SlideShare ist ein Scribd-Unternehmen logo
1 von 11
SOCIAL MEDIA AND
INFORMATION SECURITY
BY:ALEXANDER DEUCALION
1
Introduction: An Analogy
It used to be that you could tell what you looked like by standing in front of a mirror. You
could obtain quite a bit of information about yourself and also decide which and how
much of this personal information you would be willing to let others know; in fact let the
whole world know.
But nowadays you don’t usually stand in front of a mirror, but rather sit in front of a
computer and so now it has become a whole new ball game. Unlike a mirror that gives
you an accurate representation of what you look like that can only be seen by you ( and
anyone that might be standing by you), the computer is the new mirror- a gateway to
a world that has more information about yourself than what you know.
Starting to get creeped -out? Hang-on, you haven’t seen anything yet. The bad news is
that an undeterminable number of people are collecting and selling information about
you. Is there any good news? Don’t worry; by the end of this paper we will determine
that.
Purpose
The purpose of this paper is to explore how technology is driving the virtualization of
society and its mores, the trends in cyber-culture and their impact on personal privacy
and the risk and prevalence of unauthorized disclosures. Given the pervasiveness of
public participation in and around unregulated practices of social media and online
marketing, this paper will also focus on the risks that both individuals and businesses
are facing regarding privacy violation and information security, respectively.
2
Lastly, we will look closely at social media from the interpersonal communication
perspective. How has virtualization affected our ability to interact with people? There are
quite a few personal stories and observations about how people who converse
frequently using social media indicate being uncomfortable at the prospect of meeting in
person. Virtualization and Social media has drawn new lines for social interaction
remarkably different from traditional methods and these lines are not to be crossed.
Whether these trends are beneficial is a debate that has become mot given the
revolutionary reality of how we interact and respond with one another, with businesses
and with government.
Virtual me
One of the effects of the technology explosion of today is the memory lapse we seem to
develop when asked to think for more than two or three years back. For example-who
can remember how life was before texting first become available and widely used?
Another effect is the importance placed on the medium over the importance of the
message. Cyber-culture and digital communications have adopted their own protocols
and customs which as will be seen, rely on anonymity and transparency. And it isn’t
only online communications but off-line digital communications such as cell phones as
well.
Don’t call me-I’ll text you
Texting is by far the most widespread and popular form of communication in the Digital
Age right now:
3
Cell-phone texting has become the preferred channel of basic
communication between teens and their friends and cell calling is a close
second. Some 75% of 12-17 year-olds now own cell phones, up from 45%
in 2004. Those phones have become indispensable tools in teen
communication patterns. Fully 72% of all teens – or 88% of teen cell
phone users — are text-messagers. That is a sharp rise from the 51% of
teens who were texters in 2006. More than half of teens (54%) are daily
texters. (Lenhardt, et al. 2010)
Texting is a perfect example of why the medium has become more important than the
message. Like traditional forms of communication, digital communications have
developed their own customs and mannerisms. When you get a text from someone,
they expect a text back. If you reply with a phone call you are likely to be scolded and
chastised and may be actually be considered “rude”. Consider the following Facebook
post:
I get a text this morning, "r u up yet?" I was still sleeping so I didn't
respond. since I don't respond so then u call me five mins later??? What
the Fuck? Some people need a Bitch slap in a half (Facebook post)
Texting is in fact an impersonal form of communication with its own vocabulary,
phonemes, and inflection (or lack of). One reason that texting is impersonal is that there
is no voice communication involved that may reveal vocal inflection indicating the
emotional state of the person who made communication. And these problems are
evident in online communications as well.
The rate of worldwide internet usage has doubled in the last 10 years.” About 26
percent of the world's population was online at the end of 2009…” (Ribero 2010) And
with that rate ever increasing we now have the justifications to be concerned about
personal privacy and information security But what are these concerns?
Welcome to my online world
4
The fact that the Digital Age is rapidly changing our communications with other people,
both those we know and strangers is only one area to consider. Much work on the
interpersonal psychology of the Digital Age is available. Another area that needs to be
focused on is the rapidly changing trustworthiness of people and institutions. It isn’t that
they are more untrustworthy now but rather that many tools and resources are available
to demonstrate their untrustworthiness like never before. This will be our focus here.
This is not only true of malicious agents (spammers and phishers, etc.) but those
engaged in legitimate business and marketing on the Internet. The infrastructure of
online commerce largely depends on back-end collection personal information from the
seemingly harmless cookie to profile perusal and other forms of unauthorized
disclosures made regularly on a commercial basis
What a tangled Web they weave
Internet marketing relies on a click-based model. Technically, what makes the Web
work is the hypertext links that appear on every page one visits and when an ad or
banner is either clicked or mouse-over, that represents an event that is registered to a
database stored in the page’s web server. Every behavior displayed by a person while
online, every action of the mouse and keyboard can be recorded, collected and made
available much in the same way as telephone directory and other type of lists were
available in the “old days”.
While there are many resources and strategies for businesses to conduct online
commerce and marketing, we will just cover the nexus between business and social
media. Widespread information is available from almost everywhere the connection
5
between the two. What this means for those concerned with personal intrusion and
surveillance by business and government respectively is what information they get how
they get it and what they use it for.
“Infollecting”
Facebook is the largest and most popular and widely used site. It has since its
beginning managed to become steeped in controversy. Mashable, a supersite for
disseminating Social Media news and information has a large repository of articles
regarding Facebook’s information collection and privacy intrusion behavior. One such
article asks if reports of privacy concerns on the rise are accurate. Another discusses
the information collection habits of Facebook and how user behavior and disregard for
privacy provisions can introduce a risk of unauthorized disclosure of personal data.
Consumer Report’s annual State of the Net study found that people are
increasingly concerned with their privacy on Facebook. The report breaks
down social privacy into a handful of categories: over-sharing by users,
underuse of privacy controls, over-collection of data, over-sharing of data
by apps and cyber bullying or harassment (Fitzgerald 2012).
There are of course concerns about other Social Media- Google + has raised
eyebrows about their privacy policies which have an element of ambition and
user control. According to an article in Mashable, Google has made all of their 70
some policy rule documents into one master document (Freeman, 2012). And
another article discusses the concerns that the public (Fox, 2012) has with
Google’s privacy workarounds in order to amass more ad revenue (Kessler,
2012). Twitter has been in “the hot-seat” a time or two. Mashable covers news
about these two Social Media sites as well.
6
Big Brother is watching
Even though there has always been a considerable amount of citizen surveillance by
government, especially during the Nixon years, it was not until September 11, 2001, that
it was openly justified (although sometimes questionably so). That one act of terrorism
did more to forever change how we protect our personal privacy than any other on
record. The government made a radical departure from its usual citizen surveillance and
accelerated its efforts through the creation of the Department of Homeland Security.
Along with the Federal Bureau of Investigation (FBI) this department has developed
practices and policies that allow it to conduct surveillance on citizens in typical
“McCarthy fashion”.(Note: Senator McCarthy conducted an extensive surveillance
campaign during the height of the Cold War in the 50’s to monitor citizen activity in the
hope of detecting communist supporters. The” witch hunt” singled out many individuals
without substantiation and ruined many lives)
Today communism has been replaced by terrorism. Terrorist activities and suspicion of
terrorism have spurred massive surveillance efforts of citizens by any means available,
including Social Media. The Department of Homeland Security and the FBI openly admit
to tracking what users are sharing on Facebook and Twitter. According to the article
"Homeland Security Tracks These Keywords on Twitter and Facebook”
“Social media outlets provide instant feedback and alert capabilities to
rapidly changing or newly occurring situations,” states U.S. Homeland
Security internal documents. “The [Media Monitoring Capability team]
works to summarize the extensive information from these resources to
provide a well-rounded operational picture for the Department of
Homeland Security.” (Pan, 2012)
7
Your Tax Dollars at work
That these actions by the government are unconstitutional and deprive citizens of their
basic privacy and freedom of speech, this author has no doubt though a debate could
easily be made. But not everyone agrees with the government. A civil liberties and
privacy watchdog, The Electronic Privacy Information Center (EPIC) reports that it used
the Freedom of Information Act to obtain volumes of documents on how DHS monitor
Social Media use. A contract has been made with General Dynamics for developing a
system to enable DHS to monitor and track social media sharing (2-Fitzpatrick, 2012).
Need I go on?
Conclusion
I have given a few examples of how the digital culture has changed the face of
communication and given the reader some cases where the use of social media can
infringe on our privacy and information security. Hackers and other malicious agents
could easily get profile information to stalk former spouses and create spamming
situations. Businesses try to get all the information they can about you through your
online behavior, including what links you click and what banners you mouse over. Often
this information gathering represents an unauthorized disclosure. In a lot of cases the
information is authorized but the use of the information is misrepresented and other
uses that you ar not aware of can happen. We have seen how the government uses
social media to “spy” on citizens in an attempt to uncover possible terrorist tendencies
and national security violations-so they say.
8
Recommendations
While it is not necessarily going to happen that the misuse of personal information by
business and government is going to be successfully dealt with completely, nor are
Social Media sites going to adopt inline safeguards to protect your privacy ( since they
amass revenue from advertising and marketing sources), the recourse lies in public
concern and education. Privacy and Information security watchdogs such as EPIC and
the Privacy Rights Clearinghouse (http://www.privacyrights.org/) can both lobby to
defend our privacy freedoms and provide “privacy education” to allow people to have a
more prudent and wise attitudes and behaviors when going online for any reason. The
Privacy Rights Clearinghouse has all the up to date news, trends, concerns and ways to
take charge of your privacy information.
In conjunction with self-education on online privacy, I would like to see some of these
watchdogs hold national PSA campaigns about privacy protection-kind of like the “Don’t
Drink and Drive” campaigns that seem to be everywhere. The privacy PSA campaign
could have a slogan too (perhaps “Surf Smart”) and basically have different types of
short spots that deal with various privacy topics. I am convinced that the very
technology that has numbed people’s sense of caution can be used for the benefit of
the people and not against them.
9
References
Lenhardt, Amanda, Kristen Purcell, Rich Ling, and Scott Campbell. “Teens and Mobile
Phones”. Rep. Pew Internet, 20 Apr. 2010. Web. 4 May 2012.
<http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx>.
Ribero, John. "More Than One in Four Use Internet Worldwide, Says ITU." CIO. 25 May
2010. Web. 04 May 2012.
<http://www.cio.com/article/595014/More_Than_One_in_Four_Use_Internet_Worldwide
<Says_ITU>.
(1)Fitzpatrick, Alex. "Study Says Facebook Privacy Concerns Are on the Rise-Is It
Accurate?" Mashable. 03 May 2012. Web. 04 May 2012.
<http://mashable.com/2012/05/04/facebook-privacy-concerns-study/>.
(2)Fitzpatrick, Alex. "Lawmakers to Homeland Security: Social Media Monitoring
Threatens Free Speech." Mashable. 16 Feb. 2012. Web. 06 May 2012.
<http://mashable.com/2012/02/16/social-media-homeland-security/>.
Fox, Zoe. "Google Privacy Creeping You Out? Microsoft Says It Has Alternatives."
Mashable. 01 Feb. 2012. Web. 05 May 2012.
<http://mashable.com/2012/02/01/microsoft-google-alternatives/>.
Kessler, Sarah. "Privacy Watchdog Complains to FTC: Google's Search Engine Is
Unfair." Mashable. 12 Jan. 2012. Web. 05 May 2012.
<http://mashable.com/2012/01/12/watchdog-ftc-google-social-search-unfair/>.
Freeman, Kate. "Google Changes Again, Launches One Privacy Policy to Rule Them
All." Mashable. 12 Jan. 2012. Web. 05 May 2012.
10
<http://mashable.com/2012/01/24/google-changes-again-launches-one-privacy-policy-
to-rule-them-all/>.
Pan, Joann. "Homeland Security Tracks These Keywords on Twitter and Facebook."
Mashable. 02 Mar. 2012. Web. 06 May 2012. <http://mashable.com/2012/03/02/social-
networking-monitoring/>.

Weitere ähnliche Inhalte

Was ist angesagt?

Fys social media_debate_paper
Fys social media_debate_paperFys social media_debate_paper
Fys social media_debate_papertshoe
 
Comm 303 50 final alpha
Comm 303 50 final alphaComm 303 50 final alpha
Comm 303 50 final alphaabcapp01
 
social networking NMT
social networking NMTsocial networking NMT
social networking NMTNalini Prasad
 
Journalism fake news disinformation
Journalism fake news disinformationJournalism fake news disinformation
Journalism fake news disinformationVittorio Pasteris
 
10 Ways to Identify Disinformation
10 Ways to Identify Disinformation10 Ways to Identify Disinformation
10 Ways to Identify DisinformationSarah Jackson
 
Fake News, Real Concerns: Developing Information Literate Students (December ...
Fake News, Real Concerns: Developing Information Literate Students (December ...Fake News, Real Concerns: Developing Information Literate Students (December ...
Fake News, Real Concerns: Developing Information Literate Students (December ...ALAeLearningSolutions
 
The case for social media management and archiving
The case for social media management and archivingThe case for social media management and archiving
The case for social media management and archivingActiance, Inc.
 
Introduction to social media
Introduction to social mediaIntroduction to social media
Introduction to social mediaRobin Low
 
Why you need to focus on social networking in your company
Why you need to focus on social networking in your companyWhy you need to focus on social networking in your company
Why you need to focus on social networking in your companyActiance, Inc.
 
Actiance whitepaper-ost-federal-unified-communications
Actiance whitepaper-ost-federal-unified-communicationsActiance whitepaper-ost-federal-unified-communications
Actiance whitepaper-ost-federal-unified-communicationsActiance, Inc.
 
Medium: Twitter's Formative Years (2009) Creative Non-Fiction
Medium: Twitter's Formative Years (2009) Creative Non-Fiction Medium: Twitter's Formative Years (2009) Creative Non-Fiction
Medium: Twitter's Formative Years (2009) Creative Non-Fiction Brett Ruffenach
 
Social media honeycomb slideshare
Social media honeycomb slideshareSocial media honeycomb slideshare
Social media honeycomb slideshareIan McCarthy
 
Boston marathon bombings presentation
Boston marathon bombings presentationBoston marathon bombings presentation
Boston marathon bombings presentationCay Coyle
 
Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebookingridkreidler
 

Was ist angesagt? (19)

Fys social media_debate_paper
Fys social media_debate_paperFys social media_debate_paper
Fys social media_debate_paper
 
Meet the e strangers
Meet the e strangersMeet the e strangers
Meet the e strangers
 
Comm 303 50 final alpha
Comm 303 50 final alphaComm 303 50 final alpha
Comm 303 50 final alpha
 
social networking NMT
social networking NMTsocial networking NMT
social networking NMT
 
Quantifying Social Media
Quantifying Social MediaQuantifying Social Media
Quantifying Social Media
 
Journalism fake news disinformation
Journalism fake news disinformationJournalism fake news disinformation
Journalism fake news disinformation
 
10 Ways to Identify Disinformation
10 Ways to Identify Disinformation10 Ways to Identify Disinformation
10 Ways to Identify Disinformation
 
Virtual environment and lying
Virtual environment and lyingVirtual environment and lying
Virtual environment and lying
 
Online Policy Primer
Online Policy PrimerOnline Policy Primer
Online Policy Primer
 
Fake News, Real Concerns: Developing Information Literate Students (December ...
Fake News, Real Concerns: Developing Information Literate Students (December ...Fake News, Real Concerns: Developing Information Literate Students (December ...
Fake News, Real Concerns: Developing Information Literate Students (December ...
 
The case for social media management and archiving
The case for social media management and archivingThe case for social media management and archiving
The case for social media management and archiving
 
Introduction to social media
Introduction to social mediaIntroduction to social media
Introduction to social media
 
Why you need to focus on social networking in your company
Why you need to focus on social networking in your companyWhy you need to focus on social networking in your company
Why you need to focus on social networking in your company
 
Actiance whitepaper-ost-federal-unified-communications
Actiance whitepaper-ost-federal-unified-communicationsActiance whitepaper-ost-federal-unified-communications
Actiance whitepaper-ost-federal-unified-communications
 
Medium: Twitter's Formative Years (2009) Creative Non-Fiction
Medium: Twitter's Formative Years (2009) Creative Non-Fiction Medium: Twitter's Formative Years (2009) Creative Non-Fiction
Medium: Twitter's Formative Years (2009) Creative Non-Fiction
 
Social media honeycomb slideshare
Social media honeycomb slideshareSocial media honeycomb slideshare
Social media honeycomb slideshare
 
Making the Most of Social Media: 7 Lessons from Successful Cities
Making the Most of Social Media: 7 Lessons from Successful CitiesMaking the Most of Social Media: 7 Lessons from Successful Cities
Making the Most of Social Media: 7 Lessons from Successful Cities
 
Boston marathon bombings presentation
Boston marathon bombings presentationBoston marathon bombings presentation
Boston marathon bombings presentation
 
Online Policy Primer: Facebook
Online Policy Primer: FacebookOnline Policy Primer: Facebook
Online Policy Primer: Facebook
 

Andere mochten auch

Progetti protezione-civile-finanziati
Progetti protezione-civile-finanziatiProgetti protezione-civile-finanziati
Progetti protezione-civile-finanziatiwww.oria.info
 
Programma estate 2010 Cisternino
Programma estate 2010 CisterninoProgramma estate 2010 Cisternino
Programma estate 2010 Cisterninowww.oria.info
 
Polizia municipale oria 2013
Polizia municipale oria 2013Polizia municipale oria 2013
Polizia municipale oria 2013www.oria.info
 
Oria informa-luglio-agosto-2010
Oria informa-luglio-agosto-2010Oria informa-luglio-agosto-2010
Oria informa-luglio-agosto-2010www.oria.info
 
Nonno vigile Oria 2013
Nonno vigile Oria 2013Nonno vigile Oria 2013
Nonno vigile Oria 2013www.oria.info
 
Ordinanza commissario xylella eradicazioni
Ordinanza commissario xylella eradicazioniOrdinanza commissario xylella eradicazioni
Ordinanza commissario xylella eradicazioniwww.oria.info
 

Andere mochten auch (9)

Bando vigile-urbano
Bando vigile-urbanoBando vigile-urbano
Bando vigile-urbano
 
Spedizione multe
Spedizione multeSpedizione multe
Spedizione multe
 
Progetti protezione-civile-finanziati
Progetti protezione-civile-finanziatiProgetti protezione-civile-finanziati
Progetti protezione-civile-finanziati
 
Programma estate 2010 Cisternino
Programma estate 2010 CisterninoProgramma estate 2010 Cisternino
Programma estate 2010 Cisternino
 
Polizia municipale oria 2013
Polizia municipale oria 2013Polizia municipale oria 2013
Polizia municipale oria 2013
 
Oria informa-luglio-agosto-2010
Oria informa-luglio-agosto-2010Oria informa-luglio-agosto-2010
Oria informa-luglio-agosto-2010
 
Decreto aib
Decreto aibDecreto aib
Decreto aib
 
Nonno vigile Oria 2013
Nonno vigile Oria 2013Nonno vigile Oria 2013
Nonno vigile Oria 2013
 
Ordinanza commissario xylella eradicazioni
Ordinanza commissario xylella eradicazioniOrdinanza commissario xylella eradicazioni
Ordinanza commissario xylella eradicazioni
 

Ähnlich wie Social-Media

Social media Hurting Society
Social media Hurting SocietySocial media Hurting Society
Social media Hurting Societyemmaclare88
 
Web Science Session 2: Social Media
Web Science Session 2: Social MediaWeb Science Session 2: Social Media
Web Science Session 2: Social MediaStefanie Panke
 
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docxWeb 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docxdavieec5f
 
The age of fractured truth – subhash dhuliya
The age of fractured truth – subhash dhuliyaThe age of fractured truth – subhash dhuliya
The age of fractured truth – subhash dhuliyaGmeconline
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaKelly Ratkovic
 
Media literacy in the age of information overload
Media literacy in the age of information overloadMedia literacy in the age of information overload
Media literacy in the age of information overloadGmeconline
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftHeather Dionne
 
Pitfalls of Social MediaSome disadvantages of social network.docx
Pitfalls of Social MediaSome disadvantages of social network.docxPitfalls of Social MediaSome disadvantages of social network.docx
Pitfalls of Social MediaSome disadvantages of social network.docxrandymartin91030
 
Infographic Poster Report
Infographic Poster ReportInfographic Poster Report
Infographic Poster ReportFarah Sham
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Dave Holland
 

Ähnlich wie Social-Media (15)

Social media Hurting Society
Social media Hurting SocietySocial media Hurting Society
Social media Hurting Society
 
Web Science Session 2: Social Media
Web Science Session 2: Social MediaWeb Science Session 2: Social Media
Web Science Session 2: Social Media
 
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docxWeb 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
Web 2.0 2001–PresentAssignment OverviewIt is a truism in the st.docx
 
The age of fractured truth – subhash dhuliya
The age of fractured truth – subhash dhuliyaThe age of fractured truth – subhash dhuliya
The age of fractured truth – subhash dhuliya
 
Invasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian MediaInvasion Of Privacy In Canadian Media
Invasion Of Privacy In Canadian Media
 
Media literacy in the age of information overload
Media literacy in the age of information overloadMedia literacy in the age of information overload
Media literacy in the age of information overload
 
broadcast media assignment
broadcast media assignmentbroadcast media assignment
broadcast media assignment
 
Sm
SmSm
Sm
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
 
Pitfalls of Social MediaSome disadvantages of social network.docx
Pitfalls of Social MediaSome disadvantages of social network.docxPitfalls of Social MediaSome disadvantages of social network.docx
Pitfalls of Social MediaSome disadvantages of social network.docx
 
Sm
SmSm
Sm
 
104 190322 Bookclub-The Power of Real-Time Social Media Marketing
104 190322 Bookclub-The Power of Real-Time Social Media Marketing104 190322 Bookclub-The Power of Real-Time Social Media Marketing
104 190322 Bookclub-The Power of Real-Time Social Media Marketing
 
Il poster
Il posterIl poster
Il poster
 
Infographic Poster Report
Infographic Poster ReportInfographic Poster Report
Infographic Poster Report
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...
 

Social-Media

  • 1. SOCIAL MEDIA AND INFORMATION SECURITY BY:ALEXANDER DEUCALION
  • 2. 1 Introduction: An Analogy It used to be that you could tell what you looked like by standing in front of a mirror. You could obtain quite a bit of information about yourself and also decide which and how much of this personal information you would be willing to let others know; in fact let the whole world know. But nowadays you don’t usually stand in front of a mirror, but rather sit in front of a computer and so now it has become a whole new ball game. Unlike a mirror that gives you an accurate representation of what you look like that can only be seen by you ( and anyone that might be standing by you), the computer is the new mirror- a gateway to a world that has more information about yourself than what you know. Starting to get creeped -out? Hang-on, you haven’t seen anything yet. The bad news is that an undeterminable number of people are collecting and selling information about you. Is there any good news? Don’t worry; by the end of this paper we will determine that. Purpose The purpose of this paper is to explore how technology is driving the virtualization of society and its mores, the trends in cyber-culture and their impact on personal privacy and the risk and prevalence of unauthorized disclosures. Given the pervasiveness of public participation in and around unregulated practices of social media and online marketing, this paper will also focus on the risks that both individuals and businesses are facing regarding privacy violation and information security, respectively.
  • 3. 2 Lastly, we will look closely at social media from the interpersonal communication perspective. How has virtualization affected our ability to interact with people? There are quite a few personal stories and observations about how people who converse frequently using social media indicate being uncomfortable at the prospect of meeting in person. Virtualization and Social media has drawn new lines for social interaction remarkably different from traditional methods and these lines are not to be crossed. Whether these trends are beneficial is a debate that has become mot given the revolutionary reality of how we interact and respond with one another, with businesses and with government. Virtual me One of the effects of the technology explosion of today is the memory lapse we seem to develop when asked to think for more than two or three years back. For example-who can remember how life was before texting first become available and widely used? Another effect is the importance placed on the medium over the importance of the message. Cyber-culture and digital communications have adopted their own protocols and customs which as will be seen, rely on anonymity and transparency. And it isn’t only online communications but off-line digital communications such as cell phones as well. Don’t call me-I’ll text you Texting is by far the most widespread and popular form of communication in the Digital Age right now:
  • 4. 3 Cell-phone texting has become the preferred channel of basic communication between teens and their friends and cell calling is a close second. Some 75% of 12-17 year-olds now own cell phones, up from 45% in 2004. Those phones have become indispensable tools in teen communication patterns. Fully 72% of all teens – or 88% of teen cell phone users — are text-messagers. That is a sharp rise from the 51% of teens who were texters in 2006. More than half of teens (54%) are daily texters. (Lenhardt, et al. 2010) Texting is a perfect example of why the medium has become more important than the message. Like traditional forms of communication, digital communications have developed their own customs and mannerisms. When you get a text from someone, they expect a text back. If you reply with a phone call you are likely to be scolded and chastised and may be actually be considered “rude”. Consider the following Facebook post: I get a text this morning, "r u up yet?" I was still sleeping so I didn't respond. since I don't respond so then u call me five mins later??? What the Fuck? Some people need a Bitch slap in a half (Facebook post) Texting is in fact an impersonal form of communication with its own vocabulary, phonemes, and inflection (or lack of). One reason that texting is impersonal is that there is no voice communication involved that may reveal vocal inflection indicating the emotional state of the person who made communication. And these problems are evident in online communications as well. The rate of worldwide internet usage has doubled in the last 10 years.” About 26 percent of the world's population was online at the end of 2009…” (Ribero 2010) And with that rate ever increasing we now have the justifications to be concerned about personal privacy and information security But what are these concerns? Welcome to my online world
  • 5. 4 The fact that the Digital Age is rapidly changing our communications with other people, both those we know and strangers is only one area to consider. Much work on the interpersonal psychology of the Digital Age is available. Another area that needs to be focused on is the rapidly changing trustworthiness of people and institutions. It isn’t that they are more untrustworthy now but rather that many tools and resources are available to demonstrate their untrustworthiness like never before. This will be our focus here. This is not only true of malicious agents (spammers and phishers, etc.) but those engaged in legitimate business and marketing on the Internet. The infrastructure of online commerce largely depends on back-end collection personal information from the seemingly harmless cookie to profile perusal and other forms of unauthorized disclosures made regularly on a commercial basis What a tangled Web they weave Internet marketing relies on a click-based model. Technically, what makes the Web work is the hypertext links that appear on every page one visits and when an ad or banner is either clicked or mouse-over, that represents an event that is registered to a database stored in the page’s web server. Every behavior displayed by a person while online, every action of the mouse and keyboard can be recorded, collected and made available much in the same way as telephone directory and other type of lists were available in the “old days”. While there are many resources and strategies for businesses to conduct online commerce and marketing, we will just cover the nexus between business and social media. Widespread information is available from almost everywhere the connection
  • 6. 5 between the two. What this means for those concerned with personal intrusion and surveillance by business and government respectively is what information they get how they get it and what they use it for. “Infollecting” Facebook is the largest and most popular and widely used site. It has since its beginning managed to become steeped in controversy. Mashable, a supersite for disseminating Social Media news and information has a large repository of articles regarding Facebook’s information collection and privacy intrusion behavior. One such article asks if reports of privacy concerns on the rise are accurate. Another discusses the information collection habits of Facebook and how user behavior and disregard for privacy provisions can introduce a risk of unauthorized disclosure of personal data. Consumer Report’s annual State of the Net study found that people are increasingly concerned with their privacy on Facebook. The report breaks down social privacy into a handful of categories: over-sharing by users, underuse of privacy controls, over-collection of data, over-sharing of data by apps and cyber bullying or harassment (Fitzgerald 2012). There are of course concerns about other Social Media- Google + has raised eyebrows about their privacy policies which have an element of ambition and user control. According to an article in Mashable, Google has made all of their 70 some policy rule documents into one master document (Freeman, 2012). And another article discusses the concerns that the public (Fox, 2012) has with Google’s privacy workarounds in order to amass more ad revenue (Kessler, 2012). Twitter has been in “the hot-seat” a time or two. Mashable covers news about these two Social Media sites as well.
  • 7. 6 Big Brother is watching Even though there has always been a considerable amount of citizen surveillance by government, especially during the Nixon years, it was not until September 11, 2001, that it was openly justified (although sometimes questionably so). That one act of terrorism did more to forever change how we protect our personal privacy than any other on record. The government made a radical departure from its usual citizen surveillance and accelerated its efforts through the creation of the Department of Homeland Security. Along with the Federal Bureau of Investigation (FBI) this department has developed practices and policies that allow it to conduct surveillance on citizens in typical “McCarthy fashion”.(Note: Senator McCarthy conducted an extensive surveillance campaign during the height of the Cold War in the 50’s to monitor citizen activity in the hope of detecting communist supporters. The” witch hunt” singled out many individuals without substantiation and ruined many lives) Today communism has been replaced by terrorism. Terrorist activities and suspicion of terrorism have spurred massive surveillance efforts of citizens by any means available, including Social Media. The Department of Homeland Security and the FBI openly admit to tracking what users are sharing on Facebook and Twitter. According to the article "Homeland Security Tracks These Keywords on Twitter and Facebook” “Social media outlets provide instant feedback and alert capabilities to rapidly changing or newly occurring situations,” states U.S. Homeland Security internal documents. “The [Media Monitoring Capability team] works to summarize the extensive information from these resources to provide a well-rounded operational picture for the Department of Homeland Security.” (Pan, 2012)
  • 8. 7 Your Tax Dollars at work That these actions by the government are unconstitutional and deprive citizens of their basic privacy and freedom of speech, this author has no doubt though a debate could easily be made. But not everyone agrees with the government. A civil liberties and privacy watchdog, The Electronic Privacy Information Center (EPIC) reports that it used the Freedom of Information Act to obtain volumes of documents on how DHS monitor Social Media use. A contract has been made with General Dynamics for developing a system to enable DHS to monitor and track social media sharing (2-Fitzpatrick, 2012). Need I go on? Conclusion I have given a few examples of how the digital culture has changed the face of communication and given the reader some cases where the use of social media can infringe on our privacy and information security. Hackers and other malicious agents could easily get profile information to stalk former spouses and create spamming situations. Businesses try to get all the information they can about you through your online behavior, including what links you click and what banners you mouse over. Often this information gathering represents an unauthorized disclosure. In a lot of cases the information is authorized but the use of the information is misrepresented and other uses that you ar not aware of can happen. We have seen how the government uses social media to “spy” on citizens in an attempt to uncover possible terrorist tendencies and national security violations-so they say.
  • 9. 8 Recommendations While it is not necessarily going to happen that the misuse of personal information by business and government is going to be successfully dealt with completely, nor are Social Media sites going to adopt inline safeguards to protect your privacy ( since they amass revenue from advertising and marketing sources), the recourse lies in public concern and education. Privacy and Information security watchdogs such as EPIC and the Privacy Rights Clearinghouse (http://www.privacyrights.org/) can both lobby to defend our privacy freedoms and provide “privacy education” to allow people to have a more prudent and wise attitudes and behaviors when going online for any reason. The Privacy Rights Clearinghouse has all the up to date news, trends, concerns and ways to take charge of your privacy information. In conjunction with self-education on online privacy, I would like to see some of these watchdogs hold national PSA campaigns about privacy protection-kind of like the “Don’t Drink and Drive” campaigns that seem to be everywhere. The privacy PSA campaign could have a slogan too (perhaps “Surf Smart”) and basically have different types of short spots that deal with various privacy topics. I am convinced that the very technology that has numbed people’s sense of caution can be used for the benefit of the people and not against them.
  • 10. 9 References Lenhardt, Amanda, Kristen Purcell, Rich Ling, and Scott Campbell. “Teens and Mobile Phones”. Rep. Pew Internet, 20 Apr. 2010. Web. 4 May 2012. <http://www.pewinternet.org/Reports/2010/Teens-and-Mobile-Phones.aspx>. Ribero, John. "More Than One in Four Use Internet Worldwide, Says ITU." CIO. 25 May 2010. Web. 04 May 2012. <http://www.cio.com/article/595014/More_Than_One_in_Four_Use_Internet_Worldwide <Says_ITU>. (1)Fitzpatrick, Alex. "Study Says Facebook Privacy Concerns Are on the Rise-Is It Accurate?" Mashable. 03 May 2012. Web. 04 May 2012. <http://mashable.com/2012/05/04/facebook-privacy-concerns-study/>. (2)Fitzpatrick, Alex. "Lawmakers to Homeland Security: Social Media Monitoring Threatens Free Speech." Mashable. 16 Feb. 2012. Web. 06 May 2012. <http://mashable.com/2012/02/16/social-media-homeland-security/>. Fox, Zoe. "Google Privacy Creeping You Out? Microsoft Says It Has Alternatives." Mashable. 01 Feb. 2012. Web. 05 May 2012. <http://mashable.com/2012/02/01/microsoft-google-alternatives/>. Kessler, Sarah. "Privacy Watchdog Complains to FTC: Google's Search Engine Is Unfair." Mashable. 12 Jan. 2012. Web. 05 May 2012. <http://mashable.com/2012/01/12/watchdog-ftc-google-social-search-unfair/>. Freeman, Kate. "Google Changes Again, Launches One Privacy Policy to Rule Them All." Mashable. 12 Jan. 2012. Web. 05 May 2012.
  • 11. 10 <http://mashable.com/2012/01/24/google-changes-again-launches-one-privacy-policy- to-rule-them-all/>. Pan, Joann. "Homeland Security Tracks These Keywords on Twitter and Facebook." Mashable. 02 Mar. 2012. Web. 06 May 2012. <http://mashable.com/2012/03/02/social- networking-monitoring/>.