SlideShare a Scribd company logo
Social Media Marketing
  Sharing and User Privacy
“People have really gotten comfortable, not only sharing
more information and different kinds, but more openly and
with more people. The social norm is just something that
has evolved over time. We view it as our role… to
constantly be innovating and be updating what our system
is, to reflect what the current social norms are.”



                                 Mark Zuckerberg
                                       CEO, Facebook
In 2009…
In 2011…
Click on Facebook!
   A chance to win £1,000

   Must make profile public

   Allow Dr. Pepper to post embarrassing updates
    as you

Examples:

   Lost my special blankie. How will I go sleepies?

   Seriously, what’s wrong with peeing in the
    shower?

   …just used cardboard bit of the bog roll. Not
    nice.
And then, on the profile of a
     14 year old girl…
Watched 2 girls 1 cup last night... Felt
peckish afterwards.
Her mother was a blogger.
On the other hand…
Dr. Pepper…
 Did not control what was posted where
 Did not ensure content was appropriate


And more importantly…

 Relied on users to understand extent of sharing
 All without considering potential consequences of
  visibility!
Yellow…

 Provided benefit for privacy infringement
 Did not divulge status of “saddest friend”
 Private information was gathered and processed on
  prompt of friend
As Marketers…
 Consider privacy legislation
 Foresee sharing and viewing patterns
 Educate users on consequences for their privacy –
  don’t rely on social media providers to do so!

 Provide consumers with benefits in exchange for
  access to personal information
As marketers, how far can we push the
boundaries of what is private online, and under
what      circumstances,   without     appearing
disturbingly invasive?

More Related Content

Similar to Mktg4226 social media marketing sharing and user privacy

Journalism and society term 2 week 3
Journalism and society term 2 week 3Journalism and society term 2 week 3
Journalism and society term 2 week 3
Fatima B
 
Rethinking Information Literacy: Classroom Evidence for Incorporating Student...
Rethinking Information Literacy: Classroom Evidence for Incorporating Student...Rethinking Information Literacy: Classroom Evidence for Incorporating Student...
Rethinking Information Literacy: Classroom Evidence for Incorporating Student...
Donna Witek
 
Journalism and society term 2 week 3
Journalism and society term 2 week 3Journalism and society term 2 week 3
Journalism and society term 2 week 3
Fatima B
 
Final project
Final projectFinal project
Final project
kimcard
 
ESGUERRA_PT
ESGUERRA_PTESGUERRA_PT
Journalism and society term 2 week 3
Journalism and society term 2 week 3Journalism and society term 2 week 3
Journalism and society term 2 week 3
Fatima B
 
E B17 002 The Essential Guide To Social Media
E B17 002  The  Essential  Guide To  Social  MediaE B17 002  The  Essential  Guide To  Social  Media
E B17 002 The Essential Guide To Social Media
Agency for Basic Community Development
 
Information Literacy and Social Media: How Facebook is Changing Students’ At...
Information Literacy and Social Media: How Facebook is Changing Students’  At...Information Literacy and Social Media: How Facebook is Changing Students’  At...
Information Literacy and Social Media: How Facebook is Changing Students’ At...
Donna Witek
 
Essential Guide To Social Media
Essential Guide To Social MediaEssential Guide To Social Media
Essential Guide To Social Media
sonyapark
 
Opportunities and dilemmas of social media - Sunderlandfinalmh
Opportunities and dilemmas of social media - SunderlandfinalmhOpportunities and dilemmas of social media - Sunderlandfinalmh
Opportunities and dilemmas of social media - Sunderlandfinalmh
Mariann Hardey
 
Socialmedia from a psychological perspective
Socialmedia from a psychological perspectiveSocialmedia from a psychological perspective
Socialmedia from a psychological perspective
Mosskin Produktion
 
Process book
Process bookProcess book
Process book
LeonLiu57
 
The ins and outs of storytelling
The ins and outs of storytelling The ins and outs of storytelling
The ins and outs of storytelling
Alyson Landry
 
Media Literacy for Life Skills
Media Literacy for Life SkillsMedia Literacy for Life Skills
Media Literacy for Life Skills
Renee Hobbs
 
Digital Citizenship and Social Media
Digital Citizenship and Social MediaDigital Citizenship and Social Media
Digital Citizenship and Social Media
Patrick Woessner
 
Craigs List Boot Camp Presentation
Craigs List Boot Camp PresentationCraigs List Boot Camp Presentation
Craigs List Boot Camp Presentation
Beth Kanter
 
Social media for Busy People 1
Social media for Busy People 1Social media for Busy People 1
Social media for Busy People 1
Todd Felts
 
Social media night one
Social media night oneSocial media night one
Social media night one
Todd Felts
 
Hf Unbranded Deck Printable
Hf Unbranded Deck   PrintableHf Unbranded Deck   Printable
Hf Unbranded Deck Printable
sagerader
 
10 things that i learnt about
10 things that i learnt about10 things that i learnt about
10 things that i learnt about
Manish Parihar
 

Similar to Mktg4226 social media marketing sharing and user privacy (20)

Journalism and society term 2 week 3
Journalism and society term 2 week 3Journalism and society term 2 week 3
Journalism and society term 2 week 3
 
Rethinking Information Literacy: Classroom Evidence for Incorporating Student...
Rethinking Information Literacy: Classroom Evidence for Incorporating Student...Rethinking Information Literacy: Classroom Evidence for Incorporating Student...
Rethinking Information Literacy: Classroom Evidence for Incorporating Student...
 
Journalism and society term 2 week 3
Journalism and society term 2 week 3Journalism and society term 2 week 3
Journalism and society term 2 week 3
 
Final project
Final projectFinal project
Final project
 
ESGUERRA_PT
ESGUERRA_PTESGUERRA_PT
ESGUERRA_PT
 
Journalism and society term 2 week 3
Journalism and society term 2 week 3Journalism and society term 2 week 3
Journalism and society term 2 week 3
 
E B17 002 The Essential Guide To Social Media
E B17 002  The  Essential  Guide To  Social  MediaE B17 002  The  Essential  Guide To  Social  Media
E B17 002 The Essential Guide To Social Media
 
Information Literacy and Social Media: How Facebook is Changing Students’ At...
Information Literacy and Social Media: How Facebook is Changing Students’  At...Information Literacy and Social Media: How Facebook is Changing Students’  At...
Information Literacy and Social Media: How Facebook is Changing Students’ At...
 
Essential Guide To Social Media
Essential Guide To Social MediaEssential Guide To Social Media
Essential Guide To Social Media
 
Opportunities and dilemmas of social media - Sunderlandfinalmh
Opportunities and dilemmas of social media - SunderlandfinalmhOpportunities and dilemmas of social media - Sunderlandfinalmh
Opportunities and dilemmas of social media - Sunderlandfinalmh
 
Socialmedia from a psychological perspective
Socialmedia from a psychological perspectiveSocialmedia from a psychological perspective
Socialmedia from a psychological perspective
 
Process book
Process bookProcess book
Process book
 
The ins and outs of storytelling
The ins and outs of storytelling The ins and outs of storytelling
The ins and outs of storytelling
 
Media Literacy for Life Skills
Media Literacy for Life SkillsMedia Literacy for Life Skills
Media Literacy for Life Skills
 
Digital Citizenship and Social Media
Digital Citizenship and Social MediaDigital Citizenship and Social Media
Digital Citizenship and Social Media
 
Craigs List Boot Camp Presentation
Craigs List Boot Camp PresentationCraigs List Boot Camp Presentation
Craigs List Boot Camp Presentation
 
Social media for Busy People 1
Social media for Busy People 1Social media for Busy People 1
Social media for Busy People 1
 
Social media night one
Social media night oneSocial media night one
Social media night one
 
Hf Unbranded Deck Printable
Hf Unbranded Deck   PrintableHf Unbranded Deck   Printable
Hf Unbranded Deck Printable
 
10 things that i learnt about
10 things that i learnt about10 things that i learnt about
10 things that i learnt about
 

Recently uploaded

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

Mktg4226 social media marketing sharing and user privacy

  • 1. Social Media Marketing Sharing and User Privacy
  • 2.
  • 3. “People have really gotten comfortable, not only sharing more information and different kinds, but more openly and with more people. The social norm is just something that has evolved over time. We view it as our role… to constantly be innovating and be updating what our system is, to reflect what the current social norms are.” Mark Zuckerberg CEO, Facebook
  • 7. A chance to win £1,000  Must make profile public  Allow Dr. Pepper to post embarrassing updates as you Examples:  Lost my special blankie. How will I go sleepies?  Seriously, what’s wrong with peeing in the shower?  …just used cardboard bit of the bog roll. Not nice.
  • 8. And then, on the profile of a 14 year old girl…
  • 9. Watched 2 girls 1 cup last night... Felt peckish afterwards.
  • 10. Her mother was a blogger.
  • 11. On the other hand…
  • 12. Dr. Pepper…  Did not control what was posted where  Did not ensure content was appropriate And more importantly…  Relied on users to understand extent of sharing  All without considering potential consequences of visibility!
  • 13. Yellow…  Provided benefit for privacy infringement  Did not divulge status of “saddest friend”  Private information was gathered and processed on prompt of friend
  • 14. As Marketers…  Consider privacy legislation  Foresee sharing and viewing patterns  Educate users on consequences for their privacy – don’t rely on social media providers to do so!  Provide consumers with benefits in exchange for access to personal information
  • 15. As marketers, how far can we push the boundaries of what is private online, and under what circumstances, without appearing disturbingly invasive?

Editor's Notes

  1. The business model of social media websites is such that users exchange private information for access to social networks. This raises privacy concerns.
  2. Widespread sharing is, indeed, a social norm. Those who do not participate are often considered asocial.
  3. But people are still concerned about privacy. Facebook’s move to make default sharing settings more public caused significant user backlash.
  4. In 2011, Google Buzz was shut down over privacy concerns.
  5. Social media websites attempt to align privacy concerns with their own technical capabilities and business models, which most frequently results in complex, convoluted website regulations and settings. Information is usually (and increasingly) shared publicly by default. Significant effort is required to change default settings, and 80-85% of users never do.
  6. Social media marketing campaigns thus operate in a setting where individuals are willing to share personal information, but where privacy issues can surface, especially when users realize they shared more than they wanted. Some campaigns falter because of privacy concerns; others are highly successful despite them. Dr. Pepper’s UK “what’s the worst that could happen?” campaign an example of the former.
  7. The girl’s mother saw the update. She was a blogger on Mumsnet. All hell let loose on Dr. Pepper.
  8.  
  9. What if an individual was denied an employment opportunity because of an embarrassing post by Dr. Pepper?
  10. KLM’s gift of a tennis racket following an investigation into a guest’s Facebook profile is another example of how privacy invasion isn’t so creepy when there’s a tangible benefit involved!