logo

Social Media Privacy

   

Added on  2022-12-01

9 Pages3877 Words315 Views
Running head: SOCIAL MEDIA PRIVACY
SOCIAL MEDIA PRIVACY
Name of the student:
Name of the university:
Author Note:

SOCIAL MEDIA PRIVACY1
Data privacy or Information privacy has been significantly identified
as one of the major constraints related to the modern world where each of
the information are stored in a digital manner thus making it prone to get
exposed. The main concept of the privacy is associated with the social
networking platforms that primarily adheres the data or the information of
the users that are accessing these platforms. In the modern world where
every digital form of data is exposed to vulnerabilities or threats there are
certain constraints that are to be adhered by the users for the
safekeeping of their data (Hargittai and Marwick, 2016). This report will
deal with the practical overview of the overall constraints which can guide
an individual for the safe keeping of their data as well as maintain the
data or information that us to be stored for the future purposes. The
concerns regarding privacy within the services of social networking is said
to be a sub set of the privacy of data. This adheres all the processes that
are likely to be storing of the data, re-purposing of the data, granting
access to the third parties and lastly the display of the information in
accordance to the information that are stored in the internet (Aitken
et al.,
2016). This report will put a clear reflection of the various questions as
well as aspects that are to be acknowledged regarding the safety of the
data present in the internet, in the various social media platforms as well
as websites that are frequently visited by the internet users.What does Google and Facebook really know about me?
The privacy of the data or information is depicted as the relationship
between dissemination of data as well as collection of data. The privacy of
the data is said to be the aspect of the information technology that
associates with the capability of an individual or organization, which
designates the quality as well as quantity of the information that is to be
shared within the internet or third parties. In this growing world, where
most of the information or the data is being saved or accessed online it is
observed that the social networking platforms are one of the significant
platforms among others (Mochon
et al., 2017). The persons that
frequently uses the social media platform are exposed to data theft as
well as data misuse regarding which these social media platforms are
quite aware of and thus provides a level of safety to the data that are
being saved in this platforms. Moreover, there are certain constraints of
data that are always to be kept secured such as location, contact numbers
and many more. If the social media platforms are not aware as well as not
keeping, the data safe then safety of the data is disrupted and the
information of the individuals can be breached (Cadwalladr, 2016). This
may result in the case of cyber stalking further making a reputational
damage to the specific social media platforms.
This section will generally describe about the most use social media
platforms that are likely identified as Google and Facebook. These are
identified as the most used corporate internet platforms, which are used,
by maximum number of individuals to store data or access their data from
anywhere as well as from any machine that is connected to the internet.
There are various types of data that are accessed as well as stored by the
stated giants present in the internet (Kite
et al., 2016). Many more

SOCIAL MEDIA PRIVACY2
corporate giants that persists within the environment of the internet are
also associated with the safekeeping of the data regarding the individuals
who access those platforms. Moreover, many of these platforms also
access the device location from which the data or information had been
accessed (Obar and Wildman, 2015). Google is also a platform, which
stores the location of an individual as well as stores the history of all the
accessed data from that platform. The corporate giant Google also stores
the information of the third party applications that are frequently used by
the individuals of those platforms. The data that is being searched by an
individual using the internet platform is also depicted as the information
that are saved in an enhanced manner within the database of this
platform (Voss, 2016). This data includes links, bookmarks, calendar
history, books or any effective information that is searched by an
individual using this platform.
The next corporate giant that is observed to be popular amongst the
individuals is Facebook. The individuals generally use this as a social
networking site in which the personal details as well as some important
data of the individuals are also stored within these platforms which can be
accessed by other person who are provided access to it. However, the
data security is needed in regards information that are stored in this
platform is very necessary. This is due to the cause that this platform is
very easy to be accessed by anyone present in the internet (Pingo and
Narayan, 2016). The individuals that access this platform store the
information provided in this platform but the information of this platform
can be accessed by anybody present within the platform. This platform
also possess the capability to store the device’s location through which an
individual access their profile associated with this platform.Are there other corporate entities that are of concern, but tend to
go unnoticed?
Apart from this above-stated platforms there are certain other
platforms too that are associated with the data collection as well as
storage of the information regarding the individuals associated within the
environment of the internet. Some of these platforms are sometimes not
critically viewed for the assessment of the security regarding the data of
the individuals that are stored within it. The platforms may be identified
as Twitter, Instagram and many more (Schwartz and Peifer, 2017). These
platform stores the data of the individuals that accesses these platforms
with respect to the profile they possess on this platforms. These data or
information should also be provided with enhanced security so that the
data could not be hampered or misused. Some of these type of corporate
entities that store the data or information of the individuals sometimes
gets unnoticed regarding the safety of the data present within the
network.
There has been depicted many recent facts regarding the data
breach within many corporate entities. The most number of users that
were affected by the data breach of a reputed corporate giant is observed
as Yahoo. In the month of September 2016, Yahoo faced a severe data

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Ethics: Analyzing the Ethical Implications of Application Accessing Data Without Users' Consent
|7
|1643
|344

Ethics and the IT Professional - Assignment
|9
|2298
|57

Internet Safety Assignment
|6
|904
|284

Sexting and Privacy Violations: A Case Study [CMAF 1010]
|4
|1097
|16

Week 4 Discussion.
|1
|438
|39

A Positive Way to Look At Privacy Invasion
|8
|1845
|93