View full proposal for this dissertation here.
Chapter One: Introduction
1.1 Background of the Study
DiMaggio, et al (2001), it is clear that digital age allows the accessibility to sensitive information gained from available internet sources. To illustrate, a host of information relating to people’s births can be extracted from their Facebook profiles within a given social circle raising issues of whether it can be trusted. This explains that the use of digital age, within the dimensions of social networking can increase the ability to high sensitive data combining several social media databases. The foundation tenets that users of social network site are based on the ability of the digital age to give them control of their own data. However, as Marwic and Boyd (2014) outline, this threshold formulates the initial loophole in which such data is handled, generated, reproduced and even published. Regarding this, it becomes notable that the user control perspective is not adequate in mitigating the challenges of accessibility. This is reflected in the views of Nissenbaum (2011) that individual users are unaware of which information about them is gathered, accessed and sensitively inferred. Thus, it becomes evident that while control is normative, the conceptual principle of privacy is positively implied. In light of this, empirical evidence underlying the publication of personal information can extensively impact on the propensity of an individual to reveal sensitive data to strangers. The assumption levelled touches on the inability for users control to help achieved the volatile balance of security between information protection and information sharing.
“The world has changed; it has become more public than private” (Kirkpatrick et al., 2010). The likes of Social Media have become an outlet that nobody can ignore, its features, characteristics and convenience encapsulates all that is needed for any walk of life chosen by an individual.
Of course, with the undying support for social media, especially Facebook, one must ask his or herself, is it to trusted? Is my information being kept privately like they said it is?
Some believe it is however some feel that is far safe. However, this study is going to give a clear-cut decision as to what the majority think and why. Of course, there is no right or wrong answer, and there is the likelihood that this study may not affect the broader picture, but it will give clarity and I think that is necessary. As supposed to concentrating on Social Media as a general platform this study will revolve around Facebook only to have a more tailored and focussed reading.
I have chosen Facebook, because this is the Social Media outlet that revolutionised all those that were to follow. The physiological as well as sociological impacts will be ostracised, this will look at how Facebook affects the attitudes and body/verbal language of individuals. Last but not leady corporate governance will be looked at; this will test how Facebook is in line it at all with corporate governance codes
Both sides of the arguments will be welcomed with reasons for balance and recommendation will be ushered as to how Facebook could become the safe zone that everyone urges for.
1.2 Statement of the Problem
Can Facebook privacy really be trusted will all the technological developments? Marwic and Boyd (2014) articulate that the existing legal framework that guides privacy in the digital age is failing, the underlying impact of Facebook emerges as a force that renders obsolete a host of theoretical perspectives on legal protections. A case in point is a scenario where a few pieces of personal information can lead to the unique identification of an individual thereby allowing the inference of more sensitive information about the person. Privacy in the use of the Facebook has continued to pose a challenge as it is a complex issue for users, administrators and policy makers due to its very nature. Nevertheless, the problem posed by the use of Facebook on the privacy of the users require that efforts are put to ensure that users of the internet are protected from malicious users of their personal information and other criminals such as online bullies and stalkers. It is important that strategies are put in place to address the issue of privacy and the use of the Facebook for negative activities. One of the recommended strategies is the employment of standard security measures to ensure that the sites are safe for use by the public. This can be done through such things as software and applications for protecting users of Facebook. It would also help to ensure that the security measures are available for social networking sites are known and easy to use for the users. Laws should also be put in place to prevent the continued illegal sale or sharing of personal information by the web-based organizations. Though this move has been challenged by the supporters of free speech, it is important that changes be made to make the use of the Facebook safer (Mogull& Rothman, 2011).
1.3 Justification of the Study
This study is significant because, guardianship of personal and sensitive information is the most effective protection approach to guiding personal information. This is especially due to the fact that Facebook use user-generated content, with the user having a great amount of control over the content. Scholars will use the findings of the study to map out ways of protecting online privacy. It is important to get sufficient information on how to protect personal information on Facebook. Sufficient information should be provided on how individuals and organizations can protect their information from malicious users and computer criminals. One of the ways of protecting oneself from computer criminals is to avoid identifying oneself unreasonably. This kind of countermeasure is known as risk avoidance. When identification is important, excessive information should not be advanced. Another measure is to avoid using a lot of unnecessary information on Facebook as current location, classes being attended and other such information. It is important to note that information technology has increased the vulnerability to cybercrimes.
1.4 Research Objectives
- To examine the extent to which Facebook can be trusted to handle online privacy
- To determine measures of promoting online privacy for Facebook users
- To find out gaps in legal frameworks around online privacy for Facebook users
Chapter TWO: Literature Review
2.1 Digital Technology
Digital age, through social networking sites have become a very significant part of the society in the modern age. These technologies provide the platform for sharing information, videos, photos, as well as blogging (Kaplan and Haenlein, 2010). The modern society has encountered heated debates, theorizing, hype, and bogging about the role of Facebook networking site in the modern society and whether it can be trusted to deliver the societal expectations. The social media platform has contributed in violating people’s privacy. Such platforms enable individuals to create networks which one shares with friends. Privacy concerns come to play in the use of social media especially Facebook and requires one to give their personal details to sign up for the account (Schmidt and Cohen, 2014). This information which is uploaded into this site can be accessed by fiends and other people. Thus, this implies the possibility of security threats as some members of the network individuals can hack into one’s system and extract crucial information like the location and telephone numbers which they can use to perpetrate an attack on the innocent web user.
Before the security agencies and other parties intercept anyone’s conversations, there is a need to inform the person through the relevant channels. This is achieved either by the authorization from the court or the security chief in the country. According to Schmidt and Cohen (2014), the government, through the aid of modern technological devices has been a threat to privacy. This is especially when an individual is being grilled or imprisoned. As a result, such moves facilitate the profiling of one’s details thus infringing on the dignity and the privacy of the victim. At workplace, many organizations have put in place strategies that enhance total control of staff while at work.
2.2 Privacy and trust Bias
In a strict counterargument, the bias in privacy decision raises concerns over the ability to optimally navigate issues of privacy and trust in the digital age. Schmidt and Cohen (2014) portends that while modern information seems to increase breach on privacy, there is reason for optimism and hope. The quest for privacy and trust is a human desire that digital age can support. In view of this, experimental evidence suggests that privacy protection can be activated through a host of subtle manipulations. The salience of the information revelation, accessibility and activation can be protected through data coding and software development. However, Nissenbaum (2011) argues that individuals face competing challenges in their quest to balance information disclosure and protection.
Policies and technologies have been developed to counter cognitive ad behavioural biases around privacy and trust. Research by Kaplan and Haenlein (2010) articulate that approaches to enhance user privacy decision are inspired by behavioural economics on paternalism, asymmetric and soft technologies. The implication of this argument resonates the interplay between psychological processes of underlying pricy as well as the systems of laws designed to enhance the personal choice without restricting it. The goal of such intervention approached in the space of privacy increases social welfare and individual quest for privacy and digital age security. For example, Google has developed nudging tools for mobile applications, online social networks, and location services to achieve the primary goal of privacy protection.
Underlying how technology can be used to enhance privacy, it is evident that a lot of incentives can be realized through the use of the internet in observing privacy concerns. Personalization of websites can help to promote security. This technique also promotes the strategy where one can send massage and emails without necessarily disclosing the sender’s identity (Marwick and Boyd, 2014).
In the past years, this was something very easy to ensure due to the existent media of communication at the time (Eric, 2007). However, the technological realm has improved immensely by coming up with communication channels that traverse geographical distance and enhance communication convenience. Today, using social media one can easily communicate with any person in any corner of the planet and with this convenience comes the risk of third party infringement in the communication process (Fogel&Nehmad, 2009).
2.21 Privacy concerns
Facebook gives users the chance to make sure that what they share does not end up in the wrong hands. This is made sure using the above meters. Additionally, a user’s information is made safe from misuse by using the company’s data policy as a blue print (Liu, Gummadi, Krishnamurthy, &Mislove, 2011). Although, they collect all information shared on the media such as messages, financial information and images the company maintains that this information all goes towards enhancing the user experience by making the entire communication process more convenient (Boyd &Hargittai, 2010).
At the end of the day Facebook is business venture. Although users do not pay anything to enjoy the application, the management must pay the brains behind the creation. This is made possible through advertising which has evolved greatly because of the information collected about users (Raynes-Goldie, 2012).
2.22 Who is at fault?
It is the users’ ignorance or lack of knowledge of the privacy feature that induces the privacy concerns (Bedi, 2013). It has been said that there is no secret between two people, so the moment one shares something on Facebook, they should know that the information is visible to all their friends. To protect the privacy of the shared information, Facebook advices one to only accept friend requests of those people they know (Statt, 2013).
Additionally, today most employers do not seek out members of staff the traditional way, today they seek them out socially, this includes using their social media sites to look for information about them (Ostrow, 2009). Furthermore, it is an avenue where people can take on any character they want (Liu, Gummadi, Krishnamurthy, &Mislove, 2011). However, what one shares speaks volumes to those people on your friends list or anyone who is interested to see your activities online more so to a prospective employer.
For one an individual can control what they share to ensure they do not share anything another person may deem inappropriate (Warren, 2013). On the plus side is that its policy outline that the information they collect does not find its way to a third party, something they have proved time and again by incorporating more and more measures that spearhead their data policy (Zilles, 2017).
This way even if an employer was to stumble upon their account, they cannot get to see their posts (Hoffman, 2012). This gives the individual a level ground where they can compete with those eying the same position on several fronts where social media posts are not one of them. On this note, I take a stance that Facebook privacy can be trusted at all costs and that it is the users who need to learn how to use them to their advantage (Warfel, 2008).
2.3 Legal Framework
The law has been viewed as a crucial instrument in safeguarding privacy in the new digital age. There is a big correlation between the law and technology. As noted by Nissenbaum (2011), the law is mandated with the responsibility of inhibiting technology from intruding into privacy of people. The ability to follow the activities of the criminals through the information they provide on the web sites has played an important role in making the world safer (Mogull and Rothman, 51). Parents and schools can ensure the safety of children using the sites, especially the Facebook networking site (Mogull and Rothman, 53).
For some common persons, this suggests little more than a few unanticipated e-mails in their inbox, or a few uncannily pertinent advertisings on a prospect web page. Other users related this to the argument that time spent involving in abnormal interests can cause a flood of more targeted marketing which might not be welcome (Lahlou, 311).
2.4 Privacy Issues
The other major privacy issue where the use of the internet is concerned is with the use of the Facebook and whether it can be trusted. The Facebook site has a way of making their users to factually expose their actual names, locations and interests. This aspect of the Facebook renders social networking more realistic and thus engaging or those who use them. Additionally, there is uploading of photos as well as other unguarded statements. Such elements are identified to the person and can be accessed by malicious persons becoming a major privacy issue to the owner (Mogull and Rothman, 54).
Chapter Three: Methodology
3.1 Research Philosophy
The interpreters philosophy seeks to study and express the feelings of participants were utilized in the study to ascertain the exact feelings not expressed or expressed differently by the users of the social networks.
3.2 Research Approach
The study adopts a deductive approach due to the positive nature of this research (Ormston, et al 2014). The deductive approach represents a common view between the relationships of research results and findings of this study and the existing theories developed by various research analysts and develops through reasoning.
Research questions are as follows:
- To what extent has Facebook bewitched individuals to believe that is safe.
- What evidence is there to show that Facebook is safe
- What evidence is there to show that Facebook isn’t safe
- How does Facebooks productivity and performance affect the attitude of individuals
- If Facebook isn’t safe how at tall how does that breach the code of corporate governance
- How can Facebook make it better
Primary research aim:
- To prove if at all Facebook is an outlet to be trusted and why.
To do justice to the objectives data collection will be done via questionnaire that will be sent out over a specific period of time to a specific target audience of about 50 or more people. This will be the bases of my primary data, but the formation will mostly derive from credible sources of secondary data, namely: the guardian, telegraph and electric forums (Survey Monkey). This all will be emulated to create a constructive argument.
Since Facebook is a global company, information will be gathered globally and not only from London or the UK, this allows leverage and gives more to talk about. In terms of target audience, since people of all ages use Facebook my data will not only be focussed on the younger generation but older and this is where secondary data comes in use. If done appropriately the objective and overall dissertation should be answered.
The research having been scheduled by the university, it was not as difficult to obtain the research participants. I developed discussions with friend who introduced me to other friends for the study. I also made some telephone contacts to friends with a view to direct them visit the site through a link of the monkey survey.
3.4 Primary research methods
3.4.1 Quantitative questionnaire
Quantitative methods and approaches are used in the collection of data for research. The approach involves data collection inform of or expresses and numerals or numbers (Ormston, et al 2014). The research employed the use of quantitative questionnaires to administer to student’s respondents. The questionnaire included open ended questions that encouraged comfortable and ethical discussions. The student’s consent was requested in the administration of the questionnaires.
3.4.2 Online Monkey Survey
The online surveys are considered trustworthy since they are administered in the privacy of respondent. The data received from the online monkey survey is more vibrant due to the fact respondents feel they are not supervised and more able to give their honest opinions compared to one on one survey questionnaires (Ormston, et al 2014). The research utilized the online monkey survey to refer students to a link to slot in the answers to the questions asked.
3.4.3 Respondents attribute
The research targeted respondents within the ages of 14 – 49 years of age. The research was carried on the assumption that this age demography made move visits to social networks compared to the lower or upper demography. The research was therefore open to all active users of the Facebook.
3.4.4 Secondary research
Secondary research forms the basics and foundation of the study. This is a consultation of the available material and information on the research questions. The research therefore utilized Publications, peer reviewed articles and security based books and information to form the foundation for the research.
3.4.5 Time Scale
Overall, I have a time scale which I would like to meet which is as follows:
3.5 Data Analysis
3.5.1 Quantitative data
The raw quantitative data collected during the research unless analysed would provide limited non-coherent information. The Univariates including the total samples distribution based on a variable at a single time was used to analyse the research finding into percentage and frequency occurrence of each research variable. This included the nominal and the ordinal categories and conducted a rating scale for questions.
The results were analysed using the excel worksheet based on graphs to analyse the data with an aim to make logical comparisons. The excel analysis would include an analysis done to each question asked with the results given per question analysed.
3.6 Limitations of study
The principle limitation witness in the study was picking up a significant measure of respondents for the questionnaires. The online surveys especially were significantly more strenuous contrasted with the normal ordinary face to face interviews. Important to note was the unwillingness of respondents in answering the face or face interviews with some having to leave some hallways answered questionnaires forms. I was unequipped for compelling respondents to answer certain questions to. However, despite the notable limitations, the quality of and responses to the questions was not interfered.Nevertheless, only four questions from the research were used in the dissertation data analysis. Other responses can be found in appendix 2.
Chapter Four: Data Analysis and Discussion
From the above graph, all the respondent who participated in the survey report to have a Facebook account. An assumption can be made that this response represents the general population of the world.
Therefore, if situation of social insecurity in communication and data risk are involved in the use of Facebook as a social communication tool. The majority of the population are likely to experience or face the same risks. According to Mogull & Rothman (2011), it is evident that the private information available on Facebook can be used for many purposes without the consent or knowledge of the users, impacting on personal privacy leading to diminished trust. A research carried out on participants’ Facebook profiles, Carnegie Mellon University’s students showed that approximately 800 of the profiles have information on names, current resident, as well as others like classes and causes being studied. This is information a malicious person would require to locate a person at particular time.
From the graphs, above, 33.87 % respondents reported to have more than 200 friends on Facebook while other 12.90 % reports to a maximum of 500 friends. This interprets to a situation where a Facebook user handles socially inclined communication to more than 200 people on the internet apart from the people they meet on a day to day basis. Facebook makes use of user-generated content, meaning that the users generate the content that is on the website. This enables the flexibility and multiplicity of information available on the Facebook. The use of Facebook, one of the social networking sites has come as an important platform for its users. However, with it, the issue of privacy of the users arises. This paper discusses why privacy is important for Facebook users. The problem of privacy of this information has come on the increase as there is evidence of the increased use of Facebook (O’ Bien & Torres, 2012). Facebook like other social media sites have a way of making their users to accurately expose their real names, locations and interests and should not be trusted with such data.
Majority of respondents 75.81% reports to have accepted friendship from people they barely know. This poses the general risk as it could be technically difficult to ascertain the objective of friends request to people one has not knowledge of. Asked whether respondents had reviewed their privacy settings the majority of the respondents responded to the negative. While users are provided such amount of personal information, as suggested by Bedi (2013) some of the websites do not have sufficient privacy policies for protecting the information. This has resulted in problems such as stalking, identity theft, online bullying and harassment.
There is the ability to break into the private lives of the users, since sufficient information is provided to perpetrate such acts. This highlights the importance of privacy for the users of Facebook.
From the data, it is evident that it is possible to develop profiles of all the people who use the Facebook with information regarding their leisure activities, shopping interests, their profession, and other important aspects of their personal and demographic profile. This makes up the many privacy issues that have emerged in the use of the social sites such as the Facebook (O’ Bien & Torres, 2012).
Facebook has a way of making their users to accurately expose their real names, locations and interests. The possibility of accessing personal information from the websites is a major privacy issue in the use of the Facebook. Mogull& Rothman (2011) argues that the profiles that are created on the social media platform such as the Facebook are of special interests to other people and even organizations. Based on the terms and conditions of Facebook and the local laws related to the information from the profiles, they can be sold, shared, or passed to other people and organizations without informing the users. For a common person, this might not suggest little more than a few unanticipated e-mails in their inbox, or a few advertisings on a prospect webpage.
It is estimated that one out of five potential employers search through Facebook to screen potential candidates. According to Bedi (2013) this has been an increase from only 11% back in 2006. This has been seen by many employers as a positive trend in looking for suitable candidates. On the other hand, the reality is that most of the employers do this in search for negative information about potential candidates. According to Bedi (2013) 41% of managers suggested information related to alcohol and drug use as being a major concern. Other things that they look for include improper photos, poor communication skills, incorrect qualifications and other things like bad-mouthing former employers or colleagues.
While Facebook users are provided such amount of personal information, as suggested by Bedi (2013) some of the websites do not have sufficient privacy policies for protecting the information of the users. It is possible and has happened that malicious people are having access to such personal information and using it to harm the owners. One of the problems related with this availability and accessibility of personal information is stalking.
Online bullying and harassment can also occur where personal information is accessed by malicious people. A study done on Facebook profiles from participants, students at Carnegie Mellon University revealed that about 800 profiles have information on names, current resident, as well as others like classes and causes being studied. This is all the information that a malicious person would require to locate a person at particular time, especially during class time. The ability to track users using the information provided on Facebook has become one of the major online privacy concerns (O’ Bien & Torres, 2012).
Bullying, stalking and harassment in the use of Facebook has come on the increase. There is the ability to break into the private lives of the users, due to the fact that sufficient information is provided to perpetrate such acts. Intrusion is very easy, even due to the very nature of Facebook. For example, it is possible for a malicious person to open a proxy account, request friendship and use it to stalk harass or bully a victim. With the use of the Facebook, information can be accessed even through hacking into personal accounts. The perpetrated acts can involve false accusations, threatening, monitoring, data or equipment damaging, luring minors for sex, or collecting information with the intention of harassing the user. Most of the stalkers and bullies have characteristics such as “malice, premeditation, repetition, distress, obsession, vendetta, no legitimate purpose, personally directed, disregarded warnings to stop, harassment, and threats” (Bedi, 2013: 62).
Information gathered from the Facebook can also be used for identity theft, with is a major problem in the age of technology. Identity theft is a compound term that is used to refer to all types of crimes that are perpetrated by an individual who gets personal information, basically through stealing or unauthorised access. For example, there have been cases of photos being stolen from the Facebook that are used in aiding identity theft. People who perpetrate identity theft can obtain personal information through the use of the social media platform, such as the Facebook or by hacking accounts. Stolen information is mostly used for deception as well as committing fraud. Once the information is gotten by the criminal, he or she pretends to be the owner of the information. With the new identity, the criminal can obtain services or commit crime with a fake or stolen identity. Unfortunately, it is the owner of the information who is held liable for such acts as it is not easy to prove that the identity was stolen. Millions of people in the United Kingdom and the United States among other countries in the world are reported to have fallen victims of these criminals due to the ease with which personal information can be obtained through the social media. Identity fraud is the kind of crime that includes bank fraud, tax fraud, credit card fraud, as well as many other kinds of fraud committed using stolen identity (Lahlou, 2008).
Chapter Five: Conclusion and Recommendation
Privacy and trust in the use of the internet and especially the Facebook networking site is a complex issue for individual users, administrators and policymakers due to its very nature. However, efforts should be put to ensure that users of the internet are protected from malicious users of their personal information as well as online bullies. There should be efforts in seeking to develop strategies for addressing the issue of privacy and the use of Facebook for negative activities. One of the suggested responses is the use of standard security measures to ensure that the site is safe for use by the public. It would help ensuring that the security measures which are available for social networking sites are known and easy to use for the users of Facebook. This will ensure that the users can apply them in ensuring security of their information.
Access to personal accounts on Facebook through various means such as hacking has been used to post obscene and illegal materials that are blamed on the owner of the account. Some of these materials are illegal as they are obscene distasteful or offensive. Obscene statements are such statements that offend the prevailing mortality, are a profanity, or are otherwise a taboo, repugnant, disgusting or offensive. In legal terms, the term is used in reference to information materials that are of sexual nature. One of the areas that have been targeted in this crime is internet pornography, especially child pornography. Unsuspecting users of Facebook and other social networking sites have fallen victims of such hackers and criminals who have accessed their personal accounts and posted the materials (Lahlou, 2008).
Bedi, M. (2013). Facebook and interpersonal privacy: why the third party doctrine should not apply. DePaul University College of Law, 1-73.
Boyd, D., &Hargittai, E. (2010). Facebook Privacy Settings: Who Cares? First Monday. Available at: journals.uic.edu/ojs/index.php/fm/article/view/3086/2589 (Accessed: 23 February 2017).
Eric, B. (2007). Privacy in social networking: A usability study of privacy interfaces for Facebook. Thesis: Harvard College, 1-125.
Fogel, J., &Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 153-160.
Hoffman, B. C. (2012). An exploratory study of a user’s Facebook security and privacy settings. Theses: Minnesota State University, 1-59.
Monkey, S. (2017). Facebook Privacy. IS IT TO BE TRUSTED?. [online] Surveymonkey.com. Available at: https://www.surveymonkey.com/results/SM-HX2S2ZKB/ (Accessed 27 March 2017).
Kirkpatrick, marshall, kendall, len, young, mat, macmanus, richard, lardinois, frederic, jeffries, adrianne, Curry, D., Sponsors, R., Wolf, D., Jacobs, C.C. and Power, D. (2010) Why Facebook is wrong: Privacy is still important. Available at: http://readwrite.com/2010/01/11/why_facebook_is_wrong_about_privacy/ (Accessed: 23 February 2017).
Liu, Y., Gummadi, K. P., Krishnamurthy, B., &Mislove, A. (2011). Analyzingfacebook privacy settings: User expectations vs reality. ACM Digital Library, 61-70.
Raynes-Goldie, K. S. (2012). Privacy in the age of Facebook: Discourse, Architecture, Consequences. Theses: Curtin University , 1-266.
Warfel, E. A. (2008). Perceptions of privacy on Facebook. Thesis: Rochester Institute of Technology, 1-32.
Lahlou, S. (2008). Identity, Social Status, Privacy and Face-keeping in digital Society. Social Science Information, 32: 299-330
Lewis, J. (2007). Social Networking: Examining User Behavior, Retrieved on March 26, 2013
Mogull, R., & Rothman, M. (2011). Protect Your Privacy. Macworld, 28(4), 48-55.
O’ Bien, D., & Torres, A. M. (2012). Social Networking and Online Privacy: Facebook Users’
Perceptions. Irish Journal Of Management, 31(2), 63-97.
Gross, R. and Acquisti, A. Information Revelation and Privacy in Online Social Networking
Sites (The Facebook Case) (2005). [online]. Available on October 22, 2012 at: http://www.heinz.cmu.edu/~acquisti/papers/privacy-facebook-gross-acquisti.pdf
Lahlou, S. Identity, Social Status, Privacy and Face-keeping in digital Society. Social ScienceInformation, 32 (2008) 299-330
Mogull, R., & Rothman, M. PROTECT YOUR PRIVACY. Macworld, 28(4) (2011), 48-55.
DiMaggio, P., Hargittai, E. ,&Neuman, W. R. & Robinson, J. P. (2001). Social Implications of the Internet. Annual Review of Sociology, 27, 307-336.
Kaplan, A. M. &Haenlein, M. (2010). “Users of the world, unite! The challenges and opportunities of Social Media”. Business Horizons 53(1): 59–68.
Marwick, A and Boyd, D (2014). Networked privacy: How teenagers negotiate context in social media. New media & society. Vol. 16(7) 1051–1067
Nissenbaum, H (2011). A Contextual Approach to Privacy Online. Vol. 140, No. 4, Pages 32-48
Schmidt, E. and Cohen, J. (2014) The New Digital Age: Reshaping the Future of People, Nations and business. London: John Murray.
Mogull, R., & Rothman, M. (2011). Protect Your Privacy. Macworld, 28(4), 48-55.
O’ Bien, D., & Torres, A. M. (2012). Social Networking and Online Privacy: Facebook Users’ Perceptions. Irish Journal Of Management, 31(2), 63-97.
Ormston, R., Spencer, L., Barnard, M., & Snape, D. (2014). The foundations of qualitative research. Qualitative research practice. A guide for social science students and researchers, 1-25.
Apply. Boston College Law Review, 54(1), 1-71.
Apply. Boston College Law Review, 54(1), 1-71. from http://www.webpronews.com/topnews/2007/04/10/social-networking-examining
Ostrow, A. (2009, September 16). Privacy: Facebook is one of America’s most trusted companies. Available at:mashable.com/2009/09/16/facebook-privacy-truste/#1l1mcuoc7o (Accessed: 23 February 2017).
Statt, N. (2013, May 3). Facebook’s new trusted contacts: can you really trust your friends. Available at: readwrite.com/2013/05/03/facebooks-new-trusted-contacts-can-you-really-trust-your-friends/ (Accessed: 23 February 2017).
Warren, K. (2013, May 13). Recruiting in today’s social media age: How to manage your online presence. Available at:www.devex.com/news/recruiting-in-today-s-social-media-age-how-to-manage-your-online-presence-80932(Accessed: 23 February 2017).
Zilles, C. (2017, January 17). Can Facebook be trusted with all your personal information. Available at: socialmediahq.com/can-facebook-be-trusted-with-all-your-personal-information/ (Accessed: 23 February 2017).
Both from Question 10
Cite This Work
To export a reference to this article please select a referencing stye below:
Related ServicesView all
Related ContentAll Tags
Content relating to: "Technology"
Technology can be described as the use of scientific and advanced knowledge to meet the requirements of humans. Technology is continuously developing, and is used in almost all aspects of life.
Internet Technology for Developing Brand Loyalty
Introduction Background In today´s world, where self-satisfaction and self-interest is the main goal in consumers, people will pay for the privilege of being king (Dickins, 2008)...
Gas Leak Control Mobile Application
CHAPTER 1 INTRODUCTION 1.1 INTRODUCTION: In this paper at the present age, safety has become an necessary issue for most of the people in all areas. Safety precautions and continuous monitoring of ev...
DMCA / Removal Request
If you are the original writer of this dissertation and no longer wish to have your work published on the UKDiss.com website then please: