Received:
2017-11-16 | Accepted:
2018-02-20 | Published:
2018-03-30
Title
Secure personal data administration in the social networks: the case of voluntary sharing of personal data on the Facebook
Abstract
In view of the changes taking place in society, social progress and the achievements of science and technology, the protection of fundamental rights must be strengthened. The aim of the article is to analyse the principles and peculiarities of safe management of the personal data in social networks. In this scientific article, methods of document analysis, scientific literature review, case study and generalization are used. Consumers themselves decide how much and what kind of information to publicize on the Facebook social network. In order to use the third-party applications, users at the time of authorization must confirm that they agree to give access to their personal data otherwise the service will not be provided. Personal data of the Facebook user comprise his/her public profile including user's photo, age, gender, and other public information; a list of friends; e-mail mail; time zone records; birthday; photos; hobbies, etc. Which personal data will be requested from the user depends on the third-party application. Analysis of the legal protection of personal data in the internet social networks reveals that it is limited to the international and European Union legal regulation on protection of the personal data in the online social networks. Users who make publicly available a large amount of personal information on the Facebook social network should decide on the issue if they want to share that information with third parties for the use of their services (applications). This article presents a model for user and third party application interaction, and an analysis of risks and recommendations to ensure the security of personal data of the user.
Keywords
personal data, third-party applications, social network, security of the data
JEL classifications
D80
, D83
, M15
URI
http://jssidoi.org/jesi/article/165
DOI
HAL
Pages
528-541
This is an open access issue and all published articles are licensed under a
Creative Commons Attribution 4.0 International License
References
Besmer, A.; & Lipford, H. 2010. Users' (mis)conceptions of social applications, Proceedings of Graphics Interface. https://pdfs.semanticscholar.org/b5e4/fb0eec3457cacf24ddfa0e6d38e98975edec.pdf
Search via ReFindit
Boyd, D.; & Ellison, N. B. 2007. Social Network Sites: Definition, History, and Scholarship. Journal of Computer–Mediated Communication 13(1): 210-230. https://doi.org/10.1111/j.1083-6101.2007.00393.x
Search via ReFindit
Caers, R.; Feyter T. D.; Couck M. D.; Stough, T.; Vigna, C.; Bois, C. D. 2013. Facebook: A literature review. New Media & Society 15(6): 982-1002. https://doi.org/10.1177/1461444813488061
Search via ReFindit
Carminati, B.; Ferrari, E.; Viviani, M. 2014. Security and trust in online social networking. Morgan & Claypool publishers. https://doi.org/10.2200/S00549ED1V01Y201311SPT008
Search via ReFindit
Comer, R.; Kelvey, N. M.; Curran, C.2012. Privacy on Facebook. International Journal of Engineering and Technology Volume 2(9): 1626-1630. https://doi.org/10.1080/15536548.2014.912909
Search via ReFindit
Debatin, B.; Lovejoy, J. P.; Horn A-K.; Brittany, N.; Hughes, B. N. 2009. Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication 15(1): 83-108. https://doi.org/10.1111/j.1083-6101.2009.01494.x
Search via ReFindit
EUR-Lex, 1995 October 24, Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:31995L0046
Search via ReFindit
EUR-Lex, 2012 October 26, Charter of Fundamental Rights of the European Union. http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:12012P/TXT
Search via ReFindit
European Commission, 2009 June 12. Article 29 Data Protection Working Party: Opinion 5/2009 on online social networking. http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2010/wp179_lt.pdf
Search via ReFindit
European Data Protection Supervisor, Data Subject definition. https://edps.europa.eu/node/3099#data_subject
Search via ReFindit
Fogel, J.; & Nehmad, E. 2009. Internet social network communities: risk taking, trust, and privacy concerns, Computers in Human Behavior 25(1): 153-160. https://doi.org/10.1016/j.chb.2008.08.006
Search via ReFindit
Hammer-Lahav, E.; Recordon, D.; Hardt, D. 2011. The OAuth 2.0 authorization protocol draft-ietf-oauthv2-12. https://tools.ietf.org/html/draft-ietf-oauth-v2-10
Search via ReFindit
Hull, G.; Lipford, H. R.; Latulipe, C. 2011. Contextual gaps: Privacy issues on Facebook. Ethics and Information Technology 13(4): 289-302. https://doi.org/10.1007/s10676-010-9224-8
Search via ReFindit
International Working Group on Data Protection in Telecommunications. 2008. Report and Guidance on Privacy in Social Network Services "Rome Memorandum". https://www.datenschutz-berlin.de/pdf/publikationen/working-paper/2008/2008-Rome_Memorandum-en.pdf
Search via ReFindit
International Working Group on Data Protection in Telecommunications. 2008. Report and Guidance on Privacy International Working Group on Data Protection in Telecommunications. https://icdppc.org/wp-content/uploads/2015/03/International-Working-Group-on-Data-Protection-in-Telecommunications.pdf
Search via ReFindit
Joinson, A. N. 2008. 'Looking at', 'looking up' or 'keeping up with' people? Motives and uses of Facebook. In Proceedings of the 26th Annual SIGCHI Conference "on Human Factors in Computing Systems" Florence, Italy, April 05-10 2008, CHI ’08, ACM, New York, 1027–1036. https://doi.org/10.1145/1357054.1357213
Search via ReFindit
Kang, J. 1998. Information privacy in cyberspace transactions. Standford Law Review 50(4): 1193-1294. https://doi.org/10.2307/1229286
Search via ReFindit
Karg, M.; Fahl, C. 2011. Rechtsgrundlagen für den Datenschutz in sozialen Netzwerken. Komminakation und Recht 7(8): 456-458.
Search via ReFindit
Korauš, A.; Dobrovič, J.; Rajnoha, R.; Brezina, I. 2017. The safety risks related to bank cards and cyber attacks, Journal of Security and Sustainability Issues 6(4): 563-574. https://doi.org/10.9770/jssi.2017.6.4(3)
Search via ReFindit
Lee, E. 2012. Young, black, and connected: Facebook usage among African American college students. Journal of Black Studies 43(3): 336-354. https://doi.org/10.1177/0021934711425044
Search via ReFindit
Lewis, J.; & West, A. 2009. 'Friending': London-based undergraduates’ experience of Facebook. New Media & Society 11(7): 1209-1229. https://doi.org/10.1177/1461444809342058
Search via ReFindit
Malinauskaitė-van de Castel, I. 2017. Duomenų subjekto teisės virtualiuose socialiniuose tinkluose. Mykolo Romerio universitetas. https://vb.mruni.eu/object/elaba:23456482/23456482.pdf
Search via ReFindit
Menshikov, V.; Lavrinenko, O.; Sinica, L.; Simakhova, A. 2017. Network capital phenomenon and its posibilities under the influence of development of information and communication technologies, Journal of Security and Sustainability Issues 6(4): 585-604. https://doi.org/10.9770/jssi.2017.6.4.(5)
Search via ReFindit
Oecd.org, 1980 September 23, OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. http://www.oecd.org/internet/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm
Search via ReFindit
Parent, W. A. 1983. Privacy, Morality, and the Law. Philosophy & Public Affairs 12(4): 269-288. http://www.jstor.org/stable/2265374
Search via ReFindit
Pempek T. A.; Yermolayeva Y. A.; Calvert S. L. 2009. College students’ social networking experiences on Facebook. Journal of Applied Developmental Psychology 30(3): 227-238. https://doi.org/10.1016/j.appdev.2008.12.010
Search via ReFindit
Privacy International.org, Data protection definition. https://www.privacyinternational.org/explainer/41/101-data-protection
Search via ReFindit
Šišulák, S. 2017. Userfocus - tool for criminality control of social networks at both the local and international level, Entrepreneurship and Sustainability Issues 5(2): 297-314. https://doi.org/10.9770/jesi.2017.5.2(10)
Search via ReFindit
Statista.com, 2018. Number of social network users worldwide from 2010 to 2021 (in billions). https://www.statista.com/statistics/278414/number-of-worldwide-social-network-users
Search via ReFindit
Steel, E.; & Fowler, G. 2010 October 18. Facebook in privacy breach. The Wall Street Journal, https://www.wsj.com/articles/SB10001424052702304772804575558484075236968
Search via ReFindit
Štitilis, D.; Gustauskas, V.; Malinauskaitė, I. 2012. Asmens duomenų apsaugos virtualiuose socialiniuose tinkluose teisinė aplinka [The legal environment for personal data protection in virtual social networks]. Societal Innovations for Global Growth 1(1): 288-308. http://etalpykla.lituanistikadb.lt/fedora/objects/LT-LDB-0001:J.04~2012~1367188641078/datastreams/DS.002.0.01.ARTIC/content
Search via ReFindit
Štitilis, D.; Kiškis, M.; Limba, T.; Rotomskis, I.; Agafonov, K.; Gulevičiūtė, G.; Panka, K. 2016. Internet and Technology Law. Vilnius:
Search via ReFindit
Valtysson, B. 2012. Facebook as a Digital Public Sphere: Processes of Colonization and Emancipation. Cognition, Communication, and Co-operation 10(1): 77-91. https://www.triple-c.at/index.php/tripleC/article/view/312/339
Search via ReFindit
Wang, N.; Xu, H.; Grossklags, J. 2011. Third-Party Apps on Facebook: Privacy and the Illusion of Control. In Proceedings of the ACM Symposium on Computer Human Interaction for Management of Information Technology (CHIMIT). Boston, MA.
Search via ReFindit
Wasserman, S.; & Faust, K. 1994. Social network analysis: methods and applications. New York: Cambridge University Press.
Search via ReFindit
Westin, A.1968. Privacy and Freedom, Washington and Lee Law Review 25(1): 166-170. https://scholarlycommons.law.wlu.edu/cgi/viewcontent.cgi?referer=https://www.google.lt/&httpsredir=1&article=3659&context=wlulr
Search via ReFindit
Yau, N.; & Schneider, J. 2009. Self-surveillance. Bulletin of the American Society for Information Science and Technology 35(5): 24-30.
Search via ReFindit
Zaidieh, A. J. Y. 2012. The Use of Social Networking in Education: Challenges and Opportunities. World of Computer Science and Information Technology Journal 2(1): 18-21. http://wcsit.org/pub/2012/vol.2.no.1/The%20Use%20of%20Social%20Networking%20in%20Education%20Challenges%20and%20Opportunities.pdf
Search via ReFindit
Zeman, T.; Břeň, J.; Urban, R. 2017. Role of Internet in Lone Wolf Terrorism, Journal of Security and Sustainability Issues (2): 185-192. https://doi.org/10.9770/jssi.2017.7.2(1)
Search via ReFindit