Research Paper on Privacy

Embed Size (px)

Citation preview

  • 7/27/2019 Research Paper on Privacy

    1/17

    http://www.law.louisville.edu/library/collections/brandeis/node/225http://polaris.gseis.ucla.edu/pagre/landscape.htmlhttp://books.google.com.ph/books?id=yEq5KRs-t-YC&pg=PA116&lpg=PA116&dq=privacy+etymology&source=bl&ots=pGXzhLzeDB&sig=j50py6-DfhNPKsaNM0HQrjgXQ80&hl=en&sa=X&ei=DKp4UZqhAemQiQe6pICoDA&ved=0CF0Q6AEwBQ#v=onepage&q=privacy%20etymology&f=falsehttp://books.google.com.ph/books?id=yEq5KRs-t-YC&pg=PA116&lpg=PA116&dq=privacy+etymology&source=bl&ots=pGXzhLzeDB&sig=j50py6-DfhNPKsaNM0HQrjgXQ80&hl=en&sa=X&ei=DKp4UZqhAemQiQe6pICoDA&ved=0CF0Q6AEwBQ#v=onepage&q=privacy%20etymology&f=falsehttp://books.google.com.ph/books?id=yEq5KRs-t-YC&pg=PA116&lpg=PA116&dq=privacy+etymology&source=bl&ots=pGXzhLzeDB&sig=j50py6-DfhNPKsaNM0HQrjgXQ80&hl=en&sa=X&ei=DKp4UZqhAemQiQe6pICoDA&ved=0CF0Q6AEwBQ#v=onepage&q=privacy%20etymology&f=falsehttp://books.google.com.ph/books?id=yEq5KRs-t-YC&pg=PA116&lpg=PA116&dq=privacy+etymology&source=bl&ots=pGXzhLzeDB&sig=j50py6-DfhNPKsaNM0HQrjgXQ80&hl=en&sa=X&ei=DKp4UZqhAemQiQe6pICoDA&ved=0CF0Q6AEwBQ#v=onepage&q=privacy%20etymology&f=falsehttp://digitalcommons.law.uga.edu/cgi/viewcontent.cgi?article=1021&context=lectures_pre_arch_lectures_sibleyhttp://www.businessdictionary.com/definition/privacy.htmlhttp://www.scu.edu/ethics/practicing/focusareas/technology/internet/privacy/what-is-privacy.html
  • 7/27/2019 Research Paper on Privacy

    2/17

    http://www.amstat.org/committees/pc/keyterms.htmlhttp://en.wikipedia.org/wiki/Information_privacyhttp://www.rogerclarke.com/DV/Intro.html#InfoPrivhttp://euro.ecom.cmu.edu/program/law/08-732/TradeSecrets/utsa.pdfhttp://euro.ecom.cmu.edu/program/law/08-732/TradeSecrets/utsa.pdfhttp://www.wisegeek.com/what-is-classified-information.htmhttp://www.wisegeek.com/what-is-classified-information.htmhttp://www.fas.org/sgp/clinton/eo12968.htmlhttp://www.fas.org/sgp/library/quist2/chap_7.htmlhttp://www.med.miami.edu/hipaa/public/x476.xmlhttp://www.hrweb.org/legal/cpr.html#Article%2017.1http://gilc.org/privacy/survey/intro.htmlhttp://www.time.com/time/specials/packages/article/0,28804,2080345_2080344_2080374,00.htmlhttp://www.time.com/time/specials/packages/article/0,28804,2080345_2080344_2080374,00.htmlhttp://law2.umkc.edu/faculty/projects/ftrials/conlaw/rightofprivacy.htmlhttp://law2.umkc.edu/faculty/projects/ftrials/conlaw/rightofprivacy.html
  • 7/27/2019 Research Paper on Privacy

    3/17

    http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.htmlhttp://sc.judiciary.gov.ph/speech/03-12-08-speech.pdfhttp://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.htmlhttp://www.amstat.org/committees/pc/keyterms.htmlhttp://www.un.org/en/documents/udhr/index.shtmlhttp://books.google.com.ph/books?id=yeVRrrJw-zAC&pg=PA1&dq=right+to+privacy+tel+aviv&hl=en&ei=T0IhTaWhEI-msQOizMWZCg&sa=X&oi=book_result&ct=result&redir_esc=y#v=onepage&q=right%20to%20privacy%20tel%20aviv&f=falsehttp://books.google.com.ph/books?id=yeVRrrJw-zAC&pg=PA1&dq=right+to+privacy+tel+aviv&hl=en&ei=T0IhTaWhEI-msQOizMWZCg&sa=X&oi=book_result&ct=result&redir_esc=y#v=onepage&q=right%20to%20privacy%20tel%20aviv&f=falsehttp://books.google.com.ph/books?id=yeVRrrJw-zAC&pg=PA1&dq=right+to+privacy+tel+aviv&hl=en&ei=T0IhTaWhEI-msQOizMWZCg&sa=X&oi=book_result&ct=result&redir_esc=y#v=onepage&q=right%20to%20privacy%20tel%20aviv&f=falsehttp://books.google.com.ph/books?id=yeVRrrJw-zAC&pg=PA1&dq=right+to+privacy+tel+aviv&hl=en&ei=T0IhTaWhEI-msQOizMWZCg&sa=X&oi=book_result&ct=result&redir_esc=y#v=onepage&q=right%20to%20privacy%20tel%20aviv&f=falsehttp://books.google.com.ph/books?id=yeVRrrJw-zAC&pg=PA1&dq=right+to+privacy+tel+aviv&hl=en&ei=T0IhTaWhEI-msQOizMWZCg&sa=X&oi=book_result&ct=result&redir_esc=y#v=onepage&q=right%20to%20privacy%20tel%20aviv&f=falsehttp://books.google.com.ph/books?id=yeVRrrJw-zAC&pg=PA1&dq=right+to+privacy+tel+aviv&hl=en&ei=T0IhTaWhEI-msQOizMWZCg&sa=X&oi=book_result&ct=result&redir_esc=y#v=onepage&q=right%20to%20privacy%20tel%20aviv&f=falsehttp://www.eurofound.europa.eu/emire/GERMANY/RIGHTTOPRIVACYOFTHEINDIVIDUAL-DE.htmhttp://www.eurofound.europa.eu/emire/GERMANY/RIGHTTOPRIVACYOFTHEINDIVIDUAL-DE.htmhttp://gilc.org/privacy/survey/intro.htmlhttp://salongacenter.org/2011/07/right-to-privacy/http://www.wipo.int/sme/en/ip_business/trade_secrets/trade_secrets.htmhttp://www.wipo.int/sme/en/ip_business/trade_secrets/trade_secrets.htmhttp://www.law.cornell.edu/wex/trade_secret
  • 7/27/2019 Research Paper on Privacy

    4/17

  • 7/27/2019 Research Paper on Privacy

    5/17

    http://polaris.gseis.ucla.edu/pagre/landscape.htmlhttp://papers.ssrn.com/sol3/papers.cfm?abstract_id=721642https://www.eff.org/issues/privacyhttp://www.law.louisville.edu/library/collections/brandeis/node/225http://www.salon.com/2012/09/11/four_ways_your_privacy_is_being_invaded/http://www.salon.com/2012/09/11/four_ways_your_privacy_is_being_invaded/http://www.globalresearch.ca/privacy-invasion-via-technology-i-phone-keeps-a-record-of-everywhere-you-go/24432http://www.globalresearch.ca/privacy-invasion-via-technology-i-phone-keeps-a-record-of-everywhere-you-go/24432http://www.globalresearch.ca/privacy-invasion-via-technology-i-phone-keeps-a-record-of-everywhere-you-go/24432http://voices.yahoo.com/10-technologies-being-used-invade-our-privacy-7690018.html?cat=15http://voices.yahoo.com/10-technologies-being-used-invade-our-privacy-7690018.html?cat=15http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html
  • 7/27/2019 Research Paper on Privacy

    6/17

    http://www.nytimes.com/2010/03/17/technology/17privacy.htmlhttp://about-threats.trendmicro.com/us/infographics/infograph/mapping-out-your-digital-lifehttp://www.multicians.org/fjcc6.htmlhttp://www.pbs.org/transistor/background1/events/www.htmlhttp://www.thepeoplehistory.com/electronics.htmlhttp://www.cs4fn.org/history/digitalrevolution2.phphttp://blog.trendmicro.com/trendlabs-security-intelligence/privacy-in-the-digital-age-whose-data-is-it-anyway/?utm_source=twitter&utm_medium=shortlink&utm_campaign=malwarebloghttp://blog.trendmicro.com/trendlabs-security-intelligence/privacy-in-the-digital-age-whose-data-is-it-anyway/?utm_source=twitter&utm_medium=shortlink&utm_campaign=malwarebloghttp://blog.trendmicro.com/trendlabs-security-intelligence/privacy-in-the-digital-age-whose-data-is-it-anyway/?utm_source=twitter&utm_medium=shortlink&utm_campaign=malwarebloghttp://blog.trendmicro.com/trendlabs-security-intelligence/privacy-in-the-digital-age-whose-data-is-it-anyway/?utm_source=twitter&utm_medium=shortlink&utm_campaign=malwarebloghttp://www.washingtonpost.com/wp-srv/national/longterm/exposed/exposed1.htmhttp://www.washingtonpost.com/wp-srv/national/longterm/exposed/exposed1.htmhttp://education.illinois.edu/wp/privacy/persprivacy.htmlhttp://www.internetworldstats.com/stats.htm
  • 7/27/2019 Research Paper on Privacy

    7/17

    http://www.justice.qld.gov.au/__data/assets/pdf_file/0019/21619/internet-photos-privacy.pdfhttp://www.justice.qld.gov.au/__data/assets/pdf_file/0019/21619/internet-photos-privacy.pdfhttp://news.cnet.com/8301-13578_3-9962106-38.htmlhttps://www.privacyrights.org/fs/fs18-cyb.htm#Interactive_Usehttps://www.privacyrights.org/fs/fs18-cyb.htm#Interactive_Usehttp://news.cnet.com/2100-1029_3-6202068.htmlhttp://www.worldprivacyforum.org/searchengineprivacytips.htmlhttp://www.worldprivacyforum.org/searchengineprivacytips.htmlhttp://searchenginewatch.com/https://www.privacyrights.org/fs/fs18-cyb.htmhttp://www.scientificamerican.com/article.cfm?id=dont-worry-about-whos-watchinghttp://www.scientificamerican.com/article.cfm?id=dont-worry-about-whos-watchinghttp://panopticlick.eff.org/browser-uniqueness.pdfhttp://www.zdnet.com/blog/btl/ad-network-at-center-of-third-flash-cookie-lawsuit/38346http://www.zdnet.com/blog/btl/ad-network-at-center-of-third-flash-cookie-lawsuit/38346https://www.privacyrights.org/fs/fs18-cyb.htmhttp://adage.com/article/digital/sen-rockefeller-ready-a-real-track-bill/227426/http://adage.com/article/digital/sen-rockefeller-ready-a-real-track-bill/227426/http://www.bbc.co.uk/news/technology-12668552http://conferences.sigcomm.org/sigcomm/2009/workshops/wosn/papers/p7.pdfhttp://conferences.sigcomm.org/sigcomm/2009/workshops/wosn/papers/p7.pdfhttp://www.law.cornell.edu/uscode/text/18/part-I/chapter-119http://www.law.cornell.edu/uscode/text/18/part-I/chapter-119http://www.justice.gov/criminal/cybercrime/docs/ssmanual2009.pdfhttp://www.justice.gov/criminal/cybercrime/docs/ssmanual2009.pdfhttp://www.ntia.doc.gov/legacy/ntiahome/privacy/files/smith.htmhttp://www.ntia.doc.gov/legacy/ntiahome/privacy/files/smith.htmhttp://compnetworking.about.com/od/workingwithipaddresses/a/ipaddresses.htmhttp://compnetworking.about.com/od/workingwithipaddresses/a/ipaddresses.htmhttps://www.privacyrights.org/fs/fs18-cyb.htmhttp://www.wpp.com/wpp/marketing/digital/privacy-in-the-digital-age/http://www.wpp.com/wpp/marketing/digital/privacy-in-the-digital-age/http://lippmannwouldroll.com/2010/08/02/privacy-privacy-where-for-art-thou-privacy/http://lippmannwouldroll.com/2010/08/02/privacy-privacy-where-for-art-thou-privacy/http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html?_r=2&ref=technology&http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html?_r=2&ref=technology&
  • 7/27/2019 Research Paper on Privacy

    8/17

    http://www.huntonprivacyblog.com/http://www.wsws.org/en/articles/2012/05/cisp-m17.htmlhttp://rt.com/usa/cispa-halted-senate-415/http://www.ibtimes.com/sopa-pipa-bills-differences-between-two-internet-privacy-acts-397324http://www.ibtimes.com/sopa-pipa-bills-differences-between-two-internet-privacy-acts-397324http://www.euractiv.com/infosociety/adopting-sopa-privacy-internet-analysis-510289http://www.euractiv.com/infosociety/adopting-sopa-privacy-internet-analysis-510289http://slog.thestranger.com/slog/archives/2013/04/24/internet-privacy-threatened-by-the-bastard-offspring-of-sopapipa-cispahttp://slog.thestranger.com/slog/archives/2013/04/24/internet-privacy-threatened-by-the-bastard-offspring-of-sopapipa-cispahttp://slog.thestranger.com/slog/archives/2013/04/24/internet-privacy-threatened-by-the-bastard-offspring-of-sopapipa-cispahttp://judiciary.house.gov/hearings/pdf/112%20HR%203261.pdfhttp://judiciary.house.gov/hearings/pdf/112%20HR%203261.pdfhttp://gizmodo.com/5877000/what-is-sopahttp://news.cnet.com/8301-1009_3-10226742-83.htmlhttp://www.us-cert.gov/sites/default/files/publications/Banking_Securely_Online07102006.pdfhttp://www.us-cert.gov/sites/default/files/publications/Banking_Securely_Online07102006.pdfhttp://www.us-cert.gov/sites/default/files/publications/Banking_Securely_Online07102006.pdfhttp://www.bensmyth.com/files/Smyth10-attacking-Barclays.pdfhttp://www.bensmyth.com/files/Smyth10-attacking-Barclays.pdfhttp://www.bankrate.com/finance/savings/could-bank-hackers-steal-your-money-1.aspxhttp://www.bankrate.com/finance/savings/could-bank-hackers-steal-your-money-1.aspxhttp://www.fas.org/sgp/crs/misc/97-868.pdfhttp://www.actnowdomains.com/the-privacy-conundrum-in-domain-registration.htmhttp://www.actnowdomains.com/the-privacy-conundrum-in-domain-registration.htmhttp://www.techdirt.com/articles/20091029/1744166723.shtmlhttp://www.techdirt.com/articles/20091029/1744166723.shtmlhttp://www.justice.qld.gov.au/__data/assets/pdf_file/0019/21619/internet-photos-privacy.pdfhttp://www.justice.qld.gov.au/__data/assets/pdf_file/0019/21619/internet-photos-privacy.pdfhttp://www.privacy.gov.au/faq/business/gen-q5
  • 7/27/2019 Research Paper on Privacy

    9/17

    http://blog.hootsuite.com/ap-hack-social-media-security/http://gizmodo.com/5877000/what-is-sopahttp://science.opposingviews.com/negative-effects-internet-copyright-privacy-breaches-4197.htmlhttp://m.theglobeandmail.com/news/national/police-prosecutors-failing-sex-assault-cyberbullying-victims-experts-say/article11176341/?service=mobilehttp://m.theglobeandmail.com/news/national/police-prosecutors-failing-sex-assault-cyberbullying-victims-experts-say/article11176341/?service=mobilehttps://www.privacyrights.org/fs/fs17-it.htmhttp://bits.blogs.nytimes.com/2012/10/14/seeking-privacy-in-a-networked-age/http://www.mckinseychina.com/2012/04/25/chinas-social-media-boom/http://money.cnn.com/2012/10/04/technology/facebook-billion-users/index.htmlhttps://www.privacyrights.org/fs/fs18-cyb.htm#Interactive_Usehttp://www.netsmartz.org/safety/statisticshttp://www.sfgate.com/business/article/Internet-privacy-a-growing-concern-Pew-finds-3407488.phphttp://www.sfgate.com/business/article/Internet-privacy-a-growing-concern-Pew-finds-3407488.phphttp://www.internetworldstats.com/http://www.privacyrights.org/data-breachhttp://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/breachtool.htmlhttp://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/breachtool.htmlhttp://www.brighthub.com/internet/security-privacy/articles/112421.aspxhttp://www.brighthub.com/internet/security-privacy/articles/112421.aspx
  • 7/27/2019 Research Paper on Privacy

    10/17

    http://blog.trendmicro.com/trendlabs-security-intelligence/shedding-light-on-social-engineering-schemes/http://www.foxnews.com/tech/2012/02/16/twitter-admits-peeking-at-address-books-announces-privacy-improvements/http://www.networkadvertising.org/pdfs/Beales_NAI_Study.pdfhttp://www.networkadvertising.org/pdfs/Beales_NAI_Study.pdfhttp://web.cs.wpi.edu/~cew/papers/wosn09.pdfhttp://arstechnica.com/tech-policy/2010/05/latest-facebook-blunder-secret-data-sharing-with-advertisers/http://arstechnica.com/tech-policy/2010/05/latest-facebook-blunder-secret-data-sharing-with-advertisers/http://arstechnica.com/business/2010/05/understanding-the-latest-facebook-privacy-train-wreck/http://arstechnica.com/business/2010/05/understanding-the-latest-facebook-privacy-train-wreck/http://blog.trendmicro.com/trendlabs-security-intelligence/privacy-worries-hound-facebook-yet-again/http://blog.trendmicro.com/trendlabs-security-intelligence/privacy-worries-hound-facebook-yet-again/http://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1250&context=libphilprachttp://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1250&context=libphilprachttp://api.ning.com/files/s4d9Mrne5HdwcV3OQwprPYkq6uJU3YwHCAWAO2Fdk4KtcLlxgtnYFVafuibL1afpiCQ07-yGFzD7g*1iAxKFDEgSpnXKb4Zk/Securityinthe21stCentury.pdfhttp://api.ning.com/files/s4d9Mrne5HdwcV3OQwprPYkq6uJU3YwHCAWAO2Fdk4KtcLlxgtnYFVafuibL1afpiCQ07-yGFzD7g*1iAxKFDEgSpnXKb4Zk/Securityinthe21stCentury.pdfhttp://api.ning.com/files/s4d9Mrne5HdwcV3OQwprPYkq6uJU3YwHCAWAO2Fdk4KtcLlxgtnYFVafuibL1afpiCQ07-yGFzD7g*1iAxKFDEgSpnXKb4Zk/Securityinthe21stCentury.pdfhttp://api.ning.com/files/s4d9Mrne5HdwcV3OQwprPYkq6uJU3YwHCAWAO2Fdk4KtcLlxgtnYFVafuibL1afpiCQ07-yGFzD7g*1iAxKFDEgSpnXKb4Zk/Securityinthe21stCentury.pdfhttp://allthingsd.com/20130308/the-power-of-connectedness-how-social-media-usage-among-chinas-digital-natives-is-evolving/http://allthingsd.com/20130308/the-power-of-connectedness-how-social-media-usage-among-chinas-digital-natives-is-evolving/http://allthingsd.com/20130308/the-power-of-connectedness-how-social-media-usage-among-chinas-digital-natives-is-evolving/http://socialmediatoday.com/maggiefox1/352488/quick-look-social-media-chinahttp://socialmediatoday.com/maggiefox1/352488/quick-look-social-media-chinahttp://www.mckinsey.com/insights/marketing_sales/understanding_social_media_in_chinahttp://www.mckinsey.com/insights/marketing_sales/understanding_social_media_in_chinahttp://ec.europa.eu/justice/data-protection/document/review2012/factsheets/3_en.pdfhttp://ec.europa.eu/justice/data-protection/document/review2012/factsheets/3_en.pdfhttp://stlr.stanford.edu/pdf/determann-socialmediaprivacy.pdfhttp://stlr.stanford.edu/pdf/determann-socialmediaprivacy.pdfhttp://mashable.com/category/social-media-privacy/http://aclunc-tech.org/files/lbs-privacy-checkin.pdfhttp://www.pewinternet.org/Reports/2009/Adults-and-Social-Network-Websites.aspxhttp://www.pewinternet.org/Reports/2009/Adults-and-Social-Network-Websites.aspx
  • 7/27/2019 Research Paper on Privacy

    11/17

    https://www.eff.org/deeplinks/2010/03/eff-posts-documents-detailing-law-enforcementhttps://www.eff.org/deeplinks/2010/03/eff-posts-documents-detailing-law-enforcementhttps://www.eff.org/foia/social-network-monitoringhttp://www.consumerreports.org/cro/magazine-archive/2010/june/electronics-computers/social-insecurity/apps-that-bite/index.htmhttp://www.consumerreports.org/cro/magazine-archive/2010/june/electronics-computers/social-insecurity/apps-that-bite/index.htmhttp://www.consumerreports.org/cro/magazine-archive/2010/june/electronics-computers/social-insecurity/apps-that-bite/index.htmhttp://www.eecs.berkeley.edu/~afelt/privacybyproxy.pdfhttp://precog.iiitd.edu.in/psosm_www2012/a5-anthonysamy.pdfhttp://precog.iiitd.edu.in/psosm_www2012/a5-anthonysamy.pdfhttp://www.eweek.com/c/a/Security/Social-Networks-Face-Security-Challenge-From-ThirdParty-Applications/http://www.eweek.com/c/a/Security/Social-Networks-Face-Security-Challenge-From-ThirdParty-Applications/http://www.pewinternet.org/Reports/2007/Cyberbullying/1-Findings.aspxhttp://www.pewinternet.org/Reports/2007/Cyberbullying/1-Findings.aspxhttp://www.unh.edu/ccrc/pdf/Am%20Psy%202-08.pdfhttp://www.victimsofcrime.org/docs/src/social-networking-sites---a-bonanza-for-stalkers.pdf?sfvrsn=2http://www.victimsofcrime.org/docs/src/social-networking-sites---a-bonanza-for-stalkers.pdf?sfvrsn=2http://www.guardian.co.uk/technology/2012/feb/01/social-media-smartphones-stalkinghttp://www.guardian.co.uk/technology/2012/feb/01/social-media-smartphones-stalkinghttp://www.huffingtonpost.com/2010/03/08/peter-chapman-admits-usin_n_489674.htmlhttp://www.huffingtonpost.com/2010/03/08/peter-chapman-admits-usin_n_489674.htmlhttp://techcrunch.com/2009/02/03/thousands-of-myspace-sex-offender-refugees-found-on-facebook/http://techcrunch.com/2009/02/03/thousands-of-myspace-sex-offender-refugees-found-on-facebook/http://www.myid.com/social-network-profiles-help-thieves-guess-your-social-security-numberhttp://www.myid.com/social-network-profiles-help-thieves-guess-your-social-security-numberhttps://www.google.com.ph/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CDMQFjAA&url=http%3A%2F%2Finference-reseaux-sociaux.googlecode.com%2Ffiles%2FInformation%2520Revelation%2520and%2520Privacy%2520in%2520Online%2520Social%2520Networks%2520-%2520Document.PDF&ei=vt95UaCCPciQigeQmoCYCg&usg=AFQjCNGziPC26syGeiZMRKTTfPqIlmBWng&bvm=bv.45645796,d.aGchttps://www.google.com.ph/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CDMQFjAA&url=http%3A%2F%2Finference-reseaux-sociaux.googlecode.com%2Ffiles%2FInformation%2520Revelation%2520and%2520Privacy%2520in%2520Online%2520Social%2520Networks%2520-%2520Document.PDF&ei=vt95UaCCPciQigeQmoCYCg&usg=AFQjCNGziPC26syGeiZMRKTTfPqIlmBWng&bvm=bv.45645796,d.aGchttps://www.google.com.ph/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CDMQFjAA&url=http%3A%2F%2Finference-reseaux-sociaux.googlecode.com%2Ffiles%2FInformation%2520Revelation%2520and%2520Privacy%2520in%2520Online%2520Social%2520Networks%2520-%2520Document.PDF&ei=vt95UaCCPciQigeQmoCYCg&usg=AFQjCNGziPC26syGeiZMRKTTfPqIlmBWng&bvm=bv.45645796,d.aGchttps://www.google.com.ph/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CDMQFjAA&url=http%3A%2F%2Finference-reseaux-sociaux.googlecode.com%2Ffiles%2FInformation%2520Revelation%2520and%2520Privacy%2520in%2520Online%2520Social%2520Networks%2520-%2520Document.PDF&ei=vt95UaCCPciQigeQmoCYCg&usg=AFQjCNGziPC26syGeiZMRKTTfPqIlmBWng&bvm=bv.45645796,d.aGchttps://www.google.com.ph/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CDMQFjAA&url=http%3A%2F%2Finference-reseaux-sociaux.googlecode.com%2Ffiles%2FInformation%2520Revelation%2520and%2520Privacy%2520in%2520Online%2520Social%2520Networks%2520-%2520Document.PDF&ei=vt95UaCCPciQigeQmoCYCg&usg=AFQjCNGziPC26syGeiZMRKTTfPqIlmBWng&bvm=bv.45645796,d.aGchttps://www.google.com.ph/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CDMQFjAA&url=http%3A%2F%2Finference-reseaux-sociaux.googlecode.com%2Ffiles%2FInformation%2520Revelation%2520and%2520Privacy%2520in%2520Online%2520Social%2520Networks%2520-%2520Document.PDF&ei=vt95UaCCPciQigeQmoCYCg&usg=AFQjCNGziPC26syGeiZMRKTTfPqIlmBWng&bvm=bv.45645796,d.aGchttps://www.google.com.ph/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CDMQFjAA&url=http%3A%2F%2Finference-reseaux-sociaux.googlecode.com%2Ffiles%2FInformation%2520Revelation%2520and%2520Privacy%2520in%2520Online%2520Social%2520Networks%2520-%2520Document.PDF&ei=vt95UaCCPciQigeQmoCYCg&usg=AFQjCNGziPC26syGeiZMRKTTfPqIlmBWng&bvm=bv.45645796,d.aGchttps://www.google.com.ph/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CDMQFjAA&url=http%3A%2F%2Finference-reseaux-sociaux.googlecode.com%2Ffiles%2FInformation%2520Revelation%2520and%2520Privacy%2520in%2520Online%2520Social%2520Networks%2520-%2520Document.PDF&ei=vt95UaCCPciQigeQmoCYCg&usg=AFQjCNGziPC26syGeiZMRKTTfPqIlmBWng&bvm=bv.45645796,d.aGchttps://www.google.com.ph/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CDMQFjAA&url=http%3A%2F%2Finference-reseaux-sociaux.googlecode.com%2Ffiles%2FInformation%2520Revelation%2520and%2520Privacy%2520in%2520Online%2520Social%2520Networks%2520-%2520Document.PDF&ei=vt95UaCCPciQigeQmoCYCg&usg=AFQjCNGziPC26syGeiZMRKTTfPqIlmBWng&bvm=bv.45645796,d.aGchttp://www.businessinsider.com/facebooks-response-to-privacy-concerns-if-youre-not-comfortable-sharing-dont-2010-5http://www.businessinsider.com/facebooks-response-to-privacy-concerns-if-youre-not-comfortable-sharing-dont-2010-5http://www.businessinsider.com/facebooks-response-to-privacy-concerns-if-youre-not-comfortable-sharing-dont-2010-5http://www.dailymail.co.uk/sciencetech/article-2107693/Twitter-sells-years-everyones-old-vanished-Tweets-online-marketing-companies.htmlhttp://www.dailymail.co.uk/sciencetech/article-2107693/Twitter-sells-years-everyones-old-vanished-Tweets-online-marketing-companies.htmlhttp://www.dailymail.co.uk/sciencetech/article-2107693/Twitter-sells-years-everyones-old-vanished-Tweets-online-marketing-companies.htmlhttp://www.foxnews.com/tech/2012/02/16/twitter-admits-peeking-at-address-books-announces-privacy-improvements/http://www.foxnews.com/tech/2012/02/16/twitter-admits-peeking-at-address-books-announces-privacy-improvements/
  • 7/27/2019 Research Paper on Privacy

    12/17

    http://www.brandwatch.com/2012/12/how-we-use-social-highlights-from-the-social-media-report-2012/http://www.brandwatch.com/2012/12/how-we-use-social-highlights-from-the-social-media-report-2012/http://www.digitalbuzzblog.com/infographic-social-media-statistics-for-2013/http://www.digitalbuzzblog.com/infographic-social-media-statistics-for-2013/http://www.pewinternet.org/Reports/2010/Social-Media-and-Young-Adults.aspxhttp://www.pewinternet.org/Reports/2010/Social-Media-and-Young-Adults.aspxhttp://thesocialskinny.com/100-more-social-media-statistics-for-2012/http://thesocialskinny.com/100-more-social-media-statistics-for-2012/http://www.huffingtonpost.com/brian-honigman/100-fascinating-social-me_b_2185281.htmlhttp://www.huffingtonpost.com/brian-honigman/100-fascinating-social-me_b_2185281.htmlhttp://blog.trendmicro.com/trendlabs-security-intelligence/?s=social+media&Submit=+Go+http://blog.trendmicro.com/trendlabs-security-intelligence/?s=social+media&Submit=+Go+http://www.smh.com.au/digital-life/consumer-security/cyber-criminals-target-mobile-users-social-media-20130208-2e2nv.htmlhttp://www.smh.com.au/digital-life/consumer-security/cyber-criminals-target-mobile-users-social-media-20130208-2e2nv.htmlhttp://www.smh.com.au/digital-life/consumer-security/cyber-criminals-target-mobile-users-social-media-20130208-2e2nv.htmlhttp://socialmediatoday.com/freelancewriter/995206/impact-cyber-crime-and-security-social-mediahttp://socialmediatoday.com/freelancewriter/995206/impact-cyber-crime-and-security-social-mediahttp://blog.trendmicro.com/trendlabs-security-intelligence/social-networking-threats-to-think-about-as-2012-ends/http://blog.trendmicro.com/trendlabs-security-intelligence/social-networking-threats-to-think-about-as-2012-ends/http://blog.trendmicro.com/trendlabs-security-intelligence/social-networking-threats-to-think-about-as-2012-ends/http://www.opportunitypeterborough.co.uk/bondholder/events/the-employment-law-dangers-of-social-networkinghttp://www.opportunitypeterborough.co.uk/bondholder/events/the-employment-law-dangers-of-social-networkinghttp://readwrite.com/2010/03/24/social_sentry_track_employees_across_the_webhttp://readwrite.com/2010/03/24/social_sentry_track_employees_across_the_webhttp://www.compliancebuilding.com/about/publications/social-media-policies/http://www.compliancebuilding.com/about/publications/social-media-policies/http://www.ncsl.org/issues-research/telecom/employer-access-to-social-media-passwords.aspxhttp://www.ncsl.org/issues-research/telecom/employer-access-to-social-media-passwords.aspxhttp://www.policymic.com/articles/23860/can-facebook-get-you-fired-why-complaining-about-work-on-social-media-is-protected-speechhttp://www.policymic.com/articles/23860/can-facebook-get-you-fired-why-complaining-about-work-on-social-media-is-protected-speechhttp://www.policymic.com/articles/23860/can-facebook-get-you-fired-why-complaining-about-work-on-social-media-is-protected-speechhttp://edition.cnn.com/2012/10/09/living/real-simple-social-media-jobhttp://edition.cnn.com/2012/10/09/living/real-simple-social-media-jobhttp://papers.ssrn.com/sol3/papers.cfm?abstract_id=1782267http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1782267http://edition.cnn.com/2012/03/09/opinion/obeidallah-social-mediahttp://edition.cnn.com/2012/03/09/opinion/obeidallah-social-mediahttp://securencrypt.com/blog/1374/http://www.networkworld.com/community/blog/social-media-surveillance-helps-government-read-your-mindhttp://www.networkworld.com/community/blog/social-media-surveillance-helps-government-read-your-mind
  • 7/27/2019 Research Paper on Privacy

    13/17

    http://www.infosecisland.com/blogview/13078-The-Rise-of-Smartphones-and-Related-Security-Issues.htmlhttp://www.guardian.co.uk/technology/2012/jun/03/john-naughton-smartphone-revolution-costhttp://blog.usa.gov/post/34104330685/protect-your-identity-when-using-mobile-deviceshttp://about-threats.trendmicro.com/us/infographics/infograph/this-is-your-lifehttp://mashable.com/2013/02/06/mobile-growth/http://www.digby.com/mobile-statistics/http://www.forbes.com/sites/nextavenue/2013/03/05/dont-be-dumb-about-smartphone-privacy/https://www.privacyrights.org/fs/fs2b-cellprivacy.htm#smartphonedatahttps://www.privacyrights.org/fs/fs2b-cellprivacy.htm#smartphonedatahttp://about-threats.trendmicro.com/us/infographics/infograph/the-geography-of-social-media-threatshttp://about-threats.trendmicro.com/us/infographics/infograph/the-geography-of-social-media-threatshttp://about-threats.trendmicro.com/us/infographics/infograph/the-geography-of-social-media-threatshttp://about-threats.trendmicro.com/us/infographics/infograph/the-risks-of-posting-in-social-media-networkshttp://about-threats.trendmicro.com/us/infographics/infograph/the-risks-of-posting-in-social-media-networkshttp://about-threats.trendmicro.com/us/infographics/infograph/the-risks-of-posting-in-social-media-networkshttp://about-threats.trendmicro.com/us/infographics/infograph/are-you-safe-onlinehttp://about-threats.trendmicro.com/us/infographics/infograph/are-you-safe-onlinehttp://about-threats.trendmicro.com/us/infographics/infograph/are-you-safe-onlinehttp://www.mediabistro.com/alltwitter/social-media-stats-2012_b30651http://www.mediabistro.com/alltwitter/social-media-stats-2012_b30651http://www.mediabistro.com/alltwitter/fired-infographic_b36436http://www.mediabistro.com/alltwitter/fired-infographic_b36436http://www.mediabistro.com/alltwitter/social-media-privacy_b18922http://www.mediabistro.com/alltwitter/social-media-privacy_b18922
  • 7/27/2019 Research Paper on Privacy

    14/17

    http://www.cbsnews.com/8301-505125_162-51199800/what-is-behavioral-targeting/http://webtrends.about.com/od/glossary/a/what-geotagging.htmhttp://money.cnn.com/2012/07/10/technology/mobile-ad-networks/http://money.cnn.com/2012/07/10/technology/mobile-ad-networks/http://www.computerworld.com/s/article/9218163/Smartphone_apps_Is_your_privacy_protected_http://www.computerworld.com/s/article/9218163/Smartphone_apps_Is_your_privacy_protected_http://www.icsi.berkeley.edu/pubs/networking/cybercasinghotsec10.pdfhttp://www.icsi.berkeley.edu/pubs/networking/cybercasinghotsec10.pdfhttp://www.kstatecollegian.com/2011/06/15/smartphones-geotagging-feature-causes-potential-privacy-issues/http://www.kstatecollegian.com/2011/06/15/smartphones-geotagging-feature-causes-potential-privacy-issues/http://www.army.mil/article/75165/https://www.privacyrights.org/geotagging-privacyhttp://blog.trendmicro.com/trendlabs-security-intelligence/zeus-targets-mobile-users/http://blog.trendmicro.com/trendlabs-security-intelligence/zeus-targets-mobile-users/http://about-threats.trendmicro.com/us/infographics/infograph/behind-the-android-menace-malicious-appshttp://about-threats.trendmicro.com/us/infographics/infograph/behind-the-android-menace-malicious-appshttp://about-threats.trendmicro.com/us/infographics/infograph/behind-the-android-menace-malicious-appshttp://bgr.com/2013/03/05/smartphone-malware-analysis-359347/#disqus_threadhttp://bgr.com/2013/03/05/smartphone-malware-analysis-359347/#disqus_threadhttp://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt-repeating-history.pdfhttp://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt-repeating-history.pdfhttp://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt-repeating-history.pdfhttp://www.neowin.net/news/trend-micro-claims-1-in-10-android-apps-are-malwarehttp://www.neowin.net/news/trend-micro-claims-1-in-10-android-apps-are-malwarehttp://www.trendmicro.com/us/boxes/videos/20120525062712.htmlhttp://www.trendmicro.com/us/boxes/videos/20120525062712.htmlhttp://www.computerweekly.com/news/2240111939/Concerned-about-tablet-security-issues-Some-are-others-not-so-muchhttp://www.computerweekly.com/news/2240111939/Concerned-about-tablet-security-issues-Some-are-others-not-so-muchhttp://www.computerweekly.com/news/2240111939/Concerned-about-tablet-security-issues-Some-are-others-not-so-muchhttp://www.networkworld.com/news/2012/082112-gps-261824.htmlhttp://www.networkworld.com/news/2012/082112-gps-261824.htmlhttp://www.emarketer.com/Article/Security-Privacy-Concerns-Remain-Smartphone-Tablet-Users/1008901http://www.emarketer.com/Article/Security-Privacy-Concerns-Remain-Smartphone-Tablet-Users/1008901http://web.cs.wpi.edu/~cew/papers/wosn10.pdfhttp://www.cs.stonybrook.edu/~vyas/papers/soups_mobilestudy.pdfhttp://www.cs.stonybrook.edu/~vyas/papers/soups_mobilestudy.pdfhttp://www.huffingtonpost.com/2012/10/20/stolen-iphones_n_1992843.htmlhttp://www.huffingtonpost.com/2012/10/20/stolen-iphones_n_1992843.htmlhttp://www.newsnet5.com/dpp/news/science_tech/Online-smartphone-privacy-changing-Does-it-matter-to-youhttp://www.newsnet5.com/dpp/news/science_tech/Online-smartphone-privacy-changing-Does-it-matter-to-youhttp://www.newsnet5.com/dpp/news/science_tech/Online-smartphone-privacy-changing-Does-it-matter-to-youhttp://spectrum.ieee.org/riskfactor/telecom/wireless/smartphones-becoming-gateways-to-identity-thefthttp://spectrum.ieee.org/riskfactor/telecom/wireless/smartphones-becoming-gateways-to-identity-thefthttp://www.forbes.com/sites/nextavenue/2013/03/05/dont-be-dumb-about-smartphone-privacy/
  • 7/27/2019 Research Paper on Privacy

    15/17

    http://blogs.computerworld.com/privacy/21204/fighting-unconstitutional-stingray-phone-surveillance-tracks-innocent-peoplehttp://blogs.computerworld.com/privacy/21204/fighting-unconstitutional-stingray-phone-surveillance-tracks-innocent-peoplehttp://blogs.computerworld.com/privacy/21204/fighting-unconstitutional-stingray-phone-surveillance-tracks-innocent-peoplehttps://ssd.eff.org/wire/protect/cell-trackinghttp://www.wired.com/threatlevel/2013/04/verizon-rigmaiden-aircard/all/http://www.wired.com/threatlevel/2013/04/verizon-rigmaiden-aircard/all/http://www.aclu.org/national-security/surveillance-privacyhttp://www.aclu.org/national-security/surveillance-privacyhttp://papers.ssrn.com/sol3/papers.cfm?abstract_id=1693029http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1693029http://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/privacy-considerations-of-online-behavioural-trackinghttp://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/privacy-considerations-of-online-behavioural-trackinghttp://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/privacy-considerations-of-online-behavioural-trackinghttp://www.adweek.com/news/technology/ftc-restricts-behavioral-targeting-kids-146108http://www.adweek.com/news/technology/ftc-restricts-behavioral-targeting-kids-146108http://privacylaw.proskauer.com/articles/behavioral-marketing/http://privacylaw.proskauer.com/articles/behavioral-marketing/http://www.clickz.com/clickz/column/2097411/whats-behavioral-targeting-mobile-advertisinghttp://www.clickz.com/clickz/column/2097411/whats-behavioral-targeting-mobile-advertisinghttp://mostconf.org/2012/papers/15.pdfhttp://online.wsj.com/article/SB10001424052748704694004576020083703574602.htmlhttp://online.wsj.com/article/SB10001424052748704694004576020083703574602.htmlhttp://www.futureofprivacy.org/2011/05/12/fpf-finds-nearly-three-quarters-of-most-downloaded-mobile-apps-lack-a-privacy-policy/http://www.futureofprivacy.org/2011/05/12/fpf-finds-nearly-three-quarters-of-most-downloaded-mobile-apps-lack-a-privacy-policy/http://www.futureofprivacy.org/2011/05/12/fpf-finds-nearly-three-quarters-of-most-downloaded-mobile-apps-lack-a-privacy-policy/http://blog.trendmicro.com/trendlabs-security-intelligence/the-hidden-dangers-in-third-party-app-sites/http://blog.trendmicro.com/trendlabs-security-intelligence/the-hidden-dangers-in-third-party-app-sites/http://blog.trendmicro.com/trendlabs-security-intelligence/the-hidden-dangers-in-third-party-app-sites/http://www.csoonline.com/article/719744/increasingly-virulent-adware-threatens-android-user-privacyhttp://www.csoonline.com/article/719744/increasingly-virulent-adware-threatens-android-user-privacyhttp://about-threats.trendmicro.com/us/mobilehub/mobilereview/rpt-monthly-mobile-review-the-hidden-risk-behind-mobile-ad-networks-201212.pdfhttp://about-threats.trendmicro.com/us/mobilehub/mobilereview/rpt-monthly-mobile-review-the-hidden-risk-behind-mobile-ad-networks-201212.pdfhttp://about-threats.trendmicro.com/us/mobilehub/mobilereview/rpt-monthly-mobile-review-the-hidden-risk-behind-mobile-ad-networks-201212.pdfhttp://about-threats.trendmicro.com/us/mobilehub/mobilereview/rpt-monthly-mobile-review-the-hidden-risk-behind-mobile-ad-networks-201212.pdfhttp://www.winlab.rutgers.edu/~janne/privacyasexpectations-ubicomp12-final.pdfhttp://www.winlab.rutgers.edu/~janne/privacyasexpectations-ubicomp12-final.pdfhttp://www.wpri.com/dpp/news/12_for_action/sweeps-feb13-privacy-apps-for-smartphoneshttp://www.wpri.com/dpp/news/12_for_action/sweeps-feb13-privacy-apps-for-smartphoneshttp://www.independent.ie/business/world/smartphone-apps-pose-significant-privacy-risks-29131797.htmlhttp://www.independent.ie/business/world/smartphone-apps-pose-significant-privacy-risks-29131797.htmlhttp://www.businessnewsdaily.com/3768-smartphones-apps-share-personal-data.htmlhttp://www.businessnewsdaily.com/3768-smartphones-apps-share-personal-data.htmlhttp://blogs.wsj.com/wtk-mobile/
  • 7/27/2019 Research Paper on Privacy

    16/17

    http://blog.trendmicro.com/trendlabs-security-intelligence/files/2012/04/stayingsafeinSocialMedia_WEB.jpghttp://blog.trendmicro.com/trendlabs-security-intelligence/files/2012/04/stayingsafeinSocialMedia_WEB.jpghttp://blog.trendmicro.com/trendlabs-security-intelligence/files/2012/04/stayingsafeinSocialMedia_WEB.jpghttp://precog.iiitd.edu.in/events/psosm2013/ur_wang_psosm13_culturalframework.pdfhttp://precog.iiitd.edu.in/events/psosm2013/ur_wang_psosm13_culturalframework.pdfhttp://www.pressherald.com/business/social-media-policy-is-your-friend_2011-01-25.htmlhttp://www.pressherald.com/business/social-media-policy-is-your-friend_2011-01-25.htmlhttp://www.oge.gov/About/Management-Reports-and-Policies/Social-Media-Policies/Third-Party-Website-Privacy-Statement---Social-Media/http://www.oge.gov/About/Management-Reports-and-Policies/Social-Media-Policies/Third-Party-Website-Privacy-Statement---Social-Media/http://www.oge.gov/About/Management-Reports-and-Policies/Social-Media-Policies/Third-Party-Website-Privacy-Statement---Social-Media/https://itservices.uchicago.edu/page/practice-safe-social-networkinghttps://itservices.uchicago.edu/page/practice-safe-social-networkinghttp://epic.org/privacy/internet/cookies/https://www.cdt.org/abouthttp://www.business.ftc.gov/privacy-and-securityhttp://www.ftc.gov/ogc/coppa1.htmhttps://www.privacyrights.org/social-networking-privacyhttps://www.privacyrights.org/social-networking-privacyhttps://www.privacyrights.org/fs/fs2b-cellprivacy.htmhttps://www.privacyrights.org/fs/fs2b-cellprivacy.htmhttps://www.privacyrights.org/fs/fs18-cyb.htmhttps://www.privacyrights.org/fs/fs1-surv.htmhttps://www.privacyrights.org/
  • 7/27/2019 Research Paper on Privacy

    17/17

    https://www.eff.org/abouthttp://www.iab.net/insights_research/public_policy/behavioral-advertisingprincipleshttp://www.iab.net/insights_research/public_policy/behavioral-advertisingprincipleshttp://www.ico.org.uk/http://www.academia.edu/1394909/Secure_Management_of_Social_Networks_Applications_Datahttp://www.academia.edu/1394909/Secure_Management_of_Social_Networks_Applications_Datahttp://conferences.sigcomm.org/sigcomm/2012/paper/wosn/p49.pdfhttp://conferences.sigcomm.org/sigcomm/2012/paper/wosn/p49.pdfhttp://blog.trendmicro.com/trendlabs-security-intelligence/http://blog.trendmicro.com/trendlabs-security-intelligence/