Our Blog: Stuff we think you should know

Privacy Concerns Hang Over Social Media

Privacy Concerns Hang Over Social Media

Social media has brought about a massive shift in the way people interact. Today we share our opinions, photos, and videos; and, we can even choose our dates by swiping right or left. With social media, people share moments, opinions, and other information, but is all this sharing actually setting people, and the organizations they interact with, up for failure? We’ll take a look at social media privacy concerns and potentially hazardous practices that could exacerbate the problems further.

The basic tenet of social media is the ability for individuals to share part of themselves easily. With more computing done on mobile platforms today than ever before, more people are using these applications to share little pieces of their lives. One study conducted in 2018 found that not including YouTube, it was found that 69 percent of all American adults (18+) used some form of social media regularly over the subsequent year. That number continues to grow. So much so that now nearly 40 percent of seniors use some form of social media today, up nearly 200 percent since 2012.

With so many people using social media it stands to reason that the number of people looking to steal money, information, and identities would also grow as well. This has proven to be accurate, and now today there are a fair amount of major privacy concerns that all social media users have to be cognizant of. The study also laid out what people use social media for. It won’t be a surprise to those who do use social media a fair amount that a lot of what is done is actually substituting as a social interactions hub to those people that don’t have the time (or the inclination) to interact with people in person or through other traditional methods. In fact, most people cite social media as where they share most of their civil and political views, personal health information, learn scientific information, engage in job, familial, and society-related activities; and, probably most alarming of all, it’s the place they go to get their news.

Role of Privacy

Privacy has, and will likely always be, dependent on how much an individual prioritizes the security of his/her personal information. If someone wants to keep some semblance of their life private, he/she can still do it, as long as it’s not available for people to steal. This is increasingly a problem. As social media use increases, the amount of direct integration that developers create with these social websites increases, making it easier for people to lose control over their private information.

That’s not to say that by allowing social media companies access to some of your most personal information that you will completely lose control over it, but it seems fair to suggest. In a 2014 survey, 91 percent of polled Americans suggested that they had lost control over their personal information (or how it was collected), with 80 percent showing at least some concern over the relationship advertisers and other businesses have with these social media companies.

One problem is that over half of Americans are cognizant of the dangers of having personal information fall into the wrong hands, and as a result they are actively monitoring their private information and where it is shared more effectively. The problem that faces them over time is that in order to use social media (or e-commerce for that matter), many companies are now demanding access to personal information that isn’t relevant to the transactions. This kind of data mining is beginning to creep out users as much as some of the content they find on these platforms, and it's only a matter of time before a new social platform is created that doesn’t present users these problems; or, people just begin leaving the current platforms en masse. Thus far, there hasn’t been much real negative movement on that front.

So Why Do We Stay?

This actually begs the question, “why do they stay?” If a professional lumberjack were to tell you that they have a great concern that a tree is going to fall over, would you stand directly under that tree? Obviously not. So why, when professional IT consultants tell you that you are going to have a complete social profile of you as a consumer made up of every click you make on a website, that will be sold off to advertisers of all kinds, do you not just opt out?

It could be for a multitude of reasons. Maybe you need a platform for marketing purposes. Maybe you use it differently than most and don’t share a lot of personal information? Maybe, you are one of the millions of people today that are trading their privacy for convenience? Whatever the reason is, if social media has become an important part of your life, you most likely have made some privacy concessions, knowingly-or-not, in order to use it.

Between social media and online commerce, more personally identifiable information is shared with corporate entities than you would ever share with some of your closest family members in person, let alone over the Internet. This may be a testament to the built-in encryption these services use, but more likely, people don’t consider that their personal or financial information is at risk when using these reputable outlets. This perception is a bit off, especially given the amount of information organizations are able to mine from a single, typical user.

The reality is that people find personal value in social networking and other social media. Whether it is sharing thoughts with the people they love, learning new information, entering into one of the countless discussions available, or simply as an information subsidy to their busy life, social media users have a tendency to use any downtime they have to focus on their social media. When you consider 30 percent of all online time is spent on social media (which only increases when people go mobile), you begin to understand that it carries value for hundreds of millions of people.

How do you use your social profiles? Would you consider yourself a heavy user? Do you have concerns over social media platforms’ use of your social media behaviors and other personal information? Leave your thoughts about it in the comments section and return to our blog for more great technology-related articles.

Does Your Business Have a Sufficient Backup Plan?
Tip of the Week: Building a Knowledge-Based Wiki i...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 17 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Hackers Privacy Business Email User Tips Malware Computer Business Computing Microsoft Google Hosted Solutions Network Security Productivity Software Internet Tech Term Data Small Business Mobile Devices Backup Efficiency Communication IT Services Ransomware Workplace Tips Hardware Windows 10 Smartphone Android Data Recovery Microsoft Office IT Support Saving Money Cloud Computing Productivity Browser Data Management Business Continuity Facebook Managed IT Services Upgrade Social Media Gmail Data Backup Office 365 Server Internet of Things Information Users Phishing Managed IT Services Innovation Word Windows Mobile Device Passwords Disaster Recovery Smartphones Outsourced IT App Windows 10 Vulnerability Cybersecurity Miscellaneous communications Artificial Intelligence Business Management Managed Service Provider VoIP Remote Monitoring Encryption Employer-Employee Relationship Network Chrome Content Filtering Tip of the week Analytics IT Support Big Data Managed Service Gadgets Government Money Spam Website Infrastructure BYOD Applications Apps Save Money Office Tips Hacker Apple Virtual Reality Paperless Office Tablet Data storage WiFi Display Bandwidth Antivirus YouTube Employee-Employer Relationship Avoiding Downtime The Internet of Things Unified Threat Management VPN Education Robot Virtualization Risk Management Access Control Router Wireless Printing Automation Customer Service Augmented Reality IT Management Maintenance Settings Firewall Two-factor Authentication Retail Hosted Solution SaaS Solid State Drive Presentation Company Culture Networking Outlook Office Hard Disk Drive Monitors Wireless Technology Holiday Search Data Security HIPAA Recovery IBM Data loss Business Technology Chromebook Mobile Device Management Development Virtual Private Network Administration Operating System Customer Relationship Management End of Support Server Management Bring Your Own Device Wi-Fi Computing Laptop Password Mobile Security Document Management Touchscreen Google Drive Mouse Vendor Management Telephone Systems Hacking Safety LiFi Computers Quick Tips Storage Downtime Scam Business Intelligence Cyber Monday Social Networking Scary Stories Analysis Employee-Employer Relationships Corporate Profile Current Events Language USB Optimization Streaming IP Address Cybercrime FinTech iOS Blockchain Cost Management Troubleshooting VoIP Legal Google Calendar Chatbots Security Cameras Alt Codes Dark Data Net Neutrality Screen Reader Undo National Security How To Drones Printer Wearable Technology Smart Technology Marketing Motherboard Remote Computing Sports Students WannaCry Going Green Social Engineering Computing Infrastructure Dongle Knowledge Recycling Human Error IT service Heating/Cooling Identity Application Update Mobile Office MSP Scalability Social Permissions Assessment Time Management Legislation Managing Stress Managed Services Cabling Typing FCC Smart Tech PowerPoint Firefox Deep Learning Humor Distributed Denial of Service Mixed Reality Alerts Service Level Agreement Digital Payment Experience Unified Communications eWaste Device BDR Servers Comparison Running Cable Migration Hacks Fraud Internet Exlporer Politics LED Network Management Cables Laptops Managed IT Cryptocurrency Title II Connectivity Virtual Desktop Onboarding Techology Budget SharePoint Collaboration sip Managed IT Service Modem Hard Drives Buisness Slack Data Breach Digital Lenovo How To Licensing Private Cloud Continuity Mobility Google Maps Specifications Compliance Lithium-ion battery Charging Mail Merge Value Tech Support IT solutions Smart Office Co-Managed IT Wires Software as a Service Disaster Shortcut Bitcoin Network Congestion Online IoT Computer Care Digital Signage Unified Threat Management Downloads IT Technicians File Sharing Statistics Best Practice telephony Break Fix Cookies Refrigeration Samsung 5G Monitoring Hard Disk Drives Spyware Superfish Information Technology Cooperation User Solar Print Toner Black Friday Regulations Halloween Messaging Address Writing Hotspot Professional Services Public Speaking Websites Identity Theft Cortana Work Content Google Docs Voice over Internet Protocol Entertainment Uninterrupted Power Supply Patch Management Windows 8 Microsoft Excel Star Wars Competition Training Fun Desktop User Error Multi-Factor Security Mirgation Shortcuts Bluetooth Business Growth Dark Web Nanotechnology G Suite Spying Solid State Drives Google Wallet Staff Automobile Twitter Botnet Supercomputer Motion Sickness Gadget Staffing Crowdsourcing Taxes 3D Printing Personal Information Administrator Web Server Emergency Machine Learning IT Budget GPS Printers IT Consultant Updates Unsupported Software Computer Repair Processors Cameras Relocation Meetings Tracking Cleaning Mobile Data Health Alert CCTV Emoji Webcam Windows 7 Domains Work/Life Balance Electronic Medical Records Error Black Market Point of Sale Regulation Mobile Computing Travel Law Enforcement Physical Security Notifications CrashOverride Upgrades