SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Social Networking Sites Selling
Information to Third Parties
Huffington Post, 2014
Introduction
• Some social media sites have started selling
information about their users to third parties.
These third parties take personal information
that has been shared with users friends and
families, and use it to try to advertise to
specific people better. This may seem
harmless, but knowing that your personal
information is no longer personal at all can be
quite frightening.
Examples of Companies Selling Users
Information to Third Parties
– Facebook makes money by selling information about
your friends, hobbies, age, relationship status, etc.
– Google uses information from Gmail’s, things you’ve
searched, etc. to make money from advertisers
– Twitter uses “tweets” to make a profit
by selling the popular ones to advertisers
– YouTube targets ads based on videos watch
Cont’d
– Pinterest is legally allowed to sell names,
numbers, email addresses, and third parties
– LinkedIn has a new “Pro” option that
charges users for a feature that tells
them who has visited their page and what they
thought of it
– Tumblr has sold its users’ information to Yahoo!
Hendricks, 2014
Facebook
– Facebook has released that they sell personal
information to advertisers, developers and partners
– Personal information posted on Facebook by users is
being shared with millions of companies
– When Facebook users “Like” something, information
is given to advertisers
http://www.nytimes.com/2012/02/05/opinion/sunday/f
acebook-is-using-you.html?pagewanted=all&_r=2&
Facebook Logo
Detail, n.d
Google
• Where does Google’s Money come From?
– Google made an estimated $36.5 billion through
advertising in 2011
• How does Google make it’s money?
– Google sells information from users anywhere
from a Google search to information inside a
Gmail
http://www.techradar.com/news/internet/trusting-
your-private-data-to-google-is-like-trusting-your-
chickens-to-mr-fox-1173302
Google is Evil,
n.d.
Twitter
• Twitter sells promoted tweets to firms
interested in learning more about consumers
• Twitter generated $32 million licensing its
data
• Once firms have purchased information from
Twitter, they resell the data to analytics
companies.
http://business.time.com/2013/10/08/twitter-
is-selling-access-to-your-tweets-for-millions/
Evil Twitter
Logo, 2012
• LinkedIn sells information to its own users,
offering to show them who’s viewed their
profile.
• This feature is called the “Pro” feature.
• LinkedIn promotes its own privacy policy, that
it has personally violated by selling
information back to users.
http://www.hive76.org/linkedin-is-selling-your-
clicks-and-violating-its-own-privacy-policy
Logo for Linkedin, 2013
Pinterest
• It is recorded in Pinterest’s privacy policy that
users’ information can be sold.
• It is not known specifically what is sold
• But the company is able to sell any information it
collects, such as:
– Names
– Phone numbers
– Email adresses
– And more
http://blog.hotspotshield.com/2013/06/25/social-
media-privacy-concerns/
• Tumblr sold all of its information to Yahoo!
• Tumblr is a blog style website where users often
feel it’s appropriate to share extremely personal
information to their readers
• Giving a magnitude of personal information to
one of the internet’s largest corporations many
are considering a huge breach in user privacy
http://blog.hotspotshield.com/2013/06/25/social-
media-privacy-concerns/
Logo for Tumblr, n.d
• YouTube has converted over to target
marketing.
• This is controversial because YouTube has to
sell information about what users are watching
to companies to show Ads that directly targets
each user’s interests.
• Google has emphasized that this service is only
done on YouTube.
http://www.theguardian.com/media/2009/mar/
11/googlethemedia-google
YouTube
Legality
• Before a user can access a social network, he or
she must read and accept a privacy policy.
• It is understood by social networks that most
users neglect to read these policies
• This allows for social networks to put
controversial statements in their policies
• This takes the legal responsibility away from
social networks
https://www.privacyrights.org/social-networking-
privacy-how-be-safe-secure-and-social#laws
Law, 2013
How to Protect Yourself
• Avoid
– Full names when signing up for social media sites
– Using your everyday email account when signing
up for social media so that it won’t be spammed
with junk mail
– Using these social media sites all together if you
are very concerned about your personal
information being sold to larger companies
Internet Security,
n.d.
Implications
– Information found online has been used against
people in court because legally law enforcement is
allowed to have full access to anything online
– You may be turned down for credit or insurance
because these companies have access to your
online information
– Users have no ability to know where their
personal information has gone or where it is being
stored
In Summary
– Large internet companies have been able and will
continue to sell your personal information online
– There are many ways to protect yourself from
these companies and keep your information
personal
– Ultimately the best thing to do is properly educate
yourself on the user agreements before signing
your life away
References
Google is Evil. n.d. Evil Google logo. Retrieved from
http://images.seroundtable.com/google-is-evil-300x270-1314103412.jpg
Facebook Logo Detail. n.d. Facebook logo. Retrieved from
http://www.underconsideration.com/bran
dnew/archives/facebook_logo_detail.gif
Huffington Post (2014). Social Media. Retrieved from
http://images.huffingtonpost.com/2014-05-06-socialmedia.jpg
Hendricks, D. (2014). Social Media Tips. Retrieved from
http://drewahendricks.com/wp-content/uploads/2014/06/social-media-
tips.jpg
Evil Twitter Logo. (2012). Twitter Bird with Horns. Retrieved from
http://www.hyphenet.com/blog/wp-content/uploads/2012/11/twitter-bird-
with-horns.png
Logo for Linkedin. (2013). Linkedin Logo. Retrieved from
http://www.nitahelpinghand.net/wp-content/uploads/2013/04/linkedin-
logo.png
Logo for Tumblr. n.d. Tumblr Logo. Retrieved from
http://upload.wikimedia.org/wikipedia/commons/2/2c/Tumblr_Logo.svg
References
Law. (2013). Gavel picture. Retrieved from http://www.everything-
taxidermy.com/wp-content/uploads/2013/05/law.jpg
Internet Security. n.d. Lock and earth. Retrieved from http://3.bp.blogspot.com/-
RVgH8LzKEW4/TsEH6FCpyXI/AAAAAAAAA
A0/HzzfbqeAQN4/s1600/internetsecurity.png
Andrews, L. (2012). Facebook is Using you. Sunday Review. Retrieved from
http://www.nytimes.com/2012/02/05/opinion/sunday/facebook-is-using-
you.html?pagewanted=all&_r=4&
Luckerson, V. (2013). Twitter is Selling Access to your Tweets for Millions. Time.
Retrieved from http://business.time.com/2013/10/08/twitter-is-selling-
access-to-your-tweets-for-millions/
Marshall, G. (2013). Trusting your private data to Google is like trusting your chickens
to Mr Fox. Techradar. Retrieved from
http://www.techradar.com/news/internet/trusting-your-private-data-to-
google-is-like-trusting-your-chickens-to-mr-fox-1173302
Jmil. (2012). LinkedIn is selling your clicks and violating its own Privacy Policy. Hive76.
Retrieved from http://www.hive76.org/linkedin-is-selling-your-clicks-and-
violating-its-own-privacy-policy
References
Nguyen, P. (2013). Social Media Privacy Policy Loopholes You
Need to Know About. Hotspot Shield. Retrieved from
http://blog.hotspotshield.com/2013/06/2 5/social-
media-privacy-concerns/
Kiss, J. (2009). Google introduces targeted display ads on sites
including YouTube. Theguardian. Retrieved from
http://www.theguardian.com/media/2009/m
ar/11/googlethemedia-google
(2014). Fact Sheet 35: Social Networking Privacy: How to be S
afe, Secure and Social. Privacy Rights Clearinghouse.
Retrieved from https://www.privacyrights.org/social-
networking-privacy-how-be-safe-secure-and-
social#laws

Weitere ähnliche Inhalte

Was ist angesagt?

Chapter 1 profile of tourism and hospitality
Chapter 1  profile of tourism and hospitalityChapter 1  profile of tourism and hospitality
Chapter 1 profile of tourism and hospitality
zaiadlina_1234
 
The role of public sector in tourism development, Goran Petkovic
The role of public sector in tourism development, Goran PetkovicThe role of public sector in tourism development, Goran Petkovic
The role of public sector in tourism development, Goran Petkovic
BORN
 
Principles of Tourism Chapter 7
Principles of Tourism Chapter 7Principles of Tourism Chapter 7
Principles of Tourism Chapter 7
Jercel Tumaque
 

Was ist angesagt? (20)

Corporate Travel Management
Corporate Travel ManagementCorporate Travel Management
Corporate Travel Management
 
Lesson 5 flight itinerary plan
Lesson 5 flight itinerary planLesson 5 flight itinerary plan
Lesson 5 flight itinerary plan
 
Chapter 4 Package Tour Development (Travel Agency & Tour Operations)
Chapter 4  Package Tour Development (Travel Agency & Tour Operations)Chapter 4  Package Tour Development (Travel Agency & Tour Operations)
Chapter 4 Package Tour Development (Travel Agency & Tour Operations)
 
Global distribution system(gds)
Global distribution system(gds)Global distribution system(gds)
Global distribution system(gds)
 
Tourism Destination Marketing Part One
Tourism Destination Marketing Part OneTourism Destination Marketing Part One
Tourism Destination Marketing Part One
 
Tourism marketing
Tourism marketingTourism marketing
Tourism marketing
 
Chapter 1 profile of tourism and hospitality
Chapter 1  profile of tourism and hospitalityChapter 1  profile of tourism and hospitality
Chapter 1 profile of tourism and hospitality
 
Marketing Tourism
Marketing TourismMarketing Tourism
Marketing Tourism
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
The role of public sector in tourism development, Goran Petkovic
The role of public sector in tourism development, Goran PetkovicThe role of public sector in tourism development, Goran Petkovic
The role of public sector in tourism development, Goran Petkovic
 
Principles of Tourism Chapter 7
Principles of Tourism Chapter 7Principles of Tourism Chapter 7
Principles of Tourism Chapter 7
 
Chapter 4 Marketing of Tourist Destinations (Destination Management)
Chapter 4   Marketing of Tourist Destinations  (Destination Management)Chapter 4   Marketing of Tourist Destinations  (Destination Management)
Chapter 4 Marketing of Tourist Destinations (Destination Management)
 
Community Participation in the Tourism Development Process
Community Participation in the Tourism Development ProcessCommunity Participation in the Tourism Development Process
Community Participation in the Tourism Development Process
 
Tourism transport and travel management chapter 1
Tourism transport and travel management chapter 1Tourism transport and travel management chapter 1
Tourism transport and travel management chapter 1
 
Service Management Tourism and Travel Services
Service Management Tourism and Travel ServicesService Management Tourism and Travel Services
Service Management Tourism and Travel Services
 
Tourism supply
Tourism supplyTourism supply
Tourism supply
 
Important Travel Requirements (Travel Agency & Tour Operations)
Important Travel Requirements (Travel Agency & Tour Operations)Important Travel Requirements (Travel Agency & Tour Operations)
Important Travel Requirements (Travel Agency & Tour Operations)
 
Types of Tour Operations (Travel Agency & Tour Operations)
Types of Tour Operations (Travel Agency & Tour Operations)Types of Tour Operations (Travel Agency & Tour Operations)
Types of Tour Operations (Travel Agency & Tour Operations)
 
Whole Tourism System Model- Neil Leiper
Whole Tourism System Model- Neil LeiperWhole Tourism System Model- Neil Leiper
Whole Tourism System Model- Neil Leiper
 
Sustainable tourism principles
Sustainable tourism principlesSustainable tourism principles
Sustainable tourism principles
 

Andere mochten auch

Social behavior algorithm
Social behavior algorithmSocial behavior algorithm
Social behavior algorithm
MrSeller Zograf
 
Social Media Stakeholders
Social Media StakeholdersSocial Media Stakeholders
Social Media Stakeholders
Gábor Molnár
 
1 hyperplasia of oral mucosa
1  hyperplasia of oral mucosa1  hyperplasia of oral mucosa
1 hyperplasia of oral mucosa
Tahani Alteen
 
Facebook,Twitter and Linkedin. advantages and Disadvantages
Facebook,Twitter and Linkedin. advantages and DisadvantagesFacebook,Twitter and Linkedin. advantages and Disadvantages
Facebook,Twitter and Linkedin. advantages and Disadvantages
Aseem R
 
Powerpoint Presentation on eBay.com
Powerpoint Presentation on eBay.comPowerpoint Presentation on eBay.com
Powerpoint Presentation on eBay.com
myclass08
 

Andere mochten auch (19)

Social media marketing ppt
Social media marketing pptSocial media marketing ppt
Social media marketing ppt
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Social Media Marketing and private investigation – Don’t be left behind
Social Media Marketing and private investigation – Don’t be left behindSocial Media Marketing and private investigation – Don’t be left behind
Social Media Marketing and private investigation – Don’t be left behind
 
ALGORITHM
ALGORITHMALGORITHM
ALGORITHM
 
Social behavior algorithm
Social behavior algorithmSocial behavior algorithm
Social behavior algorithm
 
Social media unfollow algorithm
Social media  unfollow algorithmSocial media  unfollow algorithm
Social media unfollow algorithm
 
Privacy & Security of Consumer and Employee Information - Conference Materials
Privacy & Security of Consumer and Employee Information - Conference MaterialsPrivacy & Security of Consumer and Employee Information - Conference Materials
Privacy & Security of Consumer and Employee Information - Conference Materials
 
Privacy & Social Media Marketing Bright Talk081009
Privacy & Social Media Marketing Bright Talk081009Privacy & Social Media Marketing Bright Talk081009
Privacy & Social Media Marketing Bright Talk081009
 
Social Media Stakeholders
Social Media StakeholdersSocial Media Stakeholders
Social Media Stakeholders
 
1 hyperplasia of oral mucosa
1  hyperplasia of oral mucosa1  hyperplasia of oral mucosa
1 hyperplasia of oral mucosa
 
Facebook,Twitter and Linkedin. advantages and Disadvantages
Facebook,Twitter and Linkedin. advantages and DisadvantagesFacebook,Twitter and Linkedin. advantages and Disadvantages
Facebook,Twitter and Linkedin. advantages and Disadvantages
 
ebay marketing
ebay marketingebay marketing
ebay marketing
 
Powerpoint Presentation on eBay.com
Powerpoint Presentation on eBay.comPowerpoint Presentation on eBay.com
Powerpoint Presentation on eBay.com
 
The Changing Role of HR
The Changing Role of HRThe Changing Role of HR
The Changing Role of HR
 
Be a Digital Trailblazer When Building Your Brand
Be a Digital Trailblazer When Building Your Brand Be a Digital Trailblazer When Building Your Brand
Be a Digital Trailblazer When Building Your Brand
 
Social Media Marketing PowerPoint Presentation
Social Media Marketing PowerPoint PresentationSocial Media Marketing PowerPoint Presentation
Social Media Marketing PowerPoint Presentation
 
The Minimum Loveable Product
The Minimum Loveable ProductThe Minimum Loveable Product
The Minimum Loveable Product
 
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
How I got 2.5 Million views on Slideshare (by @nickdemey - Board of Innovation)
 
The Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsThe Seven Deadly Social Media Sins
The Seven Deadly Social Media Sins
 

Ähnlich wie Social networking sites selling information to third parties

social and mobile marketingthreeCopyright © 2015 McGraw-Hill.docx
social and mobile marketingthreeCopyright © 2015 McGraw-Hill.docxsocial and mobile marketingthreeCopyright © 2015 McGraw-Hill.docx
social and mobile marketingthreeCopyright © 2015 McGraw-Hill.docx
whitneyleman54422
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
brendaylo
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social Media
jrfields
 
Personal information
Personal informationPersonal information
Personal information
HHSome
 
Social Media Optimization
Social Media OptimizationSocial Media Optimization
Social Media Optimization
taylorspilak
 
Markham and Wells - Recap of Social Media Week: Chicago
Markham and Wells - Recap of Social Media Week: Chicago Markham and Wells - Recap of Social Media Week: Chicago
Markham and Wells - Recap of Social Media Week: Chicago
StoneWard
 

Ähnlich wie Social networking sites selling information to third parties (20)

Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
social and mobile marketingthreeCopyright © 2015 McGraw-Hill.docx
social and mobile marketingthreeCopyright © 2015 McGraw-Hill.docxsocial and mobile marketingthreeCopyright © 2015 McGraw-Hill.docx
social and mobile marketingthreeCopyright © 2015 McGraw-Hill.docx
 
How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)
 
Lewis Silkin's Don't get it wrong #socialmedia Seminar Presentation
Lewis Silkin's Don't get it wrong #socialmedia Seminar PresentationLewis Silkin's Don't get it wrong #socialmedia Seminar Presentation
Lewis Silkin's Don't get it wrong #socialmedia Seminar Presentation
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social Media
 
Personal information
Personal informationPersonal information
Personal information
 
Social Media Optimization
Social Media OptimizationSocial Media Optimization
Social Media Optimization
 
Markham and Wells - Recap of Social Media Week: Chicago
Markham and Wells - Recap of Social Media Week: Chicago Markham and Wells - Recap of Social Media Week: Chicago
Markham and Wells - Recap of Social Media Week: Chicago
 
Deep Web Search Part 2 by Cynthia Hetherington
Deep Web Search Part 2 by Cynthia HetheringtonDeep Web Search Part 2 by Cynthia Hetherington
Deep Web Search Part 2 by Cynthia Hetherington
 
Data protection and privacy in the social web en 17072010
Data protection and privacy in the social web en 17072010Data protection and privacy in the social web en 17072010
Data protection and privacy in the social web en 17072010
 
Designing for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed TalkDesigning for Privacy in an Increasingly Public World — Speed Talk
Designing for Privacy in an Increasingly Public World — Speed Talk
 
From Apps To Tweets Insurance Agents and the Social Web 040310
From Apps To Tweets  Insurance Agents and the Social Web 040310From Apps To Tweets  Insurance Agents and the Social Web 040310
From Apps To Tweets Insurance Agents and the Social Web 040310
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
 
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
 
Social Media for Human Resources - Hire, Retain and Leverage Employees
Social Media for Human Resources - Hire, Retain and Leverage EmployeesSocial Media for Human Resources - Hire, Retain and Leverage Employees
Social Media for Human Resources - Hire, Retain and Leverage Employees
 
Social Media Reputation Management
Social Media Reputation ManagementSocial Media Reputation Management
Social Media Reputation Management
 
Digital Solution
Digital SolutionDigital Solution
Digital Solution
 
Social networking
Social networkingSocial networking
Social networking
 

Social networking sites selling information to third parties

  • 1. Social Networking Sites Selling Information to Third Parties Huffington Post, 2014
  • 2. Introduction • Some social media sites have started selling information about their users to third parties. These third parties take personal information that has been shared with users friends and families, and use it to try to advertise to specific people better. This may seem harmless, but knowing that your personal information is no longer personal at all can be quite frightening.
  • 3. Examples of Companies Selling Users Information to Third Parties – Facebook makes money by selling information about your friends, hobbies, age, relationship status, etc. – Google uses information from Gmail’s, things you’ve searched, etc. to make money from advertisers – Twitter uses “tweets” to make a profit by selling the popular ones to advertisers – YouTube targets ads based on videos watch
  • 4. Cont’d – Pinterest is legally allowed to sell names, numbers, email addresses, and third parties – LinkedIn has a new “Pro” option that charges users for a feature that tells them who has visited their page and what they thought of it – Tumblr has sold its users’ information to Yahoo! Hendricks, 2014
  • 5. Facebook – Facebook has released that they sell personal information to advertisers, developers and partners – Personal information posted on Facebook by users is being shared with millions of companies – When Facebook users “Like” something, information is given to advertisers http://www.nytimes.com/2012/02/05/opinion/sunday/f acebook-is-using-you.html?pagewanted=all&_r=2& Facebook Logo Detail, n.d
  • 6. Google • Where does Google’s Money come From? – Google made an estimated $36.5 billion through advertising in 2011 • How does Google make it’s money? – Google sells information from users anywhere from a Google search to information inside a Gmail http://www.techradar.com/news/internet/trusting- your-private-data-to-google-is-like-trusting-your- chickens-to-mr-fox-1173302 Google is Evil, n.d.
  • 7. Twitter • Twitter sells promoted tweets to firms interested in learning more about consumers • Twitter generated $32 million licensing its data • Once firms have purchased information from Twitter, they resell the data to analytics companies. http://business.time.com/2013/10/08/twitter- is-selling-access-to-your-tweets-for-millions/ Evil Twitter Logo, 2012
  • 8. • LinkedIn sells information to its own users, offering to show them who’s viewed their profile. • This feature is called the “Pro” feature. • LinkedIn promotes its own privacy policy, that it has personally violated by selling information back to users. http://www.hive76.org/linkedin-is-selling-your- clicks-and-violating-its-own-privacy-policy Logo for Linkedin, 2013
  • 9. Pinterest • It is recorded in Pinterest’s privacy policy that users’ information can be sold. • It is not known specifically what is sold • But the company is able to sell any information it collects, such as: – Names – Phone numbers – Email adresses – And more http://blog.hotspotshield.com/2013/06/25/social- media-privacy-concerns/
  • 10. • Tumblr sold all of its information to Yahoo! • Tumblr is a blog style website where users often feel it’s appropriate to share extremely personal information to their readers • Giving a magnitude of personal information to one of the internet’s largest corporations many are considering a huge breach in user privacy http://blog.hotspotshield.com/2013/06/25/social- media-privacy-concerns/ Logo for Tumblr, n.d
  • 11. • YouTube has converted over to target marketing. • This is controversial because YouTube has to sell information about what users are watching to companies to show Ads that directly targets each user’s interests. • Google has emphasized that this service is only done on YouTube. http://www.theguardian.com/media/2009/mar/ 11/googlethemedia-google YouTube
  • 12. Legality • Before a user can access a social network, he or she must read and accept a privacy policy. • It is understood by social networks that most users neglect to read these policies • This allows for social networks to put controversial statements in their policies • This takes the legal responsibility away from social networks https://www.privacyrights.org/social-networking- privacy-how-be-safe-secure-and-social#laws Law, 2013
  • 13. How to Protect Yourself • Avoid – Full names when signing up for social media sites – Using your everyday email account when signing up for social media so that it won’t be spammed with junk mail – Using these social media sites all together if you are very concerned about your personal information being sold to larger companies Internet Security, n.d.
  • 14. Implications – Information found online has been used against people in court because legally law enforcement is allowed to have full access to anything online – You may be turned down for credit or insurance because these companies have access to your online information – Users have no ability to know where their personal information has gone or where it is being stored
  • 15. In Summary – Large internet companies have been able and will continue to sell your personal information online – There are many ways to protect yourself from these companies and keep your information personal – Ultimately the best thing to do is properly educate yourself on the user agreements before signing your life away
  • 16. References Google is Evil. n.d. Evil Google logo. Retrieved from http://images.seroundtable.com/google-is-evil-300x270-1314103412.jpg Facebook Logo Detail. n.d. Facebook logo. Retrieved from http://www.underconsideration.com/bran dnew/archives/facebook_logo_detail.gif Huffington Post (2014). Social Media. Retrieved from http://images.huffingtonpost.com/2014-05-06-socialmedia.jpg Hendricks, D. (2014). Social Media Tips. Retrieved from http://drewahendricks.com/wp-content/uploads/2014/06/social-media- tips.jpg Evil Twitter Logo. (2012). Twitter Bird with Horns. Retrieved from http://www.hyphenet.com/blog/wp-content/uploads/2012/11/twitter-bird- with-horns.png Logo for Linkedin. (2013). Linkedin Logo. Retrieved from http://www.nitahelpinghand.net/wp-content/uploads/2013/04/linkedin- logo.png Logo for Tumblr. n.d. Tumblr Logo. Retrieved from http://upload.wikimedia.org/wikipedia/commons/2/2c/Tumblr_Logo.svg
  • 17. References Law. (2013). Gavel picture. Retrieved from http://www.everything- taxidermy.com/wp-content/uploads/2013/05/law.jpg Internet Security. n.d. Lock and earth. Retrieved from http://3.bp.blogspot.com/- RVgH8LzKEW4/TsEH6FCpyXI/AAAAAAAAA A0/HzzfbqeAQN4/s1600/internetsecurity.png Andrews, L. (2012). Facebook is Using you. Sunday Review. Retrieved from http://www.nytimes.com/2012/02/05/opinion/sunday/facebook-is-using- you.html?pagewanted=all&_r=4& Luckerson, V. (2013). Twitter is Selling Access to your Tweets for Millions. Time. Retrieved from http://business.time.com/2013/10/08/twitter-is-selling- access-to-your-tweets-for-millions/ Marshall, G. (2013). Trusting your private data to Google is like trusting your chickens to Mr Fox. Techradar. Retrieved from http://www.techradar.com/news/internet/trusting-your-private-data-to- google-is-like-trusting-your-chickens-to-mr-fox-1173302 Jmil. (2012). LinkedIn is selling your clicks and violating its own Privacy Policy. Hive76. Retrieved from http://www.hive76.org/linkedin-is-selling-your-clicks-and- violating-its-own-privacy-policy
  • 18. References Nguyen, P. (2013). Social Media Privacy Policy Loopholes You Need to Know About. Hotspot Shield. Retrieved from http://blog.hotspotshield.com/2013/06/2 5/social- media-privacy-concerns/ Kiss, J. (2009). Google introduces targeted display ads on sites including YouTube. Theguardian. Retrieved from http://www.theguardian.com/media/2009/m ar/11/googlethemedia-google (2014). Fact Sheet 35: Social Networking Privacy: How to be S afe, Secure and Social. Privacy Rights Clearinghouse. Retrieved from https://www.privacyrights.org/social- networking-privacy-how-be-safe-secure-and- social#laws