Skip to main content

Personal Information Management

  • Chapter
  • First Online:
Book cover Facebook Nation

Abstract

With the abundance of our digital footprint and exhaust data online, we must manage our personal data better. First and foremost, we need to address identify theft prevention. Even if companies are doing their best to protect our private information, hackers are hard at work to steal our valuable data online.

Awareness is an effective weapon against many forms of identity theft.

—U.S. Federal Trade Commission

As we go through our lives we create vast amounts of data. It’s more than just data. It represents our actions, interests, intentions, communications, relationships, locations, behaviors and creative and consumptive efforts.

—The Locker Project

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ingraham, Nathan. (June 6, 2012). LinkedIn confirms that member passwords have been compromised. The Verge. http://www.theverge.com/2012/6/6/3068652/linkedin-member-passwords-stolen

  2. Acohido, Byron. (March 30, 2012). Credit card processor hit by hackers. USA Today. http://www.usatoday.com/money/industries/banking/story/2012-03-30/mastercard-security-breach/53887854/1

  3. Zakaria, Tabassum; Hosenball, Mark. (December 30, 2011). Stratfor Hack: Anonymous-Affiliated Hackers Publish Thousands Of Credit Card Numbers. Huffington Post. http://www.huffingtonpost.com/2011/12/30/stratfor-hack-anonymous_n_1176726.html

  4. Better Business Bureau. (May 10, 2012). Consumers Get Smart and Shred, Shred, Shred to Prevent Fraud. Better Business Bureau. http://www.bbb.org/us/article/consumers-get-smart-and-shred-shred-shred-to-prevent-fraud-34226

  5. Federal Trade Commission. (Retrieved May 14, 2012). About Identity Theft. Federal Trade Commission. http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html

  6. Federal Trade Commission. (Retrieved May 14, 2012). Deter. Detect. Defend. Fighting Back Against Identity Theft. http://www.ftc.gov/bcp/edu/pubs/consumer/idtheft/idt01.pdf

  7. Federal Bureau of Investigation. (May 8, 2012). Malware Installed on Travelers’ Laptops Through Software Updates on Hotel Internet Connections. Federal Bureau of Investigation. http://www.fbi.gov/scams-safety/e-scams

  8. Tuerk, Andreas. (March 28, 2012). Giving you more insight into your Google Account activity. Google Official Blog. http://googleblog.blogspot.com/2012/03/giving-you-more-insight-into-your.html#!/2012/03/giving-you-more-insight-into-your.html

  9. Google. (Retrieved May 25, 2012). What are Google Alerts? Google Alerts. https://support.google.com/alerts/bin/answer.py?hl=en&answer=175925

  10. National Do Not Call Registry. (Retrieved May 29, 2012). National Do Not Call Registry. https://www.donotcall.gov/

  11. Gahran, Amy. (March 19, 2012). Getting text spam? New service helps you report it. CNN. http://www.cnn.com/2012/03/19/tech/mobile/text-spam-gahran/index.html

  12. Siegel + Gale. (April 24, 2012). Survey Finds Facebook and Google Privacy Policies Even More Confusing Than Credit Card Bills and Government Notices. Siegel + Gale Press Releases. http://www.siegelgale.com/media_release/survey-finds-facebook-and-google-privacy-policies-even-more-confusing-than-credit-card-bills-and-government-notices/

  13. Cheng, Jacqui. (February 7, 2012). Over 3 years later, “deleted” Facebook photos are still online. CNN. http://www.cnn.com/2012/02/06/tech/social-media/deleted-facebook-photos-online/index.html

  14. Facebook Privacy. (Retrieved May 14, 2012). Facebook Basics. Manage Your Account. Privacy. Facebook Help Center. http://www.facebook.com/help/?page=187475824633454

  15. Facebook. (Retrieved May 15, 2012). Sharing and finding you on Facebook. Facebook Data Use Policy. http://www.facebook.com/about/privacy/your-info-on-fb

  16. Facebook Privacy. (Retrieved May 15, 2012). How do I turn on the option to review posts and photos I’m tagged in before they appear on my profile? Facebook Help Center. http://www.facebook.com/help/?faq=223100381057791

  17. Mitchell, Justin. (June 30, 2011). Making Photo Tagging Easier. The Facebook Blog. http://blog.facebook.com/blog.php?post=467145887130

  18. Johnston, Casey. (May 13, 2012). On Facebook, deleting an app doesn’t delete your data from their system. Ars Technica. http://arstechnica.com/gadgets/2012/05/on-facebook-deleting-an-app-doesnt-delete-your-data-from-their-system/

  19. Hockenson, Lauren. (January 27, 2012). 7 Big Privacy Concerns for New Facebook and the Open Graph. Mashable. http://mashable.com/2012/01/27/facebook-privacy-open-graph/

  20. Facebook. (Retrieved May 15, 2012). Open Graph. Facebook Developers. https://developers.facebook.com/docs/opengraph/

  21. . (Retrieved May 15, 2012). Sharing with other websites and applications. Facebook Data Use Policy. http://www.facebook.com/about/privacy/your-info-on-other

  22. Facebook Privacy. (Retrieved May 15, 2012). How do I prevent search engines (e.g., Google) from showing my public search listing? Facebook Help Center. http://www.facebook.com/help/?faq=131026496974464

  23. Facebook. (Retrieved June 29, 2012). Create a Facebook Page to build a closer relationship with your audience and customers. Facebook. http://www.facebook.com/pages/create.php

  24. Google. (Retrieved May 15, 2012). About personalized ads on Google Search and Gmail. Google Inside Search. http://support.google.com/websearch/bin/answer.py?hl=en&answer=1634057

  25. Gahran, Amy. (April 3, 2012). ACLU: Most police track phones’ locations without warrants. CNN. http://www.cnn.com/2012/04/03/tech/mobile/police-phone-tracking-gahran/index.html

  26. Mello, John P. (December 2, 2011). Carrier IQ Test: Android App Detects Controversial Software. PC World. http://www.pcworld.com/article/245371/carrier_iq_test_android_app_detects_controversial_software.html

  27. Vijayan, Jaikumar. (December 14, 2011). FBI never sought Carrier IQ data, director says. Computerworld. http://www.computerworld.com/s/article/9222678/FBI_never_sought_Carrier_IQ_data_director_says

  28. Google + . (Retrieved May 15, 2012). Find my Face. Google + . http://support.google.com/plus/bin/answer.py?hl=en&p=name_suggest_promo&answer=2370300

  29. Vega, Tanzina; Wyatt, Edward. (March 26, 2012). U.S. Agency Seeks Tougher Consumer Privacy Rules. New York Times. http://www.nytimes.com/2012/03/27/business/ftc-seeks-privacy-legislation.html

  30. Mayer, Jonathan; Narayanan, Arvind. (Retrieved May 15, 2012). Do Not Track. Universal Web Tracking Opt Out. http://donottrack.us/

  31. Hachamovitch, Dean. (May 31, 2012). Windows Release Preview: The Sixth IE10 Platform Preview. MSDN Blogs. http://blogs.msdn.com/b/ie/archive/2012/05/31/windows-release-preview-the-sixth-ie10-platform-preview.aspx

  32. Google. (Retrieved May 16, 2012). Google Accounts & Web History. Google. http://www.google.com/goodtoknow/data-on-google/web-history/

  33. Google. (Retrieved May 25, 2012). What are Google Alerts? Google Alerts. https://support.google.com/alerts/bin/answer.py?hl=en&answer=175925

  34. Google. (February 15, 2012). Remove content from someone else’s site. Google Webmaster Tools. https://support.google.com/webmasters/bin/answer.py?hl=en&answer=1663688

  35. Google. (Retrieved May 27, 2012). Privacy Complaint Process. YouTube. http://support.google.com/youtube/bin/answer.py?hl=en&answer=142443

  36. Google. (Retrieved June 1, 2012). SSL Search. Google Inside Search. http://support.google.com/websearch/bin/answer.py?hl=en&answer=173733

  37. Privoxy Developers. (Retrieved May 15, 2012). Privoxy. http://www.privoxy.org/

  38. Tor Developers. (Retrieved May 15, 2012). Tor. https://www.torproject.org/

  39. Anonymizer Developers. (Retrieved May 15, 2012). Anonymizer. http://www.anonymizer.com/

  40. Newman, Jared. (May 4, 2012). 8 Tools for the Online Privacy Paranoid. Time Magazine. http://techland.time.com/2012/05/04/8-tools-for-the-online-privacy-paranoid/

  41. The Locker Project. (Retrieved May 17, 2012). About The Locker Project. http://lockerproject.org/

  42. Gross, Doug. (February 27, 2012). Manage (and make cash with?) your data online. CNN. http://www.cnn.com/2012/02/24/tech/web/owning-your-data-online/index.html

  43. Hamlin, Kaliya. (June 1, 2011). What is the Personal Data Ecosystem? Personal Data Ecosystem Consortium. http://personaldataecosystem.org/category/about/

  44. Singly. (Retrieved May 17, 2012). Singly exists for you. http://blog.singly.com/about-singly/

  45. Shute, Tish. (February 11, 2011). The Locker Project: data for the people. O’Reilly Radar. http://radar.oreilly.com/2011/02/singly-locker-project-telehash.html

  46. Personal. (Retrieved May 17, 2012). A new kind of company. http://www.personal.com/who-we-are/a-new-kind-of-company

  47. Delo, Cotton. (November 28, 2011). Here’s My Personal Data, Marketers. What Do I Get For it? Advertising Age. http://adage.com/article/digital/web-data-startups-bank-consumers-controlling-data/231208/

  48. McNally, Steve. (June 30, 2011). The Locker Project and Your Digital Wake. Forbes. http://www.forbes.com/sites/smcnally/2011/06/30/your-digital-wake/

  49. Solon, Olivia. (November 28, 2011). Personal analytics could lead to ‘designed’ lifestyles. Wired. http://www.wired.co.uk/news/archive/2011-11/28/martin-blinder-personal-analytics

  50. Imam, Jareen. (June 29, 2012). Want to get fit? Pull out your phone. CNN. http://www.cnn.com/2012/06/29/tech/social-media/tech-fitness-irpt/index.html

  51. Swallow, Erica. (September 22, 2011). How Nike Outruns the Social Media Competition. Mashable. http://mashable.com/2011/09/22/nike-social-media/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Newton Lee .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Lee, N. (2013). Personal Information Management. In: Facebook Nation. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5308-6_12

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-5308-6_12

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-5307-9

  • Online ISBN: 978-1-4614-5308-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics