Chapter 3. Privacy

Nicole Hennig

Abstract


Chapter 3 of Library Technology Reports (vol. 54, no. 3), “Privacy and Security Online: Best Practices for Cybersecurity”

Chapter 3 covers several aspects of security, including

•   targeted advertising and ad blockers

•   keeping your search engine history private

•   recommended apps and websites for protecting privacy

•   your location history

•   Facebook privacy settings

For each of these topics, best practices are offered for protecting your privacy.

Full Text:

HTML PDF

References


Emma Hinchliffe, “Why Everyone Is So Convinced Facebook Is Spying on Their Conversations,” Mashable, October 7, 2017, http://mashable.com/2017/10/07/why-it-feels-like-facebook-is-spying/#It3XCCGa8aqZ.

Antonio Garcia Martinez, “Facebook’s Not Listening through Your Phone. It Doesn’t Have To,” Wired, November 10, 2017, https://www.wired.com/story/facebooks-listening-smartphone-microphone.

John Corpuz, “Best Ad Blockers and Privacy Extensions,” Tom’s Guide, July 6, 2017, https://www.tomsguide.com/us/pictures-story/565-best-adblockers-privacy-extensions.html.

Antonio Garcia Martinez, “Facebook’s Not Listening through Your Phone. It Doesn’t Have To,” Wired, November 10, 2017, https://www.wired.com/story/facebooks-listening-smartphone-microphone.

Nick Nguyen, “Introducing Firefox Focus—A Free, Fast Private Browser for iPhone,” Mozilla Blog, November 17, 2016, https://blog.mozilla.org/blog/2016/11/17/introducing-firefox-focus-a-free-fast-and-easy-to-use-private-browser-for-ios.

DuckDuckGo homepage, accessed January 5, 2018, https://duckduckgo.com.

Jon Brodkin, “Senate Votes to Let ISPs Sell Your Web Browsing History to Advertisers,” Ars Technica, March 23, 2017, https://arstechnica.com/tech-policy/2017/03/senate-votes-to-let-isps-sell-your-web-browsing-history-to-advertisers.

Lee Mathews, “What Tor Is, and Why You Should Use It to Protect Your Privacy,” Forbes, January 27, 2017, https://www.forbes.com/sites/leemathews/2017/01/27/what-is-tor-and-why-do-people-use-it/#41e4fbb97d75.

Christian Zibreg, “How to Stop iPhone from Tracking Your Location,” iDownload Blog, April 28, 2016, www.idownloadblog.com/2016/04/28/how-to-stop-phone-location-tracking.

Brittany McGhee, “How to Stop Android Apps Accessing Your Location,” AndroidPIT, February 7, 2017, https://www.androidpit.com/how-to-stop-android-apps-accessing-your-location.

“Location Tracking,” Me and My Shadow, last updated February 15, 2017, https://myshadow.org/location-tracking.

“About Facebook Ads,” Facebook, https://www.facebook.com/ads/about.

M. J. Kelly, “Facebook Privacy Tips: How to Share without Oversharing,” Mozilla Blog, January 25, 2017, https://blog.mozilla.org/internetcitizen/2017/01/25/facebook-privacy-tips.

Electronic Frontier Foundation, “How to: Use Signal on iOS,” Surveillance Self-Defense, last reviewed March 17, 2017, https://ssd.eff.org/en/module/how-use-signal-ios.

Electronic Frontier Foundation, “How to: Use Signal for Android,” Surveillance Self-Defense, last reviewed March 17, 2017, https://ssd.eff.org/en/module/how-use-signal-android.

“Got a Confidential News Tip?” New York Times website, accessed January 5, 2018, https://www.nytimes.com/newsgraphics/2016/news-tips.

Michah Lee, “Battle of the Secure Messaging Apps: How Signal Beats WhatsApp,” The Intercept, June 22, 2016, https://theintercept.com/2016/06/22/battle-of-the-secure-messaging-apps-how-signal-beats-whatsapp.

Melanie Pinola, “ProtonMail Is the Easiest Way to Send and Receive Encrypted Emails,” Lifehacker, March 17, 2016, https://lifehacker.com/protonmail-is-the-easiest-way-to-send-and-receive-encry-1765491376.

Andy Wolber, “Simple Security: How Gmail, Mailvelope, and Virtru Make Encrypted Email Easier,” TechRepublic, July 13, 2016, https://www.techrepublic.com/article/simple-security-how-gmail-mailvelope-and-virtru-make-encrypted-email-easier.

Glenn Fleishman, “Anonymous Browsing with Tor Reduces Exposure but Still Has Risks,” Macworld, January 17, 2017, https://www.macworld.com/article/3152823/security/anonymous-browsing-with-tor-reduces-exposure-but-still-has-risks.html.

Will Nicol, “A Beginner’s Guide to Tor: How to Navigate through the Underground Internet,” Digital Trends, January 29, 2016, https://www.digitaltrends.com/computing/a-beginners-guide-to-tor-how-to-navigate-through-the-underground-internet.

Mark Yates, “Time to Tape Over the Camera on Your Laptop,” AVG, September 26, 2016, https://www.avg.com/en/signal/why-you-should-cover-the-camera-on-your-laptop-or-tablet.

Charlie Osborn, “Shodan: The IoT Search Engine for Watching Sleeping Kids and Bedroom Antics,” ZDNet, January 26, 2016, www.zdnet.com/article/shodan-the-iot-search-engine-which-shows-us-sleeping-kids-and-how-we-throw-away-our-privacy.

Bruce Snell, “IoT and Privacy: Keeping Secrets from Your Webcam,” McAfee, February 10, 2016, https://securingtomorrow.mcafee.com/consumer/family-safety/iot-and-privacy-keeping-secrets-from-your-webcam.

Ashkan Soltani and Timothy B. Lee, “Research Shows How MacBook Webcams Can Spy on Their Users without Warning,” Washington Post, December 18, 2013, https://www.washingtonpost.com/news/the-switch/wp/2013/12/18/research-shows-how-macbook-webcams-can-spy-on-their-users-without-warning/?utm_term=.58f6603424b6.

Chris Synder, “Hackers and Governments Can See You through Your Phone’s Camera—Here’s How to Protect Yourself,” Business Insider, March 7, 2017, www.businessinsider.com/hackers-governments-smartphone-iphone-camera-wikileaks-2017-3.

Jacob Brogan, “What’s the Best Way to Cover Your Webcam?” from Slate, September 15, 2016, www.slate.com/blogs/future_tense/2016/09/15/the_best_ways_to_cover_a_webcam.html.

“Data Security & Privacy on Google Home,” Google, accessed January 5, 2018, https://support.google.com/googlehome/answer/7072285?hl=en.

David Nield, “How to Lock Down Your Privacy on the Amazon Echo and Google Home,” April 27, 2017, https://fieldguide.gizmodo.com/how-to-lock-down-your-privacy-on-the-amazon-echo-and-go-1794697554.

Lee Rainie and Janna Anderson, “The Internet of Things Connectivity Binge: What Are the Implications?” Pew Research Center, June 6, 2017, www.pewinternet.org/2017/06/06/the-internet-of-things-connectivity-binge-what-are-the-implications.


Refbacks

  • There are currently no refbacks.


Published by ALA TechSource, an imprint of the American Library Association.
Copyright Statement | ALA Privacy Policy