Technology Review, May 11, 2010. http://www.technologyreview.com/news/418874/patients-social-network-predicts-drug-outcomes/.

  124. Perlroth, Nicole. Some Victims of Online Hacking Edge Into the Light. [Online] The New York Times, February 20, 2013. http://www.nytimes.com/2013/02/21/technology/hacking-victims-edge-into-light.html.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this chapter

Cite this chapter

Lee, N. (2014). Personal Privacy and Information Management. In: Facebook Nation. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-1740-2_14

Download citation

  • DOI: https://doi.org/10.1007/978-1-4939-1740-2_14

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4939-1739-6

  • Online ISBN: 978-1-4939-1740-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics