Vous êtes sur la page 1sur 12

A Survey of Security & Privacy

In Online Social Networks (OSN)


With Regards To Attitudes And Behaviors
Frances Coronel
Computer Science
Hampton University
Hampton, VA

Abstract Do individuals truly care about their


privacy? Studies demonstrate that online
privacy is a primary concern for most users in
our computerized age and yet there exists this
sort of irregularity between their attitudes and
actions towards privacy. This irregularity is
known as the Privacy Paradox and explains
how the actions of users submitting so much of
their private information online contrasts
heavily with their attitude of wanting complete
control over how this mass information is used
by large social media corporations. The findings
suggest there is a general lack of awareness
among users in regards to how their favorite
social networks utilize their private information
in their terms and conditions. The conflicting
relationship will then be discussed with a focus
on how researchers and designers can better
improve privacy awareness while building such
large scale social systems.
Keywords social media privacy, user privacy,
privacy paradox

I.

INTRODUCTION

Youngsters in this day and age will unreservedly


and without hesitation surrender their individual
data to join social communities online. Later,
however, these same young youngsters are shocked

with surprise when their parents start reading


through their readlines and revealing or questioning
all sorts of goodies regarding their personal lives.
Given that anonymity isnt profitable, government
agencies and marketers all around us are doing
everything in their power to collect personal data
about us. As the users, we hand over this complete
control by agreeing to their terms and conditions
without so much a glance. For example, the
government utilizes driver permit databases to
discover miscreant fathers (fathers who fail to pay
child support on time) and each time we go
shopping, retail stores will gather any piece of
information in order to create an accurate profile of
our shopping practices. Bolted away on several
servers is each moment and point of interest in our
day to day lives from our individual purchasing
inclinations to our even deepest and darkest
thoughts.
A large number of the people worldwide have used
or are using a social network in one way or the
other. However, questions have arisen whether
people are concerned about their privacy in social
networks. Studies have revealed that online privacy
is a concern for many people as the implications of
their information landing in the wrong hands in very
devastating. The worry is, however, despite these

concerns about the attitudes that people have about


online social network privacy, the behaviors on the
other side do not match the attitudes [1]. As far as
people are concerned about their information falling
on unexpected destinations if not well taken care of,
they do little to protect this information. People
submit too much private information online, which
contrasts their attitude of wanting to be in full
control of their private information.
With many social networks coming up every day,
people become overwhelmed by the behavior of
disclosing their private information ignoring the
repercussions thereof [6]. According to a study, the
lack of awareness and knowledge among online
social network users of where their information can
land to once it is made public in these social sites
has contributed immensely in the conflict of the
attitudes of people towards what they post and the
behavior they exhibit in posting them.
Many of us do not understand how our security has
been breached nor are we even attempting to find a
way to shield our data from being harvested. So the
question now is in this digital age, how aware are
users when it comes to their privacy?. Better still,
Do they even care anymore?.
The sad story is that the information that we post in
these sites is not private [5]. The companies that
own these sites and government agencies can access
this information. Why do users of these sites ignore
the privacy statements that are on these sites?
People overrun without glimpsing across them
because most of them assume that their information
is adequately protected. They ignore the fact that
there are exceptions as far as the protection of their
data is concerned. At some point in time, people
wonder how the government or any other institution
came across personal data that you though nobody
else knows apart from the people in your circle. For
example, e-mail databases are sold all over, which
is a clear indication that the data that we provide is
not private.

Moreover, with the current penetration of Whatsapp


as a social media site [11], it has become very easy
for a clip to circulate all over the world within a few
hours. Therefore, that clearly indicates how delicate
sharing private data can be.
The fact is that people are aware that private
information posted in social sites falls in the
unintended destinations and used for purposes that
were not originally intended by the source [3]. The
biggest concern is that despite all these evidence,
most of the users are not concerned about how their
privacy has been breached.
Worst of, they are not doing anything to try and
protect their private data from falling in the wrong
hands [4]. They become concerned when the worst
happens, and the information is used against them
or destroys their public image. That is the only time
when they become concerned.
It is, therefore, evident that the behaviors that we
exhibit as far as sharing information in social sites
do not reconcile with the attitudes that we have as
far as the privacy of this information is concerned.
The question is, how common does this conflict of
attitude and behavior occur?
In light to the above assertions, this paper
investigates the relationship between the attitudes
and behaviors that online social media users have
about the social media security concerns that have
been a constant concern.
The paper provides the methodology used in the
study, and the conclusions, which are based on the
preliminary results of the survey within the context
of social networking. The paper considers aspects
of the overall social network privacy concern
coupled with the aspects of concern that are related
to the control and transparency of information.
These aspects shall be analyzed, specifically,
considering how users share information on the
networks, and the practices that they exhibit about
the people on their sharing circles.

II.

METHDOLOGY

practices specifically within LinkedIn.

The methods were designed to test the perceptions


of online social sites in comparison with their
attitudes towards sharing information in these sites.
It aims at testing whether their behaviors of sharing
private information match their attitudes towards
the same. Much of the studies done in this field
suggests the presence of privacy paradox [1], so the
structuring of the methods will also want to prove if
these studies match with our findings.

Throughout the survey, the user will be given a


quick snapshot of exactly how much data is being
collected about them on the different applications
they use and therefore they will leave a little more
educated on their state of their online privacy [7].
The terms privacy policy and terms of services are
defined and explained throughout the survey so that
the user is aware of what the questions pertain to
when asked about a specific online service.

Based on previous studies, the paper hypothesizes


that online social media users behaviors do not
match their attitudes. The other hypothesis is that
these attitudes differ with demography. It, therefore,
hypotheses that the young people are less concerned
of their privacy than their older counterparts.

The aspects presented in these questions are related.


All of them revolves around comparing how people
are aware of the destinations of their private data,
and the behaviors that they exhibit even with such
knowledge. The survey questions were distributed
via email and social media personal inbox to the
respondents. The respondents were sampled from
address books and users of social networks from
families, friends, and fellow students.

I formulated two hypotheses at the beginning of my


research.
Hypotheses 1. Does the behavior of online users
match their attitudes when it comes to online
privacy? I do not think they match because users
tend to provide a lot of data but expect their privacy
to be protected simultaneously.
Hypotheses 2. Do people recognize the importance
of the privacy policies their applications put in
place? I also do not think that many people, even
those part of the younger generation, recognize the
importance of having a fair and reasonable privacy
policy in place for the numerous applications they
use.
A.

Survey

The survey is intended to assess how much users


know about the data that is kept of them [2].
For example, a question that was posed is Were
you aware that if you use LinkedIn, you grant
LinkedIn the right to keep everything you post on
their website forever?. The user would then answer
Yes or No and they would either gain or lose a
point based on their existing knowledge on privacy

The respondents were requested to offer their


insights on their attitude and behaviors as far as the
privacy of social media is concerned. The ages of
the respondents were pre-determined based on the
demographic data that they have provided in their
profiles. When the survey was done, and people
offered their views, the respondents were given a
quick analysis of their attitude towards sharing
private information and how they can improve their
online privacy. Apart from that, the survey results
were also used in coming up with the overall
conclusion comparing the aspects being studied.
The survey questions can be found in the Appendix
[Appendix 1].
B.

Social Network Experts

I cite the appropriate opinions of whom society


considers experts of social media privacy. In
society, there are those people who are considered
as the mirrors of the society. These are the people
who bring issues that seem as non-issues, but that
have great implications on the members of the
society.

In light of this, the study uses the views of the


people it considers as experts in the realm of social
media privacy like Cullen Hoback [10] who is well
known for his award winning film Terms and
Conditions Apply. In his documentary, he exposes
how governments and other corporations filter
personal information online and learn about people.
He then gives insights on how the habit can be
curtailed to prevent these institutions from using
personal information with the absence of the
consent of the owners.
Cullen Hoback ultimately observed that countries
around world are increasingly exercising territorial
control over Internet and Internet users' data, largely
due to concerns about fact that much of Internet
data is controlled by United States companies.
Within Hobacks documentary, there was an
assistant professor featured from the School of
Information and Library Science at the University
of North Carolina. Her name is Zeynep Tufekci and
she is an assistant professor who writes on
technology policy in the New York Times (OpEd)
[9]. She has argued that intelligence agencies,
bearing blame for terrorist attacks like recent assault
on Paris, have tendency to automatically call for
greater
surveillance
of
technology-based
communications and weakening of encryption
services. The challenge she believes is not the
actual collection of more data, but developing the
ability to identify and track truly dangerous people
who currently get lost amid wash of information.
Finally, in terms of social media experts, there is
also Ondrej Krehel who is the founder and principal
of Lifars LLC, an international cybersecurity and
digital forensics firm. Hes also the former Chief
Information Security Officer of Identity Theft 911,
the nations premier identity theft recovery and data
breach management service. The reason hes so key
is that because of his great number of years of
experience in cybersecurity, his eight basic steps to
protecting your privacy online are quite credible
within the IT community.

His eight basic steps to improving your online


privacy are as follows [8]:
1. Decide if your digital presence and persona is
professional or individual. Having proficient
substance in online networking can help your
central goal in vocation and business, while
over-sharing individual information can trigger
inverse impact. Storehouse your online
networking records as needs be to keep up your
online security while as yet holding an expert
vicinity.
2. Be aware of who you are sharing your data
with. Altering your social settings so that you're
keeping outsiders out and just sharing your data,
posts and pictures with individuals in your
inward circle goes far in ensuring your online
security. Most sites will likewise give you the
choice to gathering companions into distinctive
classes, each of which gives you the alternative
to breaking point or alter the sort of data shared.
It's prudent to exploit this choice when it's
accessible.
3. Remove any traces of yourself from public
searches. A few sites gift you the capacity to
keep your profile from being found through an
open web crawler. On the off chance that you'd
like to stay shrouded, search for this alternative
and guarantee you actuate it. Numerous can
discover you effortlessly just by your telephone
number.
4. Opt out of check-ins. Numerous sites and
applications permit you to registration to
geographic areas. A lot of clients wouldn't fret
this choice, while numerous really check in
freely to tell others where they are. Keep in
mind notwithstanding, that when you do tell
others where you are, you're additionally letting
them know where you aren't at home.
Culprits can monitor your movement to pick a
period when you aren't home and break-in. I
prescribe not checking in openly.
5. Keep a close eye on social apps. There are a lot
of applications which have entry to your

companions rundown, posts, pictures and other


data. Physically altering the application
protection settings, either inside of the social
site or each application separately on your
telephone, to uproot these meddlesome
authorizations will offer assistance. I, for
instance, intermittently experience my joined
applications and uproot the ones I no more
utilize.
6. Limit the amount of personal information you
post. Individual data posted on open spaces
abandons you defenseless. Going without
posting data, for example, your introduction to
the world date or physical location, among
different points of interest, will keep away those
intruding personality criminals. On the off
chance that you have loved ones posting data
about you, guarantee that it is data you are
alright with outsiders thinking about nothing
more.
7. Be wary of strangers. The Internet makes it
altogether simple for individuals to act like
somebody they aren't distorting their
characters and thought processes. Consider
protection controls that point of confinement the
general population why should permitted get in
touch with you on social sites. When you
interface with individuals you don't have the
foggiest idea, be cautious with the measure of
your own data you uncover, and considerably
more watchful with meeting individuals, "all
things considered."
8. Stay updated on privacy policy changes on
websites and apps. Protection approaches are
known not much of the time on online
networking sites, so ensure you know about the
strategies and survey your security settings
frequently.
Appropriate
Literature
C.

Comparisons

Made

in

I utilized Google Scholar to find recent academic


literature on social media privacy and how its

affected current corporation structures.


reputable articles cited by many were used.

Only

To elaborate, the studies cited also used secondary


literature on the topic acquired both online and from
the library. There is a bunch of research containing
information on issues of online privacy, and how
people respond to protect their personal data.
In this review of literature, we found one prominent
study on Facebook users [13]. There was this
Facebook scraping application involved.
This application was used to collect information
exclusively from Facebook users. The participants
who were selected were requested to install the
Facebook application in their profile. Once the
crawler application was installed in their profile,
they were notified in their notifications profile. The
crawler application collected past information on
the participants behavior based on their privacy
settings, status updates, friends, posts and the
information presented as basic user information.
The crawler monitored the status updates, which
were specifically the information posted by the
users on their walls.
On top of that, it separately recorded any other
information on the respondents wall. These
included both comments and tags by other people.
The software was automated to complete a followup questionnaire, which was composed of a
complete set of questions about the data that was
being collected. The crawler application also
provided a link of the location of the questionnaire,
which was accessible to both the respondents and
the researcher.
The study involved 60 participants (33 females and
27 males) who successfully completed the study.
All the participants ranged between 19-45 years of
age. The crawler application collected data for the
past three years from 2013 to present. The
secondary literature used was published within the
past four years. Cumulatively, the data included
5789 wall posts and 3721 status updates [13].
The study involved 60 participants (33 females and
27 males) who successfully completed the study.

All the participants ranged between 19-45 years of


age. The crawler application collected data for the
past three years from 2013 to present. The
secondary literature used was published within the
past four years. Cumulatively, the data included
5789 wall posts and 3721 status updates.
In this study, there were two key hypotheses
formulated. It should be noted these hypotheses are
different from the ones formulated through my own
research.
Hypothesis 1: Online social media
behaviors do not match their attitudes.

users

Hypothesis 1 was confirmed. The data collected


showed that, for the past two years, the Facebook
users (78%) visit their accounts on a daily basis,
most of them spending at least 20 minutes (80%)
posting and reading news feeds. According to the
information collected, most of the users posted
more in the past one year than they do today. For
example, in 2014, the average posts per month of
the respondents stood at 22 posts. In the last half of
2015, the average posts per month for the
respondents stood at 7 [13].
When the privacy attitudes and the behaviors were
analyzed, there was a discrepancy between the two.
The participants were less concerned in hiding their
personal data as most of it was visible to friends
within their circles. When the measure was weighed
in a Likert scale, the weigh stood at 2.3 for every 5
respondents. When asked if they have considered
using a software that would help them in hiding
their personal information, 61% of the respondents
admitted to not using any of the available software
to protect their data. However, despite that a big
umber had not attempted, the software recorded a
total number of 112 posts that the respondents had
tried to hide from the public. In the past six months,
the remaining 39% admitted to having used some
privacy settings and other software to hide their
personal data. Despite the few percentage of the
respondents who tried to hide their personal data,
98% of them were worried about whether there are
enough controls in Facebook to warrant anonymity
of the data that they share over the network to

strangers [14].
Hypothesis 2: Young people are less concerned of
their privacy than their older counterparts.
To answer this question, the respondents were
divided into two categories. Those who fell between
19-34 years of age were considered as the young
generation. Those between 35-45 years were
classified as the older generation. Based on the
results, the hypothesis was confirmed. It was
evident that young people are less concerned about
their privacy than their older counterparts. 78% of
the young people disclosed most of their private
information compared to 57% of their older
counterparts.
When the analysis of the behavior versus attitude
about online social site privacy was conducted, the
scores were similar. All of them (100%) pointed out
that they were not sure whether their information
was private from strangers. However, the concern
was much less among the young people than it was
with their older counterparts. When asked about
their efforts towards protecting their posts and
statuses, of the 39% percent who had used some
privacy measures, the young counterparts accounted
for only 41% compared to their older counterparts
[13].
III.

RESULTS

The survey where these results were taken from can


be
found
at
the
following
link:
https://cshu.typeform.com/to/M2fRYP [2]. There
were over 50+ respondents over the course of the
last several weeks.
The survey was done to gauge the level of
understanding of how the users are aware of the
data that they disclose in these sites. The survey,
which is based on Knowledge Networks (KN) uses
an array of questions posed to the users to get to
know their stands as far as this information is
concerned.

Please refer to the Appendix [Appendix 1] for the


survey results. From the survey results, the
following results were made clear. If the results did
not have a clear majority, they may not be
highlighted here.
1. Most respondents were single, young, and in
college.
a. Gender wise, it was 57% male and
43% female.
b. 52% were students.
c. 50% were 18 to 24, and 22% were
25 to 34.
d. 41% had some college background.
e. 52% were single.
2. Most respondents use at least 3 social
networks on an hourly daily basis to share
status updates, pictures, and news pieces in
order to keep in touch with friends.
a. 71% are an active member of
LinkedIn, while 67% are active
members of Facebook and 61% are
active members of Twitter.
b. 74% use 1-5 social networks on a
daily basis.
c. 61% share status updates the most of
any social network, while 57% share
pictures and 52% share news pieces.
d. 50% mainly use social networks to
keep in touch with friends.
3. Most respondents are unaware of what the
privacy policies of popular social media
apps pertain.
a. 76% were unaware that if they use
LinkedIn, they grant LinkedIn the
right to keep everything on their
website
b. 54% were unaware that if they use
Google, their data may be used for
purposes they did not intend, sold to
third parties, given to advertisers,
kept indefinitely, stored in an
unencrypted form, and may be given
to legal authorities when legal
processes are ongoing.
c. 54% were unaware that if they use
Facebook, everything they publish is

4.

5.

6.
7.

8.

9.

shared to the public by default


except their birthday and contact
info.
Most respondents believe having a privacy
policy in place is extremely important but do
not believe current practices are suitable
enough.
a. The average level of importance for
having a privacy policy in place for
an app they use was 7.96 on a scale
of 1 to 10, 10 being extremely
important and 1 being not important.
b. 89% do not believe current privacy
policies are effective in social
networking sites.
c. 93% do not believe current laws are
strong enough to protect the
identities of people online
Most respondents have never read the Terms
& Conditions for an app they use because
theyre too long.
a. The average number of times
someone has said they actually read
the entire Terms of Services was 0.
b. 48% believed the biggest reason they
dont read the Terms of Services
very often is because theyre too
long.
Most respondents (63%) were not aware big
companies have used ToS to hand over data
to the government in the past.
In the light of the new information they
learned throughout the survey, 76% of
respondents said it would be likely that they
would change their privacy settings.
With an average score of 5.51 on a scale of
1 to 10, 10 being they will take serious
action when it comes to their privacy on
online social networks and 1 being their
opinion hasnt changed, most respondents
decided to re-evaluate some things when it
comes to their privacy on online social
networks.
Most respondents arent ignorant to the fact
that social networks are companies in of and
themselves and not actually based on a free
to use model with 96% stating they do not
believe that any social media network is

truly free.
10. Most respondents felt they learned
something after the survey with an average
rating of 4.07 on a scale of 1 to 5, 5 meaning
that the survey was interesting and they
learned something and 1 meaning they
didnt understand the point of the survey.
IV.

ANALYSIS OF RESULTS
Conclusion 1. Behavior of online users do
not match their attitudes when it comes to online
privacy. Even though many people put their
personal information online, most are ignorant or
concerned on how their personal data is actually
being used. Hypotheses 1 succeeded.
A.

Conclusion 2. Too many people fail to read


the Terms of Services for the applications they
use because theyre either too boring or too long
to read. Yet, they still recognize the importance
of having a ToS that is fair and reasonable.
Hypotheses 2 failed.
B.

Overarching Conclusion. When provided


with data and facts, most people are willing to
re-evaluate their current state of privacy settings
and general perspective on online privacy.
C.

V.

RECOMMENDATIONS

The study presented in this paper is preliminary,


and any other researcher interested in doing further
study in the same topic can do so. Based on the
results and analysis, social network sites have
become very popular, and many people are using
them. However, the concern is that the more the use
of the social networks increase, so do the risks and
vulnerabilities involved. Young users, especially,
are more affected because they post much of their
private data in those sites. Despite this observation,
they are more aware of the dangers that they face by
posting their personal information in these sites. It,
therefore, translates that people have to become
more aware of the dangers of posting personal
information in these sites, and change their

behaviors as far as posting is concerned.


Awareness should be created to make sure that
people are aware of the dangers that they get
themselves into when they share information
anyhow. Compliance to security measures is the
responsibility of every body, as personal
information should only remain with the owner
unless otherwise [15]. It is the high time that we
change the attitudes we have towards sharing
personal data and moderate our behaviors on the
same.
Unless someone and makes it no longer practical
and pressure is put upon the CEOs of these
companies, they will continue to engage it in. The
terms & conditions for these large tech monopolies
need to be easier to understand and only users
voicing their concerns over them will change
anything. To date, no US legislation has dealt with
the policies that permit government agencies &
corporations to abuse personal data [15].
However, there are already several tools that exist
that can help with this dilemma. PrivacyPal.co
provides a quick and simple overview of any
websites terms and conditions through their web
application [19]. Theres also GetTerms.io which
generates a simple Privacy Policy for your website
[17] so you dont have to confuse your users but
still protect the integrity of your application online.
Docracy provides a list of all the changes made to
the terms of services and privacy policies of the
worlds most popular sites for regular users can
always stay up to date with what their websites are
up to in terms of online privacy agreements [16].
One of the most popular tools however is the online
web app Terms of Service; Didnt Read which
has a comprehensive rating system for many
websites terms of conditions and privacy policies
[18]. This website aims to help fix the biggest lie
on the web which is the fact that almost no one
really reads the Terms of Services we agree to all
the time. With their state of the art rating system,
any user can go to their website and quickly find
out what kind of data is being tracked on different
web apps and what kind of restrictions are put on

them in terms of content or user account deletion.


One could be terribly shocked at how low the
privacy ratings are for top tech companies.
VI.

CONCLUSION

Protection and security are vital themes in


numerous areas of software engineering. They are
exceptionally compelling particularly in the zone of
online interpersonal organizations in light of the
delicate information included. At no other time has
there been a solitary gathering of individual,
identifiable, touchy, and volunteered information
like we have now with online social networks. The
union of this information poses a great risk. For
instance, main residence and conception date are all
that is important to decide one's government
disability number with more than sensible precision
and these are frequently both promptly accessible
on a client's profile in an online informal
community.
Online informal community suppliers must
accomplish more than produce an administration
one time and after that permit clients access. Maybe
they must keep up the best possible operation of
that administration after some time.
Information sharing in social networks in the form
of status updates, videos, hyperlinks or photographs
has gained popularity in the recent past. Social
network sites allow people to create either private,
public or partly public and partly private profiles,
most of which features their personal thoughts and
lives. Young people are the most affected in sharing
their personal information, either to let them gain
access to these social sites, or remain relevant if
they are already part of the social sites [8]. They are
not aware of the destinations of such information,
and most of them do not care to know, provided that
they satisfy their ego of remaining socially relevant
by being part of these social sites.
VII. APPENDIX I.

Social Media Survey Results

These are the questions and possible answer choices


within the survey where results were gathered.
The results are shown in several different figures,
each representing a page from the results of the
survey using the admin dashboard on Typeform, the
online application used to create the survey [2].
To note: All questions were required to answer.
Along with each possible answer choice is
showcased the percentage of users who chose that
option.

Figure 1. Results of the Social Media Survey

VIII. REFERENCES

Barnes, Susan B. "A privacy paradox: Social


networking in the United States." First
Monday 11.9 (2006).
[2] Frances Coronel, 2015. Social Media
Survey Typeform,
https://cshu.typeform.com/to/M2fRYP,
accessed 9 December 2015.
[3] Gangopadhyay, Saswati, and Ms Debarati
Dhar. "Social Networking Sites and Privacy
Issues Concerning Youths. Global Media
Journal-Indian Edition Summer Issue 5.1
(2014): 1-7.
[4] Greenwald, Glenn, and Laura Poitras. "NSA
Whistleblower Edward Snowden: 'I Don't Want
to Live in a Society That Does These Sort of
Things' Video." The Guardian. Guardian
News and Media, 9 June 2013. Web. 6 Dec.
2015.
<http://www.theguardian.com/world/video/2013
/jun/09/nsa-whistleblower-edward-snowdeninterview-video>.
[5] Gritzalis, Dimitris, et al. "History of
information: The case of privacy and security in
social media." Proc. of the History of
Information Conference. 2014.
[6] Madden, Mary. Privacy management on
social media sites. Pew Internet Report (2012).
1-20.
[7] Madejski, Michelle, Maritza Lupe Johnson,
and Steven Michael Bellovin. The failure of
online social network privacy settings. (2011).
[8] "Online Privacy Tips from 4 Security
Experts." Virtru. Virtru Corporation, 30 June
2015. Web. 13 Dec. 2015.
<https://www.virtru.com/blog/online-privacytips-from-4-security-experts/>.
[9] "Surveillance of Citizens by Government."
NY Times. New York Times, 6 Dec. 2015. Web.
7 Dec. 2015.
<http://topics.nytimes.com/top/reference/timest
opics/subjects/s/surveillance_of_citizens_by_go
vernment/index.html>.
[10] TACMA Guide. Active Voice (2014). <
[1]

http://www.activevoice.net/wpcontent/uploads/2014/07/TACMAGuide-1.pdf>
[11] Tufecki, Zeynep. Stopping WhatsApp
Wont Stop Terrorists. The New York Times.
The New York Times, 21 Nov. 2015. Web. 13
Dec. 2015. <
http://www.nytimes.com/2015/11/22/opinion/st
opping-whatsapp-wont-stopterrorists.html?ref=topics>.
[12] Utz, Sonja, and Nicole Krmer. "The
privacy paradox on social network sites
revisited: The role of individual characteristics
and group norms." Cyberpsychology: Journal of
Psychosocial Research on Cyberspace 3.2
(2009): 2.
[13] Vitak, Jessica. "Balancing Privacy Concerns
and Impression Management Strategies on
Facebook." Symposium on Usable Privacy and
Security (SOUPS). 2015.
[14] Wang, Yang, et al. "A field trial of privacy
nudges for facebook."Proceedings of the 32nd
annual ACM conference on Human factors in
computing systems. ACM, 2014.
[15] William S. Galkin, 1996. Privacy: What is
it? Computer Law Observer, issue 14 (May),
http://www.awcircle.com/issue14.html,
accessed 23 December 1997.
[16] "Docracy - Free Legal Documents."
Docracy Terms of Service and Privacy Policy
Tracker. Docracy. Web. 14 Dec. 2015.
<https://www.docracy.com/tos/changes>.
[17] "Getterms.io." Website Terms & Privacy
Policy Generator. Humaan. Web. 14 Dec. 2015.
<http://getterms.io/>.
[18] Roy, Hugo. "Terms of Service; Didn't
Read." Terms of Service; Didn't Read. Unhosted
5Apps, 1 June 2012. Web. 14 Dec. 2015.
<https://tosdr.org>.
[19] "Your Data Privacy and Online Rights
Shield." PrivacyPal.co. Koding Hackathon
2014, 2014. Web. 14 Dec. 2015.
<http://www.privacypal.co/>.

Vous aimerez peut-être aussi