Social Media Challenges
Social Media Challenges
Data privacy is important as users leave digital footprints on a daily basis, but
using social media may put your personal data at risk without you knowing it.
Privacy concerns are at the forefront as scandals and data breaches are in the
news every day. Beginning in late 2022, data privacy concerns prompted U.S.
state and federal agencies to ban employees from using TikTok on government-
owned devices. Because TikTok is owned by Chinese company ByteDance, some
lawmakers feel the Chinese government may use TikTok to learn confidential
information about the U.S. government through these devices.
Data transfers between different countries are also a concern. In May 2023,
European Union regulators fined Meta $1.3 billion USD. European Data Protection
Board stated Meta violated EU privacy laws by storing and sending European
Facebook users’ personal data to U.S. servers.
In July 2022, Twitter was hacked, and 200 million user email addresses were
posted to the dark web. These leaked email addresses can give bad actors
information they need to start malicious attacks.
CHALLENGES:
Peoples’ social life has always been characterized by processes of social interaction, in
which individuals reveal personal information about themselves — for instance with a view
to deepening a relationship. Nowadays, social relationships are increasingly maintained
via social media. In this context, however, the disclosure is frequently presented to a
larger audience leading to an increased probability that the gratifications of disclosure are
accompanied by specific risks. These risks pertain to privacy breaches in the sense of
both vertical (i.e. by companies) and horizontal (i.e. by peers) privacy violations [1]. As
early as 2006 scholars started to address the relation of privacy concerns and self-
disclosure behavior: Barnes coined the term ‘privacy paradox’ that denotes the seemingly
paradox behavior of uttering privacy concerns while still publishing private information
online [2]. More than 20 years later, current research has reached a new level of
complexity regarding both, theoretical and empirical approaches. Against this background,
the review focuses on recent literature which illuminates social media users’ struggle to
maintain privacy but at the same time self-disclose to their advantage. To this aim, we
first discuss the benefits of self-disclosure with a view to improving relationships. We then
reflect whether privacy can be regarded as a need and describe how it opposes the wish
to self-disclose. Building on this depiction of people’s struggle, we discuss the value of
recent theories and approaches to explain the mechanisms of the decision to either self-
disclose or protect one’s privacy. Finally, we argue that social media users need to be
Need for privacy
It needs to be asked whether people — in parallel to
their urge to self-disclose — also possess a strong
motivation to protect their privacy and whether this
can be characterized as a need. One of the most
influential definitions of privacy includes the notion
that privacy serves to fulfil basic human needs
(need for autonomy, self-evaluation, protected
communication; [21]). Moor [22] described privacy
as the expression of the core value of security,
whereby security — but not privacy — is seen
• Balancing self-disclosure and privacy:
• When self-disclosing online, privacy can be
compromised either because the revelation of personal
data is public, or because there is less individual control
over the usage of personal data by other parties in SNS
than in face-to-face situations. Despite these well-
known risks, people seem to be fascinated by
disclosures of others and motivated to self-disclose
themselves [27]. This paradoxical contradiction
between clearly voiced privacy concerns on the one
hand and seemingly careless
Conclusions:
• The decision of whether to self-disclose online is
complex and multidimensional. Although humans have
an intrinsic urge to self-disclose, they carefully weigh
which behavior leads to gratifications, and which
revelation can be harmful — in the sense of not
conveying beneficial impressions. In parallel to this,
people are motivated to protect their privacy which has
been identified as secondary need. In order to balance
the benefits of self-disclosure and the wish to protect
one’s privacy,
• CHALLENGES:
• Social networks allows people to connect with the group. Social networks are also referred as relationship
networks that helps people and organizations to connect online and allows to share information and ideas.
Following are the key points that enables users of social media to interact over the network. The most commonly
used network is media sharing network allowing to share the images, audios, videos, and other form of
multimedia. The forums likes discussion forums, Chabot, allows to share current affairs and current happenings.
Bookmarking and content curation networks are the special network used to determine, include, and stake the
new content over the network. Consumer review networks allows to find and review businesses strategies.
Blogging and reproducing networks helps to publish content online. Interest-based networks are the one which
shares interests and hobbies. Social shopping networks are in the scope of ecommerce and helps the users to
shop online. Sharing economy networks is another category of the social network that helps in trading and
services. Market research, brand awareness, lead generation, relationship building, customer services etc. are
all dependent on social network. Most popular social networks over the internet are discussed here. Facebook
indicates online social networking website where people creates profiles, share information such as photos and
quotes about themselves, and respond or link to the information posted by others. Category of the Facebook is
social networking service. Such types of Social Media are used to subordinate with people (and products) on the
Internet. These network helps the businesses via brand promotion, community awareness, relationship building,
consumer service, lead generation, and conversion. These network encourages the individuals and businesses
to interact online and to share the data. Thus the mutual productive relationships are ensured by these
networks. Media sharing networks and the social networks have set of common features. For example, the
Facebook is the social network that allows to share media while linked in a social network focusing on the
professional relationships.
technology doubtlessly brings people benefits, privileges, convenience and
efficiencies, with confidentiality issues. Additionally, technological advances are
accompanied with threats that can pose dangerous privacy risks that can be
more detrimental than expected. Privacy of data is a source of much concern to
researchers throughout the globe. A question that remains unanswered is the
question that “what exactly can be done” to resolve confidentially and privacy
issues of big data? To answer some questions, data collected for this chapter
has been through the analyze of 58 peer reviewed articles collated from 2007 to
2016 in order to find some resolutions for Big Data confidentiality issues. The
articles range from different industries that include healthcare , finance ,
robotics, web applications , social media , and mobile communication . The
selected journal articles are aimed used to make comparative analysis of
security issues in different areas to cast solutions. This chapter consists of four
main parts: introduction, materials and method, results, discussion and
conclusion. This inquiry aimed to find different security issues of big data in
various areas and gives solutions by analyzing results. The results of the content
analysis suggest that the internet applications and financial institutions are
dealing with specific security problems, whereas social media and other
industries deal with confidentiality issues of sensitive information which have
heightened privacy concerns. Both these issues are addressed in this study, as
retrieved results from the data, highlights the gaps that can be further
researched for development. The method used to gather data for this chapter is
through the analysis of studies that deal with a particular confidentiality issue.
After the analysis and evaluations, the suggestions of confidentiality issues are
displayed by using a different algorithm method. This research has addressed