Sources

External Links:
 * 1) https://www.fastcompany.com/40407424/smartphone-apps-are-tracking-you-and-heres-how-to-monitor-what-they-know
 * 2) https://www.networkworld.com/article/3068627/security/smartphone-tracking-apps-raise-security-privacy-and-legality-questions.html
 * 3) http://money.cnn.com/2018/03/24/technology/facebook-data/index.html
 * 4) https://www.theguardian.com/news/2018/mar/26/the-cambridge-analytica-files-the-story-so-far
 * 5) http://time.com/money/5210825/facebook-data-breach-experts/
 * 6) https://myshadow.org/location-tracking
 * 7) https://www.wired.com/2015/04/location/
 * 8) https://en.wikipedia.org/wiki/Identity_theft
 * 9) https://www.nerdwallet.com/blog/banking/two-factor-authentication-protects-online-info/
 * 10) https://www.cnet.com/news/two-factor-authentication-what-you-need-to-know-faq/
 * 11) https://www.druva.com/blog/a-deep-dive-into-data-privacy-its-not-just-big-companies-folks/
 * 12) https://www.techrepublic.com/article/6-big-data-privacy-practices-every-company-should-adopt-in-2018/
 * 13) https://www.computerhope.com/jargon/i/incognito.htm
 * 14) https://en.wikipedia.org/wiki/Facebook
 * 15) https://www.washingtonpost.com/news/the-switch/wp/2015/06/11/facial-recognition-technology-is-everywhere-it-may-not-be-legal/?utm_term=.eb8e6df3a2e3
 * 16) https://www.thedailybeast.com/how-facebook-fights-to-stop-laws-on-facial-recognition
 * 17) https://www.investopedia.com/terms/l/laissezfaire.asphttps://www.investopedia.com/terms/l/laissezfaire.asp
 * 18) http://www.identityone.net/BiometricTechnology.aspx
 * 19) https://www.originlab.com/doc/Tutorials/STFT
 * 20) https://www.techopedia.com/definition/339/region-of-interest-roi
 * 21) https://www.cs.auckland.ac.nz/courses/compsci773s1c/lectures/ImageProcessing-html/topic4.htm
 * 22) http://mathworld.wolfram.com/Cosine.html
 * 23) https://www.bloomberg.com/research/stocks/private/snapshot.asp?privcapId=5546923
 * 24) https://www.businesswire.com/news/home/20060209005498/en/CryptoMetrics-Announces-Release-FingerSURE-7.0-Fingerprint-Biometric
 * 25) https://www.bayometric.com/importance-of-biometric-fingerprinting-technology/
 * 26) https://www.washingtonpost.com/business/technology/psych-colleges-teach-phishing-lesson-by-targeting-their-own/2018/04/09/8336f534-3c0f-11e8-955b-7d2e19b79966_story.html?noredirect=on&utm_term=.93fb32760b43
 * 27) https://www.microsoft.com/en-us/safety/online-privacy/phishing-symptoms.aspx
 * 28) https://technet.microsoft.com/en-us/library/gg195821(v=ocs.14).aspx
 * 29) http://www.trustedreviews.com/news/google-chrome-incognito-mode-3337991
 * 30) https://www.thrillist.com/entertainment/nation/what-is-incognito-mode-google-chrome
 * 31) https://www.stopbullying.gov/cyberbullying/what-is-it/index.html
 * 32) https://wiki.mozilla.org/Private_Browsing
 * 33) https://support.mozilla.org/en-US/kb/private-browsing-use-firefox-without-history
 * 34) https://www.lifewire.com/activate-inprivate-in-microsoft-edge-446308
 * 35) https://www.macrumors.com/how-to/safari-ios-11-private-browsing-delete-history/
 * 36) https://www.markmonitor.com/solutions/defend-your-brand/antipiracy-p2p-networks-on-demand-streaming
 * 37) https://www.techopedia.com/definition/18707/data-redundancy
 * 38) https://digitalguardian.com/blog/what-gdpr-general-data-protection-regulation-understanding-and-complying-gdpr-data-protection
 * 39) https://www.opera.com/computer/features/free-vpn
 * 40) https://en.wikipedia.org/wiki/Virtual_private_network

References:

Johnson, C. (2006, January). CryptoMetrics: security at your fingertips. Information Today, 23(1), 37. Retrieved from http://link.galegroup.com/apps/doc/A140703297/AONE?u=oswego&sid=AONE&xid=c480c7f0

Macaraeg, M. I. (2017). From Atoms to Bits: Personal Data Privacy and Security in the Information Society. Ateneo Law Journal, 62(1), 223-258.

Pfleeger, C. P., Pfleeger, S. L., & Margulies, J. (2015). Security in Computing. Harlow: Prentice Hall.

Sang, J., Wang, H., Qian, Q., Wu, H., & Chen, Y. (2018). An efficient fingerprint identification algorithm based on minutiae and invariant moment. Personal and Ubiquitous Computing, 22(1), 71-80. http://dx.doi.org/10.1007/s00779-017-1094-1 Retrieved from https://login.ezproxy.oswego.edu/login?url=https://search.proquest.com/docview/1993596366?accountid=13025

Shaw, J. (2012). FACEBOOK CONFIDENTIAL: The Privacy Implications of Facebook's Surreptitious and Exploitative Utilization of Facial Recognition Technology. Temple Journal Of Science, Technology & Environmental Law, 31(1), 149-175.

Zhou, R. (2008). Enable web-based tracking and guiding by integrating location-awareness with the world wide web. Campus - Wide Information Systems, 25(5), 311-328. http://dx.doi.org/10.1108/10650740810921466 Retrieved from https://login.ezproxy.oswego.edu/login?url=https://search.proquest.com/docview/218053218?accountid=13025