Kamis, 05 Juli 2018

Sponsored Links

Privacy Issues with Social Media - YouTube
src: i.ytimg.com

Since the arrival of early social networking sites in the early 2000s, the online social networking platform has grown exponentially, with the biggest names in social media in mid-2010 being Facebook, Instagram, Twitter, and SnapChat. The massive entry of personal information that has been available online and stored in the cloud has put the user's privacy at the forefront of discussions regarding the database's ability to keep such personal information safely. The extent to which users and administrators of social media platforms can access user profiles has become a new topic of ethical consideration, and the legality, awareness, and limits of subsequent privacy violations are important concerns in the advancement of technological times.

A social network is a social structure comprised of a group of social actors (such as individuals or organizations), series of diad bonds, and other social interactions among actors. Privacy issues with social networking services are part of data privacy, which involves the right to provide personal privacy regarding storage, resubmission, provision for third parties, and displaying information relating to oneself through the Internet. Social networking and privacy security issues result from the enormous amount of information that these websites process every day. Features that invite users to participate in - messages, invitations, photos, open platform apps, and other apps are often a place for others to gain access to users' personal information. In addition, the technology required to handle user information may compromise their privacy. More specifically, In the case of Facebook. Adrienne Felt, a Ph.D. candidate at Berkeley, made headlines last year when he exposed potentially destructive holes in the framework of the Facebook third-party application programming interface (API). This makes it easier for people to lose their privacy. Feel and his colleagues found that third-party platform apps on Facebook were provided with much more user information than needed. This potential privacy violation is actually built into Facebook's systematic framework. Unfortunately, the drawbacks make the system almost untenable. "The question for social networking is to resolve the distinction between errors in implementation and what the application platform design is meant to allow", says David Evans, Assistant Professor of Computer Science at the University of Virginia. In addition, there is also the question of who should be responsible for the lack of user privacy? According to Evan, the answer to this question is impossible to find, because a better regulated API would be needed for Facebook "to solve many applications, [especially when] many companies are trying to make money from [this]] app". Feel agreed with the conclusion, because "there is a marketing business built on the idea that third parties can gain access to user data and information on Facebook".

The advent of Web 2.0 has led to a social profile and a growing concern for internet privacy. Web 2.0 is a system that facilitates the sharing of participatory information and collaboration on the Internet, on social networking media sites like Facebook and MySpace. These social networking sites have seen a boom in their popularity beginning in the late 2000s. Through this website many people provide their personal information on the internet.

This social network tracks all the interactions used on their site and stores them for later use. The problem includes cyberstalking, location disclosure, social profiles, disclosure of third-party personal information, and use of government social network websites in an investigation without the protection of search warrants.


Video Privacy concerns with social networking services



Histori

Before social networking sites exploded over the past decade, there were previous forms of social networking technology that included: online multiplayer games, blog sites, newsgroups, mailing lists and dating services. They create the backbone for new modern sites. However, from the beginning there was a privacy issue. In 1996, a young woman in New York City was on a first date with an online acquaintance and was later charged with sexual harassment, after her date tried to play some of the sexual fantasies they had discussed online. This is just an early example of many of the upcoming issues regarding internet privacy.

In the past, social networking sites consisted mainly of the ability to chat with others in the chat room, which is much less popular than the current social network. People who use this site are seen as "techies" unlike users in the current era. One of the initial privacy cases is related to MySpace, because it "stalks minors, bullying, and privacy issues", which inevitably leads to the adoption of "age requirements and other security measures". This is very common in today's society for events like staking and "catfishing" going on.

According to Kelly Quinn, "the use of social media has become ubiquitous, with 73% of all US adults using current social networking sites and much higher usage rates among young adults and women." Social media sites have grown in popularity over the last decade, and they just keep growing. The majority of the population of the United States uses several types of social media sites.

Maps Privacy concerns with social networking services



Cause

There are several causes that contribute to privacy invasion across social networking platforms. It has been recognized that "by design, the mechanism of social media technology contests for control and access to personal information, as the sharing of user-generated content is central to their functionality." This proves that social networking companies need personal information to be public so that their sites can operate. They need people to share and connect with each other. This may not be so bad; However, most are only aware of privacy issues. Even with privacy settings, posts on the internet can still be shared with people outside of followers or user friends. One of the reasons is that "English law today is not able to protect those who share in social media from their information disseminated further than they want." Information always has an opportunity to spread online accidentally. Once there is something posted on the internet, it becomes public and is no longer private. Users can enable privacy settings for their accounts, but that does not guarantee that the information will not go beyond the intended audience. Pictures and posts can be saved and posts may never actually be deleted. "In 2013, the Pew Research Center found that 60% of teenage users on Facebook have a personal profile;" This proves that privacy is something that people still want to get.

A person's life becomes much more common because of social networking. Social media sites have enabled people to connect with more people than just with personal interactions. People can connect with users from around the world that they may never have a chance to meet in person. This can be a positive aspect; However, this also raises many concerns about privacy. Information can be posted about someone they do not want out. In the novel It's Complicated, the authors explain that some people "believe that the willingness to share in the public sphere - and, of course, any act of exhibitionism and publicity - is incompatible with the desire for personal privacy." Once there is something posted on the internet, it becomes accessible to many people and can even be shared outside only friends or followers that are assumed. Many companies are now looking at one's social media before hiring them for a job or position. Social media has become a tool that people use to find out information about a person's life. A person can learn a lot about someone based on what they post even before they meet in person. The ability to achieve privacy is a never-ending process. Boyd explains that "achieving privacy requires the ability to control social situations by navigating complex contextual cues, technical skills, and social dynamics." Society is constantly changing; therefore, the ability to understand the social situation to obtain regular privacy should be changed.

The various privacy levels offered

Social networking sites vary in the level of privacy offered. For some social networking sites like Facebook, provide real names and other personal information driven by the site (to a page known as 'Profile'). This information usually consists of date of birth, current address, and phone number (s). Some sites also allow users to provide more information about themselves such as interests, hobbies, books or favorite movies, and even relationship status. However, there are other social networking sites, such as Match.com, where most people would rather be anonymous. Thus, connecting users to their original identities can sometimes be rather difficult. Nevertheless, individuals can sometimes be identified by re-identification of faces. Studies have been conducted on two major social networking sites, and it was found that by overlapping 15% of similar photos, profile images with similar images on multiple sites can be matched to identify users.

Caring people

"According to research conducted by Boston Consulting Group, privacy of personal data is a major problem for 76 percent of global consumers and 83 percent of US consumers."

For sites that encourage the disclosure of information, it has been noted that most users have no trouble disclosing their personal information to a large group of people. In 2005, a study was conducted to analyze data from 540 Facebook profiles of students enrolled at Carnegie Mellon University. It was revealed that 89% of users gave their real names, and 61% gave their self-portraits for easier identification. Most users also do not change their privacy settings, allowing a large number of unknown users to have access to their personal information (default settings initially allow friends, friends of friends, and non-friends from the same network to have full view of user profiles ). It is possible for users to block other users from placing them on Facebook, but this should be done individually, and therefore, it seems not commonly used for a large number of people. Most users do not realize that although they can use the security features on Facebook, the default settings are restored after each update. All of this has caused a lot of concern that users are displaying too much information on social networking sites that may have serious implications on their privacy. Facebook was criticized for its perceived weaknesses regarding privacy in default settings for users.

The "Paradox Privacy" is a phenomenon that occurs when individuals, stating that they have concerns about their online privacy, take no action to secure their account. Additionally, while individuals may take additional security measures for other online accounts, such as those related to banking or finance, this does not extend to social media accounts. Some of these basic or simple security measures include deleting cookies, browser history, or checking one's computer for spyware. Some may attribute this lack of action to "third-person bias". This happens when people are aware of the risks, but then do not believe that these risks apply or relate to them as individuals. Another explanation is a simple risk reward analysis. Individuals may want to risk their privacy to get rewarded from being active in social media. Often, the risk of being exploited for personal information shared on the internet is overshadowed by exclusively sharing personal information that supports the appeal of social media users.

In a study by Van der Velden and El Emam, the teens were described as "active users of social media, who seem to care about privacy, but who also reveal a large amount of personal information." This raises the issue of what should be personally managed on social media, and is an example of the Privacy Paradox. This study in particular sees adolescents with mental illness and how they interact in social media. The researchers found that "it is a place where teenage patients stay up-to-date about their social lives - it's not seen as a place to discuss their diagnosis and treatment." Therefore, social media is a forum that requires self-protection and privacy. Privacy should be a major concern, especially for teenagers who may not be fully informed of the importance and consequences of public versus personal use. For example, "the difference between the privacy concerns mentioned and the disclosure of personal information."

Awareness of users on social networking sites

Users are often targeted as well as sources of information on social networks. Users leave a digital trail as they browse social networking sites or services. It has been identified from several online studies conducted that users trust websites and social networking sites. According to the credentials referred to, "trust is defined in (Mayer, Davis, and Schoorman, 1995) as" the willingness of a party to be vulnerable to the actions of others based on the expectation that the other party will take certain important actions for the trustor , regardless of the ability to monitor or control other parties "(p.712)". A survey conducted by Carnegie Mellon University, the majority of users provide their city of life, phone numbers among other personal information, while users are clearly unaware of the consequences of sharing certain information. Adding to this insight, social networking users come from different cities, remote villages, cities, cultures, traditions, religions, backgrounds, economic classes, educational backgrounds, time zones and so on which highlight significant awareness gaps.

The results of the survey of this paper show, "These results suggest that the interaction of trust and privacy concerns on social networking sites has not been grasped to a level sufficient to allow for accurate modeling of behavior and activity.The results encourage further research in an effort to understand the development of relationships in the environment social online and the reasons for differences in behavior on different sites. "

As per the reference, a survey conducted among social networking users at Carnegie Mellon University is indicative of the following due to a lack of user awareness:
1) People ignore the risks of privacy because of the trust in privacy and protection offered on social networking sites 2) Availability of user's personal details to third party tools/apps 3) The API and the Framework also allow any user, who has enough knowledge to extract user data 4) Cross-site fraud and other possible website threats.

Therefore there is an urgent need to raise User awareness quickly, to address the increasing security and privacy concerns caused by the user's ignorance. Social networking sites themselves can take responsibility and make the awareness possible by means of participatory methods with virtual online means.

Data access method

There are several ways for third parties to access user information. Flickr is an example of a social media website that provides geotagged photos that allow users to see the exact location where someone is visiting or staying. Photographs with geotags make it easy for third-party users to see where a person is or is traveling.

Share with third parties

Almost all the most popular apps on Facebook - including Farmville, Causes, and Planet Quiz - have shared user information with ads and tracking companies. Although Facebook's privacy policy says they can provide "one of the personally identifiable attributes we collect" with advertisers, they are in violation of this policy. If a user clicks on a particular advertisement on a page, Facebook will send this page's address to the advertiser, which will lead directly to the profile page. In this case, it is easy to identify the username. For example, Take With Me Learning is an application that allows teachers and students to keep track of their academic processes. This app requires personal information that includes, the name of the school, username, email, and age. But Take With Me Learning is made by a company known for illegally collecting personal information of students without their knowledge and selling it to advertising companies. The company has violated the Children's Online Privacy Protection Act (COPPA), which is used to keep children safe from identity theft while using the internet. Recently, Facebook has been researched for user data collection by cambridge analytica. Cambridge Analytica collected data from Facebook users after they agreed to take a psychological questionnaire. Not only can cambridge analytica access the data of people who follow the survey, they can also access all the data of Facebook friends of that person. This data is then used to easily shake people's beliefs in the hope that they will choose a particular politician. While what cambridge analytica does by collecting data may or may not be illegal, they then transfer the data they get to a third party so that it can be used to influence voters.

API

The application programming interface (API) is a set of routines, protocols, and tools for building software applications. By using query language, sharing of content and data between communities and apps becomes easier. The API simplifies all of them by restricting outside program access to a specific set of features - quite often, requests for data of one type or another. APIs clearly define exactly how a program will interact with the rest of the software world - saving time.

API allows software to "talk to other software." In addition, the API may collect and provide information that is not publicly accessible. This is especially interesting for researchers as more research possibilities are possible. The use of APIs for data collection can be the focal point of a privacy conversation, because while data may be anonymous, the difficulty is understanding when it becomes a privacy violation. Personal information can be collected en masse, but the debate over whether a personal privacy violation is due to the inability to match this information with certain people.

But there are some concerns with the API because of a recent scandal between Facebook and its political consulting firm, Cambridge Analytica. What happens is "Facebook allows third-party developers to create apps solely for the purpose of collecting data, and developers can take advantage of loopholes to gather information about not only people using apps but also all their friends - without them knowing."

Search engine

Search engines are an easy way to find information without scanning each of your own sites. Keywords typed into the search box will lead to results. So it's important to make sure that the keywords are typed correctly and correctly. There are many such search engines, some of which may lead users to fake sites that may be personally infected or full of viruses. Furthermore, some search engines, such as DuckDuckGo, will not violate user privacy.

Location Data

In most social media sites, the user's geographical location may be collected both by the user (via voluntary check-in apps like Foursquare and Facebook Places) or by apps (via technologies such as IP address geolocation, cellphone triangulation, RFID and GPS). The approach used is less than the result that the resulting content is combined with the geographical location in which the user is producing it. In addition, many apps attach content from other forms of information such as OS language, device type and retrieval time. The result is that by posting, tweeting or taking pictures, the user generates and shares a large amount of personal information.

Benefit from data

This accessible data along with data mining technology, user information can be used in various ways to improve customer service.

According to what you retweet, what you like and hashtags, Twitter can recommend some topics and ads. Twitter's suggestion for who to follow is done by this recommendation system. Commerce, such as Amazon, utilizes user information to recommend items to users. Recommendations are based on at least previous purchases, shopping carts, and wish lists. Affinity analysis is a data mining technique used to understand customer buying behavior.

By using machine learning methods, whether a user is a potential Starbucks potential follower. In this case, it is possible to improve the quality and scope of the application. In addition, user profiles can be used to identify similar users.

More than 1,000 companies are queuing to gain access to millions of tweets from users using popular social networking websites. Companies believe that by using data mining technology they will be able to gather important information that can be used for marketing and advertising.

According to Gary Kovacs's speech about Tracking our online tracker, when he used the internet to find the answer to the question, "We did not even 2 bites into breakfast and there were already almost 25 sites that tracked me", and he was navigated by 4 of them.

Why Government Use of Social Media Monitoring Software Is a Direct ...
src: www.aclu.org


Privacy issues

Research has shown that people's right to believe in privacy is the most important predictor of their attitudes about online privacy.

Social profile creation and third party disclosure

Privacy Act of 1974 states:

"No agency shall disclose any recordings contained in the system of records by any means of communication to any person, or to any other agency, except on the basis of a written request by, or with the prior written consent of, associated with the record [subject to 12 exceptions]. "5 ASC Ã,§ 552a (b).

Disclosure in this context refers to any means of communication, whether written, oral, electronic or mechanical. It states that agencies are prohibited to grant, or disclose, individual information without being given consent by individuals to release such information. However, it falls on the individual to prove that wrong disclosure, or public disclosure, has occurred. Because these social networking sites like Facebook ask for permission when third-party applications ask for user information.

Although the Privacy Act of 1974 does much to limit the invasion of privacy through third-party disclosures, it performs a list of a series of twelve exceptions that allow permitted disclosure:

1. For members of agencies who need such information "in the performance of their duties".
2. If the Freedom of Information Act requires such information
3. If the disclosed information "is compatible with the purpose of collection".
4. If the Census Bureau needs that information to complete a particular census.
5. If a third party explicitly notifies the individual that the information collected will only serve as a form of "statistical research" and not "individually identifiable".
6. If it is historically relevant to be added to the National Archive and Archive Administration.
7. If such information is requested by law enforcement agencies.
8. If the information is considered beneficial to "one's health or safety".
9. If such information is requested by the House of Congress or by any of its subcommittees.
10. If such information is requested by the head of the Government Accountability Office or by one of its "authorized representatives".
11. If the information is requested through a court order.
12. If such information is requested through the Debt Collection Act.

Social profiles enable Facebook and other social networking sites to filter through ads, specify which ones are specific for certain age groups, gender groups, and even ethnicities.

Data aggregation sites like Spokeo have highlighted the feasibility of incorporating social data across social sites as well as integrating it with public records. A 2011 study highlights this issue by measuring the number of unintentional information leaks on a large number of users with varying amounts of social networks. It identifies and measures information that can be used in an attack on what security you know.

Studies also show that most social networks do not intentionally provide third-party advertising and tracking sites with personal information. This raises the issue of personal information that was accidentally sent to a third-party ad site through a string or a Steering cookie.

Civil libertarians fear that social networking sites, especially Facebook, have greatly reduced the confidentiality of users in various ways. For one thing, when social media platforms store personal data, they also have complete access to the material as well. To maintain their profitability, apps like Facebook check and market personal information by recording data through cookies, small files that store data on a person's device. Companies, like Facebook, carry large amounts of users' personal information in the files, about individuals, "likes, dislikes, and preferences," which are highly valuable to marketers. Because Facebook discloses user information to advertising and marketing organizations, personal support will appear in news feeds based on "surfing behavior, hobbies, or pop culture preferences". For that reason, Facebook critics fear that social networking companies can seek business ventures with shareholders by sharing user information in exchange of profits. In addition, they argue that since Facebook shows the illusion of privacy presented by the "for-friend-only" platform type, individuals find themselves more likely to display more personal information online. According to critics, users may notice that sponsors and advertisements are tailored to their disclosed personal data, which can lead to a sense of betrayal.

Company

On Facebook, there is one way to ensure protection against apps that share personal information. On the privacy settings page, you can remove or kill unwanted apps or spam.

Twitter has admitted that they have scanned and imported their users' phone contacts into the website database so that they can learn more about their users. Most users do not realize that Twitter is made this way for new users to find their friends. Twitter has stated that they will have their privacy guidelines illustrated more clearly in the future.

By 2015, after Facebook buys Instagram, there is an option that Instagram can use its own user photos for advertising purposes. This new policy is hidden in their user agreement. Users can opt out but the only way is to delete their account before a certain time limit. Hiding this in their user agreement privacy agreement, they can cheat many people who do not understand what to look for. This is disclosure of information to third parties because Instagram releases our information to others.

Institutional

A number of agencies have expressed concern over the lack of privacy given to users on social networking sites. This includes schools, libraries, and Government agencies.

Library

The library in particular, concerned with individual privacy, has been debating about allowing library visitors to access social networking sites on public library computers. While only 19% of reported librarians express real concerns over the privacy of social networking, they are very vocal in voicing their concerns. Some people argue that the lack of privacy found on social networking sites goes against the ethics supported by the Library organization, and the latter should therefore be very worried about dealing with the former. Proponents of this view present their argument from the code of ethics held by the American Library Association and the UK Chartered Institute of Library and Information Professionals, which affirms the commitment to upholding privacy as a fundamental right. In 2008, a study was conducted at fourteen public libraries in the UK that found that 50% blocked access to social networking sites. Many school libraries also block Facebook for fear that children may reveal too much information on Facebook. However, in 2011, Facebook has taken efforts to combat these concerns by removing user profiles under the age of thirteen.

18 Google Products That Are Now Defunct | Inc.com
src: static3.businessinsider.com


Potential danger

Identity theft

Because there is so much information provided, other things can be inferred, such as the person's social security number, which can then be used as part of identity theft. In 2009, researchers at Carnegie Mellon University published a study showing that it is possible to predict most and sometimes all 9-digit Social Security numbers of individuals using information gathered from social networks and online databases. (See Predicting Social Security Numbers from Public Data by Acquisti and Gross). In response, various groups have suggested that users do not display their numbers, or hide them from Facebook 'friends' whom they themselves do not know. Cases also arise from users who have photos stolen from social networking sites to help identity theft. There is little evidence that users of social networking sites take full action to protect themselves from identity theft. For example, many celebrities claim their Twitter account has been hacked. According to Huffington Post, Bulgarian IT consultant Bogomil Shopov claims in a recent blog that has purchased personal information on more than 1 million Facebook users, at a very low price of USD $ 5.00. The reported data includes the user's full name, email address, and a link to their Facebook page. The following information can be used to steal user identity: Full name including middle name, birth date, city of birth, relationship status, residence information, hobbies and other interests.

Pre-teen and early teens

Among all other age groups, in general, the most vulnerable victims of the behavior of sharing personal information are preteen and early adolescence. There are age restrictions that are incorporated into many websites but how effective it is still debatable. The findings have revealed that informative opportunities regarding internet privacy as well as concerns from parents, teachers, and peers, play an important role in influencing internet user behavior in terms of online privacy. In addition, other studies have also found that increasing adolescent awareness of their privacy will also lead to a greater likelihood that they will use privacy-protecting behavior. In a technological culture developed by society, not just the awareness of teenagers and parents are increasing, but society as a whole must recognize the importance of online privacy.

Pre-teenagers and early adolescents are particularly vulnerable to social pressures that encourage young people to disclose personal data while posting online. Teenagers often post information about their personal lives, such as the activities they do, share their current location, with whom they spend time together, as well as their thoughts and opinions. They tend to share this information because they do not want to feel abandoned or judged by other teenagers who practice this sharing activity. Teenagers are motivated to stay up to date with the latest gossip, current trends, and trending news, and thereby allow themselves to become victims of cyberbullying, stalking, and in the future, potentially jeopardizing them when pursuing job opportunities, and in context privacy, are more likely to share their personal information with the public. This is a concern because preteens and teenagers are the least educated on how public social media, how to protect themselves online, and the adverse consequences that can come from sharing too much personal information online. As more and more young individuals join social media sites, they believe that it is acceptable to post whatever they think, since they are unaware of the potential dangers that information can make to them and how they sacrifice their own privacy. "Teens share more information about themselves on social media sites than ever before." Preteens and teenagers share information on social media sites like Facebook, Snapchat, Instagram, Twitter, Pinterest, and others by posting pictures and videos of themselves without being aware of the privacy they sacrifice. Teens post their real names, birthdays, and email addresses to their social media profiles. Children have less mobility than they had in the past. Everything that online teenagers do so that they can remain in the circle of social opportunities, and the concern with this is that they do this in a way that is not only traceable but in a very persistent environment that motivates people to continue to share information about themselves themselves. as well.

California is also taking steps to protect the privacy of some social media users from the user's own judgment. In 2013, California enacted a law that would require social media sites to allow young registered users to remove their own comments from the site. This is the first step in the United States toward the "right to be forgotten" that has been debated around the world over the past decade.

Sexual predators

Most social networking sites are committed to ensuring that the use of their services is as safe as possible. However, due to the high content of personal information placed on social networking sites, as well as the ability to hide behind fake identities, the site has become increasingly popular for online [sexual] predators. Furthermore, the lack of age verification mechanism is a cause of concern in this social networking platform. However, it also suggests that most of these are only moved to use services provided by Facebook. While the numbers may remain small, it has been noted that the number of sexual predators caught using social networking sites has increased, and has now reached almost every week. In the worst case children become victims of pedophiles or are lured to meet strangers. They say that sexual predators can lurk anonymously through wormholes in cyberspace and access victims' profiles online. A number of published cases have shown threats to users, such as Peter Chapman who, with a fake name, added more than 3,000 friends and continues to rap and kill a 17-year-old girl in 2009. In another case, a 12-year-old girl, Evergreen was found safely by the FBI with the help of Facebook, as her mother learned her daughter's conversation with a man she met in popular social networking apps.

Stalking

The potential ability to track users on social networking sites has been recorded and shared. Popular social networking sites make it easy to build friends and contact networks and share them with your photos, presence, contact information, and interests without ever getting a chance to actually meet them. With the amount of information that users posted about themselves online, it is easy for the user to become a victim lurking without realizing the risks. 63% of Facebook profiles are publicly visible, meaning that if you name someone Google and you add "Facebook" in the search bar you will pretty much see most people profiles. A study of Facebook profiles from students at Carnegie Mellon University revealed that about 800 profiles including current occupants and at least two classes are being studied, theoretically allowing viewers to know the exact location of the individual at a given time. AOL drew the controversy over its AIM instant messenger that allows users to add 'friends' without their knowledge, and therefore tracks when the user is online. Concern has also arisen over the relative ease for people to read personal messages or e-mail on social networking sites. Cyberstalking is a criminal offense committed under state anti-stalking laws, slander laws, and harassment. Cyberstalking beliefs may result in an arrest warrant, probation, or even criminal penalty against an assailant, including imprisonment.

Some apps explicitly center on "cyber stalking." An app called "Creepy" can track a person's location on a map using photos uploaded to Twitter or Flickr. When someone uploads photos to social networking sites, others can track their most recent locations. Some smartphones can embed latitude and latitude coordinates into photos and automatically send this information to the app. Anyone using an app can search for a specific person and then find their live location. This poses many potential threats to users who share their information with a large group of followers.

Facebook "Places," is a Facebook service, which publishes user location information to the network community. Users are allowed to "check in" at various locations including retail stores, department stores, and restaurants. In addition, users can create their own "place", which discloses personal information to the Internet. This location tracking form is automatic and must be turned off manually. Various settings must be turned off and manipulated in order for the user to ensure privacy. According to epic.org, Facebook users are recommended to: (1) disable "Friends can check me on Places," (2) adjust "My Places Check-In," (3) disable "People Here Now," and (4) ) uncheck "Places I've Visited.". In addition, the Federal Trade Commission has received two complaints related to Facebook's "unfair and deceptive" trading practices, which are used to target the online community advertising sector. "Place" tracks user location information and is used primarily for advertising purposes. Each tracked location allows third party advertisers to tailor ads that match one's interests. Currently, the Federal Trade Commissioner along with the Electronic Privacy Information Center highlights tracking issues of location data on social networking sites.

Unintentional fame

Unintentional fame can harm one's character, reputation, relationships, job opportunities, and privacy - ultimately violates one's right to pursue happiness. Many cases of unintentional fame have led their victims to take legal action. The right to be forgotten is a legal concept that includes the removal of one's information from a medium that was once made available to the public. The right to be forgotten is currently enforced in the EU and Argentina, and has been recognized in various cases in the United States, particularly in the case of Melvin v. Reid. However, there is controversy surrounding the right to be forgotten in the United States because it contradicts the public's right to know and the First Amendment of the Constitution, limiting the "right of freedom of speech and freedom of expression" (Amendment I).

The privacy issue has also been raised over a number of high-profile incidents that can be considered embarrassing to users. Various internet memes have started on social networking sites or have been used as a means to spread them on the internet. In 2002, a Canadian teenager became known as Star Wars Kid after a video he used the golf club as a light sword was posted on the internet without his consent. The video quickly became a hit, very embarrassing for the teenager, who claims to have suffered as a result. Along with other incidents of video posted on social networking sites, this highlights the ability for personal information to be transferred quickly between users.

Jobs

Problems related to privacy and work are of concern with social networking sites. As of 2008, it has been estimated by CareerBuilder.com that one in five companies are looking for social networking sites to filter out potential candidates (up from just 11% in 2006). For the majority of entrepreneurs, such an act is to obtain negative information about the candidate. For example, 41% of managers consider alcohol-related information and candidate drug use to be of primary concern. Other concerns investigated through social networking sites include poor communication skills, inappropriate photographs, inaccurate qualifications and poor ex-employers/co-workers. However, 24% of managers claim that information found on social networking sites persuade them to hire a candidate, suggesting that user images can be used in a positive way.

While there is little doubt that the company will continue to use social networking sites as a means of monitoring staff and screening potential candidates, it has been noted that such actions may be illegal under jurisdiction. According to Workforce.com, companies that use Facebook or Myspace have the potential to face legal action:

If prospective employers use social networking sites to check job candidates and then reject the person based on what they see, he or she can be charged with discrimination. On August 1, 2012, Illinois joined the state of Maryland (law passed in March 2012) in prohibiting employers access to social media websites from their employees and prospective employees. A number of other countries are also considering the prohibition laws (California, Delaware, Massachusetts, Michigan, Minnesota, Missouri, New Jersey, New York, Ohio, South Carolina and Washington), as well as the United States Congress. In April 2012, the Online Social Networking Protection Act (2012 HR 5050) was introduced in the United States House of Representatives, and the 2012 Password Protection Act (2012 S. 3074) was introduced in the United States Senate in May 2012, which prohibits employers from need access to their employee social media website.

With recent concerns about new technology, the United States is now developing laws and regulations to protect certain aspects of community information on different media. [CR4] For example, 12 US states currently have laws that specifically restrict employers from demanding access to their employee social media sites when the site is not fully publicly available. (The states that have passed this law are Arkansas, California, Colorado, Illinois, Maryland, Michigan, New Jersey, New Mexico, Nevada, Oregon, Utah, and Washington.)

Monitoring of social networking sites is not limited to potential workers. Problems related to privacy are an increasing concern for those currently employed. A number of high-profile cases have emerged where people are fired for posting comments on social networks that are considered disparaging to their current employers or fellow workers. In 2009, sixteen-year-old Kimberley Swann was fired from his position at Ivell Marketing and Logistics Limited after describing his work as 'boring'. In 2008, Virgin Atlantic fired thirteen cabin crew staff, after which it emerged they had criticized the company's security standards and called passengers 'chavs' on Facebook. There is no federal law that we know that an employer violates by monitoring employees on social networking sites. In fact, companies can even hire third-party companies to monitor online employee activity for them. According to an article by web service provider Read Compose, use the service to "ensure that employees do not divulge sensitive information on social networks or engage in any behavior that could damage a company's reputation." Although employers may have found the use of such social networking sites so convenient, complaints have been raised by civil liberties groups and trade unions on the invasive approach adopted by many entrepreneurs. In response to Kimberley Swann's case, Brendan Barber, of the TUC union states that:

Most employers will not dream of following their staff at the pub to see if they are making a sound about work to their friends, "he said. Just because stalking a private conversation is possible today, it does not make it healthy. "

Monitoring of staffing social networking activities is also an increasingly common method of ensuring that employees do not browse websites during business hours. It is estimated in 2010 that an average of two million employees spend more than an hour a day on social networking sites, at a potentially cost of Ã, Â £ 14 billion.

Online victimization

Social networks are designed for individuals to interact socially with others via the internet. However, some individuals engage in unwanted online social behavior, which negatively impacts the online experience of others. It has created a wide range of online interpersonal victims. Several studies have shown that victims of social networks mostly appear in teenagers and adolescents, and this type of victimization involves sexual advancement and abuse. Recent research has reported about 9% of online casualties involve social networking activity. It has been noted that many of these victims are girls who have been sexually abused on these social networking sites. Research concludes that many victims of social networks are associated with user behavior and interaction with each other. Negative social behaviors such as aggressive attitudes and discussing sex-related topics motivate offenders to achieve their goals. Overall, positive online social behavior is promoted to help reduce and avoid online casualties.

Supervision

While the concept of communicative networks around the world seems to follow the model of public space, market forces control access to such resources. In 2010, an investigation by The Wall Street Journal found that many of Facebook's most popular apps transmit identity information about their users and friends to advertisers and internet tracking companies, which is a violation of Facebook's privacy policy. The Wall Street Journal analyzes ten of the most popular Facebook applications, including Zynga's FarmVille with 57 million users, and Zynga's Mafia Wars with 21.9 million users, and found that they transmit Facebook user IDs to data aggregators. Every online step leaves a virtual footprint that quickly becomes a food for research without people being aware of it. Using social media for academic research speeds up and raises ethical concerns along the way, as the vast amount of information collected by private companies - including Google, Microsoft, Facebook and Twitter - provides new insights into all aspects of everyday life. Our "social media" audience is bigger than we know; our followers or friends are not the only ones who can see information about us. Social media sites collect data from us simply by looking for something like "favorite restaurant" in our search engine. Facebook is converted from public space into a behavioral laboratory, "said the study, citing a Harvard-based research project of 1,700 campus-based Facebook users where it became possible to" de-sync part of the data set, "or cross-reference anonymous data to make possible student identification. Some Facebook research on user behavior found that 71% of people compiled at least one post they never posted. Others analyzed 400,000 posts and found that children's communication with parents was reduced in frequency from age 13 but later rose when they move.

Law enforcement on the network

The FBI has dedicated secret agents on Facebook, Twitter, MySpace, LinkedIn. One example of an investigator who uses Facebook to catch criminals is the case of Maxi Sopo. Charged with bank fraud, and fled to Mexico, he could not be found until he started posting on Facebook. Although his profile is personal, his friends list is not, and through this vector, they end up catching him.

In recent years, several state and local law enforcement agencies have also begun relying on social media websites as resources. While obtaining records of information not shared publicly by or about site users often requires subpoena, public pages on sites like Facebook and MySpace offer access to personal information that may be useful for law enforcement. Police departments have reported using social media websites to assist in investigating, locating and tracking suspects, and monitoring gang activity.

On October 18, 2017, the Department of Homeland Security (DHS) is scheduled to begin using personal information collected using social media platforms to filter out immigrants arriving in the US. The Department makes this new measure known in posts to the Federal Register in September 2017, noting that "... social media handles, aliases, identifiable identity information and search results..." will be included in the immigration files of the applicants. This announcement, made relatively quiet, has received criticism from privacy advocates. The Department of Homeland Security issued a statement in late September 2017 stating that the plan to use social media is nothing new, with a department spokesman saying DHS has used social media to gather information for years. According to statements made for National Public Radio, DHS uses "... social media handling, aliases, related identity information, and search results" to keep the latest records of interested persons. According to DHS, a post to the Federal Register is an attempt to become transparent about information about social media that has been collected from immigrants.

The use of SMMS by the government or "Social media monitoring software can be used to track us geographically as we communicate This can map our relationships, networks and associations Can monitor protests, identify leaders of political and social movements, and measure our influence. " SMMS is also a thriving industry. SMMS "products like XI Social Discovery, Geofeedia, Dataminr, Dunami, and SocioSpyder (just a few names) are being bought in droves by Fortune 500 companies, politicians, law enforcement, federal agents, defense contractors and the military.Even the CIA has venture funds , In-Q-Tel, which invests in SMMS technology. "

Mob rules

The idea of ​​'mass rule' can be described as a situation where controls are held by those outside the conventional or legitimate realm. In response to the International News phone hacking scandal involving News of the World in the UK, a report was written to impose new media privacy regulations.

The English author of the Leveson Report on English press ethics, Lord Justice Leveson, has drawn attention to the need to take action to protect privacy on the internet. This movement is illustrated by Lord Justice Leveson as a global megaphone for gossip: "Not only is the danger of trial by Twitter, but also the unending punishment, and no prospect of rehabilitation, by Google".

Location Updates

Foursquare, Facebook, Loopt is an application that allows users to check in and this ability allows users to share their current location information to their connections. Some of them even update their travel plans on social networking applications. However, disclosure of location information within this network may cause privacy issues among mobile users. Foursquare defines another action framework for the user. It seems to interest Foursquare that the user gives a lot of personal data that is set as public. This is illustrated, inter alia, by the fact that, although all respondents wanted a high degree of control over privacy settings (location), almost none of them had ever checked Foursquare's privacy settings before. While there are algorithms that use encryption, k-anonymity, and noise editing algorithms, it's better to understand how location sharing works in this app to see if they have a good algorithm to protect location privacy.

Invasive privacy agreement

Another privacy issue with social networking is the privacy agreement. The privacy agreement states that social networks have all user-uploaded content. This includes images, videos, and messages all stored in a social networking database even if the user decides to terminate his account.

Privacy agreements often say that they can track user location and activity based on the device used for the site. For example, a privacy agreement for Facebook states that "all devices that someone uses to access Facebook are recorded like IP address, phone number, operating system, and even GPS location". One major concern about privacy agreements is the length, because they take a lot of time to fully read and understand. Most privacy agreements state the most important information at the end because it is assumed that people will not read them at all.

The ethical dilemma lies in the agreement to register the SNS, the disclosed personal information is legally accessible and is managed by websites of privately operated security operators and operating systems; leaving the user's data access to be "under the discretion" of the site operator (s). Provide the moral responsibility and responsibility of the site operator to keep the personal information in the user's control. However, due to the legality of outsourcing user data at the time of registration - without prior consideration, outsourcing data has been frequently visited by the SNS operating system - regardless of user privacy settings.

Data outsourcing has been shown to be consistently exploited since the advent of SNSs. Employers are often found to hire individuals or companies to search deep into the SNS user database to find "less favorable" information about applicants during the review process.

Educational Video - Privacy check-up at social media - YouTube
src: i.ytimg.com


Reading the privacy statement in terms and conditions

One of the main problems that people have with their security is the lack of visibility of policies and settings on social networks. Often located in hard-to-see areas such as the top left or right of the screen. Another concern is the lack of information users get from companies when there is a change in their policies. They always notify users about new updates, but it's hard to get information about these changes.

Most social networking sites require users to agree to the Terms of Use policy before they use their services. Controversially, this User Terms Declaration that users must approve often contains clauses that allow social network operators to store data on users, or even share them with third parties. Facebook has attracted attention to its policies regarding data storage, such as making it difficult to delete accounts, holding data after the account is disabled and captured sharing personal data with third parties.
This section describes how to read the privacy statement in terms and conditions when signing up for any social networking site.

What to look for in a privacy policy:

  1. Who has user posted data?
  2. What happens to data when a user's account is closed?
  3. How is the change in privacy policy noticed by the user?
  4. Location of an effective privacy policy
  5. Will the profile page be deleted completely when the user deletes the account?
  6. Where and how do users complain in case of a privacy violation?
  7. For how long is private information stored?

The answers to these questions will give an indication of how secure the social networking site is.

How to Manage Your Social Media Privacy Settings | Experian
src: www.experian.com


Main points for protecting the privacy of social networks

Be aware of ever-present threats

There are people out there who want - and will do anything - to get someone's personal information. It's important to realize that keeping your privacy is always safe at all times. Among other factors, it has been observed that data loss is positively correlated with risky online behavior and leaves the antivirus and anti spyware programs necessary to defend against infringement of personal information over the internet.

Always check all the time

Always logout. It's dangerous to keep your device active because others may have access to your social profile when you're not paying attention Save your full name and address yourself. Children's safety can be compromised if their parents post their presence on a site where others know who their true identity is. The majority of 93% of online users share personal information, 70% of online users share photos and videos of their own children, and 45% of online users share personal videos and photos of others besides themselves. Being thorough before posting online can create a safer Internet experience for children and adults.

Know the site

Read social networking site prints. Many sites encourage their users to agree on the best terms for the site - not users. Users should be aware of the provisions in an emergency. How to read the terms described above in the "Reading the Privacy Statement in Terms and Conditions" section Make sure social networking sites are safe before sharing information. Users may not share information if they do not know who is using the website because their personally identifiable information may be exposed to users of other sites.
Recognize the privacy protection provided. Users should spend extra time getting to know the privacy protection system of the various social networks they will or will use. Only friends can access their information. Check the privacy or security settings on every social networking site they may need to use.

Protect device

Device encryption. Users must use complex passwords on their computers and mobile phones and change them from time to time. This will protect the informa

Source of the article : Wikipedia

Comments
0 Comments