Our Blog: Stuff we think you should know

Privacy Concerns Hang Over Social Media

Privacy Concerns Hang Over Social Media

Social media has brought about a massive shift in the way people interact. Today we share our opinions, photos, and videos; and, we can even choose our dates by swiping right or left. With social media, people share moments, opinions, and other information, but is all this sharing actually setting people, and the organizations they interact with, up for failure? We’ll take a look at social media privacy concerns and potentially hazardous practices that could exacerbate the problems further.

The basic tenet of social media is the ability for individuals to share part of themselves easily. With more computing done on mobile platforms today than ever before, more people are using these applications to share little pieces of their lives. One study conducted in 2018 found that not including YouTube, it was found that 69 percent of all American adults (18+) used some form of social media regularly over the subsequent year. That number continues to grow. So much so that now nearly 40 percent of seniors use some form of social media today, up nearly 200 percent since 2012.

With so many people using social media it stands to reason that the number of people looking to steal money, information, and identities would also grow as well. This has proven to be accurate, and now today there are a fair amount of major privacy concerns that all social media users have to be cognizant of. The study also laid out what people use social media for. It won’t be a surprise to those who do use social media a fair amount that a lot of what is done is actually substituting as a social interactions hub to those people that don’t have the time (or the inclination) to interact with people in person or through other traditional methods. In fact, most people cite social media as where they share most of their civil and political views, personal health information, learn scientific information, engage in job, familial, and society-related activities; and, probably most alarming of all, it’s the place they go to get their news.

Role of Privacy

Privacy has, and will likely always be, dependent on how much an individual prioritizes the security of his/her personal information. If someone wants to keep some semblance of their life private, he/she can still do it, as long as it’s not available for people to steal. This is increasingly a problem. As social media use increases, the amount of direct integration that developers create with these social websites increases, making it easier for people to lose control over their private information.

That’s not to say that by allowing social media companies access to some of your most personal information that you will completely lose control over it, but it seems fair to suggest. In a 2014 survey, 91 percent of polled Americans suggested that they had lost control over their personal information (or how it was collected), with 80 percent showing at least some concern over the relationship advertisers and other businesses have with these social media companies.

One problem is that over half of Americans are cognizant of the dangers of having personal information fall into the wrong hands, and as a result they are actively monitoring their private information and where it is shared more effectively. The problem that faces them over time is that in order to use social media (or e-commerce for that matter), many companies are now demanding access to personal information that isn’t relevant to the transactions. This kind of data mining is beginning to creep out users as much as some of the content they find on these platforms, and it's only a matter of time before a new social platform is created that doesn’t present users these problems; or, people just begin leaving the current platforms en masse. Thus far, there hasn’t been much real negative movement on that front.

So Why Do We Stay?

This actually begs the question, “why do they stay?” If a professional lumberjack were to tell you that they have a great concern that a tree is going to fall over, would you stand directly under that tree? Obviously not. So why, when professional IT consultants tell you that you are going to have a complete social profile of you as a consumer made up of every click you make on a website, that will be sold off to advertisers of all kinds, do you not just opt out?

It could be for a multitude of reasons. Maybe you need a platform for marketing purposes. Maybe you use it differently than most and don’t share a lot of personal information? Maybe, you are one of the millions of people today that are trading their privacy for convenience? Whatever the reason is, if social media has become an important part of your life, you most likely have made some privacy concessions, knowingly-or-not, in order to use it.

Between social media and online commerce, more personally identifiable information is shared with corporate entities than you would ever share with some of your closest family members in person, let alone over the Internet. This may be a testament to the built-in encryption these services use, but more likely, people don’t consider that their personal or financial information is at risk when using these reputable outlets. This perception is a bit off, especially given the amount of information organizations are able to mine from a single, typical user.

The reality is that people find personal value in social networking and other social media. Whether it is sharing thoughts with the people they love, learning new information, entering into one of the countless discussions available, or simply as an information subsidy to their busy life, social media users have a tendency to use any downtime they have to focus on their social media. When you consider 30 percent of all online time is spent on social media (which only increases when people go mobile), you begin to understand that it carries value for hundreds of millions of people.

How do you use your social profiles? Would you consider yourself a heavy user? Do you have concerns over social media platforms’ use of your social media behaviors and other personal information? Leave your thoughts about it in the comments section and return to our blog for more great technology-related articles.

Does Your Business Have a Sufficient Backup Plan?
Tip of the Week: Building a Knowledge-Based Wiki i...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, April 25 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Privacy Business Hackers User Tips Malware Microsoft Computer Business Computing Internet Google Network Security Hosted Solutions Productivity Software Tech Term Communication Mobile Devices Efficiency IT Services Data Small Business Backup Hardware Smartphone Workplace Tips Windows 10 Ransomware Android IT Support Productivity Microsoft Office Saving Money Browser Cloud Computing Business Continuity Managed IT Services Data Management Data Recovery Data Backup Gmail Office 365 Internet of Things Facebook Innovation Server Users Windows Upgrade Managed IT Services Word Passwords Disaster Recovery Smartphones App Outsourced IT Phishing Social Media Windows 10 Artificial Intelligence Employer-Employee Relationship communications Vulnerability Cybersecurity Business Management Managed Service Provider VoIP Remote Monitoring Encryption Network Chrome Mobile Device Content Filtering Managed Service Tip of the week Money Big Data Miscellaneous Information Government Applications Spam Save Money BYOD Website Infrastructure Apple Office Tips Analytics Hacker IT Support Employee-Employer Relationship Virtual Reality Firewall Bandwidth Robot YouTube Tablet Paperless Office Printing Automation Education Antivirus WiFi Access Control Risk Management Avoiding Downtime Wireless The Internet of Things Router Virtualization Customer Service IT Management Data storage Settings Display Maintenance Two-factor Authentication Outlook Company Culture Quick Tips Hosted Solution Hacking Scam Monitors SaaS Solid State Drive Networking Presentation Search Operating System IBM HIPAA End of Support Development Office Holiday Computing Unified Threat Management Hard Disk Drive VPN Mobile Device Management Data Security Wireless Technology Password Administration Gadgets Google Drive Customer Relationship Management Data loss Business Technology Recovery Mouse Vendor Management Virtual Private Network Wi-Fi Chromebook Laptop Mobile Security LiFi Computers Augmented Reality Server Management Storage Document Management Touchscreen Business Intelligence Safety Retail Apps Telephone Systems Downtime USB Security Cameras Training Scary Stories User Error Public Speaking Cyber Monday Social Networking Going Green Social Engineering Uninterrupted Power Supply Patch Management Language Recycling Human Error IP Address G Suite Cybercrime Competition Google Calendar Chatbots Social Students Automobile Bluetooth Blockchain Cost Management Corporate Profile Printer Wearable Technology Typing MSP Scalability Net Neutrality Screen Reader Computing Infrastructure Deep Learning Dongle Humor Managing Stress Managed Services Sports VoIP Smart Technology Motherboard PowerPoint Knowledge eWaste Device Mobile Office How To Legislation Identity Hacks Permissions Assessment WannaCry Undo Cryptocurrency Migration IT service Heating/Cooling FCC Smart Tech Budget LED Remote Computing Alerts Bring Your Own Device Service Level Agreement sip Cables Laptops Time Management Distributed Denial of Service How To Onboarding Update Experience Unified Communications Marketing Continuity Mobility Running Cable Firefox Comparison Slack Cabling Application Fraud Internet Exlporer SharePoint Bitcoin Network Congestion Charging Digital Payment Virtual Desktop BDR Servers Title II Connectivity Smart Office Co-Managed IT Licensing Best Practice telephony Wires Software as a Service Politics Buisness Network Management Managed IT Service Modem Information Technology Digital Signage Solar Print Toner Lithium-ion battery Techology Specifications Compliance Writing Monitoring Collaboration IT solutions Managed IT Value Google Docs Digital Lenovo Downloads IT Technicians Windows 8 Messaging Google Maps Online IoT Work Content Mail Merge Hard Drives Cooperation Business Growth Voice over Internet Protocol Entertainment Tech Support 5G Break Fix Cookies Google Wallet Desktop Shortcuts Computer Care Halloween Unified Threat Management Black Friday Regulations Current Events Spying File Sharing Cortana Disaster Shortcut Hotspot Professional Services Samsung Spyware Superfish Multi-Factor Security Mirgation Analysis Employee-Employer Relationships Fun Statistics Microsoft Excel Star Wars Legal Optimization Streaming Address Refrigeration Staff Alt Codes Dark Data FinTech iOS Websites Identity Theft User Dark Web Nanotechnology Drones Troubleshooting Law Enforcement Travel Notifications CrashOverride Botnet Supercomputer Unsupported Software Printers Twitter Gadget Staffing Motion Sickness Crowdsourcing Taxes Personal Information Administrator Web Server Emergency Machine Learning IT Budget Mobile Data GPS IT Consultant Computer Repair Processors Cameras Windows 7 Relocation Tracking Meetings Cleaning Mobile Computing Health Alert CCTV Regulation Private Cloud Physical Security Upgrades Emoji Webcam Work/Life Balance Domains Electronic Medical Records Error 3D Printing Black Market Point of Sale