scholarly journals Legal frameworks governing social data analytics and privacy concerns among social media users

2019 ◽  
Author(s):  
◽  
Youssef Ramzi Mansour

Big data is a relatively new concept that refers to the enormous amount of data generated in a new era where people are selling, buying, paying dues, managing their health and communicating over the internet. It becomes natural that generated data will be analyzed for the purposes of smart advertising and social statistical studies. Social data analytics is the concept of micro-studying users interactions through data obtained often from social networking services, the concept also known as “social mining” offers tremendous opportunities to support decision making through recommendation systems widely used by e-commerce mainly. With these new opportunities comes the problematic of social media users privacy concerns as protecting personal information over the internet has become a controversial issue among social network providers and users. In this study we identify and describe various privacy concerns and related platforms as well as the legal frameworks governing the protection of personal information in different jurisdictions. Furthermore we discuss the Facebook and Cambridge Analytica Ltd incident as an example.

2021 ◽  
pp. 074391562199967
Author(s):  
Raffaello Rossi ◽  
Agnes Nairn ◽  
Josh Smith ◽  
Christopher Inskip

The internet raises substantial challenges for policy makers in regulating gambling harm. The proliferation of gambling advertising on Twitter is one such challenge. However, the sheer scale renders it extremely hard to investigate using conventional techniques. In this paper the authors present three UK Twitter gambling advertising studies using both Big Data analytics and manual content analysis to explore the volume and content of gambling adverts, the age and engagement of followers, and compliance with UK advertising regulations. They analyse 890k organic adverts from 417 accounts along with data on 620k followers and 457k engagements (replies and retweets). They find that around 41,000 UK children follow Twitter gambling accounts, and that two-thirds of gambling advertising Tweets fail to fully comply with regulations. Adverts for eSports gambling are markedly different from those for traditional gambling (e.g. on soccer, casinos and lotteries) and appear to have strong appeal for children, with 28% of engagements with eSports gambling ads from under 16s. The authors make six policy recommendations: spotlight eSports gambling advertising; create new social-media-specific regulations; revise regulation on content appealing to children; use technology to block under-18s from seeing gambling ads; require ad-labelling of organic gambling Tweets; and deploy better enforcement.


Author(s):  
Tziporah Stern

Privacy, or the right to hold information about oneself in secret (Masuda, 1979; O’Brien & Yasnof, 1999), has become increasingly important in the information society. With the rapid technological advances and the digitalization of information, retrieval of specific records is more rapid; personal information can be integrated into a number of different data files; and copying, transporting, collecting, storing, and processing large amounts of information is easier. Additionally, the advent of the World Wide Web and the fast-paced growth of the Internet have created further cause for concern. The vast amounts of digital information and the pervasiveness of the Internet facilitate new techniques for gathering information—for example, spyware, phishing, and cookies. Hence, personal information is much more vulnerable to being inappropriately used. This article outlines the importance of privacy in an e-commerce environment, the specific privacy concerns individuals may have, antecedents to these concerns, and potential remedies to quell them.


2015 ◽  
pp. 1053-1075
Author(s):  
Hongwei “Chris” Yang

A paper survey of 489 Chinese college students was conducted in spring, 2012 to test a conceptual model of online information disclosure in social media. It shows that young Chinese SNS users' prior negative experience of online disclosure significantly increased their online privacy concerns and their perceived risk. Their online privacy concerns undermined their trust of online companies, marketers and laws to protect privacy and elevated their perceived risk. Their trust strongly predicted their intent to disclose the lifestyle and sensitive information. Their online privacy concerns only inhibited them from disclosing sensitive information in social media. However, their prior negative experience did not directly predict their intent of self-disclosure on SNS. Implications for academia and industry are discussed.


2018 ◽  
Vol 3 (4) ◽  
pp. 19-24
Author(s):  
Nur Khairani Kamarudin ◽  
Nur Nazifa Md Hasani ◽  
Rafiza Ruslan ◽  
Rashidah Ramle ◽  
Nurul Hidayah Ahmad Zukri ◽  
...  

People in this new era of modernization nowadays take Internet as one of the vital thing for daily activities. Internet is not only for adults, it is also a needs for people of all ages. However, network vulnerabilities exist in all network that are connec ted to the Internet. The network mostly are exposed to the malicious software or mostly known as malware. In fact, this malware is growing rapidly and giving a bad impact to the human intervention. The number of attack are increasing rapidly and it comes i n various way just to exploit the victims. There are various type of malware attack. For instance, viruses, worms, spyware, rootkits, Trojan horse and botnet are considered as noteworthy threat for the computer network. Some people giving full confidence on the security of data transmission to the network. However, other can access the personal information without them realizing it. The objective of this paper is to detect malware attack using honeypot Dionaea. Malicious file launched was detected by the honeypot and the file was analyzed by using the sandbox tool, Virus Total. This paper found that honeypot Dionaea is helpful in detecting various types of malware attack.


2016 ◽  
Vol 149 (5) ◽  
pp. 45-49 ◽  
Author(s):  
Yogeswari Suppiah ◽  
Raja Mohd ◽  
Mohd Fahmi

Author(s):  
Ikbal Maulana

This chapter explores social media for knowledge workers. Social media enables people to connect with others beyond their physical social circle. Constraints of space and time, as well as class boundaries, can easily be overcome by the use of social media. Socializing through social media is not merely the virtual version of physical socialization. It allows for different kinds of social interactions. The preservation of expression allows asynchronous communication and learning what others have written, which in turn shows one their interests and identities. The mostly simple and short messages cannot, however, accommodate the sophisticated information, which knowledge workers usually create and exchange at work. Social media is designed to be simple to use so that anyone with access to the Internet can use it. Many users become addicted to social media such that they cannot resist wasting their productive time. However, despite its limitations and potential for distraction, social media can be beneficial for knowledge workers. It may not be a good source of Know-What and Know-Why, but it can provide us with abundant and rich information of Know-Who. The uniqueness and specialty of Know-Who gained from social media is that it contains personal information, which in physical company only close friends possess. It allows us to develop social bonds with people who are difficult to reach through conventional media. It also enables us to develop our identity and makes us more easily discoverable by potential partners or employers.


Author(s):  
Henrikke Hovda Larsen ◽  
Johanna Margareta Forsberg ◽  
Sigrid Viken Hemstad ◽  
Raghava Rao Mukkamala ◽  
Abid Hussain ◽  
...  

2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Anja Stevic ◽  
Desirée Schmuck ◽  
Anna Koemets ◽  
Melanie Hirsch ◽  
Kathrin Karsay ◽  
...  

Abstract Mobile social media have become a widespread means to participate in everyday social and professional life. These platforms encourage the disclosure and exchange of personal information, which comes with privacy risks. While past scholarship has listed various predictors and consequences of online privacy concerns, there has been to date no empirical investigation of a conceivable relationship with perceived stress. Using a longitudinal panel study, we examined the reciprocal relationship between mobile social media privacy concerns and perceived stress. Results supported the hypothesis that mobile social media privacy concerns at T1 are associated with higher perceived stress at T2. However, we found no evidence for the reverse association, that is, perceived stress at T1 was not related to mobile social media privacy concerns at T2. The findings are discussed based on two models—the “Antecedents privacy concerns outcomes” model and the “Privacy calculus” model.


As we are living in the era of social media apps, from Facebook to WhatsApp which are using everywhere. All these apps are being used by everyone . Although this may seem to be a very good sign that we are moving to the new era of “THE DIGITAL WORLD” but it may have some consequences like spreading of artificial news, crack of personal information like credit card,debit card, passwords or digital wallets etc. The users believe that every message shared on social media might be true . So to protect our internet users we have come up with an idea that provides the ability to discover homonym attack and malicious links which warns the user before they can access the site. The Social engineering attacks have stirred terribly removed from this like fraudulent attack within which we have a tendency to completely rely upon our browser to present north American nation a warning. This situation may worry some computer users but we generally don’t think much about when we perform any action on our mobile phones. But all these so called to do steps are not the right way to deal with these situation .The primary commitments of this paper are understanding a working meaning of IDN satirizing assaults and how those IDN spaces are being introduced in the URL bar in some Internet programs, proposing a working arrangement that reports IDN ridiculing assaults which convert URL into Unicode and punycode.


Author(s):  
Muhammad Uwais ◽  
Arpit Sharma ◽  
Akhil Kumar ◽  
Lakshya Singh

As we are living in the era of social media apps, from Facebook to WhatsApp which are using everywhere. All these apps are being used by everyone. Although this may seem to be a very good sign that we are moving to the new era of “THE DIGITAL WORLD” but it may have some consequences like spreading of artificial news, crack of personal information like credit card, debit card, passwords or digital wallets etc. The users believe that every message shared on social media might be true. So, to protect our internet users we have come up with an idea that provides the ability to discover homonym attack and malicious links which warns the user before they can access the site. The Social engineering attacks have stirred terribly removed from this like fraudulent attack within which we tend to completely rely upon our browser to present north American nation a warning. This situation may worry some computer users, but we generally do not think much about when we perform any action on our mobile phones. But all these so called to do steps are not the right way to deal with these situation .The primary commitments of this paper are understanding a working meaning of IDN satirizing assaults and how those IDN spaces are being introduced in the URL bar in some Internet programs, proposing a working arrangement that reports IDN ridiculing assaults which convert URL into Unicode and punycode.


Sign in / Sign up

Export Citation Format

Share Document