This means that advertisers and others are able to use information gleaned from social networks to build a profile of a user’s life, including linking browsing habits to one’s true identity.
Read Krishnamurth and Will's 2009 study On the Leakage of Personally Identifiable Information Via Online Social Neworks.
Social networks themselves do not necessarily guarantee the security of the information that has been uploaded to a profile, even when those posts are set to be private.
This was demonstrated in one May 2010 incident during which unauthorized users were able to see the private chat logs of their contacts on Facebook.
Information leakage also occurs in mobile online social networks, according to Privacy Leakage in Mobile Online Networks, another study by Krishnamurthy and Wills.
To learn more about cookies and how to browse the Internet safely and privately, see PRC Fact Sheet 18: Privacy and the Internet.
Our experts create writing masterpieces that earn our customers not only high grades but also a solid reputation from demanding professors.
Don't waste your time and order our essay writing service today!
We deliver papers of different types: essays, theses, book reviews, case studies, etc.
The information you share with your online contacts allows you to keep in touch without much effort. Social networks store information remotely, rather than on a user’s personal computer.
Social networking can be used to keep in touch with friends, make new contacts and find people with similar interests and ideas.
But who else can see it, and what exactly is visible?
Entities that collect personal information for legal purposes include: Social networks that provide their services without user fees make a profit by selling advertising.