Chapter 3. Privacy

Authors

  • Nicole Hennig

Abstract

Chapter 3 of Library Technology Reports (vol. 54, no. 3), “Privacy and Security Online: Best Practices for Cybersecurity”

Chapter 3 covers several aspects of security, including

•   targeted advertising and ad blockers

•   keeping your search engine history private

•   recommended apps and websites for protecting privacy

•   your location history

•   Facebook privacy settings

For each of these topics, best practices are offered for protecting your privacy.

Author Biography

Nicole Hennig

Nicole Hennig is an expert in mobile technologies for libraries. In her fourteen years of experience at the MIT Libraries, first as web manager, then as head of user experience, she won awards for innovation and worked to keep academics up-to-date with the best mobile technologies. In 2013, she left to start her own business helping librarians stay current with new technologies. She is the author of several books, including Keeping Up with Emerging Technologies: Best Practices for Information Professionals. Her newsletter, Mobile Apps News, helps librarians stay current with mobile technologies. For more information, visit her website http://nicolehennig.com.

References

Emma Hinchliffe, “Why Everyone Is So Convinced Facebook Is Spying on Their Conversations,” Mashable, October 7, 2017, http://mashable.com/2017/10/07/why-it-feels-like-facebook-is-spying/#It3XCCGa8aqZ.

Antonio Garcia Martinez, “Facebook’s Not Listening through Your Phone. It Doesn’t Have To,” Wired, November 10, 2017, https://www.wired.com/story/facebooks-listening-smartphone-microphone.

John Corpuz, “Best Ad Blockers and Privacy Extensions,” Tom’s Guide, July 6, 2017, https://www.tomsguide.com/us/pictures-story/565-best-adblockers-privacy-extensions.html.

Antonio Garcia Martinez, “Facebook’s Not Listening through Your Phone. It Doesn’t Have To,” Wired, November 10, 2017, https://www.wired.com/story/facebooks-listening-smartphone-microphone.

Nick Nguyen, “Introducing Firefox Focus—A Free, Fast Private Browser for iPhone,” Mozilla Blog, November 17, 2016, https://blog.mozilla.org/blog/2016/11/17/introducing-firefox-focus-a-free-fast-and-easy-to-use-private-browser-for-ios.

DuckDuckGo homepage, accessed January 5, 2018, https://duckduckgo.com.

Jon Brodkin, “Senate Votes to Let ISPs Sell Your Web Browsing History to Advertisers,” Ars Technica, March 23, 2017, https://arstechnica.com/tech-policy/2017/03/senate-votes-to-let-isps-sell-your-web-browsing-history-to-advertisers.

Lee Mathews, “What Tor Is, and Why You Should Use It to Protect Your Privacy,” Forbes, January 27, 2017, https://www.forbes.com/sites/leemathews/2017/01/27/what-is-tor-and-why-do-people-use-it/#41e4fbb97d75.

Christian Zibreg, “How to Stop iPhone from Tracking Your Location,” iDownload Blog, April 28, 2016, www.idownloadblog.com/2016/04/28/how-to-stop-phone-location-tracking.

Brittany McGhee, “How to Stop Android Apps Accessing Your Location,” AndroidPIT, February 7, 2017, https://www.androidpit.com/how-to-stop-android-apps-accessing-your-location.

“Location Tracking,” Me and My Shadow, last updated February 15, 2017, https://myshadow.org/location-tracking.

“About Facebook Ads,” Facebook, https://www.facebook.com/ads/about.

M. J. Kelly, “Facebook Privacy Tips: How to Share without Oversharing,” Mozilla Blog, January 25, 2017, https://blog.mozilla.org/internetcitizen/2017/01/25/facebook-privacy-tips.

Electronic Frontier Foundation, “How to: Use Signal on iOS,” Surveillance Self-Defense, last reviewed March 17, 2017, https://ssd.eff.org/en/module/how-use-signal-ios.

Electronic Frontier Foundation, “How to: Use Signal for Android,” Surveillance Self-Defense, last reviewed March 17, 2017, https://ssd.eff.org/en/module/how-use-signal-android.

“Got a Confidential News Tip?” New York Times website, accessed January 5, 2018, https://www.nytimes.com/newsgraphics/2016/news-tips.

Michah Lee, “Battle of the Secure Messaging Apps: How Signal Beats WhatsApp,” The Intercept, June 22, 2016, https://theintercept.com/2016/06/22/battle-of-the-secure-messaging-apps-how-signal-beats-whatsapp.

Melanie Pinola, “ProtonMail Is the Easiest Way to Send and Receive Encrypted Emails,” Lifehacker, March 17, 2016, https://lifehacker.com/protonmail-is-the-easiest-way-to-send-and-receive-encry-1765491376.

Andy Wolber, “Simple Security: How Gmail, Mailvelope, and Virtru Make Encrypted Email Easier,” TechRepublic, July 13, 2016, https://www.techrepublic.com/article/simple-security-how-gmail-mailvelope-and-virtru-make-encrypted-email-easier.

Glenn Fleishman, “Anonymous Browsing with Tor Reduces Exposure but Still Has Risks,” Macworld, January 17, 2017, https://www.macworld.com/article/3152823/security/anonymous-browsing-with-tor-reduces-exposure-but-still-has-risks.html.

Will Nicol, “A Beginner’s Guide to Tor: How to Navigate through the Underground Internet,” Digital Trends, January 29, 2016, https://www.digitaltrends.com/computing/a-beginners-guide-to-tor-how-to-navigate-through-the-underground-internet.

Mark Yates, “Time to Tape Over the Camera on Your Laptop,” AVG, September 26, 2016, https://www.avg.com/en/signal/why-you-should-cover-the-camera-on-your-laptop-or-tablet.

Charlie Osborn, “Shodan: The IoT Search Engine for Watching Sleeping Kids and Bedroom Antics,” ZDNet, January 26, 2016, www.zdnet.com/article/shodan-the-iot-search-engine-which-shows-us-sleeping-kids-and-how-we-throw-away-our-privacy.

Bruce Snell, “IoT and Privacy: Keeping Secrets from Your Webcam,” McAfee, February 10, 2016, https://securingtomorrow.mcafee.com/consumer/family-safety/iot-and-privacy-keeping-secrets-from-your-webcam.

Ashkan Soltani and Timothy B. Lee, “Research Shows How MacBook Webcams Can Spy on Their Users without Warning,” Washington Post, December 18, 2013, https://www.washingtonpost.com/news/the-switch/wp/2013/12/18/research-shows-how-macbook-webcams-can-spy-on-their-users-without-warning/?utm_term=.58f6603424b6.

Chris Synder, “Hackers and Governments Can See You through Your Phone’s Camera—Here’s How to Protect Yourself,” Business Insider, March 7, 2017, www.businessinsider.com/hackers-governments-smartphone-iphone-camera-wikileaks-2017-3.

Jacob Brogan, “What’s the Best Way to Cover Your Webcam?” from Slate, September 15, 2016, www.slate.com/blogs/future_tense/2016/09/15/the_best_ways_to_cover_a_webcam.html.

“Data Security & Privacy on Google Home,” Google, accessed January 5, 2018, https://support.google.com/googlehome/answer/7072285?hl=en.

David Nield, “How to Lock Down Your Privacy on the Amazon Echo and Google Home,” April 27, 2017, https://fieldguide.gizmodo.com/how-to-lock-down-your-privacy-on-the-amazon-echo-and-go-1794697554.

Lee Rainie and Janna Anderson, “The Internet of Things Connectivity Binge: What Are the Implications?” Pew Research Center, June 6, 2017, www.pewinternet.org/2017/06/06/the-internet-of-things-connectivity-binge-what-are-the-implications.

Downloads

Published

2018-03-26

Issue

Section

Chapters