Difference between revisions of "Privacy in Social Networking"

From SI410
Jump to: navigation, search
(See Also)
Line 36: Line 36:
  
 
==See Also==
 
==See Also==
 +
*[[Twitter]]
 
*[[Facebook]]
 
*[[Facebook]]
 
*[[Social Networking]]
 
*[[Social Networking]]

Revision as of 22:20, 13 December 2011

Facebook.com's, today's prominent social networking site, logo
Privacy in Social Networking has become a topic of much concern since the increasing popularity of social networking sites such as Myspace, Facebook, Twitter, etc. With the evolution of social networking sites, it is now a social norm to share large amounts of information online. One major problem is that legislation regarding online behavior have not been able to catch up with the issues arising on the Internet.

(Back to index)

Data Storage

Information put into the Internet rarely is deleted. Social networking sites, search engines, and many other websites (which require personal input) keep records of information about users. From the gathering of statistics on users to use for advertising, or to the more personal attacks on user's to gain credit card information or sensitive information, any information put on the Internet has the potential to be seen by other people. Information put on social networking can be harmful to a person's reputation. Once information is shared online, its almost impossible to delete it forever.

Dangers

Identity Theft

Identity theft is a form of fraud by using another person's identity, typically to gain benefits from another's name. Stealing a person's identity is much easier in an online setting where personal information is inputed so easily. Many people put in information such as email address, permanent addresses, credit card information etc. without assuring the site is secure. Computer hackers are also able to obtain a user's information if companies do not take the proper precautions to protect the user's data.

Cyberbullying

Cyberbullying is the use of the Internet to harm an individual or group in a repeated and hostile manner. Cyberbullying can include threats, sexual comments, posting false information, disclosing personal information or making a victim subject to ridicule. Cyberbullying is become more popular due to its lack of supervision. Chat rooms, instant messages, cell phone conversations and social networking sites are less supervised and harder to detect. Social networking sites create an ideal setting for bullies to engage in cyberbullying.

Cyberstalking

Cyberstalking is the use of the Internet to stalk or harass an individual, group or organization. This could include making threats, monitoring, identity theft, solicitation, or collecting personal information in order to harass. The Internet creates a barrier for a stalker to hide behind, thus creating the perfect domain to stalk individuals.

Employment

Social Networking sites create a unique opportunity for employers to screen potential candidates for negative information. In 2008, Careerbuilder.com estimated that one in five employers use social networking sites to screen potential candidates [1] Employers may screen candidates or employee profiles to look for evidence of alcohol or drug abuse, poor communication skills, inappropriate photographs, inaccurate qualifications, bad mouthing of former employers, etc.

Monitoring employee profiles is becoming an increasingly frequent activity by employers to determine whether or not employees are unproductively browsing the internet in the workplace. In the UK it has been estimated that an average of 2 million employees spend over an hour a day on social networking sites, costing £14 billion. [2]

Screening of potential candidates and employee profiles may be illegal in certain jurisdictions within the United States, [3] however there is little doubt that this behavior will continue because of difficulties identifying this type of behavior.

Protection

Privacy Settings

As technology advances, and social networking sites transform, privacy settings must be kept up to date. By frequently checking for more privacy updates and new settings, users can ensure only the information they want to be public is.

Monitoring Profile

By simply monitoring their online profile, users will be able to make sure their privacy settings are not out of date and that only people they know can access their information. User's should frequently check their profile to make sure they know exactly what information is being displayed publicly.

Ethics of Privacy Settings

As a software company, Facebook's terms of service claims "ownership" for all types of data entered or uploaded onto facebook, including pictures, videos, status updates, and location check-ins. Although Facebook claims ownership of users' uploaded media, Facebook also allowed users to choose what of their media all others can see - despite Facebook having unlimited access to a user's information.

Although who views a person's media or other personal information can be controlled through privacy settings, people who do have access to other people's Facebook pages (e.g. friends), are not bound by any contract to limit spreading their friend's information to advertisers or to promote events and products. This means that updated information can pop up in news feeds without notifying the user, depending on specific privacy and notification settings.

References

  1. http://www.computerworld.com/s/article/9114560/One_in_five_employers_uses_social_networks_in_hiring_process
  2. http://www.opportunitypeterborough.co.uk/bondholder/events/the-employment-law-dangers-of-social-networking
  3. http://www.techrepublic.com/blog/career/employers-who-check-out-job-candidates-on-myspace-could-be-legally-liable/338

See Also