scispace - formally typeset
Search or ask a question

When communicating on social networking sites it is important to represent yourself safely Where can you change your profile in order to protect your private information? 

Answers from top 9 papers

More filters
Papers (9)Insight
The importance of user awareness in the context of social technologies plays an important role in preventing victimisation, and social networking services should provide adequate controls to protect personal information.
It might find a more reasonable boundary to protect the gradually eroded privacy on social networking sites.
In political regimes where traditional mass media are under state control, social networking sites may be the only place where citizens are exposed to and exchange dissident information.
The university students consider social networking sites unreliable in terms of safety of private information.
Location-based services – applications and websites that provide services based on your current location – can put this information and more in the palm of your hand. But outdated privacy laws and varying corporate practices could mean that sensitive information about who you are, where you go, what you do, and who you know end up being shared, sold, or turned over to the government.
We show that on several well-known social media sites, we can easily and accurately recover the information of private-profile users.
Your activities, whether they are passive or active, in Cyberspace can give others a great deal of information about you.
The guide highlights opportunities for consumers, businesses, and policymakers to work together to update and enhance privacy protections so that you are not forced to choose between using LBS and keeping control of your private information.
In particular, support was found for a model positing that if an individual placed a higher premium on their personal, private information, they would then be less inclined to disclose such information while visiting online social networking sites.

See what other people are reading

What are the key factors that influence cross-cultural web analysis in Japan?
5 answers
Key factors influencing cross-cultural web analysis in Japan include psychological, sociocultural, and self-realization adjustments of foreign care workers. Additionally, cultural dimensions like high/low context distinctions and individualist versus collectivist traits impact non-verbal communication in online platforms, with Japanese culture relying heavily on emoticons in blogs. Moreover, the recognition of online privacy policies among young Japanese individuals is influenced by socio-cultural factors, highlighting the importance of considering cultural perspectives in online privacy protection efforts. Furthermore, cultural differences between Western and Japanese consumers affect the expression of sentiments in online reviews of Japanese restaurants, emphasizing the need for businesses to accommodate diverse cultural backgrounds in online platforms.
What are future trends in biometric technologies in humanitarian organisations?
5 answers
Future trends in biometric technologies within humanitarian organizations involve a shift towards more secure, ethical, and cost-effective applications. The use of biometrics, such as iris scanning and fingerprint recognition, is increasingly being explored to combat fraud, streamline service delivery, and manage refugee populations. These technologies are evolving to operate in less-constrained conditions with real-time performance, expanding their use beyond high-security applications to public infrastructures, e-government, and user-centric services. Additionally, advancements like the integration of iris scans into specialized ATMs and the development of Biometric Identity Management Systems (BIMS) showcase the ongoing innovation and adoption of biometric solutions within humanitarian settings. The future trajectory indicates a continued emphasis on leveraging biometric technologies to enhance humanitarian assistance while addressing privacy concerns and ethical considerations.
Is using cameras by governments in public space low cost?
5 answers
Using cameras by governments in public spaces can be considered low cost. The implementation of video surveillance systems in public areas plays a crucial role in enhancing safety and security. With advancements in technology, the development of wide area surveillance systems has become feasible, allowing for ubiquitous monitoring at a relatively low cost. Additionally, the transition to smart city concepts has facilitated the deployment of cost-effective surveillance solutions that offer real-time monitoring and rapid intervention capabilities. While the initial cost of setting up surveillance systems may be a consideration, the long-term benefits in terms of safety and security justify the investment. Therefore, utilizing cameras in public spaces for governmental surveillance purposes can be seen as a cost-effective measure to ensure public safety and security.
What is the difference between information sharing and knowldge sharing?
5 answers
Information sharing primarily involves the exchange and dissemination of data to enhance understanding and transparency within enterprises, focusing on unambiguous and transparent information assets. On the other hand, knowledge sharing goes beyond mere data exchange, aiming to integrate diverse knowledge sources to boost creativity and innovation within organizations. While information sharing emphasizes the sharing of reports, IT platforms, and official papers to improve product quality and customer service responsiveness, knowledge sharing involves sharing insights, experiences, and expertise among individuals to enhance overall organizational performance. Information sharing often pertains to operational data and facts, whereas knowledge sharing delves into the deeper understanding, expertise, and know-how that individuals possess, contributing to organizational learning and growth.
Can Systems Explain Permissions Better? Understanding Users’ Misperceptions under Smartphone Runtime Permission Model?
5 answers
Systems can indeed improve the understanding of permissions under the smartphone runtime permission model. Research indicates that users often lack awareness of the permissions their apps request, leading to security and privacy concerns. The introduction of the runtime permission model in Android has shown to be more beneficial and useful compared to the older install-time model, with users perceiving it positively regardless of the operating system. Factors such as the type of permission requested, clarity of context, and dangerous permission types significantly influence users' decisions under the new runtime system. Additionally, advanced permission mechanisms like SmarPer leverage contextual information and machine learning to predict permission decisions accurately at runtime, offering users more control and better matching of privacy preferences.
Why do people want to have alone time? philippines?
5 answers
People seek alone time due to various reasons, including the need for self-regulation, cognitive organization, and well-being. In the Philippines, cultural norms like "pakikisama" influence behavior, where individuals may not express personal preferences to maintain smooth interpersonal relations. Elderly individuals living alone in the Philippines experience higher levels of loneliness, often linked to factors like less active social involvement and infrequent social interactions. Moreover, elderly individuals living alone are more likely to report illnesses and utilize health facilities, indicating a potential correlation between living alone and health issues in the elderly population. These findings highlight the importance of understanding the diverse motivations behind seeking alone time and the impact it can have on individuals' well-being and health, especially in the context of cultural norms and social relationships.
What blockchain can and can’t do: Applications to marketing and privacy?
5 answers
Blockchain technology offers distributed solutions for various applications like finance, healthcare, and cybersecurity. While it ensures transparency and reliability in transaction ledgers, it faces challenges in maintaining user privacy due to the public nature of data on the blockchain. To address privacy concerns, solutions such as secure multiparty computation protocols and private blockchains have been proposed. However, the trade-off between security and privacy remains a critical consideration when implementing blockchain in different sectors. In marketing, blockchain can revolutionize processes by providing secure and transparent transactions. Nevertheless, the exposure of sensitive data on a public blockchain poses privacy risks that need to be carefully managed to fully leverage the benefits of blockchain technology.
How effective are existing privacy protection measures for biometric data collected by cars in Europe?
4 answers
Existing privacy protection measures for biometric data collected by cars in Europe vary in effectiveness. Various privacy-preserving biometric schemes (PPBSs) have been developed to safeguard biometric data, but they often have drawbacks that need to be addressed. Additionally, the use of biometric information in intelligent vehicles, such as in Vehicular Ad-hoc Networks (VANETs), raises concerns about security vulnerabilities like DoS attacks and privacy breaches. To enhance privacy protection, a biometrics blockchain (BBC) framework has been proposed to secure data sharing among vehicles in VANETs, ensuring the authenticity of message senders and preserving privacy. Furthermore, user-centric biometric authentication schemes like BAZKP have been introduced to prevent direct exposure of biometric data to service providers, enhancing security and privacy in biometric authentication systems.
How does the surveillance, data, and power approach impact the dynamics of social control?
5 answers
The dynamics of social control are significantly influenced by the surveillance, data, and power approach, as highlighted in the provided contexts. Surveillance, whether by state agencies, private companies, or through social software technologies, plays a crucial role in shaping behaviors and exerting control. The evolution of social control models, such as the panopticon and the superpanopticon, demonstrates the shift towards more subtle and total forms of control in the digital society. The interdependency of privacy and surveillance, where data control approaches may inadvertently enable surveillance capabilities, further complicates the dynamics of social control. Ultimately, the increasing use of surveillance, data collection, and power dynamics in various sectors underscores a complex web of control mechanisms that impact individuals and society at large.
What are the specific laws and regulations that protect user privacy on social media platforms?
5 answers
Privacy protection on social media platforms is governed by a variety of laws and regulations. These include laws targeting social media users, such as regulations on user conduct and dissuasion from social media use, as well as laws aimed at social media platforms themselves, covering both substantive and procedural aspects. Additionally, the development of technology has led to ethical challenges regarding privacy on social media, with user profiling, precision marketing, and fraud posing risks to user privacy. Furthermore, the legal landscape surrounding social media platforms involves the interplay of individuals, platforms, and governments in safeguarding privacy through strategies like transparency reports, complaint mechanisms, and out-of-court dispute resolution mechanisms. Overall, a balance is crucial between technological advancements and privacy protection to ensure a secure and ethical social media environment.
What are the specific laws that protect user privacy on social media platforms?
5 answers
Privacy protection on social media platforms is governed by various laws globally. In the European Union, the Digital Services Act (DSA) aims to safeguard users' fundamental rights, including procedural rights during content moderation. Additionally, the European Convention on Human Rights (ECHR) and the EU Charter of Fundamental Rights provide the right to good administration and fair trials, ensuring effective remedies for users. In the United States, a patchwork of state and federal data protection laws, along with policies developed by Big Tech, regulate privacy and data protection on social media platforms. Furthermore, in Indonesia, the Law on Information and Electronic Transactions (UU ITE) offers legal protection to social media users from abuse and harmful activities, emphasizing the need for safeguarding personal data and privacy.