Part I Prologue |
|
|
1 From 1984 to Total Information Awareness |
|
|
3 | (22) |
|
1.1 U.S. Capitol Riot on January 6, 2021 |
|
|
3 | (1) |
|
1.2 President Ronald Reagan on April 3, 1984 |
|
|
4 | (4) |
|
1.3 Total Information Awareness |
|
|
8 | (3) |
|
1.4 Edward Snowden's NSA Leaks and PRISM |
|
|
11 | (3) |
|
1.5 Social Networks' Responses to NSA Leaks and PRISM |
|
|
14 | (3) |
|
1.6 Reform Government Surveillance and Reset the Net |
|
|
17 | (1) |
|
|
18 | (7) |
Part II Privacy in the Age of Big Data |
|
|
2 Social Networks and Privacy |
|
|
25 | (44) |
|
2.1 Zero Privacy and the Central Intelligence Agency |
|
|
26 | (1) |
|
2.2 The Archer, Carrier Pigeons, and President Jimmy Carter |
|
|
26 | (2) |
|
2.3 The Pervasiveness of Facebook |
|
|
28 | (3) |
|
2.4 Chairs Are Like Facebook |
|
|
31 | (1) |
|
2.5 Facebook and Personal Privacy |
|
|
32 | (2) |
|
2.6 Facebook Friends and Personal Privacy |
|
|
34 | (1) |
|
2.7 Facebook, Children, and COPPA |
|
|
35 | (3) |
|
2.8 Netflix and Social Apps on Facebook |
|
|
38 | (1) |
|
2.9 Facebook Timeline and Open Graph |
|
|
39 | (1) |
|
2.10 Ambient Social Apps and Digital Surveillance |
|
|
40 | (1) |
|
2.11 Stalking Apps and Badoo (aka Facebook for Sex) |
|
|
41 | (2) |
|
2.12 Facial Recognition Apps |
|
|
43 | (1) |
|
2.13 Facial Recognition on Facebook, Google, and iPhone |
|
|
44 | (3) |
|
2.14 Virtual Passports: From Privacy to Data Use |
|
|
47 | (2) |
|
2.15 Social Search: Google, plus Your World and Microsoft's Bing |
|
|
49 | (2) |
|
2.16 Self-Destructing Messages |
|
|
51 | (1) |
|
2.17 Facebook Anonymous Login |
|
|
52 | (1) |
|
2.18 Anonymous Social Apps |
|
|
53 | (1) |
|
2.19 Responses to Zero Privacy |
|
|
54 | (1) |
|
|
55 | (14) |
|
3 Smartphones and Privacy |
|
|
69 | (16) |
|
|
69 | (1) |
|
3.2 Location Tracking on iPhone and iPad |
|
|
70 | (1) |
|
|
71 | (1) |
|
3.4 Smartphone Data Collection Transparency |
|
|
72 | (2) |
|
|
74 | (1) |
|
3.6 Mobile Apps Privacy Invasion |
|
|
75 | (1) |
|
3.7 Mobile Apps for Children |
|
|
76 | (1) |
|
3.8 Android Market and Google Play |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
79 | (6) |
|
|
85 | (16) |
|
4.1 Facebook's Massive Data Breaches |
|
|
85 | (1) |
|
|
86 | (3) |
|
4.3 Google Easter Eggs in Disguise |
|
|
89 | (2) |
|
|
91 | (2) |
|
4.5 Facebook User Tracking Bug and Online Behavioral Tracking |
|
|
93 | (1) |
|
4.6 Carrier IQ and Other Privacy Blunders |
|
|
94 | (1) |
|
|
95 | (6) |
Part III Business Intelligence in Social Media |
|
|
|
101 | (26) |
|
5.1 French Revolution of Finance: A Tale of GameStop |
|
|
101 | (2) |
|
5.2 Bitcoin, Dogecoin, and Crypto Pump-and-Dumps |
|
|
103 | (1) |
|
5.3 Facebook Credits, Libra, Diem, and Stablecoin |
|
|
104 | (1) |
|
5.4 Intelligent Digital Billboards |
|
|
104 | (1) |
|
5.5 Data Mining: Amazon.com, Lowe's, Target, True&Co |
|
|
105 | (1) |
|
5.6 Tumblr and Gmail: Yes to Advertisements |
|
|
106 | (1) |
|
5.7 Social Ads on Facebook |
|
|
107 | (2) |
|
5.8 News Feed, Sponsored Stories, Custom Stories, Facebook Exchange, and Marketplace |
|
|
109 | (1) |
|
5.9 Facebook for Every Phone |
|
|
110 | (1) |
|
5.10 Instagram and Mobile App Install Ads |
|
|
111 | (2) |
|
5.11 Facebook Home and Parse |
|
|
113 | (1) |
|
5.12 WhatsApp and Facebook Audience Network |
|
|
113 | (2) |
|
5.13 Location-based Mobile Advertisements |
|
|
115 | (1) |
|
5.14 Business Communications on Facebook |
|
|
115 | (2) |
|
5.15 B2B, B2C, and H2H on Social Media |
|
|
117 | (1) |
|
|
118 | (9) |
|
6 Facebook Analytics, Advertising, and Marketing |
|
|
127 | (24) |
|
|
127 | (1) |
|
6.2 Metrics Analysis Action (MAA) |
|
|
128 | (2) |
|
6.3 Everything You Need to Know about Website Custom Audiences (WCA) |
|
|
130 | (1) |
|
6.4 Ten Questions Any Facebook Marketing Consultant should be Able to Answer |
|
|
131 | (3) |
|
6.5 The Insider's Guide to Facebook Traffic |
|
|
134 | (1) |
|
6.6 Using Exclusion Targeting to Filter Out Unwanted Targets |
|
|
135 | (1) |
|
6.7 Guess Where Users are Spending More Time - TV or Mobile/Web? |
|
|
136 | (2) |
|
6.8 The Mechanics of Facebook Ad Budgeting |
|
|
138 | (4) |
|
6.9 How Spending a Few Dollars on Facebook can Turn You into an Influencer |
|
|
142 | (1) |
|
6.10 The Danger of Buying Facebook Fans |
|
|
143 | (2) |
|
6.11 How to Tell if Your Ad is Working and Diagnose Newsfeed Burnout |
|
|
145 | (2) |
|
|
147 | (4) |
|
7 How to Become an Influencer and Make Money on Instagram |
|
|
151 | (6) |
|
7.1 Social Media Influencer |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
7.6 Boosting Your Instagram Followers |
|
|
153 | (4) |
|
8 Consumer Privacy in the Age of Big Data |
|
|
157 | (18) |
|
8.1 Data Privacy vs. Data Security |
|
|
157 | (1) |
|
8.2 Facebook vs. Apple's Privacy Nutrition Labels |
|
|
158 | (2) |
|
8.3 Oil of the Digital Age |
|
|
160 | (1) |
|
8.4 Data Brokers: The Good, the Bad and the Ugly |
|
|
161 | (2) |
|
8.5 Consumer Privacy Bill of Rights |
|
|
163 | (2) |
|
8.6 Federal Trade Commission Privacy Report: Do Not Track |
|
|
165 | (1) |
|
8.7 Google's Federated Learning of Cohorts (FLOC) |
|
|
166 | (1) |
|
8.8 California Online Privacy Protection Act |
|
|
167 | (1) |
|
8.9 European Union's "Right to be Forgotten" Law |
|
|
167 | (1) |
|
8.10 Facebook and Twitter Safety and Takedowns |
|
|
168 | (1) |
|
|
169 | (6) |
Part IV The Rise of Facebook Nation |
|
|
9 Twitter - A World of Immediacy |
|
|
175 | (24) |
|
9.1 Platform of Hope Amid COVID-19 Crisis |
|
|
175 | (1) |
|
9.2 Crime Stoppers on Social Media |
|
|
176 | (1) |
|
9.3 The Pen is Mightier than the Sword |
|
|
177 | (3) |
|
|
180 | (3) |
|
|
183 | (1) |
|
9.6 Prevalence of Twitter |
|
|
184 | (5) |
|
9.7 Advertisements and Campaigns on Twitter |
|
|
189 | (1) |
|
9.8 Cuban Twitter: ZunZuneo |
|
|
190 | (1) |
|
9.9 Creative Uses of Twitter |
|
|
191 | (1) |
|
9.10 The Downside of Twitter |
|
|
192 | (2) |
|
|
194 | (5) |
|
10 Misinformation, Disinformation, and Fake News |
|
|
199 | (38) |
|
10.1 The Storming of Capitol Hill in 2021 |
|
|
200 | (1) |
|
10.2 The War of the Worlds Radio Broadcast in 1938 |
|
|
201 | (1) |
|
10.3 Misinformation, Disinformation, and Fake News on Social Media |
|
|
201 | (2) |
|
10.4 Ramifications and Repercussions of Misinformation and Disinformation |
|
|
203 | (4) |
|
10.5 Combating Misinformation, Disinformation, and Fake News on Social Media |
|
|
207 | (5) |
|
10.6 Censorship vs. Freedom of Speech |
|
|
212 | (2) |
|
10.7 The Oversight Board: Facebook's Supreme Court |
|
|
214 | (1) |
|
10.8 Trustworthiness of Wikipedia |
|
|
215 | (3) |
|
10.9 Google Search Sabotage |
|
|
218 | (2) |
|
10.10 Advertising Misinformation and Disinformation |
|
|
220 | (1) |
|
10.11 Authenticity of Social Media Influencers and Fake Accounts |
|
|
221 | (1) |
|
10.12 Facebook Account Verification |
|
|
222 | (1) |
|
10.13 Twitter Verified Accounts |
|
|
223 | (1) |
|
10.14 Deepfakes and Shallowfakes on YouTube |
|
|
224 | (1) |
|
10.15 Social Media vs. Mainstream Media |
|
|
225 | (2) |
|
|
227 | (1) |
|
|
227 | (10) |
|
11 Wikipedia and the New Web |
|
|
237 | (12) |
|
11.1 History of Wikipedia |
|
|
237 | (2) |
|
|
239 | (1) |
|
|
240 | (1) |
|
11.4 Wikipedia as Major News Source |
|
|
241 | (1) |
|
|
242 | (1) |
|
11.6 Acceptance of Wikipedia |
|
|
243 | (1) |
|
11.7 Wikipedia Education Program |
|
|
244 | (1) |
|
11.8 Systemic Bias and WikiProject Women Scientists |
|
|
245 | (1) |
|
11.9 Native Language Wikipedias |
|
|
245 | (1) |
|
|
246 | (1) |
|
|
247 | (2) |
|
12 E-Government and E-Activism |
|
|
249 | (50) |
|
12.1 President Barack Obama and Web 2.0 |
|
|
250 | (3) |
|
|
253 | (4) |
|
12.3 The Kony 2012 Phenomenon |
|
|
257 | (4) |
|
12.4 Reactions to Kony 2012 |
|
|
261 | (1) |
|
12.5 SOPA/PIPA Blackout Day |
|
|
261 | (7) |
|
12.6 Reactions to SOPA/PIPA Blackout |
|
|
268 | (1) |
|
12.7 Battles over Internet Legislations - OPEN, ACTA, CISPA, and Net Neutrality |
|
|
269 | (1) |
|
12.8 Peace on Facebook, Facebook Donate, and Community Help |
|
|
270 | (2) |
|
12.9 Internet Activism and Occupy Democracy |
|
|
272 | (2) |
|
12.10 Transnational (Arab-Israeli) Facebook Nation |
|
|
274 | (1) |
|
12.11 Internet Censorship in Western Democracies |
|
|
275 | (4) |
|
12.12 Internet Censorship in China |
|
|
279 | (1) |
|
12.13 Arab Spring Uprisings, Egypt, Syria, Sandi Arabia, Turkey, and Myanmar |
|
|
280 | (1) |
|
12.14 The Rise of Facebook Nation |
|
|
281 | (2) |
|
12.15 Electoral College, Social Network Constitution, and Cyber Civil Rights |
|
|
283 | (4) |
|
|
287 | (12) |
|
13 A Multi-Criteria Approach to Analysing E-Democracy Support Systems |
|
|
299 | (30) |
|
|
299 | (2) |
|
13.2 e-Democracy and Tool Support |
|
|
301 | (2) |
|
13.3 Relevant Features of Tools for e-Democracy |
|
|
303 | (5) |
|
|
308 | (2) |
|
13.5 Categorising E-democracy Tools |
|
|
310 | (6) |
|
13.6 Some Examples of Components of the Positioning Criteria |
|
|
316 | (1) |
|
13.7 Analysis of BottenAda, Twitter, Ushahidi, and Facebook |
|
|
317 | (5) |
|
13.8 Concluding Remarks and Discussion |
|
|
322 | (3) |
|
|
325 | (4) |
|
14 A Ranking Model for Citizen Engagement in a Smart City |
|
|
329 | (46) |
|
|
329 | (1) |
|
14.2 Problem, Hypothesis, and Methodology |
|
|
329 | (3) |
|
14.3 Descriptive Statistics: Distribution and Relationships |
|
|
332 | (9) |
|
14.4 Correlation Between Variables |
|
|
341 | (6) |
|
14.5 Hypothesis Validation |
|
|
347 | (8) |
|
14.6 Machine Learning: Classifying Models |
|
|
355 | (9) |
|
14.7 Statistical Inferences: Generalizing the Ranking Model |
|
|
364 | (5) |
|
|
369 | (6) |
Part V Total Information Awareness in Facebook Nation |
|
|
15 Generation C in the Age of Big Data |
|
|
375 | (10) |
|
15.1 Digital Omnivores and Generation C |
|
|
375 | (3) |
|
15.2 Big Data Research and Development Initiative |
|
|
378 | (1) |
|
15.3 Big Data in Public Health and Economics |
|
|
379 | (1) |
|
15.4 Big Data in Facebook and Google |
|
|
380 | (1) |
|
|
381 | (4) |
|
16 Living in Facebook Nation |
|
|
385 | (42) |
|
16.1 Facebook's Impact on Children and Democracy |
|
|
386 | (1) |
|
16.2 Digital Personalities and Identities |
|
|
386 | (2) |
|
16.3 Intertwining Lives, Online and Offline |
|
|
388 | (4) |
|
16.4 Digital Footprint and Exhaust Data |
|
|
392 | (2) |
|
16.5 Facebook, Peer Pressure, and Social Issues |
|
|
394 | (2) |
|
16.6 Reality TV and Social Media |
|
|
396 | (2) |
|
16.7 YouTube: The Beast with a Billion Eyes |
|
|
398 | (1) |
|
16.8 Am I Pretty or Ugly? |
|
|
399 | (2) |
|
16.9 Social Media Regrets |
|
|
401 | (2) |
|
16.10 Facebook Social Plug-in: Like |
|
|
403 | (1) |
|
16.11 Facebook Knows Who, When, and Where |
|
|
404 | (1) |
|
16.12 Online Births and Deaths in Facebook Nation |
|
|
405 | (2) |
|
16.13 Memorialization on Facebook and Life after Death on Social Networks |
|
|
407 | (1) |
|
16.14 The Facebook Cleanse or Face-to-Facebook |
|
|
408 | (1) |
|
16.15 The Rise of Alternative Social Media Platforms: Fortnite and Gab |
|
|
409 | (1) |
|
16.16 Connected Cars: In-vehicle Social Networks and eXpressive Internet Architecture |
|
|
410 | (1) |
|
16.17 Connected Home, Internet of Things, and Internet of Me |
|
|
411 | (1) |
|
16.18 Internet Addiction and Digital Detox |
|
|
412 | (3) |
|
|
415 | (12) |
|
17 Personal Privacy and Information Management |
|
|
427 | (30) |
|
17.1 Personal Information for Sale |
|
|
427 | (2) |
|
17.2 Personal Information at Risk |
|
|
429 | (4) |
|
17.3 Identity Theft Prevention |
|
|
433 | (1) |
|
|
434 | (3) |
|
17.5 Password Security Questions |
|
|
437 | (1) |
|
|
437 | (2) |
|
|
439 | (2) |
|
|
441 | (2) |
|
17.9 Privacy on Smartphones |
|
|
443 | (3) |
|
17.10 Data Vault - Data is the New Oil |
|
|
446 | (1) |
|
17.11 Personal Analytics and Social Networks |
|
|
447 | (1) |
|
17.12 Community Analytics and Social Networks |
|
|
448 | (1) |
|
|
449 | (8) |
|
18 Total Information Awareness in Society |
|
|
457 | (58) |
|
18.1 U.S. Capitol Riot - Free Speech vs. True Threats on Social Media |
|
|
458 | (6) |
|
18.2 Humanity's Dashboard in Big Data |
|
|
464 | (2) |
|
18.3 Ambient Awareness in Suicide Prevention |
|
|
466 | (2) |
|
18.4 Parental Awareness in School Bullying and Cyberbullying |
|
|
468 | (5) |
|
18.5 Student Awareness in School Safety |
|
|
473 | (5) |
|
18.6 Crime Awareness in Video Surveillance |
|
|
478 | (3) |
|
18.7 Community Awareness in Neighborhood Watch |
|
|
481 | (3) |
|
18.8 Situational Awareness in Traffic Safety |
|
|
484 | (2) |
|
18.9 Location Awareness in Personal Safety |
|
|
486 | (1) |
|
18.10 Information Awareness in Law Enforcement |
|
|
487 | (4) |
|
18.11 Self-Awareness in Online Dating |
|
|
491 | (6) |
|
18.12 Pandora's Box of Total Information Awareness |
|
|
497 | (2) |
|
|
499 | (16) |
Part VI Epilogue |
|
|
19 From Total Information Awareness to 1984 |
|
|
515 | (20) |
|
19.1 From Carrier Pigeons to Brave New World of Total Information Awareness |
|
|
516 | (3) |
|
19.2 George Orwell's 1984 |
|
|
519 | (3) |
|
19.3 Aldous Huxley's Brave New World |
|
|
522 | (1) |
|
19.4 Point of No Return and Internet.org: "Every one of us. Everywhere. Connected." |
|
|
523 | (1) |
|
19.5 Privacy and E-Activism: Mesh Networks and Peer-to-Peer Social Networks |
|
|
524 | (1) |
|
19.6 Facebook Questions and a Google a Day |
|
|
525 | (1) |
|
19.7 Two-Way Street of Total Information Awareness and Metaverse |
|
|
526 | (2) |
|
|
528 | (7) |
Index |
|
535 | |