StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Privacy Violation on Social Media Network and Internet - Essay Example

Cite this document
Summary
The paper "Privacy Violation on Social Media Network and Internet" claims through social networks, third parties trespass into the realms of personal data. the only way to protect a person’s personal information is to use common sense, caution, and skepticism while interacting in networks…
Download free paper File format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
Privacy Violation on Social Media Network and Internet
Read Text Preview

Extract of sample "Privacy Violation on Social Media Network and Internet"

Content sharing services have made social networking sites popular.  Followers of social media view their profile as an indicator of their social status and self-expression. It has commercial values also as many companies are using networking as a platform for promoting their business.

Users of network sites disclose their full information on their profile as “a matter of self-expression” by avoiding the choice of access restriction for social sites (Privacy Right Clearinghouse: Fact Sheet 35). To ally the fear of privacy violation, most of the social networking sites impose users with access control settings to place restrictions on who may access and view personal information in the profile. However, it is quite common that many of the users are not aware of the dangers of risk to privacy.

When people post personal information on their profiles, they probably expect certain “authorized person only be able to view and access information” (Privacy Right Clearinghouse: Fact Sheet 35). However, it may be visible to third parties also. Advertisers, who need user’s personal information in order to draft behavioral advertising on the social network page may be one such party. Third-party software developers also need personal information to develop personalized application software like games and appearances. In addition, anti-social elements collect “information for illegal purposes” including identity thieves and other online criminals such as people planning scams or harassing individuals by hacking, phishing, cyberstalking, morphing, etc, or infect computers with malware (Privacy Right Clearinghouse: Fact Sheet 35).

The third-party application seems to be the “major source of privacy” violation in the context of social networking (Privacy Right Clearinghouse: Fact Sheet 35). Other third-party applications include programs that interact with a social network without actually being part of such networks. The common forms of third-party application are Games, Online polls, etc. As a measure of making network platforms more attractive, social networking sites accommodate such third parties within their space. This makes the social networks more attractive to such users by facilitating the development of new and creative methods of interacting with contacts and the network.

To make applications effective and attractive, social networks also facilitate “automatic access” to public information to the developers (Privacy Right Clearinghouse: Fact Sheet 35). In addition to public information, there may be a chance of accessing some private information by third parties. A user may grant another person access to his or her profile “without realizing” the extent of its implications (Privacy Right Clearinghouse: Fact Sheet 35). Some users may also assume that third parties uphold the same standards as primary users.

This may result in the following implications:

  • Sometimes the social network’s privacy policy may not “cover” third parties (Privacy Right Clearinghouse. Fact Sheet 35).
  • Third-party sites may not be “guaranteed to be secure” (Privacy Right Clearinghouse. Fact Sheet 35).
  • Most social “networks do not take responsibility” for third-party applications (Privacy Right Clearinghouse. Fact Sheet 35).
  • They may gain access to more information than is necessary “to perform their functions” (Privacy Right Clearinghouse. Fact Sheet 35).  
  • Sometimes applications are “designed only to gather information” about users (Privacy Right Clearinghouse. Fact Sheet 35).
  • Some sources may contain malware “designed to attack” (Privacy Right Clearinghouse. Fact Sheet 35) the user’s network account and computer.
  • It is also possible that some third-party developers may “report users’ actions back” to networking sites (Privacy Right Clearinghouse. Fact Sheet 35).
  • A social network may enter into “agreements with certain websites” and applications that allow them access to information of all users (Privacy Right Clearinghouse. Fact Sheet 35).
Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Not sure yet Essay Example | Topics and Well Written Essays - 500 words - 1”, n.d.)
Retrieved from https://studentshare.org/literature/1619365-not-sure-yet
(Not Sure Yet Essay Example | Topics and Well Written Essays - 500 Words - 1)
https://studentshare.org/literature/1619365-not-sure-yet.
“Not Sure Yet Essay Example | Topics and Well Written Essays - 500 Words - 1”, n.d. https://studentshare.org/literature/1619365-not-sure-yet.
  • Cited: 0 times

CHECK THESE SAMPLES OF Privacy Violation on Social Media Network and Internet

Social Networking Marketing

In a technology driven world, it has become imperative that social media marketing is a part of the marketing mix of any product or service marketing.... Marketing on social networking or social media platforms has its own advantages because of the uniqueness offered by the internet (Keller and Berry, 2003).... Marketing on social networking or social media platforms has its own advantages because of the uniqueness offered by the internet (Keller and Berry, 2003)....
15 Pages (3750 words) Essay

Social, legal and ethical aspects of IS security and privacy

This research paper gives a critical review of the social, legal and ethical aspects which relate to the security and privacy of information within information systems in addition to recommendations on the appropriate approaches of curbing the information security concerns of organizations.... Information System Security and privacy Within information systems, individuals desire to have data or information about them be kept safe from unwarranted, unauthorized access and use for malicious intentions....
16 Pages (4000 words) Research Paper

Internet and Social networking Privacy

The researcher of this essay focuses on the discussion of the topic of internet and social networking privacy.... The author of the essay "internet and Social Networking Privacy" thinks that privacy concerns is one of the most troubling issues for users of social networking sites today, but this problem has been largely underresearched.... Social networking sites are online communities that connect people through the internet and Web 2.... The author assumes that apart from lots of benefits brought by the use of social networking sites, it raises serious concerns, particularly in relation to privacy and security....
6 Pages (1500 words) Essay

How Social Media and Internet Violates Privacy

The following paper "How Social Media and internet Violates Privacy" is a combination of a five-source annotated bibliography and interview responses from Respondents A and B relating to the subject of social media violation of privacies.... Al-Deen explored the levels of risk to individual privacy and the growing attachment of populations to social media.... The central arguments of the study were built on the realization that social media such as Tweeter does not have sufficient safeguards that could protect users against privacy issues....
5 Pages (1250 words) Annotated Bibliography

Cause and Effect of Privacy Violation on Social Media and the Internet

The flexibility and more added features poured in by the internet and social media networking sites, almost any type of data can be shared Cause and effect of privacy violation on social media and the internet Social media and internet has connected millions of people over a single platform where they can interact with each other and communicate whenever desired.... Many laws and strict obligations are commenced with strict actions to any information breach as an effect of privacy violation on social media and internet....
2 Pages (500 words) Essay

Social Network and Privacy

This paper ''Social network and Privacy'' tells us that whiles some use the internet basically for commerce, others use it for educational purposes while to others, it is all about entertainment.... The user variety of the internet notwithstanding, recent studies have confirmed that an aspect of internet usage that seems to have caught up with over 70% of all internet users is the phenomenon of social media networking.... The primary data collection exercise was also committed to knowing the depth of knowledge on privacy issues with social media networks....
29 Pages (7250 words) Research Paper

Facebook and Privacy Issues

While social networking has its advantages, it is also important to note that, there are drawbacks related to the use of social media platforms.... This in essence, creates problems concerning privacy issues since users may want some of the information they share through the social media to remain private.... In this regard, a leading social media site like Facebook is embattling problems related to privacy issues for its users.... This paper examines privacy issues as one of the drawbacks for Facebook considered the leading social media platform globally....
10 Pages (2500 words) Essay

The Role of Online Social Networks

Life, as we know it, changed completely and permanently with the birth of a new kind of communication medium known as social media networking.... Since then, social media networking has taken over our lives at an incredible pace.... The emergence of social media Social networking' has become a vague term that requires some explicit explanation or even a new implicit definition.... Popular medium started with the launch of Myspace, as a new and integrated social network....
16 Pages (4000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us