Privacy Policy Improvements to Protect Children Privacy

Author(s):  
Federica Casarosa

The achievement of an adequate level of privacy protection is a demanding objective, especially for new technologies. One relatively new but increasing class of users of Internet related services consists of children and young people. However, if Internet services can improve social skills and widen the knowledge minors have, it could open the doors to privacy abuse and misuse. As it would not be feasible to address all the legal and technical tools available within the privacy protection process, this chapter will focus on a specific element required by regulation and applicable both in Europe and in the US: the inclusion of a privacy policy in any website that collects personal data from users. The paper will provide an analysis of some of the privacy policies available online provided by companies that focus specifically on children and by social networking sites. The analysis will couple the descriptive part with suggestions to improve the level of compliance and, consequentially, the level of protection for minors’ privacy.

Author(s):  
Dariusz Prokopowicz

In recent years, The number of companies that have been collecting personal information for marketing purposes has grown. Then, they have been reselling it to other companies, banks, institutions. In this way, enterprises, financial and public institutions create huge collections of nonpublic data that are valuable information for taking marketing enterpises. By targetting appropriately profiled product and service offer at a selected group of receivers; trading partners and potential clients, a greater effectiveness used in the marketing strategy is achieved suitably Thereupon, multifaceted and informational personal data base, which are built in institutions, enterpises and social networking sites, become a valuable source of informaton used for the marketing purposes. The development of information processing and dissemination techniques through the Internet is determined by the many conveniences for beneficiaries, customers and users of services offered by the Internet. On the other hand, the development of information technologies on the Internet carries the risk of loss or theft of information by an unauthorized entities. The process of facilitating information online generates a number of threats related to identity theft, capturing nonpublic data by hackers, and accomplishing conversion of funds in the electronic system banking. In response to these threats, specific entities expand security systems for remote facilitating of information and making transactions via the Internet.


2020 ◽  
Vol III (I) ◽  
pp. 11-18
Author(s):  
Javeria Nazeer ◽  
Muhammad Farooq

In recent era, Social networking sites (SNSs) have become an important source of communication and also became a matter of interest for researchers in several disciplines such as communications, technology and sociology. These Social networking sites including Facebook, Twitter etc. often reveal private data through the enclosure of public profiles, photographs, videos and messages send to the family, friends and general public. As it was not possible to conduct a survey in complete population, therefore sample of 250 respondents (50% males & 50% females) was selected from different universities and colleges of Lahore, city of Pakistan. In the process of survey, questionnaire technique has been used to obtain the quantitative data. The findings revealed that Social Networking Sites significantly violate the human basic privacy rights. Majority of the respondents were of the view that privacy rights are harmed by SNSs. 10.4% respondents were strongly disagreeing about the statement that Facebook privacy is a real problem, 18.0% were disagree, 20.4% were neutral about the problem while 38.4% said they are agreed and 12.8% were strongly agree. The results also suggested that social networking sites leak personal data and also become a reason for disclosure of personal information.


Electronics ◽  
2021 ◽  
Vol 10 (19) ◽  
pp. 2440
Author(s):  
Shafaq Shakeel ◽  
Adeel Anjum ◽  
Alia Asheralieva ◽  
Masoom Alam

With the evolution of Internet technology, social networking sites have gained a lot of popularity. People make new friends, share their interests, experiences in life, etc. With these activities on social sites, people generate a vast amount of data that is analyzed by third parties for various purposes. As such, publishing social data without protecting an individual’s private or confidential information can be dangerous. To provide privacy protection, this paper proposes a new degree anonymization approach k-NDDP, which extends the concept of k-anonymity and differential privacy based on Node DP for vertex degrees. In particular, this paper considers identity disclosures on social data. If the adversary efficiently obtains background knowledge about the victim’s degree and neighbor connections, it can re-identify its victim from the social data even if the user’s identity is removed. The contribution of this paper is twofold. First, a simple and, at the same time, effective method k–NDDP is proposed. The method is the extension of k-NMF, i.e., the state-of-the-art method to protect against mutual friend attack, to defend against identity disclosures by adding noise to the social data. Second, the achieved privacy using the concept of differential privacy is evaluated. An extensive empirical study shows that for different values of k, the divergence produced by k-NDDP for CC, BW and APL is not more than 0.8%, also added dummy links are 60% less, as compared to k-NMF approach, thereby it validates that the proposed k-NDDP approach provides strong privacy while maintaining the usefulness of data.


2020 ◽  
pp. 67-81
Author(s):  
Annie Fukushima

Current US rhetorical strategies of imagining a future of the homeland have led to the creation and utilisation of new technologies to contain and manage the border. These responses to the US border and immigration impact anti-trafficking efforts, sustaining a ‘homeland futurity’. Homeland futurity draws on and extends discourses of emergency that solidify borders as dangerous and risky. This article traces how homeland futurities emerged in US anti-trafficking efforts. Drawing upon interviews and focus group discussions with service providers and survivors of violence in San Francisco, the article demonstrates how migrant labourers are impacted by a discourse of threat and containment of the border. However, migrant labourers and their allies are innovating to secure a life that mitigates risk through migrant labourers’ use of technology. This article illustrates through the example of Contratados.org how technology may facilitate opportunities of future visioning by migrant labourers beyond a homeland futurity, to enact practices that bring to the centre migrants and their experiences through social networking and information sharing on job prospects.


2019 ◽  
Vol 4 (1) ◽  
pp. 44-55
Author(s):  
Audrey Samson

Digital death is a growing concern as personal data and archives are increasingly digitised and stored in networked servers. It refers to the issues surrounding data owner- ship after a person’s death. Social networking sites like Facebook and Twitter have a rising number of deceased users. These companies have consequently developed policies for what happens after their constituents die. E.g, Facebook has a profile memorialisation option while Twitter will discontinue the account. There is very little said however about the erasure of digital data. The question then becomes, with the advent of digital technology, and cheap, plentiful storage devices, how is this nearly limitless archiving affecting our need to forget? 


2018 ◽  
Vol I (I) ◽  
pp. 26-31
Author(s):  
Javeria Nazeer ◽  
Muhammad Farooq

In recent era, Social networking sites (SNSs) have become an important source of communication and also became a matter of interest for researchers in several disciplines such as communications, technology and sociology. As SNSs are spreading rapidly, new issues regarding privacy and security are also raising. These Social networking sites including Facebook, Twitter etc. often reveal private data through the enclosure of public profiles, photographs, videos and messages send to the family, friends and general public. That is why the researcher is concerned to investigate the impact of Social networking sites (SNSs) on human basic privacy rights. As it was not possible to conduct a survey in complete population, therefore sample of 250 respondents (50% males & 50% females) was selected from different universities and colleges of Lahore, city of Pakistan. In the process of survey, questionnaire technique has been used to obtain the quantitative data. The findings revealed that Social Networking Sites significantly violate the human basic privacy rights. Majority of the respondents were of the view that privacy rights are harmed by SNSs. 10.4% respondents were strongly disagreeing about the statement that Facebook privacy is a real problem, 18.0% were disagree, 20.4% were neutral about the problem while 38.4% said they are agreed and 12.8% were strongly agree. The results also suggested that social networking sites leak personal data and also become a reason for disclosure of personal information. Hence, it is necessary when a user involves in the Social networking site he/she should be aware and vigilant of the privacy and security risks.


Author(s):  
Stefania Manca ◽  
Maria Ranieri

Over recent years, the notions of identity, credibility and trust in digital contexts have been gaining renewed interest from scholars in different fields (from social studies to engineering and computer science), especially for their consequences for privacy and security. Emerging and urgent questions are: What does the management of online personal data entail? How much personal information are we entitled to share with others? What measures do people usually adopt to protect their identity and privacy? Are they always aware of the risks they may run? What consequences may emerge in the long term if cautions are ignored? These are some of the questions that should be addressed by users, experts and scholars engaged with digital environments, especially social networking sites. This chapter focuses on these issues trying to provide a wide overview of the current literature on identity, credibility and trust, and their implications for privacy and security, from the perspective of social and behavioral sciences. Some measures provided by experts on how to protect against the most common security and privacy threats are also outlined.


2017 ◽  
Vol 61 (7) ◽  
pp. 653-671 ◽  
Author(s):  
Evert Van den Broeck ◽  
Karolien Poels ◽  
Michel Walrave

Advertisements on social networking sites are typically unrequested messages placed in between the user-generated content. What makes users accept these ads (or not)? A factorial survey was conducted to uncover the impact of different factors related to the use of personal data (e.g., sensitivity of personal data) and advertising place (e.g., ad location) of Facebook ads on user acceptance (i.e., fairness and appropriateness) of the advertisement. Placement of the advertisement was the only factor to significantly affect user acceptance. Moreover, the effect of ad placement largely depended on the degree of involvement with the advertised product. Among low-involved subjects, sidebar ad placement was better accepted. Moreover, the influence of ad placement on user acceptance was fully mediated by perceived intrusiveness of the ad. This indirect effect was not significant in the high-involved subgroup, where message stream placement was better accepted. Implications for targeting advertising on Facebook are discussed.


2017 ◽  
Vol 91 (1) ◽  
pp. 89-101 ◽  
Author(s):  
Michael F Aiello

Researchers are starting to explore predictive models for departmental usage of opportunities to self-represent online. This is the first study to independently address police social networking in the US across a variety of social media platforms. Using the sampling frame of the 558 ‘self-representing’ municipal police department respondents in the 2007 Law Enforcement Management and Administrative Statistics (LEMAS) data, I collected information concerning whether departments maintained active accounts on Facebook, Twitter and YouTube in 2014. The LEMAS data provides key independent variables concerning each department’s community-oriented policing commitment and technological sophistication. Ultimately, these organisational features are not predictive of departmental use of any of the three social networking sites.


Sign in / Sign up

Export Citation Format

Share Document