Chapter 3. Privacy
Abstract
Chapter 3 of Library Technology Reports (vol. 54, no. 3), “Privacy and Security Online: Best Practices for Cybersecurity”
Chapter 3 covers several aspects of security, including
• targeted advertising and ad blockers
• keeping your search engine history private
• recommended apps and websites for protecting privacy
• your location history
• Facebook privacy settings
For each of these topics, best practices are offered for protecting your privacy.References
Emma Hinchliffe, “Why Everyone Is So Convinced Facebook Is Spying on Their Conversations,” Mashable, October 7, 2017, http://mashable.com/2017/10/07/why-it-feels-like-facebook-is-spying/#It3XCCGa8aqZ.
Antonio Garcia Martinez, “Facebook’s Not Listening through Your Phone. It Doesn’t Have To,” Wired, November 10, 2017, https://www.wired.com/story/facebooks-listening-smartphone-microphone.
John Corpuz, “Best Ad Blockers and Privacy Extensions,” Tom’s Guide, July 6, 2017, https://www.tomsguide.com/us/pictures-story/565-best-adblockers-privacy-extensions.html.
Antonio Garcia Martinez, “Facebook’s Not Listening through Your Phone. It Doesn’t Have To,” Wired, November 10, 2017, https://www.wired.com/story/facebooks-listening-smartphone-microphone.
Nick Nguyen, “Introducing Firefox Focus—A Free, Fast Private Browser for iPhone,” Mozilla Blog, November 17, 2016, https://blog.mozilla.org/blog/2016/11/17/introducing-firefox-focus-a-free-fast-and-easy-to-use-private-browser-for-ios.
DuckDuckGo homepage, accessed January 5, 2018, https://duckduckgo.com.
Jon Brodkin, “Senate Votes to Let ISPs Sell Your Web Browsing History to Advertisers,” Ars Technica, March 23, 2017, https://arstechnica.com/tech-policy/2017/03/senate-votes-to-let-isps-sell-your-web-browsing-history-to-advertisers.
Lee Mathews, “What Tor Is, and Why You Should Use It to Protect Your Privacy,” Forbes, January 27, 2017, https://www.forbes.com/sites/leemathews/2017/01/27/what-is-tor-and-why-do-people-use-it/#41e4fbb97d75.
Christian Zibreg, “How to Stop iPhone from Tracking Your Location,” iDownload Blog, April 28, 2016, www.idownloadblog.com/2016/04/28/how-to-stop-phone-location-tracking.
Brittany McGhee, “How to Stop Android Apps Accessing Your Location,” AndroidPIT, February 7, 2017, https://www.androidpit.com/how-to-stop-android-apps-accessing-your-location.
“Location Tracking,” Me and My Shadow, last updated February 15, 2017, https://myshadow.org/location-tracking.
“About Facebook Ads,” Facebook, https://www.facebook.com/ads/about.
M. J. Kelly, “Facebook Privacy Tips: How to Share without Oversharing,” Mozilla Blog, January 25, 2017, https://blog.mozilla.org/internetcitizen/2017/01/25/facebook-privacy-tips.
Electronic Frontier Foundation, “How to: Use Signal on iOS,” Surveillance Self-Defense, last reviewed March 17, 2017, https://ssd.eff.org/en/module/how-use-signal-ios.
Electronic Frontier Foundation, “How to: Use Signal for Android,” Surveillance Self-Defense, last reviewed March 17, 2017, https://ssd.eff.org/en/module/how-use-signal-android.
“Got a Confidential News Tip?” New York Times website, accessed January 5, 2018, https://www.nytimes.com/newsgraphics/2016/news-tips.
Michah Lee, “Battle of the Secure Messaging Apps: How Signal Beats WhatsApp,” The Intercept, June 22, 2016, https://theintercept.com/2016/06/22/battle-of-the-secure-messaging-apps-how-signal-beats-whatsapp.
Melanie Pinola, “ProtonMail Is the Easiest Way to Send and Receive Encrypted Emails,” Lifehacker, March 17, 2016, https://lifehacker.com/protonmail-is-the-easiest-way-to-send-and-receive-encry-1765491376.
Andy Wolber, “Simple Security: How Gmail, Mailvelope, and Virtru Make Encrypted Email Easier,” TechRepublic, July 13, 2016, https://www.techrepublic.com/article/simple-security-how-gmail-mailvelope-and-virtru-make-encrypted-email-easier.
Glenn Fleishman, “Anonymous Browsing with Tor Reduces Exposure but Still Has Risks,” Macworld, January 17, 2017, https://www.macworld.com/article/3152823/security/anonymous-browsing-with-tor-reduces-exposure-but-still-has-risks.html.
Will Nicol, “A Beginner’s Guide to Tor: How to Navigate through the Underground Internet,” Digital Trends, January 29, 2016, https://www.digitaltrends.com/computing/a-beginners-guide-to-tor-how-to-navigate-through-the-underground-internet.
Mark Yates, “Time to Tape Over the Camera on Your Laptop,” AVG, September 26, 2016, https://www.avg.com/en/signal/why-you-should-cover-the-camera-on-your-laptop-or-tablet.
Charlie Osborn, “Shodan: The IoT Search Engine for Watching Sleeping Kids and Bedroom Antics,” ZDNet, January 26, 2016, www.zdnet.com/article/shodan-the-iot-search-engine-which-shows-us-sleeping-kids-and-how-we-throw-away-our-privacy.
Bruce Snell, “IoT and Privacy: Keeping Secrets from Your Webcam,” McAfee, February 10, 2016, https://securingtomorrow.mcafee.com/consumer/family-safety/iot-and-privacy-keeping-secrets-from-your-webcam.
Ashkan Soltani and Timothy B. Lee, “Research Shows How MacBook Webcams Can Spy on Their Users without Warning,” Washington Post, December 18, 2013, https://www.washingtonpost.com/news/the-switch/wp/2013/12/18/research-shows-how-macbook-webcams-can-spy-on-their-users-without-warning/?utm_term=.58f6603424b6.
Chris Synder, “Hackers and Governments Can See You through Your Phone’s Camera—Here’s How to Protect Yourself,” Business Insider, March 7, 2017, www.businessinsider.com/hackers-governments-smartphone-iphone-camera-wikileaks-2017-3.
Jacob Brogan, “What’s the Best Way to Cover Your Webcam?” from Slate, September 15, 2016, www.slate.com/blogs/future_tense/2016/09/15/the_best_ways_to_cover_a_webcam.html.
“Data Security & Privacy on Google Home,” Google, accessed January 5, 2018, https://support.google.com/googlehome/answer/7072285?hl=en.
David Nield, “How to Lock Down Your Privacy on the Amazon Echo and Google Home,” April 27, 2017, https://fieldguide.gizmodo.com/how-to-lock-down-your-privacy-on-the-amazon-echo-and-go-1794697554.
Lee Rainie and Janna Anderson, “The Internet of Things Connectivity Binge: What Are the Implications?” Pew Research Center, June 6, 2017, www.pewinternet.org/2017/06/06/the-internet-of-things-connectivity-binge-what-are-the-implications.
Refbacks
- There are currently no refbacks.
Published by ALA TechSource, an imprint of the American Library Association.
Copyright Statement | ALA Privacy Policy