Regulating Social Networking: Lessons from Canada

2009 ◽  
Vol 10 (6) ◽  
Author(s):  
John Beardwood ◽  
Gabriel Stern

AbstractIn recent years, an increasing numbers of internet users have become regular users of on-line social networking services such as Facebook, MySpace, LinkedIn and Second Life. These services provide a social space for users to connect with friends, network with business contacts and create “virtual” alter egos. Regulators have begun to take a particular interest in the privacy practices of social networking services. One of the most significant initiatives in this respect was recently undertaken by the Office of the Privacy Commissioner of Canada, in the form of a 113 page report on its investigation and critique of Facebook’s privacy policies and practices.Notably, the investigation addressed a range of the privacy concerns cited above: (i) collection and use of personal information by third-party application developers; (ii) account deactivation and deletion; (iii) accounts of deceased users; and (iv) the collection of personal information of non-users. This report is worthy of closer examination for a number of reasons. First, it provides useful lessons to both users and providers of social networking services, in identifying and suggesting solutions to certain privacy risk areas. This report also illustrates the willingness of the Office of the Privacy Commissioner of Canada to investigate, and publicly report on, the privacy practices of non-Canadian organizations. Finally, this report provides some significant direction on how overtly the purposes for personal information should be identified to each subject individual.

2012 ◽  
pp. 537-549 ◽  
Author(s):  
William Ross ◽  
Ross Slovensky

The development of the Internet affords new opportunities for organizations as they add talent to their workforce. Employers are using third-party job placement websites (e.g., Monster.com), virtual job fairs, social networking websites, and even massively multiplayer online games such as Second Life to recruit job candidates. Organizations are also using their own websites to both attract and to evaluate new applicants. Accompanying these trends is the use of Internet-based testing for evaluating job candidates. Such testing varies based on whether it is proctored or unproctored and whether it incorporates dynamic computer adaptive testing. Finally, many firms are using individual candidate’s social networking websites (e.g., Facebook) as a background screening tool for evaluating job candidates. These trends are described and research questions identified.


First Monday ◽  
2011 ◽  
Author(s):  
Chris Fullwood ◽  
Mike Thelwall ◽  
Sam O'Neill

With the increasing popularity of social networking sites, it has become relatively common for Internet users to develop an online presence via a personal profile page. Moreover, some chat rooms allow members to develop profile pages too. As a potential first point of contact, effective profile construction may play a pivotal role in the management of first impressions. Identity construction in profiles seems to be particularly important for chat room users, because they are often likely to interact with strangers. Since chat rooms can be used for anti-social purposes, the type and extent of the information posted in chat room profiles seems likely to be different from that in online profiles for social networking sites, which may be more closely tied to offline identities. This investigation of information in 324 profiles from two Lycos chat rooms for adults found that most users include a picture of themselves on their profile, hence apparently tying themselves to their offline identity. Nevertheless, the majority remain anonymous, probably many more than for social networking sites and blog authors. There are sex differences in the types of information posted on chat room profiles, with women tending to include more personal information. Furthermore, older users are more likely to post information about relationship status and location than younger users. These sex and age differences in profile content may be a consequence of the different motivations for using the service as well as disparities in self-disclosure norms.


Author(s):  
Vladlena Benson

As the social technology matured in recent years, so did the threat landscape of the online medium. Fears about breaches of privacy and personal information security seem to dominate the list of concerns of social media users described in literature. Popular press continually reports cases of inadvertent and malicious information disclosure and breaches, cyberbullying, and stalking. Yet, social networking sites proliferated into all areas of human activity. The factor causing this phenomenon lies in the trusted nature of networks and the sense of trustworthiness of this easy-to-use technology. The formation of trust into social technology has attracted much attention, and this chapter offers an overview of the trust predictors in social settings. It continues with a retrospective into the threat landscape and the use of personalisation by social networking services to counter some of these threats. Further research directions are discussed.


2017 ◽  
Vol 1 (2) ◽  
Author(s):  
Branislav R. Tanasic

Internet marketing or online marketing is a set of promotional and marketing techniques that use Web and Email Internet users, allowing direct sales. Integrated strategy for on-line performance is a combination of the use of social networking, Google services and tools Newsletter. Newsletter tools are used individually, so personalized, but to match the behavior of the target group to which they were sent. Do individuals leads previously conducted research, which should reveal the desires of consumers, their needs, interests, purchasing power ... etc.. It is very important to know the time that consumers spend on the Internet as well as the sites most frequently visited. Synergy campaign on the Internet is the integration of all forms of on-line advertising in a comprehensive strategy to reach target groups. Internet promotion is actually using the principles of traditional direct marketing, but is now used well-developedtelecommunications and information technology. echnology.


2021 ◽  
Author(s):  
I Kadek Agus dwiandika

Instagram is a photo sharing application that applies digital filters and shares them via social networking services. Communication between Instagram users can be established by liking and commenting on photos uploaded by other users. Instagram is in great demand by almost allcircles. As one of the social media loved by the Indonesian people who can share photo content. By accessing Instagram, it will be an exciting activity favored by Indonesian internet users. It is not surprising that online businesses are starting to use Instagram to expand their business. This study uses a quantitative exploratory method to determine the credibility of the performance of 5 global local fashion brand Instagram accounts. Explorative research is a type of social research whose purpose is to provide a little definition or explanation of the concepts or patterns used in the research. From the Table of Account Ratio Values for 5 Global Local Fashion Brands, it can be concluded that Erigo Store gets the highest score for the ratio of Video Likes. to Followers Ratio. While the Instagram account Casteyewear got the lowest score for this ratio. So, in this study, Erigo Store has better credibility than other brands.


Author(s):  
Halimah Odunayo Amuda

This chapter discusses how libraries can use social networking for upgrading the quality of their services. Social networking sites such as Facebook, Twitter, Blogs, Wikis, Flickr, and Second Life are identified as the major sites that have the potential to enhance libraries' services. Through a review of recent literature, the use of these sites in libraries is discussed. The benefits of social networking services as well as the issues associated with its implementation in libraries are explored. This chapter also discusses what social networking and future movements really mean for libraries; a range of pathways are also provided for libraries wishing to implement the technology.


Sign in / Sign up

Export Citation Format

Share Document