Research Papers Combined
Research Papers Combined
Roll No.: 27
MAEMA
SEM IV
Relevant information from Research Papers
ABSTRACT
This study describes the level of awareness of social media network users
to terms of service and verifying the social media users perception on the
information shared on social network. A structured questionnaire was used
to elicit information from 220 respondents among the randomly selected
students. Results indicated that over 91% of the respondents were aware
of terms of service relating to privacy on the social media networks and
66.3% of the users had read the terms of service in whole or in part.
Meanwhile, 78% request for consultation on the use of their information.
The study concluded that social media users need to understand the
conditions attached to its use via proper orientation.
INTRODUCTION
The development and usage of social media technologies has become a way
of life to many Nigerians. Social media technologies have been observed to
be a landslide breakthrough in information and communications
technology in the 21st century. Though still evolving, its high level of
adoption and usage is on the daily increase (Adaja and Ayodele, 2013). The
use of social media has enabled real time communication among users such
as companies, consumers, institutions, and many more. To this effect,
communication has become more effective, breaking the barrier that comes
with different products and issues around the world (Mangold and Faulds,
2009). Remarkably, within the twinkling of an eye, information can be
passed to numerous people, distance is no longer a barrier and this
becomes possible due to the advent of social media technologies which
made communication easy and unproblematic. Scholars share divergent
opinions about the conceptual nature of social media and this is due to its
fast evolving nature and diversity in delivery platforms. The cogent idea in
most of the social media definitions is communication, interaction and
exchange of ideas, knowledge via internet based platform. Some definitions
of social media networks and their respective scholars are as shown in
Table 1. So many definitions of social media networks are available in the
literature, Drury (2008) definition is considered appropriate for this study.
Social media can be described as online resources that people use to share
content: video, photos, images, text, ideas, insight, humour, opinion, gossip,
news.
There are various forms of social media which ranges from media-sharing
tools such as YouTube and Flickr to social networking sites such as
Facebook, Whatsapp, Instagram, Badoo and LinkedIn. Others include social
bookmarking tools (Delicious and CiteULike), collaborative knowledge
development tools and creative tools such as blogs (e.g. WordPress and
Blogger) and micro blogs and applications (Twitter, Whatsapp), amongst
others (Balakrishnan and Gan, 2016). Social media sites are characterised
with information sharing, this information may be about their personal life,
not mindful of the reactions by others as they have no control over what
others post about them and how this information is utilised by the social
network developers (Wu, Majedi, Ghazinour and Barker, 2010).
Furthermore, social media users may not be adequately informed of the
risks of using social networks. They seem to have a limited sense of how
the information posted might be used by others and what type of data to be
shared with third parties (Williams, 2010). One of the most significant and
identified problem of social networking is privacy; many users do not
understand the consequences of revealing personal information online
(Polakis et al., 2010). Using social media also requires that users agree to
certain terms and conditions (also called T&C or terms of service). These
are rules and clauses which users must agree on, in order to use a service;
these terms are usually binding to two parties (organisation and users). It
includes a list of provisions such as a disclaimer of liability (owner takes no
responsibility for any damages a user receives as a result of use), a licence
of the copyright or agreement clause. Junco (2012) observed that the rate
at which users read the agreement is reducing day-by-day. It is believed to
be time consuming, tedious and unnecessary. Since the use of social media
has become a trend among the people, it is assumed that not reading or
violating it, may involve them in an unknown legal battle. The design of
privacy controls of the social networks makes it possible for information to
be revealed (Conti et al., 2011). Facebook as a social networking site
ensures the privacy of its users through several settings that fits its
requirements (Everson et al., 2013). Wu et al., (2010) was of the opinion
that data retention may be a problem since all of the privacy policies
involved do not have clear statements. Some perceived the terms to be
written in ambiguous terms and long for users to read and are also of the
belief that users need to be informed in easily accessible privacy
statements that are easy to understand. Similarly, Asif and Khan (2012)
found out that people remained unaware of information sharing policies
despite the fact that the policies were clearly stated. There study also
showed that people do not know how their personal data can be utilised;
this made users to share their private information with unauthorized
people. They conclude that complexity of privacy settings and lack of
control provided to user is seen to be responsible for unintentional
information sharing. In the same vein, the high security threat that
accompanies the use of social media is worth discussing. With billions of
users online, these tools not only attract friends and family who wants to
stay in touch, but they also attract people with ulterior motives. Theft of
identity is one of the common threats of using social media. Most social
networks have information that is required, such as email address,
birthday, location and others. It’s common for an identity thief to hack an
email account by using social information as well as knowing your location
at a particular time. By going directly to the source of social media sites,
hackers can interject malicious codes which makes it easy to steal identity,
inject viruses to your computer, smart phones and obstruct bank account
information, to name a few.
This study attempts to ascertain whether social media users actually read
through the terms of service of social media before consenting to it, it also
evaluate their knowledge of the use of the private/public information
shared. Specifically, the study focused on describing the level of awareness
of social media network users to terms of service and verifying the social
media users perception on the information shared on social networks.
RESEARCH METHOD
Abstract. People are limited in their resources, i.e. they have limited
memory capabilities, cannot pay attention to too many things at the same
time, and forget much information after a while; computers do not suffer
from these limitations. Thus, revealing personal data in electronic
communication environments and being completely unaware of the impact
of privacy might cause a lot of privacy issues later. Even if people are
privacy aware in general, the so-called privacy paradox shows that they do
not behave according to their stated attitudes. This paper discusses
explanations for the existing dichotomy between the intentions of people
towards disclosure of personal data and their behaviour. We present
requirements on tools for privacy-awareness support in order to
counteract the privacy paradox.
Introduction
The term privacy awareness is not well established in the literature. Hence,
as a starting point, we present interpretations of privacy, which are taken
into consideration for this work. After the concept of awareness is
introduced, we give a definition of privacy awareness.
Privacy Awareness
Taking into account the two views on privacy presented above, privacy
awareness of an individual encompasses the attention, perception and
cognition of:
− how these pieces of information are or may be processed and used, and
Means to build up and enhance privacy awareness can be identical for each
user of a system or be tailored to group-specific or even to individual
requirements and needs. Whereas privacy disclaimers on Websites can be
seen as an example of general, user-independent privacy-awareness hints,
the evaluation of individual privacy preferences can serve as a basis for
more individualised and user-specific features of privacy-awareness
support.
Tools to Support Privacy Awareness
Tools need to be designed in such a way that they offer support to people.
The tools should not convey the impression that they fully protect the
privacy of the users according to their preferences or that there is no
longer any need for people to be aware of privacy and to take care for
themselves.
• Performance
Acknowledgments
Chapter 1
Executive Summary
Key takeaways from this research work are stated below; these are drawn
from the interviews, focus group discussions, and surveys that we
conducted to study the privacy perceptions in India. As far as our
knowledge goes, this is the largest ever study on privacy perceptions in
India, we also believe that, this is the case around the world too.
General Privacy:
Privacy awareness about issues in public places was low. Participants were
not aware of various privacy issues related to cameras in public places, and
others taking pictures in public places.
Mobile Phones:
Mobile phones are becoming the next destination for storing private
information. Participants stored personal information like passwords,
credit card numbers, Permanent
Account Number (PAN), PINs, etc. Privacy seems to be the primary concern
for not storing personal information on the mobile phones for the rest.
Majority of the participants felt comfortable with the protection provided
by the mobile service providers.
Survey participants were more aware about privacy policies and tend to
read these policies more than the earlier study in 2004.
Minority of the participants had “no privacy concerns" with online social
networks. Majority of the participants felt pictures to be the most privacy
invasive data on the OSNs.
Financial Privacy:
About 15% of the survey respondents felt that the credit cards should
display personal information like name, date of birth, and phone number.
About 80% of the survey respondents were aware of identity theft issue
through credit cards.
Government:
Citizens have misinformed mental models of the privacy situation; e.g.
Participants felt there were privacy laws where as there is no privacy law
in India.
Chapter 2
Motivation:
One of our primary motivations was to get India in the world map of
privacy discussion; towards achieving this goal, we have attempted to
create a bench-mark for privacy perceptions in India and we hope this type
of study will be done in a longitudinal basis to understand the changes in
the privacy awareness in the society over the years.
Methodology
The concept of privacy in India has not been investigated in detail, and also
lack of empirical data with respect to privacy perceptions among Indian
citizens. Recent developments in the Indian scenario e.g. privacy bill,
NATGRID, UID project, signify need for privacy awareness and
understanding in Indian masses. It is also important for policy makers to
comprehend sentiment and opinion of masses for structuring effective laws
and policies for citizens of India. Our study focuses on understanding
privacy perceptions and expectations of Indian citizens. In the first phase,
we conducted interviews among 20 participants and 4 focus group
discussions with 31 participants in total, to collect qualitative data about
the privacy perceptions. In the second phase, we developed a survey
questionnaire to collect quantitative data. We collected responses (10,427)
from various cities in India which could help in creating an information
base for masses and policy makers, showcasing the true (perceived)
picture of privacy in India on various platforms e.g. mobile phone, credit
cards, online social networks, and government related issues.
Mobile phones are becoming the next destination for storing private
information. Participants stored personal information like passwords,
credit card numbers, Permanent Account
Number (PAN), PINs, etc. Privacy seems to be the primary concern for not
storing personal information on the mobile phones for the rest.
Interview Questionnaire
1. When you hear the word privacy, what comes to your mind?
5. If yes, whom do you think you need to have privacy from? Family /
Friends / Relatives / Colleagues / Formal institutions/ Government / Any
other If Family, Who is family for you?
6. Where do you think privacy is required? List the areas where you think
privacy must be exercised?
• Cookies
• Privacy settings