In addition, Canada called for Facebook to develop technology that would give developers access only to the user information required for an app to work properly.
At the same privacy forum, Stanford graduate student Jonathan Mayer presented a new study that examined 250 websites to see which ones were leaking user information to third parties.
FORBES: A New Term For Cookies and Online Trackers: The 'Cyberazzi'
The social network said in a blog post Friday afternoon that approximately 250, 000 user accounts were potentially compromised, with attackers gaining access to information including user names and email addresses.
In order to choose a relevant deal for the user at the correct time, location information would need to be collected about the user before noon, even if the Groupon mobile application is not running on the device at that time.
FORBES: Groupon Explains Why It Wants To Constantly Track Customers' Whereabouts
In a distributed network, however, the central server is removed, and the user account passes information directly to another user who requests it.
FORBES: Rethinking The Social Network: 3 Open-Source Alternatives To Facebook
Twitter initially had refused to disclose the user's personal information to police investigating the threats, but identified the individual after being served with a subpoena.
Following an investigation by the Canadian Privacy Commissioner, Facebook in June limited applications to accessing only the public parts of a user's profile, unless the user grants additional permission. (Canadian officials later expressed satisfaction with Facebook's steps.) Previously, applications could tap any data the user had access to, including detailed profiles and information about a user's friends.
WSJ: Facebook in Online Privacy Breach; Applications Transmitting Identifying Information
By placing a tracking cookie on a user's computer, an advertising network can collect information about the user's web-browsing activities and use that information to serve online ads targeted to the user's interests or for other purposes.
The external drive connects directly to the desired display via USB cable and the user is able to access information stored on a CD or DVD without a PC.
ENGADGET: Plextor's new external DVD burner works with TVs, no computer required
Passport logs just a user name and password but can be extended, if a user chooses, to add lots more information.
Apps provide fuller, richer experiences that provide more relevant content than a typical Web page, which is not optimized for mobile consumption and often needs further navigation to provide the right information to the user.
FORBES: To Take Web Search Mobile, Focus On The User Experience
It's unclear how many, if any, of those cases involved passing user information to marketing companies.
WSJ: Facebook in Online Privacy Breach; Applications Transmitting Identifying Information
Rather, it would also communicate to the user information useful in decision-making, about not just usage, but market prices, and grid conditions as well.
FORBES: The Economist: Innovation Almost Dead. Perhaps Not So In Electricity
Last week, the internet giant put forth a poll asking users to vote on new privacy controls lowering the bar to accessing user profile information.
FORBES: FTC Scolds Children's App Makers Over Privacy Issues: A Privacy Expert Responds
One of the biggest indictments in the complaint is the allegation that Facebook disclosed user information to advertisers despite consistent claims that it never did so.
It is a system that relies on cookies to track user information and behavior, a technology that is not available within apps in iOS or Android.
Calo dings the social networking site for not allowing the user to customize what information app developers can see on their profile when they download an app.
FORBES: Facebook Fails Stanford's Privacy Test, Twitter And iPhone Pass
In a smart bit of timing, Twitter on Monday released its first Twitter Transparency Report, detailing requests from governments around the world to get user information or suppress tweets during the first half of 2012.
In searching for mobile solutions that will boost productivity, businesses should be looking for native apps that instantly respond to a user requests for information, and leverage the unique features and functionality of mobile phones and tablets.
FORBES: What Enterprise Software Firms Can Learn From Angry Birds
"While removing search results is inconsistent with Google's mission, providing no information (or a heavily degraded user experience that amounts to no information) is more inconsistent with our mission, " the company said in a statement.
Consumers are drawn to the mobile Internet because it can be highly contextual and leverages information such as geo-location, presence, and user-specific information to deliver a rich and intensely personal experience.
FORBES: Does The Mobile Internet Mean The Death Of User Privacy?
Like Facebook before it, Twitter was wise to build a dedicated user base before starting to sell its users information.
These applications are deeply connected across the ecosystem to bring together a complete and contextual set of information to the user to enable them to make empowered decisions, and can be delivered from the most suitable location for the business, whether that be traditional on-premises, hosted in a partner or delivered through a cloud service.
FORBES: Consumerization of Enterprise: Are You Ready? We Are.
The Android-based system also offers access to thousands of useful and entertaining apps to keep the user up-to-date on the important information of the day, their social networks, and more.
Its most popular blogs are, not surprisingly, on technology subjects, but also on real estate--making the user information valuable to multiple advertisers.
Queries refer to the user requests for travel information that Kayak processes.
FORBES: Kayak Starts On Its Journey As A Public Company With A Strong Q2 2012
Ashkan Soltani, an independent privacy and security researcher, said such a move would give attackers "a toehold" in Twitter's internal network, potentially allowing them either to sniff out user information as it traveled across the company's system or break into specific areas, such as the authentication servers that process users' passwords.
For sensitive data such as telephone numbers, postal and e-mail addresses, social security numbers or financial data, a site would have to explicitly request a user's permission to track and store the information.
These devices are expected to gather and transmit information automatically without the user having to do anything and to be more practical than phones or computers in some situations.
The coding also has a role in some Facebook games and "apps" particularly if the app wants to store a user's login information or game scores.
WSJ: Google Tracked iPhones, Bypassing Apple Browser Privacy Settings
应用推荐