The Future: six drivers of global change - BestLightNovel.com
You’re reading novel The Future: six drivers of global change Part 45 online at BestLightNovel.com. Please use the follow button to get notification about the latest chapter next time when you visit BestLightNovel.com. Use F11 button to read novel in full-screen(PC only). Drop by anytime you want to read free – fast – latest novel. It’s great if you could leave a comment, share your opinion about the new chapters, new novel with others on the internet. We’ll do our best to bring you the finest, latest novel everyday. Enjoy
224 which information can be delivered with relevance to the user's location
"Privacy Please! U.S. Smartphone App Users Concerned with Privacy When It Comes to Location," Nielsen, April 21, 2011, http://blog.nielsen.com/nielsenwire/online_mobile/privacy-please-u-s-smartphone-app-users-concerned-with-privacy-when-it-comes-to-location/.
225 25,000 U.S. citizens are also victims of "GPS stalking" each year
Justin Scheck, "Stalkers Exploit Cellphone GPS," Wall Street Journal, August 3, 2010.
226 1,200 pages of information, most of which he thought he had deleted
Kevin J. O'Brien, "Austrian Law Student Faces Down Facebook," New York Times, February 5, 2012.
227 designed to steal information from the user's computer or mobile device
Matt Richtel and Verne G. Kopytoff, "E-Mail Fraud Hides Behind Friendly Face," New York Times, June 2, 2011.
228 all the private information about individuals
Ann Carrns, "Careless Social Media Use May Raise Risk of Ident.i.ty Fraud," New York Times, February 29, 2012.
229 which have reported large losses as a result of cybercrime
"IMF Is Victim of 'Sophisticated Cyberattack,' Says Report," IDG Reporter, June 13, 2011; "US Senate Orders Security Review After LulzSec Hacking," Guardian, June 14, 2011; Julianne Pepitone and Leigh Remizowski, " 'Ma.s.sive' Credit Card Data Breach Involves All Major Brands," CNN, April 2, 2012, http://money.cnn.com/2012/03/30/technology/credit-card-data-breach/index.htm; "Heartland Payment Systems Hacked," a.s.sociated Press, January 20, 2009; Bianca Dima, "Top 5: Corporate Losses Due to Hacking," HOT for Security, May 17, 2012.
230 more than $7.2 million, with the cost increasing each year
"The Real Cost of Cyber Attacks," Atlantic, February 16, 2012.
231 "more than the annual global market for marijuana, cocaine, and heroin combined"
Symantec, press release, "Norton Study Calculates Cost of Global Cybercrime: $114 Billion Annually," September 7, 2011, http://www.symantec.com/about/news/release/article.jsp?prid=20110907_02. However, some a.n.a.lysts note that some estimates of cybercrime are unreliable. Dinei Florencio and Cormac Herley, "The Cybercrime Wave That Wasn't," New York Times, April 14, 2012.
232 LinkedIn
Ian Paul, "LinkedIn Confirms Account Pa.s.swords Hacked," PC World, June 6, 2012.
233 eHarmony
Salvador Rodriguez, "Like LinkedIn, eHarmony Is Hacked; 1.5 Million Pa.s.swords Stolen," Los Angeles Times, June 6, 2012.
234 Google's Gmail
Nicole Perlroth, "Yahoo Breach Extends Beyond Yahoo to Gmail, Hotmail, AOL Users," New York Times, July 12, 2012.
235 Bank of America, JPMorgan Chase, Citigroup, U.S. Bank, Wells Fargo, and PNC
David Goldman, "Major Banks. .h.i.t with Biggest Cyberattacks in History," CNN, September 28, 2012; "Week-Long Cyber Attacks Cripple US Banks," a.s.sociated Press, September 29, 2012.
236 store Internet and telephone communications
Brian Wheeler, "Communications Data Bill Creates 'a Virtual Giant Database,' " BBC, July 19, 2012, http://www.bbc.co.uk/news/uk-politics-18884460.
237 already installed 60,000 security cameras
Heather Brooke, "Investigation: A Sharp Focus on CCTV," Wired UK, April 1, 2010.
238 "restrictions that fence in even the most disinterested"
Justice Felix Frankfurter, Concurring Opinion, Youngstown Sheet & Tube Co. v. Sawyer, 343 U.S. 579 (1952).
239 "Knowledge is power"
Georg Henrik Wright, The Tree of Knowledge and Other Essays (Leiden: Brill, 1993), p. 12728.
240 ability to eavesdrop on telephone calls as they were taking place