Social Networking

Read Complete Research Material

SOCIAL NETWORKING

Social Networking

Social Networking

Introduction

Quick and prompt exchange of information and ideas through social networks is rapidly becoming the custom in the online world. However, it may be that during this process, we will implicitly reveal much more than before, the data on our behalf, location or health. When the real owners and distributors of online content received from users of social networks, are third parties, users may encounter great difficulty in attempting to remove, alter or update information about themselves (Emirbayer et al., 2010, 1411-54).

Recently made by some popular social networks change the default settings caused a heated debate on the Internet, and forced to raise the question of how the problem of "privacy" really interested in the general public. This article discusses some ways in which social networking services can impact on our changing perceptions of privacy and possible trade-offs between the open nature of the provision of data and the risks involved.

Difference between Privacy and Security

Privacy is different to security. Violation of safety usually concerns unauthorized access of unauthorized persons to protected information that is stored in coded or in writing. For example, to social networking there is a danger in the form of hacking, computer virus or worm. However, if after such an attack personal data were not used, you can generally say that the loss of privacy was not (Katona et al., 2011, 425-443).

Loss of privacy involves unauthorized access to personal information, which may take place without a security breach. For example, some social networking sites in property which the users have agreed to transfer their personal data, then, in contravention of industry codes of conduct and the principles of data protection of consumers, these data provide a leading research scientist, or marketing companies. In both these examples may be a violation of any security or loss of privacy, regardless of one another (Gallo, 2011, 36-37).

Data that is obtained illegally can be used repeatedly and sold. According to the Inter-Regional Research Institute of the United Nations Interregional Crime and Justice Research Institute (UNICRI), the value of stolen personal data is mainly determined by the country of residence. In March 2010, the global black market, a block of personal data typically cost about U.S. $ 7. Data about the inhabitants of the European Union (EU) is often valued more because they can be used in different European countries. For cybercriminals the value of personal data owned by one ...
Related Ads