You are on page 1of 9

It has been suggested that this article be merged with Privacy issues of social

networking sites. (Discuss) Proposed since January 2013.


Social networking sites vary in the levels of privacy offered. For some social networking sites like
Facebook, providing real names and other personal information is encouraged by the site(onto a page
known as a Profile). These information usually consist of birth date, current address, and telephone
number(s). Some sites also allow users to provide more information about themselves such as interests,
hobbies, favorite books or films, and even relationship status. However, there are other social network
sites, such as Match.com, where most people prefer to be anonymous. Thus, linking users to their real
identity can sometimes be rather difficult. Nevertheless, individuals can sometimes be identified with face
re-identification. Study has been done on two major social networking sites, and it is found that by
overlapping 15% of the similar photographs, profile pictures with similar pictures over multiple sites can
[1]
be matched to identify the users.
For sites that do encourage information disclosure, it has been noted that majority of the users have no
[1]
trouble disclosing their personal information to a large group of people. In 2005, a study was performed
to analyze data of 540 Facebook profiles of students enrolled at Carnegie Mellon University. It was
revealed that 89% of the users gave genuine names, and 61% gave a photograph of themselves for
[1]
easier identification. Majority of users also had not altered their privacy setting, allowed a large number
of unknown users to have access to their personal information (the default setting originally allowed
friends, friends of friends, and non friends of the same network to have full view of a users profile). It is
possible for users to block other users from locating them on Facebook, but this must be done by
individual basis, and would therefore appear not to be commonly used for a wide number of people. Most
users do not realize that while they make use of the security features on Facebook the default setting is
restored after each update. All of this has led to many concerns that users are displaying far too much
information on social networking sites which may have serious implications on their privacy. Facebook
[2]
was criticized due to the perceived laxity regarding privacy in the default setting for users.
Social network security and privacy issues result from the astronomical amounts of information these
sites process each day. Features that invite users to participationmessages, invitations, photos, open
platform applications and other applications are often the avenues for others to gain access to a user's
private information. In the case of Facebook. Adrienne Felt, a Ph.D. candidate at Berkeley, made small
headlines last year when she exposed a potentially devastating hole in the framework of Facebook's
third-party application programming interface (API). It made it easier for people to lose their privacy. Felt
and her co-researchers found that third-party platform applications on Facebook are provided with far
more user information than it is needed. This potential privacy breach is actually built into the systematic
framework of Facebook. Unfortunately, the flaws render the system to almost indefensible. "The question
for social networks is resolving the difference between mistakes in implementation and what the design of
the application platform is intended to allow," said David Evans, Assistant Professor of Computer Science
at the University of Virginia. Moreover, there is also the question of who should be hold responsible for
the lack of user privacy? According Evan, the answer to the question is not likely to be found, because a
better regulated API would be required for Facebook "to break a lot of applications, [especially when] a lot
of companies are trying to make money off [these] applications." Felt agrees with her conclusion, because
"there are marketing businesses built on top of the idea that third parties can get access to data and user
information on Facebook."

Contents
[hide]

1 Storage of data

2 Potential dangers

2.1 Identity theft

2.2 Sexual predators

2.3 Stalking

2.4 Unintentional fame

2.5 Employment

2.6 Online Victimization

3 Privacy Concerns

4 Institutional concerns

4.1 Libraries

5 Response to criticism

6 See also

7 References

8 External links

Storage of data[edit]
Most social networking sites require users to agree to Terms of Use policy before they may use their
services. Controversially, these Terms of Use declarations that users must agree to often contain clauses
permitting social networking operators to store data on users, or even share it with third parties. Facebook
has attracted attention over its policies regarding data storage, such as making it difficult to delete an
account, holding onto data after an account is de-activated and being caught sharing personal data with
[3]
third parties.

Potential dangers[edit]
Identity theft[edit]
Due to the high volume of personal information often displayed on social networking sites, it is possible to
make further estimations about a user, such as the persons social security number, which can then be
[4]
used as part of identity theft. In response, various groups have advised that users either do not display
[5]
their birthday, or hide it from Facebook friends they do not personally know. Cases have also appeared
[6]
of users having photographs stolen from social networking sites in order to assist in identity theft. There
is little evidence that users of social networking sites are taking full measures to protect themselves from
[7]
identity theft. For example, numerous celebrities have claimed their Twitteraccounts have been hacked.

Sexual predators[edit]

Most major social networking sites are committed to ensuring that use of their services are as safe as
possible. However, due to the high content of personal information placed on social networking sites, as
well as the ability to hide behind a pseudo-identity, such sites have become increasingly popular for
sexual predators. In 2009, it was revealed that MySpace had evicted 90, 000 registered sex offenders
[8]
from its site in the previous two years. However, it was also suggested that the majority of these simply
transferred to using the services provided by Facebook. In response to concerns, Facebook Help Center
has set up a system whereby users may notify on suspected sex offers which, if proven to be accurate,
[9]
will result in their account being terminated. While the numbers may remain small, it has been noted
that the number of sexual predators caught using social networking sites has been increasing, and has
[10]
now reached an almost weekly basis. A number of highly publicised cases have demonstrated the
threat posed for users, such as Peter Chapman who, under a false name, added over 3, 000 friends and
[11]
went on to rape and murder a 17 year old girl in 2009. A 12 year old, Evergreen girl was safely found
by the FBI with the help of Facebook; due to her mother learning of her daughter's conversation with a
[12]
man she had met on the popular social networking website.

Stalking[edit]
The potential ability for stalking users on social networking sites has been noted. A study of Facebook
profiles from students at Carnegie Mellon University revealed that about 800 profiles included current
resident and at least two classes being studied, theoretically allowing viewers to know the precise location
[4]
of individuals at specific times. AOL attracted controversy over its instant messenger AIM which permits
[4]
users to add buddies without their knowing, and therefore track when a user is online. Concerns have
also been raised over the relative ease for people to read private messages or e-mails on social
[13]
networking sites.

Unintentional fame[edit]
Privacy concerns have also been raised over a number of high profile incidents which can be considered
embarrassing for users. Various internet memes have been started on social networking sites, or been
used as a means towards their spread across the internet. In 2002, a Canadian teenager became known
as the Star Wars Kid after a video of him using a golf club as a light sabre was posted on the internet
without his consent. The video quickly became a hit, much to the embarrassment of the teenager who
[14]
claims to have suffered as a result. Along with other incidents of videos being posted on social
networking sites, this highlights the ability for personal information to be rapidly transferred between
users.

Employment[edit]
Issues relating to privacy and employment are becoming a concern with regards to social networking
sites. As of 2008, it has been estimated by CareerBuilder.com that one in five employers search social
[15]
networking sites in order to screen potential candidates (increasing from only 11% in 2006). For the
majority of employers, such action is to acquire negative information about candidates. For example, 41%
of managers considered information relating to candidates alcohol and drug use to be a top
[15]
concern. Other concerns investigated via social networking sites included poor communication skills,
inappropriate photographs, inaccurate qualifications and bad-mouthing former
[15]
employers/colleagues. However, 24% manager claimed that information found on a social networking
site persuaded them to hire a candidate, suggesting that a user image can be used in a positive way.

While there is little doubt that employers will continue to use social networking sites as a means of
monitoring staff and screening potential candidates, it has been noted that such actions may be illegal
under in jurisdictions. According to Workforce.com, employers who use Facebook or Myspace could
potentially face legal action:
If a potential employer uses a social networking site to check out a job candidate and then rejects that
[16]
person based on what they see, he or she could be charged with discrimination. On August 1, 2012,
Illinois joined the state of Maryland (law passed in March 2012) in prohibiting employer access to social
media web sites of their employees and prospective employees. A number of other states that are also
considering such prohibitory legislation (California, Delaware, Massachusetts, Michigan, Minnesota,
Missouri, New Jersey, New York, Ohio, South Carolina and Washington), as is the United States
Congress. In April 2012, the Social Networking Online Protection Act (2012 H.R. 5050) was introduced in
the United States House of Representatives, and the Password Protection Act of 2012 (2012 S. 3074)
was introduced in the United States Senate in May 2012, which prohibit employers from requiring access
[17]
to their employees social media web sites.
Monitoring of social networking sites is not limited to potential workers. Issues relating to privacy are
becoming an increasing concern for those currently in employment. A number of high profile cases have
appeared in which individuals have been sacked for posting comments on social networking which have
been considered disparaging to their current employers or fellow workers. In 2009, sixteen year old
Kimberley Swann was sacked from her position at Ivell Marketing and Logistics Limited after describing
[18]
her job as boring. In 2008, Virgin Atlantic sacked thirteen cabin crew staff, after it emerged they used
[19]
had criticised the companys safety standards and called passengers chavs on Facebook. While
employers may have found such usages of social networking sites convenient, complaints have been put
forward by civil liberties groups and trade unions on the invasive approach adopted by many employers.
In response to the Kimberley Swann case, Brendan Barber, of the TUC union stated that:
Most employers wouldn't dream of following their staff down the pub to see if they were sounding off
about work to their friends," he said. "Just because snooping on personal conversations is possible these
days, it doesn't make it healthy."
Monitoring of staffs social networking activities is also becoming an increasingly common method of
ensuring that employees are not browsing websites during work hours. It was estimated in 2010 that an
average of two million employees spent over an hour a day on social networking sites, costing potentially
[20]
14 billion.

Online Victimization[edit]
Social networks are designed for individuals to socially interact with other people over the Internet.
However, some individuals engaged in undesirable online social behaviors creating negative impacts on
other peoples online experiences. It has created a wide range of online interpersonal victimization. Some
studies have shown that social network victimization appears largely in adolescent and teens, and the
[21]
type of victimizations includes sexual advances and harassments.
Recent research has reported
[22]
approximately 9% of online victimization involves in social network activities.
It has been noted that
[23]
many of these victims are girls who have sexually appealed over these social network sites. Research
concludes that many of social network victimizations are associated with user behaviors and interaction
with one another. Negative social behaviors such as aggressive attitudes and discussing sexual related

[24]

topics motivate the offenders to achieve their goals.


All in all, positive online social behaviors is
promoted to help reduce and avoid online victimization.

Privacy Concerns[edit]
Twitter has admitted that they have scanned and imported their user's phone contacts onto the website
database in order to learn more about their users. Most users were unaware that Twitter is created this
way for new users to search for their friends. Twitter has stated that they will have their privacy guidelines
[25]
illustrated more clearly in the future.
More than 1,000 companies are waiting in line to get access to millions of tweets from users that are
using the popular social networking website. Companies believe that by using data mining technologies
[26]
they would be able to gather important information that can be used for marketing and advertising.

Institutional concerns[edit]
A number of institutions have expressed concern over the lack of privacy granted to users on social
networking sites. These include schools, libraries, and Government agencies.

Libraries[edit]
Libraries in the particular, being concerned with the privacy of individuals, have debated on allowing
library patrons to access social networking sites on public library computers. While only 19% of librarians
reportedly express real concern over social networking privacy, they have been particularly vocal in
[27]
voicing their concerns. Some have argued that the lack of privacy found on social networking sites is
contrary to the ethics supported by Library organisations, and the latter should thus be extremely
[27]
apprehensive about dealing with the former. Supporters of this view present their argument from the
code of ethics held by both the American Library Association and the UK based Chartered Institute of
Library and Information Professionals, which affirms a commitment to upholding privacy as a fundamental
[27]
right. In 2008, a study was performed in fourteen public libraries in the UK which found that 50%
[28]
blocked access to social networking sites. Many school libraries have also blocked Facebook out of
fear that children may be disclosing too much information on Facebook. However, as of 2011, Facebook
[29]
has taken efforts to combat this concern by deleting profiles of users under the age of thirteen.

Response to criticism[edit]
Many social networking organisations have responded to criticism and concerns over privacy. It is
claimed that changes to default settings, the storage of data and sharing with third parties have all been
[30]
updated and corrected in the light of criticism, and/or legal challenges. However, many critics remain
unsatisfied, noting that fundamental changes to privacy settings in many social networking sites remain
minor, and argue that social networking companies prefer to criticise users rather than adapt their
[31]
policies.

See also[edit]

Social networking service

Information privacy

Social media

Facebook

Myspace

Criticism of Facebook

Unauthorized access in online social networks

References[edit]
1.

^ Jump up to:

a b c

Gross, R. and Acquisti, A. 2005. Information Revelation and Privacy in Online Social

Networking Sites (The Facebook Case).[online]. p. 2. Available


at:http://www.heinz.cmu.edu/~acquisti/papers/privacy-facebook-gross-acquisti.pdf [Accessed 24 April
2011].
2.

Jump up^ Kelly, S. Identity at risk on Facebook. BBC News. [online]. Available
at: http://news.bbc.co.uk/1/hi/programmes/click_online/7375772.stm [Accessed 25 April 2011].

3.

Jump up^ Bangeman, E. 2010. Report: Facebook caught sharing secret data with advisers. [online].
Available at: http://arstechnica.com/tech-policy/news/2010/05/latest-facebook-blunder-secret-data-sharingwith-advertisers.ars [Accessed 25 April 2011]

4.

^ Jump up to:

a b c

Gross, R. and Acquisti, A. 2005. Information Revelation and Privacy in Online Social

Networking Sites (The Facebook Case).[online]. p. 8. Available


at:http://www.heinz.cmu.edu/~acquisti/papers/privacy-facebook-gross-acquisti.pdf [Accessed 24 April
2011].
5.

Jump up^ myID.com. 2011. Social Network Profiles Help Identity Thieves Guess Your Social Security
Number. [online]. Available at: http://www.myid.com/social-network-profiles-help-thieves-guess-your-socialsecurity-number. [Accessed 25 April 2011]

6.

Jump up^ MSNBC. 2011. Kids pictures on Facebook exposes them to identity theft. [online]. Available
at: http://www.msnbc.msn.com/id/42593880/ns/local_news-bakersfield_ca/ [Accessed 25 April 2011]

7.

Jump up^ myers, alexandra. "After a Twitter hack, biebermyballs becomes a popular hashtag". daily
caller. Retrieved 30 March 2012.

8.

Jump up^ Schonfield. E. 2009. Thousands Of Myspace Sex Offender Refugees Found On Facebook.
[online]. Available at: http://techcrunch.com/2009/02/03/thousands-of-myspace-sex-offender-refugeesfound-on-facebook/ [Accessed: 24 April 2011]

9.

Jump up^ Facebook Help Center. 2011. How can I report a convicted sex offender? [online]. Available at:
www.facebook.com/help/?faq=15160 [Accessed 24 April 2011]

10. Jump up^ Randall, D. and Richards, V. Facebook can ruin your life. And so can Myspace, Bebo. The
Independent [online]. Available at: http://www.independent.co.uk/life-style/gadgets-andtech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html. [Accessed 24 April 2011]

11. Jump up^ Smith, C. 2010. Serial Sex Offender Admits Using Facebook To Rape and Murder Teen. The
Huffington Post. [online]. Available at: http://www.huffingtonpost.com/2010/03/08/peter-chapman-admitsusin_n_489674.html [Accessed 24 April 2011]
12. Jump up^ davis, jesse. "Missing Evergreen girl found safe near Las Vegas". Retrieved 30 March 2012.
13. Jump up^ Malone, S. 2005. CLARIFICATION: AOL Instant messenger users waive right to privacy.
[online]. Available at: http://www.pcpro.co.uk/news/70262/clarification-aol-instant-messenger-users-waiveright-to-privacy [Accessed 24 April 2011]
14. Jump up^ Bennet, J. n.d. Internet Memes. [online]. Available at: http://2010.newsweek.com/top-10/internetmemes/the-star-wars-kid.html [Accessed 25 April 2011]
15. ^ Jump up to:

a b c

Havenstein, H. 2008. One in five employers uses social networks in hiring process.

[online]. Available
at:http://www.computerworld.com/s/article/9114560/One_in_five_employers_uses_social_networks_in_hirin
g_process [Accessed 24 April 2011]
16. Jump up^ Bowers, T. 2008. Employers who check out job candidates on MySpace could be legally liable.
[online]. Available at: http://www.techrepublic.com/blog/career/employers-who-check-out-job-candidates-onmyspace-could-be-legally-liable/338 [Accessed 24 April 2011]
17. Jump up^ "Illinois Becomes Second State to Prohibit Employers from Requiring Access to Employees and
Prospective Employees Social Media Web Sites". The National Law Review. 2012-08-23. Retrieved 201208-23.
18. Jump up^ Sky News. 2009. Sacked for Calling Job Boring on Facebook. [online]. Available
at: http://news.sky.com/skynews/Home/UK-News/Facebook-Sacking-Kimberley-Swann-From-ClactonEssex-Sacked-For-Calling-Job-Boring/Article/200902415230508 [Accessed 24 April 2011]
19. Jump up^ BBC News. 2008. Crew sacked over Facebook posts. Available
at: http://news.bbc.co.uk/1/hi/uk/7703129.stm [Accessed 24 April 2011]
20. Jump up^ Roythornes Solicitors. 2011. The employment law dangers of Social Networking. [online].
Available at: http://www.opportunitypeterborough.co.uk/bondholder/events/the-employment-law-dangers-ofsocial-networking [Accessed 24 April 2011]
21. Jump up^ Henson, Bill; Reynes W. Reyns & Bonnie S. Fisher (3). "Security in the 21st century: examining
the link between online social network activity, privacy, and interpersonal victimization". Criminal Justice
Review 36 (253). doi:10.1177/0734016811399421. Retrieved 29 March 2013.
22. Jump up^ Henson, Bill; Reynes W. Reyns & Bonnie S. Fisher (3). "Security in the 21st century: examining
the link between online social network activity, privacy, and interpersonal victimization". Criminal Justice
Review 36 (253). doi:10.1177/0734016811399421. Retrieved 29 March 2013.

23. Jump up^ Henson, Bill; Reynes W. Reyns & Bonnie S. Fisher (3). "Security in the 21st century: examining
the link between online social network activity, privacy, and interpersonal victimization". Criminal Justice
Review 36 (253). doi:10.1177/0734016811399421. Retrieved 29 March 2013.
24. Jump up^ Henson, Bill; Reynes W. Reyns & Bonnie S. Fisher (3). "Security in the 21st century: examining
the link between online social network activity, privacy, and interpersonal victimization". Criminal Justice
Review 36 (253). doi:10.1177/0734016811399421. Retrieved 29 March 2013.
25. Jump up^ "Twitter admits peeking at address books, announces privacy improvements". sky news. 16
February 2012. Retrieved 30 March 2012.
26. Jump up^ gladdis, keith. "Twitter secrets for sale: Privacy row as every tweet for last two years is bought
up by data firm". London: daily mail. Retrieved 30 March 2012.
27. ^ Jump up to:

a b c

Fernandez, P. 2009. Online Social Networking Sites and Privacy: Revisiting Ethical

Considerations for a New Generation of Technology. [online]. Available


at:http://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1250&context=libphilprac [Accessed 25 April
2011]
28. Jump up^ McMenemy, D. 2008. Internet access in UK public libraries: notes and queries from a small
scale study [abstract only]. Library Review [online]. Available
at:http://www.emeraldinsight.com/journals.htm?issn=00242535&volume=57&issue=7&articleid=1740622&show=html [Accessed 25 April 2011]
29. Jump up^ Smith, C. 2011. Facebook Removes 20, 000 Underage Users Every Day. The Huffington Post.
[online]. Available at: [1] [Accessed 25 April 2011]
30. Jump up^ Shepherd and Wedderburn. 2010. Facebook amend privacy settings following an unpleasant
poke from EU privacy protectors. [online]. Available at:http://www.shepwedd.co.uk/knowledge/article/10952831/facebook-amend-privacy-settings-following-an-unpleasant-poke-from-eu-privacyprotectors/archive/?page=1 [Accessed 25 April 2011]
31. Jump up^ Saint, N. 2010. Facebooks Response to Privacy Concerns: If youre not Comfortable Sharing,
Dont. [online]. Available at: http://www.businessinsider.com/facebooks-response-to-privacy-concerns-ifyoure-not-comfortable-sharing-dont-2010-5 [Accessed 25 April 2011]

Web-based social networks have become popular as a medium for disseminating information and connecting likeminded people. The public accessibility of such networks with the ability to share opinions, thoughts, information,
and experience offers great promise to enterprises and governments. In addition to individuals using such
networks to connect to their friends and families, governments and enterprises have started exploiting these
platforms for delivering their services to citizens and customers. However, the success of such attempts relies on
the level of trust that members have with each other as well as with the service provider. Therefore, trust becomes
an essential and important element of a successful social network. In this article, we present the first
comprehensive review of social and computer science literature on trust in social networks. We first review the
existing definitions of trust and define social trust in the context of social networks. We then discuss recent works
addressing three aspects of social trust: trust information collection, trust evaluation, and trust dissemination.
Finally, we compare and contrast the literature and identify areas for further research in social trust.

You might also like