SlideShare ist ein Scribd-Unternehmen logo
1 von 2
The Dark Side of Social Awareness
A few weeks ago I published a post that focused on a growing trend in social
media: the social awareness app. In a nutshell, these apps use a combination
of geo-location and social data to show you people who are around your
physical location with whom you can connect. In that post, I proposed that the
apps could have positive business applications if they are used correctly. As
we all know, there will always be those who take a perfectly legitimate idea
and twist it for wrongdoing. An example of this is “Girls Around Me”, an app
that was recently deleted from Apple’s App Store. The app allowed the user to
view women around them via a combination of Foursquare and Facebook
data without their consent.

However, I still stand by my claim that social awareness apps can be beneficial
for business purposes. That being said, it is very important to understand that,
now more than ever, there are some key considerations you should make
when using personal social media in a business environment.

First, privacy is a myth. Many people have seen the viral Facebook post where
an employee bashes her boss and, because she had friended him earlier but
forgot about it, he read the post and fired her. Because of the perceived
separation between our personal and professional lives, many employees do
not connect with co-workers or bosses on social media. That doesn’t
necessarily matter anymore. While “Girls Around Me” faced harsh criticism
and was removed from the App Store due to its high creep factor – not to
mention it was essentially a form of social stalking – there is no reason to
believe that new apps won’t be developed that combine network data. It could
be similar to “Girls Around Me”, combining geo-location data with popular
network data, or it could amalgamate other networks. The point is that work
conversations are easier and easier to find out, whether by nosy higher-ups or
business competitors.

Second, and perhaps more importantly, you should assume all information
you put online is eternal and easily accessible. The truth is, the only thing that
really limits access to data is privacy settings. However, when you post
information through a social networking service, the number of ways the data
can be leaked from even the most locked down of profiles is staggering.
Further, because so many apps now connect with popular services such as
Facebook and Twitter, privacy has become even less secure. Many of these
apps require that users let them access personal data and even post as them
to Facebook.

Now, that’s not to say that apps requesting these permissions are malicious;
most of the time they simply post fun updates or check-in information.
However, each app provides a potential backdoor into profile information.
Social connectivity means that data can be rapidly proliferated to LOTS of
people. This can be both a good and a bad thing. While many people use
circles, groups, etc. to change who they broadcast statuses and information to,
it is still wise to make sure that you are comfortable with anyone being able to
see anything you put online. If someone wants to see what you are posting on
your social networks, odds are they can. If you are posting negative comments
about your employer, or sensitive information that you would otherwise want
to keep private, be aware that this new wave of tools could make it nearly
impossible to maintain a discrete social conversation.

The bottom line – use common sense. If you don’t want someone to see the
information, don’t put it out there.

I want to hear some specific examples you’ve seen of this, either by you or
others. Tell me about them!
Read more: http://blogs.cio.com/consumer-it/16972/dark-side-social-awareness

Weitere ähnliche Inhalte

Andere mochten auch (13)

旅遊日期&住宿地
旅遊日期&住宿地旅遊日期&住宿地
旅遊日期&住宿地
 
Tapa formacion docente[1]
Tapa formacion docente[1]Tapa formacion docente[1]
Tapa formacion docente[1]
 
Guía n°7 para 7°
Guía n°7 para 7°Guía n°7 para 7°
Guía n°7 para 7°
 
Cascade project briefing general
Cascade project   briefing generalCascade project   briefing general
Cascade project briefing general
 
So2 aula00-manha-1sem2011
So2 aula00-manha-1sem2011So2 aula00-manha-1sem2011
So2 aula00-manha-1sem2011
 
スキップフロア住宅見学会開催!
スキップフロア住宅見学会開催!スキップフロア住宅見学会開催!
スキップフロア住宅見学会開催!
 
Media scriptedit
Media scripteditMedia scriptedit
Media scriptedit
 
4
44
4
 
Silverline Q1 2012 Co2 Savings
Silverline Q1 2012 Co2 SavingsSilverline Q1 2012 Co2 Savings
Silverline Q1 2012 Co2 Savings
 
Tomatetxo txuria
Tomatetxo txuriaTomatetxo txuria
Tomatetxo txuria
 
Recaps r. federer vs g. simon wimbledon 2015
Recaps r. federer vs g. simon wimbledon 2015Recaps r. federer vs g. simon wimbledon 2015
Recaps r. federer vs g. simon wimbledon 2015
 
South korea tablet listening
South korea tablet listeningSouth korea tablet listening
South korea tablet listening
 
mapa mental de asignatura favorita
mapa mental de asignatura favoritamapa mental de asignatura favorita
mapa mental de asignatura favorita
 

Mehr von williamsjohnseoexperts

the rise of telecommuting and what it means for your business
the rise of telecommuting and what it means for your businessthe rise of telecommuting and what it means for your business
the rise of telecommuting and what it means for your businesswilliamsjohnseoexperts
 
do you know your per person, per-project profitability
do you know your per person, per-project profitabilitydo you know your per person, per-project profitability
do you know your per person, per-project profitabilitywilliamsjohnseoexperts
 
THE SEARCH FOR THE RIGHT INTEGRATION TO PAYROLL AND ACCOUNTING SOLUTION
THE SEARCH FOR THE RIGHT INTEGRATION TO PAYROLL AND ACCOUNTING SOLUTIONTHE SEARCH FOR THE RIGHT INTEGRATION TO PAYROLL AND ACCOUNTING SOLUTION
THE SEARCH FOR THE RIGHT INTEGRATION TO PAYROLL AND ACCOUNTING SOLUTIONwilliamsjohnseoexperts
 
‘We the people’ have an issue with customer communication
‘We the people’ have an issue with customer communication‘We the people’ have an issue with customer communication
‘We the people’ have an issue with customer communicationwilliamsjohnseoexperts
 
Time bound customer service communication
Time bound customer service communicationTime bound customer service communication
Time bound customer service communicationwilliamsjohnseoexperts
 
Five common sense time management mistakes in project accounting — and tips t...
Five common sense time management mistakes in project accounting — and tips t...Five common sense time management mistakes in project accounting — and tips t...
Five common sense time management mistakes in project accounting — and tips t...williamsjohnseoexperts
 
Entrepreneur interview curt finch, journyx
Entrepreneur interview curt finch, journyxEntrepreneur interview curt finch, journyx
Entrepreneur interview curt finch, journyxwilliamsjohnseoexperts
 
REDUCING STRUCTURE FOR IMPROVED PERFORMANCE
REDUCING STRUCTURE FOR IMPROVED PERFORMANCE REDUCING STRUCTURE FOR IMPROVED PERFORMANCE
REDUCING STRUCTURE FOR IMPROVED PERFORMANCE williamsjohnseoexperts
 
Understanding True CRM Costs before Implementing an Enterprise Solution
Understanding True CRM Costs before Implementing an Enterprise SolutionUnderstanding True CRM Costs before Implementing an Enterprise Solution
Understanding True CRM Costs before Implementing an Enterprise Solutionwilliamsjohnseoexperts
 
Compensation Compliance for Federal Contractors: The Rules Have Changed!
Compensation Compliance for Federal Contractors: The Rules Have Changed!Compensation Compliance for Federal Contractors: The Rules Have Changed!
Compensation Compliance for Federal Contractors: The Rules Have Changed!williamsjohnseoexperts
 
Project portfolio management and what it means for your company
Project portfolio management and what it means for your companyProject portfolio management and what it means for your company
Project portfolio management and what it means for your companywilliamsjohnseoexperts
 

Mehr von williamsjohnseoexperts (20)

death by interview
death by interviewdeath by interview
death by interview
 
the rise of telecommuting and what it means for your business
the rise of telecommuting and what it means for your businessthe rise of telecommuting and what it means for your business
the rise of telecommuting and what it means for your business
 
do you know your per person, per-project profitability
do you know your per person, per-project profitabilitydo you know your per person, per-project profitability
do you know your per person, per-project profitability
 
THE SEARCH FOR THE RIGHT INTEGRATION TO PAYROLL AND ACCOUNTING SOLUTION
THE SEARCH FOR THE RIGHT INTEGRATION TO PAYROLL AND ACCOUNTING SOLUTIONTHE SEARCH FOR THE RIGHT INTEGRATION TO PAYROLL AND ACCOUNTING SOLUTION
THE SEARCH FOR THE RIGHT INTEGRATION TO PAYROLL AND ACCOUNTING SOLUTION
 
IS LATE REALLY BETTER THAN NEVER?
IS LATE REALLY BETTER THAN NEVER?IS LATE REALLY BETTER THAN NEVER?
IS LATE REALLY BETTER THAN NEVER?
 
Take the initiative
Take the initiativeTake the initiative
Take the initiative
 
‘We the people’ have an issue with customer communication
‘We the people’ have an issue with customer communication‘We the people’ have an issue with customer communication
‘We the people’ have an issue with customer communication
 
Time bound customer service communication
Time bound customer service communicationTime bound customer service communication
Time bound customer service communication
 
Five common sense time management mistakes in project accounting — and tips t...
Five common sense time management mistakes in project accounting — and tips t...Five common sense time management mistakes in project accounting — and tips t...
Five common sense time management mistakes in project accounting — and tips t...
 
Entrepreneur interview curt finch, journyx
Entrepreneur interview curt finch, journyxEntrepreneur interview curt finch, journyx
Entrepreneur interview curt finch, journyx
 
REDUCING STRUCTURE FOR IMPROVED PERFORMANCE
REDUCING STRUCTURE FOR IMPROVED PERFORMANCE REDUCING STRUCTURE FOR IMPROVED PERFORMANCE
REDUCING STRUCTURE FOR IMPROVED PERFORMANCE
 
PERFECT YOUR PARTNERSHIPS
PERFECT YOUR PARTNERSHIPSPERFECT YOUR PARTNERSHIPS
PERFECT YOUR PARTNERSHIPS
 
Understanding True CRM Costs before Implementing an Enterprise Solution
Understanding True CRM Costs before Implementing an Enterprise SolutionUnderstanding True CRM Costs before Implementing an Enterprise Solution
Understanding True CRM Costs before Implementing an Enterprise Solution
 
Death by interview
Death by interviewDeath by interview
Death by interview
 
Defining Web 2.0
Defining Web 2.0Defining Web 2.0
Defining Web 2.0
 
Compensation Compliance for Federal Contractors: The Rules Have Changed!
Compensation Compliance for Federal Contractors: The Rules Have Changed!Compensation Compliance for Federal Contractors: The Rules Have Changed!
Compensation Compliance for Federal Contractors: The Rules Have Changed!
 
Small Business News and Information
Small Business News and InformationSmall Business News and Information
Small Business News and Information
 
Getting beyond the water cooler
Getting beyond the water coolerGetting beyond the water cooler
Getting beyond the water cooler
 
Project portfolio management and what it means for your company
Project portfolio management and what it means for your companyProject portfolio management and what it means for your company
Project portfolio management and what it means for your company
 
JOURNYX IS MORE THAN A TIMESHEET
JOURNYX IS MORE THAN A TIMESHEETJOURNYX IS MORE THAN A TIMESHEET
JOURNYX IS MORE THAN A TIMESHEET
 

Kürzlich hochgeladen

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

The dark side of social awareness

  • 1. The Dark Side of Social Awareness A few weeks ago I published a post that focused on a growing trend in social media: the social awareness app. In a nutshell, these apps use a combination of geo-location and social data to show you people who are around your physical location with whom you can connect. In that post, I proposed that the apps could have positive business applications if they are used correctly. As we all know, there will always be those who take a perfectly legitimate idea and twist it for wrongdoing. An example of this is “Girls Around Me”, an app that was recently deleted from Apple’s App Store. The app allowed the user to view women around them via a combination of Foursquare and Facebook data without their consent. However, I still stand by my claim that social awareness apps can be beneficial for business purposes. That being said, it is very important to understand that, now more than ever, there are some key considerations you should make when using personal social media in a business environment. First, privacy is a myth. Many people have seen the viral Facebook post where an employee bashes her boss and, because she had friended him earlier but forgot about it, he read the post and fired her. Because of the perceived separation between our personal and professional lives, many employees do not connect with co-workers or bosses on social media. That doesn’t necessarily matter anymore. While “Girls Around Me” faced harsh criticism and was removed from the App Store due to its high creep factor – not to mention it was essentially a form of social stalking – there is no reason to believe that new apps won’t be developed that combine network data. It could be similar to “Girls Around Me”, combining geo-location data with popular network data, or it could amalgamate other networks. The point is that work conversations are easier and easier to find out, whether by nosy higher-ups or business competitors. Second, and perhaps more importantly, you should assume all information you put online is eternal and easily accessible. The truth is, the only thing that really limits access to data is privacy settings. However, when you post information through a social networking service, the number of ways the data
  • 2. can be leaked from even the most locked down of profiles is staggering. Further, because so many apps now connect with popular services such as Facebook and Twitter, privacy has become even less secure. Many of these apps require that users let them access personal data and even post as them to Facebook. Now, that’s not to say that apps requesting these permissions are malicious; most of the time they simply post fun updates or check-in information. However, each app provides a potential backdoor into profile information. Social connectivity means that data can be rapidly proliferated to LOTS of people. This can be both a good and a bad thing. While many people use circles, groups, etc. to change who they broadcast statuses and information to, it is still wise to make sure that you are comfortable with anyone being able to see anything you put online. If someone wants to see what you are posting on your social networks, odds are they can. If you are posting negative comments about your employer, or sensitive information that you would otherwise want to keep private, be aware that this new wave of tools could make it nearly impossible to maintain a discrete social conversation. The bottom line – use common sense. If you don’t want someone to see the information, don’t put it out there. I want to hear some specific examples you’ve seen of this, either by you or others. Tell me about them! Read more: http://blogs.cio.com/consumer-it/16972/dark-side-social-awareness