SlideShare a Scribd company logo
Running Head: PRIVACY CONCERNS ON FACEBOOK 1
University
Literature Review in “Privacy Concerns on Facebook”
Assignment # 3 Second edition
June 16th, 2014
PRIVACY CONCERNS ON FACEBOOK 2
Literature Review
Patino, A., Pitta, D. A., & Quinones, R. (2012). Social Media's Emerging Importance in Market
Research. Journal of Consumer Marketing, 233-237.
Social Media has gained high importance in area of market research, business, and social
lives of people. Most firms and consultants make decisions on basis of social networking
websites results. Businesses are now using social sites and applications to earn profits by
different means, i.e. ads postings, web page discussions, and user focused marketing. These
social media websites serve as the means of communication between the businesses and
customers. It has also been observed that the effectiveness of traditional marketing and research
techniques has been reduced due to social media. However, the advancements in social
networking has also led various privacy issues (Patino, Pitta, & Quinones, 2012).
Linklaters. (2014). Social Media and the Law: A Handbook for UK Companies. LinklatersLLP.
According to the Linklaters (2014) report, growth of social networking has been
significantly increased in past few years. Facebook users have been increased up to 1.2 billion in
the last 10 years, i.e. fifth of the world population. Similarly, Twitter was launched in 2006, but
in just few years, its number of users has grown up to 230 million users. LinkedIn also has more
than 259 million users all over the world. In addition to the individual accounts, the growth has
also been observed in the Facebook pages of the companies. Most companies today deal with the
customers by means of social networking sites.
PRIVACY CONCERNS ON FACEBOOK 3
Lloyd's. (2011, Mar 11). The Emerging Risks of Social Networking. Retrieved from Lloyd's:
http://www.lloyds.com/news-and-insight/news-and-features/emerging-risk/emerging-
risk-2011/the-emerging-risks-of-social-networking
Recent reports by Deloitte found that firms using social networking sites for research and
marketing are at higher risk than other organizations following traditional means. Moreover,
these new techniques of business marketing are not yet clear; neither any written policies have
been developed for social networks. It was surveyed and found out that about 43% of health
sciences firms had no guidelines or policies for managing adverse events. Other risks involved
are intellectual property infringement, sharing of personal information, and so on (Lloyd's,
2011).
Linklaters. (2014). Social Media and the Law: A Handbook for UK Companies. LinklatersLLP.
It is though difficult to control privacy issues in social networking sites but still certain
policies and strategies can help reducing these issues. First, social networks should keep its users
well informed about the privacy standard. They should know how secure is their personal
information and what the owners are doing with this data. If any personal information of the
users is forwarded to third party or for any other purpose, it should be in notice of the users. This
information can only be used with the consent of the users. Moreover, provide users with an easy
way to understand security polices and steps to implement them (Linklaters, 2014).
Linklaters. (2014). Social Media and the Law: A Handbook for UK Companies. LinklatersLLP.
An organization is responsible for implementation of data protection legislation and
therefore, it must take consistent measures to secure data especially users’ personal information.
This personal information is of high interest for the criminals as they can use this data in identity
PRIVACY CONCERNS ON FACEBOOK 4
fraud and other criminal activities. In 2011, Sony’s PlayStation Network was hacked and
personal information of 77 million customers was leaked. This cost around $1.25 billion loss to
the company (Linklaters, 2014).
Batorski, D. (2012). The Burden of Big Data.
Most of the social media websites generate a large amount of data daily. Facebook
generates 500 terabytes of information in a day. This information is a fertile ground for the
analysis of Big Data. Similarly, Google also generates hug amount of data on regular basis.
Google and Facebook use this big data by creating data profile of each user who visits the same
day. This information is recorded, and the relevant ads of their interest are posted on their page.
This profile is incredibly valuable for marketing purposes. Most of the small and large
businesses make a contract with the social networking websites and pay them for posting their ad
on the page of concerned users. Similarly, Government Agencies also use services of social
networking websites to collect information about the citizens and other purposes (Batorski,
2012).
Semitsu, J. (2011). From Facebook to Mug Shot: How the Dearth of Social Networking Privacy
Rights Revolutionized Online Government Surveillance. Social Science Research Network.
Government agencies and local authorities also use Facebook information to investigate
crimes and collect evidences. These agencies collect information like location, motives, and
other demographic information. At times, these agencies also get an access to the
communications to collect deep information. Facebook has not restricted profiles from
Government Agencies, and that renders doubt in minds of users regarding privacy (Semitsu,
2011).
PRIVACY CONCERNS ON FACEBOOK 5
Kirkpatrick, D. (2010). The Facebook Effect: The Inside Story of the Company that is
Connecting the World. 191.
Social Networking websites like Facebook and Twitter are rapidly gaining popularity.
These websites provide a platform to people around the world to connect with each other and
eliminate distances. However, these services are also carrying critical user privacy issues along
with them. Hull, Lipford, and Latulipe (2011) studied two new features of Facebook, News Feed
and Applications. News Feed that appeared on Facebook page of every user in 2006 had
experience various issues. It displays recent activities of other Facebook friends. The similar
kind of feature, i.e. MiniFeed was also introduced during the same time. It keeps log of similar
kind of events on every user’s profile. Newsfeed was given an access to various posts and
pictures of friends of friends. Similarly, in case of Applications, when the user access any
application, he/she not only invisibly shares personal information, but a friend’s information as
well with third party. Large number of users reacted on this issue and for this reason, and
Facebook introduced new privacy features. In May 2010, the control was given to the users by
which they could choose options to enable to disable, which information to broadcast in News
Feed. It also added various new privacy controls, i.e. to manage access to selective status
updates, photos, and other posts (Kirkpatrick, 2010).
Milian, M. (2011, June 9). Facebook lets users opt out facial recognition. Retrieved from CNN:
http://edition.cnn.com/2011/TECH/social.media/06/07/facebook.facial.recognition/
In June 2011, Facebook introduced new feature that is automatic facial recognition. The
facial recognition while tagging a friend has also engendered various privacy issues. It gives tag
suggestions by comparing it with photos of friends that they have recently uploaded. This feature
access friend’s photos even if they have set it private. This issue raised large number of
PRIVACY CONCERNS ON FACEBOOK 6
complaints. Data protection officials also complained that this feature is activated without the
consent of the user. For this reason, Facebook introduced privacy feature by which users can
disable this option. However, the privacy issue is still there (Milian, 2011).
Woollaston, V. (2013, September 18). Facebook users are committing 'virtual identity suicide' in
droves and quitting the site over privacy and addiction fears. Retrieved from Daily Mail:
http://www.dailymail.co.uk/sciencetech/article-2423713/Facebook-users-committing-virtual-
identity-suicide-quitting-site-droves-privacy-addiction-fears.html
Many users report that they experience glitches during the use of Facebook. It has been
observed at times that any post get visible even after setting it to private. An incident occurred in
May 2010, unauthorized users got an access to private chat logs of their friends on Facebook.
Though, such bugs are fixed quickly, but lots of information may get leaked in just few hours of
time (Wortham, 2010).
Privacy Rights Clearinghouse. (2010, June). Fact Sheet 35: Social Networking Privacy: How to
be Safe, Secure, and Social. Retrieved from Privacy Rights :
https://www.privacyrights.org/social-networking-privacy-how-be-safe-secure-and-social
Users’ personal information on the social networks like Facebook may also be accessed
through electronic tracking. It was found by the AT&T Labs and Worester Polytechnic Institute,
there is a unique identifying code that is assigned to users by social networks. This code can be
matched with behavior of particular user found through cookies, and thus, profile can be built
using information of his/her browsing habits. For this purpose, social networks have introduced
various techniques and codes to improve the level of security (Privacy Rights Clearinghouse,
2010).
PRIVACY CONCERNS ON FACEBOOK 7
Liu, Y., Gummadi, K. P., Krishnamurthy, B., & Mislove, A. (2011). Analyzing Facebook
Privacy Settings: User Expectations Vs. Reality. IMC '11 Proceedings of the 2011 ACM
SIGCOMM conference on Internet measurement conference , (pp. 61-70). New York.
Liu, Gummadi, Krishnamurthy, and Mislove (2011) studied 200 Facebook users to study
the actual privacy settings that users experience. It was found that 36% of the content remained
shared using the default privacy settings, and only 37% of the privacy settings match with the
users’ expectations. It most of the time expose content to more people that expected. This study
shows that either there are flaws in the privacy settings of the Facebook or people don’t
understand the correct implementation of these settings.
Woollaston, V. (2013, September 18). Facebook users are committing 'virtual identity suicide' in
droves and quitting the site over privacy and addiction fears. Retrieved from Daily Mail:
http://www.dailymail.co.uk/sciencetech/article-2423713/Facebook-users-committing-virtual-
identity-suicide-quitting-site-droves-privacy-addiction-fears.html
According to some recent studies, it has been observed that Facebook users are quitting
with social network websites due to increasing concerns of privacy. The researchers of Vienna
analyzed 600 people that found that among various reasons of why people are deleting or
inactivating their Facebook accounts, one is data protection issues. According to Eircom B&A
Survey 2013, 48.3 per cent users quit Facebook due to privacy concerns, 13.5 per cent due to
general dissatisfaction, 12.6 per cent due to shallow conversations, and 6 per cent due to fear of
becoming addicted (Woollaston, 2013).
PRIVACY CONCERNS ON FACEBOOK 8
Esguerra, R. (2010, April 28). A Handy Facebook-to-English Translator. Retrieved from
Electronic Frontier Foundation: https://www.eff.org/deeplinks/2010/04/handy-facebook-english-
translator
Electronic Frontier Foundation in 2010 identified two techniques of personal information
aggregation that are instant personalization and connections. It was demonstrated that
information is saved with an intention of not making it public, even then anyone can get an
access to that particular information. Facebook user connection is made with the post or else on
just clicking “Like” button, even if it is done on Facebook website or an external link. Facebook
considers this relationship as public information and for this reason, it may display user’s
identity on the Facebook page of a friend or any product/service page (Esguerra, 2010).
Esguerra, R. (2010, April 28). A Handy Facebook-to-English Translator. Retrieved from
Electronic Frontier Foundation: https://www.eff.org/deeplinks/2010/04/handy-facebook-english-
translator
Similarly, instant personalization links up Facebook information with certain affiliated
website. For example, a music website that is linked with Facebook, shares a user’s list of
“liked” bands and thus help users to automatically get the playlist of preferred songs. However,
Electronic Frontier Foundation found that instant personalization opens a way to data leakage.
When the user visits the website in the pilot program, it accesses your current location, picture,
name, friend list, and pages that you have liked. A user who opts out of instant personalization is
still not safe from the data leakage, if his/her friends are using it. Because, such instant
personalization websites also access friends list information and anything that Facebook has set
as public. A user can only be safe from data leakage if these websites are blocked individually.
PRIVACY CONCERNS ON FACEBOOK 9
These settings are quite confusing for the common person, and therefore, Facebook must explain
it in easy terms (Esguerra, 2010).

More Related Content

What's hot

Important Issues for Federal Agencies to Consider When Using Social Media and...
Important Issues for Federal Agencies to Consider When Using Social Media and...Important Issues for Federal Agencies to Consider When Using Social Media and...
Important Issues for Federal Agencies to Consider When Using Social Media and...
Osterman Research, Inc.
 
Considerations for the future of Online Dispute Resolution
Considerations for the future of Online Dispute ResolutionConsiderations for the future of Online Dispute Resolution
Considerations for the future of Online Dispute Resolution
Sanjana Hattotuwa
 
Literature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social MediaLiterature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social Media
David Thompson
 
Case Analysis Presentation On Facebook Data Breach
Case Analysis Presentation On Facebook Data BreachCase Analysis Presentation On Facebook Data Breach
Case Analysis Presentation On Facebook Data Breach
Siddhesh Shah
 
Right Forgotten_v
Right Forgotten_vRight Forgotten_v
Right Forgotten_vMei Wang
 
Kt3518501858
Kt3518501858Kt3518501858
Kt3518501858
IJERA Editor
 
Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011
Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011
Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011filippotrevisan
 
Preproc 03
Preproc 03Preproc 03
Preproc 03
naeyam
 
Analysis of Facebook and Tuenti
Analysis of Facebook and TuentiAnalysis of Facebook and Tuenti
Analysis of Facebook and Tuenti
cpape21
 
Online radicalisation: work, challenges and future directions
Online radicalisation: work, challenges and future directionsOnline radicalisation: work, challenges and future directions
Online radicalisation: work, challenges and future directions
Miriam Fernandez
 
Facebook's impact on ideological segregation
Facebook's impact on ideological segregationFacebook's impact on ideological segregation
Facebook's impact on ideological segregation
George Farra
 
Facebook Case Study + Solutions 2013
Facebook Case Study + Solutions 2013Facebook Case Study + Solutions 2013
Facebook Case Study + Solutions 2013
André L. Campino
 
The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...
guest636475b
 
The-Governmentality-of-Facebook-Nick-Howlett-2016
The-Governmentality-of-Facebook-Nick-Howlett-2016The-Governmentality-of-Facebook-Nick-Howlett-2016
The-Governmentality-of-Facebook-Nick-Howlett-2016Nick Howlett
 
Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...
Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...
Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...
ShafiuUmar1
 
Social media Big Data and Privacy
Social media Big Data and PrivacySocial media Big Data and Privacy
Social media Big Data and Privacy
AnnaliseKnudson
 
Social media Big Data and Privacy
Social media Big Data and PrivacySocial media Big Data and Privacy
Social media Big Data and Privacy
AnnaliseKnudson
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
ijsptm
 
IRJET- Application of Case based Algorithm in Design and Development of a...
IRJET-  	  Application of Case based Algorithm in Design and Development of a...IRJET-  	  Application of Case based Algorithm in Design and Development of a...
IRJET- Application of Case based Algorithm in Design and Development of a...
IRJET Journal
 

What's hot (19)

Important Issues for Federal Agencies to Consider When Using Social Media and...
Important Issues for Federal Agencies to Consider When Using Social Media and...Important Issues for Federal Agencies to Consider When Using Social Media and...
Important Issues for Federal Agencies to Consider When Using Social Media and...
 
Considerations for the future of Online Dispute Resolution
Considerations for the future of Online Dispute ResolutionConsiderations for the future of Online Dispute Resolution
Considerations for the future of Online Dispute Resolution
 
Literature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social MediaLiterature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social Media
 
Case Analysis Presentation On Facebook Data Breach
Case Analysis Presentation On Facebook Data BreachCase Analysis Presentation On Facebook Data Breach
Case Analysis Presentation On Facebook Data Breach
 
Right Forgotten_v
Right Forgotten_vRight Forgotten_v
Right Forgotten_v
 
Kt3518501858
Kt3518501858Kt3518501858
Kt3518501858
 
Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011
Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011
Disabled Dissent Goes Online - Urban Studies Workshop, 5 Dec 2011
 
Preproc 03
Preproc 03Preproc 03
Preproc 03
 
Analysis of Facebook and Tuenti
Analysis of Facebook and TuentiAnalysis of Facebook and Tuenti
Analysis of Facebook and Tuenti
 
Online radicalisation: work, challenges and future directions
Online radicalisation: work, challenges and future directionsOnline radicalisation: work, challenges and future directions
Online radicalisation: work, challenges and future directions
 
Facebook's impact on ideological segregation
Facebook's impact on ideological segregationFacebook's impact on ideological segregation
Facebook's impact on ideological segregation
 
Facebook Case Study + Solutions 2013
Facebook Case Study + Solutions 2013Facebook Case Study + Solutions 2013
Facebook Case Study + Solutions 2013
 
The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...
 
The-Governmentality-of-Facebook-Nick-Howlett-2016
The-Governmentality-of-Facebook-Nick-Howlett-2016The-Governmentality-of-Facebook-Nick-Howlett-2016
The-Governmentality-of-Facebook-Nick-Howlett-2016
 
Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...
Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...
Research on how_facebook_industry_is_using_data_mining_by_shafiu_umar_abubaka...
 
Social media Big Data and Privacy
Social media Big Data and PrivacySocial media Big Data and Privacy
Social media Big Data and Privacy
 
Social media Big Data and Privacy
Social media Big Data and PrivacySocial media Big Data and Privacy
Social media Big Data and Privacy
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
 
IRJET- Application of Case based Algorithm in Design and Development of a...
IRJET-  	  Application of Case based Algorithm in Design and Development of a...IRJET-  	  Application of Case based Algorithm in Design and Development of a...
IRJET- Application of Case based Algorithm in Design and Development of a...
 

Similar to Order 32740459

A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
Brenden Brown
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Facebook vs google+
Facebook vs google+Facebook vs google+
Facebook vs google+
Nivas Ramalingam
 
Be presentation social network.61,65,70
Be presentation   social network.61,65,70Be presentation   social network.61,65,70
Be presentation social network.61,65,70domsr
 
Paradigm in Traditional Marketing: Social Media & Gen Y
Paradigm in Traditional Marketing: Social Media & Gen YParadigm in Traditional Marketing: Social Media & Gen Y
Paradigm in Traditional Marketing: Social Media & Gen YToni Gardner
 
Social Networking Sites Essay
Social Networking Sites EssaySocial Networking Sites Essay
Social Networking Sites Essay
Paper Writer Services
 
H018144450
H018144450H018144450
H018144450
IOSR Journals
 
Facebook and the Cinema_ Research Abstract
Facebook and the Cinema_ Research AbstractFacebook and the Cinema_ Research Abstract
Facebook and the Cinema_ Research Abstract
Florence Poirel
 
Slides
SlidesSlides
Slides
rkc20
 
Untitled.docx
Untitled.docxUntitled.docx
Untitled.docx
gekas1
 
Social media brief
Social media brief Social media brief
Social media brief
Ekerette-Alvin Ikpe
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.STO STRATEGY
 
Social surveillance aoife shona
Social surveillance aoife shonaSocial surveillance aoife shona
Social surveillance aoife shona
Aoife Brown
 
Organisational challenges of using social media marketing caliesch liebrich_2...
Organisational challenges of using social media marketing caliesch liebrich_2...Organisational challenges of using social media marketing caliesch liebrich_2...
Organisational challenges of using social media marketing caliesch liebrich_2...
www.rw-oberwallis.ch
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
ijsptm
 
11.face location a novel approach to post the user global location
11.face location   a novel approach to post the user global location11.face location   a novel approach to post the user global location
11.face location a novel approach to post the user global location
Alexander Decker
 
Hayes Privacy And Social Media Paper, October 29, 2010
Hayes   Privacy And Social Media Paper, October 29, 2010Hayes   Privacy And Social Media Paper, October 29, 2010
Hayes Privacy And Social Media Paper, October 29, 2010
canadianlawyer
 
Mobile apps for kids
Mobile apps for kidsMobile apps for kids
Mobile apps for kids
- Mark - Fullbright
 
FACEBOOK (1) WSM presentation (2).pptx
FACEBOOK (1) WSM presentation (2).pptxFACEBOOK (1) WSM presentation (2).pptx
FACEBOOK (1) WSM presentation (2).pptx
kanurukarthikeya
 

Similar to Order 32740459 (20)

A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Privacy Paper
Privacy PaperPrivacy Paper
Privacy Paper
 
Facebook vs google+
Facebook vs google+Facebook vs google+
Facebook vs google+
 
Be presentation social network.61,65,70
Be presentation   social network.61,65,70Be presentation   social network.61,65,70
Be presentation social network.61,65,70
 
Paradigm in Traditional Marketing: Social Media & Gen Y
Paradigm in Traditional Marketing: Social Media & Gen YParadigm in Traditional Marketing: Social Media & Gen Y
Paradigm in Traditional Marketing: Social Media & Gen Y
 
Social Networking Sites Essay
Social Networking Sites EssaySocial Networking Sites Essay
Social Networking Sites Essay
 
H018144450
H018144450H018144450
H018144450
 
Facebook and the Cinema_ Research Abstract
Facebook and the Cinema_ Research AbstractFacebook and the Cinema_ Research Abstract
Facebook and the Cinema_ Research Abstract
 
Slides
SlidesSlides
Slides
 
Untitled.docx
Untitled.docxUntitled.docx
Untitled.docx
 
Social media brief
Social media brief Social media brief
Social media brief
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Social surveillance aoife shona
Social surveillance aoife shonaSocial surveillance aoife shona
Social surveillance aoife shona
 
Organisational challenges of using social media marketing caliesch liebrich_2...
Organisational challenges of using social media marketing caliesch liebrich_2...Organisational challenges of using social media marketing caliesch liebrich_2...
Organisational challenges of using social media marketing caliesch liebrich_2...
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
 
11.face location a novel approach to post the user global location
11.face location   a novel approach to post the user global location11.face location   a novel approach to post the user global location
11.face location a novel approach to post the user global location
 
Hayes Privacy And Social Media Paper, October 29, 2010
Hayes   Privacy And Social Media Paper, October 29, 2010Hayes   Privacy And Social Media Paper, October 29, 2010
Hayes Privacy And Social Media Paper, October 29, 2010
 
Mobile apps for kids
Mobile apps for kidsMobile apps for kids
Mobile apps for kids
 
FACEBOOK (1) WSM presentation (2).pptx
FACEBOOK (1) WSM presentation (2).pptxFACEBOOK (1) WSM presentation (2).pptx
FACEBOOK (1) WSM presentation (2).pptx
 

More from gracyatpassessays (9)

Order 31645285
Order 31645285Order 31645285
Order 31645285
 
Order 31614197
Order 31614197Order 31614197
Order 31614197
 
Order 26626243
Order 26626243Order 26626243
Order 26626243
 
Order 25448245
Order 25448245Order 25448245
Order 25448245
 
Order 25142695
Order 25142695Order 25142695
Order 25142695
 
Order 25142651
Order 25142651Order 25142651
Order 25142651
 
Order #32788581
Order #32788581Order #32788581
Order #32788581
 
Order #31088901
Order #31088901Order #31088901
Order #31088901
 
Order #29836407
Order #29836407Order #29836407
Order #29836407
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

Order 32740459

  • 1. Running Head: PRIVACY CONCERNS ON FACEBOOK 1 University Literature Review in “Privacy Concerns on Facebook” Assignment # 3 Second edition June 16th, 2014
  • 2. PRIVACY CONCERNS ON FACEBOOK 2 Literature Review Patino, A., Pitta, D. A., & Quinones, R. (2012). Social Media's Emerging Importance in Market Research. Journal of Consumer Marketing, 233-237. Social Media has gained high importance in area of market research, business, and social lives of people. Most firms and consultants make decisions on basis of social networking websites results. Businesses are now using social sites and applications to earn profits by different means, i.e. ads postings, web page discussions, and user focused marketing. These social media websites serve as the means of communication between the businesses and customers. It has also been observed that the effectiveness of traditional marketing and research techniques has been reduced due to social media. However, the advancements in social networking has also led various privacy issues (Patino, Pitta, & Quinones, 2012). Linklaters. (2014). Social Media and the Law: A Handbook for UK Companies. LinklatersLLP. According to the Linklaters (2014) report, growth of social networking has been significantly increased in past few years. Facebook users have been increased up to 1.2 billion in the last 10 years, i.e. fifth of the world population. Similarly, Twitter was launched in 2006, but in just few years, its number of users has grown up to 230 million users. LinkedIn also has more than 259 million users all over the world. In addition to the individual accounts, the growth has also been observed in the Facebook pages of the companies. Most companies today deal with the customers by means of social networking sites.
  • 3. PRIVACY CONCERNS ON FACEBOOK 3 Lloyd's. (2011, Mar 11). The Emerging Risks of Social Networking. Retrieved from Lloyd's: http://www.lloyds.com/news-and-insight/news-and-features/emerging-risk/emerging- risk-2011/the-emerging-risks-of-social-networking Recent reports by Deloitte found that firms using social networking sites for research and marketing are at higher risk than other organizations following traditional means. Moreover, these new techniques of business marketing are not yet clear; neither any written policies have been developed for social networks. It was surveyed and found out that about 43% of health sciences firms had no guidelines or policies for managing adverse events. Other risks involved are intellectual property infringement, sharing of personal information, and so on (Lloyd's, 2011). Linklaters. (2014). Social Media and the Law: A Handbook for UK Companies. LinklatersLLP. It is though difficult to control privacy issues in social networking sites but still certain policies and strategies can help reducing these issues. First, social networks should keep its users well informed about the privacy standard. They should know how secure is their personal information and what the owners are doing with this data. If any personal information of the users is forwarded to third party or for any other purpose, it should be in notice of the users. This information can only be used with the consent of the users. Moreover, provide users with an easy way to understand security polices and steps to implement them (Linklaters, 2014). Linklaters. (2014). Social Media and the Law: A Handbook for UK Companies. LinklatersLLP. An organization is responsible for implementation of data protection legislation and therefore, it must take consistent measures to secure data especially users’ personal information. This personal information is of high interest for the criminals as they can use this data in identity
  • 4. PRIVACY CONCERNS ON FACEBOOK 4 fraud and other criminal activities. In 2011, Sony’s PlayStation Network was hacked and personal information of 77 million customers was leaked. This cost around $1.25 billion loss to the company (Linklaters, 2014). Batorski, D. (2012). The Burden of Big Data. Most of the social media websites generate a large amount of data daily. Facebook generates 500 terabytes of information in a day. This information is a fertile ground for the analysis of Big Data. Similarly, Google also generates hug amount of data on regular basis. Google and Facebook use this big data by creating data profile of each user who visits the same day. This information is recorded, and the relevant ads of their interest are posted on their page. This profile is incredibly valuable for marketing purposes. Most of the small and large businesses make a contract with the social networking websites and pay them for posting their ad on the page of concerned users. Similarly, Government Agencies also use services of social networking websites to collect information about the citizens and other purposes (Batorski, 2012). Semitsu, J. (2011). From Facebook to Mug Shot: How the Dearth of Social Networking Privacy Rights Revolutionized Online Government Surveillance. Social Science Research Network. Government agencies and local authorities also use Facebook information to investigate crimes and collect evidences. These agencies collect information like location, motives, and other demographic information. At times, these agencies also get an access to the communications to collect deep information. Facebook has not restricted profiles from Government Agencies, and that renders doubt in minds of users regarding privacy (Semitsu, 2011).
  • 5. PRIVACY CONCERNS ON FACEBOOK 5 Kirkpatrick, D. (2010). The Facebook Effect: The Inside Story of the Company that is Connecting the World. 191. Social Networking websites like Facebook and Twitter are rapidly gaining popularity. These websites provide a platform to people around the world to connect with each other and eliminate distances. However, these services are also carrying critical user privacy issues along with them. Hull, Lipford, and Latulipe (2011) studied two new features of Facebook, News Feed and Applications. News Feed that appeared on Facebook page of every user in 2006 had experience various issues. It displays recent activities of other Facebook friends. The similar kind of feature, i.e. MiniFeed was also introduced during the same time. It keeps log of similar kind of events on every user’s profile. Newsfeed was given an access to various posts and pictures of friends of friends. Similarly, in case of Applications, when the user access any application, he/she not only invisibly shares personal information, but a friend’s information as well with third party. Large number of users reacted on this issue and for this reason, and Facebook introduced new privacy features. In May 2010, the control was given to the users by which they could choose options to enable to disable, which information to broadcast in News Feed. It also added various new privacy controls, i.e. to manage access to selective status updates, photos, and other posts (Kirkpatrick, 2010). Milian, M. (2011, June 9). Facebook lets users opt out facial recognition. Retrieved from CNN: http://edition.cnn.com/2011/TECH/social.media/06/07/facebook.facial.recognition/ In June 2011, Facebook introduced new feature that is automatic facial recognition. The facial recognition while tagging a friend has also engendered various privacy issues. It gives tag suggestions by comparing it with photos of friends that they have recently uploaded. This feature access friend’s photos even if they have set it private. This issue raised large number of
  • 6. PRIVACY CONCERNS ON FACEBOOK 6 complaints. Data protection officials also complained that this feature is activated without the consent of the user. For this reason, Facebook introduced privacy feature by which users can disable this option. However, the privacy issue is still there (Milian, 2011). Woollaston, V. (2013, September 18). Facebook users are committing 'virtual identity suicide' in droves and quitting the site over privacy and addiction fears. Retrieved from Daily Mail: http://www.dailymail.co.uk/sciencetech/article-2423713/Facebook-users-committing-virtual- identity-suicide-quitting-site-droves-privacy-addiction-fears.html Many users report that they experience glitches during the use of Facebook. It has been observed at times that any post get visible even after setting it to private. An incident occurred in May 2010, unauthorized users got an access to private chat logs of their friends on Facebook. Though, such bugs are fixed quickly, but lots of information may get leaked in just few hours of time (Wortham, 2010). Privacy Rights Clearinghouse. (2010, June). Fact Sheet 35: Social Networking Privacy: How to be Safe, Secure, and Social. Retrieved from Privacy Rights : https://www.privacyrights.org/social-networking-privacy-how-be-safe-secure-and-social Users’ personal information on the social networks like Facebook may also be accessed through electronic tracking. It was found by the AT&T Labs and Worester Polytechnic Institute, there is a unique identifying code that is assigned to users by social networks. This code can be matched with behavior of particular user found through cookies, and thus, profile can be built using information of his/her browsing habits. For this purpose, social networks have introduced various techniques and codes to improve the level of security (Privacy Rights Clearinghouse, 2010).
  • 7. PRIVACY CONCERNS ON FACEBOOK 7 Liu, Y., Gummadi, K. P., Krishnamurthy, B., & Mislove, A. (2011). Analyzing Facebook Privacy Settings: User Expectations Vs. Reality. IMC '11 Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference , (pp. 61-70). New York. Liu, Gummadi, Krishnamurthy, and Mislove (2011) studied 200 Facebook users to study the actual privacy settings that users experience. It was found that 36% of the content remained shared using the default privacy settings, and only 37% of the privacy settings match with the users’ expectations. It most of the time expose content to more people that expected. This study shows that either there are flaws in the privacy settings of the Facebook or people don’t understand the correct implementation of these settings. Woollaston, V. (2013, September 18). Facebook users are committing 'virtual identity suicide' in droves and quitting the site over privacy and addiction fears. Retrieved from Daily Mail: http://www.dailymail.co.uk/sciencetech/article-2423713/Facebook-users-committing-virtual- identity-suicide-quitting-site-droves-privacy-addiction-fears.html According to some recent studies, it has been observed that Facebook users are quitting with social network websites due to increasing concerns of privacy. The researchers of Vienna analyzed 600 people that found that among various reasons of why people are deleting or inactivating their Facebook accounts, one is data protection issues. According to Eircom B&A Survey 2013, 48.3 per cent users quit Facebook due to privacy concerns, 13.5 per cent due to general dissatisfaction, 12.6 per cent due to shallow conversations, and 6 per cent due to fear of becoming addicted (Woollaston, 2013).
  • 8. PRIVACY CONCERNS ON FACEBOOK 8 Esguerra, R. (2010, April 28). A Handy Facebook-to-English Translator. Retrieved from Electronic Frontier Foundation: https://www.eff.org/deeplinks/2010/04/handy-facebook-english- translator Electronic Frontier Foundation in 2010 identified two techniques of personal information aggregation that are instant personalization and connections. It was demonstrated that information is saved with an intention of not making it public, even then anyone can get an access to that particular information. Facebook user connection is made with the post or else on just clicking “Like” button, even if it is done on Facebook website or an external link. Facebook considers this relationship as public information and for this reason, it may display user’s identity on the Facebook page of a friend or any product/service page (Esguerra, 2010). Esguerra, R. (2010, April 28). A Handy Facebook-to-English Translator. Retrieved from Electronic Frontier Foundation: https://www.eff.org/deeplinks/2010/04/handy-facebook-english- translator Similarly, instant personalization links up Facebook information with certain affiliated website. For example, a music website that is linked with Facebook, shares a user’s list of “liked” bands and thus help users to automatically get the playlist of preferred songs. However, Electronic Frontier Foundation found that instant personalization opens a way to data leakage. When the user visits the website in the pilot program, it accesses your current location, picture, name, friend list, and pages that you have liked. A user who opts out of instant personalization is still not safe from the data leakage, if his/her friends are using it. Because, such instant personalization websites also access friends list information and anything that Facebook has set as public. A user can only be safe from data leakage if these websites are blocked individually.
  • 9. PRIVACY CONCERNS ON FACEBOOK 9 These settings are quite confusing for the common person, and therefore, Facebook must explain it in easy terms (Esguerra, 2010).