The Security And Privacy In Social Networking

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Social Networking Sites have become more popular than ever and because of this reason, the Privacy and Security issues of Social Networking Sites should be examined. In a Social Network, which is a network of personal contacts, a large number of users have access to a common database which is at risk of data-theft from hackers. Social Networking sites take precautionary measures to reduce these threats, but due to the personal nature of the data on Social Networking Sites, most users are at risk of data theft and other Security Issues. On a Social Network, a user can make a Public of Private Profile which can be shared with other users and used to contact and make information available to other users.

Types of Social Networks

There are different types of Social Networks such as:

Personal Networks which emphasize social relationships such as friendship

Status Update Networks which allow users to communicate with others using status updates

Location Networks which broadcast real-time data

Content- Sharing Networks which allow users to share content

Privacy and the Access of Information

When posting information on a Social Network, there are various settings, to authorize which contacts can see this information. Apart from contacts, parties Collecting Personal Data include.

Advertisers who wish to attract more clients by gathering data about their behavior

Third-party software developers who enhance user-experience by personalization

Illegal parties include:

Identity thieves who gather information directly from the user’s account or indirectly from another account.

Hackers and Developers of Malware, Adware and Viruses

Third-Party Applications on Social Networks

Third party applications interact with the social Network without being part of the whole network. These applications may take the form of quizzes gams etc… for recreational and education purposes.

Privacy Recommendations of Social Networking Websites

There is a variation in the levels of privacy of different websites. While some encourage more information to be provided, such as Name, Address etc… on Facebook, others encourage anonymity. In a study of thousands of Facebook profiles, from students at Carnegie Mellon University, it was revealed that 89% gave a name that was likely to be genuine, and 61% gave a genuine photograph.

Ethical Concerns

There are a lot of ethical concerns here, about the exact extent of information which is made available by the sites to outsiders. The methods by which information can be leaked and how this can be minimized are provided in this essay along with the laws dealing with these.

Adrienne Felt, a Ph.D. candidate at Berkeley, discovered a threat in the framework of Facebook's third-party application programming interface (API) which allows for easy theft of private information. Unfortunately this is a built-in threat which allows third parties to gain too much information about clients.

Security and Privacy-related Threats to Social Networks

The information provided to a Social Networking Site range from Contact information, to Photos to Employment –related matter and demographics. Most users commonly use their profiles to make friends with others easily, and thus the risk of violation of Security and Privacy is high. The rights to privacy and Freedom of Information are thus highly important here. Bott F. (2005, p. 181)

In this type of scenario, information such as,

Passwords

Bank account information

Credit card numbers

Information stored on a user’s computer such as contacts

Access to the user’s computer without his or her consent (for example, through malware)

Social Security numbers.

May be targeted and result in theft of Social Networking Accounts and identity to log into these accounts.

Generally, Social Engineering is used by hackers to gain sensitive data related to user accounts and hack the accounts. Social Engineering is the manipulation of Social Networks in various ways such as posing as another, diverting attention and Phishing. Spamming and Malware attacks are also used against users, to destroy and hack targets. War-Dialing or randomly dialing phone numbers to spot unprotected computers was an early device used by hackers, but is still effective. This random spotting of Social Networks still takes place through email addresses and directories. Adams, Rachel McCrindle (2008, p. 377) usually, an attacker will try to make contact with a user or directly steal his valuable details. Tracking Software can also be used for the same. At the same time, those who are part of a node or group with similar interests may be hacked. Usage of third party applications such as quizzes or games, fake profiles, fake websites, spam are other avenues used by hackers. Koobface and Twitter worm are some of the more serious viruses which could affect Social Networks. This sort of threats propagates across networks.

Privacy Policies

Although a Terms of Use Policy is provided to the client by most Social Networks, these allow for more violation of privacy such as Storage of Data and sending information to Third Parties. It is important for the client to read such terms before entering a contract. Doing this can prevent future complications and become a defense if a problem appears.

Privacy Settings

Poor Privacy settings of accounts such as the facility in Facebook to let only some information be available to a certain group of people, is also a leading cause of problems. If these details are customized properly, data leakage can be minimized.

Predators

Most Social Networks try to ensure that the level of security on their networks is high, but usually personal information can be easily leaked. Predators use Social Networking Sites to hide behind a false identity and trouble others. As of 2009, Myspace had evicted 90,000 sex offenders who had done this.

Stalking

In a study of Facebook profiles at the Carnegie Mellon University, about 800 profiles were studied and revealed that a significant number of people updated their location status on Social Networks, thus allowing others to know their location. The ease for others to know read private messages and email on Social Networks is also a concern.

Privacy of Data

Since the internet is a place where copyright data and personal data can easily be plagiarized, sometimes user-data can be stolen and posted elsewhere. For example, in 2002, a teenager’s video of acting out a Star-wars drama was broadcast over the internet to thousands of views, which caused him embarrassment. Recently, Twitter revealed that the telephone numbers of their users are used to learn more about their users. The ease with which Social Networks could compile such information is disturbing and the way they usually get away with such acts without many consequences is also a problem. The legal scene covering these aspects is given in this essay. Copyrighted material, such as text, videos, music, photographs, and source code, are often copied and shared without acknowledging the owner. This is a very common scenario on Social networking Sites and many measures are taken to minimize this.

Employment

Employment-issues are a major concern when it comes to employee-privacy mainly, since Social Networking Sites are checked by employers regularly by 1 in 5 employees, according to CareerBuilders.com, in order to seek information about employees. This is controversial since it could be discrimination, if a person is judged according to his Social networking life. Social networking has major impact on almost every profession. According to Bacon and Lee (2010,pp.533-534) most of the UK employers don’t have proper social networking user policies for their employees, it is estimated as 76%. Most people had lost their jobs due to violation of professional code of conduct. According to medical code of conduct doctors and nurses can’t publish pictures to the internet posing with patients; in fact it is violation of patient’s privacy.

Institutional concerns

When institutions join Social Networking Sites, there are at risk of plagiarism and theft of data. Schools, Libraries and Government Agencies have provided information to Social Networking Sites, but many are aware that sensitive information is always at risk from outsiders. Libraries are especially complaining that their ethics are violated.

User-anonymity on Social Networks

Many Social Networkers sometimes choose not to provide their real identity on the networks, by providing no details such as name, Age etc… or providing pseudo details. Some of these categories are,

Socially conscious people

Professional who do not like to reveal themselves on networks

Individuals with Medical Conditions who seek help but wish to remain anonymous

Bloggers and Activists who engage in discourse about sensitive matters.

Victims of Abuse

This sort of Anonymity puts the account holder at less risk, but increases risk to others from hackers and such other malicious people who do the same.

Legal and Aspects

Considering the Legal Aspects of Social Networking related to Privacy and Security, the following apply. These are the only ways to gain compensation if there is any breach of Privacy or security.

Computer Fraud and Abuse Act (CFAA), 18 U.S.C. S1030 et seq. 

18 U.S.C. S 1030 states that, whoever logs into a computer system without proper permission and obtains secret information and private information from any protected computer is liable for punishment.

In the UK, Unauthorized Access to Data and Unauthorized Modification of Data are prevented by the UK Computer Misuse Act. Rachel McCrindle (2008, p. 388)

Electronic Communications Privacy Act Title II of ECPA is related to criminal code dealing with access to stored communications and transaction records.

'Unauthorized Access' and the Computer Fraud and Abuse Act, N.Y.L.J., Oct. 12, 2010 

"The Computer Fraud and Abuse Act targets unauthorized hackers.

Laws concerning leakage of unauthorized information such as trademarks and trade-secrets are serious and the same laws which apply generally to these fields apply to the electronic field as well.

Defamation Issues- If a person’s reputation is destroyed on the internet or cyber-bullying or other such malicious activities take place, the basic laws against harassment apply while privacy laws also apply.

Human Resources Issues- In many companies, as mentioned before, profiles of employees on Social Sites are reviewed and this is sued to measure a person’s qualities. But this sort of activity is a type of discrimination under law and may be take up at court.

Conclusion

Conclusively, it can be states that there is generally a threat to security and privacy on Social Networking sites, but this risk can be reduced by individuals by taking precautionary measures and increasing the privacy settings of an account In the meantime, the Social Networking Sites too are taking major efforts to minimize the above threats by increasing security and awareness about their system.

Adams, Andrew A. and McCrindle, Rachel J. (2008) Pandora’s Box: social and professional issues of the information age, John Wiley. Chapter 7: Privacy and Surveillance

Bott, F. (2005), Professional Issues in Information Technology. British Computer Society. Chapter 16 Computer Misuse

Bacon, L and Lee, K. (2010). Social networking: confidentiality and professional issues. British journal of Midwifery, 18(8), 533-534.

Privacy: Statutory Protections - Internet Law Treatise. 2013. Privacy: Statutory Protections - Internet Law Treatise. [ONLINE] Available at:https://ilt.eff.org/index.php/Privacy:_Statutory_Protections. [Accessed 11 March 2013].

MySpace Evicts 90,000 Sex Offenders | PCWorld. 2013. MySpace Evicts 90,000 Sex OffendersPCWorld.[ONLINE]Availableat:http://www.pcworld.com/article/158911/sex_offenders_evicted.html. [Accessed 11 March 2013].



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now