scholarly journals Affective, Behavioral, and Cognitive Aspects of Teen Perspectives on Personal Data in Social Media: A Model of Youth Data Literacy

Author(s):  
Yu Chi ◽  
Wei Jeng ◽  
Amelia Acker ◽  
Leanne Bowler
2015 ◽  
Vol 67 (1) ◽  
pp. 94-115 ◽  
Author(s):  
David Haynes ◽  
Lyn Robinson

Purpose – The purpose of this paper is to identify the risks faced by users of online social networking services (SNSs) in the UK and to develop a typology of risk that can be used to assess regulatory effectiveness. Design/methodology/approach – An initial investigation of the literature revealed no detailed taxonomies of risk in this area. Existing taxonomies were reviewed and merged with categories identified in a pilot survey and expanded in purposive sample survey directed at the library and information services (LIS) community in the UK. Findings – Analysis of the relationships between different risk categories yielded a grouping of risks by their consequences. This aligns with one of the objectives of regulation, which is to mitigate risks. Research limitations/implications – This research offers a tool for evaluation of different modes of regulation of social media. Practical implications – Awareness of the risks associated with use of online SNSs and wider social media contributes to the work of LIS professionals in their roles as: educators; intermediaries; and users of social media. An understanding of risk also informs the work of policy makers and legislators responsible for regulating access to personal data. Originality/value – A risk-based view of regulation of personal data on social media has not been attempted in such a comprehensive way before.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Heather J. Parker ◽  
Stephen Flowerday

Purpose Social media has created a new level of interconnected communication. However, the use of online platforms brings about various ways in which a user’s personal data can be put at risk. This study aims to investigate what drives the disclosure of personal information online and whether an increase in awareness of the value of personal information motivates users to safeguard their information. Design/methodology/approach Fourteen university students participated in a mixed-methods experiment, where responses to Likert-type scale items were combined with responses to interview questions to provide insight into the cost–benefit analysis users conduct when disclosing information online. Findings Overall, the findings indicate that users are able to disregard their concerns due to a resigned and apathetic attitude towards privacy. Furthermore, subjective norms enhanced by fear of missing out (FOMO) further allows users to overlook potential risks to their information in order to avoid social isolation and sanction. Alternatively, an increased awareness of the personal value of information and having experienced a previous privacy violation encourage the protection of information and limited disclosure. Originality/value This study provides insight into privacy and information disclosure on social media in South Africa. To the knowledge of the researchers, this is the first study to include a combination of the theory of planned behaviour and the privacy calculus model, together with the antecedent factors of personal valuation of information, trust in the social media provider, FOMO.


2021 ◽  
Vol 6 (22) ◽  
pp. 36-44
Author(s):  
Nor ‘Adha Ab Hamid ◽  
Azizah Mat Rashid ◽  
Mohd Farok Mat Nor

The development of science and technology is always ahead and has no point and seems limitless. Although human beings are the agents who started this development but eventually faced with a bitter situation which can sacrifice human moral, right and interest of our future. Shariah criminal offenses nowadays can not only occur or be witnessed by a person in a meeting physically with the perpetrator. As a result of technological developments, such behavior can occur and can be witnessed in general by larger groups. Although the illegal treatment which is not in accordance with sharia law and the moral crisis issues happening surrounding us and is rampant on social media, no enforcement is done on perpetrators who use social media medium. According to sharia principles, something that is wrong should be prevented and it is the responsibility of all Muslim individuals. But what is happening today, some Shariah criminal behavior, especially in relation to ethics, can occur easily using facilities technology driven by technological ingenuity. If the application of existing legal provisions is limited and has obstacles for enforcement purposes, then the problem needs to be overcome due to development the law should be in line with current developments. The study aims to identify a segment and cases of the moral crisis on social media and online using the artificial intelligence (AI) application and to identify the needs for shariah prevention. This thesis uses qualitative approaches, adopts library-based research, and, by content analysis of documents, applies the literature review approach. The findings show that the use of social media and AI technology has had an impact on various issues such as moral crisis, security, misuse, an intrusion of personal data, and the construction of AI beyond human control. Thus, the involvement and cooperation of various parties are needed in regulating and addressing issues that arise as a result of the use of social media and AI technology in human life.


2021 ◽  
Vol 2 (2) ◽  
pp. 238-242
Author(s):  
Aziz Muhaimin ◽  
Ni Made Jaya Senastri ◽  
Ni Made Sukaryati Karma

11 the progress of the modern era today where the development of internet technology,SMS and social media becomethe main thing in every need of society in socializing and conductingpromotionsat an affordablecost andfast in reaching consumers,so that indirectlythe exchange ofpersonaldata informationthat is not known by service users who are often misused by irresponsiblepeople. Which in practiceis to use SMSBroadcast which is one method of sending messagesto many numbers from one source with the same message with one number to another consumer number. From the statement, there are 2 problems, namely How to set the law of telecommunicationservice users in the field of advertising and How to protectthe lawfor consumers with the existence ofpersonaldata breaches through SMS Broadcast.The method to be used is a method of normative legal research. The conclusion outlines that Article I of the Consumer Protection Law Serves as the legal basis for the protection of telecommunication service users, while in Article 26 of the /TE Law is used as the legal basis for the use of personal data, which in this case is SMS Broadcast


Author(s):  
Kellyton dos Santos Brito ◽  
Frederico Araujo Durao ◽  
Vinicius Cardoso Garcia ◽  
Silvio Romero de Lemos Meira
Keyword(s):  

2016 ◽  
pp. 779-788
Author(s):  
Pitsou Anastasia

In this chapter, the authors discuss public policies of stigmatization and fascitization. In Greece, HIV-positive women have been imprisoned while their personal data have been published in newspapers and the social media aiming to inform citizens and to protect public health.


Author(s):  
Daniela Stockmann

In public discussions of social media governance, corporations such as Google, Facebook, and Twitter are often first and foremost seen as providers of information and as media. However, social media companies’ business models aim to generate income by attracting a large, growing, and active user base and by collecting and monetising personal data. This has generated concerns with respect to hate speech, disinformation, and privacy. Over time, there has been a trend away from industry self-regulation towards a strengthening of national-level and European Union-level regulations, that is, from soft to hard law. Hence, moving beyond general corporate governance codes, governments are imposing more targeted regulations that recognise these firms’ profound societal importance and wide-reaching influence. The chapter reviews these developments, highlighting the tension between companies’ commercial and public rationales, critiques the current industry-specific regulatory framework, and raises potential policy alternatives.


Author(s):  
Venetis Kanakaris ◽  
Georgios Lampropoulos ◽  
Kerstin Siakas

Nowadays, social media and social networks are increasingly used in business as they have drastically changed the way the community works, communicates, collaborates, socialises, creates content and shares knowledge and ideas. However, in particular, IT professionals and practitioners need to be aware of online security and privacy issues and the potential negative impact that they may cause on different aspects of business, such as online breaches or information theft. The use of social media inevitably leads to disclosure of personal information, with the use of open-source intelligence (OSINT) and other similar techniques. Hence, the aim of this article is twofold, namely first to show results of a survey towards future Greek IT practitioners regarding awareness and viewpoints of social media users concerning security and privacy on social media. More specifically the study was based on responses and viewpoints of 178 Greek electrical engineering and IT students to an online questionnaire. Secondly, the aim is also to show how easily a potential malicious user can anonymously track and retrieve sensitive personal information in an automated and undetectable way from popular social media platforms by using publicly available information, resources, and tools. The results of the survey show that most of the respondents are aware of the privacy settings of the social media platforms they use. However, they consider that they should be more careful concerning personal data and whom they add as friends or followers and they do not feel comfortable with the fact that a stranger might be able to access their personal information through their publications on social media platforms.The case study indicates that it is possible for malicious users to acquire sensitive personal data (e.g. user's location via tweets and instas from smartphones). In addition, the ability to map activity could allow malicious users to track the activities of unsuspected users and predict their future locations.


2018 ◽  
Vol 4 (3) ◽  
pp. 205630511878780 ◽  
Author(s):  
Luci Pangrazio ◽  
Neil Selwyn

Young people’s engagements with social media now generate large quantities of personal data, with “big social data” becoming an increasingly important “currency” in the digital economy. While using social media platforms is ostensibly “free,” users nevertheless “pay” for these services through their personal data—enabling advertisers, content developers, and other third parties to profile, predict, and position individuals. Such developments have prompted calls for social media users to adopt more informed and critical stances toward how and why their data are being used—that is, to build “critical data literacies.” This article reports on research that explores young social media users’ understandings of their personal data and its attendant issues. Drawing on research with groups of young people (aged 13–17 years), the article investigates the consequences of making third party (re)uses of personal data openly available for social media users to interpret and make critical sense of. The findings provide valuable insights into young people’s understandings of the technical, social, and cultural issues that underpin their ability to engage with, and make sense of, social media data. The article concludes by considering how research into critical data literacies might connect in more meaningful and effective ways with everyday lived experiences of social media use.


2020 ◽  
Vol 37 (3-4) ◽  
Author(s):  
Thea Grav Rosenberg ◽  
Ardis Storm-Mathisen ◽  
Kamilla Knutsen Steinnes ◽  
Henry Mainsah

SammendragDenne artikkelen diskuterer barns rett til deltagelse og beskyttelse på internett i relasjon til kommersielletredjepartsaktørers bruk av digitale persondata. Det tas utgangspunkt i FNs barnekonvensjon,norsk lovgivning, samt kvalitative og kvantitative funn fra en nylig gjennomført studieblant norske 15–18 åringer om personvern og markedsføring i sosiale medier. Datamaterialetbestod av fokusgruppeintervjuer, barns skjermdumper av markedsføring fra deres profiler isosiale medier og en landsrepresentativ spørreundersøkelse. Studien viser at barns deltakelsei sosiale medier skjer i et svært komplekst kommersielt landskap hvor de utsettes for skjultemarkedsføringsteknikker, skreddersydd reklame og ulovlig innhold. Diskusjonen løfter frem utfordringerog dilemmaer knyttet til økende kommersialisering av barns persondata, stereotypiskog diskriminerende syn på kjønn og plattformenes inngrep i barns privatliv. Det pekes på behovfor tilsyn av hvordan beskyttende regelverk og brukervilkår fungerer og gis eksempel på hvordansamarbeid med barn er viktig for bygging av relevant kunnskap, styrking av bevissthet og digitalkompetanse i denne sammenheng.Nøkkelord: barn, sosiale medier, markedsføring, personlige data, rettigheter, forbrukerkompetanse,stereotypier, diskrimineringCustomized to the child’s best interest? Privacy andmarketing on Norwegian children’s social media profilesAbstractThis article takes a closer look at conditions that influence Norwegian children’s need for provision, participation,and protection online and discusses these rights in relation to how third-party commercialactors use user data to customize content on social media. The discussion is based on the United NationsConvention on the Rights of the Child, Norwegian legislation and a study conducted in 2018 among 15–18year old Norwegian children on privacy and social media marketing (focus groups, visual material, and arepresentative survey). This study finds that children are subjected to a highly complex commercial landscapeconsisting of hidden marketing strategies, tailored advertising, and illegal content. Social media participationentails a continuous gathering and exploitation of children’s personal data by commercial actors.The discussion highlights challenges and issues related to increasing commercialization, stereotypical anddiscriminatory gender views, and risk of intrusion into children’s privacy. The need for protective regulationsand co-creational strategies with children to strengthen digital competence is also emphasized.


Sign in / Sign up

Export Citation Format

Share Document