Hard problems, easy answers.
Almost all tested web applications (91%) store and process personal information. On average, each web application contained 33 vulnerabilities, of which 6 were severely affected. If testers have access to source code, the average number of high-severity vulnerabilities has more than doubled, according to our statistics.
The location of a mobile phone can be determined using the service provider's network infrastructure. The advantage of network-based techniques, from a service provider's point of view, is that they can be implemented non-intrusively without affecting handsets. Network-based techniques were developed many years prior to the widespread availability of GPS on handsets. (See US 5519760, issued 21 May 1996 for one of the first works relating to this.
Social network analysis has its theoretical roots in the work of early sociologists such as Georg Simmel and Émile Durkheim, who wrote about the importance of studying patterns of relationships that connect social actors. Social scientists have used the concept of "social networks" since early in the 20th century to connote complex sets of relationships between members of social systems at all scales, from interpersonal to international.