HOW SOCIAL ARE SOCIAL MEDIA PRIVACY CONTROLS?

Size: px
Start display at page:

Download "HOW SOCIAL ARE SOCIAL MEDIA PRIVACY CONTROLS?"

Transcription

1 HOW SOCIAL ARE SOCIAL MEDIA PRIVACY CONTROLS? Gaurav Misra, Jose M. Such School of Computing and Communications Lancaster University, UK Abstract: Social Media are key mediators of social interactions in the cyber world. Yet, the privacy controls of mainstream social media are far from facilitating social interactions, even when privacy management is known to be an interpersonal boundary regulation process fundamental to the appropriate functioning and development of social relationships. 1. Introduction Social Media sites are an example of modern socio-technical systems that allow computer-mediated interactions among users, in which they are able to share content that is usually generated by them (posts, photos, etc.). The use of Social Media such as Facebook, Twitter, Google+, Myspace, LinkedIn, Pinterest, Xing, LastFm, Flickr, and many others have massively grown over the last decade. This huge growth of Social Media use is in part due to the many benefits that users experience when using Social Media. Moreover, Social Media is increasingly playing a central role in users social relationships. In particular, Social Media allows users to establish, develop, and maintain social relationships by means of sharing personal information, which indeed plays a crucial role to manage what is known as social capital. It also enables users to participate in and build communities and networks of people who share similar interests to them. Even governments and politicians around the world are using Social Media to engage with citizens, e.g., UK Government ICT Strategy promotes and provides guidance for civil servants to use Social Media, and Social Media arguably played an important role in the re-election of President Barack Obama in the US. Despite the unquestionable success of Social Media, privacy remains one of the major concerns with regards to these technologies. These privacy concerns have been increasing over the last few years because users are more aware of the privacy threats that Social Media entail. Sharing personal information with an unintended audience is of particular concern, which is commonly referred to as the insider threat. This problem is particularly critical in those Social Media sites that treat all of the users friends in the same manner, that is, without any distinction between friends with different types and strengths of social relationships, usually belonging in different life spheres or contexts. The social context of a particular disclosure forms a significant part (together with other variables like location, etc.) of the overall context of that disclosure. This helps in determining the appropriate audience for that disclosure, ensuring contextual integrity maintenance [1] and enabling dynamic social boundary regulation [2]. Acknowledgement and accommodation of such social contexts is, therefore, imperative in order to safeguard the privacy of social media users, but how socially aware are current mainstream social media privacy controls? 1

2 2. Classification of mainstream Social Media Privacy Controls We classified the top-30 Social Media sites according to the Alexa traffic rank ( ial_networking, accessed in January, 2015) according to their social awareness with respect to the contact grouping and relationship management mechanisms they afford to users. We ignored and excluded dating sites, online shopping sites and sites that were too specific to particular populations (e.g.,: Classmates for only US graduates, Naijapals for only Nigerians). The first 30 general-purpose online social networks we found on the Alexa ranking are classified in Figure 1. The individual Social Media infrastructures were evaluated by looking at their privacy policies and settings. In most cases, user accounts were created in order to examine the actual options available for the users of the individual infrastructures, as this was not directly evident from their privacy policies. We created sample user accounts using different addresses and experimented with the different access control mechanisms afforded by each infrastructure. Binary Classification: Nearly half the sites (14) we evaluated were found to have only a binary distinction between a user s friends and the rest of the network. The only relationship type supported is a blanket term friends and no further granularity is afforded. In such a scenario, a user is unable to distinguish between two friends and hence is unable to fully express real-life relationships on the online medium. Figure 1. Top OSNs classified according to the social aspect of their privacy controls and ordered alphabetically for each level as of January Predefined Groups: Some OSNs, such as LinkedIn, do provide predefined groups, which help the users to better organize their contacts. Users can populate groups which are created for them (some popular ones can be colleagues or family ) and can then treat these groups differently. However, there is no provision to include individuals separately and the whole group is required to be allowed or denied access to content while making disclosure decisions. We found 4 OSNs which had this type of privacy mechanism. Predefined Groups + Individuals: An improvement is found in sites such as Tagged and Hi5 which provide the option of treating individuals separately from the predefined groups. This helps the user to direct their content in a way that is closer to the social experience in real life. For example, a user may have a group for colleagues but he may not wish to treat all of them equally all the time when making access control 2

3 decisions. This kind of mechanism provides them with a larger amount of granularity and control over their content. User Defined Groups + Individuals: An enhancement on predefined grouping is to afford the users the ability to create their own groups. In this scenario, the user can create groups according to their own preferences (which may or may not include the default ones provided). The popular social networks such as Google+ and Facebook offer the user to manage circles and lists respectively. They provide some default groups which the user can populate but they can also choose to create their own groups according to their preferences to reflect their real-world relationships. Computer Supported Grouping: We enlist Facebook separately as its privacy controls provide an enhanced grouping mechanism as compared to other OSNs. The smart lists feature on Facebook automatically creates friend based on features like location, workplace, etc. This aids users to classify their friends into groups. Also, the introduction of close friends and acquaintances lists by Facebook does indicate an acceptance of the important role of relationship strength. Users can use these lists to decide access control policies. 3. Towards more social Privacy Controls According to the classification we showed above, mainstream social media seem to be moving towards more socially aware privacy controls. This is an important move as it actually recognises the importance of social relationships and the interplay between social relationships and privacy. However, there is still much room for improving privacy controls in order to make them support the social nature of privacy, so that privacy controls would be more aware of social contexts. Traditional access control approaches such as role-based access controls (RBAC) or indeed the group-based approaches used by social media as described before cannot capture the social relationships among the users. Therefore, the need for Relationship-based Access Controls (ReBAC) arises [3]. A ReBAC model considers a different set of properties to define relationships (e.g., different relationship types, closeness, or social distance) and hence results in a more natural information disclosure which is closer to real world communication. For instance, employing ReBAC, a user can decide that only her friends and close friends of her can access a photo. One of the main stumbling blocks for ReBAC is usability. These models consider a large number of social features, which can very much help users to better identify the social context in which disclosure are to happen. However, users ought to be assisted in the process of defining their relationships and selecting audiences as we stated above. This entails improving visualization of audiences as well as information already shared and with whom (and possible inferences from that), suggesting privacy configurations based on relationships, and inferring the relationship features needed. Moreover, relationship-based privacy controls also need to be computationally lightweight and seamlessly integrate with the social media interface in order to preserve the dynamism of users experience on social networks. A recent effort to implement a ReBAC mechanism uses attribute-based encryption to enable the users to control access to their photos on an ios platform [4]. Another shortcoming noticed in our analysis of privacy controls is the glaring absence of mechanisms supporting Collective Decision Making by multiple users for shared content [5]. Social Media sites need to consider mechanisms for multiple users to negotiate access control decisions for items that involve them, such as pictures and posts, before these items get actually posted in Social Media. Most privacy controls solve such situations by only applying the privacy preferences of the party that uploads the item and users are forced to negotiate manually using other means such as , 3

4 SMSs, phone calls, etc. Even then, negotiations may happen after the item has been already uploaded and a privacy violation has occurred. Computational mechanisms that can automate the negotiation process have been identified as a possible mitigation. Note that this does not mean that users would lose control in any way. Instead, these mechanisms would suggest a possible solution to the conflicts that users will need to accept to be finally applied if users do not accept the suggestion they will need to enter into a manual negotiation by other means. Therefore, the main challenge is to propose solutions that can be accepted most of the time by all the users involved, so that users are forced to negotiate manually as little as possible, thus minimising the burden on the user to resolve such conflicts. There have been some mechanisms proposed in this very young discipline, but a more fundamental study is required in order to understand: (i) under which conditions users will make concessions; and (ii) what are the variables that make users take stronger or more lenient positions during these negotiations. This can then become the basis upon which novel mechanisms should be designed, so that they are able to suggest acceptable solutions for all users involved most of the time. Another open challenge is the ability of privacy controls to adequately support the users in disclosure decisions which would be favourable for them in self-presentation or in managing relationship dynamics. Users maintain different relationships with varying objectives (personal attachment, professional networking, etc.) and the manner and content of their communication varies accordingly. Such nuances have to be adequately accommodated and supported to provide the users with assistance in Relationship Management online. This poses many socio-technical challenges for future research in the topic. One particular challenge is the development of tools that are aware of relationship status, including information disclosures made by the user as well as the reciprocations provided by other members of the network [6]. This information would then provide the intelligence for a decision support system which would help users understand their relationships and fine tune the information disclosures based on this understanding and self-presentation needs. Such systems would be required to include a learning mechanism within them in order to understand the behaviour of each individual user and adapt accordingly to provide personally relevant assistance. One major concern with such systems may be that they run the risk of becoming too intrusive as they observe and analyse all communication between users and infer from it. Unlike in the offline world, communication on most OSNs is mediated by a single entity which is the OSN provider (except a handful of distributed OSNs implemented by peerto-peer nodes). Thus, the OSN provider can influence the amount and nature of communication between individuals on their platforms. For example, a recent experiment studied the emotional contagion of Facebook status updates by moderating the amount of content received by users from various friends [7]. This confirms that the OSN provider can modify the input being fed to the user through the network which can result in an alteration of the nature and the strength of relationships, as they depend on interactions between the individuals on these mediums. This highlights the fact that the so-called institutional privacy can also play a role in social privacy [8]. Indeed, institutional and social privacy are known to be intertwined, so that none of them can be completely solved without the other which points to the need of studying social media privacy from a holistic point of view reconciling these two privacy angles. 4

5 4. Conclusion The good news is that, according to the classification we showed in this article, mainstream social media seem to be moving towards more socially aware privacy controls. Research on privacy for Social Media are clearly making advances to give more importance to the modelling and exploitation of social relationships, which we expect would lead to next-generation privacy controls more intuitive as they would try to mimic more how privacy is handled by people socially in the offline world. However, there needs to be caution against developing assistance to users that becomes intrusive, as this could then have the collateral effect of becoming privacy-invasive on its own, so a delicate balance needs to be found. References [1] Nissenbaum, Helen. "Privacy as contextual integrity." Washington law review 79.1 (2004). [2] Palen, L., & Dourish, P. (2003, April). Unpacking privacy for a networked world. In Proceedings of the SIGCHI conference on Human factors in computing systems (pp ). ACM. [3] Fogues, Ricard, et al. "Open Challenges in Relationship-Based Privacy Mechanisms for Social Network Services." International Journal of Human-Computer Interaction just-accepted (2015). [4] Yuan, Lin, et al. "Privacy-preserving photo sharing based on a public key infrastructure." SPIE Optical Engineering+ Applications. International Society for Optics and Photonics, [5] A. Lampinen, V. Lehtinen, A. Lehmuskallio, and S. Tamminen, We re in it together: interpersonal management of disclosure in social network services, in Proc. CHI. ACM, 2011, pp [6] Such, Jose M., Agustín Espinosa, Ana García-Fornes, and Carles Sierra. "Selfdisclosure decision making based on intimacy and privacy." Information Sciences 211 (2012): [7] Kramer, A. D., Guillory, J. E., & Hancock, J. T. (2014). Experimental evidence of massive-scale emotional contagion through social networks. Proceedings of the National Academy of Sciences, 111(24), [8] Gurses, Seda, and Claudia Diaz. "Two tales of privacy in online social networks." Security & Privacy, IEEE 11.3 (2013):

Proceedings of the Third International Workshop on Formal Methods for Interactive Systems (FMIS 2009)

Proceedings of the Third International Workshop on Formal Methods for Interactive Systems (FMIS 2009) Electronic Communications of the EASST Volume X (2009) Proceedings of the Third International Workshop on Formal Methods for Interactive Systems (FMIS 2009) Poporo: A Formal Framework for Social Networking

More information

Social Media Branding in the Age of Obama Assembling the Social Media Puzzle

Social Media Branding in the Age of Obama Assembling the Social Media Puzzle Social Media Branding in the Age of Obama Assembling the Social Media Puzzle The Obama Social Media Strategy Social media web sites such as Facebook and Twitter have become popular Internet destinations.

More information

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of

More information

Open Challenges in Relationship-Based Privacy Mechanisms for Social Network Services

Open Challenges in Relationship-Based Privacy Mechanisms for Social Network Services Open Challenges in Relationship-Based Privacy Mechanisms for Social Network Services Ricard Fogues 1,2, Jose M. Such 3, Agustin Espinosa 1, and Ana Garcia-Fornes 1 1 Departamento de Sistemas Informáticos

More information

Accesibility of Social Networking Services. Observatory on ICT Accessibility discapnet

Accesibility of Social Networking Services. Observatory on ICT Accessibility discapnet Observatory on ICT Accessibility discapnet Accessibility of Social Networking Services Abridged version December 2010 1 Introduction The emergence and spread of social networking services on Internet 1

More information

Social Media Policy For Staff

Social Media Policy For Staff Social Media Policy For Staff 1 Owlswick School and Home Social Media Policy Introduction The Internet provides a range of social media tools that allow users to interact with one another, for example

More information

Information Management Advice 57 Sample Social Media Acceptable Use Policy

Information Management Advice 57 Sample Social Media Acceptable Use Policy Information Management Advice 57 Sample Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using

More information

[Example] Social Media Acceptable Use Policy

[Example] Social Media Acceptable Use Policy [Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.

More information

1 The total values reported in the tables and

1 The total values reported in the tables and 1 Recruiting is increasingly social and Adecco wants to know how it works. An international survey, that involved over 17.272 candidates and 1.502 Human Resources managers between March 18 and June 2,

More information

Taxonomy for Privacy Policies of Social Networks Sites

Taxonomy for Privacy Policies of Social Networks Sites Social Networking, 2013, 2, 157-164 http://dx.doi.org/10.4236/sn.2013.24015 Published Online October 2013 (http://www.scirp.org/journal/sn) Taxonomy for Privacy Policies of Social Networks Sites Sergio

More information

Security tips for the use of social media websites

Security tips for the use of social media websites CYBER SECURITY OPERATIONS CENTRE NOVEMBER 2012 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL

More information

Reconciling Privacy with Social Media

Reconciling Privacy with Social Media Reconciling Privacy with Social Media Heather Richter Lipford Lorraine Kisselburgh Department of Software and School of Communication Information Systems Purdue University University of North Carolina

More information

SOCIAL NETWORKING POLICY

SOCIAL NETWORKING POLICY SOCIAL NETWORKING POLICY Ratified 9 th March 2016 Reviewed Policy Authorisation Authorised Date By Version March 2016 Governors 1.0 Review Date Changes Made Next Review 1 SOCIAL NETWORKING POLICY This

More information

IMPACT OF TRUST, PRIVACY AND SECURITY IN FACEBOOK INFORMATION SHARING

IMPACT OF TRUST, PRIVACY AND SECURITY IN FACEBOOK INFORMATION SHARING IMPACT OF TRUST, PRIVACY AND SECURITY IN FACEBOOK INFORMATION SHARING 1 JithiKrishna P P, 2 Suresh Kumar R, 3 Sreejesh V K 1 Mtech Computer Science and Security LBS College of Engineering Kasaragod, Kerala

More information

ASTH416 Develop practices which promote choice, well-being and protection of all individuals

ASTH416 Develop practices which promote choice, well-being and protection of all individuals Develop practices which promote choice, well-being and protection of Overview For this unit you will need to develop, maintain and evaluate systems, and support others to promote the rights, responsibilities,

More information

Keywords: Online Social Network, Privacy Policy, Filter Unwanted Messages, Image and Commend

Keywords: Online Social Network, Privacy Policy, Filter Unwanted Messages, Image and Commend Volume 6, Issue 4, April 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy Based

More information

BCS, The Chartered Institute for IT Consultation Response to:

BCS, The Chartered Institute for IT Consultation Response to: BCS, The Chartered Institute for IT Consultation Response to: A Comprehensive Approach to Personal Data Protection in the European Union Dated: 15 January 2011 BCS The Chartered Institute for IT First

More information

Jobsket ATS. Empowering your recruitment process

Jobsket ATS. Empowering your recruitment process Jobsket ATS Empowering your recruitment process WELCOME TO JOBSKET ATS Jobsket ATS is a recruitment and talent acquisition software package built on top of innovation. Our software improves recruitment

More information

Async: Secure File Synchronization

Async: Secure File Synchronization Async: Secure File Synchronization Vera Schaaber, Alois Schuette University of Applied Sciences Darmstadt, Department of Computer Science, Schoefferstr. 8a, 64295 Darmstadt, Germany vera.schaaber@stud.h-da.de

More information

Top 4 Ways Social Media is Helping to Reshape Marketing

Top 4 Ways Social Media is Helping to Reshape Marketing Top 4 Ways Social Media is Helping to Reshape Marketing How implementing social media into your business strategy can position your brand for the better Inside, you ll find information on: The ever-changing

More information

experts in your field Get the profile: Managing your online reputation A Progressive Recruitment career guide Managing your online reputation

experts in your field Get the profile: Managing your online reputation A Progressive Recruitment career guide Managing your online reputation experts in your field Get the profile: A Progressive Recruitment career guide Contents Introduction... 2 Why you need an online reputation... 3 Monitoring your online reputation... 3 How to protect your

More information

The Use of Social Media by Electronics Design Engineers

The Use of Social Media by Electronics Design Engineers The Use of Social Media by Electronics Design Engineers A Study by the University of Chichester and Napier Partnership Limited August 2009 ABSTRACT This joint project between Napier and the University

More information

Disclosure Statement: I have no industry relationships to disclose.

Disclosure Statement: I have no industry relationships to disclose. Professionalism and Social Media Speaker Information: Julie Walsh - Covarrubias, MEd, EdD Associate Professor Unviersity of Alabama - Birmingham 619 19th Street S Women and Infants Center, RM 5330 Department

More information

Using Feedback Tags and Sentiment Analysis to Generate Sharable Learning Resources

Using Feedback Tags and Sentiment Analysis to Generate Sharable Learning Resources Using Feedback Tags and Sentiment Analysis to Generate Sharable Learning Resources Investigating Automated Sentiment Analysis of Feedback Tags in a Programming Course Stephen Cummins, Liz Burd, Andrew

More information

THE CULTURE OF INNOVATION AND THE BUILDING OF KNOWLEDGE SOCIETIES. - Issue Paper -

THE CULTURE OF INNOVATION AND THE BUILDING OF KNOWLEDGE SOCIETIES. - Issue Paper - THE CULTURE OF INNOVATION AND THE BUILDING OF KNOWLEDGE SOCIETIES - Issue Paper - UNESCO, Bureau of Strategic Planning September 2003 1 I. The past and present scope of innovation During the last two decades,

More information

The Social Media Best Practice Guide

The Social Media Best Practice Guide The Social Media Best Practice Guide A Xander Marketing Guide T: 03302232770 E: hello@xandermarketing.com W: www.xandermarketing.com Social Media Marketing Introduction With an ever increasing number of

More information

Web 2.0 in the Workplace Today

Web 2.0 in the Workplace Today Web 2.0 in the Workplace Today 2 Contents Foreword 3 Employers enthusiastically embracing potential of Web 2.0 4 Brave new world 5 Web 2.0 and security: new approach needed? 7 Clearswift SECURE Gateways

More information

COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act

COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act The Children s Online Privacy Protection Act COPPA How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online A uknow White Paper by Tim Woda, co founder of uknow.com, Inc Overview

More information

Social Networking Policy

Social Networking Policy Feltonfleet School Social Networking Policy Introduction Objectives This policy sets out Feltonfleet School s policy on social networking. New technologies are an integral part of our lives and are powerful

More information

1 Which of the following questions can be answered using the goal flow report?

1 Which of the following questions can be answered using the goal flow report? 1 Which of the following questions can be answered using the goal flow report? [A] Are there a lot of unexpected exits from a step in the middle of my conversion funnel? [B] Do visitors usually start my

More information

Intelligent Security Design, Development and Acquisition

Intelligent Security Design, Development and Acquisition PAGE 1 Intelligent Security Design, Development and Acquisition Presented by Kashif Dhatwani Security Practice Director BIAS Corporation Agenda PAGE 2 Introduction Security Challenges Securing the New

More information

Staff Use of Social Media Policy

Staff Use of Social Media Policy Staff Use of Social Media Policy Printed copies must not be considered the definitive version DOCUMENT POLICY NO. 11 CONTROL Policy Group Information Governance and Security Author John Version No. 3.0

More information

DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE

DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE DIGITS CENTER FOR DIGITAL INNOVATION, TECHNOLOGY, AND STRATEGY THOUGHT LEADERSHIP FOR THE DIGITAL AGE INTRODUCTION RESEARCH IN PRACTICE PAPER SERIES, FALL 2011. BUSINESS INTELLIGENCE AND PREDICTIVE ANALYTICS

More information

Master Data Services Environment

Master Data Services Environment Master Data Services Training Guide Master Data Services Environment Portions developed by Profisee Group, Inc. 2010 Microsoft Master Data Services Overview Master Data Services Implementation Master Data

More information

MULTI-DOMAIN CLOUD SOCIAL NETWORK SERVICE PLATFORM SUPPORTING ONLINE COLLABORATIONS ON CAMPUS

MULTI-DOMAIN CLOUD SOCIAL NETWORK SERVICE PLATFORM SUPPORTING ONLINE COLLABORATIONS ON CAMPUS MULTI-DOMAIN CLOUD SOCIAL NETWORK SERVICE PLATFORM SUPPORTING ONLINE COLLABORATIONS ON CAMPUS Zhao Du, Xiaolong Fu, Can Zhao, Ting Liu, Qifeng Liu, Qixin Liu Information Technology Center, Tsinghua University,

More information

Social Network Analysis of a Participatory Designed Online Foreign Language Course

Social Network Analysis of a Participatory Designed Online Foreign Language Course Social Network Analysis of a Participatory Designed Online Foreign Language Course Meenakshi Sundaram Rajasekaran School of Informatics, City University, London EC1V 0HB, United Kingdom. sundar_slm@rediffmail.com

More information

A How-to Guide to Social Media Marketing

A How-to Guide to Social Media Marketing A How-to Guide to Social Media Marketing Objectives What is social media? Why you need social media to market your product or service Types of social media How to effectively utilize the popular social

More information

ACS Code of Professional Conduct Professional Standards Board Australian Computer Society April 2014

ACS Code of Professional Conduct Professional Standards Board Australian Computer Society April 2014 ACS Code of Professional Conduct Professional Standards Board Australian Computer Society April 2014 ACS Code of Professional Conduct V.2.1 April 2014 Page 1 ACS Code of Professional Conduct Version History

More information

SOCIAL MEDIA POLICY AND GUIDANCE Issue 1. 9 November 2010

SOCIAL MEDIA POLICY AND GUIDANCE Issue 1. 9 November 2010 SOCIAL MEDIA POLICY AND GUIDANCE Issue 1 9 November 2010 Martin McEwan, Director of Communications & Engagement Jane Loughran, Senior Communications Manager Scott Gaule, Involvement & Patient Experience

More information

PRIVACY POLICY. I. Introduction. II. Information We Collect

PRIVACY POLICY. I. Introduction. II. Information We Collect PRIVACY POLICY school2life, Inc. ( school2life ) Privacy Policy is designed to provide clarity about the information we collect and how we use it to provide a better social gaming experience. By accepting

More information

Mobile Privacy Principles

Mobile Privacy Principles Mobile Privacy Principles Document: Promoting a user-centric privacy framework for the mobile ecosystem Version 1.0 2 Contents Introduction... 3 High-level Privacy Principles... 6 Mobile Privacy Principles

More information

Supporting choice and control

Supporting choice and control www.in-control.org.uk Supporting choice and control A template policy framework for delivering person-centred outcomes by a positive approach to risk www.in-control.org.uk Supporting Choice and Control

More information

Trust areas: a security paradigm for the Future Internet

Trust areas: a security paradigm for the Future Internet Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany Carsten.Rudolph@sit.fraunhofer.de

More information

Factors that Influence the Occupational Health and Safety Curricula. Jeffery Spickett. Division of Health Sciences Curtin University Australia

Factors that Influence the Occupational Health and Safety Curricula. Jeffery Spickett. Division of Health Sciences Curtin University Australia Factors that Influence the Occupational Health and Safety Curricula Jeffery Spickett Division of Health Sciences Curtin University Australia 1.0 INTRODUCTION Occupational health and safety has undergone

More information

Accessing Private Network via Firewall Based On Preset Threshold Value

Accessing Private Network via Firewall Based On Preset Threshold Value IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold

More information

State Records Guideline No 18. Managing Social Media Records

State Records Guideline No 18. Managing Social Media Records State Records Guideline No 18 Managing Social Media Records Table of Contents 1 Introduction... 4 1.1 Purpose... 4 1.2 Authority... 5 2 Social Media records are State records... 5 3 Identifying Risks...

More information

BRING YOUR OWN DEVICE

BRING YOUR OWN DEVICE BRING YOUR OWN DEVICE Legal Analysis & Practical TIPs for an effective BYOD corporate Policy CONTENTS 1. What is BYOD? 2. Benefits and risks of BYOD in Europe 3. BYOD and existing Policies 4. Legal issues

More information

Attitudes to Use of Social Networks in the Workplace and Protection of Personal Data

Attitudes to Use of Social Networks in the Workplace and Protection of Personal Data Attitudes to Use of Social Networks in the Workplace and Protection of Personal Data David Haynes, City University, School of Informatics, Department of Information Science August 2011 Background Two surveys

More information

The policy also aims to make clear the actions required when faced with evidence of work related stress.

The policy also aims to make clear the actions required when faced with evidence of work related stress. STRESS MANAGEMENT POLICY 1.0 Introduction Stress related illness accounts for a significant proportion of sickness absence in workplaces in the UK. Stress can also be a contributing factor to a variety

More information

Archival of Digital Assets.

Archival of Digital Assets. Archival of Digital Assets. John Burns, Archive Analytics Summary: We discuss the principles of archiving, best practice in both preserving the raw bits and the utility of those bits, and assert that bit-

More information

Resource document for school governors and schools. Summary of Special Educational Needs (SEN) Code of Practice for Wales

Resource document for school governors and schools. Summary of Special Educational Needs (SEN) Code of Practice for Wales Resource document for school governors and schools Summary of Special Educational Needs (SEN) Code of Practice for Wales Teifion Rees SEN Governor Cwrt Sart Comprehensive School April 2004 1 Acknowledgements

More information

Facebook and Privacy: It s Complicated

Facebook and Privacy: It s Complicated Facebook and Privacy: It s Complicated Maritza Johnson Columbia University maritzaj@cs.columbia.edu Serge Egelman UC Berkeley egelman@cs.berkeley.edu Steven M. Bellovin Columbia University smb@cs.columbia.edu

More information

Referral fees, referral arrangements and fee sharing

Referral fees, referral arrangements and fee sharing Referral fees, referral arrangements and fee sharing This response to the consultation is prepared by Carter Law LLP. Our experience spans the RTA/PI sector and as such, any criminal advocacy questions

More information

INTRUSION PREVENTION AND EXPERT SYSTEMS

INTRUSION PREVENTION AND EXPERT SYSTEMS INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla avic@v-secure.com Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion

More information

Network Security. Instructor: Adam Hahn

Network Security. Instructor: Adam Hahn Network Security Instructor: Adam Hahn The syllabus Reading for Wednesday Ken Thompson, Reflections on Trusting Trust, Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763. http://cm.bell-labs.com/who/ken/trust.html

More information

Social Networking Issues in the Workplace

Social Networking Issues in the Workplace Social Networking Issues in the Workplace Presented By: David Flotten, JD, SPHR HR Consultant/Benefits Technical Advisor Disclaimers Technology is moving faster than the legal system can keep pace. Accordingly,

More information

EQF CODE EQF. European Competence Profiles in e-content Professions. http://www.ubique.org/eqfcode

EQF CODE EQF. European Competence Profiles in e-content Professions. http://www.ubique.org/eqfcode EQF CODE EQF European Competence Profiles in e-content Professions http://www.ubique.org/eqfcode European Competence Profiles in e-content Professions This project has been funded with support from the

More information

2016 OCR AUDIT E-BOOK

2016 OCR AUDIT E-BOOK !! 2016 OCR AUDIT E-BOOK About BlueOrange Compliance: We specialize in healthcare information privacy and security solutions. We understand that each organization is busy running its business and that

More information

**NEW CLIENTS MAY NEED AN INITIAL SET- UP and ANALYSIS

**NEW CLIENTS MAY NEED AN INITIAL SET- UP and ANALYSIS Pricing Structure Social Media Management Packages * Starter Package: Social Media for 2 Channels Starting at: $650 /mo (That s $650 dollars worth of Organic Advertising!) * Business Owner Package: Social

More information

Reducing Cyber Risk in Your Organization

Reducing Cyber Risk in Your Organization Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than

More information

Privacy Protection in Social Networking Services

Privacy Protection in Social Networking Services Privacy Protection in Social Networking Services Daoyuan Li Aalto University School of Science and Technology daoyuan.li@aalto.fi Abstract As social networking services become increasingly popular, more

More information

Social Media Policy. Policies and Procedures. Social Media Policy

Social Media Policy. Policies and Procedures. Social Media Policy Policies and Procedures Social Media Policy 1 1. Introduction...3 2. Privacy settings and personal information.....3 3. Use of Social Media at Work.....4 4. Account Administrators and Login Details......4

More information

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763 International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,

More information

Social Media and Job Searching

Social Media and Job Searching 1 Recruiting is increasingly social and Adecco wants to know how it works. An international survey, that involved over 17.272 candidates and 1.502 Human Resources managers between March 18 and June 2,

More information

Social media strategy

Social media strategy Social media strategy 1. Goals All of our social media activities will be underpinned by the three key objectives of the ICA as listed in the ICA Strategic Plan 2014-18 (available online at http://www.ica.org/17036/reference-documents/ica-strategic-implementation-plan-

More information

Overview TECHIS60441. Carry out security testing activities

Overview TECHIS60441. Carry out security testing activities Overview Information, services and systems can be attacked in various ways. Understanding the technical and social perspectives, how attacks work, the technologies and approaches used are key to being

More information

SOCIAL MEDIA POLICY INSPIRED LEARNING MULTI ACADEMY TRUST SOCIAL MEDIA POLICY. Introduction

SOCIAL MEDIA POLICY INSPIRED LEARNING MULTI ACADEMY TRUST SOCIAL MEDIA POLICY. Introduction SOCIAL MEDIA POLICY Document Name: Author: Social Media Policy Mrs Louise Page Approval Date: November 2015 Review Date: November 2016 INSPIRED LEARNING MULTI ACADEMY TRUST SOCIAL MEDIA POLICY CONTENTS

More information

in Switzerland. 1 The total values reported in the tables and

in Switzerland. 1 The total values reported in the tables and 1 in Switzerland. Recruiting is increasingly social and Adecco wants to know how it evolves. An international survey, that involved over 17.000 candidates and 1.502 Human Resources managers between March

More information

Testimony of Edward W. Felten Professor of Computer Science and Public Affairs, Princeton University

Testimony of Edward W. Felten Professor of Computer Science and Public Affairs, Princeton University Testimony of Edward W. Felten Professor of Computer Science and Public Affairs, Princeton University United States House of Representatives, Committee on the Judiciary Subcommittee on the Constitution,

More information

Know how to publish, integrate and share using social media

Know how to publish, integrate and share using social media Unit 246 Know how to publish, integrate and share using social media UAN: R/505/3515 Level: 2 Credit value: 5 GLH: 40 Learning outcome 1. Know the current social networks used to publish, integrate and

More information

A STUDY ON PRIVACY CONCERNS IN SOCIAL NETWORKING SITES (SNS) AMONG MALAYSIAN STUDENTS

A STUDY ON PRIVACY CONCERNS IN SOCIAL NETWORKING SITES (SNS) AMONG MALAYSIAN STUDENTS A STUDY ON PRIVACY CONCERNS IN SOCIAL NETWORKING SITES (SNS) AMONG MALAYSIAN STUDENTS Lau Keng Yew, Ma Meng, Mak Wai Hong,and Nasriah Zakaria Universiti Sains Malaysia, Penang, Malaysia, kengyew_88@yahoo.com,

More information

white paper Big Data for Small Business Why small to medium enterprises need to know about Big Data and how to manage it Sponsored by:

white paper Big Data for Small Business Why small to medium enterprises need to know about Big Data and how to manage it Sponsored by: white paper Big Data for Small Business Why small to medium enterprises need to know about Big Data and how to manage it Sponsored by: Big Data is the ability to collect information from diverse sources

More information

Abstract. Introduction

Abstract. Introduction TURIZAM Volume 13 Issue 1, 51-56 (2009) Facebook as a Means of Promotion of Tourist Agencies Specialized for Youth Travel in Croatia and Serbia Iva Slivar* Received: May 2009 Accepted: August 2009 Abstract

More information

Exploring People in Social Networking Sites: A Comprehensive Analysis of Social Networking Sites

Exploring People in Social Networking Sites: A Comprehensive Analysis of Social Networking Sites Exploring People in Social Networking Sites: A Comprehensive Analysis of Social Networking Sites Abstract Saleh Albelwi Ph.D Candidate in Computer Science School of Engineering University of Bridgeport

More information

ICAICT704A Direct ICT in a supply chain

ICAICT704A Direct ICT in a supply chain ICAICT704A Direct ICT in a supply chain Release: 1 ICAICT704A Direct ICT in a supply chain Modification History Release Release 1 Comments This Unit first released with ICA11 Information and Communications

More information

Ongoing N/A TBC. Baseline

Ongoing N/A TBC. Baseline Position Title: Executive General Manager, Core Services Systems Operations Classification: SES Band 2 Position Number: 1018 Position Status (ongoing/nonongoing): Ongoing Division: Core Services Systems

More information

DIFFICULTIES AND SOME PROBLEMS IN TRANSLATING LEGAL DOCUMENTS

DIFFICULTIES AND SOME PROBLEMS IN TRANSLATING LEGAL DOCUMENTS DIFFICULTIES AND SOME PROBLEMS IN TRANSLATING LEGAL DOCUMENTS Ivanka Sakareva Translation of legal documents bears its own inherent difficulties. First we should note that this type of translation is burdened

More information

LOCAL SEO WHITE PAPER. Making Your Brand Famous in Your Location

LOCAL SEO WHITE PAPER. Making Your Brand Famous in Your Location LOCAL SEO WHITE PAPER Making Your Brand Famous in Your Location Table Of Contents I. Introduction 2 II. Managing Business Listings and Social Pages 2 III. Optimizing Websites for Local Audiences 3 IV.

More information

Teradata and Protegrity High-Value Protection for High-Value Data

Teradata and Protegrity High-Value Protection for High-Value Data Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:

More information

11 emerging. trends for DIGITAL MARKETING FINANCIAL SERVICES. By Clifford Blodgett. Demand Generation and Digital Marketing Manager

11 emerging. trends for DIGITAL MARKETING FINANCIAL SERVICES. By Clifford Blodgett. Demand Generation and Digital Marketing Manager 11 emerging DIGITAL MARKETING trends for FINANCIAL SERVICES By Clifford Blodgett Demand Generation and Digital Marketing Manager Exploiting your Technology Vendors Customer Engagement and Maintaining a

More information

Non-Malicious Security Violations

Non-Malicious Security Violations Non-Malicious Security Violations Carl D. Willis-Ford Senior Technical Advisor II, SRA International, Inc. Senior Member, ISSA Doctoral Candidate, Capitol College Speaker Background 9 years U.S. Navy,

More information

Think B4 U Click : an Educational Online Safety Resource for the Irish CSPE Curriculum

Think B4 U Click : an Educational Online Safety Resource for the Irish CSPE Curriculum Dublin Institute of Technology ARROW@DIT Books/Book chapters Centre for Social and Educational Research 2012-5 Think B4 U Click : an Educational Online Safety Resource for the Irish CSPE Curriculum Simon

More information

Job Profile. Postholder will be required to determine liability and quantum on claims made against the Authority.

Job Profile. Postholder will be required to determine liability and quantum on claims made against the Authority. Job Profile Job Title: Claims Handler Date Completed: October 2014 Job Reference Number: T7CS002 Tier: Tier 7 Job Band: Band 3 Functional Area: Corporate Services Accountable to: Insurance Manager Job

More information

RECOMMENDATIONS HOW TO ATTRACT CLIENTS TO ROBOFOREX

RECOMMENDATIONS HOW TO ATTRACT CLIENTS TO ROBOFOREX 1 Recommendations how to attract clients to RoboForex s partners www.roboforex.com RECOMMENDATIONS HOW TO ATTRACT CLIENTS TO ROBOFOREX Your success as a partner directly depends on the number of attracted

More information

LOCAL SEO WHITE PAPER

LOCAL SEO WHITE PAPER LOCAL SEO WHITE PAPER Making Your Brand Famous in Your Location Table Of Contents I. Introduction 2 II. Managing Business Listings and Social Pages 2 III. Optimizing Websites for Local Audiences 3 IV.

More information

The Social Media Guide For Small Businesses

The Social Media Guide For Small Businesses The Social Media Guide For Small Businesses Authored By: Justin Rissmiller, Owner & Operator A Publication Of: T&R Solutions: Define. Design. Progress. YOUR LOGO Contents An Introduction To Social Media

More information

Informing Design of Next Generation Social Media to Support Crisis-Related Grassroots Heritage

Informing Design of Next Generation Social Media to Support Crisis-Related Grassroots Heritage Informing Design of Next Generation Social Media to Support Sophia B. Liu ConnectivIT Lab Alliance for Technology, Learning and Society (ATLAS) Institute University of Colorado at Boulder Sophia.Liu@colorado.edu

More information

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE AIIA Response 14 November 2011 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body representing

More information

Web project proposal. European e-skills Association

Web project proposal. European e-skills Association Web project proposal European e-skills Association LUCISMEDIA WEB DESIGN PROPOSAL CONTENTS Lucismedia... 3 Building enterprise social communities... 3 project objective... 4 Project scope... 6 Interface

More information

LOCAL INTERNET MARKETING FOR YOUR SMALL BUSINESS

LOCAL INTERNET MARKETING FOR YOUR SMALL BUSINESS LOCAL INTERNET MARKETING FOR YOUR SMALL BUSINESS Presented by: Cline Online Marketing, LLC Dave Cline, Owner 7635 West Ontario Place Littleton, CO 80128 Tel: 720-312-9196 Fax: 303-933-5266 How The Internet

More information

LOCAL SEO WHITE PAPER

LOCAL SEO WHITE PAPER LOCAL SEO WHITE PAPER Making your brand famous in your location TABLE OF CONTENTS Introduction 01 Chapter I Managing Business Listings and Social Pages 02 Chapter II Optimizing Websites for Local Audiences

More information

An Investigation into privacy and Security in Online Social Networking Sites among IIUM Students

An Investigation into privacy and Security in Online Social Networking Sites among IIUM Students World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 2, No. 2, 57-61, 2012 An Investigation into privacy and Security in Online Social Networking Sites among IIUM Students

More information

POSEIDON social network for carers

POSEIDON social network for carers PersOnalized Smart Environments to increase Inclusion of people with DOwn s syndrome Deliverable D5.5 POSEIDON social network for carers Call: Objective: FP7- ICT- 2013-10 ICT- 2013.5.3 ICT for smart and

More information

Marketing and Promoting Your Cooperative Through Social Media. How social media can be a success for your housing cooperative

Marketing and Promoting Your Cooperative Through Social Media. How social media can be a success for your housing cooperative Marketing and Promoting Your Cooperative Through Social Media How social media can be a success for your housing cooperative The History of Social Media First email sent Geocities, first social network

More information

1. Understanding Big Data

1. Understanding Big Data Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte

More information

MOST FRAUD CASES INVOLVE SENIOR MANAGEMENT. HOW TO PREVENT THEM FROM MISUSING THEIR POWER?

MOST FRAUD CASES INVOLVE SENIOR MANAGEMENT. HOW TO PREVENT THEM FROM MISUSING THEIR POWER? 1 www.e-safecompliance.com MOST FRAUD CASES INVOLVE SENIOR MANAGEMENT. HOW TO PREVENT THEM FROM MISUSING THEIR POWER? Based on Gartner Worldwide spending on information security will reach $71.1 billion

More information

Purpose. Introduction to the Guidelines. Social Media Definition. http://www.ohioerc.org

Purpose. Introduction to the Guidelines. Social Media Definition. http://www.ohioerc.org http://www.ohioerc.org Purpose SOCIAL MEDIA: THE RECORDS MANAGEMENT CHALLENGE As society shifts from traditional methods of recordkeeping to electronic recordkeeping, the issues surrounding the management

More information

Digital Industries Apprenticeship: Assessment Plan. Cyber Security Technologist. April 2016

Digital Industries Apprenticeship: Assessment Plan. Cyber Security Technologist. April 2016 Digital Industries Apprenticeship: Assessment Plan Cyber Security Technologist April 2016 1 Digital Industries Apprenticeships: Assessment Plan 1. General Introduction and Overview The apprenticeship Standard

More information

Office of the Chief Information Officer

Office of the Chief Information Officer Office of the Chief Information Officer Online File Storage BACKGROUND Online file storage services offer powerful and convenient methods to share files among collaborators, various computers, and mobile

More information

Firewall Policy Anomalies- Detection and Resolution

Firewall Policy Anomalies- Detection and Resolution Firewall Policy Anomalies- Detection and Resolution Jitha C K #1, Sreekesh Namboodiri *2 #1 MTech student(cse),mes College of Engineering,Kuttippuram,India #2 Assistant Professor(CSE),MES College of Engineering,Kuttippuram,India

More information