Privacy concerns with social networking services
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages)(Learn how and when to remove this template message)
||It has been suggested that this article be merged with Privacy issues of social networking sites. (Discuss) Proposed since January 2013.|
Social network is a social structure made up of a set of social actors (such as individuals or organizations), sets of dyadic ties, and other social interactions between actors. Privacy concerns with social networking services is a subset of data privacy, involving the right of mandating personal privacy concerning storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via the Internet.
Social network security and privacy issues result from the astronomical amounts of information these sites process each day. Features that invite users to participate in—messages, invitations, photos, open platform applications and other applications are often the venues for others to gain access to a user's private information. In addition, the technologies needed to deal with user’s information may intrude their privacy. More specifically, In the case of Facebook. Adrienne Felt, a Ph.D. candidate at Berkeley, made small headlines last year when she exposed a potentially devastating hole in the framework of Facebook's third-party application programming interface (API). It made it easier for people to lose their privacy. Felt and her co-researchers found that third-party platform applications on Facebook are provided with far more user information than it is needed. This potential privacy breach is actually built into the systematic framework of Facebook. Unfortunately, the flaws render the system to be almost indefensible. "The question for social networks is resolving the difference between mistakes in implementation and what the design of the application platform is intended to allow," said David Evans, Assistant Professor of Computer Science at the University of Virginia. Moreover, there is also the question of who should be hold responsible for the lack of user privacy? According to Evan, the answer to the question is not likely to be found, because a better regulated API would be required for Facebook "to break a lot of applications, [especially when] a lot of companies are trying to make money off [these] applications." Felt agrees with her conclusion, because "there are marketing businesses built on top of the idea that third parties can get access to data and user information on Facebook."
- 1 Causation
- 2 Privacy concerns
- 3 Potential dangers
- 4 Reading a privacy statement in terms and conditions
- 5 Key points to protect social networking privacy
- 6 Response to criticism
- 7 See also
- 8 References
- 9 External links
There are several reasons why invasion of privacy occurs among social network sites.
Various levels of privacy offered
Social networking sites vary in the levels of privacy offered. For some social networking sites like Facebook, providing real names and other personal information is encouraged by the site(onto a page known as a ‘Profile‘). These information usually consist of birth date, current address, and telephone number(s). Some sites also allow users to provide more information about themselves such as interests, hobbies, favorite books or films, and even relationship status. However, there are other social network sites, such as Match.com, where most people prefer to be anonymous. Thus, linking users to their real identity can sometimes be rather difficult. Nevertheless, individuals can sometimes be identified with face re-identification. Studies have been done on two major social networking sites, and it is found that by overlapping 15% of the similar photographs, profile pictures with similar pictures over multiple sites can be matched to identify the users.
For sites that do encourage information disclosure, it has been noted that majority of the users have no trouble disclosing their personal information to a large group of people. In 2005, a study was performed to analyze data of 540 Facebook profiles of students enrolled at Carnegie Mellon University. It was revealed that 89% of the users gave genuine names, and 61% gave a photograph of themselves for easier identification. Majority of users also had not altered their privacy setting, allowing a large number of unknown users to have access to their personal information (the default setting originally allowed friends, friends of friends, and non friends of the same network to have full view of a user‘s profile). It is possible for users to block other users from locating them on Facebook, but this must be done by individual basis, and would therefore appear not to be commonly used for a wide number of people. Most users do not realize that while they may make use of the security features on Facebook the default setting is restored after each update. All of this has led to many concerns that users are displaying far too much information on social networking sites which may have serious implications on their privacy. Facebook was criticized due to the perceived laxity regarding privacy in the default setting for users.
Users are often the targets as well as source of information in social networking. Users leave digital imprints during browsing of social networking sites or services. It has been identified from few of online studies conducted, that users trust websites and social networking sites. As per trust referred, "trust is defined in (Mayer, Davis, and Schoorman, 1995) as “the willingness of a party to be vulnerable to the actions of another party based on the expectation that the other will perform a particular action important to the trustor, irrespective of the ability to monitor or control that other party” (p. 712)". A survey was conducted by Carnegie Mellon University, a majority of users provided their living city, phone numbers among other personal information, while user is clearly unaware of consequences of sharing certain information. Adding to this insight, is the social networking users are from various cities, remote villages, towns, cultures, traditions, religions, background, economic classes, education background, time zones and so on that highlight the significant gap in awareness.
The survey results of the paper suggest, "These results show that the interaction of trust and privacy concern in social networking sites is not yet understood to a sufficient degree to allow accurate modeling of behavior and activity. The results of the study encourage further research in the effort to understand the development of relationships in the online social environment and the reasons for differences in behavior on different sites."
As per reference, a survey conducted among social networking users in Carnegie Mellon University was indicative of following as reasons for lack of user awareness :
1) People's disregard of privacy risks due to trust in privacy and protection offered in social networking sites.
2) Availability of user's personal details to third-party tools/applications.
3) APIs and Frameworks also enable any user, who has fair amount of knowledge to extract the user's data.
4) Cross-site forgery and other possible website threats.
There is hence a dire need for improving User's awareness swiftly, in order to address growing security and privacy concerns caused due to merely user's unawareness. Social networking sites themselves can take a responsibility and make such awareness possible by means of participatory methods by virtual online means.
Data access methods
There are several ways for third parties to access user information.
Application programming interface(API) is a set of routines, protocols, and tools for building software applications. By using query language, sharing content and data between communities and applications became much easier. APIs simplify all that by limiting outside program access to a specific set of features—often enough, requests for data of one sort or another. APIs clearly define exactly how a program will interact with the rest of the software world—saving time.
Search engines are an easy way to find information without scanning every site yourself. Key words that are typed into a search box will lead to the results. So it is necessary to make sure that the keywords typed are precise and correct. There are many of such search engines, some of which may led the user to fake sites which may obtain personal information or are laden with viruses. Furthermore, some search engines, like DuckDuckGo, will not violate the user's privacy.
Benefit from data
According to what you retweet, what you like and the hashtag, Twitter can recommend some topics and advertisements. Twitter’s suggestions for who to follow is done by this recommendation system. Commerce, such as Amazon, make use of uses’ information to recommend items for users. Recommendations are based on at least prior purchases, shopping cart and wishlist. Affinity analysis is a data mining technique that used to understand the purchase behavior of customers.
By using machine learning method, whether a user is a potential follower of Starbucks can be predicted. In that case, it is possible to improve the quality and coverage of applications. In addition, user profiles can be used to identify similar users.
More than 1,000 companies are waiting in line to get access to millions of tweets from users that are using the popular social networking website. Companies believe that by using data mining technologies they would be able to gather important information that can be used for marketing and advertising.
According to Gary Kovacs’s speech about Tracking our online trackers, when he used internet to find an answer to a question, "We are not even 2 bites into breakfast and there are already nearly 25 sites that are tracking me", and he was navigated by 4 of them.
On Facebook, there is one way to ensure protection against applications sharing personal information. On the privacy settings page, you can remove or turn off unwanted or spam applications.
Twitter has admitted that they have scanned and imported their user's phone contacts onto the website database so that they can learn more about their users. Most users were unaware that Twitter is created this way for new users to search for their friends. Twitter has stated that they will have their privacy guidelines illustrated more clearly in the future.
Libraries in the particular, being concerned with the privacy of individuals, have debated on allowing library patrons to access social networking sites on public library computers. While only 19% of librarians reportedly express real concern over social networking privacy, they have been particularly vocal in voicing their concerns. Some have argued that the lack of privacy found on social networking sites is contrary to the ethics supported by Library organizations, and the latter should thus be extremely apprehensive about dealing with the former. Supporters of this view present their argument from the code of ethics held by both the American Library Association and the UK based Chartered Institute of Library and Information Professionals, which affirms a commitment to upholding privacy as a fundamental right. In 2008, a study was performed in fourteen public libraries in the UK which found that 50% blocked access to social networking sites. Many school libraries have also blocked Facebook out of fear that children may be disclosing too much information on Facebook. However, as of 2011, Facebook has taken efforts to combat this concern by deleting profiles of users under the age of thirteen.
As there is so much information provided other things can be deduced, such as the person’s social security number, which can then be used as part of identity theft. In 2009, researchers at Carnegie Mellon University published a study showing that it is possible to predict most and sometimes all of an individual’s 9-digit Social Security number using information gleaned from social networks and online databases. (See Predicting Social Security Numbers from Public Data by Acquisti and Gross)  In response, various groups have advised that users either do not display their number, or hide it from Facebook ‘friends’ they do not personally know. Cases have also appeared of users having photographs stolen from social networking sites in order to assist in identity theft. There is little evidence that users of social networking sites are taking full measures to protect themselves from identity theft. For example, numerous celebrities have claimed their Twitter accounts have been hacked. According to the Huffington Post, Bulgarian IT consultant Bogomil Shopov claimed in a recent blog to have purchased personal information on more than 1 million Facebook users, for the shockingly low price of USD$5.00. The data reportedly included users' full names, email addresses and links to their Facebook pages. The following information could be used to steal the users' identities : Full names including middle name, date of birth, home town, relationship status, residential information, other hobbies and interest.
Most major social networking sites are committed to ensuring that use of their services are as safe as possible. However, due to the high content of personal information placed on social networking sites, as well as the ability to hide behind a pseudo-identity, such sites have become increasingly popular for sexual predators [online]. Further, lack of age verification mechanisms is a cause of concern in these social networking platforms. However, it was also suggested that the majority of these simply transferred to using the services provided by Facebook. While the numbers may remain small, it has been noted that the number of sexual predators caught using social networking sites has been increasing, and has now reached an almost weekly basis. In worst cases children have become victims of pedophiles or lured to meet strangers.They say that sexual predators can lurk anonymously through the wormholes of cyberspace and access victim profiles online. A number of highly publicized cases have demonstrated the threat posed for users, such as Peter Chapman who, under a false name, added over 3, 000 friends and went on to rape and murder a 17-year-old girl in 2009. A 12-year-old, Evergreen girl was safely found by the FBI with the help of Facebook; due to her mother learning of her daughter's conversation with a man she had met on the popular social networking application.
The potential ability for stalking users on social networking sites has been noted and shamed. Popular social networking sites make it easy to build a web of friends and acquaintances, and share with them your photos, whereabouts, contact information, and interests without ever getting the chance to actually meet them. With the amount of information that users post about themselves online, it is easy for users to become a victim of stalking without even being aware of the risk. 63% of Facebook profiles are visible to the public, meaning if you Google someone’s name and you add "+Facebook" in the search bar you pretty much will see most of the persons profile. A study of Facebook profiles from students at Carnegie Mellon University revealed that about 800 profiles included current resident and at least two classes being studied, theoretically allowing viewers to know the precise location of individuals at specific times. AOL attracted controversy over its instant messenger AIM which permits users to add ‘buddies’ without their knowing, and therefore track when a user is online. Concerns have also been raised over the relative ease for people to read private messages or e-mails on social networking sites. Cyber-stalking is a criminal offense that comes into play under state anti-stalking laws, slander laws, and harassment laws. A cyber-stalking conviction can result in a restraining order, probation, or even criminal penalties against the assailant, including jail.
Privacy concerns have also been raised over a number of high-profile incidents which can be considered embarrassing for users. Various internet memes have been started on social networking sites, or been used as a means towards their spread across the internet. In 2002, a Canadian teenager became known as the Star Wars Kid after a video of him using a golf club as a light sabre was posted on the internet without his consent. The video quickly became a hit, much to the embarrassment of the teenager, who claims to have suffered as a result. Along with other incidents of videos being posted on social networking sites, this highlights the ability for personal information to be rapidly transferred between users.
Issues relating to privacy and employment are becoming a concern with regards to social networking sites. As of 2008, it has been estimated by CareerBuilder.com that one in five employers search social networking sites in order to screen potential candidates (increasing from only 11% in 2006). For the majority of employers, such action is to acquire negative information about candidates. For example, 41% of managers considered information relating to candidates’ alcohol and drug use to be a top concern. Other concerns investigated via social networking sites included poor communication skills, inappropriate photographs, inaccurate qualifications and bad-mouthing former employers/colleagues. However, 24% manager claimed that information found on a social networking site persuaded them to hire a candidate, suggesting that a user image can be used in a positive way.
While there is little doubt that employers will continue to use social networking sites as a means of monitoring staff and screening potential candidates, it has been noted that such actions may be illegal under in jurisdictions. According to Workforce.com, employers who use Facebook or Myspace could potentially face legal action:
If a potential employer uses a social networking site to check out a job candidate and then rejects that person based on what they see, he or she could be charged with discrimination. On August 1, 2012, Illinois joined the state of Maryland (law passed in March 2012) in prohibiting employer access to social media web sites of their employees and prospective employees. A number of other states that are also considering such prohibitory legislation (California, Delaware, Massachusetts, Michigan, Minnesota, Missouri, New Jersey, New York, Ohio, South Carolina and Washington), as is the United States Congress. In April 2012, the Social Networking Online Protection Act (2012 H.R. 5050) was introduced in the United States House of Representatives, and the Password Protection Act of 2012 (2012 S. 3074) was introduced in the United States Senate in May 2012, which prohibit employers from requiring access to their employees’ social media web sites.
Monitoring of social networking sites is not limited to potential workers. Issues relating to privacy are becoming an increasing concern for those currently in employment. A number of high-profile cases have appeared in which individuals have been sacked for posting comments on social networking which have been considered disparaging to their current employers or fellow workers. In 2009, sixteen-year-old Kimberley Swann was sacked from her position at Ivell Marketing and Logistics Limited after describing her job as ‘boring’. In 2008, Virgin Atlantic sacked thirteen cabin crew staff, after it emerged they used had criticized the company’s safety standards and called passengers ‘chavs’ on Facebook. There is no federal law that we are aware of that an employer is breaking by monitoring employees on social networking sites. In fact, employers can even hire third-party companies to monitor online employee activity for them. According to an article by Read Write Web employers use the service to "make sure that employees don't leak sensitive information on social networks or engage in any behavior that could damage a company's reputation." While employers may have found such usages of social networking sites convenient, complaints have been put forward by civil liberties groups and trade unions on the invasive approach adopted by many employers. In response to the Kimberley Swann case, Brendan Barber, of the TUC union stated that:
Most employers wouldn't dream of following their staff down the pub to see if they were sounding off about work to their friends," he said. "Just because snooping on personal conversations is possible these days, it doesn't make it healthy."
Monitoring of staff’s social networking activities is also becoming an increasingly common method of ensuring that employees are not browsing websites during work hours. It was estimated in 2010 that an average of two million employees spent over an hour a day on social networking sites, costing potentially £14 billion.
Social networks are designed for individuals to socially interact with other people over the Internet. However, some individuals engaged in undesirable online social behaviors creating negative impacts on other people’s online experiences. It has created a wide range of online interpersonal victimization. Some studies have shown that social network victimization appears largely in adolescent and teens, and the type of victimization includes sexual advances and harassment. Recent research has reported approximately 9% of online victimization involves social network activities. It has been noted that many of these victims are girls who have sexually appealed over these social network sites. Research concludes that many of social network victimizations are associated with user behaviors and interaction with one another. Negative social behaviors such as aggressive attitudes and discussing sexual related topics motivate the offenders to achieve their goals. All in all, positive online social behaviors is promoted to help reduce and avoid online victimization.
Foursquare, Facebook, Loopt are application which allow users to check- in and these capabilities allows a user to share their current location information to their connection. Some of them even update their travel plans on social networking applications.However, the disclosure of location information within these networks can cause privacy concerns among mobile users. Foursquare defines another framework of action for the user. It appears to be in the interest of Foursquare that users provide many personal data that are set as public. This is illustrated, among others, by the fact that, although all the respondents want high control over the (location) privacy settings, almost none of them ever checked the Foursquare privacy settings before  Although there are algorithms using encryption, k-anonymity and noise injection algorithms, its better to understand how the location sharing works in these applications to see if they have good algorithms in place to protect location privacy.
Reading a privacy statement in terms and conditions
This section explains how to read the Privacy statement in terms and conditions while signing up for any social networking site. Most people will skip this section while signing up and seldom understand what they are buying into. But spending a few extra minutes reading through can help tremendously.
1) Who owns the data that a user posts?
2) What happens to the data when the user account is closed?
5) Will the profile page be completely erased when a user deletes the account?
6) Where and how can a user complain in case of any breach in privacy?
7) For how long is the personal information stored?
These questions will give an idea on how safe the social networking site is.
Realize the threats that will always exist
There are people out there who want—and will do just about anything—to get someone’s private information. It's essential to realize that it's difficult to keep your privacy secured all the time.
Be thorough all the time
Always log out. It is dangerous to keep your device logged on since others may have access to your social profiles while you are not paying attention.
Keep your full name and address to yourself. Children’s safety may be compromised if their parents post their whereabouts in a site where others know who their real identities are.
Know the sites
Read the social networking site’s fine prints. Many sites push its users to agree to terms that are best for the sites—not the users. Users should be aware about the terms in case of emergencies. Exactly how to read the terms are explained above at "Reading a Privacy Statement in Terms and Conditions" part
Make sure the social networking site is safe before sharing information. Users shouldn’t be sharing information if they don’t know who are using the websites since their personally identifiable information could be exposed to other users of the site.
Be familiar with the privacy protection provided. Users should take the extra time to get to know the privacy protection systems of various social networks they are or will be using. Only friends should be allowed to access their information. Check the privacy or security settings on every social networking site that they might have to use.
Encrypt devices. Users should use complex passwords on their computers and cell phones and change them from time to time. This will protect users’ information in case these devices are stolen.
Install Anti-virus software. Others would be able to use viruses and other ways to invade a user’s computer if he or she installed something unsafe.
Be careful about taking drastic actions
The users’ privacy may be threatened by any actions. Following actions needs special attention.
(1) Adding a new friend. Facebook reports 8.7% of its total profiles are fake. A user should be sure about who the person is before after it as a new friend.
(2) Clicking on links. Many links which looks attractive like gift cards are specially designed by malicious users. Clicking on these links may result in losing personal information or money.
(3) Think twice about posting revealing photos. A revealing photo could attract the attention of potential criminals.
Response to criticism
Many social networking organizations have responded to criticism and concerns over privacy. It is claimed that changes to default settings, the storage of data and sharing with third parties have all been updated and corrected in the light of criticism, and/or legal challenges. However, many critics remain unsatisfied, noting that fundamental changes to privacy settings in many social networking sites remain minor, and argue that social networking companies prefer to criticize users rather than adapt their policies.
- Social networking service
- Information privacy
- Social media
- Criticism of Facebook
- Unauthorized access in online social networks
- Anonymous social media
- Gross, R. and Acquisti, A. 2005. Information Revelation and Privacy in Online Social Networking Sites (The Facebook Case).[online]. p. 2. Available at: http://www.heinz.cmu.edu/~acquisti/papers/privacy-facebook-gross-acquisti.pdf [Accessed 24 April 2011].
- Kelly, S. Identity ‘at risk’ on Facebook. BBC News. [online]. Available at: http://news.bbc.co.uk/1/hi/programmes/click_online/7375772.stm [Accessed 25 April 2011].
- Dwyer, C., Hiltz, S., & Passerini, K. "Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace". Association for Information Systems AIS Electronic Library (AISeL). AMCIS 2007 Proceedings. Retrieved 2007.
- Luo, W., Xie, Q., & Hengartner, U. "FaceCloak: An Architecture for User Privacy on Social Networking Sites". IEEE Xplore. IEEE. Retrieved 2009.
- "How to Stop Facebook from Sharing Your Information With Third Parties".
- "Facebook Secretly Sold Your Identity to Advertisers".
- "What APIs Are And Why They're Important". readwrite.
- "5 alternative search engines that respect your privacy".
- "About Twitter's suggestions for who to follow".
- "Democrats, republicans and starbucks afficionados: user classification in twitter". KDD '11 Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining: 430–438. 2011-08-21. doi:10.1145/2020408.2020477.
- gladdis, keith (28 February 2012). "Twitter secrets for sale: Privacy row as every tweet for last two years is bought up by data firm". London: daily mail. Retrieved 30 March 2012.
- "tracking our online trackers".
- "Twitter admits peeking at address books, announces privacy improvements. Twitter spokeswoman Carolyn Penner said they will use "Upload your contacts" and "import your contacts" for iPhone and Android apps respectively to replace "Scan your contacts" to make it more explicit". sky news. 16 February 2012. Retrieved 30 March 2012.
- Fernandez, P. 2009. Online Social Networking Sites and Privacy: Revisiting Ethical Considerations for a New Generation of Technology. [online]. Available at: http://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1250&context=libphilprac [Accessed 25 April 2011]
- McMenemy, D. 2008. Internet access in UK public libraries: notes and queries from a small scale study [abstract only]. Library Review [online]. Available at: http://www.emeraldinsight.com/journals.htm?issn=0024-2535&volume=57&issue=7&articleid=1740622&show=html [Accessed 25 April 2011]
- Smith, C. 2011. Facebook Removes 20, 000 Underage Users Every Day. The Huffington Post. [online]. Available at:  [Accessed 25 April 2011]
- Gross, R. and Acquisti, A. 2005. Information Revelation and Privacy in Online Social Networking Sites (The Facebook Case).[online]. p. 8. Available at: http://www.heinz.cmu.edu/~acquisti/papers/privacy-facebook-gross-acquisti.pdf [Accessed 24 April 2011].
- "Social Networking Privacy: How to be Safe, Secure and Social - Privacy Rights Clearinghouse". privacyrights.org.
- myID.com. 2011. Social Network Profiles Help Identity Thieves Guess Your Social Security Number. [online]. Available at: http://www.myid.com/social-network-profiles-help-thieves-guess-your-social-security-number. [Accessed 25 April 2011]
- MSNBC. 2011. Kids’ pictures on Facebook exposes them to identity theft. [online]. Available at: http://www.msnbc.msn.com/id/42593880/ns/local_news-bakersfield_ca/ [Accessed 25 April 2011]
- myers, alexandra. "After a Twitter hack, ‘biebermyballs’ becomes a popular hashtag". daily caller. Retrieved 30 March 2012.
- "Bogomil Shopov, Bulgarian Tech Consultant: 1 Million Users' Private Facebook Data Available Online For $5 (VIDEO)". The Huffington Post.
- http://techcrunch.com/2009/02/03/thousands-of-myspace-sex-offender-refugees-found-on-facebook/ [Accessed: 24 April 2011]
- Facebook Help Center. 2011. How can I report a convicted sex offender? [online]. Available at: http://www.facebook.com/help/?faq=15160 [Accessed 24 April 2011]
- Randall, D. and Richards, V. Facebook can ruin your life. And so can Myspace, Bebo…. The Independent [online]. Available at: http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-can-ruin-your-life-and-so-can-myspace-bebo-780521.html. [Accessed 24 April 2011]
- Smith, C. 2010. Serial Sex Offender Admits Using Facebook To Rape and Murder Teen. The Huffington Post. [online]. Available at: http://www.huffingtonpost.com/2010/03/08/peter-chapman-admits-usin_n_489674.html [Accessed 24 April 2011]
- "Social Media and Cyber Stalking Facts - Advice and Tips on Staying Protected". seomworld.com.
- Malone, S. 2005. CLARIFICATION: AOL Instant messenger users ‘waive right to privacy’. [online]. Available at: http://www.pcpro.co.uk/news/70262/clarification-aol-instant-messenger-users-waive-right-to-privacy [Accessed 24 April 2011]
- Bennet, J. n.d. Internet Memes. [online]. Available at: http://2010.newsweek.com/top-10/internet-memes/the-star-wars-kid.html [Accessed 25 April 2011]
- Havenstein, H. 2008. One in five employers uses social networks in hiring process. [online]. Available at: http://www.computerworld.com/s/article/9114560/One_in_five_employers_uses_social_networks_in_hiring_process [Accessed 24 April 2011]
- Bowers, T. 2008. Employers who check out job candidates on MySpace could be legally liable. [online]. Available at: http://www.techrepublic.com/blog/career/employers-who-check-out-job-candidates-on-myspace-could-be-legally-liable/338 [Accessed 24 April 2011]
- "Illinois Becomes Second State to Prohibit Employers from Requiring Access to Employees’ and Prospective Employees’ Social Media Web Sites". The National Law Review. 2012-08-23. Retrieved 2012-08-23.
- Sky News. 2009. Sacked for Calling Job Boring on Facebook. [online]. Available at: http://news.sky.com/skynews/Home/UK-News/Facebook-Sacking-Kimberley-Swann-From-Clacton-Essex-Sacked-For-Calling-Job-Boring/Article/200902415230508 [Accessed 24 April 2011]
- BBC News. 2008. Crew sacked over Facebook posts. Available at: http://news.bbc.co.uk/1/hi/uk/7703129.stm [Accessed 24 April 2011]
- Roythornes Solicitors. 2011. The employment law dangers of Social Networking. [online]. Available at: http://www.opportunitypeterborough.co.uk/bondholder/events/the-employment-law-dangers-of-social-networking [Accessed 24 April 2011]
- Henson, Bill; Reynes W. Reyns; Bonnie S. Fisher (3 March 2011). "Security in the 21st century: examining the link between online social network activity, privacy, and interpersonal victimization" (PDF). Criminal Justice Review 36 (253): 253–268. doi:10.1177/0734016811399421. Retrieved 29 March 2013.
- Lori Andrews (10 January 2012). I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy. Simon and Schuster. ISBN 978-1-4516-5051-8.
- Sharon Jayson, USA TODAY (8 March 2014). "Social media research raises privacy and ethics issues". USA TODAY.
- "Location Privacy Protection on Social Networks". Lecture Notes in Computer Science: 78–85. doi:10.1007/978-3-642-19656-0_12.
- Bangeman, E. 2010. Report: Facebook caught sharing secret data with advisers. [online]. Available at: http://arstechnica.com/tech-policy/news/2010/05/latest-facebook-blunder-secret-data-sharing-with-advertisers.ars [Accessed 25 April 2011]
- "Protecting Your Privacy on Social Media Network".
- "5 ways social media users can protect online privacy".
- "How to Protect Your Online Privacy".
- "Protect Your Privacy on Social Networks".
- "Social Networks".
- Shepherd and Wedderburn. 2010. Facebook amend privacy settings following an unpleasant poke from EU privacy protectors. [online]. Available at: http://www.shepwedd.co.uk/knowledge/article/1095-2831/facebook-amend-privacy-settings-following-an-unpleasant-poke-from-eu-privacy-protectors/archive/?page=1 [Accessed 25 April 2011]
- Saint, N. 2010. Facebook’s Response to Privacy Concerns: "If you’re not Comfortable Sharing, Don’t". [online]. Available at: http://www.businessinsider.com/facebooks-response-to-privacy-concerns-if-youre-not-comfortable-sharing-dont-2010-5 [Accessed 25 April 2011]