scholarly journals Blurring the line between publicity and privacy on social media and the privacy paradox

Author(s):  
L. V. Chesnokova

The article examines the situation associated with the spread of social networks, which brought not only new communication opportunities, but also the risks of blurring the boundaries between privacy and publicity. People voluntarily share personal data in exchange for public acceptance. This information is recorded and studied by various government and commercial institutions. The danger to information privacy as a right to control access to personal information is aggravated by the peculiarities of online communication, which is characterized by “context collapse”: the merging of different audiences with different norms and values. Content posted on social media is searchable beyond a specific point in time and situation. If offline communication involves a foreseeable number of interlocutors, there is an “invisible audience” on social networks, which leads to information asymmetry. However, despite the fact that most users are aware of the potential dangers of privacy breaches, they share personal information on social networks. This phenomenon is called the privacy paradox. The reasons for this behavior are a lack of technical and social skills, a reluctance to spend time and energy on measures to minimize risks, a desire to have wide social connections and skepticism about the effectiveness of the efforts being made. The behavior of users on social networks is influenced primarily by factors such as age and education. The most concerned about the preservation of privacy are young people and middle-aged people, as they have to manage the most complex social relations.

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Heather J. Parker ◽  
Stephen Flowerday

Purpose Social media has created a new level of interconnected communication. However, the use of online platforms brings about various ways in which a user’s personal data can be put at risk. This study aims to investigate what drives the disclosure of personal information online and whether an increase in awareness of the value of personal information motivates users to safeguard their information. Design/methodology/approach Fourteen university students participated in a mixed-methods experiment, where responses to Likert-type scale items were combined with responses to interview questions to provide insight into the cost–benefit analysis users conduct when disclosing information online. Findings Overall, the findings indicate that users are able to disregard their concerns due to a resigned and apathetic attitude towards privacy. Furthermore, subjective norms enhanced by fear of missing out (FOMO) further allows users to overlook potential risks to their information in order to avoid social isolation and sanction. Alternatively, an increased awareness of the personal value of information and having experienced a previous privacy violation encourage the protection of information and limited disclosure. Originality/value This study provides insight into privacy and information disclosure on social media in South Africa. To the knowledge of the researchers, this is the first study to include a combination of the theory of planned behaviour and the privacy calculus model, together with the antecedent factors of personal valuation of information, trust in the social media provider, FOMO.


2018 ◽  
Vol 10 (4) ◽  
pp. 16
Author(s):  
George Bouchagiar

After having shifted from Web 1.0 to Web 2.0, scientists welcome the advent of Web 3.0, an environment where meaning is added to data. While in the Semantic Web people are no longer users, but part of the emerging applications, producers, subjects and beneficiaries of the Big Data, however, opaque processing of personal data poses tremendous risks and dangers for individuals. Given the new era of Big Data this paper studies firms’ purposes and practices to detect some emerging privacy risks. Moreover, theories that deal with social networks are examined to conclude that, even if people state that they value their privacy, however, they often disclose a huge volume of personal information. Taking into account that today’s European concept of privacy is conceptualized in negative terms this paper also proposes the implementation of trust and loyalty into the privacy concept through flexible fiduciary laws. Furthermore, data portability is discussed to detect its potential as a strategic feature, a key tool that will enhance trust. Finally, further scenarios and proposals are submitted, in our attempt to answer the question whether the European concept of privacy could be re-shaped for the benefit of individuals.


Author(s):  
Venetis Kanakaris ◽  
Georgios Lampropoulos ◽  
Kerstin Siakas

Nowadays, social media and social networks are increasingly used in business as they have drastically changed the way the community works, communicates, collaborates, socialises, creates content and shares knowledge and ideas. However, in particular, IT professionals and practitioners need to be aware of online security and privacy issues and the potential negative impact that they may cause on different aspects of business, such as online breaches or information theft. The use of social media inevitably leads to disclosure of personal information, with the use of open-source intelligence (OSINT) and other similar techniques. Hence, the aim of this article is twofold, namely first to show results of a survey towards future Greek IT practitioners regarding awareness and viewpoints of social media users concerning security and privacy on social media. More specifically the study was based on responses and viewpoints of 178 Greek electrical engineering and IT students to an online questionnaire. Secondly, the aim is also to show how easily a potential malicious user can anonymously track and retrieve sensitive personal information in an automated and undetectable way from popular social media platforms by using publicly available information, resources, and tools. The results of the survey show that most of the respondents are aware of the privacy settings of the social media platforms they use. However, they consider that they should be more careful concerning personal data and whom they add as friends or followers and they do not feel comfortable with the fact that a stranger might be able to access their personal information through their publications on social media platforms.The case study indicates that it is possible for malicious users to acquire sensitive personal data (e.g. user's location via tweets and instas from smartphones). In addition, the ability to map activity could allow malicious users to track the activities of unsuspected users and predict their future locations.


Author(s):  
Mykola O. Yankovyi ◽  
Hanna V. Foros ◽  
Hanna V. Zaiets ◽  
Olena I. Pluzhnik

The purpose of the work was to identify the main legal parameters of modern information. As material sources of research at work, not only the Ukrainian regulations in the field of medical relations information are used, but also relevant innovations in the legal regulation of medical information relations, which are produced in the countries of the European Union. It is established that in the normative legal acts of Ukraine, unlike in European legislation, there is no division of information about an individual into general data and vulnerable personal data. The laws of Ukraine do not contain the notion of "public figure", whose limits of criticism, according to the European Court of Human Rights, are broader for an ordinary person. Among the main conclusions, it stands out that, in order to guarantee the freedoms and rights of citizens, it is necessary in the regulations to classify groups, lists of personal data and access to them based on the secret classification to avoid ambiguities. The materials in the article have practical value for graduates of higher education institutions of police and medical specialties, among others.


2018 ◽  
Vol 7 (1.7) ◽  
pp. 142
Author(s):  
Hemalatha D ◽  
Almas Begum ◽  
Alex David S

Presently, the growth of Social media is explosive among the users. Increasingly developed social websites like Flickr, Facebook, Google+, LinkedIn etc permits the users to create, share and view the post. Confidentiality is a leading factor required in Social Networks. The social users upload their photos to the social sites that intend to gain public interest for social purposes. The exposure of personal information leads to slipping process like identity stealing, morphing etc, which are against the privacy violations. Relied upon the personal characteristics of users, the privacy settings of each user should be defined. In this paper, a relational study about the privacy settings in Online Social structure is examined. Initiated by the importance of social networks among the social users and their behavior towards Online Social Networks, which is followed by the privacy techniques suggested by other researchers are explored. At last, an overview about the merits and demerits of privacy designs and schemes for the user-uploaded images are presented. The study results a new privacy system that controls the confidential information from being accessed from different devices, including mobile devices and computers.


2016 ◽  
Vol 20 (3) ◽  
pp. 845-861 ◽  
Author(s):  
Alexandre Fortier ◽  
Jacquelyn Burkell

Earlier research using qualitative techniques suggests that the default conception of online social networks is as public spaces with little or no expectation of control over content or distribution of profile information. Some research, however, suggests that users within these spaces have different perspectives on information control and distribution. This study uses Q methodology to investigate subjective perspectives with respect to privacy of, and control over, Facebook profiles. The results suggests three different types of social media users: those who view profiles as spaces for controlled social display, exerting control over content or audience; those who treat their profiles as spaces for open social display, exercising little control over either content or audience; and those who view profiles as places to post personal information to a controlled audience. We argue that these different perspectives lead to different privacy needs and expectations.


Author(s):  
Håvard Bergesen Dalen ◽  
Ørnulf Seippel

Young athletes value their social relations in sports, and these social relations can have consequences when it comes to joining, continuing, and quitting sports. Yet the important question of how social relations in sports develop has not yet been adequately answered. Hence, we investigated how athletes’ social relations in sports depend on social relations outside of sports: in leisure, school, and social media. A total of 387 athletes (aged 16–19) from 30 Norwegian sports groups completed a survey on electronic tablets. We asked how social relations in leisure, school, and social media—through the social mechanisms of contact, homophily, and contagion—influenced social relations in sports. We also controlled for the effect of exercise frequency and duration (years) of contact in sports. Exponential random graph modelling (ERGM) analyses showed that first and foremost, relations from social media and leisure, but also school networks and exercise frequency, influence sports networks. This study shows that social relations in sports are diverse and depend on social relations outside sports. We discuss how this has ‘counterintuitive’ consequences for sports participation, particularly the importance of supporting athletes’ social relations outside of sports for the strengthening of social relations within sports when addressing challenges concerning recruitment, continuation, and dropout from sports.


2018 ◽  
Vol 10 (4) ◽  
pp. 1632
Author(s):  
George Bouchagiar

After having shifted from Web 1.0 to Web 2.0, scientists welcome the advent of Web 3.0, an environment where meaning is added to data. While in the Semantic Web people are no longer users, but part of the emerging applications, producers, subjects and beneficiaries of the Big Data, however, opaque processing of personal data poses tremendous risks and dangers for individuals. Given the new era of Big Data this paper studies firms’ purposes and practices to detect some emerging privacy risks. Moreover, theories that deal with social networks are examined to conclude that, even if people state that they value their privacy, however, they often disclose a huge volume of personal information. Taking into account that today’s European concept of privacy is conceptualized in negative terms this paper also proposes the implementation of trust and loyalty into the privacy concept through flexible fiduciary laws. Furthermore, data portability is discussed to detect its potential as a strategic feature, a key tool that will enhance trust. Finally, further scenarios and proposals are submitted, in our attempt to answer the question whether the European concept of privacy could be re-shaped for the benefit of individuals.


2019 ◽  
Vol 2 (2) ◽  
pp. 25-33 ◽  
Author(s):  
N. A. Yushkina ◽  
M. A. Panarina

With the spread of online communication, more and more attempts are being made to study it as a process occurring in different discursive spaces. In the article, using the example of a single message hosted on several social networks, the discursive conditions and the possibilities of various social media to influence the content of the meanings, created within their environment, have been analyzed. The subject of the research was the discursive characteristics of representations of a single message in various social networks. The purpose of the paper is presentation of a theoretical and methodological approach for cross-platform analysis of social media discourse, which, if desired, can be expanded on a larger data file, taking into account the results of the qualitative critical discourse analysis of the case introduced. The method of critical discourse analysis (CDA) has been used, which allows you to identify and analyze social structures in the framework of dialectical relationships. In the course of the study and analysis, it was revealed, that even in the case, when using the variable capabilities of various social networks to create and transmit meanings is not a deliberate strategy of a single institution, its messages were filled with different semantic content, which means, that they have different convincing and legitimizing opportunities. This was due to the inability to avoid certain conditions of production, creation and distribution of content, set by the policy of social networks. Social network, as a communicative space, creates a mode of production, distribution and consumption of content, and in this mode, communication is already carried out. Due to the specific features of each network, one can say, that they create different discursive spaces.


2021 ◽  
Vol 19 ◽  
pp. 191-211
Author(s):  
Dumitrela Florentina Cantor ◽  
Mihaela Rus ◽  
Tănase Tasențe

From year to year, the role of Social Media has become increasingly important. In this context, public institutions in Romania have started to use social networks more and more often, in order to increase the interest of citizens for interaction through social media. Usually, online communication channels do not replace other means of communication, but offer the advantage of the large number of users who are increasingly active in these social networks. Also, public institutions maintain a close relationship with the media, given the fact that it can be a good channel of communication with citizens. Through this communication channel, they build a favorable image and make the activity of public administration transparent, which leads to an improvement in the relationship with citizens. Therefore, the relations of public institutions with the media are materialized through the organization of press conferences, through press releases or interviews with public administration leaders.


Sign in / Sign up

Export Citation Format

Share Document