CINXE.COM
Privacy concerns with social networking services - Wikipedia
<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Privacy concerns with social networking services - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy", "wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"6b6cb3ce-2dd0-4ce0-83a5-6d1a33908e42","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Privacy_concerns_with_social_networking_services","wgTitle":"Privacy concerns with social networking services","wgCurRevisionId":1257941764,"wgRevisionId":1257941764,"wgArticleId":31602166,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["CS1: long volume value","Webarchive template wayback links","All articles with dead external links","Articles with dead external links from July 2022","Articles with permanently dead external links","Articles with dead external links from November 2023","CS1 maint: multiple names: authors list","Articles with dead external links from August 2024","Articles with short description", "Short description is different from Wikidata","Articles to be split from June 2020","All articles to be split","Articles needing cleanup from December 2019","All pages needing cleanup","Articles containing how-to sections","Internet privacy","Social networking services","Terms of service","Privacy controversies"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"Privacy_concerns_with_social_networking_services","wgRelevantArticleId":31602166,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline": false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":200000,"wgRelatedArticlesCompat":[],"wgCentralAuthMobileDomain":false,"wgEditSubmitButtonLabelPublish":true,"wgULSPosition":"interlanguage","wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true,"wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q7246027","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false};RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles": "ready","ext.wikimediamessages.styles":"ready","ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"};RLPAGEMODULES=["ext.cite.ux-enhancements","site","mediawiki.page.ready","jquery.makeCollapsible","mediawiki.toc","skins.vector.js","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.quicksurveys.init","ext.growthExperiments.SuggestedEditSession","wikibase.sidebar.tracking"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&modules=ext.cite.styles%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediaBadges%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&only=styles&skin=vector-2022"> <script async="" src="/w/load.php?lang=en&modules=startup&only=scripts&raw=1&skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&modules=site.styles&only=styles&skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.4"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="Privacy concerns with social networking services - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/Privacy_concerns_with_social_networking_services"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Privacy_concerns_with_social_networking_services"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="//login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Privacy_concerns_with_social_networking_services rootpage-Privacy_concerns_with_social_networking_services skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page's font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&utm_medium=sidebar&utm_campaign=C13_en.wikipedia.org&uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&returnto=Privacy+concerns+with+social+networking+services" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&returnto=Privacy+concerns+with+social+networking+services" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&utm_medium=sidebar&utm_campaign=C13_en.wikipedia.org&uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&returnto=Privacy+concerns+with+social+networking+services" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&returnto=Privacy+concerns+with+social+networking+services" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-History" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#History"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>History</span> </div> </a> <ul id="toc-History-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Causes" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Causes"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Causes</span> </div> </a> <button aria-controls="toc-Causes-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Causes subsection</span> </button> <ul id="toc-Causes-sublist" class="vector-toc-list"> <li id="toc-Various_levels_of_privacy_offered" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Various_levels_of_privacy_offered"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.1</span> <span>Various levels of privacy offered</span> </div> </a> <ul id="toc-Various_levels_of_privacy_offered-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-People_concern" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#People_concern"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.2</span> <span>People concern</span> </div> </a> <ul id="toc-People_concern-sublist" class="vector-toc-list"> <li id="toc-User_awareness_in_social_networking_sites" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#User_awareness_in_social_networking_sites"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.2.1</span> <span>User awareness in social networking sites</span> </div> </a> <ul id="toc-User_awareness_in_social_networking_sites-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Data_access_methods" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Data_access_methods"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.3</span> <span>Data access methods</span> </div> </a> <ul id="toc-Data_access_methods-sublist" class="vector-toc-list"> <li id="toc-Share_it_with_third_parties" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Share_it_with_third_parties"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.3.1</span> <span>Share it with third parties</span> </div> </a> <ul id="toc-Share_it_with_third_parties-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-API" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#API"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.3.2</span> <span>API</span> </div> </a> <ul id="toc-API-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Search_engines" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Search_engines"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.3.3</span> <span>Search engines</span> </div> </a> <ul id="toc-Search_engines-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Location_data" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Location_data"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.3.4</span> <span>Location data</span> </div> </a> <ul id="toc-Location_data-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Email_and_phone_number_leaks" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Email_and_phone_number_leaks"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.3.5</span> <span>Email and phone number leaks</span> </div> </a> <ul id="toc-Email_and_phone_number_leaks-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Benefit_from_data" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Benefit_from_data"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.4</span> <span>Benefit from data</span> </div> </a> <ul id="toc-Benefit_from_data-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Privacy_concerns" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Privacy_concerns"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>Privacy concerns</span> </div> </a> <button aria-controls="toc-Privacy_concerns-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Privacy concerns subsection</span> </button> <ul id="toc-Privacy_concerns-sublist" class="vector-toc-list"> <li id="toc-Social_profiling_and_third_party_disclosure" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Social_profiling_and_third_party_disclosure"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.1</span> <span>Social profiling and third party disclosure</span> </div> </a> <ul id="toc-Social_profiling_and_third_party_disclosure-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Institutional" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Institutional"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.2</span> <span>Institutional</span> </div> </a> <ul id="toc-Institutional-sublist" class="vector-toc-list"> <li id="toc-Libraries" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Libraries"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.2.1</span> <span>Libraries</span> </div> </a> <ul id="toc-Libraries-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> </ul> </li> <li id="toc-Potential_dangers" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Potential_dangers"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>Potential dangers</span> </div> </a> <button aria-controls="toc-Potential_dangers-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Potential dangers subsection</span> </button> <ul id="toc-Potential_dangers-sublist" class="vector-toc-list"> <li id="toc-Identity_theft" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Identity_theft"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1</span> <span>Identity theft</span> </div> </a> <ul id="toc-Identity_theft-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Preteens_and_early_teenagers" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Preteens_and_early_teenagers"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.2</span> <span>Preteens and early teenagers</span> </div> </a> <ul id="toc-Preteens_and_early_teenagers-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Sexual_predators" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Sexual_predators"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.3</span> <span>Sexual predators</span> </div> </a> <ul id="toc-Sexual_predators-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Stalking" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Stalking"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.4</span> <span>Stalking</span> </div> </a> <ul id="toc-Stalking-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Unintentional_fame" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Unintentional_fame"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.5</span> <span>Unintentional fame</span> </div> </a> <ul id="toc-Unintentional_fame-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Employment" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Employment"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.6</span> <span>Employment</span> </div> </a> <ul id="toc-Employment-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Burglary" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Burglary"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.7</span> <span>Burglary</span> </div> </a> <ul id="toc-Burglary-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Online_victimization" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Online_victimization"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.8</span> <span>Online victimization</span> </div> </a> <ul id="toc-Online_victimization-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Surveillance" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Surveillance"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.9</span> <span>Surveillance</span> </div> </a> <ul id="toc-Surveillance-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Law_enforcement_prowling_the_networks" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Law_enforcement_prowling_the_networks"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.10</span> <span>Law enforcement prowling the networks</span> </div> </a> <ul id="toc-Law_enforcement_prowling_the_networks-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Mob_rule" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Mob_rule"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.11</span> <span>Mob rule</span> </div> </a> <ul id="toc-Mob_rule-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Location_updates" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Location_updates"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.12</span> <span>Location updates</span> </div> </a> <ul id="toc-Location_updates-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Invasive_privacy_agreements" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Invasive_privacy_agreements"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.13</span> <span>Invasive privacy agreements</span> </div> </a> <ul id="toc-Invasive_privacy_agreements-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Reading_a_privacy_statement_in_terms_and_conditions" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Reading_a_privacy_statement_in_terms_and_conditions"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>Reading a privacy statement in terms and conditions</span> </div> </a> <ul id="toc-Reading_a_privacy_statement_in_terms_and_conditions-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Key_points_to_protect_social_networking_privacy" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Key_points_to_protect_social_networking_privacy"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>Key points to protect social networking privacy</span> </div> </a> <button aria-controls="toc-Key_points_to_protect_social_networking_privacy-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Key points to protect social networking privacy subsection</span> </button> <ul id="toc-Key_points_to_protect_social_networking_privacy-sublist" class="vector-toc-list"> <li id="toc-Realize_the_threats_that_will_always_exist" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Realize_the_threats_that_will_always_exist"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.1</span> <span>Realize the threats that will always exist</span> </div> </a> <ul id="toc-Realize_the_threats_that_will_always_exist-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Be_thorough_all_the_time" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Be_thorough_all_the_time"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.2</span> <span>Be thorough all the time</span> </div> </a> <ul id="toc-Be_thorough_all_the_time-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Know_the_sites" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Know_the_sites"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.3</span> <span>Know the sites</span> </div> </a> <ul id="toc-Know_the_sites-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Protect_devices" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Protect_devices"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.4</span> <span>Protect devices</span> </div> </a> <ul id="toc-Protect_devices-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Be_careful_about_taking_drastic_actions" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Be_careful_about_taking_drastic_actions"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.5</span> <span>Be careful about taking drastic actions</span> </div> </a> <ul id="toc-Be_careful_about_taking_drastic_actions-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Social_networks" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Social_networks"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>Social networks</span> </div> </a> <button aria-controls="toc-Social_networks-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Social networks subsection</span> </button> <ul id="toc-Social_networks-sublist" class="vector-toc-list"> <li id="toc-Facebook" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Facebook"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.1</span> <span>Facebook</span> </div> </a> <ul id="toc-Facebook-sublist" class="vector-toc-list"> <li id="toc-Internet_privacy_and_Facebook_advertisements" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Internet_privacy_and_Facebook_advertisements"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.1.1</span> <span>Internet privacy and Facebook advertisements</span> </div> </a> <ul id="toc-Internet_privacy_and_Facebook_advertisements-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Facebook_friends_study" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Facebook_friends_study"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.1.2</span> <span>Facebook friends study</span> </div> </a> <ul id="toc-Facebook_friends_study-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Facebook_Emotion_Study" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Facebook_Emotion_Study"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.1.3</span> <span>Facebook Emotion Study</span> </div> </a> <ul id="toc-Facebook_Emotion_Study-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Instagram" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Instagram"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.2</span> <span>Instagram</span> </div> </a> <ul id="toc-Instagram-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Swarm" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Swarm"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.3</span> <span>Swarm</span> </div> </a> <ul id="toc-Swarm-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Spokeo" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Spokeo"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.4</span> <span>Spokeo</span> </div> </a> <ul id="toc-Spokeo-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Twitter" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Twitter"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.5</span> <span>Twitter</span> </div> </a> <ul id="toc-Twitter-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Teachers_and_MySpace" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Teachers_and_MySpace"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.6</span> <span>Teachers and MySpace</span> </div> </a> <ul id="toc-Teachers_and_MySpace-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Other_sites" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Other_sites"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.7</span> <span>Other sites</span> </div> </a> <ul id="toc-Other_sites-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Internet_privacy_and_Blizzard_Entertainment" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Internet_privacy_and_Blizzard_Entertainment"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.8</span> <span>Internet privacy and Blizzard Entertainment</span> </div> </a> <ul id="toc-Internet_privacy_and_Blizzard_Entertainment-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Snapchat" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Snapchat"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.9</span> <span>Snapchat</span> </div> </a> <ul id="toc-Snapchat-sublist" class="vector-toc-list"> <li id="toc-2015_Snapchat_privacy_policy_update" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#2015_Snapchat_privacy_policy_update"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.9.1</span> <span>2015 Snapchat privacy policy update</span> </div> </a> <ul id="toc-2015_Snapchat_privacy_policy_update-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Live_Stories" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Live_Stories"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.9.2</span> <span>Live Stories</span> </div> </a> <ul id="toc-Live_Stories-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Privacy_concerns_with_Snapchat" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Privacy_concerns_with_Snapchat"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.9.3</span> <span>Privacy concerns with Snapchat</span> </div> </a> <ul id="toc-Privacy_concerns_with_Snapchat-sublist" class="vector-toc-list"> <li id="toc-Snapchat_Spectacles" class="vector-toc-list-item vector-toc-level-4"> <a class="vector-toc-link" href="#Snapchat_Spectacles"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.9.3.1</span> <span>Snapchat Spectacles</span> </div> </a> <ul id="toc-Snapchat_Spectacles-sublist" class="vector-toc-list"> <li id="toc-2016_Amnesty_International_Report" class="vector-toc-list-item vector-toc-level-5"> <a class="vector-toc-link" href="#2016_Amnesty_International_Report"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.9.3.1.1</span> <span>2016 Amnesty International Report</span> </div> </a> <ul id="toc-2016_Amnesty_International_Report-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> </ul> </li> <li id="toc-The_FTC" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#The_FTC"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.9.4</span> <span>The FTC</span> </div> </a> <ul id="toc-The_FTC-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-WhatsApp" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#WhatsApp"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.10</span> <span>WhatsApp</span> </div> </a> <ul id="toc-WhatsApp-sublist" class="vector-toc-list"> <li id="toc-Privacy_and_security_with_WhatsApp" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Privacy_and_security_with_WhatsApp"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.10.1</span> <span>Privacy and security with WhatsApp</span> </div> </a> <ul id="toc-Privacy_and_security_with_WhatsApp-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> </ul> </li> <li id="toc-Response_to_criticism" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Response_to_criticism"> <div class="vector-toc-text"> <span class="vector-toc-numb">8</span> <span>Response to criticism</span> </div> </a> <ul id="toc-Response_to_criticism-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">9</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">10</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-External_links" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#External_links"> <div class="vector-toc-text"> <span class="vector-toc-numb">11</span> <span>External links</span> </div> </a> <ul id="toc-External_links-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Privacy concerns with social networking services</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 6 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-6" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">6 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-es mw-list-item"><a href="https://es.wikipedia.org/wiki/Preocupaciones_sobre_la_privacidad_en_las_redes_sociales" title="Preocupaciones sobre la privacidad en las redes sociales – Spanish" lang="es" hreflang="es" data-title="Preocupaciones sobre la privacidad en las redes sociales" data-language-autonym="Español" data-language-local-name="Spanish" class="interlanguage-link-target"><span>Español</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D9%86%DA%AF%D8%B1%D8%A7%D9%86%DB%8C%E2%80%8C%D9%87%D8%A7%DB%8C_%D9%85%D8%B1%D8%A8%D9%88%D8%B7_%D8%A8%D9%87_%D8%AD%D9%81%D8%B8_%D8%AD%D8%B1%DB%8C%D9%85_%D8%AE%D8%B5%D9%88%D8%B5%DB%8C_%D8%AF%D8%B1_%D8%B4%D8%A8%DA%A9%D9%87%E2%80%8C%D9%87%D8%A7%DB%8C_%D8%A7%D8%AC%D8%AA%D9%85%D8%A7%D8%B9%DB%8C" title="نگرانیهای مربوط به حفظ حریم خصوصی در شبکههای اجتماعی – Persian" lang="fa" hreflang="fa" data-title="نگرانیهای مربوط به حفظ حریم خصوصی در شبکههای اجتماعی" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-it mw-list-item"><a href="https://it.wikipedia.org/wiki/Problemi_di_privacy_nei_siti_di_social_network" title="Problemi di privacy nei siti di social network – Italian" lang="it" hreflang="it" data-title="Problemi di privacy nei siti di social network" data-language-autonym="Italiano" data-language-local-name="Italian" class="interlanguage-link-target"><span>Italiano</span></a></li><li class="interlanguage-link interwiki-pt mw-list-item"><a href="https://pt.wikipedia.org/wiki/Quest%C3%B5es_de_privacidade_em_redes_sociais" title="Questões de privacidade em redes sociais – Portuguese" lang="pt" hreflang="pt" data-title="Questões de privacidade em redes sociais" data-language-autonym="Português" data-language-local-name="Portuguese" class="interlanguage-link-target"><span>Português</span></a></li><li class="interlanguage-link interwiki-ckb mw-list-item"><a href="https://ckb.wikipedia.org/wiki/%D9%86%DB%8C%DA%AF%DB%95%D8%B1%D8%A7%D9%86%DB%8C%DB%8C%DB%95%DA%A9%D8%A7%D9%86%DB%8C_%D8%AA%D8%A7%DB%8C%D8%A8%DB%95%D8%AA%D9%85%DB%95%D9%86%D8%AF%DB%8C_%D9%84%DB%95%DA%AF%DB%95%DA%B5_%D8%AE%D8%B2%D9%85%DB%95%D8%AA%DA%AF%D9%88%D8%B2%D8%A7%D8%B1%DB%8C%DB%8C%DB%95%DA%A9%D8%A7%D9%86%DB%8C_%D8%AA%DB%86%DA%95%DB%8C_%DA%A9%DB%86%D9%85%DB%95%DA%B5%D8%A7%DB%8C%DB%95%D8%AA%DB%8C" title="نیگەرانییەکانی تایبەتمەندی لەگەڵ خزمەتگوزارییەکانی تۆڕی کۆمەڵایەتی – Central Kurdish" lang="ckb" hreflang="ckb" data-title="نیگەرانییەکانی تایبەتمەندی لەگەڵ خزمەتگوزارییەکانی تۆڕی کۆمەڵایەتی" data-language-autonym="کوردی" data-language-local-name="Central Kurdish" class="interlanguage-link-target"><span>کوردی</span></a></li><li class="interlanguage-link interwiki-sr mw-list-item"><a href="https://sr.wikipedia.org/wiki/%D0%9F%D1%80%D0%B8%D0%B2%D0%B0%D1%82%D0%BD%D0%BE%D1%81%D1%82_%D0%BD%D0%B0_%D0%B4%D1%80%D1%83%D1%88%D1%82%D0%B2%D0%B5%D0%BD%D0%B8%D0%BC_%D0%BC%D1%80%D0%B5%D0%B6%D0%B0%D0%BC%D0%B0" title="Приватност на друштвеним мрежама – Serbian" lang="sr" hreflang="sr" data-title="Приватност на друштвеним мрежама" data-language-autonym="Српски / srpski" data-language-local-name="Serbian" class="interlanguage-link-target"><span>Српски / srpski</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q7246027#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Privacy_concerns_with_social_networking_services" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:Privacy_concerns_with_social_networking_services" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Privacy_concerns_with_social_networking_services"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/Privacy_concerns_with_social_networking_services"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/Privacy_concerns_with_social_networking_services" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/Privacy_concerns_with_social_networking_services" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages" title="A list of all special pages [q]" accesskey="q"><span>Special pages</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&oldid=1257941764" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&page=Privacy_concerns_with_social_networking_services&id=1257941764&wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FPrivacy_concerns_with_social_networking_services"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FPrivacy_concerns_with_social_networking_services"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&page=Privacy_concerns_with_social_networking_services&action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q7246027" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><p class="mw-empty-elt"> </p> <style data-mw-deduplicate="TemplateStyles:r1251242444">.mw-parser-output .ambox{border:1px solid #a2a9b1;border-left:10px solid #36c;background-color:#fbfbfb;box-sizing:border-box}.mw-parser-output .ambox+link+.ambox,.mw-parser-output .ambox+link+style+.ambox,.mw-parser-output .ambox+link+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+style+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+link+.ambox{margin-top:-1px}html body.mediawiki .mw-parser-output .ambox.mbox-small-left{margin:4px 1em 4px 0;overflow:hidden;width:238px;border-collapse:collapse;font-size:88%;line-height:1.25em}.mw-parser-output .ambox-speedy{border-left:10px solid #b32424;background-color:#fee7e6}.mw-parser-output .ambox-delete{border-left:10px solid #b32424}.mw-parser-output .ambox-content{border-left:10px solid #f28500}.mw-parser-output .ambox-style{border-left:10px solid #fc3}.mw-parser-output .ambox-move{border-left:10px solid #9932cc}.mw-parser-output .ambox-protection{border-left:10px solid #a2a9b1}.mw-parser-output .ambox .mbox-text{border:none;padding:0.25em 0.5em;width:100%}.mw-parser-output .ambox .mbox-image{border:none;padding:2px 0 2px 0.5em;text-align:center}.mw-parser-output .ambox .mbox-imageright{border:none;padding:2px 0.5em 2px 0;text-align:center}.mw-parser-output .ambox .mbox-empty-cell{border:none;padding:0;width:1px}.mw-parser-output .ambox .mbox-image-div{width:52px}@media(min-width:720px){.mw-parser-output .ambox{margin:0 10%}}@media print{body.ns-0 .mw-parser-output .ambox{display:none!important}}</style><table class="box-Split plainlinks metadata ambox ambox-move" role="presentation"><tbody><tr><td class="mbox-image"><div class="mbox-image-div"><span typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/a/a7/Split-arrows.svg/50px-Split-arrows.svg.png" decoding="async" width="50" height="17" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/a/a7/Split-arrows.svg/75px-Split-arrows.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/a/a7/Split-arrows.svg/100px-Split-arrows.svg.png 2x" data-file-width="60" data-file-height="20" /></span></span></div></td><td class="mbox-text"><div class="mbox-text-span">It has been suggested that this article be <b><a href="/wiki/Wikipedia:Splitting" title="Wikipedia:Splitting">split</a></b> into articles titled <i><a href="/wiki/Potential_dangers_of_social_networking_sites" class="mw-redirect" title="Potential dangers of social networking sites">Potential dangers of social networking sites</a></i>, <i><a href="/wiki/Privacy_concerns_of_Facebook" class="mw-redirect" title="Privacy concerns of Facebook">Privacy concerns of Facebook</a></i> and <i><a href="/wiki/Concerns_of_Snapchat" class="mw-redirect" title="Concerns of Snapchat">Concerns of Snapchat</a></i>. (<a href="/wiki/Talk:Privacy_concerns_with_social_networking_services" title="Talk:Privacy concerns with social networking services">discuss</a>) <span class="date-container"><i>(<span class="date">June 2020</span>)</i></span></div></td></tr></tbody></table> <p>Since the arrival of early <a href="/wiki/Social_networking_site" class="mw-redirect" title="Social networking site">social networking sites</a> in the early 2000s, online <a href="/wiki/Social_networking_service" title="Social networking service">social networking platforms</a> have expanded exponentially, with the biggest names in <a href="/wiki/Social_media" title="Social media">social media</a> in the mid-2010s being <a href="/wiki/Facebook" title="Facebook">Facebook</a>, <a href="/wiki/Instagram" title="Instagram">Instagram</a>, <a href="/wiki/Twitter" title="Twitter">Twitter</a> and <a href="/wiki/Snapchat" title="Snapchat">Snapchat</a>. The massive influx of personal information that has become available online and stored in the cloud has put user privacy at the forefront of discussion regarding the database's ability to safely store such personal information. The extent to which users and social media platform administrators can access user profiles has become a new topic of ethical consideration, and the legality, awareness, and boundaries of subsequent privacy violations are critical concerns in advance of the technological age.<sup id="cite_ref-1" class="reference"><a href="#cite_note-1"><span class="cite-bracket">[</span>1<span class="cite-bracket">]</span></a></sup> </p><p>A <a href="/wiki/Social_network" title="Social network">social network</a> is a <a href="/wiki/Social_structure" title="Social structure">social structure</a> made up of a set of <a href="/wiki/Agency_(sociology)" title="Agency (sociology)">social actors</a> (such as individuals or organizations), sets of dyadic ties, and other <a href="/wiki/Social_interactions" class="mw-redirect" title="Social interactions">social interactions</a> between actors. <b>Privacy concerns with social networking services</b> is a subset of <a href="/wiki/Data_privacy" class="mw-redirect" title="Data privacy">data privacy</a>, involving the right of mandating personal <a href="/wiki/Privacy" title="Privacy">privacy</a> concerning storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via the Internet. Social network security and privacy issues result from the large amounts of information these sites process each day. Features that invite users to participate in—messages, invitations, photos, open <a href="/wiki/Computing_platform" title="Computing platform">platform</a> applications and other applications are often the venues for others to gain access to a user's private information. In addition, the technologies needed to deal with user's information may intrude their privacy. </p><p>The advent of the <a href="/wiki/Web_2.0" title="Web 2.0">Web 2.0</a> has caused <a href="/wiki/Social_profiling" title="Social profiling">social profiling</a> and is a growing concern for <a href="/wiki/Internet_privacy" title="Internet privacy">internet privacy</a>.<sup id="cite_ref-Why_Web_2.0_will_end_your_privacy_2-0" class="reference"><a href="#cite_note-Why_Web_2.0_will_end_your_privacy-2"><span class="cite-bracket">[</span>2<span class="cite-bracket">]</span></a></sup> Web 2.0 is the system that facilitates participatory information sharing and collaboration on the Internet, in social networking media websites like <a href="/wiki/Facebook" title="Facebook">Facebook</a> and <a href="/wiki/MySpace" class="mw-redirect" title="MySpace">MySpace</a>.<sup id="cite_ref-Why_Web_2.0_will_end_your_privacy_2-1" class="reference"><a href="#cite_note-Why_Web_2.0_will_end_your_privacy-2"><span class="cite-bracket">[</span>2<span class="cite-bracket">]</span></a></sup> These social networking sites have seen a boom in their popularity beginning in the late 2000s. Through these websites many people are giving their personal information out on the internet. These social networks keep track of all interactions used on their sites and save them for later use.<sup id="cite_ref-Dwyer2007_3-0" class="reference"><a href="#cite_note-Dwyer2007-3"><span class="cite-bracket">[</span>3<span class="cite-bracket">]</span></a></sup> Issues include <a href="/wiki/Cyberstalking" title="Cyberstalking">cyberstalking</a>, location disclosure, social profiling, third party personal information disclosure, and government <a href="/wiki/Use_of_social_network_websites_in_investigations" title="Use of social network websites in investigations">use of social network websites in investigations</a> without the safeguard of a <a href="/wiki/Search_warrant" title="Search warrant">search warrant</a>. </p> <meta property="mw:PageProp/toc" /> <div class="mw-heading mw-heading2"><h2 id="History">History</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=1" title="Edit section: History"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Before social networking sites exploded over the past decade, there were earlier forms of social networking that dated back to 1997 such as <a href="/wiki/SixDegrees.com" title="SixDegrees.com">Six Degrees</a> and <a href="/wiki/Friendster" title="Friendster">Friendster</a>. While these two social media platforms were introduced, additional forms of social networking included: online multiplayer games, blog and forum sites, newsgroups, mailings lists and dating services. They created a backbone for the new modern sites. Since the start of these sites, privacy has become a concern for the public. In 1996, a young woman in <a href="/wiki/New_York_City" title="New York City">New York City</a> was on a first date with an online acquaintance and later sued for sexual harassment after her date tried to play out some of the sexual fantasies they had discussed while online. This is just an early example of many more issues to come regarding internet privacy.<sup id="cite_ref-4" class="reference"><a href="#cite_note-4"><span class="cite-bracket">[</span>4<span class="cite-bracket">]</span></a></sup> </p><p>In the past, social networking sites primarily consisted of the capability to chat with others in a chat room, which was far less popular than social networks today. People using these sites were seen as "techies" unlike users in the current era. One of the early privacy cases was in regards to <a href="/wiki/Myspace" title="Myspace">MySpace</a>, due to "stalking of minors, bullying, and privacy issues", which inevitably led to the adoption of "age requirements and other safety measures".<sup id="cite_ref-5" class="reference"><a href="#cite_note-5"><span class="cite-bracket">[</span>5<span class="cite-bracket">]</span></a></sup> It is very common in society now for events such as stalking and "<a href="/wiki/Catfishing" title="Catfishing">catfishing</a>" to occur. </p><p>According to Kelly Quinn, “the use of social media has become ubiquitous, with 73% of all U.S. adults using social network sites today and significantly higher levels of use among young adults and females." Social media sites have grown in popularity over the past decade, and they only continue to grow. A majority of the United States population uses some sort of social media site.<sup id="cite_ref-libraryproxy.tulsacc.edu_6-0" class="reference"><a href="#cite_note-libraryproxy.tulsacc.edu-6"><span class="cite-bracket">[</span>6<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Causes">Causes</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=2" title="Edit section: Causes"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>There are several causes that contribute to the <a rel="nofollow" class="external text" href="http://study.com/academy/lesson/what-is-invasion-of-privacy-definition-examples.html">invasion of privacy</a> throughout social networking platforms. It has been recognized that “by design, social media technologies contest mechanisms for control and access to personal information, as the sharing of user-generated content is central to their function." This proves that social networking companies need private information to become public so their sites can operate. They require people to share and connect with each other.<sup id="cite_ref-libraryproxy.tulsacc.edu_6-1" class="reference"><a href="#cite_note-libraryproxy.tulsacc.edu-6"><span class="cite-bracket">[</span>6<span class="cite-bracket">]</span></a></sup> This may not necessarily be a bad thing; however, one must be aware of the privacy concerns. Even with <a href="/wiki/Privacy_settings" title="Privacy settings">privacy settings</a>, posts on the internet can still be shared with people beyond a user's followers or friends. One reason for this is that “English law is currently incapable of protecting those who share on social media from having their information disseminated further than they intend." Information always has the chance to be unintentionally spread online. Once something is posted on the internet, it becomes public and is no longer private. Users can turn privacy settings on for their accounts; however, that does not guarantee that information will not go beyond their intended audience. Pictures and posts can be saved and posts may never really get deleted. In 2013, the <a href="/wiki/Pew_Research_Center" title="Pew Research Center">Pew Research Center</a> found that "60% of teenage Facebook users have private profiles.” This proves that privacy is definitely something that people still wish to obtain.<sup id="cite_ref-7" class="reference"><a href="#cite_note-7"><span class="cite-bracket">[</span>7<span class="cite-bracket">]</span></a></sup> </p><p>A person's life becomes much more public because of social networking. Social media sites have allowed people to connect with many more people than with just in person interactions. People can connect with users from all across the world that they may never have the chance to meet in person. This can have positive effects; however, this also raises many concerns about privacy. Information can be posted about a person that they do not want getting out. In the book <i>It's Complicated</i>, the author, Danah Boyd, explains that some people “believe that a willingness to share in public spaces—and, most certainly, any act of exhibitionism and publicity—is incompatible with a desire for personal privacy." Once something is posted on the internet, it becomes accessible to multiple people and can even be shared beyond just assumed friends or followers. Many employers now look at a person's social media before hiring them for a job or position. Social media has become a tool that people use to find out information about a person's life. Someone can learn a lot about a person based on what they post before they even meet them once in person. The ability to achieve privacy is a never ending process. Boyd describes that “achieving privacy requires the ability to control the social situation by navigating complex contextual cues, technical affordances, and social dynamics." Society is constantly changing; therefore, the ability to understand social situations to obtain privacy regularly has to be changed.<sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span class="cite-bracket">[</span>8<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Various_levels_of_privacy_offered">Various levels of privacy offered</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=3" title="Edit section: Various levels of privacy offered"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Social networking sites vary in the levels of privacy offered. For some social networking sites like Facebook, providing real names and other personal information is encouraged by the site (onto a page known as a 'Profile'). This information usually consists of the birth date, current address, and telephone number(s). Some sites also allow users to provide more information about themselves such as interests, hobbies, favorite books or films, and even relationship status. However, there are other social network sites, such as <a href="/wiki/Match.com" title="Match.com">Match.com</a>, where most people prefer to be anonymous. Thus, linking users to their real identity can sometimes be rather difficult. Nevertheless, individuals can sometimes be identified with face re-identification. Studies have been done on two major social networking sites, and it is found that by overlapping 15% of the similar photographs, profile pictures with similar pictures over multiple sites can be matched to identify the users.<sup id="cite_ref-GrossP2_9-0" class="reference"><a href="#cite_note-GrossP2-9"><span class="cite-bracket">[</span>9<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="People_concern">People concern</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=4" title="Edit section: People concern"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>“According to research conducted by the Boston Consulting Group, privacy of personal data is a top issue for 76 percent of global consumers and 83 percent of U.S. consumers.”<sup id="cite_ref-10" class="reference"><a href="#cite_note-10"><span class="cite-bracket">[</span>10<span class="cite-bracket">]</span></a></sup> Six-in-ten Americans (61%) have said they would like to do more to protect their privacy.<sup id="cite_ref-:8_11-0" class="reference"><a href="#cite_note-:8-11"><span class="cite-bracket">[</span>11<span class="cite-bracket">]</span></a></sup> </p><p>For sites that do encourage information disclosure, it has been noted that a majority of the users have no trouble disclosing their personal information to a large group of people.<sup id="cite_ref-GrossP2_9-1" class="reference"><a href="#cite_note-GrossP2-9"><span class="cite-bracket">[</span>9<span class="cite-bracket">]</span></a></sup> In 2005, a study was performed to analyze data of 540 Facebook profiles of students enrolled at <a href="/wiki/Carnegie_Mellon_University" title="Carnegie Mellon University">Carnegie Mellon University</a>. It was revealed that 89% of the users gave genuine names, and 61% gave a photograph of themselves for easier identification.<sup id="cite_ref-GrossP2_9-2" class="reference"><a href="#cite_note-GrossP2-9"><span class="cite-bracket">[</span>9<span class="cite-bracket">]</span></a></sup> Majority of users also had not altered their privacy setting, allowing a large number of unknown users to have access to their personal information (the default setting originally allowed friends, friends of friends, and non-friends of the same network to have the full view of a user's profile). It is possible for users to block other users from locating them on Facebook, but this must be done by individual basis, and would, therefore, appear not to be commonly used for a wide number of people. Most users do not realize that while they may make use of the security features on Facebook the default setting is restored after each update. All of this has led to many concerns that users are displaying far too much information on social networking sites which may have serious implications on their privacy. Facebook was criticized due to the perceived laxity regarding privacy in the default setting for users.<sup id="cite_ref-12" class="reference"><a href="#cite_note-12"><span class="cite-bracket">[</span>12<span class="cite-bracket">]</span></a></sup> </p><p>The <a href="/wiki/Privacy#Privacy_paradox_and_economic_valuation" title="Privacy">“Privacy Paradox”</a> is a phenomenon that occurs when individuals, who state that they have concerns about their privacy online, take no action to secure their accounts.<sup id="cite_ref-:1_13-0" class="reference"><a href="#cite_note-:1-13"><span class="cite-bracket">[</span>13<span class="cite-bracket">]</span></a></sup> Furthermore, while individuals may take extra security steps for other online accounts, such as those related to banking or finance, this does not extend to social media accounts.<sup id="cite_ref-:1_13-1" class="reference"><a href="#cite_note-:1-13"><span class="cite-bracket">[</span>13<span class="cite-bracket">]</span></a></sup> Some of these basic or simple security steps would include deleting cookies, browser history, or checking one's computer for spyware.<sup id="cite_ref-:1_13-2" class="reference"><a href="#cite_note-:1-13"><span class="cite-bracket">[</span>13<span class="cite-bracket">]</span></a></sup> Some may attribute this lack of action to “third-person bias”. This occurs when people are aware of risks, but then do not believe that these risks apply or relate to them as individuals.<sup id="cite_ref-:1_13-3" class="reference"><a href="#cite_note-:1-13"><span class="cite-bracket">[</span>13<span class="cite-bracket">]</span></a></sup> Another explanation is a simple risk reward analysis. Individuals may be willing to risk their privacy to reap the rewards of being active on social media.<sup id="cite_ref-:1_13-4" class="reference"><a href="#cite_note-:1-13"><span class="cite-bracket">[</span>13<span class="cite-bracket">]</span></a></sup> Oftentimes, the risk of being exploited for the private information shared on the internet is overshadowed by the rewards of exclusively sharing personal information that bolsters the appeal of the social media user.<sup id="cite_ref-14" class="reference"><a href="#cite_note-14"><span class="cite-bracket">[</span>14<span class="cite-bracket">]</span></a></sup> </p><p>In the study by Van der Velden and El Emam, teenagers are described as “active users of social media, who seem to care about privacy, but who also reveal a considerable amount of personal information.”<sup id="cite_ref-:2_15-0" class="reference"><a href="#cite_note-:2-15"><span class="cite-bracket">[</span>15<span class="cite-bracket">]</span></a></sup> This brings up the issue of what should be managed privately on social media, and is an example of the <a href="/wiki/Privacy#Privacy_paradox_and_economic_valuation" title="Privacy">Privacy Paradox</a>. This study in particular looked at teenagers with mental illness and how they interact on <a href="/wiki/Social_media" title="Social media">social media</a>. Researchers found that “it is a place where teenage patients stay up-to-date about their social life—it is not seen as a place to discuss their diagnosis and treatment.”<sup id="cite_ref-:2_15-1" class="reference"><a href="#cite_note-:2-15"><span class="cite-bracket">[</span>15<span class="cite-bracket">]</span></a></sup> Therefore, social media is a forum that needs self-protection and privacy. Privacy should be a main concern, especially for teens who may not be entirely informed about the importance and consequences of public versus private use. For example, the “discrepancy between stated privacy concerns and the disclosure of private information.”<sup id="cite_ref-:2_15-2" class="reference"><a href="#cite_note-:2-15"><span class="cite-bracket">[</span>15<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="User_awareness_in_social_networking_sites">User awareness in social networking sites</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=5" title="Edit section: User awareness in social networking sites"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Users are often the targets as well as the source of information in social networking. Users leave digital imprints during browsing of social networking sites or services. It has been identified from few of the online studies, that users trust websites and social networking sites. As per trust referred,<sup id="cite_ref-drafts_16-0" class="reference"><a href="#cite_note-drafts-16"><span class="cite-bracket">[</span>16<span class="cite-bracket">]</span></a></sup> "trust is defined in (Mayer, Davis, and Schoorman, 1995) as "the willingness of a party to be vulnerable to the actions of another party based on the expectation that the other will perform a particular action important to the <b>trustor</b>, irrespective of the ability to monitor or control that other party" (p. 712)". A survey<sup id="cite_ref-facecloak_17-0" class="reference"><a href="#cite_note-facecloak-17"><span class="cite-bracket">[</span>17<span class="cite-bracket">]</span></a></sup> was conducted by Carnegie Mellon University, a majority of users provided their living city, phone numbers among other personal information, while user is clearly unaware of consequences of sharing certain information. Adding to this insight, is the social networking users are from various cities, remote villages, towns, cultures, traditions, religions, background, economic classes, education background, time zones and so on that highlight the significant gap in awareness. </p><p>The survey results of the paper<sup id="cite_ref-facecloak_17-1" class="reference"><a href="#cite_note-facecloak-17"><span class="cite-bracket">[</span>17<span class="cite-bracket">]</span></a></sup> suggest, "These results show that the interaction of trust and privacy concern in social networking sites is not yet understood to a sufficient degree to allow accurate modeling of behavior and activity. The results of the study encourage further research in the effort to understand the development of relationships in the online social environment and the reasons for differences in behavior on different sites." </p><p>As per reference, a survey conducted among social networking users at <a href="/wiki/Carnegie_Mellon_University" title="Carnegie Mellon University">Carnegie Mellon University</a> was indicative of following as reasons for lack of user awareness: 1) People's disregard of privacy risks due to trust in privacy and protection offered on social networking sites.<br /> 2) Availability of user's personal details to third-party tools/applications. <br />3) APIs and Frameworks also enable any user, who has the fair amount of knowledge to extract the user's data. <br />4) Cross-site forgery and other possible website threats. </p><p>There is hence a dire need for improving User's awareness swiftly, in order to address growing security and privacy concerns caused due to merely user's unawareness. Social networking sites themselves can take a responsibility and make such awareness possible by means of participatory methods by virtual online means.<sup id="cite_ref-18" class="reference"><a href="#cite_note-18"><span class="cite-bracket">[</span>18<span class="cite-bracket">]</span></a></sup> </p><p>To improve user's awareness, a possible method is to have privacy-related trainings for people to understand privacy concerns with the use of social media websites or apps.<sup id="cite_ref-:14_19-0" class="reference"><a href="#cite_note-:14-19"><span class="cite-bracket">[</span>19<span class="cite-bracket">]</span></a></sup> The trainings can include information of how certain companies or apps help secure user's privacy, and skills to protect user's privacy.<sup id="cite_ref-:14_19-1" class="reference"><a href="#cite_note-:14-19"><span class="cite-bracket">[</span>19<span class="cite-bracket">]</span></a></sup> </p><p>Studies have also shown that privacy literacy plays a role in enhancing use of privacy protective measures and people that are concerned about privacy were less likely to online services and share personal information.<sup id="cite_ref-20" class="reference"><a href="#cite_note-20"><span class="cite-bracket">[</span>20<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Data_access_methods">Data access methods</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=6" title="Edit section: Data access methods"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>There are several ways for third parties to access user information. Flickr is an example of a social media website that provides <a href="/wiki/Geotagging" title="Geotagging">geotagged</a> photos that allows users to view the exact location of where a person is visiting or staying. Geotagged photos make it easy for third party users to see where an individual is located or traveling to.<sup id="cite_ref-21" class="reference"><a href="#cite_note-21"><span class="cite-bracket">[</span>21<span class="cite-bracket">]</span></a></sup> There is also growing use of phishing, which reveals sensitive information through secretive links and downloads through email, messages, and other communications. Social media has opened up an entirely new realm for hackers to get information from normal posts and messages.<sup id="cite_ref-22" class="reference"><a href="#cite_note-22"><span class="cite-bracket">[</span>22<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Share_it_with_third_parties">Share it with third parties</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=7" title="Edit section: Share it with third parties"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Nearly all of the most popular applications on Facebook—including Farmville, Causes, and Quiz Planet—have been sharing users' information with advertising and tracking companies.<sup id="cite_ref-gawker.com_23-0" class="reference"><a href="#cite_note-gawker.com-23"><span class="cite-bracket">[</span>23<span class="cite-bracket">]</span></a></sup> Even though <a rel="nofollow" class="external text" href="https://www.facebook.com/policy.php">Facebook's privacy policy</a> says they can provide "any of the non-personally identifiable attributes we have collected"<sup id="cite_ref-24" class="reference"><a href="#cite_note-24"><span class="cite-bracket">[</span>24<span class="cite-bracket">]</span></a></sup> to advertisers, they violate this policy. If a user clicked a specific ad in a page, Facebook will send the user address of this page to advertisers, which will directly lead to a profile page. In this case, it is easy to identify users' names.<sup id="cite_ref-25" class="reference"><a href="#cite_note-25"><span class="cite-bracket">[</span>25<span class="cite-bracket">]</span></a></sup> For example, Take With Me Learning is an app that allows teachers and students to keep track of their academic process. The app requires personal information that includes, school name, user's name, email, and age. But Take With Me Learning was created by a company that was known for illegally gathering student's personal information without their knowledge and selling it to advertisement companies. This company had violated the <a href="/wiki/Children%27s_Online_Privacy_Protection_Act" title="Children's Online Privacy Protection Act">Children's Online Privacy Protection Act (COPPA)</a>, used to keep children safe from identity theft while using the internet.<sup id="cite_ref-26" class="reference"><a href="#cite_note-26"><span class="cite-bracket">[</span>26<span class="cite-bracket">]</span></a></sup> Most recently, Facebook has been scrutinized for the collection of users' data by <a href="/wiki/Cambridge_Analytica_scandal" class="mw-redirect" title="Cambridge Analytica scandal">Cambridge Analytica</a>. Cambridge Analytica was collecting data from Facebook users after they agreed to take a psychology questionnaire. Not only could Cambridge Analytica access the data of the person who took the survey, they could also access all of the data of that person's Facebook friends. This data was then used to hopefully sway people's’ beliefs in hopes that they would vote for a certain politician. While what Cambridge Analytica did by collecting the data may or may not be illegal, they then transferred the data they acquired to third parties so that it could be used to sway voters.<sup id="cite_ref-27" class="reference"><a href="#cite_note-27"><span class="cite-bracket">[</span>27<span class="cite-bracket">]</span></a></sup> Facebook was fined £500,000 in the UK, $5bn (£4bn) in the US, and in 2020, the company was taken to court by Australia's privacy regulator with the perspective of imposing a fine of A$1.7m (£860,000).<sup id="cite_ref-28" class="reference"><a href="#cite_note-28"><span class="cite-bracket">[</span>28<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="API">API</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=8" title="Edit section: API"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><a href="/wiki/Application_programming_interface" class="mw-redirect" title="Application programming interface">Application programming interface</a> (API) is a set of routines, protocols, and tools for building software applications. By using query language, sharing content and data between communities and applications became much easier. APIs simplify all that by limiting outside program access to a specific set of features—often enough, requests for data of one sort or another. APIs clearly define exactly how a program will interact with the rest of the software world—saving time.<sup id="cite_ref-29" class="reference"><a href="#cite_note-29"><span class="cite-bracket">[</span>29<span class="cite-bracket">]</span></a></sup> </p><p>An API allows software to “speak with other software.”<sup id="cite_ref-:3_30-0" class="reference"><a href="#cite_note-:3-30"><span class="cite-bracket">[</span>30<span class="cite-bracket">]</span></a></sup> Furthermore, an API can collect and provide information that is not publicly accessible. This is extremely enticing for researchers due to the greater number of possible avenues of research.<sup id="cite_ref-:3_30-1" class="reference"><a href="#cite_note-:3-30"><span class="cite-bracket">[</span>30<span class="cite-bracket">]</span></a></sup> The use of an API for data collection can be a focal point of the privacy conversation, because while the data can be anonymous, the difficulty is understanding when it becomes an invasion of privacy.<sup id="cite_ref-:3_30-2" class="reference"><a href="#cite_note-:3-30"><span class="cite-bracket">[</span>30<span class="cite-bracket">]</span></a></sup> Personal information can be collected in mass, but the debate over whether it breaches personal privacy is due to the inability to match this information with specific people.<sup id="cite_ref-:3_30-3" class="reference"><a href="#cite_note-:3-30"><span class="cite-bracket">[</span>30<span class="cite-bracket">]</span></a></sup> </p><p>There have however been some concerns with API because of the recent scandal between Facebook and the political consulting firm, <a href="/wiki/Facebook%E2%80%93Cambridge_Analytica_data_scandal" title="Facebook–Cambridge Analytica data scandal">Cambridge Analytica.</a> What happened was “Facebook allowed a third-party developer to engineer an application for the sole purpose of gathering data. And the developer was able to exploit a loophole to gather information on not only people who used the app but all their friends — without them knowing.” <sup id="cite_ref-31" class="reference"><a href="#cite_note-31"><span class="cite-bracket">[</span>31<span class="cite-bracket">]</span></a></sup> </p><p>In 2020, critics praised Apple and Google for their contact tracing API that had technical specifications that were conscious of privacy concerns.<sup id="cite_ref-32" class="reference"><a href="#cite_note-32"><span class="cite-bracket">[</span>32<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Search_engines">Search engines</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=9" title="Edit section: Search engines"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><a href="/wiki/Search_engine_technology" class="mw-redirect" title="Search engine technology">Search engines</a> are an easy way to find information without scanning every site yourself. Keywords that are typed into a search box will lead to the results. So it is necessary to make sure that the keywords typed are precise and correct. There are many such search engines, some of which may lead the user to fake sites which may obtain personal information or are laden with viruses. Furthermore, some search engines, like <a href="/wiki/DuckDuckGo" title="DuckDuckGo">DuckDuckGo</a>, will not violate the user's privacy.<sup id="cite_ref-33" class="reference"><a href="#cite_note-33"><span class="cite-bracket">[</span>33<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Location_data">Location data</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=10" title="Edit section: Location data"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>On most social media websites, user's geographical location can be gathered either by users (through voluntary check-in applications like Foursquare and Facebook Places) or by applications (through technologies like IP address geolocation, cellphone network triangulation, RFID and GPS). The approach used matters less than the result which holds that the content produced is coupled with the geographical location where the user produced it. Additionally, many applications attach the contents of other forms of information like OS language, device type and capture time. The result is that by posting, tweeting or taking pictures, users produce and share an enormous amount of personal information.<sup id="cite_ref-34" class="reference"><a href="#cite_note-34"><span class="cite-bracket">[</span>34<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Email_and_phone_number_leaks">Email and phone number leaks</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=11" title="Edit section: Email and phone number leaks"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Many large platforms reveal a part of a user's email address or phone number when using the <a href="/wiki/Self-service_password_reset" title="Self-service password reset">'forgotten password' function</a>. Often the whole email address can be derived from this hint and phone digits can be compared with known numbers.<sup id="cite_ref-35" class="reference"><a href="#cite_note-35"><span class="cite-bracket">[</span>35<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Benefit_from_data">Benefit from data</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=12" title="Edit section: Benefit from data"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>By using this accessible data along with <a href="/wiki/Data_mining" title="Data mining">data mining</a> technology, users' information can be used in different ways to improve <a href="/wiki/Customer_service" title="Customer service">customer service</a>. </p><p>According your retweets, likes, and <a href="/wiki/Hashtag" title="Hashtag">hashtags</a>, Twitter can recommend some topics and advertisements. Twitter's suggestions for whom to follow<sup id="cite_ref-36" class="reference"><a href="#cite_note-36"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup> are done by this <a href="/wiki/Recommendation_system" class="mw-redirect" title="Recommendation system">recommendation system</a>. Commerce, such as <a href="/wiki/Amazon.com" class="mw-redirect" title="Amazon.com">Amazon</a>, make use of users' information to recommend items for users. Recommendations are based on at least prior purchases, shopping cart, and wishlist. <a href="/wiki/Affinity_analysis" title="Affinity analysis">Affinity analysis</a> is a data mining technique that used to understand the purchase behavior of customers. </p><p>By using <a href="/wiki/Machine_learning" title="Machine learning">machine learning</a> method, whether a user is a potential follower of Starbucks can be predicted.<sup id="cite_ref-37" class="reference"><a href="#cite_note-37"><span class="cite-bracket">[</span>37<span class="cite-bracket">]</span></a></sup> In that case, it is possible to improve the quality and coverage of applications. In addition, user profiles can be used to identify similar users. </p><p>According to <a href="/wiki/Gary_Kovacs" title="Gary Kovacs">Gary Kovacs</a>'s speech about Tracking our online trackers, when he used the internet to find an answer to a question, "We are not even 2 bites into breakfast and there are already nearly 25 sites that are tracking me", and he was navigated by 4 of them.<sup id="cite_ref-38" class="reference"><a href="#cite_note-38"><span class="cite-bracket">[</span>38<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Privacy_concerns">Privacy concerns</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=13" title="Edit section: Privacy concerns"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Studies have shown that people's belief in the right to privacy is the most pivotal predictor in their attitudes concerning online privacy.<sup id="cite_ref-39" class="reference"><a href="#cite_note-39"><span class="cite-bracket">[</span>39<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Social_profiling_and_third_party_disclosure">Social profiling and third party disclosure</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=14" title="Edit section: Social profiling and third party disclosure"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The <a href="/wiki/Privacy_Act_of_1974" title="Privacy Act of 1974">Privacy Act of 1974</a> (a <a href="/wiki/United_States_federal_law" class="mw-redirect" title="United States federal law">United States federal law</a>) states: </p> <dl><dd><dl><dd>"No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains [subject to 12 exceptions]." <a rel="nofollow" class="external text" href="https://www.gpo.gov/fdsys/pkg/USCODE-2012-title5/pdf/USCODE-2012-title5-partI-chap5-subchapII-sec552a.pdf">5 U.S.C. § 552a(b)</a>.</dd></dl></dd></dl> <p>Disclosure in this context refers to any means of communication, be it written, oral, electronic or mechanical. This states that agencies are forbidden to give out, or disclose, the information of an individual without being given consent by the individual to release that information. However, it falls on the individual to prove that a wrongful disclosure, or disclosure in general, has occurred.<sup id="cite_ref-The_Privacy_Act_of_1974_40-0" class="reference"><a href="#cite_note-The_Privacy_Act_of_1974-40"><span class="cite-bracket">[</span>40<span class="cite-bracket">]</span></a></sup> Because of this social networking sites such as Facebook ask for permission when a third-party application is requesting the user's information. </p><p>Although The <a href="/wiki/Privacy_Act_of_1974" title="Privacy Act of 1974">Privacy Act of 1974</a> does a lot to limit privacy invasion through third party disclosure, it <i>does</i> list a series of twelve exceptions that deem disclosure permissible: </p> <dl><dd><dl><dd>1. For members of an agency who <i>need</i> such information "in the performance of their duties".</dd> <dd>2. If the <a href="/wiki/Freedom_of_Information_Act_(United_States)" title="Freedom of Information Act (United States)">Freedom of Information Act</a> requires such information</dd> <dd>3. If the information that is disclosed "is compatible with the purpose for which it was collected".</dd> <dd>4. If the <a href="/wiki/Bureau_of_Census" class="mw-redirect" title="Bureau of Census">Bureau of Census</a> needs such information to complete a particular census.</dd> <dd>5. If the third party explicitly informs the individual that the information collected will serve only as a form of "statistical research" and is not "individually identifiable".</dd> <dd>6. If it is historically relevant to be added to the National Archives and Records Administration.</dd> <dd>7. If such information was requested by a law enforcement agency.</dd> <dd>8. If such information is deemed beneficial to the "health or safety of an individual".</dd> <dd>9. If such information is requested by the House of Congress or by one of its subcommittees.</dd> <dd>10. If such information is requested by the head of the Government Accountability Office or by one "of his authorized representatives".</dd> <dd>11. If such information is requested through a court order.</dd> <dd>12. If such information is requested through the <a href="/wiki/Fair_Debt_Collection_Practices_Act" title="Fair Debt Collection Practices Act">Debt Collection Act</a>.<sup id="cite_ref-The_Privacy_Act_of_1974_40-1" class="reference"><a href="#cite_note-The_Privacy_Act_of_1974-40"><span class="cite-bracket">[</span>40<span class="cite-bracket">]</span></a></sup></dd></dl></dd></dl> <p>Social profiling allows for Facebook and other social networking media websites of filtering through the advertisements, assigning specific ones to specific age groups, gender groups, and even ethnicities.<sup id="cite_ref-Why_Web_2.0_will_end_your_privacy_2-2" class="reference"><a href="#cite_note-Why_Web_2.0_will_end_your_privacy-2"><span class="cite-bracket">[</span>2<span class="cite-bracket">]</span></a></sup> </p><p>Data aggregation sites like <a href="/wiki/Spokeo" title="Spokeo">Spokeo</a> have highlighted the feasibility of aggregating social data across social sites as well as integrating it with public records. A 2011 study<sup id="cite_ref-41" class="reference"><a href="#cite_note-41"><span class="cite-bracket">[</span>41<span class="cite-bracket">]</span></a></sup> highlighted these issues by measuring the amount of unintended information leakage over a large number of users with the varying number of social networks. It identified and measured information that could be used in attacks against what-you-know security. </p><p>Studies<sup id="cite_ref-42" class="reference"><a href="#cite_note-42"><span class="cite-bracket">[</span>42<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-43" class="reference"><a href="#cite_note-43"><span class="cite-bracket">[</span>43<span class="cite-bracket">]</span></a></sup> have also pointed to most social networks unintentionally providing third party advertising and tracking sites with personal information. It raises the issue of private information inadvertently being sent to third party advertising sites via Referrer strings or cookies. </p><p>Civil libertarians worry that social networking sites, particularly <a href="/wiki/Facebook" title="Facebook">Facebook</a>, have greatly diminished user confidentiality in numerous ways.<sup id="cite_ref-:9_44-0" class="reference"><a href="#cite_note-:9-44"><span class="cite-bracket">[</span>44<span class="cite-bracket">]</span></a></sup> For one thing, when social media platforms store private data, they also have complete access to that material as well. To sustain their profitability, applications like Facebook examine and market personal information by logging data through <a href="/wiki/Cookies_(Internet)" class="mw-redirect" title="Cookies (Internet)">cookies</a>, small files that stockpile the data on someone's device. Companies, such as Facebook, carry extensive amounts of private user information on file, regarding individuals’, “likes, dislikes, and preferences”, which are of high value to marketers.<sup id="cite_ref-45" class="reference"><a href="#cite_note-45"><span class="cite-bracket">[</span>45<span class="cite-bracket">]</span></a></sup> As Facebook reveals user information to advertising and marketing organizations, personalized endorsements will appear on news feeds based on “surfing behavior, hobbies, or pop culture preferences”.<sup id="cite_ref-:9_44-1" class="reference"><a href="#cite_note-:9-44"><span class="cite-bracket">[</span>44<span class="cite-bracket">]</span></a></sup> For those reasons, Facebook's critics fear that social networking companies may seek business ventures with stockholders by sharing user information in the exchange of profits. Additionally, they argue that since Facebook demonstrates an illusion of privacy presented by a “for-friends-only” type of platform, individuals find themselves more inclined to showcase more personal information online. According to the critics, users might notice that the sponsorships and commercials are tailored to their disclosed private data, which could result in a sense of betrayal.<sup id="cite_ref-:9_44-2" class="reference"><a href="#cite_note-:9-44"><span class="cite-bracket">[</span>44<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Institutional">Institutional</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=15" title="Edit section: Institutional"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>A number of institutions have expressed concern over the lack of privacy granted to users on social networking sites. These include <a href="/wiki/Schools" class="mw-redirect" title="Schools">schools</a>, <a href="/wiki/Libraries" class="mw-redirect" title="Libraries">libraries</a>, and Government agencies.<sup id="cite_ref-46" class="reference"><a href="#cite_note-46"><span class="cite-bracket">[</span>46<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Libraries">Libraries</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=16" title="Edit section: Libraries"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Libraries in the particular, being concerned with the privacy of individuals, have debated on allowing library patrons to access social networking sites on public library computers. While only 19% of librarians reportedly express real concern over social networking privacy, they have been particularly vocal in voicing their concerns.<sup id="cite_ref-Fernandez_47-0" class="reference"><a href="#cite_note-Fernandez-47"><span class="cite-bracket">[</span>47<span class="cite-bracket">]</span></a></sup> Some have argued that the lack of privacy found on social networking sites is contrary to the ethics supported by Library organizations, and the latter should thus be extremely apprehensive about dealing with the former.<sup id="cite_ref-Fernandez_47-1" class="reference"><a href="#cite_note-Fernandez-47"><span class="cite-bracket">[</span>47<span class="cite-bracket">]</span></a></sup> Supporters of this view present their argument from the code of ethics held by both the <a href="/wiki/American_Library_Association" title="American Library Association">American Library Association</a> and the UK based <a href="/wiki/Chartered_Institute_of_Library_and_Information_Professionals" title="Chartered Institute of Library and Information Professionals">Chartered Institute of Library and Information Professionals</a>, which affirms a commitment to upholding privacy as a fundamental right.<sup id="cite_ref-Fernandez_47-2" class="reference"><a href="#cite_note-Fernandez-47"><span class="cite-bracket">[</span>47<span class="cite-bracket">]</span></a></sup> In 2008, a study was performed in fourteen public libraries in the UK which found that 50% blocked access to social networking sites.<sup id="cite_ref-48" class="reference"><a href="#cite_note-48"><span class="cite-bracket">[</span>48<span class="cite-bracket">]</span></a></sup> Many school libraries have also blocked Facebook out of fear that children may be disclosing too much information on Facebook. However, as of 2011, Facebook has taken efforts to combat this concern by deleting profiles of users under the age of thirteen.<sup id="cite_ref-49" class="reference"><a href="#cite_note-49"><span class="cite-bracket">[</span>49<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Potential_dangers">Potential dangers</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=17" title="Edit section: Potential dangers"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Social_networking_service#Issues" title="Social networking service">Social networking service § Issues</a></div> <div class="mw-heading mw-heading3"><h3 id="Identity_theft">Identity theft</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=18" title="Edit section: Identity theft"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>As there is so much information provided other things can be deduced, such as the person's <a href="/wiki/Social_security_number" class="mw-redirect" title="Social security number">social security number</a>, which can then be used as part of <a href="/wiki/Identity_theft" title="Identity theft">identity theft</a>.<sup id="cite_ref-GrossP8_50-0" class="reference"><a href="#cite_note-GrossP8-50"><span class="cite-bracket">[</span>50<span class="cite-bracket">]</span></a></sup> In 2009, researchers at Carnegie Mellon University published a study showing that it is possible to predict most and sometimes all of an individual's 9-digit Social Security number using information gleaned from social networks and online databases. (See Predicting Social Security Numbers from Public Data by Acquisti and Gross).<sup id="cite_ref-privacyrights.org_51-0" class="reference"><a href="#cite_note-privacyrights.org-51"><span class="cite-bracket">[</span>51<span class="cite-bracket">]</span></a></sup> In response, various groups have advised that users either do not display their number, or hide it from Facebook 'friends' they do not personally know.<sup id="cite_ref-52" class="reference"><a href="#cite_note-52"><span class="cite-bracket">[</span>52<span class="cite-bracket">]</span></a></sup> Cases have also appeared of users having photographs stolen from social networking sites in order to assist in identity theft.<sup id="cite_ref-53" class="reference"><a href="#cite_note-53"><span class="cite-bracket">[</span>53<span class="cite-bracket">]</span></a></sup> According to the Huffington Post, Bulgarian IT consultant Bogomil Shopov claimed in a <a rel="nofollow" class="external text" href="http://talkweb.eu/i-just-bought-more-than-1-million-facebook-data-entries-omg/">recent blog</a> to have purchased personal information on more than 1 million Facebook users, for the shockingly low price of US$5.00. The data reportedly included users' full names, email addresses, and links to their Facebook pages.<sup id="cite_ref-54" class="reference"><a href="#cite_note-54"><span class="cite-bracket">[</span>54<span class="cite-bracket">]</span></a></sup> The following information could be used to steal the users' identities : Full names including middle name, date of birth, hometown, relationship status, residential information, other hobbies and interest. </p> <div class="mw-heading mw-heading3"><h3 id="Preteens_and_early_teenagers">Preteens and early teenagers</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=19" title="Edit section: Preteens and early teenagers"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Among all other age groups, in general, the most vulnerable victims of private-information-sharing behavior are preteens and early teenagers. According to research, many teens report that social media and social networking services are important to building relationships and friendships. With this fact comes privacy concerns such as identity theft, stealing of personal information, and data usage by advertising companies. Besides from using social media to connect, teenagers use social networking services for political purposes and obtaining information. However, sometimes social media can become the place for harassment and disrespectful political debates that fuels resentment and rises privacy concerns.<sup id="cite_ref-:8_11-1" class="reference"><a href="#cite_note-:8-11"><span class="cite-bracket">[</span>11<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-55" class="reference"><a href="#cite_note-55"><span class="cite-bracket">[</span>55<span class="cite-bracket">]</span></a></sup> </p><p>There have been age restrictions put on numerous websites but how effective they are is debatable.<sup id="cite_ref-56" class="reference"><a href="#cite_note-56"><span class="cite-bracket">[</span>56<span class="cite-bracket">]</span></a></sup> Findings have unveiled that informative opportunities regarding internet privacy as well as concerns from parents, teachers, and peers, play a significant role in impacting the internet user's behavior in regards to online privacy.<sup id="cite_ref-57" class="reference"><a href="#cite_note-57"><span class="cite-bracket">[</span>57<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-58" class="reference"><a href="#cite_note-58"><span class="cite-bracket">[</span>58<span class="cite-bracket">]</span></a></sup> Additionally, other studies have also found that the heightening of adolescents' concern towards their privacy will also lead to a greater probability that they will utilize privacy-protecting behaviors.<sup id="cite_ref-59" class="reference"><a href="#cite_note-59"><span class="cite-bracket">[</span>59<span class="cite-bracket">]</span></a></sup> In the technological culture that society is developing into, not only should adolescents' and parent's awareness be risen, but society as a whole should acknowledge the importance of online privacy.<sup id="cite_ref-60" class="reference"><a href="#cite_note-60"><span class="cite-bracket">[</span>60<span class="cite-bracket">]</span></a></sup> </p><p>Preteens and early teenagers are particularly susceptible to social pressures that encourage young people to reveal personal data when posting online. Teens often post information about their personal life, such as activities they are doing, sharing their current locations, who they spend time with, as well their thoughts and opinions. They tend to share this information because they do not want to feel left out or judged by other adolescents who are practicing these sharing activities already. Teens are motivated to keep themselves up to date with the latest gossip, current trends, and trending news and, in doing so they are allowing themselves to become victims of cyberbullying, stalking, and in the future, could potentially harm them when pursuing job opportunities, and in the context of privacy, become more inclined to share their private information to the public. This is concerning because preteens and teenagers are the least educated on how public social media is, how to protect themselves online, and the detrimental consequences that could come from sharing too much personal information online. As more and more young individuals are joining social media sites, they believe it is acceptable to post whatever they are thinking, as they don't realize the potential harm that information can do to them and how they are sacrificing their own privacy.<sup id="cite_ref-61" class="reference"><a href="#cite_note-61"><span class="cite-bracket">[</span>61<span class="cite-bracket">]</span></a></sup> "Teens are sharing more information about themselves on social media sites than they did in the past."<sup id="cite_ref-62" class="reference"><a href="#cite_note-62"><span class="cite-bracket">[</span>62<span class="cite-bracket">]</span></a></sup> Preteens and teenagers are sharing information on social media sites such as Facebook, Snapchat, Instagram, Twitter, Pinterest, and more by posting pictures and videos of themselves unaware of the privacy they are sacrificing.<sup id="cite_ref-Wexler,_Evan_2014_63-0" class="reference"><a href="#cite_note-Wexler,_Evan_2014-63"><span class="cite-bracket">[</span>63<span class="cite-bracket">]</span></a></sup> Adolescents post their real name, birthdays, and email addresses to their social media profiles.<sup id="cite_ref-Wexler,_Evan_2014_63-1" class="reference"><a href="#cite_note-Wexler,_Evan_2014-63"><span class="cite-bracket">[</span>63<span class="cite-bracket">]</span></a></sup> Children have less mobility than they have had in the past. Everything these teenagers do online is so they can stay in the loop of social opportunities, and the concern with this is that they do this in a way that is not only traceable but in a very persistent environment that motivates people to continue sharing information about themselves as well.<sup id="cite_ref-Wexler,_Evan_2014_63-2" class="reference"><a href="#cite_note-Wexler,_Evan_2014-63"><span class="cite-bracket">[</span>63<span class="cite-bracket">]</span></a></sup> Consequently, they continue to use social media sites such as Facebook, despite knowing there exists potential privacy risks.<sup id="cite_ref-64" class="reference"><a href="#cite_note-64"><span class="cite-bracket">[</span>64<span class="cite-bracket">]</span></a></sup> </p><p>California is also taking steps to protect the privacy of some social media users from users’ own judgments. In 2013, California enacted a law that would require social media sites to allow young registered users to erase their own comments from sites.<sup id="cite_ref-65" class="reference"><a href="#cite_note-65"><span class="cite-bracket">[</span>65<span class="cite-bracket">]</span></a></sup> This is a first step in the United States toward the “<a href="/wiki/Right_to_be_forgotten" title="Right to be forgotten">right to be forgotten</a>” that has been debated around the world over the past decade. </p> <div class="mw-heading mw-heading3"><h3 id="Sexual_predators">Sexual predators</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=20" title="Edit section: Sexual predators"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Most major social networking sites are committed to ensuring that use of their services are as safe as possible. However, due to the high content of personal information placed on social networking sites, as well as the ability to hide behind a pseudo-identity, such sites have become increasingly popular for <a href="/wiki/Sexual_predator" title="Sexual predator">sexual predators</a> online.<sup id="cite_ref-66" class="reference"><a href="#cite_note-66"><span class="cite-bracket">[</span>66<span class="cite-bracket">]</span></a></sup> Further, lack of age verification mechanisms is a cause of concern in these social networking platforms.<sup id="cite_ref-67" class="reference"><a href="#cite_note-67"><span class="cite-bracket">[</span>67<span class="cite-bracket">]</span></a></sup> However, it was also suggested that the majority of these simply transferred to using the services provided by Facebook.<sup id="cite_ref-68" class="reference"><a href="#cite_note-68"><span class="cite-bracket">[</span>68<span class="cite-bracket">]</span></a></sup> While the numbers may remain small, it has been noted that the number of sexual predators caught using social networking sites has been increasing, and has now reached an almost weekly basis.<sup id="cite_ref-69" class="reference"><a href="#cite_note-69"><span class="cite-bracket">[</span>69<span class="cite-bracket">]</span></a></sup> In worst cases children have become victims of pedophiles or lured to meet strangers.They say that sexual predators can lurk anonymously through the wormholes of cyberspace and access victim profiles online.<sup id="cite_ref-70" class="reference"><a href="#cite_note-70"><span class="cite-bracket">[</span>70<span class="cite-bracket">]</span></a></sup> A number of highly publicized cases have demonstrated the threat posed for users, such as <a href="/wiki/Peter_Chapman_(murderer)" title="Peter Chapman (murderer)">Peter Chapman</a> who, under a false name, added over 3,000 friends and went on to rape and murder a 17-year-old girl in 2009.<sup id="cite_ref-71" class="reference"><a href="#cite_note-71"><span class="cite-bracket">[</span>71<span class="cite-bracket">]</span></a></sup> In another case, a 12-year-old, Evergreen girl was safely found by the FBI with the help of Facebook, due to her mother learning of her daughter's conversation with a man she had met on the popular social networking application. </p> <div class="mw-heading mw-heading3"><h3 id="Stalking">Stalking</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=21" title="Edit section: Stalking"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Cyberstalking" title="Cyberstalking">Cyberstalking</a></div> <p>The potential ability for <a href="/wiki/Stalking" title="Stalking">stalking</a> users on social networking sites has been noted and shared. Popular social networking sites make it easy to build a web of friends and acquaintances and share with them your photos, whereabouts, contact information, and interests without ever getting the chance to actually meet them. With the amount of information that users post about themselves online, it is easy for users to become a victim of stalking without even being aware of the risk. 63% of Facebook profiles are visible to the public, meaning if you Google someone's name and you add "+Facebook" in the search bar you pretty much will see most of the person profile.<sup id="cite_ref-cyberstalking_72-0" class="reference"><a href="#cite_note-cyberstalking-72"><span class="cite-bracket">[</span>72<span class="cite-bracket">]</span></a></sup> A study of Facebook profiles from students at Carnegie Mellon University revealed that about 800 profiles included current resident and at least two classes being studied, theoretically allowing viewers to know the precise location of individuals at specific times.<sup id="cite_ref-GrossP8_50-1" class="reference"><a href="#cite_note-GrossP8-50"><span class="cite-bracket">[</span>50<span class="cite-bracket">]</span></a></sup> <a href="/wiki/AOL" title="AOL">AOL</a> attracted controversy over its instant messenger AIM which permits users to add 'buddies' without their knowing, and therefore track when a user is online.<sup id="cite_ref-GrossP8_50-2" class="reference"><a href="#cite_note-GrossP8-50"><span class="cite-bracket">[</span>50<span class="cite-bracket">]</span></a></sup> Concerns have also been raised over the relative ease for people to read private messages or e-mails on social networking sites.<sup id="cite_ref-73" class="reference"><a href="#cite_note-73"><span class="cite-bracket">[</span>73<span class="cite-bracket">]</span></a></sup> Cyberstalking is a criminal offense that comes into play under state anti-stalking laws, slander laws, and harassment laws. A cyberstalking conviction can result in a restraining order, probation, or even criminal penalties against the assailant, including jail.<sup id="cite_ref-cyberstalking_72-1" class="reference"><a href="#cite_note-cyberstalking-72"><span class="cite-bracket">[</span>72<span class="cite-bracket">]</span></a></sup> </p><p>Some applications are explicitly centered on "cyber stalking." An application named "Creepy" can track a person's location on a map using photos uploaded to Twitter or Flickr. When a person uploads photos to a social networking site, others are able to track their most recent location. Some smartphones are able to embed the longitude and latitude coordinates into the photo and automatically send this information to the application. Anybody using the application can search for a specific person and then find their immediate location. This poses many potential threats to users who share their information with a large group of followers.<sup id="cite_ref-74" class="reference"><a href="#cite_note-74"><span class="cite-bracket">[</span>74<span class="cite-bracket">]</span></a></sup> </p><p>Facebook "Places," is a Facebook service, which publicizes user location information to the networking community. Users are allowed to "check-in" at various locations including retail stores, convenience stores, and restaurants. Also, users are able to create their own "place," disclosing personal information onto the Internet. This form of <a href="/wiki/Geolocation" class="mw-redirect" title="Geolocation">location tracking</a> is automated and must be turned off manually. Various settings must be turned off and manipulated in order for the user to ensure privacy. According to epic.org, Facebook users are recommended to: (1) disable "Friends can check me in to Places," (2) customize "Places I Check In," (3) disable "People Here Now," and (4) uncheck "Places I've Visited.".<sup id="cite_ref-Facebook._PIC_75-0" class="reference"><a href="#cite_note-Facebook._PIC-75"><span class="cite-bracket">[</span>75<span class="cite-bracket">]</span></a></sup> Moreover, the Federal Trade Commission has received two complaints in regards to Facebook's "unfair and deceptive" trade practices, which are used to target advertising sectors of the online community. "Places" tracks user location information and is used primarily for advertising purposes. Each location tracked allows third party advertisers to customize advertisements that suit one's interests. Currently, the Federal Trade Commissioner along with the Electronic Privacy Information Center are shedding light on the issues of location data tracking on social networking sites.<sup id="cite_ref-Facebook._PIC_75-1" class="reference"><a href="#cite_note-Facebook._PIC-75"><span class="cite-bracket">[</span>75<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Unintentional_fame">Unintentional fame</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=22" title="Edit section: Unintentional fame"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Unintentional fame can harm a person's character, reputation, relationships, chance of employment, and privacy- ultimately infringing upon a person's right to the pursuit of happiness. Many cases of unintentional fame have led its victims to take legal action. The right to be forgotten is a legal concept that includes removing one's information from the media that was once available to the public. The right to be forgotten is currently enforced in the European Union and Argentina, and has been recognized in various cases in the United States, particularly in the case of Melvin v. Reid. However, there is controversy surrounding the right to be forgotten in the United States as it conflicts with the public's right to know and the Constitution's First Amendment, restricting one's “right to freedom of speech and freedom of expression” (Amendment I). </p><p>Privacy concerns have also been raised over a number of high-profile incidents which can be considered embarrassing for users. Various internet memes have been started on social networking sites or been used as a means towards their spread across the internet. In 2002, a Canadian teenager became known as the <a href="/wiki/Star_Wars_Kid" title="Star Wars Kid">Star Wars Kid</a> after a video of him using a golf club as a <a href="/wiki/Light_sabre" class="mw-redirect" title="Light sabre">light sabre</a> was posted on the internet without his consent. The video quickly became a hit, much to the embarrassment of the teenager, who claims to have suffered as a result.<sup id="cite_ref-76" class="reference"><a href="#cite_note-76"><span class="cite-bracket">[</span>76<span class="cite-bracket">]</span></a></sup> Along with other incidents of videos being posted on social networking sites, this highlights the ability for personal information to be rapidly transferred between users. </p> <div class="mw-heading mw-heading3"><h3 id="Employment">Employment</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=23" title="Edit section: Employment"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Issues relating to privacy and employment are becoming a concern with regards to social networking sites. As of 2008, it has been estimated by <a href="/wiki/CareerBuilder.com" class="mw-redirect" title="CareerBuilder.com">CareerBuilder.com</a> that one in five employers search social networking sites in order to screen potential candidates (increasing from only 11% in 2006).<sup id="cite_ref-Havenstein_77-0" class="reference"><a href="#cite_note-Havenstein-77"><span class="cite-bracket">[</span>77<span class="cite-bracket">]</span></a></sup> For the majority of employers, such action is to acquire negative information about candidates. For example, 41% of managers considered information relating to candidates' alcohol and drug use to be a top concern.<sup id="cite_ref-Havenstein_77-1" class="reference"><a href="#cite_note-Havenstein-77"><span class="cite-bracket">[</span>77<span class="cite-bracket">]</span></a></sup> Other concerns investigated via social networking sites included poor communication skills, inappropriate photographs, inaccurate qualifications and bad-mouthing former employers/colleagues.<sup id="cite_ref-Havenstein_77-2" class="reference"><a href="#cite_note-Havenstein-77"><span class="cite-bracket">[</span>77<span class="cite-bracket">]</span></a></sup> However, 24% manager claimed that information found on a social networking site persuaded them to hire a candidate, suggesting that a user image can be used in a positive way. </p><p>While there is little doubt that employers will continue to use social networking sites as a means of monitoring staff and screening potential candidates, it has been noted that such actions may be illegal under in jurisdictions. According to Workforce.com, employers who use Facebook or Myspace could potentially face legal action: </p><p>If a potential employer uses a social networking site to check out a job candidate and then rejects that person based on what they see, he or she could be charged with discrimination.<sup id="cite_ref-78" class="reference"><a href="#cite_note-78"><span class="cite-bracket">[</span>78<span class="cite-bracket">]</span></a></sup> On August 1, 2012, Illinois joined the state of Maryland (law passed in March 2012) in prohibiting employer access to social media web sites of their employees and prospective employees. A number of other states that are also considering such prohibitory legislation (California, Delaware, Massachusetts, Michigan, Minnesota, Missouri, New Jersey, New York, Ohio, South Carolina and Washington), as is the United States Congress. In April 2012, the Social Networking Online Protection Act (2012 H.R. 5050) was introduced in the <a href="/wiki/United_States_House_of_Representatives" title="United States House of Representatives">United States House of Representatives</a>, and the Password Protection Act of 2012 (2012 S. 3074) was introduced in the <a href="/wiki/United_States_Senate" title="United States Senate">United States Senate</a> in May 2012, which prohibit employers from requiring access to their employees' social media web sites.<sup id="cite_ref-79" class="reference"><a href="#cite_note-79"><span class="cite-bracket">[</span>79<span class="cite-bracket">]</span></a></sup> </p><p>With the recent concerns about new technologies, the United States is now developing laws and regulations to protect certain aspects of people's information on different medias.[CR4] For example, 12 states in the US currently have laws specifically restricting employers from demanding access to their employees’ social media sites when those sites are not fully public.<sup id="cite_ref-80" class="reference"><a href="#cite_note-80"><span class="cite-bracket">[</span>80<span class="cite-bracket">]</span></a></sup> (The states that have passed these laws are Arkansas, California, Colorado, Illinois, Maryland, Michigan, New Jersey, New Mexico, Nevada, Oregon, Utah, and Washington.)<sup id="cite_ref-81" class="reference"><a href="#cite_note-81"><span class="cite-bracket">[</span>81<span class="cite-bracket">]</span></a></sup> </p><p>Monitoring of social networking sites is not limited to potential workers. Issues relating to privacy are becoming an increasing concern for those currently in employment. A number of high-profile cases have appeared in which individuals have been sacked for posting comments on social networking which have been considered disparaging to their current employers or fellow workers. In 2009, sixteen-year-old Kimberley Swann was sacked from her position at Ivell Marketing and Logistics Limited after describing her job as 'boring'.<sup id="cite_ref-82" class="reference"><a href="#cite_note-82"><span class="cite-bracket">[</span>82<span class="cite-bracket">]</span></a></sup> In 2008, Virgin Atlantic sacked thirteen cabin crew staff, after it emerged they used had criticized the company's safety standards and called passengers 'chavs' on Facebook.<sup id="cite_ref-83" class="reference"><a href="#cite_note-83"><span class="cite-bracket">[</span>83<span class="cite-bracket">]</span></a></sup> There is no federal law that we are aware of that an employer is breaking by monitoring employees on social networking sites. In fact, employers can even hire third-party companies to monitor online employee activity for them. According to an <a rel="nofollow" class="external text" href="http://readwrite.com/2010/03/24/social_sentry_track_employees_across_the_web#awesm=~oGEJFhp3CTln1Z">article by Read Write Web</a> employers use the service to "make sure that employees don't leak sensitive information on social networks or engage in any behavior that could damage a company's reputation."<sup id="cite_ref-privacyrights.org_51-1" class="reference"><a href="#cite_note-privacyrights.org-51"><span class="cite-bracket">[</span>51<span class="cite-bracket">]</span></a></sup> While employers may have found such usages of social networking sites convenient, complaints have been put forward by civil liberties groups and trade unions on the invasive approach adopted by many employers. In response to the Kimberley Swann case, Brendan Barber, of the <a href="/wiki/Trades_Union_Congress" title="Trades Union Congress">TUC</a> union stated that: </p><p>Most employers wouldn't dream of following their staff down the pub to see if they were sounding off about work to their friends," he said. "Just because snooping on personal conversations is possible these days, it doesn't make it healthy." </p><p>Monitoring of staff's social networking activities is also becoming an increasingly common method of ensuring that employees are not browsing websites during work hours. It was estimated in 2010 that an average of two million employees spent over an hour a day on social networking sites, costing potentially £14 billion.<sup id="cite_ref-84" class="reference"><a href="#cite_note-84"><span class="cite-bracket">[</span>84<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Burglary">Burglary</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=24" title="Edit section: Burglary"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>A male burglar in <a href="/wiki/Orange_County,_California" title="Orange County, California">Orange County, California</a> in 2015 targeted 33 women by using GPS data embedded on Facebook and Instagram photos, and stole $250,000 in electronics and jewelry, along with his victims’ underwear and bras.<sup id="cite_ref-85" class="reference"><a href="#cite_note-85"><span class="cite-bracket">[</span>85<span class="cite-bracket">]</span></a></sup> A former burglar probed social media to determine when their victims were away, by looking for photos suggesting a vacation. Instagram posts showing expensive new products have been used by thieves to find victims, along with posts featuring new homes showing their address.<sup id="cite_ref-86" class="reference"><a href="#cite_note-86"><span class="cite-bracket">[</span>86<span class="cite-bracket">]</span></a></sup> A survey in the <a href="/wiki/United_Kingdom" title="United Kingdom">United Kingdom</a> showed that 78% of burglars have used Facebook and Twitter to find victims.<sup id="cite_ref-87" class="reference"><a href="#cite_note-87"><span class="cite-bracket">[</span>87<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-88" class="reference"><a href="#cite_note-88"><span class="cite-bracket">[</span>88<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-89" class="reference"><a href="#cite_note-89"><span class="cite-bracket">[</span>89<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Online_victimization">Online victimization</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=25" title="Edit section: Online victimization"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Social networks are designed for individuals to socially interact with other people over the Internet. However, some individuals engage in undesirable online social behaviors, which negatively impacts other people's online experiences. It has created a wide range of online interpersonal <a href="/wiki/Victimisation" title="Victimisation">victimization</a>. Some studies have shown that social network victimization appears largely in adolescent and teens, and the type of victimization includes sexual advances and harassment.<sup id="cite_ref-Henson_90-0" class="reference"><a href="#cite_note-Henson-90"><span class="cite-bracket">[</span>90<span class="cite-bracket">]</span></a></sup> Recent research has reported approximately 9% of online victimization involves social network activities.<sup id="cite_ref-Henson_90-1" class="reference"><a href="#cite_note-Henson-90"><span class="cite-bracket">[</span>90<span class="cite-bracket">]</span></a></sup> It has been noted that many of these victims are girls who have been sexually victimized over these social network sites.<sup id="cite_ref-Henson_90-2" class="reference"><a href="#cite_note-Henson-90"><span class="cite-bracket">[</span>90<span class="cite-bracket">]</span></a></sup> Research concludes that many of social network victimizations are associated with user behaviors and interaction with one another. Negative social behaviors such as aggressive attitudes and discussing sexual related topics motivate the offenders to achieve their goals.<sup id="cite_ref-Henson_90-3" class="reference"><a href="#cite_note-Henson-90"><span class="cite-bracket">[</span>90<span class="cite-bracket">]</span></a></sup> All in all, positive online social behaviors is promoted to help reduce and avoid online victimization. </p> <div class="mw-heading mw-heading3"><h3 id="Surveillance">Surveillance</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=26" title="Edit section: Surveillance"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>While the concept of a worldwide communicative network seems to adhere to the public sphere model, market forces control access to such a resource. In 2010, investigation by The Wall Street Journal found that many of the most popular applications on Facebook were transmitting identifying information about users and their friends to advertisers and internet tracking companies, which is a violation of Facebook's privacy policy.<sup id="cite_ref-Andrews2012_91-0" class="reference"><a href="#cite_note-Andrews2012-91"><span class="cite-bracket">[</span>91<span class="cite-bracket">]</span></a></sup> The Wall Street Journal analyzed the ten most popular Facebook apps, including Zynga's FarmVille with 57 million users, and Zynga's Mafia Wars with 21.9 million users, and found that they were transmitting Facebook user IDs to data aggregators.<sup id="cite_ref-Andrews2012_91-1" class="reference"><a href="#cite_note-Andrews2012-91"><span class="cite-bracket">[</span>91<span class="cite-bracket">]</span></a></sup> Every online move leaves cyber footprints that are rapidly becoming fodder for research without people ever realizing it. Using social media for academic research is accelerating and raising ethical concerns along the way, as vast amounts of information collected by private companies — including Google, Microsoft, Facebook and Twitter — are giving new insight into all aspects of everyday life. Our social media "audience" is bigger than we actually know; our followers or friends aren't the only ones that can see information about us. Social media sites are collecting data from us just by searching something such as "favorite restaurant" on our search engine. Facebook is transformed from a public space to a behavioral laboratory," says the study, which cites a Harvard-based research project of 1,700 college-based Facebook users in which it became possible to "deanonymize parts of the data set," or cross-reference anonymous data to make student identification possible.<sup id="cite_ref-USATODAY_92-0" class="reference"><a href="#cite_note-USATODAY-92"><span class="cite-bracket">[</span>92<span class="cite-bracket">]</span></a></sup> Some of Facebook's research on user behavior found that 71% of people drafted at least one post that they never posted.<sup id="cite_ref-USATODAY_92-1" class="reference"><a href="#cite_note-USATODAY-92"><span class="cite-bracket">[</span>92<span class="cite-bracket">]</span></a></sup> Another analyzed 400,000 posts and found that children's communication with parents decreases in frequency from age 13 but then rises when they move out.<sup id="cite_ref-USATODAY_92-2" class="reference"><a href="#cite_note-USATODAY-92"><span class="cite-bracket">[</span>92<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Law_enforcement_prowling_the_networks">Law enforcement prowling the networks</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=27" title="Edit section: Law enforcement prowling the networks"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Use_of_social_network_websites_in_investigations" title="Use of social network websites in investigations">Use of social network websites in investigations</a></div> <p>The FBI has dedicated undercover agents on Facebook, Twitter, MySpace, <a href="/wiki/LinkedIn" title="LinkedIn">LinkedIn</a>. One example of investigators using Facebook to nab a criminal is the case of Maxi Sopo. Charged with bank fraud, and having escaped to Mexico, he was nowhere to be found until he started posting on Facebook. Although his profile was private, his list of friends was not, and through this vector, where he met a former official of the Justice Department, he was eventually caught.<sup id="cite_ref-93" class="reference"><a href="#cite_note-93"><span class="cite-bracket">[</span>93<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-94" class="reference"><a href="#cite_note-94"><span class="cite-bracket">[</span>94<span class="cite-bracket">]</span></a></sup> </p><p>In recent years, some state and local law enforcement agencies have also begun to rely on social media websites as resources. Although obtaining records of information not shared publicly by or about site users often requires a subpoena, public pages on sites such as Facebook and MySpace offer access to personal information that can be valuable to law enforcement.<sup id="cite_ref-95" class="reference"><a href="#cite_note-95"><span class="cite-bracket">[</span>95<span class="cite-bracket">]</span></a></sup> Police departments have reported using social media websites to assist in investigations, locate and track suspects, and monitor gang activity.<sup id="cite_ref-96" class="reference"><a href="#cite_note-96"><span class="cite-bracket">[</span>96<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-97" class="reference"><a href="#cite_note-97"><span class="cite-bracket">[</span>97<span class="cite-bracket">]</span></a></sup> </p><p>On October 18, 2017, the Department of Homeland Security (DHS) was scheduled to begin using personal information collected using social media platforms to screen immigrants arriving in the U.S. The department made this new measure known in a posting to the Federal Register in September 2017, noting that “...social media handles, aliases, associated identifiable information and search results...” would be included in an applicant's immigration file.<sup id="cite_ref-98" class="reference"><a href="#cite_note-98"><span class="cite-bracket">[</span>98<span class="cite-bracket">]</span></a></sup> This announcement, which was made relatively quietly, has received criticism from privacy advocates. The Department of Homeland Security issued a statement in late September 2017 asserting that the planned use of social media is nothing new, with one department spokesperson saying DHS has been using social media to collect information for years. According to a statement made to National Public Radio, DHS uses “...social media handles, aliases, associated identifiable information, and search results” to keep updated records on persons of interest.<sup id="cite_ref-99" class="reference"><a href="#cite_note-99"><span class="cite-bracket">[</span>99<span class="cite-bracket">]</span></a></sup> According to the DHS, the posting to the Federal Register was an effort to be transparent regarding information about social media that is already being collected from immigrants. </p><p>Government use of SMMS, or “Social Media Monitoring Software", may geographically track us as we communicate. It can chart out our relationships, networks, and associations. It can monitor protests, identify the leaders of political and social movements, and measure our influence.”<sup id="cite_ref-:10_100-0" class="reference"><a href="#cite_note-:10-100"><span class="cite-bracket">[</span>100<span class="cite-bracket">]</span></a></sup> SMMS is also a growing industry. SMMS “products like XI Social Discovery, <a href="/wiki/Geofeedia" title="Geofeedia">Geofeedia</a>, <a href="/wiki/Dataminr" title="Dataminr">Dataminr</a>, Dunami, and SocioSpyder (to name just a few) are being purchased in droves by Fortune 500 companies, politicians, law enforcement, federal agencies, defense contractors, and the military. Even the CIA has a venture fund, <a href="/wiki/In-Q-Tel" title="In-Q-Tel">In-Q-Tel</a>, that invests in SMMS technology.”<sup id="cite_ref-:10_100-1" class="reference"><a href="#cite_note-:10-100"><span class="cite-bracket">[</span>100<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Mob_rule">Mob rule</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=28" title="Edit section: Mob rule"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The idea of the 'mob rule' can be described as a situation in which control is held by those outside the conventional or lawful realm. In response to the <a href="/wiki/News_International_phone_hacking_scandal" title="News International phone hacking scandal">News International phone hacking scandal</a> involving <a href="/wiki/News_of_the_World" title="News of the World">News of the World</a> in the United Kingdom, a report was written to enact new media privacy regulations. </p><p>The British author of the <a href="/wiki/Leveson_Inquiry" title="Leveson Inquiry">Leveson Report</a> on the ethics of the British press, <a href="/wiki/Brian_Leveson" title="Brian Leveson">Lord Justice Leveson</a>, has drawn attention to the need to take action on protecting privacy on the internet. This movement is described by Lord Justice Leveson as a global megaphone for gossip: "There is not only a danger of trial by Twitter, but also of an unending punishment, and no prospect of rehabilitation, by Google".<sup id="cite_ref-101" class="reference"><a href="#cite_note-101"><span class="cite-bracket">[</span>101<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Location_updates">Location updates</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=29" title="Edit section: Location updates"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Foursquare, Facebook, Loopt are application which allow users to check- in and these capabilities allows a user to share their current location information to their connection. Some of them even update their travel plans on social networking applications. However, the disclosure of location information within these networks can cause privacy concerns among mobile users. Foursquare defines another framework of action for the user. It appears to be in the interest of Foursquare that users provide many personal data that are set as public. This is illustrated, among others, by the fact that, although all the respondents want high control over the (location) privacy settings, almost none of them ever checked the Foursquare privacy settings before.<sup id="cite_ref-102" class="reference"><a href="#cite_note-102"><span class="cite-bracket">[</span>102<span class="cite-bracket">]</span></a></sup> Although there are algorithms using encryption, k-anonymity and noise injection algorithms, its better to understand how the location sharing works in these applications to see if they have good algorithms in place to protect location privacy.<sup id="cite_ref-103" class="reference"><a href="#cite_note-103"><span class="cite-bracket">[</span>103<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Invasive_privacy_agreements">Invasive privacy agreements</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=30" title="Edit section: Invasive privacy agreements"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Another privacy issue with social networks is the privacy agreement. The privacy agreement states that the social network owns all of the content that users upload. This includes pictures, videos, and messages are all stored in the social networks database even if the user decides to terminate his or her account.<sup id="cite_ref-facebook.com_104-0" class="reference"><a href="#cite_note-facebook.com-104"><span class="cite-bracket">[</span>104<span class="cite-bracket">]</span></a></sup> </p><p>Privacy agreements oftentimes say that they can track a user's location and activity based on the device used for the site. For example, the privacy agreement for Facebook states that "all devices that a person uses to access Facebook are recorded such as IP addresses, phone numbers, operating system and even <a href="/wiki/Global_Positioning_System" title="Global Positioning System">GPS</a> locations".<sup id="cite_ref-105" class="reference"><a href="#cite_note-105"><span class="cite-bracket">[</span>105<span class="cite-bracket">]</span></a></sup> One main concern about privacy agreements are the length, because they take a lot of time to fully read and understand. Most privacy agreements state the most important information at the end because it is assumed that people will not read it completely. </p><p>The ethical dilemma lies in that upon the agreement to register for SNSs, the personal information disclosed is legally accessible and managed by the sites privately established online security operators and operating systems; leaving access of user data to be "under the discretion" of the site(s) operators. Giving rise to the moral obligation and responsibility of the sites operators to maintain private information to be within user control. However, due to the legality of outsourcing of user data upon registration- without prior discretion, data outsourcing has been frequented by SNSs operating systems- regardless of user privacy settings.<sup id="cite_ref-106" class="reference"><a href="#cite_note-106"><span class="cite-bracket">[</span>106<span class="cite-bracket">]</span></a></sup> </p><p>Data outsourcing has been proven to be consistently exploited since the emergence of SNSs. Employers have often been found to hire individuals or companies to search deep into the SNSs user database to find "less than pleasant" information regarding applicants during the review process.<sup id="cite_ref-:0_107-0" class="reference"><a href="#cite_note-:0-107"><span class="cite-bracket">[</span>107<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Reading_a_privacy_statement_in_terms_and_conditions">Reading a privacy statement in terms and conditions</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=31" title="Edit section: Reading a privacy statement in terms and conditions"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1248666159">.mw-parser-output .tfd-dated{font-size:85%}.mw-parser-output .tfd-default{border-bottom:1px solid var(--border-color-base,#a2a9b1);clear:both;text-align:center}.mw-parser-output .tfd-tiny{font-weight:bold}.mw-parser-output .tfd-inline{border:1px solid var(--border-color-base,#a2a9b1)}.mw-parser-output .tfd-sidebar{border-bottom:1px solid var(--border-color-base,#a2a9b1);text-align:center;position:relative}@media(min-width:640px){.mw-parser-output .tfd-sidebar{clear:right;float:right;width:22em}}</style><p><span class="tfd tfd-dated tfd-inline">‹The <a href="/wiki/Help:Template" title="Help:Template">template</a> <i><a href="/wiki/Template:How-to" title="Template:How-to">How-to</a></i> is being <a href="/wiki/Wikipedia:Templates_for_discussion/Log/2024_November_25#Template:How-to" title="Wikipedia:Templates for discussion/Log/2024 November 25">considered for merging</a>.›</span> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1251242444"></p><table class="box-Howto plainlinks metadata ambox ambox-content" role="presentation"><tbody><tr><td class="mbox-image"><div class="mbox-image-div"><span typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/b/b4/Ambox_important.svg/40px-Ambox_important.svg.png" decoding="async" width="40" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/b/b4/Ambox_important.svg/60px-Ambox_important.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/b/b4/Ambox_important.svg/80px-Ambox_important.svg.png 2x" data-file-width="40" data-file-height="40" /></span></span></div></td><td class="mbox-text"><div class="mbox-text-span">This section <b>contains <a href="/wiki/Wikipedia:What_Wikipedia_is_not#NOTHOWTO" title="Wikipedia:What Wikipedia is not">instructions, advice, or how-to content</a></b>.<span class="hide-when-compact"> Please help <a class="external text" href="https://en.wikipedia.org/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit">rewrite the content</a> so that it is more encyclopedic or <a href="https://meta.wikimedia.org/wiki/Help:Transwiki" class="extiw" title="m:Help:Transwiki">move</a> it to <a href="https://en.wikiversity.org/wiki/" class="extiw" title="v:">Wikiversity</a>, <a href="https://en.wikibooks.org/wiki/" class="extiw" title="b:">Wikibooks</a>, or <a href="https://en.wikivoyage.org/wiki/" class="extiw" title="voy:">Wikivoyage</a>.</span> <span class="date-container"><i>(<span class="date">December 2019</span>)</i></span></div></td></tr></tbody></table> <p>One of the main concerns that people have with their security is the lack of visibility that policies and settings have in the social networks. It is often located in areas hard to see like the top left or right of the screen. Another concern is the lack of information that users get from the companies when there is a change in their policies. They always inform users about new updates, but it is difficult to get information about these changes.<sup id="cite_ref-108" class="reference"><a href="#cite_note-108"><span class="cite-bracket">[</span>108<span class="cite-bracket">]</span></a></sup> </p><p>Most social networking sites require users to agree to Terms of Use policies before they use their services. Controversially, these Terms of Use declarations that users must agree to often contain clauses permitting social networking operators to store data on users, or even share it with third parties. Facebook has attracted attention over its policies regarding data storage, such as making it difficult to delete an account, holding onto data after an account is de-activated and being caught sharing personal data with third parties.<sup id="cite_ref-109" class="reference"><a href="#cite_note-109"><span class="cite-bracket">[</span>109<span class="cite-bracket">]</span></a></sup><br /> This section explains how to read the privacy statement in terms and conditions while signing up for any social networking site.<sup id="cite_ref-110" class="reference"><a href="#cite_note-110"><span class="cite-bracket">[</span>110<span class="cite-bracket">]</span></a></sup> </p><p>What to look for in the privacy policy: </p> <ol><li>Who owns the data that a user posts?</li> <li>What happens to the data when the user account is closed?</li> <li>How does changes in the privacy policy be made aware to its users?</li> <li>The location of the privacy policy that is effective</li> <li>Will the profile page be completely erased when a user deletes the account?</li> <li>Where and how can a user complain in case of any breach in privacy?</li> <li>For how long is the personal information stored?</li></ol> <p>The answers to these questions will give an indication of how safe the social networking site is. </p> <div class="mw-heading mw-heading2"><h2 id="Key_points_to_protect_social_networking_privacy">Key points to protect social networking privacy</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=32" title="Edit section: Key points to protect social networking privacy"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1248666159"><p><span class="tfd tfd-dated tfd-inline">‹The <a href="/wiki/Help:Template" title="Help:Template">template</a> <i><a href="/wiki/Template:How-to" title="Template:How-to">How-to</a></i> is being <a href="/wiki/Wikipedia:Templates_for_discussion/Log/2024_November_25#Template:How-to" title="Wikipedia:Templates for discussion/Log/2024 November 25">considered for merging</a>.›</span> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1251242444"></p><table class="box-Howto plainlinks metadata ambox ambox-content" role="presentation"><tbody><tr><td class="mbox-image"><div class="mbox-image-div"><span typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/b/b4/Ambox_important.svg/40px-Ambox_important.svg.png" decoding="async" width="40" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/b/b4/Ambox_important.svg/60px-Ambox_important.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/b/b4/Ambox_important.svg/80px-Ambox_important.svg.png 2x" data-file-width="40" data-file-height="40" /></span></span></div></td><td class="mbox-text"><div class="mbox-text-span">This section <b>contains <a href="/wiki/Wikipedia:What_Wikipedia_is_not#NOTHOWTO" title="Wikipedia:What Wikipedia is not">instructions, advice, or how-to content</a></b>.<span class="hide-when-compact"> Please help <a class="external text" href="https://en.wikipedia.org/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit">rewrite the content</a> so that it is more encyclopedic or <a href="https://meta.wikimedia.org/wiki/Help:Transwiki" class="extiw" title="m:Help:Transwiki">move</a> it to <a href="https://en.wikiversity.org/wiki/" class="extiw" title="v:">Wikiversity</a>, <a href="https://en.wikibooks.org/wiki/" class="extiw" title="b:">Wikibooks</a>, or <a href="https://en.wikivoyage.org/wiki/" class="extiw" title="voy:">Wikivoyage</a>.</span> <span class="date-container"><i>(<span class="date">December 2019</span>)</i></span></div></td></tr></tbody></table> <div class="mw-heading mw-heading3"><h3 id="Realize_the_threats_that_will_always_exist">Realize the threats that will always exist</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=33" title="Edit section: Realize the threats that will always exist"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>There are people out there who want—and will do just about anything—to get someone's private information. It's essential to realize that it's difficult to keep your privacy secured all the time.<sup id="cite_ref-protecting_111-0" class="reference"><a href="#cite_note-protecting-111"><span class="cite-bracket">[</span>111<span class="cite-bracket">]</span></a></sup> Among other factors, it has been observed that data loss is correlated positively with risky online behavior and forgoing the necessary antivirus and anti spyware programs to defend against breaches of private information via the internet.<sup id="cite_ref-112" class="reference"><a href="#cite_note-112"><span class="cite-bracket">[</span>112<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Be_thorough_all_the_time">Be thorough all the time</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=34" title="Edit section: Be thorough all the time"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Logging off after every session can help protect account security. It is dangerous to keep your device logged on since others may have access to your social profiles while you are not paying attention.<sup id="cite_ref-5_ways_113-0" class="reference"><a href="#cite_note-5_ways-113"><span class="cite-bracket">[</span>113<span class="cite-bracket">]</span></a></sup><br />Full names and addresses are typically considered personal information. Children's safety may be compromised if their parents post their whereabouts in a site where others know who their real identities are.<sup id="cite_ref-how_to_protect_114-0" class="reference"><a href="#cite_note-how_to_protect-114"><span class="cite-bracket">[</span>114<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Know_the_sites">Know the sites</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=35" title="Edit section: Know the sites"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Read the social networking site's fine prints. Many sites push its users to agree to terms that are best for the sites—not the users.<sup id="cite_ref-protecting_111-1" class="reference"><a href="#cite_note-protecting-111"><span class="cite-bracket">[</span>111<span class="cite-bracket">]</span></a></sup> Users should be aware about the terms in case of emergencies. Exactly how to read the terms are explained above at "Reading a Privacy Statement in Terms and Conditions" part.<br /> Make sure the social networking site is safe before sharing information. Users shouldn't be sharing information if they don't know who are using the websites since their personally identifiable information could be exposed to other users of the site.<sup id="cite_ref-how_to_protect_114-1" class="reference"><a href="#cite_note-how_to_protect-114"><span class="cite-bracket">[</span>114<span class="cite-bracket">]</span></a></sup><br /> Be familiar with the privacy protection provided. Users should take the extra time to get to know the privacy protection systems of various social networks they are or will be using. Only friends should be allowed to access their information.<sup id="cite_ref-5_ways_113-1" class="reference"><a href="#cite_note-5_ways-113"><span class="cite-bracket">[</span>113<span class="cite-bracket">]</span></a></sup> Check the privacy or security settings on every social networking site that they might have to use.<sup id="cite_ref-115" class="reference"><a href="#cite_note-115"><span class="cite-bracket">[</span>115<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Protect_devices">Protect devices</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=36" title="Edit section: Protect devices"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Encrypt devices. Users should use complex passwords on their computers and cell phones and change them from time to time. This will protect users' information in case these devices are stolen.<sup id="cite_ref-5_ways_113-2" class="reference"><a href="#cite_note-5_ways-113"><span class="cite-bracket">[</span>113<span class="cite-bracket">]</span></a></sup><br /> Install Anti-virus software. Others would be able to use viruses and other ways to invade a user's computer if he or she installed something unsafe.<sup id="cite_ref-116" class="reference"><a href="#cite_note-116"><span class="cite-bracket">[</span>116<span class="cite-bracket">]</span></a></sup> Use devices that can disable camera, microphone, which mostly used for privacy invasion. </p> <div class="mw-heading mw-heading3"><h3 id="Be_careful_about_taking_drastic_actions">Be careful about taking drastic actions</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=37" title="Edit section: Be careful about taking drastic actions"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The users' privacy may be threatened by any actions. Following actions needs special attention. <br /> (1) Adding a new friend. Facebook reports 8.7% of its total profiles are fake. A user should be sure about who the person is before adding it as a new friend.<sup id="cite_ref-5_ways_113-3" class="reference"><a href="#cite_note-5_ways-113"><span class="cite-bracket">[</span>113<span class="cite-bracket">]</span></a></sup><br /> (2) Clicking on links. Many links which looks attractive like gift cards are specially designed by malicious users. Clicking on these links may result in losing personal information or money.<sup id="cite_ref-5_ways_113-4" class="reference"><a href="#cite_note-5_ways-113"><span class="cite-bracket">[</span>113<span class="cite-bracket">]</span></a></sup><br /> (3) Think twice about posting revealing photos. A revealing photo could attract the attention of potential criminals.<sup id="cite_ref-protecting_111-2" class="reference"><a href="#cite_note-protecting-111"><span class="cite-bracket">[</span>111<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Social_networks">Social networks</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=38" title="Edit section: Social networks"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="Facebook">Facebook</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=39" title="Edit section: Facebook"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Privacy_concerns_of_Facebook" class="mw-redirect" title="Privacy concerns of Facebook">Privacy concerns of Facebook</a></div> <p>Facebook has been scrutinized for a variety of privacy concerns due to changes in its privacy settings on the site generally over time as well as privacy concerns within Facebook applications. Mark Zuckerberg, CEO of Facebook, first launched Facebook<sup id="cite_ref-117" class="reference"><a href="#cite_note-117"><span class="cite-bracket">[</span>117<span class="cite-bracket">]</span></a></sup> in 2004, it was focused on universities and only those with .edu address could open an account. Furthermore, only those within one's university network could see their page. Some argue that initial users were much more willing to share private information for these reasons. As time went on, Facebook became more public allowing those outside universities, and furthermore, those without a specific network, to join and see pages of those in networks that were not their own. In 2006 Facebook introduced the News Feed, a feature that would highlight recent friend activity. By 2009, Facebook made "more and more information public by default". For example, in December 2009, "Facebook drastically changed its privacy policies, allowing users to see each others' lists of friends, even if users had previously indicated they wanted to keep these lists private". Also, "the new settings made photos publicly available by default, often without users' knowledge".<sup id="cite_ref-cb.hbsp.harvard.edu_118-0" class="reference"><a href="#cite_note-cb.hbsp.harvard.edu-118"><span class="cite-bracket">[</span>118<span class="cite-bracket">]</span></a></sup> </p><p>Facebook recently updated its profile format allowing for people who are not "friends" of others to view personal information about other users, even when the profile is set to private. However, As of January 18, 2011 Facebook changed its decision to make home addresses and telephone numbers accessible to third party members, but it is still possible for third party members to have access to less exact personal information, like one's hometown and employment, if the user has entered the information into Facebook. EPIC Executive Director Marc Rotenberg said "Facebook is trying to blur the line between public and private information. And the request for permission does not make clear to the user why the information is needed or how it will be used."<sup id="cite_ref-119" class="reference"><a href="#cite_note-119"><span class="cite-bracket">[</span>119<span class="cite-bracket">]</span></a></sup> </p><p><a href="/wiki/Breakup_Notifier" title="Breakup Notifier">Breakup Notifier</a> is an example of a Facebook "cyberstalking"<sup id="cite_ref-foxnews-20110224-squashstalkerapp_120-0" class="reference"><a href="#cite_note-foxnews-20110224-squashstalkerapp-120"><span class="cite-bracket">[</span>120<span class="cite-bracket">]</span></a></sup> app, which was taken down on 23 February 2011.<sup id="cite_ref-techcrunch-20110223-breakupnotifier_121-0" class="reference"><a href="#cite_note-techcrunch-20110223-breakupnotifier-121"><span class="cite-bracket">[</span>121<span class="cite-bracket">]</span></a></sup> The app was later unblocked.<sup id="cite_ref-122" class="reference"><a href="#cite_note-122"><span class="cite-bracket">[</span>122<span class="cite-bracket">]</span></a></sup> The application notifies the user when the person they selected changes their relationship status.<sup id="cite_ref-123" class="reference"><a href="#cite_note-123"><span class="cite-bracket">[</span>123<span class="cite-bracket">]</span></a></sup> The concept became very popular, with the site attracting 700,000 visits in the first 36 hours and the app being downloaded 40,000 times. Before the app was blocked, it had more than 3.6 million downloads and 9,000 Facebook likes.<sup id="cite_ref-foxnews-20110224-squashstalkerapp_120-1" class="reference"><a href="#cite_note-foxnews-20110224-squashstalkerapp-120"><span class="cite-bracket">[</span>120<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-techcrunch-20110223-breakupnotifier_121-1" class="reference"><a href="#cite_note-techcrunch-20110223-breakupnotifier-121"><span class="cite-bracket">[</span>121<span class="cite-bracket">]</span></a></sup> </p><p>In 2008, four years after the first introduction of Facebook, Facebook created an option to permanently delete information. Until then, the only option was to deactivate one's Facebook account, which still left the user's information within Facebook servers. After thousands of users complaints, Facebook obliged and created a tool which was located in the Help Section but later removed. To locate the tool to permanently delete a user's Facebook, he or she must manually search through Facebook's Help section by entering the request to delete the Facebook in the search box. Only then will a link be provided to prompt the user to delete his or her profile.<sup id="cite_ref-Herrman2012_124-0" class="reference"><a href="#cite_note-Herrman2012-124"><span class="cite-bracket">[</span>124<span class="cite-bracket">]</span></a></sup> </p><p>These new privacy settings enraged some users, one of whom claimed, "Facebook is trying to dupe hundreds of millions of users they've spent years attracting into exposing their data for Facebook's personal gain." However, other features like the News Feed faced an initial backlash but later became a fundamental and very much appreciated part of the Facebook experience. In response to user complaints, Facebook continued to add more and more privacy settings resulting in "50 settings and more than 170 privacy options." However, many users complained that the new privacy settings were too confusing and were aimed at increasing the amount of public information on Facebook. Facebook management responded that "there are always trade offs between providing comprehensive and precise granular controls and offering simple tools that may be broad and blunt."<sup id="cite_ref-cb.hbsp.harvard.edu_118-1" class="reference"><a href="#cite_note-cb.hbsp.harvard.edu-118"><span class="cite-bracket">[</span>118<span class="cite-bracket">]</span></a></sup> It appears as though users sometimes do not pay enough attention to privacy settings and arguably allow their information to be public even though it is possible to make it private. Studies have shown that users actually pay little attention to "permissions they give to third party apps."<sup id="cite_ref-125" class="reference"><a href="#cite_note-125"><span class="cite-bracket">[</span>125<span class="cite-bracket">]</span></a></sup> </p><p>Most users are not aware that they can modify the privacy settings and unless they modify them, their information is open to the public. On Facebook privacy settings can be accessed via the drop down menu under account in the top right corner. There users can change who can view their profile and what information can be displayed on their profile.<sup id="cite_ref-facebook.com_104-1" class="reference"><a href="#cite_note-facebook.com-104"><span class="cite-bracket">[</span>104<span class="cite-bracket">]</span></a></sup> In most cases profiles are open to either "all my network and friends" or "all of my friends." Also, information that shows on a user's profile such as birthday, religious views, and relationship status can be removed via the privacy settings.<sup id="cite_ref-126" class="reference"><a href="#cite_note-126"><span class="cite-bracket">[</span>126<span class="cite-bracket">]</span></a></sup> If a user is under 13 years old they are not able to make a Facebook or a MySpace account, however, this is not regulated.<sup id="cite_ref-facebook.com_104-2" class="reference"><a href="#cite_note-facebook.com-104"><span class="cite-bracket">[</span>104<span class="cite-bracket">]</span></a></sup> </p><p>Although Zuckerberg, the Facebook CEO, and others in the management team usually respond in some manner to user concerns, they have been unapologetic about the trend towards less privacy. They have stated that they must continually "be innovating and updating what our system is to reflect what the current social norms are." Their statements suggest that the Internet is becoming a more open, public space, and changes in Facebook privacy settings reflect this. However, Zuckerberg did admit that in the initial release of the News Feed, they "did a bad job of explaining what the new features were and an even worse job of giving you control of them."<sup id="cite_ref-cb.hbsp.harvard.edu_118-2" class="reference"><a href="#cite_note-cb.hbsp.harvard.edu-118"><span class="cite-bracket">[</span>118<span class="cite-bracket">]</span></a></sup> </p><p>Facebook's privacy settings have greatly evolved and are continuing to change over time. Zuckerberg "believes the age of privacy is 'over,' and that norms have evolved considerably since he first co-founded the social networking site".<sup id="cite_ref-127" class="reference"><a href="#cite_note-127"><span class="cite-bracket">[</span>127<span class="cite-bracket">]</span></a></sup> Additionally, Facebook has been under fire for keeping track of one's Internet usage whether users are logged into the social media site or not. A user may notice personalized ads under the 'Sponsored' area of the page. "The company uses cookies to log data such as the date, time, URL, and your IP address whenever you visit a site that has a Facebook plug-in, such as a 'Like' button."<sup id="cite_ref-128" class="reference"><a href="#cite_note-128"><span class="cite-bracket">[</span>128<span class="cite-bracket">]</span></a></sup> Facebook claims this data is used to help improve one's experience on the website and to protect against 'malicious' activity. Another issue of privacy that Facebook uses is the new <a href="/wiki/Facial_recognition_software" class="mw-redirect" title="Facial recognition software">facial recognition software</a>. This feature includes the software to identify photos that users are tagged in by developing a template based on one's facial features.<a rel="nofollow" class="external text" href="https://www.facebook.com/help/122175507864081">What is the face recognition setting on Facebook and how does it work? | Facebook Help Center</a> </p><p>Similar to Rotenberg's claim that Facebook users are unclear of how or why their information has gone public, recently the Federal Trade Commission and Commerce Department have become involved. The Federal Trade Commission has recently released a report claiming that Internet companies and other industries will soon need to increase their protection for online users. Because online users often unknowingly opt in on making their information public, the FTC is urging Internet companies to make privacy notes simpler and easier for the public to understand, therefore increasing their option to opt out. Perhaps this new policy should also be implemented in the Facebook world. The Commerce Department claims that Americans, "have been ill-served by a patchwork of privacy laws that contain broad gaps".<sup id="cite_ref-129" class="reference"><a href="#cite_note-129"><span class="cite-bracket">[</span>129<span class="cite-bracket">]</span></a></sup> Because of these broad gaps, Americans are more susceptible to identity theft and having their online activity tracked by others. </p> <div class="mw-heading mw-heading4"><h4 id="Internet_privacy_and_Facebook_advertisements">Internet privacy and Facebook advertisements</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=40" title="Edit section: Internet privacy and Facebook advertisements"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The illegal activities on Facebook are very widespread, in particular, phishing attacks, allowing attackers to steal other people's passwords. The Facebook users are led to land on a page where they are asked for their login information, and their personal information is stolen in that way. According to the news from <i>PC World Business Center</i> which was published on April 22, 2010, we can know that a hacker named Kirllos illegally stole and sold 1.5 million Facebook IDs to some business companies who want to attract potential customers by using advertisements on Facebook. Their illegal approach is that they used accounts which were bought from hackers to send advertisements to friends of users. When friends see the advertisements, they will have opinion about them, because "People will follow it because they believe it was a friend that told them to go to this link," said Randy Abrams, director of technical education with security vendor Eset.<sup id="cite_ref-130" class="reference"><a href="#cite_note-130"><span class="cite-bracket">[</span>130<span class="cite-bracket">]</span></a></sup> There were 2.2232% of the population on Facebook that believed or followed the advertisements of their friends.<sup id="cite_ref-131" class="reference"><a href="#cite_note-131"><span class="cite-bracket">[</span>131<span class="cite-bracket">]</span></a></sup> Even though the percentage is small, the amount of overall users on Facebook is more than 400 million worldwide. The influence of advertisements on Facebook is so huge and obvious. According to the blog of Alan who just posted advertisements on the Facebook, he earned $300 over the 4 days. That means he can earn $3 for every $1 put into it.<sup id="cite_ref-132" class="reference"><a href="#cite_note-132"><span class="cite-bracket">[</span>132<span class="cite-bracket">]</span></a></sup> The huge profit attracts hackers to steal users' login information on Facebook, and business people who want to buy accounts from hackers send advertisements to users' friends on Facebook. </p><p>A leaked document from Facebook has revealed that the company was able to identify "insecure, worthless, stressed or defeated" emotions, especially in teenagers, and then proceeded to inform advertisers.<sup id="cite_ref-:4_133-0" class="reference"><a href="#cite_note-:4-133"><span class="cite-bracket">[</span>133<span class="cite-bracket">]</span></a></sup> While similar issues have arisen in the <a rel="nofollow" class="external text" href="https://time.com/4695/7-controversial-ways-facebook-has-used-your-data/">past</a>, this continues to make individuals’ emotional states seem more like a commodity.<sup id="cite_ref-:4_133-1" class="reference"><a href="#cite_note-:4-133"><span class="cite-bracket">[</span>133<span class="cite-bracket">]</span></a></sup> They are able to target certain age groups depending on the time that their advertisements appear.<sup id="cite_ref-:4_133-2" class="reference"><a href="#cite_note-:4-133"><span class="cite-bracket">[</span>133<span class="cite-bracket">]</span></a></sup> </p><p>Recently, there have been allegations made against <a href="/wiki/Facebook" title="Facebook">Facebook</a> accusing the app of listening in on its users through their smartphone's microphone in order to gather information for advertisers. These rumors have been proven to be false as well as impossible. For one, because it does not have a specific buzzword to listen for like the <a href="/wiki/Amazon_Echo" title="Amazon Echo">Amazon Echo</a>, Facebook would have to record everything its users say. This kind of “constant audio surveillance would produce about 33 times more data daily than Facebook currently consumes”.<sup id="cite_ref-134" class="reference"><a href="#cite_note-134"><span class="cite-bracket">[</span>134<span class="cite-bracket">]</span></a></sup> Additionally, it would become immediately apparent to the user as their phone's battery life would be swiftly drained by the amount of power it would take to record every conversation. Finally, it is clear that Facebook doesn't need to listen in on its users’ conversations because it already has plenty of access to their data and internet search history through <a href="/wiki/Cookies_(Internet)" class="mw-redirect" title="Cookies (Internet)">cookies</a>. Facebook specifically states in their Cookies Policy that they use cookies to help display ads that will peak the users interest. They then use this information to help make recommendations for numerous businesses, organizations, associations, etc. to individuals who may be interested in the products, services or causes they offer.<sup id="cite_ref-135" class="reference"><a href="#cite_note-135"><span class="cite-bracket">[</span>135<span class="cite-bracket">]</span></a></sup> </p><p><b>Security Breach</b> </p><p>In September 2018, there was an incident of a security breach within Facebook. Hackers were able to access and steal personal information in nearly half of the 30 million accounts. The company initially believed that even more, around 50 million users, were affected in an attack that gave the hackers control of accounts.<sup id="cite_ref-136" class="reference"><a href="#cite_note-136"><span class="cite-bracket">[</span>136<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Facebook_friends_study">Facebook friends study</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=41" title="Edit section: Facebook friends study"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>A study was conducted at Northeastern University by Alan Mislove and his colleagues at the Max Planck Institute for Software Systems, where an algorithm was created to try and discover personal attributes of a Facebook user by looking at their friend's list. They looked for information such as high school and college attended, major, hometown, graduation year and even what dorm a student may have lived in. The study revealed that only 5% of people thought to change their friend's list to private. For other users, 58% displayed university attended, 42% revealed employers, 35% revealed interests and 19% gave viewers public access to where they were located. Due to the correlation of Facebook friends and universities they attend, it was easy to discover where a Facebook user was based on their list of friends. This fact is one that has become very useful to advertisers targeting their audiences but is also a big risk for the privacy of all those with Facebook accounts.<sup id="cite_ref-137" class="reference"><a href="#cite_note-137"><span class="cite-bracket">[</span>137<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Facebook_Emotion_Study">Facebook Emotion Study</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=42" title="Edit section: Facebook Emotion Study"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Criticism_of_Facebook#2014_emotion_manipulation_study" title="Criticism of Facebook">2014 Emotional Manipulation Study</a></div> <p>Recently, Facebook knowingly agreed and facilitated a controversial experiment; the experiment blatantly bypassed user privacy and demonstrates the dangers and complex ethical nature of the current networking management system. The "one week study in January of 2012" where over 600,000 users were randomly selected to unknowingly partake in a study to determine the effect of "emotional alteration" by Facebook posts.<sup id="cite_ref-138" class="reference"><a href="#cite_note-138"><span class="cite-bracket">[</span>138<span class="cite-bracket">]</span></a></sup> Apart from the ethical issue of conducting such a study with human emotion in the first place, this is just one of the means in which data outsourcing has been used as a breach of privacy without user disclosure.<sup id="cite_ref-139" class="reference"><a href="#cite_note-139"><span class="cite-bracket">[</span>139<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-:0_107-1" class="reference"><a href="#cite_note-:0-107"><span class="cite-bracket">[</span>107<span class="cite-bracket">]</span></a></sup> </p><p>Several issues about Facebook are due to privacy concerns. An article titled "Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences" examines the awareness that Facebook users have on privacy issues. This study shows that the gratifications of using Facebook tend to outweigh the perceived threats to privacy. The most common strategy for privacy protection—decreasing profile visibility through restricting access to friends—is also a very weak mechanism; a quick fix rather than a systematic approach to protecting privacy.<sup id="cite_ref-Debatin,_B._2009_140-0" class="reference"><a href="#cite_note-Debatin,_B._2009-140"><span class="cite-bracket">[</span>140<span class="cite-bracket">]</span></a></sup> This study suggests that more education about privacy on Facebook would be beneficial to the majority of the Facebook user population. </p><p>The study also offers the perspective that most users do not realize that restricting access to their data does not sufficiently address the risks resulting from the amount, quality, and persistence of data they provide. Facebook users in our study report familiarity and use of privacy settings, they are still accepting people as "friends" that they have only heard of through others or do not know at all and, therefore, most have very large groups of "friends" that have access to widely uploaded information such as full names, birthdates, hometowns, and many pictures.<sup id="cite_ref-Debatin,_B._2009_140-1" class="reference"><a href="#cite_note-Debatin,_B._2009-140"><span class="cite-bracket">[</span>140<span class="cite-bracket">]</span></a></sup> This study suggests that social network privacy does not merely exist within the realm of privacy settings, but privacy control is much within the hands of the user. Commentators have noted that online social networking poses a fundamental challenge to the theory of privacy as control. The stakes have been raised because digital technologies lack "the relative transience of human memory," and can be trolled or data mined for information.<sup id="cite_ref-141" class="reference"><a href="#cite_note-141"><span class="cite-bracket">[</span>141<span class="cite-bracket">]</span></a></sup> For users who are unaware of all privacy concerns and issues, further education on the safety of disclosing certain types of information on Facebook is highly recommended. </p> <div class="mw-heading mw-heading3"><h3 id="Instagram">Instagram</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=43" title="Edit section: Instagram"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><a href="/wiki/Instagram" title="Instagram">Instagram</a> tracks users' photos even if they do not post them using a geotag. This is through the information within metadata, which is in all photos. Metadata contains information like the lens type, location, time, and more of the photo. Users can be tracked through metadata without the use of geotags. The app geotags an uploaded image regardless of whether the user chose to share its location or not. Therefore, anybody can view the exact location where an image was uploaded on a map. This is concerning due to the fact that most people upload photos from their home or other locations they frequent a lot, and the fact that locations are so easily shared raises privacy concerns of stalking and sexual predators being able to find their target in person after discovering them online.<sup id="cite_ref-auto_142-0" class="reference"><a href="#cite_note-auto-142"><span class="cite-bracket">[</span>142<span class="cite-bracket">]</span></a></sup> The new Search function on Instagram combines the search of places, people, and tags to look at nearly any location on earth, allowing them to scout out a vacation spot, look inside a restaurant, and even to experience an event like they were there in person.<sup id="cite_ref-auto1_143-0" class="reference"><a href="#cite_note-auto1-143"><span class="cite-bracket">[</span>143<span class="cite-bracket">]</span></a></sup> The privacy implications of this fact is that people and companies can now see into every corner of the world, culture, and people's private lives. Additionally, this is concerning for individual privacy, because when someone searches through these features on Instagram for a specific location or place, Instagram shows them the personal photos that their users have posted, along with the likes and comments on that photo regardless of whether the poster's account is private or not. With these features, completely random people, businesses, and governments can see aspects of Instagram users' private lives. The Search and Explore pages that collect data based on user tagging illustrates how Instagram was able to create value out of the <a href="/wiki/Database" title="Database">databases</a> of information they collect on users throughout their business operations.<sup id="cite_ref-auto1_143-1" class="reference"><a href="#cite_note-auto1-143"><span class="cite-bracket">[</span>143<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Swarm">Swarm</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=44" title="Edit section: Swarm"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><a href="/wiki/Swarm_(app)" class="mw-redirect" title="Swarm (app)">Swarm</a> is a mobile app that lets users check-in to a location and potentially make plans and set up future meetings with people nearby. This app has made it easier for people in online communities to share their locations, as well as interact with others in this community through collecting rewards such as coins and stickers through competitions with other users.<sup id="cite_ref-144" class="reference"><a href="#cite_note-144"><span class="cite-bracket">[</span>144<span class="cite-bracket">]</span></a></sup> If a user is on Swarm, their exact location may be broadcast even if they didn't select their location to be "checked-in." When users turn on their "Neighborhood Sharing" feature, their location is shared as the specific intersection that they are at, and this location in current time can be viewed simply by tapping their profile image.<sup id="cite_ref-auto_142-1" class="reference"><a href="#cite_note-auto-142"><span class="cite-bracket">[</span>142<span class="cite-bracket">]</span></a></sup> This is concerning because Swarm users may believe they are being discreet by sharing only which neighborhood they are in, while in fact they are sharing the exact pinpoint of their location.<sup id="cite_ref-auto_142-2" class="reference"><a href="#cite_note-auto-142"><span class="cite-bracket">[</span>142<span class="cite-bracket">]</span></a></sup> The privacy implications of this is that people are inadvertently sharing their exact location when they do not know that they are. This plays into the privacy concerns of social media in general, because it makes it easier for other users as well as the companies this location data is shared with to track Swarm members. This tracking makes it easier for people to find their next targets for identity theft, stalking, and sexual harassment. </p> <div class="mw-heading mw-heading3"><h3 id="Spokeo">Spokeo</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=45" title="Edit section: Spokeo"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><a href="/wiki/Spokeo" title="Spokeo">Spokeo</a> is a "people-related" search engine with results compiled through data aggregation. The site contains information such as age, relationship status, estimated personal wealth, immediate family members and home address of individual people. This information is compiled through what is already on the internet or in other public records, but the website does not guarantee accuracy. </p><p>Spokeo has been faced with potential class action lawsuits from people who claim that the organization breaches the <a href="/wiki/Fair_Credit_Reporting_Act" title="Fair Credit Reporting Act">Fair Credit Reporting Act</a>. In September, 2010, Jennifer Purcell claimed that the FCRA was violated by Spokeo marketing her personal information. Her case is pending in court. Also in 2010, Thomas Robins claimed that his personal information on the website was inaccurate and he was unable to edit it for accuracy. The case was dismissed because Robins did not claim that the site directly caused him actual harm.<sup id="cite_ref-145" class="reference"><a href="#cite_note-145"><span class="cite-bracket">[</span>145<span class="cite-bracket">]</span></a></sup> On February 15, 2011, Robins filed another suit, this time stating Spokeo has caused him "imminent and ongoing" harm.<sup id="cite_ref-146" class="reference"><a href="#cite_note-146"><span class="cite-bracket">[</span>146<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Twitter">Twitter</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=46" title="Edit section: Twitter"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In January 2011, the US government obtained a court order to force the social networking site, Twitter, to reveal information applicable surrounding certain subscribers involved in the <a href="/wiki/WikiLeaks" title="WikiLeaks">WikiLeaks</a> cases. This outcome of this case is questionable because it deals with the user's First Amendment rights. Twitter moved to reverse the court order, and supported the idea that internet users should be notified and given an opportunity to defend their constitutional rights in court before their rights are compromised.<sup id="cite_ref-147" class="reference"><a href="#cite_note-147"><span class="cite-bracket">[</span>147<span class="cite-bracket">]</span></a></sup> </p><p>Twitter's privacy policy states that information is collected through their different web sites, application, SMS, services, APIs, and other third parties. When the user uses Twitter's service they consent to the collection, transfer, storage, manipulation, disclosure, and other uses of this information. In order to create a Twitter account, one must give a name, username, password, and email address. Any other information added to one's profile is completely voluntary.<sup id="cite_ref-148" class="reference"><a href="#cite_note-148"><span class="cite-bracket">[</span>148<span class="cite-bracket">]</span></a></sup> Twitter's servers automatically record data such as <a href="/wiki/IP_address" title="IP address">IP address</a>, browser type, the referring domain, pages visited, mobile carrier, device and application IDS, and search terms. Any common account identifiers such as full IP address or username will be removed or deleted after 18 months.<sup id="cite_ref-149" class="reference"><a href="#cite_note-149"><span class="cite-bracket">[</span>149<span class="cite-bracket">]</span></a></sup> </p><p>Twitter allows people to share information with their followers. Any messages that are not switched from the default privacy setting are public, and thus can be viewed by anyone with a Twitter account. The most recent 20 tweets are posted on a public timeline.<sup id="cite_ref-150" class="reference"><a href="#cite_note-150"><span class="cite-bracket">[</span>150<span class="cite-bracket">]</span></a></sup> Despite Twitter's best efforts to protect their users privacy, personal information can still be dangerous to share. There have been incidents of leaked tweets on Twitter. Leaked tweets are tweets that have been published from a private account but have been made public. This occurs when friends of someone with a private account retweet, or copy and paste, that person's tweet and so on and so forth until the tweet is made public. This can make private information public, and could possibly be dangerous.<sup id="cite_ref-151" class="reference"><a href="#cite_note-151"><span class="cite-bracket">[</span>151<span class="cite-bracket">]</span></a></sup> </p><p>Another issue involving privacy on Twitter deals with users unknowingly disclosing their information through tweets. Twitter has location services attached to tweets, which some users don't even know are enabled. Many users tweet about being at home and attach their location to their tweet, revealing their personal home address. This information is represented as a latitude and longitude, which is completely open for any website or application to access. People also tweet about going on vacation and giving the times and places of where they are going and how long they will be gone for. This has led to numerous break ins and robberies.<sup id="cite_ref-152" class="reference"><a href="#cite_note-152"><span class="cite-bracket">[</span>152<span class="cite-bracket">]</span></a></sup> Twitter users can avoid location services by disabling them in their privacy settings. </p> <div class="mw-heading mw-heading3"><h3 id="Teachers_and_MySpace">Teachers and MySpace</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=47" title="Edit section: Teachers and MySpace"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Teachers' privacy on MySpace has created controversy across the world. They are forewarned by The Ohio News Association<sup id="cite_ref-153" class="reference"><a href="#cite_note-153"><span class="cite-bracket">[</span>153<span class="cite-bracket">]</span></a></sup> that if they have a MySpace account, it should be deleted. Eschool News warns, "Teachers, watch what you post online."<sup id="cite_ref-154" class="reference"><a href="#cite_note-154"><span class="cite-bracket">[</span>154<span class="cite-bracket">]</span></a></sup> The ONA also posted a memo advising teachers not to join these sites. Teachers can face consequences of license revocations, suspensions, and written reprimands. </p><p>The <i>Chronicle of Higher Education</i> wrote an article on April 27, 2007, entitled "A MySpace Photo Costs a Student a Teaching Certificate" about Stacy Snyder.<sup id="cite_ref-155" class="reference"><a href="#cite_note-155"><span class="cite-bracket">[</span>155<span class="cite-bracket">]</span></a></sup> She was a student of <a href="/wiki/Millersville_University_of_Pennsylvania" title="Millersville University of Pennsylvania">Millersville University of Pennsylvania</a> who was denied her teaching degree because of an allegedly unprofessional photo posted on MySpace, which involved her drinking with a pirate's hat on and a caption of "Drunken Pirate". As a substitute, she was given an English degree. </p> <div class="mw-heading mw-heading3"><h3 id="Other_sites">Other sites</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=48" title="Edit section: Other sites"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Sites such as <a href="/wiki/Sgrouples" class="mw-redirect" title="Sgrouples">Sgrouples</a> and <a href="/wiki/Diaspora_(social_network)" title="Diaspora (social network)">Diaspora</a> have attempted to introduce various forms of privacy protection into their networks, while companies like <a href="/w/index.php?title=Safe_Shepherd&action=edit&redlink=1" class="new" title="Safe Shepherd (page does not exist)">Safe Shepherd</a> have created software to remove personal information from the net.<sup id="cite_ref-156" class="reference"><a href="#cite_note-156"><span class="cite-bracket">[</span>156<span class="cite-bracket">]</span></a></sup> </p><p>Certain social media sites such as Ask.fm, Whisper, and Yik Yak allow users to interact anonymously. The problem with websites such as these is that “despite safeguards that allow users to report abuse, people on the site believe they can say almost anything without fear or consequences—and they do." This is a privacy concern because users can say whatever they choose and the receiver of the message may never know who they are communicating with. Sites such as these allow for a large chance or cyberbullying or cyberstalking to occur. People seem to believe that since they can be anonymous, they have the freedom to say anything no matter how mean or malicious.<sup id="cite_ref-157" class="reference"><a href="#cite_note-157"><span class="cite-bracket">[</span>157<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Internet_privacy_and_Blizzard_Entertainment">Internet privacy and Blizzard Entertainment</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=49" title="Edit section: Internet privacy and Blizzard Entertainment"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>On July 6, 2010, Blizzard Entertainment announced that it would display the real names tied to user accounts in its game forums. On July 9, 2010, CEO and cofounder of Blizzard Mike Morhaime announced a reversal of the decision to force posters' real names to appear on Blizzard's forums. The reversal was made in response to subscriber feedback.<sup id="cite_ref-blizzardNoRealNames_158-0" class="reference"><a href="#cite_note-blizzardNoRealNames-158"><span class="cite-bracket">[</span>158<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Snapchat">Snapchat</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=50" title="Edit section: Snapchat"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Snapchat is a mobile application created by Stanford graduates Evan Spiegel and Bobby Murphy in September 2011.<sup id="cite_ref-repository.jmls.edu_159-0" class="reference"><a href="#cite_note-repository.jmls.edu-159"><span class="cite-bracket">[</span>159<span class="cite-bracket">]</span></a></sup> Snapchat's main feature is that the application allows users to send a photo or video, referred to as a "snap", to recipients of choice for up to ten seconds before it disappears.<sup id="cite_ref-160" class="reference"><a href="#cite_note-160"><span class="cite-bracket">[</span>160<span class="cite-bracket">]</span></a></sup> If recipients of a snap try and screenshot the photo or video sent, a notification is sent to the original sender that it was screenshot and by whom. Snapchat also has a "stories" feature where users can send photos to their "story" and friends can view the story as many times as they want until it disappears after twenty-four hours. Users have the ability to make their snapchat stories viewable to all of their friends on their friends list, only specific friends, or the story can be made public and viewed by anyone that has a snapchat account.<sup id="cite_ref-repository.jmls.edu_159-1" class="reference"><a href="#cite_note-repository.jmls.edu-159"><span class="cite-bracket">[</span>159<span class="cite-bracket">]</span></a></sup> In addition to the stories feature, messages can be sent through Snapchat. Messages disappear after they are opened unless manually saved by the user by holding down on the message until a "saved" notification pops up. There is no notification sent to the users that their message has been saved by the recipient, however, there is a notification sent if the message is screenshot.<sup id="cite_ref-161" class="reference"><a href="#cite_note-161"><span class="cite-bracket">[</span>161<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="2015_Snapchat_privacy_policy_update">2015 Snapchat privacy policy update</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=51" title="Edit section: 2015 Snapchat privacy policy update"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In 2015, Snapchat updated their privacy policy, causing outrage from users because of changes in their ability to save user content.<sup id="cite_ref-:5_162-0" class="reference"><a href="#cite_note-:5-162"><span class="cite-bracket">[</span>162<span class="cite-bracket">]</span></a></sup> These rules were put in place to help Snapchat create new and cool features like being able to replay a Snapchat, and the idea of “live” Snapchat stories. These features require saving content to snapchat servers in order to release to other users at a later time. The update stated that it has the rights to reproduce, modify, and republish photos, as well as save those photos to Snapchat servers. Users felt uncomfortable with the idea that all photo content was saved and the idea of “disappearing photos” advertised by Snapchat didn't actually disappear. There is no way to control what content is saved and what isn't. Snapchat responded to backlash by saying they needed this license to access our information in order to create new features, like the live snapchat feature.<sup id="cite_ref-:5_162-1" class="reference"><a href="#cite_note-:5-162"><span class="cite-bracket">[</span>162<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Live_Stories">Live Stories</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=52" title="Edit section: Live Stories"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>With the 2015 new update of Snapchat, users are able to do “Live Stories,” which are a “collection of crowdsourced snaps for a specific event or region.”<sup id="cite_ref-:11_163-0" class="reference"><a href="#cite_note-:11-163"><span class="cite-bracket">[</span>163<span class="cite-bracket">]</span></a></sup> By doing that, you are allowing snapchat to share your location with not just your friends, but with everyone. According to Snapchat, once you pick the option of sharing your content through a Live Story, you are providing to the company "unrestricted, worldwide, perpetual right and license to use your name, likeness, and voice in any and all media and distribution channels."<sup id="cite_ref-:11_163-1" class="reference"><a href="#cite_note-:11-163"><span class="cite-bracket">[</span>163<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Privacy_concerns_with_Snapchat">Privacy concerns with Snapchat</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=53" title="Edit section: Privacy concerns with Snapchat"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>On Snapchat, there is a new feature that was incorporated into the app in 2017 called Snap Maps. Snap Maps allows users to track other users’ locations, but when people “first use the feature, users can select whether they want to make their location visible to all of their friends, a select group of connections or to no one at all, which Snapchat refers to as ‘ghost mode.’”<sup id="cite_ref-164" class="reference"><a href="#cite_note-164"><span class="cite-bracket">[</span>164<span class="cite-bracket">]</span></a></sup> </p><p>This feature however has raised privacy concerns because “‘It is very easy to accidentally share everything that you've got with more people than you need too, and that's the scariest portion’. Cyber security expert Charles Tendell told ABC News of the Snapchat update.”<sup id="cite_ref-:12_165-0" class="reference"><a href="#cite_note-:12-165"><span class="cite-bracket">[</span>165<span class="cite-bracket">]</span></a></sup> For protecting younger users of Snapchat, “Experts recommend that parents stay aware of updates to apps like Snapchat. They also suggest parents make sure they know who their kids' friends are on Snapchat and also talk to their children about who they add on Snapchat.”<sup id="cite_ref-:12_165-1" class="reference"><a href="#cite_note-:12-165"><span class="cite-bracket">[</span>165<span class="cite-bracket">]</span></a></sup> </p><p>An additional concern users have with the privacy of Snapchat is the deletion of Snapchat's after 30 days. Many users become confused as to why it looks like someone has gotten into their account and opened all of their snapchat's which then increases their Snapscore. This has caused great concern over hackers getting into personal Snapchat accounts. To reassure users, Snapchat has added to their Support webpage explaining the expiration of snapchats after 30 days yet it is still very unclear. To clarify, this is exactly what happens: after 30 days, any unopened Snapchats will automatically be deleted or expire (which appears to the user as the same thing as being opened automatically). Therefore, this will change the user's Snapscore. After snaps expire, it will look like all of the snapchats have been opened, shown by many unfilled or open boxes. </p> <div class="mw-heading mw-heading5"><h5 id="Snapchat_Spectacles">Snapchat Spectacles</h5><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=54" title="Edit section: Snapchat Spectacles"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In 2016, Snapchat released a new product called “Snapchat Spectacles,” which are sunglasses featuring a small camera that allow users to take photos and record up to 10 seconds of footage.<sup id="cite_ref-:6_166-0" class="reference"><a href="#cite_note-:6-166"><span class="cite-bracket">[</span>166<span class="cite-bracket">]</span></a></sup> The cameras in the Spectacles are connected to users’ existing Snapchat accounts, so they can easily upload their content to the application. This new product has received negative feedback because the Spectacles do not stand out from normal sunglasses beyond the small cameras on the lenses. Therefore, users have the ability to record strangers without them knowing. Furthermore, the simplistic design may result in people using the glasses accidentally, mistaking them for regular glasses. Critics of Snapchat Spectacles argue that this product is an invasion of privacy for the people who do not know they are being recorded by individuals who are wearing the glasses. Many people believe that these spectacles pose a risk in a way that their physical location might be disclosed to various parties, making the user vulnerable. Proponents disagree, saying that the glasses are distinguishable enough that users and people around them will notice them. Another argument in favor of the glasses is that people are already exposing themselves to similar scenarios by being in public.<sup id="cite_ref-:6_166-1" class="reference"><a href="#cite_note-:6-166"><span class="cite-bracket">[</span>166<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading6"><h6 id="2016_Amnesty_International_Report">2016 Amnesty International Report</h6><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=55" title="Edit section: 2016 Amnesty International Report"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In October 2016, <a href="/wiki/Amnesty_International" title="Amnesty International">Amnesty International</a> released a report ranking Snapchat along with ten other leading social media applications, including Facebook, iMessage, FaceTime, and Skype on how well they protect users’ privacy.<sup id="cite_ref-:7_167-0" class="reference"><a href="#cite_note-:7-167"><span class="cite-bracket">[</span>167<span class="cite-bracket">]</span></a></sup> The report assessed Snapchat's use of encryption and found that it ranks poorly in how it uses <a href="/wiki/Encryption" title="Encryption">encryption</a> to protect users’ security as a result of not using <a href="/wiki/End-to-end_encryption" title="End-to-end encryption">end-to-end encryption</a>. Because of this, third parties have the ability to access Snapchats while they are being transferred from one device to another. The report also claimed that Snapchat does not explicitly inform users in its privacy policy of the application's level of encryption or any threats the application may pose to users’ rights, which further reduced its overall score.<sup id="cite_ref-:7_167-1" class="reference"><a href="#cite_note-:7-167"><span class="cite-bracket">[</span>167<span class="cite-bracket">]</span></a></sup> Regardless of this report, Snapchat is currently considered the most trustworthy social media platform among users.<sup id="cite_ref-168" class="reference"><a href="#cite_note-168"><span class="cite-bracket">[</span>168<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="The_FTC">The FTC</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=56" title="Edit section: The FTC"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In 2014, allegations were made against Snapchat by the Federal Trade Commission "FTC" for deceiving users on its privacy and security measures. Snapchat's main appeal is its marketed ability to have users' photos disappear completely after the one to ten second time frame—selected by the sender to the recipient—is up. However, the FTC made a case claiming this was false, making Snapchat in violation of regulations implemented to prevent deceptive consumer information. One focus of the case was that the reality of a "snap" lifespan is longer than most users perceive; the app's privacy policy stated that Snapchat itself temporarily stored all snaps sent, but neglected to offer users a time period during which snaps had yet to be permanently deleted and could still be retrieved. As a result, many third-party applications were easily created for consumers that hold the ability to save "snaps" sent by users and screenshot "snaps" without notifying the sender.<sup id="cite_ref-ftc.gov_169-0" class="reference"><a href="#cite_note-ftc.gov-169"><span class="cite-bracket">[</span>169<span class="cite-bracket">]</span></a></sup> The FTC also claimed that Snapchat took information from its users such as location and contact information without their consent. Despite not being written in their privacy policy, Snapchat transmitted location information from mobile devices to its analytics tracking service provider.<sup id="cite_ref-170" class="reference"><a href="#cite_note-170"><span class="cite-bracket">[</span>170<span class="cite-bracket">]</span></a></sup> Although "Snapchat's privacy policy claimed that the app collected only your email, phone number, and Facebook ID to find friends for you to connect with, if you're an IOS user and entered your phone number to find friends, Snapchat collected the names and phone numbers of all the contacts in your mobile device address books without your notice or consent."<sup id="cite_ref-171" class="reference"><a href="#cite_note-171"><span class="cite-bracket">[</span>171<span class="cite-bracket">]</span></a></sup> It was disclosed that the Gibsonsec security group warned Snapchat of potential issues with their security, however no actions were taken to reinforce the system. In early 2014, 4.6 million matched usernames and phone numbers of users were publicly leaked, adding to the existing privacy controversy of the application.<sup id="cite_ref-172" class="reference"><a href="#cite_note-172"><span class="cite-bracket">[</span>172<span class="cite-bracket">]</span></a></sup> Finally, the FTC claimed that Snapchat failed to secure its "find friends" feature by not requiring phone number verification in the registration process. Users could register accounts from numbers other than their own, giving users the ability to impersonate anyone they chose.<sup id="cite_ref-ftc.gov_169-1" class="reference"><a href="#cite_note-ftc.gov-169"><span class="cite-bracket">[</span>169<span class="cite-bracket">]</span></a></sup> Snapchat had to release a public statement of apology to alert users of the misconducts and change their purpose to be a "fast and fun way to communicate with photos".<sup id="cite_ref-173" class="reference"><a href="#cite_note-173"><span class="cite-bracket">[</span>173<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="WhatsApp">WhatsApp</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=57" title="Edit section: WhatsApp"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><a href="/wiki/WhatsApp" title="WhatsApp">WhatsApp</a>, created in 2009, is a platform that allows users to communicate via text and voice message, video chatting, and document sharing for free. WhatsApp was acquired by Facebook in 2014, but the brand continues to be promote as a secure and reliable form of communication. The app can be downloaded and used on Android, iPhone, Mac or Windows PC, and Windows Phone devices without SMS fees or charges from a carrier. While asterisks across the WhatsApp website denote some hazards of fees and additional charges, this has become a popular application for consumers that communication with people overseas.<sup id="cite_ref-174" class="reference"><a href="#cite_note-174"><span class="cite-bracket">[</span>174<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Privacy_and_security_with_WhatsApp">Privacy and security with WhatsApp</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=58" title="Edit section: Privacy and security with WhatsApp"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In 2019, WhatsApp incorporated new privacy and security measures for their users including- Hide Muted Status and Frequently Forwarded. The hide muted status feature allows users to hide specific updates or interactions with specific users; however, if the user would decide to "unhide" their status or updates from certain users, a list of all updates will be shown to the previously blocked user (including the previously hidden status/updates). Similar to apps such as Snapchat and Instagram, users are notified when a story is forwarded, viewed, screenshotted, or shared. WhatsApp developers have added the Frequently Forwarded feature that notifies users if a message, status, or update has been forwarded 4 or more times.<sup id="cite_ref-175" class="reference"><a href="#cite_note-175"><span class="cite-bracket">[</span>175<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Response_to_criticism">Response to criticism</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=59" title="Edit section: Response to criticism"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Many social networking organizations have responded to the criticism and concerns over privacy brought up over time. It is claimed that changes to default settings, the storage of data and sharing with third parties have all been updated and corrected in the light of criticism, and/or legal challenges.<sup id="cite_ref-176" class="reference"><a href="#cite_note-176"><span class="cite-bracket">[</span>176<span class="cite-bracket">]</span></a></sup> However, many critics remain unsatisfied, noting that fundamental changes to privacy settings in many social networking sites remain minor and at times, inaccessible, and argue that social networking companies prefer to criticize users rather than adapt their policies.<sup id="cite_ref-177" class="reference"><a href="#cite_note-177"><span class="cite-bracket">[</span>177<span class="cite-bracket">]</span></a></sup> </p><p>There are suggestions for individuals to obtain privacy by reducing or ending their own use of social media. This method does not succeed, since their information is still revealed by posts from their friends.<sup id="cite_ref-:13_178-0" class="reference"><a href="#cite_note-:13-178"><span class="cite-bracket">[</span>178<span class="cite-bracket">]</span></a></sup> </p><p>There is ambiguity about how private <a href="/wiki/IP_address" title="IP address">IP addresses</a> are. The Court of Justice of the European Union has ruled they need to be treated as personally identifiable information if the business receiving them, or a third party like a service provider, knows the name or street address of the IP address holder, which would be true for static IP addresses, not for dynamic addresses.<sup id="cite_ref-cozen_179-0" class="reference"><a href="#cite_note-cozen-179"><span class="cite-bracket">[</span>179<span class="cite-bracket">]</span></a></sup> California regulations say IP addresses need to be treated as personal information if the business itself, not a third party, can link them to name and street address.<sup id="cite_ref-cozen_179-1" class="reference"><a href="#cite_note-cozen-179"><span class="cite-bracket">[</span>179<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-aca_180-0" class="reference"><a href="#cite_note-aca-180"><span class="cite-bracket">[</span>180<span class="cite-bracket">]</span></a></sup> In 2020, An Alberta court ruled that police can obtain the IP addresses and the names and addresses associated with them, without a search warrant. An investigation found the IP addresses which initiated online crimes, and the service provider gave police the names and addresses associated with those IP addresses.<sup id="cite_ref-cl_181-0" class="reference"><a href="#cite_note-cl-181"><span class="cite-bracket">[</span>181<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=60" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/Anonymous_social_media" title="Anonymous social media">Anonymous social media</a></li> <li><a href="/wiki/Criticism_of_Facebook" title="Criticism of Facebook">Criticism of Facebook</a></li> <li><a href="/wiki/Facebook" title="Facebook">Facebook</a></li> <li><a href="/wiki/Information_privacy" title="Information privacy">Information privacy</a></li> <li><a href="/wiki/Issues_relating_to_social_networking_services" title="Issues relating to social networking services">Issues relating to social networking services</a></li> <li><a href="/wiki/Myspace" title="Myspace">Myspace</a></li> <li><a href="/wiki/Social_media_measurement" title="Social media measurement">Social media measurement</a></li> <li><a href="/wiki/Social_networking_service" title="Social networking service">Social networking service</a></li> <li><a href="/wiki/Surveillance_capitalism" title="Surveillance capitalism">Surveillance capitalism</a></li></ul> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=61" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist"> <div class="mw-references-wrap mw-references-columns"><ol class="references"> <li id="cite_note-1"><span class="mw-cite-backlink"><b><a href="#cite_ref-1">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite id="CITEREFTurculeț2014" class="citation journal cs1 cs1-prop-long-vol">Turculeț, Mircea (2014). <a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.sbspro.2014.08.317">"Ethical Issues Concerning Online Social Networks"</a>. <i>Procedia - Social and Behavioral Sciences</i>. 149(2014): 967–972. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.sbspro.2014.08.317">10.1016/j.sbspro.2014.08.317</a></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Procedia+-+Social+and+Behavioral+Sciences&rft.atitle=Ethical+Issues+Concerning+Online+Social+Networks&rft.volume=149%282014%29&rft.pages=967-972&rft.date=2014&rft_id=info%3Adoi%2F10.1016%2Fj.sbspro.2014.08.317&rft.aulast=Turcule%C8%9B&rft.aufirst=Mircea&rft_id=https%3A%2F%2Fdoi.org%2F10.1016%252Fj.sbspro.2014.08.317&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-Why_Web_2.0_will_end_your_privacy-2"><span class="mw-cite-backlink">^ <a href="#cite_ref-Why_Web_2.0_will_end_your_privacy_2-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Why_Web_2.0_will_end_your_privacy_2-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-Why_Web_2.0_will_end_your_privacy_2-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text">Harris, Wil. June 2006. Retrieved from <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20120923095940/http://www.bit-tech.net/columns/2006/06/03/web_2_privacy/">"Why Web 2.0 will end your privacy"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.bit-tech.net/columns/2006/06/03/web_2_privacy/">the original</a> on 2012-09-23<span class="reference-accessdate">. Retrieved <span class="nowrap">2012-09-15</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Why+Web+2.0+will+end+your+privacy&rft_id=http%3A%2F%2Fwww.bit-tech.net%2Fcolumns%2F2006%2F06%2F03%2Fweb_2_privacy%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-Dwyer2007-3"><span class="mw-cite-backlink"><b><a href="#cite_ref-Dwyer2007_3-0">^</a></b></span> <span class="reference-text">Dwyer, C., Hiltz, S. & Passerini, K. (2007). Trust and Privacy Concern within Social Networking Sites: A Comparison of Facebook and MySpace. Americas Conference on Information Systems. Retrieved from <a rel="nofollow" class="external free" href="http://google.com/?q=cache:qLCk18d_wZwJ:scholar.google.com/+facebook+privacy&hl=en&as_sdt=2000">http://google.com/?q=cache:qLCk18d_wZwJ:scholar.google.com/+facebook+privacy&hl=en&as_sdt=2000</a></span> </li> <li id="cite_note-4"><span class="mw-cite-backlink"><b><a href="#cite_ref-4">^</a></b></span> <span class="reference-text">Tracy Mitrano. (November–December 2006). A Wider World: Youth, Privacy, and Social Networking Technologies. Retrieved from <a rel="nofollow" class="external free" href="http://www.educause.edu/EDUCAUSE+Review/EDUCAUSEReviewMagazineVolume41/AWiderWorldYouthPrivacyandSoci/158095">http://www.educause.edu/EDUCAUSE+Review/EDUCAUSEReviewMagazineVolume41/AWiderWorldYouthPrivacyandSoci/158095</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20110429225652/http://www.educause.edu/EDUCAUSE+Review/EDUCAUSEReviewMagazineVolume41/AWiderWorldYouthPrivacyandSoci/158095">Archived</a> 2011-04-29 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></span> </li> <li id="cite_note-5"><span class="mw-cite-backlink"><b><a href="#cite_ref-5">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20110508231423/http://connection.ebscohost.com/technology/social-networking-sites/history-online-social-networks">"History of Online Social Networks"</a>. <i>Ebsco Host</i>. Ebsco Host Connection. Archived from <a rel="nofollow" class="external text" href="http://connection.ebscohost.com/technology/social-networking-sites/history-online-social-networks">the original</a> on 2011-05-08.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Ebsco+Host&rft.atitle=History+of+Online+Social+Networks&rft_id=http%3A%2F%2Fconnection.ebscohost.com%2Ftechnology%2Fsocial-networking-sites%2Fhistory-online-social-networks&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-libraryproxy.tulsacc.edu-6"><span class="mw-cite-backlink">^ <a href="#cite_ref-libraryproxy.tulsacc.edu_6-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-libraryproxy.tulsacc.edu_6-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFQuinn" class="citation web cs1">Quinn, Kelly. <a rel="nofollow" class="external text" href="http://libraryproxy.tulsacc.edu:2076/ehost/detail/detail?vid=3&sid=b2c26525-55d4-4862-9a0f-0cd2ab4edc9d%40sessionmgr4007&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=113745092&db=aph">"Why We Share: A Uses and Gratifications Approach to Privacy Regulation in Social Media Use"</a>. <i>EBSCOhost</i>. Journal of Broadcasting & Electronic Media<span class="reference-accessdate">. Retrieved <span class="nowrap">5 April</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=EBSCOhost&rft.atitle=Why+We+Share%3A+A+Uses+and+Gratifications+Approach+to+Privacy+Regulation+in+Social+Media+Use&rft.aulast=Quinn&rft.aufirst=Kelly&rft_id=http%3A%2F%2Flibraryproxy.tulsacc.edu%3A2076%2Fehost%2Fdetail%2Fdetail%3Fvid%3D3%26sid%3Db2c26525-55d4-4862-9a0f-0cd2ab4edc9d%2540sessionmgr4007%26bdata%3DJnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl%23AN%3D113745092%26db%3Daph&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span><sup class="noprint Inline-Template"><span style="white-space: nowrap;">[<i><a href="/wiki/Wikipedia:Link_rot" title="Wikipedia:Link rot"><span title=" Dead link tagged July 2022">permanent dead link</span></a></i><span style="visibility:hidden; color:transparent; padding-left:2px">‍</span>]</span></sup></span> </li> <li id="cite_note-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-7">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMills" class="citation web cs1">Mills, Max. <a rel="nofollow" class="external text" href="http://libraryproxy.tulsacc.edu:2076/ehost/detail/detail?vid=3&sid=d8b4d432-99e7-4610-b276-a6ed4155fadf%40sessionmgr4008&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=123791052&db=aph">"Sharing Privately: The Effect Publication on Social Media Has on Expectation of Privacy"</a>. <i>EBSCOhost</i>. Journal of Media Law<span class="reference-accessdate">. Retrieved <span class="nowrap">4 April</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=EBSCOhost&rft.atitle=Sharing+Privately%3A+The+Effect+Publication+on+Social+Media+Has+on+Expectation+of+Privacy&rft.aulast=Mills&rft.aufirst=Max&rft_id=http%3A%2F%2Flibraryproxy.tulsacc.edu%3A2076%2Fehost%2Fdetail%2Fdetail%3Fvid%3D3%26sid%3Dd8b4d432-99e7-4610-b276-a6ed4155fadf%2540sessionmgr4008%26bdata%3DJnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl%23AN%3D123791052%26db%3Daph&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span><sup class="noprint Inline-Template"><span style="white-space: nowrap;">[<i><a href="/wiki/Wikipedia:Link_rot" title="Wikipedia:Link rot"><span title=" Dead link tagged November 2023">permanent dead link</span></a></i><span style="visibility:hidden; color:transparent; padding-left:2px">‍</span>]</span></sup></span> </li> <li id="cite_note-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-8">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBoyd2014" class="citation book cs1">Boyd, Danah (2014). <a rel="nofollow" class="external text" href="https://archive.org/details/ItsComplicatedSocialLivesOfNetworkedTeens"><i>It's Complicated: The Social Lives of Networked Teens</i></a>. <a href="/wiki/Yale_University_Press" title="Yale University Press">Yale University Press</a>. pp. <a rel="nofollow" class="external text" href="https://archive.org/details/ItsComplicatedSocialLivesOfNetworkedTeens/page/n270">56</a>, 60. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9780300166316" title="Special:BookSources/9780300166316"><bdi>9780300166316</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=It%27s+Complicated%3A+The+Social+Lives+of+Networked+Teens&rft.pages=56%2C+60&rft.pub=Yale+University+Press&rft.date=2014&rft.isbn=9780300166316&rft.aulast=Boyd&rft.aufirst=Danah&rft_id=https%3A%2F%2Farchive.org%2Fdetails%2FItsComplicatedSocialLivesOfNetworkedTeens&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-GrossP2-9"><span class="mw-cite-backlink">^ <a href="#cite_ref-GrossP2_9-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-GrossP2_9-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-GrossP2_9-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text">Gross, R. and Acquisti, A. 2005. Information Revelation and Privacy in Online <a href="/wiki/Social_Networking" class="mw-redirect" title="Social Networking">Social Networking</a> Sites (The Facebook Case).[online]. p. 2. Available at: <a rel="nofollow" class="external free" href="http://www.heinz.cmu.edu/~acquisti/papers/privacy-facebook-gross-acquisti.pdf">http://www.heinz.cmu.edu/~acquisti/papers/privacy-facebook-gross-acquisti.pdf</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20110722114146/http://www.heinz.cmu.edu/~acquisti/papers/privacy-facebook-gross-acquisti.pdf">Archived</a> 2011-07-22 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a> [Accessed 24 April 2011].</span> </li> <li id="cite_note-10"><span class="mw-cite-backlink"><b><a href="#cite_ref-10">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.webopedia.com/Blog/we-cant-give-up-on-privacy.html">"We Can't Give Up on Privacy!"</a>. 2 October 2014.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=We+Can%27t+Give+Up+on+Privacy%21&rft.date=2014-10-02&rft_id=https%3A%2F%2Fwww.webopedia.com%2FBlog%2Fwe-cant-give-up-on-privacy.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-:8-11"><span class="mw-cite-backlink">^ <a href="#cite_ref-:8_11-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:8_11-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.pewresearch.org/fact-tank/2018/03/27/americans-complicated-feelings-about-social-media-in-an-era-of-privacy-concerns/">"How Americans feel about social media and privacy"</a>. <i>Pew Research Center</i>. 27 March 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">2020-03-03</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Pew+Research+Center&rft.atitle=How+Americans+feel+about+social+media+and+privacy&rft.date=2018-03-27&rft_id=https%3A%2F%2Fwww.pewresearch.org%2Ffact-tank%2F2018%2F03%2F27%2Famericans-complicated-feelings-about-social-media-in-an-era-of-privacy-concerns%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-12"><span class="mw-cite-backlink"><b><a href="#cite_ref-12">^</a></b></span> <span class="reference-text">Kelly, S. Identity 'at risk' on Facebook. BBC News. [online]. Available at: <a rel="nofollow" class="external free" href="http://news.bbc.co.uk/1/hi/programmes/click_online/7375772.stm">http://news.bbc.co.uk/1/hi/programmes/click_online/7375772.stm</a> [Accessed 25 April 2011].</span> </li> <li id="cite_note-:1-13"><span class="mw-cite-backlink">^ <a href="#cite_ref-:1_13-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:1_13-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-:1_13-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-:1_13-3"><sup><i><b>d</b></i></sup></a> <a href="#cite_ref-:1_13-4"><sup><i><b>e</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChamorro-Premuzic2017" class="citation journal cs1">Chamorro-Premuzic, Tomas (May 1, 2017). <a rel="nofollow" class="external text" href="https://hbr.org/2017/05/why-were-so-hypocritical-about-online-privacy">"Why We're So Hypocritical About Online Privacy"</a>. <i>Harvard Business Review</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2017-05-15</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Harvard+Business+Review&rft.atitle=Why+We%27re+So+Hypocritical+About+Online+Privacy&rft.date=2017-05-01&rft.aulast=Chamorro-Premuzic&rft.aufirst=Tomas&rft_id=https%3A%2F%2Fhbr.org%2F2017%2F05%2Fwhy-were-so-hypocritical-about-online-privacy&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-14">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDienlinTrepte2015" class="citation journal cs1">Dienlin, Tobias; Trepte, Sabine (2015-04-01). "Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors". <i>European Journal of Social Psychology</i>. <b>45</b> (3): 285–297. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1002%2Fejsp.2049">10.1002/ejsp.2049</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1099-0992">1099-0992</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=European+Journal+of+Social+Psychology&rft.atitle=Is+the+privacy+paradox+a+relic+of+the+past%3F+An+in-depth+analysis+of+privacy+attitudes+and+privacy+behaviors&rft.volume=45&rft.issue=3&rft.pages=285-297&rft.date=2015-04-01&rft_id=info%3Adoi%2F10.1002%2Fejsp.2049&rft.issn=1099-0992&rft.aulast=Dienlin&rft.aufirst=Tobias&rft.au=Trepte%2C+Sabine&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-:2-15"><span class="mw-cite-backlink">^ <a href="#cite_ref-:2_15-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:2_15-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-:2_15-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFVan_der_Velden,_El_Emam2013" class="citation journal cs1">Van der Velden, El Emam, Maja, Khaled (January 1, 2013). <a rel="nofollow" class="external text" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3555319">"<span class="cs1-kern-left"></span>"Not all my friends need to know": a qualitative study of teenage patients, privacy, and social media"</a>. <i>Journal of the American Medical Informatics Association</i>. <b>20</b> (1): 16–24. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1136%2Famiajnl-2012-000949">10.1136/amiajnl-2012-000949</a>. <a href="/wiki/PMC_(identifier)" class="mw-redirect" title="PMC (identifier)">PMC</a> <span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3555319">3555319</a></span>. <a href="/wiki/PMID_(identifier)" class="mw-redirect" title="PMID (identifier)">PMID</a> <a rel="nofollow" class="external text" href="https://pubmed.ncbi.nlm.nih.gov/22771531">22771531</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Journal+of+the+American+Medical+Informatics+Association&rft.atitle=%22Not+all+my+friends+need+to+know%22%3A+a+qualitative+study+of+teenage+patients%2C+privacy%2C+and+social+media&rft.volume=20&rft.issue=1&rft.pages=16-24&rft.date=2013-01-01&rft_id=https%3A%2F%2Fwww.ncbi.nlm.nih.gov%2Fpmc%2Farticles%2FPMC3555319%23id-name%3DPMC&rft_id=info%3Apmid%2F22771531&rft_id=info%3Adoi%2F10.1136%2Famiajnl-2012-000949&rft.aulast=Van+der+Velden%2C+El+Emam&rft.aufirst=Maja%2C+Khaled&rft_id=https%3A%2F%2Fwww.ncbi.nlm.nih.gov%2Fpmc%2Farticles%2FPMC3555319&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_journal" title="Template:Cite journal">cite journal</a>}}</code>: CS1 maint: multiple names: authors list (<a href="/wiki/Category:CS1_maint:_multiple_names:_authors_list" title="Category:CS1 maint: multiple names: authors list">link</a>)</span></span> </li> <li id="cite_note-drafts-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-drafts_16-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDwyer,_C.Hiltz,_S.Passerini,_K." class="citation web cs1">Dwyer, C.; Hiltz, S.; Passerini, K. <a rel="nofollow" class="external text" href="http://aisel.aisnet.org/cgi/viewcontent.cgi?article=1849&context=amcis2007">"Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace"</a>. <i>Association for Information Systems AIS Electronic Library (AISeL)</i>. AMCIS 2007 Proceedings.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Association+for+Information+Systems+AIS+Electronic+Library+%28AISeL%29&rft.atitle=Trust+and+Privacy+Concern+Within+Social+Networking+Sites%3A+A+Comparison+of+Facebook+and+MySpace&rft.au=Dwyer%2C+C.&rft.au=Hiltz%2C+S.&rft.au=Passerini%2C+K.&rft_id=http%3A%2F%2Faisel.aisnet.org%2Fcgi%2Fviewcontent.cgi%3Farticle%3D1849%26context%3Damcis2007&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-facecloak-17"><span class="mw-cite-backlink">^ <a href="#cite_ref-facecloak_17-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-facecloak_17-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLuo,_W.Xie,_Q.Hengartner,_U.2009" class="citation book cs1">Luo, W.; Xie, Q.; Hengartner, U. (2009). <i>2009 International Conference on Computational Science and Engineering</i>. IEEE. pp. 26–33. <a href="/wiki/CiteSeerX_(identifier)" class="mw-redirect" title="CiteSeerX (identifier)">CiteSeerX</a> <span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.379.6412">10.1.1.379.6412</a></span>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2FCSE.2009.387">10.1109/CSE.2009.387</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-4244-5334-4" title="Special:BookSources/978-1-4244-5334-4"><bdi>978-1-4244-5334-4</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:11145491">11145491</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=2009+International+Conference+on+Computational+Science+and+Engineering&rft.pages=26-33&rft.pub=IEEE&rft.date=2009&rft_id=https%3A%2F%2Fciteseerx.ist.psu.edu%2Fviewdoc%2Fsummary%3Fdoi%3D10.1.1.379.6412%23id-name%3DCiteSeerX&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A11145491%23id-name%3DS2CID&rft_id=info%3Adoi%2F10.1109%2FCSE.2009.387&rft.isbn=978-1-4244-5334-4&rft.au=Luo%2C+W.&rft.au=Xie%2C+Q.&rft.au=Hengartner%2C+U.&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-18">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMatthew.2009" class="citation book cs1">Matthew., Myron (2009). <i>What is privacy? : investigating the meaning of privacy in Facebook and the social consequences of this</i>. Saarbrücken, Germany: Verlag Dr. Müller. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-3639175905" title="Special:BookSources/978-3639175905"><bdi>978-3639175905</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/469775250">469775250</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=What+is+privacy%3F+%3A+investigating+the+meaning+of+privacy+in+Facebook+and+the+social+consequences+of+this&rft.place=Saarbr%C3%BCcken%2C+Germany&rft.pub=Verlag+Dr.+M%C3%BCller&rft.date=2009&rft_id=info%3Aoclcnum%2F469775250&rft.isbn=978-3639175905&rft.aulast=Matthew.&rft.aufirst=Myron&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-:14-19"><span class="mw-cite-backlink">^ <a href="#cite_ref-:14_19-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:14_19-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFYerbyKoohangPaliszkiewicz2019" class="citation journal cs1">Yerby, Johnathan; Koohang, Alex; Paliszkiewicz, Joanna (2019-04-02). <a rel="nofollow" class="external text" href="https://doi.org/10.36965%2Fojakm.2019.7%281%291-13">"Social media privacy concerns and risk beliefs"</a>. <i>Online Journal of Applied Knowledge Management</i>. <b>7</b> (1): 1–13. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.36965%2Fojakm.2019.7%281%291-13">10.36965/ojakm.2019.7(1)1-13</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/2325-4688">2325-4688</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Online+Journal+of+Applied+Knowledge+Management&rft.atitle=Social+media+privacy+concerns+and+risk+beliefs&rft.volume=7&rft.issue=1&rft.pages=1-13&rft.date=2019-04-02&rft_id=info%3Adoi%2F10.36965%2Fojakm.2019.7%281%291-13&rft.issn=2325-4688&rft.aulast=Yerby&rft.aufirst=Johnathan&rft.au=Koohang%2C+Alex&rft.au=Paliszkiewicz%2C+Joanna&rft_id=https%3A%2F%2Fdoi.org%2F10.36965%252Fojakm.2019.7%25281%25291-13&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-20"><span class="mw-cite-backlink"><b><a href="#cite_ref-20">^</a></b></span> <span class="reference-text">Baruh, Lemi, Ekin Secinti, and Zeynep Cemalcilar. "Online privacy concerns and privacy management: A meta-analytical review." <i>Journal of Communication</i> 67.1 (2017): 26-53.</span> </li> <li id="cite_note-21"><span class="mw-cite-backlink"><b><a href="#cite_ref-21">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMajid2013" class="citation journal cs1">Majid, Abdul (4 April 2013). "A Context-Aware Personalized Travel Recommendation System Based on Grotagged Social Media Data Mining". <i>International Journal of Geographical Information Science</i>. <b>27</b> (4): 662–684. <a href="/wiki/Bibcode_(identifier)" class="mw-redirect" title="Bibcode (identifier)">Bibcode</a>:<a rel="nofollow" class="external text" href="https://ui.adsabs.harvard.edu/abs/2013IJGIS..27..662M">2013IJGIS..27..662M</a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F13658816.2012.696649">10.1080/13658816.2012.696649</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:6288962">6288962</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=International+Journal+of+Geographical+Information+Science&rft.atitle=A+Context-Aware+Personalized+Travel+Recommendation+System+Based+on+Grotagged+Social+Media+Data+Mining&rft.volume=27&rft.issue=4&rft.pages=662-684&rft.date=2013-04-04&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A6288962%23id-name%3DS2CID&rft_id=info%3Adoi%2F10.1080%2F13658816.2012.696649&rft_id=info%3Abibcode%2F2013IJGIS..27..662M&rft.aulast=Majid&rft.aufirst=Abdul&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-22"><span class="mw-cite-backlink"><b><a href="#cite_ref-22">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBossetta2018" class="citation book cs1">Bossetta, Michael (2018). <i>The Weaponization of Social Media:Spear Phishing and Cyberattacks on Democracy</i>. Yale University Press. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9780300166316" title="Special:BookSources/9780300166316"><bdi>9780300166316</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/1085118663">1085118663</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Weaponization+of+Social+Media%3ASpear+Phishing+and+Cyberattacks+on+Democracy&rft.pub=Yale+University+Press&rft.date=2018&rft_id=info%3Aoclcnum%2F1085118663&rft.isbn=9780300166316&rft.aulast=Bossetta&rft.aufirst=Michael&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-gawker.com-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-gawker.com_23-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRead2010" class="citation web cs1">Read, Max (18 October 2010). <a rel="nofollow" class="external text" href="https://www.gawker.com/5666325/how-to-stop-facebook-from-sharing-your-information-with-third-parties">"How to Stop Facebook from Sharing Your Information With Third Parties"</a>. <i>Gawker</i><span class="reference-accessdate">. Retrieved <span class="nowrap">19 April</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Gawker&rft.atitle=How+to+Stop+Facebook+from+Sharing+Your+Information+With+Third+Parties&rft.date=2010-10-18&rft.aulast=Read&rft.aufirst=Max&rft_id=https%3A%2F%2Fwww.gawker.com%2F5666325%2Fhow-to-stop-facebook-from-sharing-your-information-with-third-parties&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-24"><span class="mw-cite-backlink"><b><a href="#cite_ref-24">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.facebook.com/policy.php">"Data Policy"</a>. <i>Facebook</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2019-07-18</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Facebook&rft.atitle=Data+Policy&rft_id=https%3A%2F%2Fwww.facebook.com%2Fpolicy.php&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-25"><span class="mw-cite-backlink"><b><a href="#cite_ref-25">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChen2010" class="citation web cs1">Chen, Adrian (20 May 2010). <a rel="nofollow" class="external text" href="https://www.gawker.com/5544211/facebook-secretly-sold-your-identity-to-advertisers">"Facebook Secretly Sold Your Identity to Advertisers"</a>. <i>Gawker</i><span class="reference-accessdate">. Retrieved <span class="nowrap">19 April</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Gawker&rft.atitle=Facebook+Secretly+Sold+Your+Identity+to+Advertisers&rft.date=2010-05-20&rft.aulast=Chen&rft.aufirst=Adrian&rft_id=https%3A%2F%2Fwww.gawker.com%2F5544211%2Ffacebook-secretly-sold-your-identity-to-advertisers&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-26">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPeddy2017" class="citation journal cs1">Peddy, Andrea (January 2017). <a rel="nofollow" class="external text" href="http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=122342754&site=ehost-live&scope=site.">"Dangerous Classroom App -Titude: Protecting Student Privacy from Third-Party Educational Service Providers"</a>. <i>Brigham Young University Education & Law Journal</i>. <b>1</b>: 125–159<span class="reference-accessdate">. Retrieved <span class="nowrap">April 10,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Brigham+Young+University+Education+%26+Law+Journal&rft.atitle=Dangerous+Classroom+App+-Titude%3A+Protecting+Student+Privacy+from+Third-Party+Educational+Service+Providers&rft.volume=1&rft.pages=125-159&rft.date=2017-01&rft.aulast=Peddy&rft.aufirst=Andrea&rft_id=http%3A%2F%2Fsearch.ebscohost.com%2Flogin.aspx%3Fdirect%3Dtrue%26db%3Daph%26AN%3D122342754%26site%3Dehost-live%26scope%3Dsite.&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-27">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMeredith2018" class="citation web cs1">Meredith, Sam (2018-03-21). <a rel="nofollow" class="external text" href="https://www.cnbc.com/2018/03/21/facebook-cambridge-analytica-scandal-everything-you-need-to-know.html">"Here's everything you need to know about the Cambridge Analytica scandal"</a>. <i>CNBC</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=CNBC&rft.atitle=Here%27s+everything+you+need+to+know+about+the+Cambridge+Analytica+scandal&rft.date=2018-03-21&rft.aulast=Meredith&rft.aufirst=Sam&rft_id=https%3A%2F%2Fwww.cnbc.com%2F2018%2F03%2F21%2Ffacebook-cambridge-analytica-scandal-everything-you-need-to-know.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-28">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.bbc.com/news/technology-51799738">"Australia sues Facebook over Cambridge Analytica"</a>. <i>BBC News</i>. 2020-03-09<span class="reference-accessdate">. Retrieved <span class="nowrap">2020-03-10</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=BBC+News&rft.atitle=Australia+sues+Facebook+over+Cambridge+Analytica&rft.date=2020-03-09&rft_id=https%3A%2F%2Fwww.bbc.com%2Fnews%2Ftechnology-51799738&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-29">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://readwrite.com/2013/09/19/api-defined">"What APIs Are And Why They're Important"</a>. <i>readwrite</i>. 2013-09-19.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=readwrite&rft.atitle=What+APIs+Are+And+Why+They%27re+Important&rft.date=2013-09-19&rft_id=http%3A%2F%2Freadwrite.com%2F2013%2F09%2F19%2Fapi-defined&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-:3-30"><span class="mw-cite-backlink">^ <a href="#cite_ref-:3_30-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:3_30-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-:3_30-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-:3_30-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBechmann2012" class="citation journal cs1">Bechmann, Anja (Summer 2012). <a rel="nofollow" class="external text" href="https://curis.ku.dk/ws/files/145716065/Lomborg_Bechmann_2014_Using_APIs_for_data_collection_on_social_media_post_print_version.pdf">"Using APIs for Data Collection on Social Media"</a> <span class="cs1-format">(PDF)</span>. <i>The Information Society</i>. <b>30</b> (4): 256–265. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F01972243.2014.915276">10.1080/01972243.2014.915276</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:30939066">30939066</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Information+Society&rft.atitle=Using+APIs+for+Data+Collection+on+Social+Media&rft.ssn=summer&rft.volume=30&rft.issue=4&rft.pages=256-265&rft.date=2012&rft_id=info%3Adoi%2F10.1080%2F01972243.2014.915276&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A30939066%23id-name%3DS2CID&rft.aulast=Bechmann&rft.aufirst=Anja&rft_id=https%3A%2F%2Fcuris.ku.dk%2Fws%2Ffiles%2F145716065%2FLomborg_Bechmann_2014_Using_APIs_for_data_collection_on_social_media_post_print_version.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-31">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChang" class="citation news cs1">Chang, Alvin. <a rel="nofollow" class="external text" href="https://www.vox.com/policy-and-politics/2018/3/23/17151916/facebook-cambridge-analytica-trump-diagram">"The Facebook and Cambridge Analytica scandal, explained with a simple diagram"</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+Facebook+and+Cambridge+Analytica+scandal%2C+explained+with+a+simple+diagram&rft.aulast=Chang&rft.aufirst=Alvin&rft_id=https%3A%2F%2Fwww.vox.com%2Fpolicy-and-politics%2F2018%2F3%2F23%2F17151916%2Ffacebook-cambridge-analytica-trump-diagram&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-32"><span class="mw-cite-backlink"><b><a href="#cite_ref-32">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSharon2021" class="citation journal cs1">Sharon, Tamar (2021-11-01). <a rel="nofollow" class="external text" href="https://doi.org/10.1007/s10676-020-09547-x">"Blind-sided by privacy? Digital contact tracing, the Apple/Google API and big tech's newfound role as global health policy makers"</a>. <i>Ethics and Information Technology</i>. <b>23</b> (1): 45–57. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2Fs10676-020-09547-x">10.1007/s10676-020-09547-x</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1572-8439">1572-8439</a>. <a href="/wiki/PMC_(identifier)" class="mw-redirect" title="PMC (identifier)">PMC</a> <span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7368642">7368642</a></span>. <a href="/wiki/PMID_(identifier)" class="mw-redirect" title="PMID (identifier)">PMID</a> <a rel="nofollow" class="external text" href="https://pubmed.ncbi.nlm.nih.gov/32837287">32837287</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Ethics+and+Information+Technology&rft.atitle=Blind-sided+by+privacy%3F+Digital+contact+tracing%2C+the+Apple%2FGoogle+API+and+big+tech%27s+newfound+role+as+global+health+policy+makers&rft.volume=23&rft.issue=1&rft.pages=45-57&rft.date=2021-11-01&rft_id=https%3A%2F%2Fwww.ncbi.nlm.nih.gov%2Fpmc%2Farticles%2FPMC7368642%23id-name%3DPMC&rft.issn=1572-8439&rft_id=info%3Apmid%2F32837287&rft_id=info%3Adoi%2F10.1007%2Fs10676-020-09547-x&rft.aulast=Sharon&rft.aufirst=Tamar&rft_id=https%3A%2F%2Fdoi.org%2F10.1007%2Fs10676-020-09547-x&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-33"><span class="mw-cite-backlink"><b><a href="#cite_ref-33">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHoffman2017" class="citation web cs1">Hoffman, Chris (5 July 2017). <a rel="nofollow" class="external text" href="https://www.howtogeek.com/113513/5-alternative-search-engines-that-respect-your-privacy/">"5 Alternative Search Engines That Respect Your Privacy"</a>. <i>How-To Geek</i><span class="reference-accessdate">. Retrieved <span class="nowrap">19 April</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=How-To+Geek&rft.atitle=5+Alternative+Search+Engines+That+Respect+Your+Privacy&rft.date=2017-07-05&rft.aulast=Hoffman&rft.aufirst=Chris&rft_id=https%3A%2F%2Fwww.howtogeek.com%2F113513%2F5-alternative-search-engines-that-respect-your-privacy%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-34"><span class="mw-cite-backlink"><b><a href="#cite_ref-34">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFurini2014" class="citation journal cs1">Furini, Marco (2014). "Location privacy and public metadata in social media platforms: attitudes, behaviors and opinions". <i>Multimedia Tools and Applications</i>. <b>74</b> (21): 9795–9825. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2Fs11042-014-2151-7">10.1007/s11042-014-2151-7</a>. <a href="/wiki/Hdl_(identifier)" class="mw-redirect" title="Hdl (identifier)">hdl</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://hdl.handle.net/11380%2F1077259">11380/1077259</a></span>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:15490289">15490289</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Multimedia+Tools+and+Applications&rft.atitle=Location+privacy+and+public+metadata+in+social+media+platforms%3A+attitudes%2C+behaviors+and+opinions&rft.volume=74&rft.issue=21&rft.pages=9795-9825&rft.date=2014&rft_id=info%3Ahdl%2F11380%2F1077259&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A15490289%23id-name%3DS2CID&rft_id=info%3Adoi%2F10.1007%2Fs11042-014-2151-7&rft.aulast=Furini&rft.aufirst=Marco&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-35"><span class="mw-cite-backlink"><b><a href="#cite_ref-35">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCox2016" class="citation news cs1">Cox, Joseph (15 April 2016). <a rel="nofollow" class="external text" href="https://www.vice.com/en/article/8q8x8a/twitter-password-reset">"Enable This Setting So People Can't Guess Your Email Address from Your Twitter"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">17 January</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Enable+This+Setting+So+People+Can%27t+Guess+Your+Email+Address+from+Your+Twitter&rft.date=2016-04-15&rft.aulast=Cox&rft.aufirst=Joseph&rft_id=https%3A%2F%2Fwww.vice.com%2Fen%2Farticle%2F8q8x8a%2Ftwitter-password-reset&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-36"><span class="mw-cite-backlink"><b><a href="#cite_ref-36">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://help.twitter.com/en/using-twitter/account-suggestions">"About Twitter's account suggestions"</a>. <i>help.twitter.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">19 April</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=help.twitter.com&rft.atitle=About+Twitter%27s+account+suggestions&rft_id=https%3A%2F%2Fhelp.twitter.com%2Fen%2Fusing-twitter%2Faccount-suggestions&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-37"><span class="mw-cite-backlink"><b><a href="#cite_ref-37">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPennacchiottiPopescu2011" class="citation book cs1">Pennacchiotti, Marco; Popescu, Ana-Maria (2011-08-21). "Democrats, republicans and starbucks afficionados". <i>Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining</i>. pp. 430–438. <a href="/wiki/CiteSeerX_(identifier)" class="mw-redirect" title="CiteSeerX (identifier)">CiteSeerX</a> <span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.365.5651">10.1.1.365.5651</a></span>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F2020408.2020477">10.1145/2020408.2020477</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9781450308137" title="Special:BookSources/9781450308137"><bdi>9781450308137</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:10645180">10645180</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=Democrats%2C+republicans+and+starbucks+afficionados&rft.btitle=Proceedings+of+the+17th+ACM+SIGKDD+international+conference+on+Knowledge+discovery+and+data+mining&rft.pages=430-438&rft.date=2011-08-21&rft_id=https%3A%2F%2Fciteseerx.ist.psu.edu%2Fviewdoc%2Fsummary%3Fdoi%3D10.1.1.365.5651%23id-name%3DCiteSeerX&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A10645180%23id-name%3DS2CID&rft_id=info%3Adoi%2F10.1145%2F2020408.2020477&rft.isbn=9781450308137&rft.aulast=Pennacchiotti&rft.aufirst=Marco&rft.au=Popescu%2C+Ana-Maria&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-38"><span class="mw-cite-backlink"><b><a href="#cite_ref-38">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.ted.com/talks/gary_kovacs_tracking_the_trackers?language=en">"tracking our online trackers"</a>. 3 May 2012.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=tracking+our+online+trackers&rft.date=2012-05-03&rft_id=https%3A%2F%2Fwww.ted.com%2Ftalks%2Fgary_kovacs_tracking_the_trackers%3Flanguage%3Den&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-39"><span class="mw-cite-backlink"><b><a href="#cite_ref-39">^</a></b></span> <span class="reference-text">Yao, M.Z., &Zhang, J. (2008). Predicting user concerns about online privacy in Hong Kong. Cyberpsychology & Behavior, 11(6). 779–781. Dio:10.1089/cpb.2007.0252</span> </li> <li id="cite_note-The_Privacy_Act_of_1974-40"><span class="mw-cite-backlink">^ <a href="#cite_ref-The_Privacy_Act_of_1974_40-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-The_Privacy_Act_of_1974_40-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.justice.gov/opcl/conditions-disclosure-third-parties/">"Overview of the Privacy Act of 1974"</a>. <i>justice.gov</i>. 2014-06-17.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=justice.gov&rft.atitle=Overview+of+the+Privacy+Act+of+1974&rft.date=2014-06-17&rft_id=https%3A%2F%2Fwww.justice.gov%2Fopcl%2Fconditions-disclosure-third-parties%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-41"><span class="mw-cite-backlink"><b><a href="#cite_ref-41">^</a></b></span> <span class="reference-text"> Danesh Irani, Steve Webb, Calton Pu, Kang Li, "Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks," IEEE Internet Computing, May–June 2011. Retrieved from <a rel="nofollow" class="external free" href="http://www.computer.org/csdl/mags/ic/2011/03/mic2011030013-abs.html">http://www.computer.org/csdl/mags/ic/2011/03/mic2011030013-abs.html</a></span> </li> <li id="cite_note-42"><span class="mw-cite-backlink"><b><a href="#cite_ref-42">^</a></b></span> <span class="reference-text">Balachander Krishnamurthy, Konstantin Naryshkin, Craig Wills, "Privacy leakage vs. Protection measures: the growing disconnect," Web 2.0 Security and Privacy Workshop, May 2011. Retrieved from <a rel="nofollow" class="external free" href="http://www.research.att.com/~bala/papers/w2sp11.pdf">http://www.research.att.com/~bala/papers/w2sp11.pdf</a></span> </li> <li id="cite_note-43"><span class="mw-cite-backlink"><b><a href="#cite_ref-43">^</a></b></span> <span class="reference-text">Balachander Krishnamurthy and Craig Wills, "On the Leakage of Personally Identifiable Information Via Online Social Networks," Proceedings of ACM SIGCOMM Workshop on Online Social Networks, August 2009. Retrieved from <a rel="nofollow" class="external free" href="http://www.research.att.com/~bala/papers/wosn09.pdf">http://www.research.att.com/~bala/papers/wosn09.pdf</a></span> </li> <li id="cite_note-:9-44"><span class="mw-cite-backlink">^ <a href="#cite_ref-:9_44-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:9_44-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-:9_44-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFvan_Leeuwen2015" class="citation journal cs1">van Leeuwen, M (2015). "Social Media Ethics". <i>The International Encyclopedia of Digital Communication and Society</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+International+Encyclopedia+of+Digital+Communication+and+Society&rft.atitle=Social+Media+Ethics&rft.date=2015&rft.aulast=van+Leeuwen&rft.aufirst=M&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-45"><span class="mw-cite-backlink"><b><a href="#cite_ref-45">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCiment2013" class="citation journal cs1">Ciment, J (2013). "Social Media". <i>Culture Wars in America: An Encyclopedia of Issues, Viewpoints, and Voices</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Culture+Wars+in+America%3A+An+Encyclopedia+of+Issues%2C+Viewpoints%2C+and+Voices&rft.atitle=Social+Media&rft.date=2013&rft.aulast=Ciment&rft.aufirst=J&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-46"><span class="mw-cite-backlink"><b><a href="#cite_ref-46">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCainFink2010" class="citation journal cs1">Cain, Jeff; Fink, Joseph L. (2010-12-15). <a rel="nofollow" class="external text" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3058471">"Legal and Ethical Issues Regarding Social Media and Pharmacy Education"</a>. <i>American Journal of Pharmaceutical Education</i>. <b>74</b> (10): 184. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.5688%2Faj7410184">10.5688/aj7410184</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0002-9459">0002-9459</a>. <a href="/wiki/PMC_(identifier)" class="mw-redirect" title="PMC (identifier)">PMC</a> <span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3058471">3058471</a></span>. <a href="/wiki/PMID_(identifier)" class="mw-redirect" title="PMID (identifier)">PMID</a> <a rel="nofollow" class="external text" href="https://pubmed.ncbi.nlm.nih.gov/21436925">21436925</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=American+Journal+of+Pharmaceutical+Education&rft.atitle=Legal+and+Ethical+Issues+Regarding+Social+Media+and+Pharmacy+Education&rft.volume=74&rft.issue=10&rft.pages=184&rft.date=2010-12-15&rft_id=https%3A%2F%2Fwww.ncbi.nlm.nih.gov%2Fpmc%2Farticles%2FPMC3058471%23id-name%3DPMC&rft.issn=0002-9459&rft_id=info%3Apmid%2F21436925&rft_id=info%3Adoi%2F10.5688%2Faj7410184&rft.aulast=Cain&rft.aufirst=Jeff&rft.au=Fink%2C+Joseph+L.&rft_id=https%3A%2F%2Fwww.ncbi.nlm.nih.gov%2Fpmc%2Farticles%2FPMC3058471&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-Fernandez-47"><span class="mw-cite-backlink">^ <a href="#cite_ref-Fernandez_47-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Fernandez_47-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-Fernandez_47-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text">Fernandez, P. 2009. Online Social Networking Sites and Privacy: Revisiting Ethical Considerations for a New Generation of Technology. [online]. Available at: <a rel="nofollow" class="external free" href="http://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1250&context=libphilprac">http://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1250&context=libphilprac</a> [Accessed 25 April 2011]</span> </li> <li id="cite_note-48"><span class="mw-cite-backlink"><b><a href="#cite_ref-48">^</a></b></span> <span class="reference-text">McMenemy, D. 2008. Internet access in UK public libraries: notes and queries from a small scale study [abstract only]. Library Review [online]. Available at: <a rel="nofollow" class="external free" href="http://www.emeraldinsight.com/journals.htm?issn=0024-2535&volume=57&issue=7&articleid=1740622&show=html">http://www.emeraldinsight.com/journals.htm?issn=0024-2535&volume=57&issue=7&articleid=1740622&show=html</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20120112231300/http://www.emeraldinsight.com/journals.htm?issn=0024-2535&volume=57&issue=7&articleid=1740622&show=html">Archived</a> 2012-01-12 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a> [Accessed 25 April 2011]</span> </li> <li id="cite_note-49"><span class="mw-cite-backlink"><b><a href="#cite_ref-49">^</a></b></span> <span class="reference-text">Smith, C. 2011. Facebook Removes 20, 000 Underage Users Every Day. The Huffington Post. [online]. Available at: <a rel="nofollow" class="external autonumber" href="https://www.huffingtonpost.com/2011/03/23/facebook-underage-users_n_839437.html">[1]</a> [Accessed 25 April 2011]</span> </li> <li id="cite_note-GrossP8-50"><span class="mw-cite-backlink">^ <a href="#cite_ref-GrossP8_50-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-GrossP8_50-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-GrossP8_50-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text">Gross, R. and Acquisti, A. 2005. Information Revelation and Privacy in Online Social Networking Sites (The Facebook Case).[online]. p. 8. Available at: <a rel="nofollow" class="external free" href="http://www.heinz.cmu.edu/~acquisti/papers/privacy-facebook-gross-acquisti.pdf">http://www.heinz.cmu.edu/~acquisti/papers/privacy-facebook-gross-acquisti.pdf</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20110722114146/http://www.heinz.cmu.edu/~acquisti/papers/privacy-facebook-gross-acquisti.pdf">Archived</a> 2011-07-22 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a> [Accessed 24 April 2011].</span> </li> <li id="cite_note-privacyrights.org-51"><span class="mw-cite-backlink">^ <a href="#cite_ref-privacyrights.org_51-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-privacyrights.org_51-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20140714145317/https://www.privacyrights.org/social-networking-privacy-how-be-safe-secure-and-social#hindering-job-seekers">"Social Networking Privacy: How to be Safe, Secure and Social - Privacy Rights Clearinghouse"</a>. <i>privacyrights.org</i>. Archived from <a rel="nofollow" class="external text" href="https://www.privacyrights.org/social-networking-privacy-how-be-safe-secure-and-social#hindering-job-seekers">the original</a> on 2014-07-14<span class="reference-accessdate">. Retrieved <span class="nowrap">2014-06-09</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=privacyrights.org&rft.atitle=Social+Networking+Privacy%3A+How+to+be+Safe%2C+Secure+and+Social+-+Privacy+Rights+Clearinghouse&rft_id=https%3A%2F%2Fwww.privacyrights.org%2Fsocial-networking-privacy-how-be-safe-secure-and-social%23hindering-job-seekers&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-52"><span class="mw-cite-backlink"><b><a href="#cite_ref-52">^</a></b></span> <span class="reference-text">myID.com. 2011. Social Network Profiles Help Identity Thieves Guess Your Social Security Number. [online]. Available at: <a rel="nofollow" class="external free" href="http://www.myid.com/social-network-profiles-help-thieves-guess-your-social-security-number">http://www.myid.com/social-network-profiles-help-thieves-guess-your-social-security-number</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20120116111603/http://www.myid.com/social-network-profiles-help-thieves-guess-your-social-security-number">Archived</a> 2012-01-16 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>. [Accessed 25 April 2011]</span> </li> <li id="cite_note-53"><span class="mw-cite-backlink"><b><a href="#cite_ref-53">^</a></b></span> <span class="reference-text">MSNBC. 2011. Kids' pictures on Facebook exposes them to identity theft. [online]. Available at: <a rel="nofollow" class="external autonumber" href="https://www.msnbc.msn.com/id/42593880/ns/local_news-bakersfield_ca/">[2]</a><sup class="noprint Inline-Template"><span style="white-space: nowrap;">[<i><a href="/wiki/Wikipedia:Link_rot" title="Wikipedia:Link rot"><span title=" Dead link tagged August 2024">dead link</span></a></i><span style="visibility:hidden; color:transparent; padding-left:2px">‍</span>]</span></sup> [Accessed 25 April 2011]</span> </li> <li id="cite_note-54"><span class="mw-cite-backlink"><b><a href="#cite_ref-54">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGrenoble2012" class="citation news cs1">Grenoble, Ryan (2012-10-26). <a rel="nofollow" class="external text" href="https://www.huffingtonpost.com/2012/10/26/bogomil-shopov-facebook-data_n_2024133.html">"Bogomil Shopov, Bulgarian Tech Consultant: 1 Million Users' Private Facebook Data Available Online For $5 (VIDEO)"</a>. <i>The Huffington Post</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Huffington+Post&rft.atitle=Bogomil+Shopov%2C+Bulgarian+Tech+Consultant%3A+1+Million+Users%27+Private+Facebook+Data+Available+Online+For+%245+%28VIDEO%29&rft.date=2012-10-26&rft.aulast=Grenoble&rft.aufirst=Ryan&rft_id=https%3A%2F%2Fwww.huffingtonpost.com%2F2012%2F10%2F26%2Fbogomil-shopov-facebook-data_n_2024133.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-55"><span class="mw-cite-backlink"><b><a href="#cite_ref-55">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.pewresearch.org/internet/2018/11/28/teens-and-their-experiences-on-social-media/">"1. Teens and their experiences on social media"</a>. <i>Pew Research Center: Internet, Science & Tech</i>. 2018-11-28<span class="reference-accessdate">. Retrieved <span class="nowrap">2020-10-05</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Pew+Research+Center%3A+Internet%2C+Science+%26+Tech&rft.atitle=1.+Teens+and+their+experiences+on+social+media&rft.date=2018-11-28&rft_id=https%3A%2F%2Fwww.pewresearch.org%2Finternet%2F2018%2F11%2F28%2Fteens-and-their-experiences-on-social-media%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-56"><span class="mw-cite-backlink"><b><a href="#cite_ref-56">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNicolls" class="citation web cs1">Nicolls, Dean. <a rel="nofollow" class="external text" href="https://www.forbes.com/sites/jumio/2020/06/01/age-verification-the-fine-line-between-clever-and-stupid/">"Jumio BrandVoice: Age Verification: The Fine Line Between Clever And Stupid"</a>. <i>Forbes</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2021-09-03</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Forbes&rft.atitle=Jumio+BrandVoice%3A+Age+Verification%3A+The+Fine+Line+Between+Clever+And+Stupid&rft.aulast=Nicolls&rft.aufirst=Dean&rft_id=https%3A%2F%2Fwww.forbes.com%2Fsites%2Fjumio%2F2020%2F06%2F01%2Fage-verification-the-fine-line-between-clever-and-stupid%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-57"><span class="mw-cite-backlink"><b><a href="#cite_ref-57">^</a></b></span> <span class="reference-text">Chai S, Bagchi-Sen S, Morrell C, Rao H, Upadhyaya S. Internet and online information privacy: An exploratory study of preteens and early teens. IEEE Transactions On Professional Communication [serial online]. June 2009;52(2):167–182. Available from: PsycINFO, Ipswich, MA. Accessed February 6, 2012.</span> </li> <li id="cite_note-58"><span class="mw-cite-backlink"><b><a href="#cite_ref-58">^</a></b></span> <span class="reference-text">Feng Y., Xie, W. Teens' concern for privacy when using social networking sites: An analysis of socialization agents and relationships with privacy setting options on Facebook" <i>Computers in Human Behavior</i> 2014, 33 (April), 153-162.</span> </li> <li id="cite_note-59"><span class="mw-cite-backlink"><b><a href="#cite_ref-59">^</a></b></span> <span class="reference-text">Moscardelli D, Divine R. Adolescents' Concern for Privacy When Using the Internet: An Empirical Analysis of Predictors and Relationships with Privacy-Protecting Behaviors. Family And Consumer Sciences Research Journal [serial online]. March 2007;35(3):232–252. Available from: PsycINFO, Ipswich, MA. Accessed February 6, 2012.</span> </li> <li id="cite_note-60"><span class="mw-cite-backlink"><b><a href="#cite_ref-60">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBoermanKruikemeierZuiderveen_Borgesius2018" class="citation journal cs1">Boerman, Sophie C.; Kruikemeier, Sanne; Zuiderveen Borgesius, Frederik J. (2018-10-05). <a rel="nofollow" class="external text" href="https://doi.org/10.1177%2F0093650218800915">"Exploring Motivations for Online Privacy Protection Behavior: Insights From Panel Data"</a>. <i>Communication Research</i>. <b>48</b> (7): 953–977. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1177%2F0093650218800915">10.1177/0093650218800915</a></span>. <a href="/wiki/Hdl_(identifier)" class="mw-redirect" title="Hdl (identifier)">hdl</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://hdl.handle.net/11245.1%2F756542cc-4c48-4895-8eef-856daac43803">11245.1/756542cc-4c48-4895-8eef-856daac43803</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0093-6502">0093-6502</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Communication+Research&rft.atitle=Exploring+Motivations+for+Online+Privacy+Protection+Behavior%3A+Insights+From+Panel+Data&rft.volume=48&rft.issue=7&rft.pages=953-977&rft.date=2018-10-05&rft_id=info%3Ahdl%2F11245.1%2F756542cc-4c48-4895-8eef-856daac43803&rft.issn=0093-6502&rft_id=info%3Adoi%2F10.1177%2F0093650218800915&rft.aulast=Boerman&rft.aufirst=Sophie+C.&rft.au=Kruikemeier%2C+Sanne&rft.au=Zuiderveen+Borgesius%2C+Frederik+J.&rft_id=https%3A%2F%2Fdoi.org%2F10.1177%252F0093650218800915&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-61"><span class="mw-cite-backlink"><b><a href="#cite_ref-61">^</a></b></span> <span class="reference-text">Murphy, Kate. "We Want Privacy, but Can't Stop Sharing." Sunday Review. The New York Times Company, 4 October 2014. Web.</span> </li> <li id="cite_note-62"><span class="mw-cite-backlink"><b><a href="#cite_ref-62">^</a></b></span> <span class="reference-text">Madden, Mary, Amanda Lenhart, Sandra Cortesi, Urs Gasser, Maeve Duggan, Aaron Smith, and Meredith Beaton. "Teens, Social Media, and Privacy." Pew Research Center: Internet, Science & Tech. N.p., 21 May 2013. Web. 23 February 2017.</span> </li> <li id="cite_note-Wexler,_Evan_2014-63"><span class="mw-cite-backlink">^ <a href="#cite_ref-Wexler,_Evan_2014_63-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Wexler,_Evan_2014_63-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-Wexler,_Evan_2014_63-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text">Wexler, Evan, and Cecily Taylor. "What Are Teens Doing Online?" PBS. Public Broadcasting Service, 18 February 2014. Web. 1 March 2017.</span> </li> <li id="cite_note-64"><span class="mw-cite-backlink"><b><a href="#cite_ref-64">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDebatinLovejoyHornHughes2009" class="citation journal cs1">Debatin, Bernhard; Lovejoy, Jennette P.; Horn, Ann-Kathrin; Hughes, Brittany N. (October 2009). <a rel="nofollow" class="external text" href="https://doi.org/10.1111%2Fj.1083-6101.2009.01494.x">"Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences"</a>. <i>Journal of Computer-Mediated Communication</i>. <b>15</b> (1): 83–108. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1111%2Fj.1083-6101.2009.01494.x">10.1111/j.1083-6101.2009.01494.x</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1083-6101">1083-6101</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Journal+of+Computer-Mediated+Communication&rft.atitle=Facebook+and+Online+Privacy%3A+Attitudes%2C+Behaviors%2C+and+Unintended+Consequences&rft.volume=15&rft.issue=1&rft.pages=83-108&rft.date=2009-10&rft_id=info%3Adoi%2F10.1111%2Fj.1083-6101.2009.01494.x&rft.issn=1083-6101&rft.aulast=Debatin&rft.aufirst=Bernhard&rft.au=Lovejoy%2C+Jennette+P.&rft.au=Horn%2C+Ann-Kathrin&rft.au=Hughes%2C+Brittany+N.&rft_id=https%3A%2F%2Fdoi.org%2F10.1111%252Fj.1083-6101.2009.01494.x&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-65"><span class="mw-cite-backlink"><b><a href="#cite_ref-65">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.foxnews.com/politics/california-allows-minors-to-delete-social-media-posts-with-erase-law/">"California allows minors to delete social media posts, with 'erase' law"</a>. <i>Fox News</i>. 2014-03-01<span class="reference-accessdate">. Retrieved <span class="nowrap">2017-11-10</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Fox+News&rft.atitle=California+allows+minors+to+delete+social+media+posts%2C+with+%27erase%27+law&rft.date=2014-03-01&rft_id=https%3A%2F%2Fwww.foxnews.com%2Fpolitics%2Fcalifornia-allows-minors-to-delete-social-media-posts-with-erase-law%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-66"><span class="mw-cite-backlink"><b><a href="#cite_ref-66">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSchonfeld2009" class="citation web cs1">Schonfeld, Erick (2009-02-03). <a rel="nofollow" class="external text" href="https://techcrunch.com/2009/02/03/thousands-of-myspace-sex-offender-refugees-found-on-facebook/">"Thousands Of MySpace Sex Offender Refugees Found On Facebook"</a>. <i>TechCrunch</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2023-04-24</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=TechCrunch&rft.atitle=Thousands+Of+MySpace+Sex+Offender+Refugees+Found+On+Facebook&rft.date=2009-02-03&rft.aulast=Schonfeld&rft.aufirst=Erick&rft_id=https%3A%2F%2Ftechcrunch.com%2F2009%2F02%2F03%2Fthousands-of-myspace-sex-offender-refugees-found-on-facebook%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-67"><span class="mw-cite-backlink"><b><a href="#cite_ref-67">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://internetsafety101.org/snsdangers">"Internet Safety 101: Dangers"</a>. <i>internetsafety101.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">19 April</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=internetsafety101.org&rft.atitle=Internet+Safety+101%3A+Dangers&rft_id=https%3A%2F%2Finternetsafety101.org%2Fsnsdangers&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-68"><span class="mw-cite-backlink"><b><a href="#cite_ref-68">^</a></b></span> <span class="reference-text">Facebook Help Center. 2011. How can I report a convicted sex offender? [online]. Available at: <a rel="nofollow" class="external free" href="https://www.facebook.com/help/?faq=15160">http://www.facebook.com/help/?faq=15160</a> [Accessed 24 April 2011]</span> </li> <li id="cite_note-69"><span class="mw-cite-backlink"><b><a href="#cite_ref-69">^</a></b></span> <span class="reference-text">Randall, D. and Richards, V. Facebook can ruin your life. And so can Myspace, Bebo…. The Independent [online]. Available at: <a rel="nofollow" class="external autonumber" href="https://web.archive.org/web/20080403113241/http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html">[3]</a>. [Accessed 24 April 2011]</span> </li> <li id="cite_note-70"><span class="mw-cite-backlink"><b><a href="#cite_ref-70">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20151208175121/http://www.beyondidentitytheft.com/dangers-of-social-networking.html">"Dangers Of Social Networking Are On The Increase And Everyone Is At Risk!"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.beyondidentitytheft.com/dangers-of-social-networking.html">the original</a> on 2015-12-08<span class="reference-accessdate">. Retrieved <span class="nowrap">2015-11-29</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Dangers+Of+Social+Networking+Are+On+The+Increase+And+Everyone+Is+At+Risk%21&rft_id=http%3A%2F%2Fwww.beyondidentitytheft.com%2Fdangers-of-social-networking.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-71"><span class="mw-cite-backlink"><b><a href="#cite_ref-71">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.huffpost.com/entry/peter-chapman-admits-usin_n_489674">"Peter Chapman, Sex Offender, Admits Rape And Murder Of Teen He Ensnared On Facebook"</a>. <i>HuffPost</i>. 2010-05-08<span class="reference-accessdate">. Retrieved <span class="nowrap">2023-04-24</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=HuffPost&rft.atitle=Peter+Chapman%2C+Sex+Offender%2C+Admits+Rape+And+Murder+Of+Teen+He+Ensnared+On+Facebook&rft.date=2010-05-08&rft_id=https%3A%2F%2Fwww.huffpost.com%2Fentry%2Fpeter-chapman-admits-usin_n_489674&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-cyberstalking-72"><span class="mw-cite-backlink">^ <a href="#cite_ref-cyberstalking_72-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-cyberstalking_72-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20140924085448/http://www.seomworld.com/2013/09/social-media-and-cyber-stalking-facts.html#.U5U6LZRdWUw">"Social Media and Cyber Stalking Facts - Advice and Tips on Staying Protected"</a>. <i>seomworld.com</i>. Archived from <a rel="nofollow" class="external text" href="http://www.seomworld.com/2013/09/social-media-and-cyber-stalking-facts.html#.U5U6LZRdWUw">the original</a> on 2014-09-24<span class="reference-accessdate">. Retrieved <span class="nowrap">2014-06-09</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=seomworld.com&rft.atitle=Social+Media+and+Cyber+Stalking+Facts+-+Advice+and+Tips+on+Staying+Protected&rft_id=http%3A%2F%2Fwww.seomworld.com%2F2013%2F09%2Fsocial-media-and-cyber-stalking-facts.html%23.U5U6LZRdWUw&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-73"><span class="mw-cite-backlink"><b><a href="#cite_ref-73">^</a></b></span> <span class="reference-text">Malone, S. 2005. CLARIFICATION: AOL Instant messenger users 'waive right to privacy'. [online]. Available at: <a rel="nofollow" class="external free" href="http://www.pcpro.co.uk/news/70262/clarification-aol-instant-messenger-users-waive-right-to-privacy">http://www.pcpro.co.uk/news/70262/clarification-aol-instant-messenger-users-waive-right-to-privacy</a> [Accessed 24 April 2011]</span> </li> <li id="cite_note-74"><span class="mw-cite-backlink"><b><a href="#cite_ref-74">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://abcnews.go.com/Technology/smartphone-apps-tracking-keeping-tabs-past-lovers-people/story?id=13022144">"Creepy or Convenient? Apps for Tracking, Keeping Tabs"</a>. <i>ABC News</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2023-04-24</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=ABC+News&rft.atitle=Creepy+or+Convenient%3F+Apps+for+Tracking%2C+Keeping+Tabs&rft_id=https%3A%2F%2Fabcnews.go.com%2FTechnology%2Fsmartphone-apps-tracking-keeping-tabs-past-lovers-people%2Fstory%3Fid%3D13022144&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-Facebook._PIC-75"><span class="mw-cite-backlink">^ <a href="#cite_ref-Facebook._PIC_75-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Facebook._PIC_75-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text">EPIC – In re Facebook. (n.d.). EPIC – Electronic Privacy Information Center. Retrieved January 25, 2011/</span> </li> <li id="cite_note-76"><span class="mw-cite-backlink"><b><a href="#cite_ref-76">^</a></b></span> <span class="reference-text">Bennet, J. n.d. Internet Memes. [online]. Available at: <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20110720113942/http://2010.newsweek.com/top-10/internet-memes/the-star-wars-kid.html">"The Star Wars Kid"</a>. Archived from <a rel="nofollow" class="external text" href="http://2010.newsweek.com/top-10/internet-memes/the-star-wars-kid.html">the original</a> on 2011-07-20<span class="reference-accessdate">. Retrieved <span class="nowrap">2011-04-26</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=The+Star+Wars+Kid&rft_id=http%3A%2F%2F2010.newsweek.com%2Ftop-10%2Finternet-memes%2Fthe-star-wars-kid.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span> [Accessed 25 April 2011]</span> </li> <li id="cite_note-Havenstein-77"><span class="mw-cite-backlink">^ <a href="#cite_ref-Havenstein_77-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Havenstein_77-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-Havenstein_77-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHavenstein2008" class="citation web cs1">Havenstein, Heather (2008-09-12). <a rel="nofollow" class="external text" href="https://www.computerworld.com/article/2532900/one-in-five-employers-uses-social-networks-in-hiring-process.html">"One in five employers uses social networks in hiring process"</a>. <i>Computerworld</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2023-04-24</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Computerworld&rft.atitle=One+in+five+employers+uses+social+networks+in+hiring+process&rft.date=2008-09-12&rft.aulast=Havenstein&rft.aufirst=Heather&rft_id=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F2532900%2Fone-in-five-employers-uses-social-networks-in-hiring-process.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-78"><span class="mw-cite-backlink"><b><a href="#cite_ref-78">^</a></b></span> <span class="reference-text">Bowers, T. 2008. Employers who check out job candidates on MySpace could be legally liable. [online]. Available at: <a rel="nofollow" class="external free" href="https://www.techrepublic.com/blog/career/employers-who-check-out-job-candidates-on-myspace-could-be-legally-liable/338">http://www.techrepublic.com/blog/career/employers-who-check-out-job-candidates-on-myspace-could-be-legally-liable/338</a> [Accessed 24 April 2011]</span> </li> <li id="cite_note-79"><span class="mw-cite-backlink"><b><a href="#cite_ref-79">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.natlawreview.com/article/illinois-becomes-second-state-to-prohibit-employers-requiring-access-to-employees-an">"Illinois Becomes Second State to Prohibit Employers from Requiring Access to Employees' and Prospective Employees' Social Media Web Sites"</a>. <i>The National Law Review</i>. 2012-08-23<span class="reference-accessdate">. Retrieved <span class="nowrap">2012-08-23</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=The+National+Law+Review&rft.atitle=Illinois+Becomes+Second+State+to+Prohibit+Employers+from+Requiring+Access+to+Employees%27+and+Prospective+Employees%27+Social+Media+Web+Sites&rft.date=2012-08-23&rft_id=http%3A%2F%2Fwww.natlawreview.com%2Farticle%2Fillinois-becomes-second-state-to-prohibit-employers-requiring-access-to-employees-an&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-80"><span class="mw-cite-backlink"><b><a href="#cite_ref-80">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.shrm.org/resourcesandtools/legal-and-compliance/state-and-local-updates/pages/states-social-media.aspx">"State Laws Ban Access to Workers' Social Media Accounts"</a>. <i>SHRM</i>. 2015-07-29<span class="reference-accessdate">. Retrieved <span class="nowrap">2017-11-10</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=SHRM&rft.atitle=State+Laws+Ban+Access+to+Workers%27+Social+Media+Accounts&rft.date=2015-07-29&rft_id=https%3A%2F%2Fwww.shrm.org%2Fresourcesandtools%2Flegal-and-compliance%2Fstate-and-local-updates%2Fpages%2Fstates-social-media.aspx&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-81"><span class="mw-cite-backlink"><b><a href="#cite_ref-81">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.americanbar.org/publications/blt/2014/01/03a_claypoole.html">"Privacy and Social Media | Business Law Section"</a>. <i>www.americanbar.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2017-11-10</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.americanbar.org&rft.atitle=Privacy+and+Social+Media+%7C+Business+Law+Section&rft_id=https%3A%2F%2Fwww.americanbar.org%2Fpublications%2Fblt%2F2014%2F01%2F03a_claypoole.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-82"><span class="mw-cite-backlink"><b><a href="#cite_ref-82">^</a></b></span> <span class="reference-text">Sky News. 2009. Sacked for Calling Job Boring on Facebook. [online]. Available at: <a rel="nofollow" class="external free" href="http://news.sky.com/skynews/Home/UK-News/Facebook-Sacking-Kimberley-Swann-From-Clacton-Essex-Sacked-For-Calling-Job-Boring/Article/200902415230508">http://news.sky.com/skynews/Home/UK-News/Facebook-Sacking-Kimberley-Swann-From-Clacton-Essex-Sacked-For-Calling-Job-Boring/Article/200902415230508</a> [Accessed 24 April 2011]</span> </li> <li id="cite_note-83"><span class="mw-cite-backlink"><b><a href="#cite_ref-83">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="http://news.bbc.co.uk/2/hi/uk_news/7703129.stm">"Crew sacked over Facebook posts"</a>. 2008-10-31<span class="reference-accessdate">. Retrieved <span class="nowrap">2023-04-24</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Crew+sacked+over+Facebook+posts&rft.date=2008-10-31&rft_id=http%3A%2F%2Fnews.bbc.co.uk%2F2%2Fhi%2Fuk_news%2F7703129.stm&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-84"><span class="mw-cite-backlink"><b><a href="#cite_ref-84">^</a></b></span> <span class="reference-text">Roythornes Solicitors. 2011. The employment law dangers of Social Networking. [online]. Available at: <a rel="nofollow" class="external free" href="http://www.opportunitypeterborough.co.uk/bondholder/events/the-employment-law-dangers-of-social-networking">http://www.opportunitypeterborough.co.uk/bondholder/events/the-employment-law-dangers-of-social-networking</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20110726094256/http://www.opportunitypeterborough.co.uk/bondholder/events/the-employment-law-dangers-of-social-networking">Archived</a> 2011-07-26 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a> [Accessed 24 April 2011]</span> </li> <li id="cite_note-85"><span class="mw-cite-backlink"><b><a href="#cite_ref-85">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.nbcnewyork.com/news/local/investigations-i-team-social-media-use-survey-new-york-new-jersey/1329983/">"Some Burglars Using Social Media to Find Targets, I-Team Survey Shows"</a>. 22 August 2016.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Some+Burglars+Using+Social+Media+to+Find+Targets%2C+I-Team+Survey+Shows&rft.date=2016-08-22&rft_id=https%3A%2F%2Fwww.nbcnewyork.com%2Fnews%2Flocal%2Finvestigations-i-team-social-media-use-survey-new-york-new-jersey%2F1329983%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-86"><span class="mw-cite-backlink"><b><a href="#cite_ref-86">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://metro.co.uk/2022/02/01/ex-burglars-reveal-common-social-media-posts-that-help-them-steal-16026693/">"Ex-burglars reveal social media posts they use to help them steal your stuff"</a>. February 2022.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Ex-burglars+reveal+social+media+posts+they+use+to+help+them+steal+your+stuff&rft.date=2022-02&rft_id=https%3A%2F%2Fmetro.co.uk%2F2022%2F02%2F01%2Fex-burglars-reveal-common-social-media-posts-that-help-them-steal-16026693%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-87"><span class="mw-cite-backlink"><b><a href="#cite_ref-87">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.homewatchgroup.com/how-do-burglars-use-social-media-to-find-targets/#:~:text=A%20UK%20survey%20has%20shown,individuals%20posting%20regular%20life%20updates">"How do Burglars Use Social Media to Find Targets?"</a>. 5 February 2021.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=How+do+Burglars+Use+Social+Media+to+Find+Targets%3F&rft.date=2021-02-05&rft_id=https%3A%2F%2Fwww.homewatchgroup.com%2Fhow-do-burglars-use-social-media-to-find-targets%2F%23%3A~%3Atext%3DA%2520UK%2520survey%2520has%2520shown%2Cindividuals%2520posting%2520regular%2520life%2520updates&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-88"><span class="mw-cite-backlink"><b><a href="#cite_ref-88">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.telegraph.co.uk/technology/news/8789538/Most-burglars-using-Facebook-and-Twitter-to-target-victims-survey-suggests.html">"Most burglars using Facebook and Twitter to target victims, survey suggests"</a>. 26 September 2011.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Most+burglars+using+Facebook+and+Twitter+to+target+victims%2C+survey+suggests&rft.date=2011-09-26&rft_id=https%3A%2F%2Fwww.telegraph.co.uk%2Ftechnology%2Fnews%2F8789538%2FMost-burglars-using-Facebook-and-Twitter-to-target-victims-survey-suggests.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-89"><span class="mw-cite-backlink"><b><a href="#cite_ref-89">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://abc7news.com/travel/burglars-use-social-media-to-find-next-victims/448107/">"Burglars use social media to find next victims"</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Burglars+use+social+media+to+find+next+victims&rft_id=https%3A%2F%2Fabc7news.com%2Ftravel%2Fburglars-use-social-media-to-find-next-victims%2F448107%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-Henson-90"><span class="mw-cite-backlink">^ <a href="#cite_ref-Henson_90-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Henson_90-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-Henson_90-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-Henson_90-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHensonReynes_W._ReynsBonnie_S._Fisher2011" class="citation journal cs1">Henson, Bill; Reynes W. Reyns; Bonnie S. Fisher (3 March 2011). "Security in the 21st century: examining the link between online social network activity, privacy, and interpersonal victimization". <i>Criminal Justice Review</i>. <b>36</b> (253): 253–268. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1177%2F0734016811399421">10.1177/0734016811399421</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:145678250">145678250</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Criminal+Justice+Review&rft.atitle=Security+in+the+21st+century%3A+examining+the+link+between+online+social+network+activity%2C+privacy%2C+and+interpersonal+victimization&rft.volume=36&rft.issue=253&rft.pages=253-268&rft.date=2011-03-03&rft_id=info%3Adoi%2F10.1177%2F0734016811399421&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A145678250%23id-name%3DS2CID&rft.aulast=Henson&rft.aufirst=Bill&rft.au=Reynes+W.+Reyns&rft.au=Bonnie+S.+Fisher&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-Andrews2012-91"><span class="mw-cite-backlink">^ <a href="#cite_ref-Andrews2012_91-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Andrews2012_91-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLori_Andrews2012" class="citation book cs1">Lori Andrews (10 January 2012). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=XCtKe6Mjx-0C"><i>I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy</i></a>. Simon and Schuster. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-4516-5051-8" title="Special:BookSources/978-1-4516-5051-8"><bdi>978-1-4516-5051-8</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=I+Know+Who+You+Are+and+I+Saw+What+You+Did%3A+Social+Networks+and+the+Death+of+Privacy&rft.pub=Simon+and+Schuster&rft.date=2012-01-10&rft.isbn=978-1-4516-5051-8&rft.au=Lori+Andrews&rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DXCtKe6Mjx-0C&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-USATODAY-92"><span class="mw-cite-backlink">^ <a href="#cite_ref-USATODAY_92-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-USATODAY_92-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-USATODAY_92-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSharon_Jayson,_USA_TODAY2014" class="citation web cs1">Sharon Jayson, USA TODAY (8 March 2014). <a rel="nofollow" class="external text" href="https://www.usatoday.com/story/news/nation/2014/03/08/data-online-behavior-research/5781447/">"Social media research raises privacy and ethics issues"</a>. <i>USA TODAY</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=USA+TODAY&rft.atitle=Social+media+research+raises+privacy+and+ethics+issues&rft.date=2014-03-08&rft.au=Sharon+Jayson%2C+USA+TODAY&rft_id=https%3A%2F%2Fwww.usatoday.com%2Fstory%2Fnews%2Fnation%2F2014%2F03%2F08%2Fdata-online-behavior-research%2F5781447%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-93"><span class="mw-cite-backlink"><b><a href="#cite_ref-93">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.nbcnews.com/id/wbna35890739">"Your new Facebook 'friend' may be the FBI"</a>. <i>NBC News</i>. 16 March 2010<span class="reference-accessdate">. Retrieved <span class="nowrap">2023-04-24</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=NBC+News&rft.atitle=Your+new+Facebook+%27friend%27+may+be+the+FBI&rft.date=2010-03-16&rft_id=https%3A%2F%2Fwww.nbcnews.com%2Fid%2Fwbna35890739&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-94"><span class="mw-cite-backlink"><b><a href="#cite_ref-94">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWolfe2009" class="citation journal cs1">Wolfe, Daniel (October 21, 2009). <a rel="nofollow" class="external text" href="http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=44791244&site=eds-live">"Bad Friends"</a>. <i>American Banker</i>. <b>174</b> (192): 5.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=American+Banker&rft.atitle=Bad+Friends.&rft.volume=174&rft.issue=192&rft.pages=5&rft.date=2009-10-21&rft.aulast=Wolfe&rft.aufirst=Daniel&rft_id=http%3A%2F%2Fsearch.ebscohost.com%2Flogin.aspx%3Fdirect%3Dtrue%26db%3Dbth%26AN%3D44791244%26site%3Deds-live&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-95"><span class="mw-cite-backlink"><b><a href="#cite_ref-95">^</a></b></span> <span class="reference-text">Harkins, Gina. (March 2, 2011). Cops patrol social networking sites for gang activity. Retrieved from <a rel="nofollow" class="external free" href="http://news.medill.northwestern.edu/chicago/news.aspx?id=181375">http://news.medill.northwestern.edu/chicago/news.aspx?id=181375</a></span> </li> <li id="cite_note-96"><span class="mw-cite-backlink"><b><a href="#cite_ref-96">^</a></b></span> <span class="reference-text">Taghi, Hasti. (February 10, 2011). Police Use Facebook To Track Suspect. Retrieved from <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20110815183817/http://www.click2houston.com/news/26825687/detail.html">"Police Use Facebook To Track Suspect"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.click2houston.com/news/26825687/detail.html">the original</a> on 2011-08-15<span class="reference-accessdate">. Retrieved <span class="nowrap">2012-09-15</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Police+Use+Facebook+To+Track+Suspect&rft_id=http%3A%2F%2Fwww.click2houston.com%2Fnews%2F26825687%2Fdetail.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-97"><span class="mw-cite-backlink"><b><a href="#cite_ref-97">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://help.azcentral.com/">"Help Center - The Arizona Republic"</a>. <i>help.azcentral.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2023-04-24</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=help.azcentral.com&rft.atitle=Help+Center+-+The+Arizona+Republic&rft_id=https%3A%2F%2Fhelp.azcentral.com%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-98"><span class="mw-cite-backlink"><b><a href="#cite_ref-98">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNixon2017" class="citation news cs1">Nixon, Ron (2017-09-28). <a rel="nofollow" class="external text" href="https://www.nytimes.com/2017/09/28/us/politics/immigrants-social-media-trump.html">"U.S. to Collect Social Media Data on All Immigrants Entering Country"</a>. <i>The New York Times</i>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0362-4331">0362-4331</a><span class="reference-accessdate">. Retrieved <span class="nowrap">2017-11-10</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+New+York+Times&rft.atitle=U.S.+to+Collect+Social+Media+Data+on+All+Immigrants+Entering+Country&rft.date=2017-09-28&rft.issn=0362-4331&rft.aulast=Nixon&rft.aufirst=Ron&rft_id=https%3A%2F%2Fwww.nytimes.com%2F2017%2F09%2F28%2Fus%2Fpolitics%2Fimmigrants-social-media-trump.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-99"><span class="mw-cite-backlink"><b><a href="#cite_ref-99">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.npr.org/2017/09/30/554557044/federal-plan-to-keep-files-of-immigrant-social-media-activity-causes-alarm">"Federal Plan To Keep Files Of Immigrant Social Media Activity Causes Alarm"</a>. <i>NPR.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2017-11-10</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=NPR.org&rft.atitle=Federal+Plan+To+Keep+Files+Of+Immigrant+Social+Media+Activity+Causes+Alarm&rft_id=https%3A%2F%2Fwww.npr.org%2F2017%2F09%2F30%2F554557044%2Ffederal-plan-to-keep-files-of-immigrant-social-media-activity-causes-alarm&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-:10-100"><span class="mw-cite-backlink">^ <a href="#cite_ref-:10_100-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:10_100-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.aclu.org/blog/privacy-technology/surveillance-technologies/why-government-use-social-media-monitoring">"Why Government Use of Social Media Monitoring Software Is a Direct Threat to Our Liberty and Privacy"</a>. 6 May 2016.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Why+Government+Use+of+Social+Media+Monitoring+Software+Is+a+Direct+Threat+to+Our+Liberty+and+Privacy&rft.date=2016-05-06&rft_id=https%3A%2F%2Fwww.aclu.org%2Fblog%2Fprivacy-technology%2Fsurveillance-technologies%2Fwhy-government-use-social-media-monitoring&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-101"><span class="mw-cite-backlink"><b><a href="#cite_ref-101">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPearlman2012" class="citation news cs1">Pearlman, Jonathan (2012-12-07). <a rel="nofollow" class="external text" href="https://www.telegraph.co.uk/news/uknews/leveson-inquiry/9728803/Lord-Justice-Leveson-calls-for-new-laws-to-curb-mob-rule-on-the-internet.html">"Lord Justice Leveson calls for new laws to curb 'mob rule' on the internet"</a>. <i>telegraph.co.uk</i>. Daily Telegraph.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=telegraph.co.uk&rft.atitle=Lord+Justice+Leveson+calls+for+new+laws+to+curb+%27mob+rule%27+on+the+internet&rft.date=2012-12-07&rft.aulast=Pearlman&rft.aufirst=Jonathan&rft_id=https%3A%2F%2Fwww.telegraph.co.uk%2Fnews%2Fuknews%2Fleveson-inquiry%2F9728803%2FLord-Justice-Leveson-calls-for-new-laws-to-curb-mob-rule-on-the-internet.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-102"><span class="mw-cite-backlink"><b><a href="#cite_ref-102">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPaulien_CoppensLaurence_ClaeysCarina_VeeckmanJo_Pierson2014" class="citation journal cs1">Paulien Coppens; Laurence Claeys; Carina Veeckman & Jo Pierson (2014). <a rel="nofollow" class="external text" href="http://cups.cs.cmu.edu/soups/2014/workshops/privacy/s3p3.pdf">"Privacy in location-based social networks: Researching the interrelatedness of scripts and usage"</a> <span class="cs1-format">(PDF)</span>. <i>Journal of Location Based Services</i>. <b>9</b> (1): 1–15. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1080%2F17489725.2015.1017015">10.1080/17489725.2015.1017015</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:36688647">36688647</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Journal+of+Location+Based+Services&rft.atitle=Privacy+in+location-based+social+networks%3A+Researching+the+interrelatedness+of+scripts+and+usage&rft.volume=9&rft.issue=1&rft.pages=1-15&rft.date=2014&rft_id=info%3Adoi%2F10.1080%2F17489725.2015.1017015&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A36688647%23id-name%3DS2CID&rft.au=Paulien+Coppens&rft.au=Laurence+Claeys&rft.au=Carina+Veeckman&rft.au=Jo+Pierson&rft_id=http%3A%2F%2Fcups.cs.cmu.edu%2Fsoups%2F2014%2Fworkshops%2Fprivacy%2Fs3p3.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-103"><span class="mw-cite-backlink"><b><a href="#cite_ref-103">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFZhanFang2011" class="citation book cs1">Zhan, Justin; Fang, Xing (2011). "Location Privacy Protection on Social Networks". <i>Social Computing, Behavioral-Cultural Modeling and Prediction</i>. Lecture Notes in Computer Science. Vol. 6589. pp. 78–85. <a href="/wiki/Bibcode_(identifier)" class="mw-redirect" title="Bibcode (identifier)">Bibcode</a>:<a rel="nofollow" class="external text" href="https://ui.adsabs.harvard.edu/abs/2011LNCS.6589...78Z">2011LNCS.6589...78Z</a>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-3-642-19656-0_12">10.1007/978-3-642-19656-0_12</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-3-642-19655-3" title="Special:BookSources/978-3-642-19655-3"><bdi>978-3-642-19655-3</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=Location+Privacy+Protection+on+Social+Networks&rft.btitle=Social+Computing%2C+Behavioral-Cultural+Modeling+and+Prediction&rft.series=Lecture+Notes+in+Computer+Science&rft.pages=78-85&rft.date=2011&rft_id=info%3Adoi%2F10.1007%2F978-3-642-19656-0_12&rft_id=info%3Abibcode%2F2011LNCS.6589...78Z&rft.isbn=978-3-642-19655-3&rft.aulast=Zhan&rft.aufirst=Justin&rft.au=Fang%2C+Xing&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-facebook.com-104"><span class="mw-cite-backlink">^ <a href="#cite_ref-facebook.com_104-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-facebook.com_104-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-facebook.com_104-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text">Facebook's Privacy Policy. (2010). Retrieved from <a rel="nofollow" class="external free" href="https://www.facebook.com/policy.php">https://www.facebook.com/policy.php</a></span> </li> <li id="cite_note-105"><span class="mw-cite-backlink"><b><a href="#cite_ref-105">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWeeks" class="citation web cs1">Weeks, Julie. <a rel="nofollow" class="external text" href="https://sites.google.com/site/cat200group5/home/invasive-privacy-agreements/2">"Invasive Privacy Agreements"</a>. <i>Google Sites</i><span class="reference-accessdate">. Retrieved <span class="nowrap">May 16,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Google+Sites&rft.atitle=Invasive+Privacy+Agreements&rft.aulast=Weeks&rft.aufirst=Julie&rft_id=https%3A%2F%2Fsites.google.com%2Fsite%2Fcat200group5%2Fhome%2Finvasive-privacy-agreements%2F2&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-106"><span class="mw-cite-backlink"><b><a href="#cite_ref-106">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFEllisonSteinfieldLampe2007" class="citation journal cs1">Ellison, Nicole B.; Steinfield, Charles; Lampe, Cliff (2007-07-01). <a rel="nofollow" class="external text" href="https://doi.org/10.1111%2Fj.1083-6101.2007.00367.x">"The Benefits of Facebook "Friends:" Social Capital and College Students' Use of Online Social Network Sites"</a>. <i>Journal of Computer-Mediated Communication</i>. <b>12</b> (4): 1143–1168. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1111%2Fj.1083-6101.2007.00367.x">10.1111/j.1083-6101.2007.00367.x</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1083-6101">1083-6101</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Journal+of+Computer-Mediated+Communication&rft.atitle=The+Benefits+of+Facebook+%22Friends%3A%22+Social+Capital+and+College+Students%27+Use+of+Online+Social+Network+Sites&rft.volume=12&rft.issue=4&rft.pages=1143-1168&rft.date=2007-07-01&rft_id=info%3Adoi%2F10.1111%2Fj.1083-6101.2007.00367.x&rft.issn=1083-6101&rft.aulast=Ellison&rft.aufirst=Nicole+B.&rft.au=Steinfield%2C+Charles&rft.au=Lampe%2C+Cliff&rft_id=https%3A%2F%2Fdoi.org%2F10.1111%252Fj.1083-6101.2007.00367.x&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-:0-107"><span class="mw-cite-backlink">^ <a href="#cite_ref-:0_107-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:0_107-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFTantawyFaroukMohamedYousef2014" class="citation arxiv cs1">Tantawy, Rasha Y.; Farouk, Ziad; Mohamed, Shereen; Yousef, Ahmed H. (2014-10-06). "Using Professional Social Networking as an Innovative Method for Data Extraction: The ICT Alumni Index Case Study". <a href="/wiki/ArXiv_(identifier)" class="mw-redirect" title="ArXiv (identifier)">arXiv</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://arxiv.org/abs/1410.1348">1410.1348</a></span> [<a rel="nofollow" class="external text" href="https://arxiv.org/archive/cs.CY">cs.CY</a>].</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=preprint&rft.jtitle=arXiv&rft.atitle=Using+Professional+Social+Networking+as+an+Innovative+Method+for+Data+Extraction%3A+The+ICT+Alumni+Index+Case+Study&rft.date=2014-10-06&rft_id=info%3Aarxiv%2F1410.1348&rft.aulast=Tantawy&rft.aufirst=Rasha+Y.&rft.au=Farouk%2C+Ziad&rft.au=Mohamed%2C+Shereen&rft.au=Yousef%2C+Ahmed+H.&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-108"><span class="mw-cite-backlink"><b><a href="#cite_ref-108">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://epic.org/issues/consumer-privacy/social-media-privacy/">"Social Media Privacy"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">19 April</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Social+Media+Privacy&rft_id=https%3A%2F%2Fepic.org%2Fissues%2Fconsumer-privacy%2Fsocial-media-privacy%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-109"><span class="mw-cite-backlink"><b><a href="#cite_ref-109">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBangeman2010" class="citation web cs1">Bangeman, Eric (2010-05-21). <a rel="nofollow" class="external text" href="https://arstechnica.com/tech-policy/2010/05/latest-facebook-blunder-secret-data-sharing-with-advertisers/">"Report: Facebook caught sharing secret data with advertisers"</a>. <i>Ars Technica</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2023-04-24</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Ars+Technica&rft.atitle=Report%3A+Facebook+caught+sharing+secret+data+with+advertisers&rft.date=2010-05-21&rft.aulast=Bangeman&rft.aufirst=Eric&rft_id=https%3A%2F%2Farstechnica.com%2Ftech-policy%2F2010%2F05%2Flatest-facebook-blunder-secret-data-sharing-with-advertisers%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-110"><span class="mw-cite-backlink"><b><a href="#cite_ref-110">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20131103095031/http://www.privacyrights.org/social-networking-privacy">"Social Networking Privacy: How to be Safe, Secure and Social - Privacy Rights Clearinghouse"</a>. <i>www.privacyrights.org</i>. Archived from <a rel="nofollow" class="external text" href="https://www.privacyrights.org/social-networking-privacy">the original</a> on 2013-11-03<span class="reference-accessdate">. Retrieved <span class="nowrap">2014-06-09</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.privacyrights.org&rft.atitle=Social+Networking+Privacy%3A+How+to+be+Safe%2C+Secure+and+Social+-+Privacy+Rights+Clearinghouse&rft_id=https%3A%2F%2Fwww.privacyrights.org%2Fsocial-networking-privacy&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-protecting-111"><span class="mw-cite-backlink">^ <a href="#cite_ref-protecting_111-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-protecting_111-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-protecting_111-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://us.norton.com/blog/privacy/5-tips-for-social-media-security-and-privacy">"Social Media Security – 5 Security Tips | Norton"</a>. <i>us.norton.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">19 April</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=us.norton.com&rft.atitle=Social+Media+Security+%E2%80%93+5+Security+Tips+%26%23124%3B+Norton&rft_id=https%3A%2F%2Fus.norton.com%2Fblog%2Fprivacy%2F5-tips-for-social-media-security-and-privacy&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-112"><span class="mw-cite-backlink"><b><a href="#cite_ref-112">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBubašOrehovackiKonecki2008" class="citation journal cs1">Bubaš, Goran; Orehovacki, Tihomir; Konecki, Mario (April 2008). "Factors and Predictors of Online Security and Privacy Behavior". <i>Journal of Information and Organizational Sciences</i>. <b>32</b> (2): 79–98.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Journal+of+Information+and+Organizational+Sciences&rft.atitle=Factors+and+Predictors+of+Online+Security+and+Privacy+Behavior&rft.volume=32&rft.issue=2&rft.pages=79-98&rft.date=2008-04&rft.aulast=Buba%C5%A1&rft.aufirst=Goran&rft.au=Orehovacki%2C+Tihomir&rft.au=Konecki%2C+Mario&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-5_ways-113"><span class="mw-cite-backlink">^ <a href="#cite_ref-5_ways_113-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-5_ways_113-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-5_ways_113-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-5_ways_113-3"><sup><i><b>d</b></i></sup></a> <a href="#cite_ref-5_ways_113-4"><sup><i><b>e</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://ivn.us/2014/01/17/5-ways-social-media-users-can-protect-online-privacy">"5 ways social media users can protect online privacy"</a>. 2014-01-17.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=5+ways+social+media+users+can+protect+online+privacy&rft.date=2014-01-17&rft_id=http%3A%2F%2Fivn.us%2F2014%2F01%2F17%2F5-ways-social-media-users-can-protect-online-privacy&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-how_to_protect-114"><span class="mw-cite-backlink">^ <a href="#cite_ref-how_to_protect_114-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-how_to_protect_114-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.techsupportalert.com/content/how-protect-your-online-privacy.htm">"How to Protect Your Online Privacy"</a>. 2011-12-17.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=How+to+Protect+Your+Online+Privacy&rft.date=2011-12-17&rft_id=http%3A%2F%2Fwww.techsupportalert.com%2Fcontent%2Fhow-protect-your-online-privacy.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-115"><span class="mw-cite-backlink"><b><a href="#cite_ref-115">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://us.norton.com/blog/privacy/protecting-privacy-social-media">"Tips for protecting your social media privacy"</a>. <i>us.norton.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">19 April</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=us.norton.com&rft.atitle=Tips+for+protecting+your+social+media+privacy&rft_id=https%3A%2F%2Fus.norton.com%2Fblog%2Fprivacy%2Fprotecting-privacy-social-media&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-116"><span class="mw-cite-backlink"><b><a href="#cite_ref-116">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20170905005001/https://staysafeonline.org/stay-safe-online/protect-your-personal-information/social-networks">"Social Networks"</a>. Archived from <a rel="nofollow" class="external text" href="https://www.staysafeonline.org/stay-safe-online/protect-your-personal-information/social-networks">the original</a> on 5 September 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">19 April</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Social+Networks&rft_id=https%3A%2F%2Fwww.staysafeonline.org%2Fstay-safe-online%2Fprotect-your-personal-information%2Fsocial-networks&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-117"><span class="mw-cite-backlink"><b><a href="#cite_ref-117">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGaggioli2016" class="citation journal cs1">Gaggioli, Andrea (2 February 2016). "Cybersightings". <i>Cyberpsychology, Behavior & Social Networking</i>. <b>19</b> (2): 315–6. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1089%2Fcyber.2015.29023.csi">10.1089/cyber.2015.29023.csi</a>. <a href="/wiki/PMID_(identifier)" class="mw-redirect" title="PMID (identifier)">PMID</a> <a rel="nofollow" class="external text" href="https://pubmed.ncbi.nlm.nih.gov/23574371">23574371</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Cyberpsychology%2C+Behavior+%26+Social+Networking&rft.atitle=Cybersightings&rft.volume=19&rft.issue=2&rft.pages=315-6&rft.date=2016-02-02&rft_id=info%3Adoi%2F10.1089%2Fcyber.2015.29023.csi&rft_id=info%3Apmid%2F23574371&rft.aulast=Gaggioli&rft.aufirst=Andrea&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-cb.hbsp.harvard.edu-118"><span class="mw-cite-backlink">^ <a href="#cite_ref-cb.hbsp.harvard.edu_118-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-cb.hbsp.harvard.edu_118-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-cb.hbsp.harvard.edu_118-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://archive.today/20121212124040/http://cb.hbsp.harvard.edu/cb/web/he/product_view.seam?R=808128-PDF-ENG&T=EDC&C=PURCHASED_MATERIALS&CD=16117304&CS=90ae2ef93335be224703aca3962ad383">"Harvard Business Publishing"</a>. Archived from <a rel="nofollow" class="external text" href="http://cb.hbsp.harvard.edu/cb/web/he/product_view.seam?R=808128-PDF-ENG&T=EDC&C=PURCHASED_MATERIALS&CD=16117304&CS=90ae2ef93335be224703aca3962ad383">the original</a> on 2012-12-12<span class="reference-accessdate">. Retrieved <span class="nowrap">2012-10-31</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Harvard+Business+Publishing&rft_id=http%3A%2F%2Fcb.hbsp.harvard.edu%2Fcb%2Fweb%2Fhe%2Fproduct_view.seam%3FR%3D808128-PDF-ENG%26T%3DEDC%26C%3DPURCHASED_MATERIALS%26CD%3D16117304%26CS%3D90ae2ef93335be224703aca3962ad383&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-119"><span class="mw-cite-backlink"><b><a href="#cite_ref-119">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://epic.org/issues/consumer-privacy/social-media-privacy/">"Social Media Privacy"</a>. <i>EPIC - Electronic Privacy Information Center</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2023-04-24</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=EPIC+-+Electronic+Privacy+Information+Center&rft.atitle=Social+Media+Privacy&rft_id=https%3A%2F%2Fepic.org%2Fissues%2Fconsumer-privacy%2Fsocial-media-privacy%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-foxnews-20110224-squashstalkerapp-120"><span class="mw-cite-backlink">^ <a href="#cite_ref-foxnews-20110224-squashstalkerapp_120-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-foxnews-20110224-squashstalkerapp_120-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.foxnews.com/tech/facebook-squashes-new-stalker-app">"Facebook Squashes New 'Stalker' App"</a>. <i>Fox News</i>. 24 February 2011<span class="reference-accessdate">. Retrieved <span class="nowrap">9 June</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Fox+News&rft.atitle=Facebook+Squashes+New+%27Stalker%27+App&rft.date=2011-02-24&rft_id=https%3A%2F%2Fwww.foxnews.com%2Ftech%2Ffacebook-squashes-new-stalker-app&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-techcrunch-20110223-breakupnotifier-121"><span class="mw-cite-backlink">^ <a href="#cite_ref-techcrunch-20110223-breakupnotifier_121-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-techcrunch-20110223-breakupnotifier_121-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFTsotsis2011" class="citation web cs1">Tsotsis, Alexia (23 February 2011). <a rel="nofollow" class="external text" href="https://techcrunch.com/2011/02/23/breakup-notifier">"Crush-Stalking App Breakup Notifier Amasses Over 3.6M Users, Is Shut Down By Facebook"</a>. <i>TechCrunch</i><span class="reference-accessdate">. Retrieved <span class="nowrap">9 June</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=TechCrunch&rft.atitle=Crush-Stalking+App+Breakup+Notifier+Amasses+Over+3.6M+Users%2C+Is+Shut+Down+By+Facebook&rft.date=2011-02-23&rft.aulast=Tsotsis&rft.aufirst=Alexia&rft_id=https%3A%2F%2Ftechcrunch.com%2F2011%2F02%2F23%2Fbreakup-notifier&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-122"><span class="mw-cite-backlink"><b><a href="#cite_ref-122">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGrubb2011" class="citation news cs1">Grubb, Ben (1 March 2011). <a rel="nofollow" class="external text" href="https://www.smh.com.au/technology/creepy-app-spies-on-your-facebook-relationship-status-20110301-1bcg3.html">"<span class="cs1-kern-left"></span>'Creepy' app spies on your Facebook relationship status"</a>. <i>The Sydney Morning Herald</i><span class="reference-accessdate">. Retrieved <span class="nowrap">9 June</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Sydney+Morning+Herald&rft.atitle=%27Creepy%27+app+spies+on+your+Facebook+relationship+status&rft.date=2011-03-01&rft.aulast=Grubb&rft.aufirst=Ben&rft_id=https%3A%2F%2Fwww.smh.com.au%2Ftechnology%2Fcreepy-app-spies-on-your-facebook-relationship-status-20110301-1bcg3.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-123"><span class="mw-cite-backlink"><b><a href="#cite_ref-123">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFTsotsis2011" class="citation web cs1">Tsotsis, Alexia (21 February 2011). <a rel="nofollow" class="external text" href="https://techcrunch.com/2011/02/21/stalkbook/">"Breakup Notifier Emails You When People You're Stalking On Facebook Change Their Relationships"</a>. <i>TechCrunch</i><span class="reference-accessdate">. Retrieved <span class="nowrap">9 June</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=TechCrunch&rft.atitle=Breakup+Notifier+Emails+You+When+People+You%27re+Stalking+On+Facebook+Change+Their+Relationships&rft.date=2011-02-21&rft.aulast=Tsotsis&rft.aufirst=Alexia&rft_id=https%3A%2F%2Ftechcrunch.com%2F2011%2F02%2F21%2Fstalkbook%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-Herrman2012-124"><span class="mw-cite-backlink"><b><a href="#cite_ref-Herrman2012_124-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHerrman2012" class="citation journal cs1">Herrman, John (2012-01-01). "Removing Yourself From the Internet". <i>Popular Mechanics</i>. <b>189</b> (1): 77.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Popular+Mechanics&rft.atitle=Removing+Yourself+From+the+Internet&rft.volume=189&rft.issue=1&rft.pages=77&rft.date=2012-01-01&rft.aulast=Herrman&rft.aufirst=John&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-125"><span class="mw-cite-backlink"><b><a href="#cite_ref-125">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://mashable.com/2012/05/04/facebook-privacy-concerns-study/">"Study Says Facebook Privacy Concerns Are on the Rise - Is It Accurate?"</a>. <i>Mashable</i>. 4 May 2012.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Mashable&rft.atitle=Study+Says+Facebook+Privacy+Concerns+Are+on+the+Rise+-+Is+It+Accurate%3F&rft.date=2012-05-04&rft_id=http%3A%2F%2Fmashable.com%2F2012%2F05%2F04%2Ffacebook-privacy-concerns-study%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-126"><span class="mw-cite-backlink"><b><a href="#cite_ref-126">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.usenix.org/legacy/events/upsec08/tech/full_papers/lipford/lipford_html/">"Understanding Privacy Settings in Facebook with an Audience View"</a>. <i>www.usenix.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2023-04-24</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.usenix.org&rft.atitle=Understanding+Privacy+Settings+in+Facebook+with+an+Audience+View&rft_id=https%3A%2F%2Fwww.usenix.org%2Flegacy%2Fevents%2Fupsec08%2Ftech%2Ffull_papers%2Flipford%2Flipford_html%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-127"><span class="mw-cite-backlink"><b><a href="#cite_ref-127">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.huffpost.com/entry/facebook-privacy-changes_n_568345">"Visual Guide To Facebook's Privacy Changes (PICTURES)"</a>. <i>HuffPost</i>. 2010-07-07<span class="reference-accessdate">. Retrieved <span class="nowrap">2023-04-24</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=HuffPost&rft.atitle=Visual+Guide+To+Facebook%27s+Privacy+Changes+%28PICTURES%29&rft.date=2010-07-07&rft_id=https%3A%2F%2Fwww.huffpost.com%2Fentry%2Ffacebook-privacy-changes_n_568345&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-128"><span class="mw-cite-backlink"><b><a href="#cite_ref-128">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation magazine cs1"><a rel="nofollow" class="external text" href="https://time.com/4695/7-controversial-ways-facebook-has-used-your-data/">"7 Controversial Ways Facebook Has Used Your Data"</a>. <i>Time</i>. 2014-02-04<span class="reference-accessdate">. Retrieved <span class="nowrap">2023-04-24</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Time&rft.atitle=7+Controversial+Ways+Facebook+Has+Used+Your+Data&rft.date=2014-02-04&rft_id=https%3A%2F%2Ftime.com%2F4695%2F7-controversial-ways-facebook-has-used-your-data%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-129"><span class="mw-cite-backlink"><b><a href="#cite_ref-129">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.aclu.org/press-releases/commerce-department-releases-important-report-urging-comprehensive-privacy">"Commerce Department Releases Important Report Urging Comprehensive Privacy Protections"</a>. <i>American Civil Liberties Union</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2023-04-24</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=American+Civil+Liberties+Union&rft.atitle=Commerce+Department+Releases+Important+Report+Urging+Comprehensive+Privacy+Protections&rft_id=http%3A%2F%2Fwww.aclu.org%2Fpress-releases%2Fcommerce-department-releases-important-report-urging-comprehensive-privacy&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-130"><span class="mw-cite-backlink"><b><a href="#cite_ref-130">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMcmillan,_Robert2010" class="citation news cs1">Mcmillan, Robert (22 April 2010). <a rel="nofollow" class="external text" href="https://www.pcworld.com/article/194843/15_million_stolen_facebook_ids_up_for_sale.html">"1.5 Million Stolen Facebook IDs up for Sale"</a>. <i>PC World Business Center</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=PC+World+Business+Center&rft.atitle=1.5+Million+Stolen+Facebook+IDs+up+for+Sale&rft.date=2010-04-22&rft.au=Mcmillan%2C+Robert&rft_id=https%3A%2F%2Fwww.pcworld.com%2Farticle%2F194843%2F15_million_stolen_facebook_ids_up_for_sale.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span><sup class="noprint Inline-Template"><span style="white-space: nowrap;">[<i><a href="/wiki/Wikipedia:Link_rot" title="Wikipedia:Link rot"><span title=" Dead link tagged November 2023">permanent dead link</span></a></i><span style="visibility:hidden; color:transparent; padding-left:2px">‍</span>]</span></sup></span> </li> <li id="cite_note-131"><span class="mw-cite-backlink"><b><a href="#cite_ref-131">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDamon,_Cody2011" class="citation news cs1">Damon, Cody (9 March 2011). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20131025051535/http://socialmediatoday.com/codydamon/276901/do-facebook-friends-influence-advertising">"Do Facebook Friends Influence Advertising?"</a>. <i>Socialmediatoday</i>. Archived from <a rel="nofollow" class="external text" href="http://socialmediatoday.com/codydamon/276901/do-facebook-friends-influence-advertising">the original</a> on 25 October 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">17 August</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Socialmediatoday&rft.atitle=Do+Facebook+Friends+Influence+Advertising%3F&rft.date=2011-03-09&rft.au=Damon%2C+Cody&rft_id=http%3A%2F%2Fsocialmediatoday.com%2Fcodydamon%2F276901%2Fdo-facebook-friends-influence-advertising&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-132"><span class="mw-cite-backlink"><b><a href="#cite_ref-132">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.affiliateconfession.com/2008/08/13/profiting-with-facebook-ads/">"Profiting with Facebook Ads."</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20160330102924/http://www.affiliateconfession.com/2008/08/13/profiting-with-facebook-ads/">Archived</a> 2016-03-30 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a> affiliate confession. Alan, 13 August 2008.</span> </li> <li id="cite_note-:4-133"><span class="mw-cite-backlink">^ <a href="#cite_ref-:4_133-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:4_133-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-:4_133-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGuynn2017" class="citation web cs1">Guynn, Jessica (May 1, 2017). <a rel="nofollow" class="external text" href="https://www.usatoday.com/story/tech/news/2017/05/01/facebook-can-tell-when-teens-feel-insecure-advertiser-target/101158752/">"Facebook Can Tell When Teens Feel Insecure"</a>. <i>USA Today</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2018-05-15</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=USA+Today&rft.atitle=Facebook+Can+Tell+When+Teens+Feel+Insecure&rft.date=2017-05-01&rft.aulast=Guynn&rft.aufirst=Jessica&rft_id=https%3A%2F%2Fwww.usatoday.com%2Fstory%2Ftech%2Fnews%2F2017%2F05%2F01%2Ffacebook-can-tell-when-teens-feel-insecure-advertiser-target%2F101158752%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-134"><span class="mw-cite-backlink"><b><a href="#cite_ref-134">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMartinez2017" class="citation magazine cs1">Martinez, A. (November 2017). <a rel="nofollow" class="external text" href="https://www.wired.com/story/facebooks-listening-smartphone-microphone/">"Facebook Isn't Listening Through Your Phone. It Doesn't Have to"</a>. <i>Wired</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Wired&rft.atitle=Facebook+Isn%27t+Listening+Through+Your+Phone.+It+Doesn%27t+Have+to&rft.date=2017-11&rft.aulast=Martinez&rft.aufirst=A.&rft_id=https%3A%2F%2Fwww.wired.com%2Fstory%2Ffacebooks-listening-smartphone-microphone%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-135"><span class="mw-cite-backlink"><b><a href="#cite_ref-135">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.facebook.com/policy/cookies/">"Cookies Policy"</a>. <i>www.facebook.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2018-10-02</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.facebook.com&rft.atitle=Cookies+Policy&rft_id=https%3A%2F%2Fwww.facebook.com%2Fpolicy%2Fcookies%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-136"><span class="mw-cite-backlink"><b><a href="#cite_ref-136">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.theguardian.com/technology/2018/dec/14/facebook-privacy-problems-roundup">"Facebook's privacy problems: a roundup"</a>. <i>The Guardian</i>. 2018-12-15<span class="reference-accessdate">. Retrieved <span class="nowrap">2021-03-04</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=The+Guardian&rft.atitle=Facebook%27s+privacy+problems%3A+a+roundup&rft.date=2018-12-15&rft_id=http%3A%2F%2Fwww.theguardian.com%2Ftechnology%2F2018%2Fdec%2F14%2Ffacebook-privacy-problems-roundup&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-137"><span class="mw-cite-backlink"><b><a href="#cite_ref-137">^</a></b></span> <span class="reference-text">Erik Hayden. (March 11, 2010). On Facebook, You Are Who You Know. Retrieved from <a rel="nofollow" class="external free" href="http://www.miller-mccune.com/culture-society/on-facebook-you-are-who-you-know-10385/#">http://www.miller-mccune.com/culture-society/on-facebook-you-are-who-you-know-10385/#</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20120325032734/http://www.miller-mccune.com/culture-society/on-facebook-you-are-who-you-know-10385/">Archived</a> 2012-03-25 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></span> </li> <li id="cite_note-138"><span class="mw-cite-backlink"><b><a href="#cite_ref-138">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.pnas.org/content/111/24/8788.full.pdf">"Editorial Expression of Concern and Correction"</a> <span class="cs1-format">(PDF)</span><span class="reference-accessdate">. Retrieved <span class="nowrap">19 April</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Editorial+Expression+of+Concern+and+Correction&rft_id=http%3A%2F%2Fwww.pnas.org%2Fcontent%2F111%2F24%2F8788.full.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-139"><span class="mw-cite-backlink"><b><a href="#cite_ref-139">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGoel2014" class="citation news cs1">Goel, Vindu (2014-06-29). <a rel="nofollow" class="external text" href="https://www.nytimes.com/2014/06/30/technology/facebook-tinkers-with-users-emotions-in-news-feed-experiment-stirring-outcry.html">"Facebook Tinkers With Users' Emotions in News Feed Experiment, Stirring Outcry"</a>. <i>The New York Times</i>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0362-4331">0362-4331</a><span class="reference-accessdate">. Retrieved <span class="nowrap">2017-04-18</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+New+York+Times&rft.atitle=Facebook+Tinkers+With+Users%27+Emotions+in+News+Feed+Experiment%2C+Stirring+Outcry&rft.date=2014-06-29&rft.issn=0362-4331&rft.aulast=Goel&rft.aufirst=Vindu&rft_id=https%3A%2F%2Fwww.nytimes.com%2F2014%2F06%2F30%2Ftechnology%2Ffacebook-tinkers-with-users-emotions-in-news-feed-experiment-stirring-outcry.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-Debatin,_B._2009-140"><span class="mw-cite-backlink">^ <a href="#cite_ref-Debatin,_B._2009_140-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Debatin,_B._2009_140-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDebatinHornHughesLovejoy2009" class="citation journal cs1">Debatin, B.; Horn, A.; Hughes, B.; Lovejoy, J. (2009). <a rel="nofollow" class="external text" href="https://doi.org/10.1111%2Fj.1083-6101.2009.01494.x">"Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences"</a>. <i>Journal of Computer-Mediated Communication</i>. <b>15</b>: 83–108. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1111%2Fj.1083-6101.2009.01494.x">10.1111/j.1083-6101.2009.01494.x</a></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Journal+of+Computer-Mediated+Communication&rft.atitle=Facebook+and+Online+Privacy%3A+Attitudes%2C+Behaviors%2C+and+Unintended+Consequences&rft.volume=15&rft.pages=83-108&rft.date=2009&rft_id=info%3Adoi%2F10.1111%2Fj.1083-6101.2009.01494.x&rft.aulast=Debatin&rft.aufirst=B.&rft.au=Horn%2C+A.&rft.au=Hughes%2C+B.&rft.au=Lovejoy%2C+J.&rft_id=https%3A%2F%2Fdoi.org%2F10.1111%252Fj.1083-6101.2009.01494.x&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-141"><span class="mw-cite-backlink"><b><a href="#cite_ref-141">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNewell2011" class="citation journal cs1">Newell, B (2011). "Rethinking Reasonable Expectations of Privacy in Online Social Networks". <i>Richmond Journal of Law and Technology</i>. <b>16</b>: 1–61.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Richmond+Journal+of+Law+and+Technology&rft.atitle=Rethinking+Reasonable+Expectations+of+Privacy+in+Online+Social+Networks&rft.volume=16&rft.pages=1-61&rft.date=2011&rft.aulast=Newell&rft.aufirst=B&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-auto-142"><span class="mw-cite-backlink">^ <a href="#cite_ref-auto_142-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-auto_142-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-auto_142-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text">Thompson, C. (May 28, 2015). Social media apps are tracking your location in shocking detail. Retrieved February 21, 2017, from <a rel="nofollow" class="external free" href="http://www.businessinsider.com/three-ways-social-media-is-tracking-you-2015-5">http://www.businessinsider.com/three-ways-social-media-is-tracking-you-2015-5</a></span> </li> <li id="cite_note-auto1-143"><span class="mw-cite-backlink">^ <a href="#cite_ref-auto1_143-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-auto1_143-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text">Neal, T. (July 27, 2015). Mining Big Data, the Instagram Way. Retrieved February 22, 2017, from <a rel="nofollow" class="external text" href="https://www.thefastmode.com/content-sharing-apps/5450-mining-big-data-the-instagram-way">thefastmode</a></span> </li> <li id="cite_note-144"><span class="mw-cite-backlink"><b><a href="#cite_ref-144">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://support.foursquare.com/hc/en-us/articles/201908440-What-is-Foursquare-Swarm-">"What is Foursquare Swarm"</a>. <i>foursquare.com</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=foursquare.com&rft.atitle=What+is+Foursquare+Swarm&rft_id=https%3A%2F%2Fsupport.foursquare.com%2Fhc%2Fen-us%2Farticles%2F201908440-What-is-Foursquare-Swarm-&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-145"><span class="mw-cite-backlink"><b><a href="#cite_ref-145">^</a></b></span> <span class="reference-text">Baynes, T. (February 24, 2011). Lawsuits challenge U.S. online data brokers. Reuters. Retrieved from <a rel="nofollow" class="external autonumber" href="https://web.archive.org/web/20160307033719/http://uk.reuters.com/article/idUKN2427826420110224?pageNumber=1">[4]</a></span> </li> <li id="cite_note-146"><span class="mw-cite-backlink"><b><a href="#cite_ref-146">^</a></b></span> <span class="reference-text">Davis, W. (February 17, 2011). Spokeo charged with violating fair credit reporting act. MediaPost Publications. Retrieved from <a rel="nofollow" class="external free" href="http://www.mediapost.com/publications/">http://www.mediapost.com/publications/</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20131231121217/http://www.mediapost.com/publications/">Archived</a> 2013-12-31 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>? fa=Articles.showArticle&art_aid=145270</span> </li> <li id="cite_note-147"><span class="mw-cite-backlink"><b><a href="#cite_ref-147">^</a></b></span> <span class="reference-text">(1/8/11) Government Requests For Twitter Users' Personal Information Raises Serious Constitutional Concerns. Retrieved from <a rel="nofollow" class="external free" href="https://www.aclu.org/technology-and-liberty/government-requests-twitter-users-personal-information-raise-serious-constitu">https://www.aclu.org/technology-and-liberty/government-requests-twitter-users-personal-information-raise-serious-constitu</a></span> </li> <li id="cite_note-148"><span class="mw-cite-backlink"><b><a href="#cite_ref-148">^</a></b></span> <span class="reference-text">"Twitter Privacy policy" Twitter, effective June 23, 2011, Retrieved February 13, 2012. Retrieved from www.twitter.com/privacy</span> </li> <li id="cite_note-149"><span class="mw-cite-backlink"><b><a href="#cite_ref-149">^</a></b></span> <span class="reference-text">"Twitter Privacy Policy" Twitter, effective June 23, 2011, retrieved February 13, 2012. retrieved from www.twitter.com/privacy</span> </li> <li id="cite_note-150"><span class="mw-cite-backlink"><b><a href="#cite_ref-150">^</a></b></span> <span class="reference-text">Mao, H., Shuai, X., & Kapadia, Apu. (2011). Loose Tweets: An Analysis of Privacy Leaks on Twitter. Unpublished manuscript, School of Informatics and Computing, Indiana University, Bloomington, Indiana. Retrieved from <a rel="nofollow" class="external free" href="http://delivery.acm.org/10.1145/2050000/2046558/p1-mao.pdf">http://delivery.acm.org/10.1145/2050000/2046558/p1-mao.pdf</a></span> </li> <li id="cite_note-151"><span class="mw-cite-backlink"><b><a href="#cite_ref-151">^</a></b></span> <span class="reference-text">Meeder, B., Tam, J., Kelley, P., G., & Cranor, L., F. (2010). RT@ I Want Privacy: Widespread Violation of Privacy Settings in the Twitter Social Network. Unpublished manuscript, School of Computer Science, Carnegie Mellon University, Pittsburgh, Pennsylvania. Retrieved from <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20120403012905/http://patrickgage.com/papers/Meeder-W2SP10.pdf">"RT @IWantPrivacy: Widespread Violation of Privacy Settings in the Twitter Social Network"</a> <span class="cs1-format">(PDF)</span>. Archived from <a rel="nofollow" class="external text" href="http://patrickgage.com/papers/Meeder-W2SP10.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 2012-04-03<span class="reference-accessdate">. Retrieved <span class="nowrap">2012-09-15</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=RT+%40IWantPrivacy%3A+Widespread+Violation+of+Privacy+Settings+in+the+Twitter+Social+Network&rft_id=http%3A%2F%2Fpatrickgage.com%2Fpapers%2FMeeder-W2SP10.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-152"><span class="mw-cite-backlink"><b><a href="#cite_ref-152">^</a></b></span> <span class="reference-text">Mao, H., Shuai, X., & Kapadia, Apu. (2011). Loose Tweets: An Analysis of Privacy Leaks on Twitter. Unpublished manuscript, School of Informatics and Computing, Indiana University, Bloomington, Indiana. Retrieved from <a rel="nofollow" class="external free" href="http://delivery.acm.org/10.1145/2050000/2046558/p1-mao.pdf?ip=129.210.115.8&acc=ACTIVE%20SERVICE&CFID=83500791&CFTOKEN=13963530&__acm__=1328588779_85d65fafbc540969d885ea6c8fe0467f">http://delivery.acm.org/10.1145/2050000/2046558/p1-mao.pdf?ip=129.210.115.8&acc=ACTIVE%20SERVICE&CFID=83500791&CFTOKEN=13963530&__acm__=1328588779_85d65fafbc540969d885ea6c8fe0467f</a></span> </li> <li id="cite_note-153"><span class="mw-cite-backlink"><b><a href="#cite_ref-153">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20110430125828/http://blogs.sun.com/learningcurve/tags/myspace">"Learning Curve"</a>. Blogs.sun.com. Archived from <a rel="nofollow" class="external text" href="http://blogs.sun.com/learningcurve/tags/myspace">the original</a> on April 30, 2011<span class="reference-accessdate">. Retrieved <span class="nowrap">2011-11-25</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Learning+Curve&rft.pub=Blogs.sun.com&rft_id=http%3A%2F%2Fblogs.sun.com%2Flearningcurve%2Ftags%2Fmyspace&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-154"><span class="mw-cite-backlink"><b><a href="#cite_ref-154">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20071224072013/http://www.eschoolnews.com/news/top-news/related-top-news/?i=50557;_hbguid=49a1babb-b469-4a85-a273-292a0514d91d">"Related Top News – Teachers warned about MySpace profiles"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.eschoolnews.com/news/top-news/related-top-news/?i=50557;_hbguid=49a1babb-b469-4a85-a273-292a0514d91d">the original</a> on 24 December 2007<span class="reference-accessdate">. Retrieved <span class="nowrap">19 April</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Related+Top+News+%E2%80%93+Teachers+warned+about+MySpace+profiles&rft_id=http%3A%2F%2Fwww.eschoolnews.com%2Fnews%2Ftop-news%2Frelated-top-news%2F%3Fi%3D50557%3B_hbguid%3D49a1babb-b469-4a85-a273-292a0514d91d&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-155"><span class="mw-cite-backlink"><b><a href="#cite_ref-155">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRead2007" class="citation web cs1">Read, Brock (2007-04-27). <a rel="nofollow" class="external text" href="http://chronicle.com/blogPost/A-MySpace-Photo-Costs-a/2994">"Wired Campus: A MySpace Photo Costs a Student a Teaching Certificate –"</a>. Chronicle.com<span class="reference-accessdate">. Retrieved <span class="nowrap">2011-11-25</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Wired+Campus%3A+A+MySpace+Photo+Costs+a+Student+a+Teaching+Certificate+%E2%80%93&rft.pub=Chronicle.com&rft.date=2007-04-27&rft.aulast=Read&rft.aufirst=Brock&rft_id=http%3A%2F%2Fchronicle.com%2FblogPost%2FA-MySpace-Photo-Costs-a%2F2994&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-156"><span class="mw-cite-backlink"><b><a href="#cite_ref-156">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMatt_Miller2012" class="citation web cs1">Matt Miller (8 November 2012). <a rel="nofollow" class="external text" href="https://www.forbes.com/sites/mattmiller/2012/11/08/privacy-isnt-dead-with-millennials-its-thriving/">"Privacy Isn't Dead With Millennials, It's Thriving"</a>. <i>Forbes</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Forbes&rft.atitle=Privacy+Isn%27t+Dead+With+Millennials%2C+It%27s+Thriving&rft.date=2012-11-08&rft.au=Matt+Miller&rft_id=https%3A%2F%2Fwww.forbes.com%2Fsites%2Fmattmiller%2F2012%2F11%2F08%2Fprivacy-isnt-dead-with-millennials-its-thriving%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-157"><span class="mw-cite-backlink"><b><a href="#cite_ref-157">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDickey" class="citation web cs1">Dickey, Jack. <a rel="nofollow" class="external text" href="http://libraryproxy.tulsacc.edu:2060/ehost/detail/detail?vid=4&sid=ab97ef73-bfcf-484f-a260-25715bf2acdc%40sessionmgr102&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#AN=96808621&db=aph">"The Antisocial Network"</a>. <i>EBSCOhost</i>. Time<span class="reference-accessdate">. Retrieved <span class="nowrap">4 April</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=EBSCOhost&rft.atitle=The+Antisocial+Network&rft.aulast=Dickey&rft.aufirst=Jack&rft_id=http%3A%2F%2Flibraryproxy.tulsacc.edu%3A2060%2Fehost%2Fdetail%2Fdetail%3Fvid%3D4%26sid%3Dab97ef73-bfcf-484f-a260-25715bf2acdc%2540sessionmgr102%26bdata%3DJnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl%23AN%3D96808621%26db%3Daph&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span><sup class="noprint Inline-Template"><span style="white-space: nowrap;">[<i><a href="/wiki/Wikipedia:Link_rot" title="Wikipedia:Link rot"><span title=" Dead link tagged July 2022">permanent dead link</span></a></i><span style="visibility:hidden; color:transparent; padding-left:2px">‍</span>]</span></sup></span> </li> <li id="cite_note-blizzardNoRealNames-158"><span class="mw-cite-backlink"><b><a href="#cite_ref-blizzardNoRealNames_158-0">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://forums.worldofwarcraft.com/thread.html?topicId=25968987278&sid=1">World of Warcraft forum post</a>, Blizzard announces reversal of its decision to force real names to appear on its forums</span> </li> <li id="cite_note-repository.jmls.edu-159"><span class="mw-cite-backlink">^ <a href="#cite_ref-repository.jmls.edu_159-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-repository.jmls.edu_159-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text">Young, Danielle. "Now You See it Now You Don't...or Do You? Snapchat's Deceptive Promotion of Vanishing Messages Violates Federal Trade Commission Regulations." The John Marshall Journal of Information Technology and Privacy Law. 30.4 (2014): 1-25. Web. <a rel="nofollow" class="external free" href="http://repository.jmls.edu/cgi/viewcontent.cgi?article=1751&context=jitpl">http://repository.jmls.edu/cgi/viewcontent.cgi?article=1751&context=jitpl</a></span> </li> <li id="cite_note-160"><span class="mw-cite-backlink"><b><a href="#cite_ref-160">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation magazine cs1"><a rel="nofollow" class="external text" href="https://www.newyorker.com/tech/annals-of-technology/the-long-snap">"The Long Snap"</a>. <i>The New Yorker</i>. 2013-10-14<span class="reference-accessdate">. Retrieved <span class="nowrap">2023-04-24</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+New+Yorker&rft.atitle=The+Long+Snap&rft.date=2013-10-14&rft_id=https%3A%2F%2Fwww.newyorker.com%2Ftech%2Fannals-of-technology%2Fthe-long-snap&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-161"><span class="mw-cite-backlink"><b><a href="#cite_ref-161">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.verizon.com/articles/guides/">"Mobile accessories lifestyle guides"</a>. <i>www.verizon.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2023-04-24</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.verizon.com&rft.atitle=Mobile+accessories+lifestyle+guides&rft_id=https%3A%2F%2Fwww.verizon.com%2Farticles%2Fguides%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-:5-162"><span class="mw-cite-backlink">^ <a href="#cite_ref-:5_162-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:5_162-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFrench2015" class="citation web cs1">French, Sally (November 2, 2015). <a rel="nofollow" class="external text" href="http://www.marketwatch.com/story/snapchats-new-scary-privacy-policy-has-left-users-outraged-2015-10-29">"Snapchat's new 'scary' privacy policy has left users outraged"</a>. <i>MarketWatch</i><span class="reference-accessdate">. Retrieved <span class="nowrap">May 24,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=MarketWatch&rft.atitle=Snapchat%27s+new+%27scary%27+privacy+policy+has+left+users+outraged&rft.date=2015-11-02&rft.aulast=French&rft.aufirst=Sally&rft_id=http%3A%2F%2Fwww.marketwatch.com%2Fstory%2Fsnapchats-new-scary-privacy-policy-has-left-users-outraged-2015-10-29&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-:11-163"><span class="mw-cite-backlink">^ <a href="#cite_ref-:11_163-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:11_163-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.businessinsider.com/snapchat-privacy-policy-update-explained-2015-10">"Why you don't need to freak out about Snapchat's new privacy policy"</a>. <i><a href="/wiki/Business_Insider" title="Business Insider">Business Insider</a></i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Business+Insider&rft.atitle=Why+you+don%27t+need+to+freak+out+about+Snapchat%27s+new+privacy+policy&rft_id=http%3A%2F%2Fwww.businessinsider.com%2Fsnapchat-privacy-policy-update-explained-2015-10&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-164"><span class="mw-cite-backlink"><b><a href="#cite_ref-164">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSolon2017" class="citation news cs1">Solon, Olivia (23 June 2017). <a rel="nofollow" class="external text" href="https://www.theguardian.com/technology/2017/jun/23/snapchat-maps-privacy-safety-concerns">"Snapchat's new map feature raises fears of stalking and bullying"</a>. <i>The Guardian</i><span class="reference-accessdate">. Retrieved <span class="nowrap">19 April</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=Snapchat%27s+new+map+feature+raises+fears+of+stalking+and+bullying&rft.date=2017-06-23&rft.aulast=Solon&rft.aufirst=Olivia&rft_id=https%3A%2F%2Fwww.theguardian.com%2Ftechnology%2F2017%2Fjun%2F23%2Fsnapchat-maps-privacy-safety-concerns&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-:12-165"><span class="mw-cite-backlink">^ <a href="#cite_ref-:12_165-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:12_165-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://abcnews.go.com/Lifestyle/snapchats-snap-map-feature-raises-privacy-concerns/story?id=48271889">"Snapchat's new Snap Map feature raises privacy concerns"</a>. <i>ABC News</i><span class="reference-accessdate">. Retrieved <span class="nowrap">19 April</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=ABC+News&rft.atitle=Snapchat%27s+new+Snap+Map+feature+raises+privacy+concerns&rft_id=https%3A%2F%2Fabcnews.go.com%2FLifestyle%2Fsnapchats-snap-map-feature-raises-privacy-concerns%2Fstory%3Fid%3D48271889&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-:6-166"><span class="mw-cite-backlink">^ <a href="#cite_ref-:6_166-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:6_166-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLekach2016" class="citation web cs1">Lekach, Sasha (November 16, 2016). <a rel="nofollow" class="external text" href="http://mashable.com/2016/11/16/snapchat-spectacles-privacy-safety/#adnzw.o9LkqX">"Privacy Panic? Snapchat Spectacles raise eyebrows"</a>. <i>Mashable</i><span class="reference-accessdate">. Retrieved <span class="nowrap">May 24,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Mashable&rft.atitle=Privacy+Panic%3F+Snapchat+Spectacles+raise+eyebrows&rft.date=2016-11-16&rft.aulast=Lekach&rft.aufirst=Sasha&rft_id=http%3A%2F%2Fmashable.com%2F2016%2F11%2F16%2Fsnapchat-spectacles-privacy-safety%2F%23adnzw.o9LkqX&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-:7-167"><span class="mw-cite-backlink">^ <a href="#cite_ref-:7_167-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:7_167-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFElsayed-Ali2016" class="citation web cs1">Elsayed-Ali, Sherif (October 21, 2016). <a rel="nofollow" class="external text" href="https://www.amnesty.org/en/press-releases/2016/10/snapchat-skype-among-apps-not-protecting-users-privacy/">"SNAPCHAT, SKYPE AMONG APPS NOT PROTECTING USERS' PRIVACY"</a>. Amnesty International<span class="reference-accessdate">. Retrieved <span class="nowrap">May 24,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=SNAPCHAT%2C+SKYPE+AMONG+APPS+NOT+PROTECTING+USERS%27+PRIVACY&rft.pub=Amnesty+International&rft.date=2016-10-21&rft.aulast=Elsayed-Ali&rft.aufirst=Sherif&rft_id=https%3A%2F%2Fwww.amnesty.org%2Fen%2Fpress-releases%2F2016%2F10%2Fsnapchat-skype-among-apps-not-protecting-users-privacy%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-168"><span class="mw-cite-backlink"><b><a href="#cite_ref-168">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFElder2017" class="citation web cs1">Elder, Robert (April 28, 2017). <a rel="nofollow" class="external text" href="http://www.businessinsider.com/snapchat-tops-facebook-and-twitter-on-consumer-privacy-heres-why-brands-should-care-2017-4">"Snapchat tops Facebook and Twitter for online privacy"</a>. <i>Business Insider</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20190306174737/https://www.businessinsider.com/snapchat-tops-facebook-and-twitter-on-consumer-privacy-heres-why-brands-should-care-2017-4">Archived</a> from the original on March 6, 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">May 24,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Business+Insider&rft.atitle=Snapchat+tops+Facebook+and+Twitter+for+online+privacy&rft.date=2017-04-28&rft.aulast=Elder&rft.aufirst=Robert&rft_id=http%3A%2F%2Fwww.businessinsider.com%2Fsnapchat-tops-facebook-and-twitter-on-consumer-privacy-heres-why-brands-should-care-2017-4&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-ftc.gov-169"><span class="mw-cite-backlink">^ <a href="#cite_ref-ftc.gov_169-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-ftc.gov_169-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text">"Snapchat Settles FTC Charges That Promises of Disappearing Messages Were False." FTC May 8, 2014. Retrieved February 29, 2016. <a rel="nofollow" class="external free" href="https://www.ftc.gov/news-events/press-releases/2014/05/snapchat-settles-ftc-charges-promises-disappearing-messages-were">https://www.ftc.gov/news-events/press-releases/2014/05/snapchat-settles-ftc-charges-promises-disappearing-messages-were</a></span> </li> <li id="cite_note-170"><span class="mw-cite-backlink"><b><a href="#cite_ref-170">^</a></b></span> <span class="reference-text">Young, Danielle. "Now You See it Now You Don't...or Do You? Snapchat's Deceptive Promotion of Vanishing Messages Violates Federal Trade Commission Regulations." The John Marshall Journal of Information Technology and Privacy Law. 30.4 (2014): 1-25. Web. <a rel="nofollow" class="external free" href="http://repository.jmls.edu/cgi/viewcontent.cgi?article=1751&context=jitpl">http://repository.jmls.edu/cgi/viewcontent.cgi?article=1751&context=jitpl</a></span> </li> <li id="cite_note-171"><span class="mw-cite-backlink"><b><a href="#cite_ref-171">^</a></b></span> <span class="reference-text">Burnham, Kristin. "5 Ways Snapchat Violated Your Privacy, Security - InformationWeek." InformationWeek. 5 September 2014. Web. 29 February 2016. <<a rel="nofollow" class="external free" href="http://www.informationweek.com/software/social/5-ways-snapchat-violated-your-privacy-security/d/d-id/1251175">http://www.informationweek.com/software/social/5-ways-snapchat-violated-your-privacy-security/d/d-id/1251175</a>>.</span> </li> <li id="cite_note-172"><span class="mw-cite-backlink"><b><a href="#cite_ref-172">^</a></b></span> <span class="reference-text">Osborne, Charlie. "FTC Finalizes Charges against Snapchat over User Privacy | ZDNet." ZDNet. 2 January 2015. Web. 29 February 2016. <<a rel="nofollow" class="external free" href="https://www.zdnet.com/article/ftc-finalizes-charges-against-snapchat-over-user-privacy/">https://www.zdnet.com/article/ftc-finalizes-charges-against-snapchat-over-user-privacy/</a>>.</span> </li> <li id="cite_note-173"><span class="mw-cite-backlink"><b><a href="#cite_ref-173">^</a></b></span> <span class="reference-text">Paul, Ian. "Snapchat Clarifies Privacy Policies after Terms of Service Change Freaks out Users." PCWorld. 2 November 2015. Web. 28 February 2016.</span> </li> <li id="cite_note-174"><span class="mw-cite-backlink"><b><a href="#cite_ref-174">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.whatsapp.com/features/">"Features"</a>. <i>WhatsApp.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">5 July</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=WhatsApp.com&rft.atitle=Features&rft_id=https%3A%2F%2Fwww.whatsapp.com%2Ffeatures%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-175"><span class="mw-cite-backlink"><b><a href="#cite_ref-175">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.livemint.com/technology/tech-news/here-are-some-of-whatsapp-s-upcoming-features-hide-muted-status-dark-mode-1562410724945.html">"Here are some of WhatsApp's upcoming features"</a>. <i>Mint</i>. 6 July 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">5 July</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Mint&rft.atitle=Here+are+some+of+WhatsApp%27s+upcoming+features&rft.date=2019-07-06&rft_id=https%3A%2F%2Fwww.livemint.com%2Ftechnology%2Ftech-news%2Fhere-are-some-of-whatsapp-s-upcoming-features-hide-muted-status-dark-mode-1562410724945.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-176"><span class="mw-cite-backlink"><b><a href="#cite_ref-176">^</a></b></span> <span class="reference-text"><a href="/wiki/Shepherd_and_Wedderburn" title="Shepherd and Wedderburn">Shepherd and Wedderburn</a>. 2010. <a rel="nofollow" class="external text" href="http://www.ianswer4u.com/2011/05/facebook-poke.html">Facebook amend privacy settings following an unpleasant poke</a> from EU privacy protectors. [online]. Available at: <a rel="nofollow" class="external free" href="http://www.shepwedd.co.uk/knowledge/article/1095-2831/facebook-amend-privacy-settings-following-an-unpleasant-poke-from-eu-privacy-protectors/archive/?page=1">http://www.shepwedd.co.uk/knowledge/article/1095-2831/facebook-amend-privacy-settings-following-an-unpleasant-poke-from-eu-privacy-protectors/archive/?page=1</a> [Accessed 25 April 2011]</span> </li> <li id="cite_note-177"><span class="mw-cite-backlink"><b><a href="#cite_ref-177">^</a></b></span> <span class="reference-text">Saint, N. 2010. Facebook's Response to Privacy Concerns: "If you're not Comfortable Sharing, Don't". [online]. Available at: <a rel="nofollow" class="external free" href="http://www.businessinsider.com/facebooks-response-to-privacy-concerns-if-youre-not-comfortable-sharing-dont-2010-5">http://www.businessinsider.com/facebooks-response-to-privacy-concerns-if-youre-not-comfortable-sharing-dont-2010-5</a> [Accessed 25 April 2011]</span> </li> <li id="cite_note-:13-178"><span class="mw-cite-backlink"><b><a href="#cite_ref-:13_178-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLindsey2019" class="citation news cs1">Lindsey, Nicole (February 2019). <a rel="nofollow" class="external text" href="https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/">"New Research Study Shows That Social Media Privacy Might Not Be Possible"</a>. <i>Cpo Magazine</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Cpo+Magazine&rft.atitle=New+Research+Study+Shows+That+Social+Media+Privacy+Might+Not+Be+Possible&rft.date=2019-02&rft.aulast=Lindsey&rft.aufirst=Nicole&rft_id=https%3A%2F%2Fwww.cpomagazine.com%2Fdata-privacy%2Fnew-research-study-shows-that-social-media-privacy-might-not-be-possible%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-cozen-179"><span class="mw-cite-backlink">^ <a href="#cite_ref-cozen_179-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-cozen_179-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFO'Connor2020" class="citation news cs1">O'Connor, Cozen (2020-02-14). <a rel="nofollow" class="external text" href="https://www.lexology.com/library/detail.aspx?g=6452d1ed-19ae-4fa4-8fb3-119e9735dbea">"What Is A "Reasonable Link" Under CCPA? | Lexology"</a>. <i>Lexology</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2020-03-05</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Lexology&rft.atitle=What+Is+A+%22Reasonable+Link%22+Under+CCPA%3F+%7C+Lexology&rft.date=2020-02-14&rft.aulast=O%27Connor&rft.aufirst=Cozen&rft_id=https%3A%2F%2Fwww.lexology.com%2Flibrary%2Fdetail.aspx%3Fg%3D6452d1ed-19ae-4fa4-8fb3-119e9735dbea&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-aca-180"><span class="mw-cite-backlink"><b><a href="#cite_ref-aca_180-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFColeman2020" class="citation web cs1">Coleman, June (2020-02-20). <a rel="nofollow" class="external text" href="https://www.acainternational.org/news/ccpa-clarity-in-california">"CCPA Clarity in California"</a>. <i>ACA International</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2020-03-05</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=ACA+International&rft.atitle=CCPA+Clarity+in+California&rft.date=2020-02-20&rft.aulast=Coleman&rft.aufirst=June&rft_id=https%3A%2F%2Fwww.acainternational.org%2Fnews%2Fccpa-clarity-in-california&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> <li id="cite_note-cl-181"><span class="mw-cite-backlink"><b><a href="#cite_ref-cl_181-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.canadianlawyermag.com/news/opinion/ip-addresses-no-longer-protected-in-alberta/326158">"IP Addresses No Longer Protected in Alberta"</a>. <i>Canadian Lawyer Magazine</i>. 2020-02-11<span class="reference-accessdate">. Retrieved <span class="nowrap">2020-03-05</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Canadian+Lawyer+Magazine&rft.atitle=IP+Addresses+No+Longer+Protected+in+Alberta&rft.date=2020-02-11&rft_id=https%3A%2F%2Fwww.canadianlawyermag.com%2Fnews%2Fopinion%2Fip-addresses-no-longer-protected-in-alberta%2F326158&rfr_id=info%3Asid%2Fen.wikipedia.org%3APrivacy+concerns+with+social+networking+services" class="Z3988"></span></span> </li> </ol></div></div> <div class="mw-heading mw-heading2"><h2 id="External_links">External links</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Privacy_concerns_with_social_networking_services&action=edit&section=62" title="Edit section: External links"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20120920050609/http://www.ico.gov.uk/">Data Protection and Freedom of Information Advice</a></li> <li><a rel="nofollow" class="external text" href="http://www.privacylaws.com/">Privacy Law and Data Protection Law</a></li> <li><a rel="nofollow" class="external text" href="http://www.ala.org/Template.cfm?Section=interpretations&Template=/ContentManagement/ContentDisplay.cfm&ContentID=132904/">American Library Association Privacy Ethics</a></li></ul> <div class="navbox-styles"><style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style></div><div role="navigation" class="navbox" aria-labelledby="Privacy" style="padding:3px"><table class="nowraplinks hlist mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Privacy" title="Template:Privacy"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Privacy" title="Template talk:Privacy"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Privacy" title="Special:EditPage/Template:Privacy"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Privacy" style="font-size:114%;margin:0 4em"><a href="/wiki/Privacy" title="Privacy">Privacy</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Principles</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Right_of_access_to_personal_data" title="Right of access to personal data">Right of access to personal data</a></li> <li><a href="/wiki/Expectation_of_privacy" class="mw-redirect" title="Expectation of privacy">Expectation of privacy</a></li> <li><a href="/wiki/Right_to_privacy" title="Right to privacy">Right to privacy</a></li> <li><a href="/wiki/Right_to_be_forgotten" title="Right to be forgotten">Right to be forgotten</a></li> <li><a href="/wiki/Post-mortem_privacy" title="Post-mortem privacy">Post-mortem privacy</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Privacy_law" title="Privacy law">Privacy laws</a></th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Privacy_in_Australian_law" title="Privacy in Australian law">Australia</a></li> <li><a href="/wiki/General_Personal_Data_Protection_Law" title="General Personal Data Protection Law">Brazil</a></li> <li><a href="/wiki/Canadian_privacy_law" title="Canadian privacy law">Canada</a></li> <li><a href="/wiki/Personal_Information_Protection_Law_of_the_People%27s_Republic_of_China" title="Personal Information Protection Law of the People's Republic of China">China</a></li> <li><a href="/wiki/Privacy_law_in_Denmark" title="Privacy law in Denmark">Denmark</a></li> <li><a href="/wiki/Privacy_in_English_law" title="Privacy in English law">England</a></li> <li><a href="/wiki/General_Data_Protection_Regulation" title="General Data Protection Regulation">European Union</a></li> <li><a href="/wiki/Bundesdatenschutzgesetz" title="Bundesdatenschutzgesetz">Germany</a></li> <li><a href="/wiki/Data_Protection_Act,_2012" title="Data Protection Act, 2012">Ghana</a></li> <li><a href="/wiki/Right_to_privacy_in_New_Zealand" title="Right to privacy in New Zealand">New Zealand</a></li> <li><a href="/wiki/Data_protection_(privacy)_laws_in_Russia" title="Data protection (privacy) laws in Russia">Russia</a></li> <li><a href="/wiki/Personal_Data_Protection_Act_2012_(Singapore)" class="mw-redirect" title="Personal Data Protection Act 2012 (Singapore)">Singapore</a></li> <li><a href="/wiki/Personal_Data_Protection_Act_(Sri_Lanka)" title="Personal Data Protection Act (Sri Lanka)">Sri Lanka</a></li> <li><a href="/wiki/Federal_Data_Protection_and_Information_Commissioner" title="Federal Data Protection and Information Commissioner">Switzerland</a></li> <li><a href="/wiki/Privacy_laws_of_the_United_Kingdom" class="mw-redirect" title="Privacy laws of the United Kingdom">United Kingdom</a></li> <li><a href="/wiki/Privacy_laws_of_the_United_States" title="Privacy laws of the United States">United States</a> <ul><li><a href="/wiki/California_Consumer_Privacy_Act" title="California Consumer Privacy Act">California</a>, <a href="/wiki/California_Privacy_Rights_Act" title="California Privacy Rights Act">amended in 2020</a></li></ul></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/National_data_protection_authority" title="National data protection authority">Data protection authorities</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Office_of_the_Australian_Information_Commissioner" title="Office of the Australian Information Commissioner">Australia</a></li> <li><a href="/wiki/Danish_Data_Protection_Agency" title="Danish Data Protection Agency">Denmark</a></li> <li><a href="/wiki/European_Data_Protection_Supervisor" title="European Data Protection Supervisor">European Union</a></li> <li><a href="/wiki/Commission_nationale_de_l%27informatique_et_des_libert%C3%A9s" title="Commission nationale de l'informatique et des libertés">France</a></li> <li><a href="/wiki/Federal_Commissioner_for_Data_Protection_and_Freedom_of_Information" title="Federal Commissioner for Data Protection and Freedom of Information">Germany</a></li> <li><a href="/wiki/Data_Protection_Board_of_India" title="Data Protection Board of India">India</a></li> <li><a href="/wiki/Personal_Data_Protection_Authority_Institute" title="Personal Data Protection Authority Institute">Indonesia</a></li> <li><a href="/wiki/Data_Protection_Commissioner" title="Data Protection Commissioner">Ireland</a></li> <li><a href="/wiki/Office_of_the_Data_Protection_Supervisor" title="Office of the Data Protection Supervisor">Isle of Man</a></li> <li><a href="/wiki/Dutch_Data_Protection_Authority" title="Dutch Data Protection Authority">Netherlands</a></li> <li><a href="/wiki/Norwegian_Data_Protection_Authority" title="Norwegian Data Protection Authority">Norway</a></li> <li><a href="/wiki/National_Privacy_Commission" title="National Privacy Commission">Philippines</a></li> <li><a href="/wiki/Polish_Data_Protection_Commissioner" title="Polish Data Protection Commissioner">Poland</a></li> <li><a href="/wiki/Personal_Information_Protection_Commission_(South_Korea)" title="Personal Information Protection Commission (South Korea)">South Korea</a></li> <li><a href="/wiki/Spanish_Data_Protection_Agency" title="Spanish Data Protection Agency">Spain</a></li> <li><a href="/wiki/Swedish_Data_Protection_Authority" class="mw-redirect" title="Swedish Data Protection Authority">Sweden</a></li> <li><a href="/wiki/Federal_Data_Protection_and_Information_Commissioner" title="Federal Data Protection and Information Commissioner">Switzerland</a></li> <li><a href="/wiki/Office_of_the_Personal_Data_Protection_Committee" class="mw-redirect" title="Office of the Personal Data Protection Committee">Thailand</a></li> <li><a href="/wiki/Turkish_Data_Protection_Authority" title="Turkish Data Protection Authority">Turkey</a></li> <li><a href="/wiki/Information_Commissioner%27s_Office" title="Information Commissioner's Office">United Kingdom</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Areas</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Consumer_privacy" title="Consumer privacy">Consumer</a></li> <li><a href="/wiki/Digital_privacy" title="Digital privacy">Digital</a></li> <li><a href="/wiki/Privacy_in_education" title="Privacy in education">Education</a></li> <li><a href="/wiki/Medical_privacy" title="Medical privacy">Medical</a></li> <li><a href="/wiki/Workplace_privacy" title="Workplace privacy">Workplace</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Information_privacy" title="Information privacy">Information privacy</a></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Information_privacy_law" title="Information privacy law">Law</a></li> <li><a href="/wiki/Bank_secrecy" title="Bank secrecy">Financial</a></li> <li><a href="/wiki/Internet_privacy" title="Internet privacy">Internet</a> <ul><li><a href="/wiki/Privacy_concerns_with_Facebook" title="Privacy concerns with Facebook">Facebook</a></li> <li><a href="/wiki/Privacy_concerns_regarding_Google" class="mw-redirect" title="Privacy concerns regarding Google">Google</a></li> <li><a href="/wiki/Privacy_concerns_with_Twitter" class="mw-redirect" title="Privacy concerns with Twitter">Twitter</a></li></ul></li> <li><a href="/wiki/Email_privacy" title="Email privacy">Email</a></li> <li><a href="/wiki/Personal_data" title="Personal data">Personal data</a></li> <li><a href="/wiki/Personal_identifier" title="Personal identifier">Personal identifier</a></li> <li><a class="mw-selflink selflink">Social networking services</a></li> <li><a href="/wiki/Privacy-enhancing_technologies" title="Privacy-enhancing technologies">Privacy-enhancing technologies</a></li> <li><a href="/wiki/Privacy_engineering" title="Privacy engineering">Privacy engineering</a></li> <li><a href="/wiki/Privacy-invasive_software" title="Privacy-invasive software">Privacy-invasive software</a></li> <li><a href="/wiki/Privacy_policy" title="Privacy policy">Privacy policy</a></li> <li><a href="/wiki/Privacy_software" title="Privacy software">Privacy software</a></li> <li><a href="/wiki/Secret_ballot" title="Secret ballot">Secret ballot</a></li> <li><a href="/wiki/Virtual_assistant_privacy" title="Virtual assistant privacy">Virtual assistant privacy</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Advocacy organizations</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/American_Civil_Liberties_Union" title="American Civil Liberties Union">American Civil Liberties Union</a></li> <li><a href="/wiki/Center_for_Democracy_and_Technology" title="Center for Democracy and Technology">Center for Democracy and Technology</a></li> <li><a href="/wiki/Computer_Professionals_for_Social_Responsibility" title="Computer Professionals for Social Responsibility">Computer Professionals for Social Responsibility</a></li> <li><a href="/wiki/Data_Privacy_Lab" title="Data Privacy Lab">Data Privacy Lab</a></li> <li><a href="/wiki/Electronic_Frontier_Foundation" title="Electronic Frontier Foundation">Electronic Frontier Foundation</a></li> <li><a href="/wiki/Electronic_Privacy_Information_Center" title="Electronic Privacy Information Center">Electronic Privacy Information Center</a></li> <li><a href="/wiki/European_Digital_Rights" title="European Digital Rights">European Digital Rights</a></li> <li><a href="/wiki/Future_of_Privacy_Forum" title="Future of Privacy Forum">Future of Privacy Forum</a></li> <li><a href="/wiki/Global_Network_Initiative" title="Global Network Initiative">Global Network Initiative</a></li> <li><a href="/wiki/International_Association_of_Privacy_Professionals" title="International Association of Privacy Professionals">International Association of Privacy Professionals</a></li> <li><a href="/wiki/NOYB" title="NOYB">NOYB</a></li> <li><a href="/wiki/Privacy_International" title="Privacy International">Privacy International</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">See also</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Anonymity" title="Anonymity">Anonymity</a></li> <li><a href="/wiki/Cellphone_surveillance" title="Cellphone surveillance">Cellphone surveillance</a></li> <li><a href="/wiki/Data_security" title="Data security">Data security</a></li> <li><a href="/wiki/Eavesdropping" title="Eavesdropping">Eavesdropping</a></li> <li><a href="/wiki/Global_surveillance" title="Global surveillance">Global surveillance</a></li> <li><a href="/wiki/Identity_theft" title="Identity theft">Identity theft</a></li> <li><a href="/wiki/Mass_surveillance" title="Mass surveillance">Mass surveillance</a></li> <li><a href="/wiki/Panopticon" title="Panopticon">Panopticon</a></li> <li><a href="/wiki/PRISM" title="PRISM">PRISM</a></li> <li><a href="/wiki/Search_warrant" title="Search warrant">Search warrant</a></li> <li><a href="/wiki/Wiretapping" title="Wiretapping">Wiretapping</a></li> <li><a href="/wiki/Human_rights" title="Human rights">Human rights</a></li> <li><a href="/wiki/Personality_rights" title="Personality rights">Personality rights</a></li></ul> </div></td></tr><tr><td class="navbox-abovebelow" colspan="2"><div> <ul><li><span class="noviewer" typeof="mw:File"><span title="Category"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/16px-Symbol_category_class.svg.png" decoding="async" width="16" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/23px-Symbol_category_class.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/31px-Symbol_category_class.svg.png 2x" data-file-width="180" data-file-height="185" /></span></span> <a href="/wiki/Category:Privacy" title="Category:Privacy">Category</a></li></ul> </div></td></tr></tbody></table></div> <style data-mw-deduplicate="TemplateStyles:r1130092004">.mw-parser-output .portal-bar{font-size:88%;font-weight:bold;display:flex;justify-content:center;align-items:baseline}.mw-parser-output .portal-bar-bordered{padding:0 2em;background-color:#fdfdfd;border:1px solid #a2a9b1;clear:both;margin:1em auto 0}.mw-parser-output .portal-bar-related{font-size:100%;justify-content:flex-start}.mw-parser-output .portal-bar-unbordered{padding:0 1.7em;margin-left:0}.mw-parser-output .portal-bar-header{margin:0 1em 0 0.5em;flex:0 0 auto;min-height:24px}.mw-parser-output .portal-bar-content{display:flex;flex-flow:row wrap;flex:0 1 auto;padding:0.15em 0;column-gap:1em;align-items:baseline;margin:0;list-style:none}.mw-parser-output .portal-bar-content-related{margin:0;list-style:none}.mw-parser-output .portal-bar-item{display:inline-block;margin:0.15em 0.2em;min-height:24px;line-height:24px}@media screen and (max-width:768px){.mw-parser-output .portal-bar{font-size:88%;font-weight:bold;display:flex;flex-flow:column wrap;align-items:baseline}.mw-parser-output .portal-bar-header{text-align:center;flex:0;padding-left:0.5em;margin:0 auto}.mw-parser-output .portal-bar-related{font-size:100%;align-items:flex-start}.mw-parser-output .portal-bar-content{display:flex;flex-flow:row wrap;align-items:center;flex:0;column-gap:1em;border-top:1px solid #a2a9b1;margin:0 auto;list-style:none}.mw-parser-output .portal-bar-content-related{border-top:none;margin:0;list-style:none}}.mw-parser-output .navbox+link+.portal-bar,.mw-parser-output .navbox+style+.portal-bar,.mw-parser-output .navbox+link+.portal-bar-bordered,.mw-parser-output .navbox+style+.portal-bar-bordered,.mw-parser-output .sister-bar+link+.portal-bar,.mw-parser-output .sister-bar+style+.portal-bar,.mw-parser-output .portal-bar+.navbox-styles+.navbox,.mw-parser-output .portal-bar+.navbox-styles+.sister-bar{margin-top:-1px}</style><div class="portal-bar noprint metadata noviewer portal-bar-bordered" role="navigation" aria-label="Portals"><span class="portal-bar-header"><a href="/wiki/Wikipedia:Contents/Portals" title="Wikipedia:Contents/Portals">Portal</a>:</span><ul class="portal-bar-content"><li class="portal-bar-item"><span class="nowrap"><span typeof="mw:File"><a href="/wiki/File:Crystal_Clear_app_linneighborhood.svg" class="mw-file-description"><img alt="icon" src="//upload.wikimedia.org/wikipedia/commons/thumb/f/f9/Crystal_Clear_app_linneighborhood.svg/19px-Crystal_Clear_app_linneighborhood.svg.png" decoding="async" width="19" height="19" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/f/f9/Crystal_Clear_app_linneighborhood.svg/29px-Crystal_Clear_app_linneighborhood.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/f/f9/Crystal_Clear_app_linneighborhood.svg/38px-Crystal_Clear_app_linneighborhood.svg.png 2x" data-file-width="407" data-file-height="407" /></a></span> </span><a href="/wiki/Portal:Internet" title="Portal:Internet">Internet</a></li></ul></div> <!-- NewPP limit report Parsed by mw‐api‐int.codfw.main‐6bcd787d7f‐r4xdh Cached time: 20241126014553 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 1.427 seconds Real time usage: 1.568 seconds Preprocessor visited node count: 8452/1000000 Post‐expand include size: 291907/2097152 bytes Template argument size: 5260/2097152 bytes Highest expansion depth: 17/100 Expensive parser function count: 12/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 528905/5000000 bytes Lua time usage: 0.870/10.000 seconds Lua memory usage: 6875462/52428800 bytes Number of Wikibase entities loaded: 0/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 1380.659 1 -total 67.04% 925.582 1 Template:Reflist 23.42% 323.306 77 Template:Cite_web 18.62% 257.071 24 Template:Cite_journal 7.01% 96.837 1 Template:Privacy 6.86% 94.712 1 Template:Navbox 6.75% 93.152 19 Template:Cite_news 5.36% 74.026 1 Template:Short_description 5.23% 72.272 1 Template:Split 5.19% 71.597 3 Template:Ambox --> <!-- Saved in parser cache with key enwiki:pcache:idhash:31602166-0!canonical and timestamp 20241126014553 and revision id 1257941764. Rendering was triggered because: api-parse --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?type=1x1" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Privacy_concerns_with_social_networking_services&oldid=1257941764">https://en.wikipedia.org/w/index.php?title=Privacy_concerns_with_social_networking_services&oldid=1257941764</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Categories</a>: <ul><li><a href="/wiki/Category:Internet_privacy" title="Category:Internet privacy">Internet privacy</a></li><li><a href="/wiki/Category:Social_networking_services" title="Category:Social networking services">Social networking services</a></li><li><a href="/wiki/Category:Terms_of_service" title="Category:Terms of service">Terms of service</a></li><li><a href="/wiki/Category:Privacy_controversies" title="Category:Privacy controversies">Privacy controversies</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:CS1:_long_volume_value" title="Category:CS1: long volume value">CS1: long volume value</a></li><li><a href="/wiki/Category:Webarchive_template_wayback_links" title="Category:Webarchive template wayback links">Webarchive template wayback links</a></li><li><a href="/wiki/Category:All_articles_with_dead_external_links" title="Category:All articles with dead external links">All articles with dead external links</a></li><li><a href="/wiki/Category:Articles_with_dead_external_links_from_July_2022" title="Category:Articles with dead external links from July 2022">Articles with dead external links from July 2022</a></li><li><a href="/wiki/Category:Articles_with_permanently_dead_external_links" title="Category:Articles with permanently dead external links">Articles with permanently dead external links</a></li><li><a href="/wiki/Category:Articles_with_dead_external_links_from_November_2023" title="Category:Articles with dead external links from November 2023">Articles with dead external links from November 2023</a></li><li><a href="/wiki/Category:CS1_maint:_multiple_names:_authors_list" title="Category:CS1 maint: multiple names: authors list">CS1 maint: multiple names: authors list</a></li><li><a href="/wiki/Category:Articles_with_dead_external_links_from_August_2024" title="Category:Articles with dead external links from August 2024">Articles with dead external links from August 2024</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_is_different_from_Wikidata" title="Category:Short description is different from Wikidata">Short description is different from Wikidata</a></li><li><a href="/wiki/Category:Articles_to_be_split_from_June_2020" title="Category:Articles to be split from June 2020">Articles to be split from June 2020</a></li><li><a href="/wiki/Category:All_articles_to_be_split" title="Category:All articles to be split">All articles to be split</a></li><li><a href="/wiki/Category:Articles_needing_cleanup_from_December_2019" title="Category:Articles needing cleanup from December 2019">Articles needing cleanup from December 2019</a></li><li><a href="/wiki/Category:All_pages_needing_cleanup" title="Category:All pages needing cleanup">All pages needing cleanup</a></li><li><a href="/wiki/Category:Articles_containing_how-to_sections" title="Category:Articles containing how-to sections">Articles containing how-to sections</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 17 November 2024, at 09:45<span class="anonymous-show"> (UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=Privacy_concerns_with_social_networking_services&mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/static/images/footer/wikimedia-button.svg" width="84" height="29" alt="Wikimedia Foundation" loading="lazy"></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/w/resources/assets/poweredby_mediawiki.svg" alt="Powered by MediaWiki" width="88" height="31" loading="lazy"></a></li> </ul> </footer> </div> </div> </div> <div class="vector-settings" id="p-dock-bottom"> <ul></ul> </div><script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-694cf4987f-p5w4s","wgBackendResponseTime":168,"wgPageParseReport":{"limitreport":{"cputime":"1.427","walltime":"1.568","ppvisitednodes":{"value":8452,"limit":1000000},"postexpandincludesize":{"value":291907,"limit":2097152},"templateargumentsize":{"value":5260,"limit":2097152},"expansiondepth":{"value":17,"limit":100},"expensivefunctioncount":{"value":12,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":528905,"limit":5000000},"entityaccesscount":{"value":0,"limit":400},"timingprofile":["100.00% 1380.659 1 -total"," 67.04% 925.582 1 Template:Reflist"," 23.42% 323.306 77 Template:Cite_web"," 18.62% 257.071 24 Template:Cite_journal"," 7.01% 96.837 1 Template:Privacy"," 6.86% 94.712 1 Template:Navbox"," 6.75% 93.152 19 Template:Cite_news"," 5.36% 74.026 1 Template:Short_description"," 5.23% 72.272 1 Template:Split"," 5.19% 71.597 3 Template:Ambox"]},"scribunto":{"limitreport-timeusage":{"value":"0.870","limit":"10.000"},"limitreport-memusage":{"value":6875462,"limit":52428800}},"cachereport":{"origin":"mw-api-int.codfw.main-6bcd787d7f-r4xdh","timestamp":"20241126014553","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Privacy concerns with social networking services","url":"https:\/\/en.wikipedia.org\/wiki\/Privacy_concerns_with_social_networking_services","sameAs":"http:\/\/www.wikidata.org\/entity\/Q7246027","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q7246027","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2011-04-26T18:47:23Z","dateModified":"2024-11-17T09:45:32Z","headline":"data privacy, involving the right of mandating personal privacy concerning storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via the Internet"}</script> </body> </html>