SlideShare a Scribd company logo
1 of 16
Download to read offline
Social Media Risks

    Social Media – Dr. Giorgos Cheliotis (gcheliotis@nus.edu.sg)
Communications and New Media, National University of Singapore
Introduction
   Millions of Internet users use social media platforms daily for self-expression,
    communication and collaboration
   As social media becomes daily routine, we have to learn how to deal with the risks
    of computer-mediated communication
   Some of these risks are more unique to social media, while some are relevant to
    nearly any form of communication but may take new forms online
   Users continuously explore new ways of negotiating their need for privacy and
    safety, with their desire to communicate with more people and in more public ways
   As all social media is hosted somewhere and facilitated by communication
    technologies, risks are also relevant to the intermediaries that operate online
    platforms and communication networks
   In the meantime, law is evolving and trying to catch up with new technologies and
    new online behavior, while inevitably leaving many gray areas that both users and
    service providers try to navigate



    2                   CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
Types of user risks in social media space
               Risks
               • Involuntary information revelation                      • Reduced anonymity and increased
Privacy and    • Involuntary transfer of ownership of                      traceability, especially in platforms
   safety        personal data or content to third party                   encouraging use of real offline identity
               • Commercial exploitation of user data                    • Network effects (privacy risks deriving
               • Mismanaging visibility and searchability                  from one’s online network of contacts)
                 of personal data online                                 • Stalking (online and offline)
               • Identity theft                                          • Surveillance by state and third parties

               • Harsh criticism and other negative                      • Complexity of translating and separating
    Self         reactions to one’s online profile by                      offline roles and one’s image online
                 friends and others                                      • Peer pressure to involuntarily disclose
presentation   • Usage of sensitive and/or inappropriate                   personal information to online network
                 personal or third-party content in self                   (e.g., top friends, religion, relationship
                 presentation (incl. copyright infringement)               status, etc.)

               • Ease and speed of posting increases                     • Users can run afoul of laws that were
                 potential for social blunders                             previously more often applied to mass
   Self        • Common private behavior crosses easily                    media, professional content producers
expression       to public sphere where it may be                          and public persons (e.g., defamation and
                 considered inappropriate or offensive                     sedition laws)
               • Insufficient separation of social circles               • Copyright infringement
  3                    CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
Types of service provider risks
                Risks
                • Internet service providers and social                   • Active moderation of UGC not very
Liability for     media sites can be held liable for                        effective and can expose to greater
   UGC            copyright infringing or otherwise illegal                 liability when moderators fail to detect
                  content that users post online                            illegal content



                • Failure to turn over user data to                       • Commercial use of user data and
User data         authorities may result in fines to the                    sharing with third parties for such
                  service provider                                          purposes may also expose to risk of
protection      • Compliance may also lead to liability                     lawsuit (though strength of laws on
                  when proper procedure is not followed                     protection of user data vary across
                  and user data is shared without care                      jurisdictions)


                • If users feel that the terms of service                 • When the terms of service attempt to
   User           are not fair or that the service provider                 transfer ownership of user data and/or
alienation        will not protect their data and privacy,                  UGC to provider, users will likely also
                  they may switch to other platforms or                     react negatively and possibly also switch
                  stage online protest                                      to competing platforms


  4                     CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
Key privacy issues (1 of 2)
    Defaults: many users leave privacy
     settings at their default values, exposing
     themselves to risks that they may not
     fully appreciate
    Cognitive and user interface issues: users
     that do change their privacy settings
     have difficulty remembering what values
     they set them to and may find it
     cumbersome to manage these frequently
    Mismatch of user needs and provided
     functions: binary simplicity of SNS (friend
     or not) and lack of contextual cues
     (whom am I addressing now?) make it
     difficult to express graded understanding
     of ‘friendship’ and manage different social
     circles appropriately*
    * SNS’s are starting to accommodate for such needs, but at the cost of
      increased cognitive and UI complexity

     5                                 CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
Key privacy issues (2 of 2)
    Peer pressure and herding: users imitate
     others or succumb to social pressure,
     revealing more information than they
     perhaps should
    Privacy paradox: identifiability,
     searchability, and the regular sharing of
     one’s daily experience online helps
     others find and connect to the user, but
     always at the expense of lost privacy
    Network risks: one’s online ‘friends’ may
     invite unknown others to one’s network
     (as friends-of-friends who may be able to
     view one’s updates, or by forwarding
     content and data outside one’s managed
     network)

    * SNS’s are starting to accommodate for such needs, but at the cost of
      increased cognitive and UI complexity

     6                                 CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
The demographics of privacy
   Teenagers face greater risks in terms of self presentation as they playfully
    explore and negotiate their online identity with others, while
    experimenting with different presentation styles, in the process exposing
    themselves to risks of rejection or ridicule by friends, stalking and abuse
   Adults may be more conscious of certain types of risks and focus more
    on managing and expanding their wider and more complex online
    networks but are thus more prone to risks arising from the
    mismanagement of these professional and personal networks
   Gated communities (e.g., campus networks)
    can provide a sometimes false sense of
    security based on common identity and
    authentication mechanisms that are easy to
    undermine
   As social media sites evolve and grow, what
    used to be a gated community may become a
    more open one, exposing behaviors that were
    targeted at a more narrow audience to wider
    public scrutiny (e.g., when Facebook spread
    beyond college campuses)
    7                      CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
Data mining and re-identification
                            With advances in computing power and data mining,
                             our extensive network of partially-revealing online
                             profiles and habits can be synthesized, to piece
                             together our real-world identity
                                    Data which is not available online can be inferred
                                     from voluntarily revealed information (e.g.,
                                     address, postal code, birth date, affiliation with
                                     institutions, employment, etc. can help identify
                                     individual, or one’s online passwords)
                                    Information that is pieced together online can be
                                     used to extract additional confidential
                                     information by means of social engineering and
                                     identity theft
                            Also, data may be shared with others without the
                             user’s knowledge, or as a result of shifting privacy
                             default settings in websites, possibly making millions of
                             hitherto limited-access data public in one stroke
                            Finally, law enforcement may request that hidden user
                             data be made available for further analysis

 8        CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
Limits to self-expression and resulting liability
   In interactions with close friends we often share freely content and ideas and let our
    guard down, jest about topics that we might not take lightly in public, feel free to
    comment on issues and individuals and may criticize everything and everyone, fairly or
    unfairly, without always carefully backing up our claims or even considering their validity
    outside of a closely-knit group (group-think)
   When the same types of interactions that may be valuable in bonding with friends and
    like-minded people take place online, we expose ourselves to a number of risks that
    were hitherto of concern only to professional journalists, mass media producers and
    public personalities.
   Any public or semi-public online communication is also a
    publication in the sense that it is recorded in a specific
    format and is traceable online, even long after it was
    performed
   Private communication can also be similarly recorded,
    with or without the participating parties’ knowledge
   Resulting to much greater risk of copyright infringement
    and possible violations of laws regulating (offline and
    online) speech


    9                      CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
Singapore’s regulatory framework
                                                                                              HIGHLY SIMPLIFIED

                                Regulation
                                of speech



                                                 Broadcasting                         Copyright
Defamation           Sedition
                                                     Act                                Act


                                                                                                      Films Act
                                   National                              Self
        Confidence
                                 Security Act                         regulation
                                                                                                     Undesirable
                                                                                                     Publications
                                                                                                         Act

                                                        Industry                       Individuals


  10                 CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
Notes on regulatory framework (1 of 2)
                 Long history and relatively frequent use of defamation law for
                  the protection of the reputation of political and judicial system
Defamation
                  and associated individuals
                 Defamation damages can be very high (hundreds of thousands of
                  SGD), and are awarded in proportion to the social standing of
                  the plaintiff and the defendant

                 Definition of sedition quite broad, to include major threats to
                  social cohesion and national security; includes seeding contempt
  Sedition        for the government, and racist or otherwise offensive remarks
                  (e.g., offending religious and ethnic groups)
                 Application of law is strict and frequent in Singapore, with little
                  tolerance for comments that are deemed to undermine the
                  people’s respect for major institutions and for the diverse ethnic
                  and religious groups of the country

                 Protects secrets and confidential information from unauthorized
                  disclosure (e.g., in business dealings)
 Confidence
                 Depends on presumption of confidentiality in communication,
                  which is rather narrowly defined: not sufficient as privacy law

 11               CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
Notes on regulatory framework (2 of 2)
                  Enforcement rather strict, but with an increasing recognition of
                   the need for new licensing models (e.g., Creative Commons) and
 Copyright
                   the development of a more open ecosystem for innovation
                  Some disparity between official pro-copyright stance and popular
                   attitudes towards copying and sharing copyrighted content, as in
                   other countries around the world

                  Aimed more at regulating rights to broadcast in traditional mass
   Broad-          media, which are more proactively controlled by the MDA
 casting Act      Recognition of the impracticality of full-on Internet content
                   regulation led to introduction of a ‘class license’ which allows
                   anyone and everyone to post and disseminate content online
                  License could be revoked in principle for those who repeatedly
                   post illegal content (resulting possibly to termination of Internet
                   access), although there is no such precedent yet

                  Gives government greater power to forbid the publication of
  Internal         content that is deemed a threat to national security (in addition
Security Act       to other laws, such as the Undesirable Publications Act and the
                   Government Secrets Act)

 12                CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
Practical advice for social media users
   Protect your privacy online by fine-tuning privacy settings on platforms that you use and being
    more careful with whom you invite to your online networks
   Avoid sharing any information that could compromise your privacy, safety, or reputation in the
    eyes of your friends and others
   Do not assume that because an online communication may be private, it is absolutely safe
   Show appropriate respect for institutions and persons online, even in communications that
    are not public, and even while you may criticize people, institutions, or events
   Be careful when posting comments that may be damaging to the reputation of third parties,
    especially when those are held in high esteem by a majority of a country’s citizens (although
    respectful criticism and disagreement should always be preferred, irrespective of one’s social
    standing)
   Avoid discussing and promoting online topics that are de facto taboo in a given culture or
    country, or that may easily offend others, or may be easily misunderstood as offensive
   Do not assume that posting with a pseudonym or as ‘anonymous’ is entirely safe; your IP
    address is probably logged by your ISP and can be requested by law enforcement
   Be keenly aware of the potential for copyright infringement when you copy or share content
    created by others

    13                    CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
Practical advice for social media site owners
   Consider whether you should actively moderate user-supplied content on your site; it might
    be better to act purely as an intermediary, thus also making clear that you provide a
    communication platform and are not responsible for what users post (this may work well in
    some jurisdictions only, depending on a country’s statutes and legal precedents)
   Consider whether your site has significant legal use or whether it is more likely to be used for
    purposes that may be illegal in your jurisdiction, or in the jurisdiction(s) of your users
   Comply with notice and take-down procedures for copyright-infringing material to avail of
    ‘safe harbors’ in copyright law (clauses providing indemnity to the operator of the site for
    infringing activities of users)
   Provide also an easy mechanism for users to appeal such take-downs to avoid the chilling
    effects on speech that aggressive take-down policies may have
   Make your policies on what is acceptable material absolutely clear to your users, especially to
    new members (also consider carefully whether you wish to allow for anonymous postings
    and/or access to content)
   Promote the use of appropriate ‘netiquette’ and allow for the easy reporting of users who
    abuse the site’s policies or are an annoyance to other users
   Do not reveal user data nor take down user-supplied content, unless proper procedure is
    followed by the party requesting the action, in accordance with jurisdiction and international
    law; seek legal advice where necessary, otherwise you risk alienating your users and possibly
    even a lawsuit for acting against your users’ interests when you shouldn’t have

    14                    CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
Thoughts on design…
How can an SNS give more control to users over the
content that others in their network post that may be
compromising? (e.g., photos on Facebook)
How can we simplify privacy controls, while also promoting
more user control and awareness of what is broadcast to
whom?
How can we create safer and more intimate private
spaces for online communication that are less prone to
manipulation by others and less risky for the individual?

When should an online community allow for anonymous
access and should it actively moderate postings?                                            Think about online
                                                                                        platforms you know and
How can a site empower its users to self-moderate and                                  how they attempt to create
report abuses to the site administrator?                                                virtual environments that
                                                                                        users can trust; also, how
How can an online community or SNS effectively verify the
                                                                                             that trust can be
validity of user accounts or otherwise limit membership to
                                                                                               compromised
‘trusted’ members only, when this is desirable?

 15                     CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
Credits and licensing
   Front page photo by cobalt123 (license: CC BY-NC)
   Privacy photo by alancleaver_2000 (license: CC BY)
   Drawing of network of different ages by lucas.leite (license: CC BY-NC-ND)




         Original content in this presentation is licensed under the Creative Commons
             Singapore Attribution 3.0 license unless stated otherwise (see above)




    16                      CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)

More Related Content

What's hot

Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Social networking .ppt
Social networking .pptSocial networking .ppt
Social networking .pptPRANJAL SAIKIA
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaTheko Moima
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurancebdemchak
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Alexander Larsen
 
Introduction to Social Networking
Introduction to Social NetworkingIntroduction to Social Networking
Introduction to Social NetworkingHariharan Ganesan
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networksprofesorjulioperez
 
Social media and its Impacts on society
Social media and its Impacts on societySocial media and its Impacts on society
Social media and its Impacts on societyUrwa Shanza
 
Social Media Ethics Presentation
Social Media Ethics PresentationSocial Media Ethics Presentation
Social Media Ethics PresentationPalmRyan
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Social media Advantages and Disadvantages
Social media Advantages and DisadvantagesSocial media Advantages and Disadvantages
Social media Advantages and DisadvantagesJagmohan Singh
 
The Pros and Cons of Social Media
The Pros and Cons of Social MediaThe Pros and Cons of Social Media
The Pros and Cons of Social MediaJeff Davis
 
Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1HamadRabban
 

What's hot (20)

Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Social networking .ppt
Social networking .pptSocial networking .ppt
Social networking .ppt
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
Security and information assurance
Security and information assuranceSecurity and information assurance
Security and information assurance
 
Social Media
Social MediaSocial Media
Social Media
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
 
Introduction to Social Networking
Introduction to Social NetworkingIntroduction to Social Networking
Introduction to Social Networking
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networks
 
Social media and its Impacts on society
Social media and its Impacts on societySocial media and its Impacts on society
Social media and its Impacts on society
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Social Media Ethics Presentation
Social Media Ethics PresentationSocial Media Ethics Presentation
Social Media Ethics Presentation
 
Internet ethics
Internet ethicsInternet ethics
Internet ethics
 
Social media
Social mediaSocial media
Social media
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Social media Advantages and Disadvantages
Social media Advantages and DisadvantagesSocial media Advantages and Disadvantages
Social media Advantages and Disadvantages
 
What is Social Media
What is Social MediaWhat is Social Media
What is Social Media
 
The Pros and Cons of Social Media
The Pros and Cons of Social MediaThe Pros and Cons of Social Media
The Pros and Cons of Social Media
 
Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1Digital Citizenship Powerpoint 1
Digital Citizenship Powerpoint 1
 

Viewers also liked

Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentationAlan Holyoke
 
Social media ethical issues jotham wasike
Social media ethical issues   jotham wasikeSocial media ethical issues   jotham wasike
Social media ethical issues jotham wasikeFrancis Mwangi
 
Hydration and the role of Sports Drinks
Hydration and the role of Sports DrinksHydration and the role of Sports Drinks
Hydration and the role of Sports DrinksIain82
 
Introduction to Social Media for Researchers
Introduction to Social Media for ResearchersIntroduction to Social Media for Researchers
Introduction to Social Media for ResearchersHelen Dixon
 
foreign workers in Malaysia
foreign workers in Malaysiaforeign workers in Malaysia
foreign workers in MalaysiaZakinan Nawaz
 
USE OF SOCIAL NETWORKS AND ITS EFFECTS ON STUDENTS
USE OF SOCIAL NETWORKS AND ITS EFFECTS ON STUDENTS USE OF SOCIAL NETWORKS AND ITS EFFECTS ON STUDENTS
USE OF SOCIAL NETWORKS AND ITS EFFECTS ON STUDENTS Mahesh Kodituwakku
 
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...Kasthuripriya Nanda Kumar
 
Social Media and its effects on youth
Social Media and its effects on youthSocial Media and its effects on youth
Social Media and its effects on youthAbhishek Jain
 

Viewers also liked (10)

Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
Social media ethical issues jotham wasike
Social media ethical issues   jotham wasikeSocial media ethical issues   jotham wasike
Social media ethical issues jotham wasike
 
Hydration and the role of Sports Drinks
Hydration and the role of Sports DrinksHydration and the role of Sports Drinks
Hydration and the role of Sports Drinks
 
The problem with Social Media
The problem with Social MediaThe problem with Social Media
The problem with Social Media
 
Introduction to Social Media for Researchers
Introduction to Social Media for ResearchersIntroduction to Social Media for Researchers
Introduction to Social Media for Researchers
 
foreign workers in Malaysia
foreign workers in Malaysiaforeign workers in Malaysia
foreign workers in Malaysia
 
USE OF SOCIAL NETWORKS AND ITS EFFECTS ON STUDENTS
USE OF SOCIAL NETWORKS AND ITS EFFECTS ON STUDENTS USE OF SOCIAL NETWORKS AND ITS EFFECTS ON STUDENTS
USE OF SOCIAL NETWORKS AND ITS EFFECTS ON STUDENTS
 
Social Data Mining
Social Data MiningSocial Data Mining
Social Data Mining
 
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
THE EFFECTS OF SOCIAL NETWORKING SITES ON THE ACADEMIC PERFORMANCE OF STUDENT...
 
Social Media and its effects on youth
Social Media and its effects on youthSocial Media and its effects on youth
Social Media and its effects on youth
 

Similar to Social Media Risks

Social Networks and Social Capital
Social Networks and Social CapitalSocial Networks and Social Capital
Social Networks and Social CapitalGiorgos Cheliotis
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a baneAbhishek Sharma
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.Yury Chemerkin
 
Thesis proposal v3
Thesis proposal v3Thesis proposal v3
Thesis proposal v3lroddesign
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSZac Darcy
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image PrivacyIOSR Journals
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsUniversity of South Africa (Unisa)
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social mediakmtj1979
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxtodd521
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
Data protection and social networks
Data protection and social networksData protection and social networks
Data protection and social networksblogzilla
 
Privacy Codes of Practice for the Social Web:
Privacy Codes of Practice for the Social Web:Privacy Codes of Practice for the Social Web:
Privacy Codes of Practice for the Social Web:girmaenideg
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2IAEME Publication
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2IAEME Publication
 
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...AM Publications
 

Similar to Social Media Risks (20)

Social Networks and Social Capital
Social Networks and Social CapitalSocial Networks and Social Capital
Social Networks and Social Capital
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Thesis proposal v3
Thesis proposal v3Thesis proposal v3
Thesis proposal v3
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
 
549 458-465
549 458-465549 458-465
549 458-465
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
Locating Social Media
Locating Social MediaLocating Social Media
Locating Social Media
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analytics
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social media
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Data protection and social networks
Data protection and social networksData protection and social networks
Data protection and social networks
 
Privacy Codes of Practice for the Social Web:
Privacy Codes of Practice for the Social Web:Privacy Codes of Practice for the Social Web:
Privacy Codes of Practice for the Social Web:
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
 
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
 

More from Giorgos Cheliotis

More from Giorgos Cheliotis (7)

From Self Expression to Collective Action
From Self Expression to Collective ActionFrom Self Expression to Collective Action
From Self Expression to Collective Action
 
Designing From Theory
Designing From TheoryDesigning From Theory
Designing From Theory
 
Cooperation
CooperationCooperation
Cooperation
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Self Presentation And Friendship
Self Presentation And FriendshipSelf Presentation And Friendship
Self Presentation And Friendship
 
Community And Ties
Community And TiesCommunity And Ties
Community And Ties
 
Assessing CC Adoption in Asia (Manila)
Assessing CC Adoption in Asia (Manila)Assessing CC Adoption in Asia (Manila)
Assessing CC Adoption in Asia (Manila)
 

Recently uploaded

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 

Recently uploaded (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

Social Media Risks

  • 1. Social Media Risks Social Media – Dr. Giorgos Cheliotis (gcheliotis@nus.edu.sg) Communications and New Media, National University of Singapore
  • 2. Introduction  Millions of Internet users use social media platforms daily for self-expression, communication and collaboration  As social media becomes daily routine, we have to learn how to deal with the risks of computer-mediated communication  Some of these risks are more unique to social media, while some are relevant to nearly any form of communication but may take new forms online  Users continuously explore new ways of negotiating their need for privacy and safety, with their desire to communicate with more people and in more public ways  As all social media is hosted somewhere and facilitated by communication technologies, risks are also relevant to the intermediaries that operate online platforms and communication networks  In the meantime, law is evolving and trying to catch up with new technologies and new online behavior, while inevitably leaving many gray areas that both users and service providers try to navigate 2 CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
  • 3. Types of user risks in social media space Risks • Involuntary information revelation • Reduced anonymity and increased Privacy and • Involuntary transfer of ownership of traceability, especially in platforms safety personal data or content to third party encouraging use of real offline identity • Commercial exploitation of user data • Network effects (privacy risks deriving • Mismanaging visibility and searchability from one’s online network of contacts) of personal data online • Stalking (online and offline) • Identity theft • Surveillance by state and third parties • Harsh criticism and other negative • Complexity of translating and separating Self reactions to one’s online profile by offline roles and one’s image online friends and others • Peer pressure to involuntarily disclose presentation • Usage of sensitive and/or inappropriate personal information to online network personal or third-party content in self (e.g., top friends, religion, relationship presentation (incl. copyright infringement) status, etc.) • Ease and speed of posting increases • Users can run afoul of laws that were potential for social blunders previously more often applied to mass Self • Common private behavior crosses easily media, professional content producers expression to public sphere where it may be and public persons (e.g., defamation and considered inappropriate or offensive sedition laws) • Insufficient separation of social circles • Copyright infringement 3 CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
  • 4. Types of service provider risks Risks • Internet service providers and social • Active moderation of UGC not very Liability for media sites can be held liable for effective and can expose to greater UGC copyright infringing or otherwise illegal liability when moderators fail to detect content that users post online illegal content • Failure to turn over user data to • Commercial use of user data and User data authorities may result in fines to the sharing with third parties for such service provider purposes may also expose to risk of protection • Compliance may also lead to liability lawsuit (though strength of laws on when proper procedure is not followed protection of user data vary across and user data is shared without care jurisdictions) • If users feel that the terms of service • When the terms of service attempt to User are not fair or that the service provider transfer ownership of user data and/or alienation will not protect their data and privacy, UGC to provider, users will likely also they may switch to other platforms or react negatively and possibly also switch stage online protest to competing platforms 4 CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
  • 5. Key privacy issues (1 of 2)  Defaults: many users leave privacy settings at their default values, exposing themselves to risks that they may not fully appreciate  Cognitive and user interface issues: users that do change their privacy settings have difficulty remembering what values they set them to and may find it cumbersome to manage these frequently  Mismatch of user needs and provided functions: binary simplicity of SNS (friend or not) and lack of contextual cues (whom am I addressing now?) make it difficult to express graded understanding of ‘friendship’ and manage different social circles appropriately* * SNS’s are starting to accommodate for such needs, but at the cost of increased cognitive and UI complexity 5 CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
  • 6. Key privacy issues (2 of 2)  Peer pressure and herding: users imitate others or succumb to social pressure, revealing more information than they perhaps should  Privacy paradox: identifiability, searchability, and the regular sharing of one’s daily experience online helps others find and connect to the user, but always at the expense of lost privacy  Network risks: one’s online ‘friends’ may invite unknown others to one’s network (as friends-of-friends who may be able to view one’s updates, or by forwarding content and data outside one’s managed network) * SNS’s are starting to accommodate for such needs, but at the cost of increased cognitive and UI complexity 6 CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
  • 7. The demographics of privacy  Teenagers face greater risks in terms of self presentation as they playfully explore and negotiate their online identity with others, while experimenting with different presentation styles, in the process exposing themselves to risks of rejection or ridicule by friends, stalking and abuse  Adults may be more conscious of certain types of risks and focus more on managing and expanding their wider and more complex online networks but are thus more prone to risks arising from the mismanagement of these professional and personal networks  Gated communities (e.g., campus networks) can provide a sometimes false sense of security based on common identity and authentication mechanisms that are easy to undermine  As social media sites evolve and grow, what used to be a gated community may become a more open one, exposing behaviors that were targeted at a more narrow audience to wider public scrutiny (e.g., when Facebook spread beyond college campuses) 7 CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
  • 8. Data mining and re-identification  With advances in computing power and data mining, our extensive network of partially-revealing online profiles and habits can be synthesized, to piece together our real-world identity  Data which is not available online can be inferred from voluntarily revealed information (e.g., address, postal code, birth date, affiliation with institutions, employment, etc. can help identify individual, or one’s online passwords)  Information that is pieced together online can be used to extract additional confidential information by means of social engineering and identity theft  Also, data may be shared with others without the user’s knowledge, or as a result of shifting privacy default settings in websites, possibly making millions of hitherto limited-access data public in one stroke  Finally, law enforcement may request that hidden user data be made available for further analysis 8 CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
  • 9. Limits to self-expression and resulting liability  In interactions with close friends we often share freely content and ideas and let our guard down, jest about topics that we might not take lightly in public, feel free to comment on issues and individuals and may criticize everything and everyone, fairly or unfairly, without always carefully backing up our claims or even considering their validity outside of a closely-knit group (group-think)  When the same types of interactions that may be valuable in bonding with friends and like-minded people take place online, we expose ourselves to a number of risks that were hitherto of concern only to professional journalists, mass media producers and public personalities.  Any public or semi-public online communication is also a publication in the sense that it is recorded in a specific format and is traceable online, even long after it was performed  Private communication can also be similarly recorded, with or without the participating parties’ knowledge  Resulting to much greater risk of copyright infringement and possible violations of laws regulating (offline and online) speech 9 CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
  • 10. Singapore’s regulatory framework HIGHLY SIMPLIFIED Regulation of speech Broadcasting Copyright Defamation Sedition Act Act Films Act National Self Confidence Security Act regulation Undesirable Publications Act Industry Individuals 10 CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
  • 11. Notes on regulatory framework (1 of 2)  Long history and relatively frequent use of defamation law for the protection of the reputation of political and judicial system Defamation and associated individuals  Defamation damages can be very high (hundreds of thousands of SGD), and are awarded in proportion to the social standing of the plaintiff and the defendant  Definition of sedition quite broad, to include major threats to social cohesion and national security; includes seeding contempt Sedition for the government, and racist or otherwise offensive remarks (e.g., offending religious and ethnic groups)  Application of law is strict and frequent in Singapore, with little tolerance for comments that are deemed to undermine the people’s respect for major institutions and for the diverse ethnic and religious groups of the country  Protects secrets and confidential information from unauthorized disclosure (e.g., in business dealings) Confidence  Depends on presumption of confidentiality in communication, which is rather narrowly defined: not sufficient as privacy law 11 CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
  • 12. Notes on regulatory framework (2 of 2)  Enforcement rather strict, but with an increasing recognition of the need for new licensing models (e.g., Creative Commons) and Copyright the development of a more open ecosystem for innovation  Some disparity between official pro-copyright stance and popular attitudes towards copying and sharing copyrighted content, as in other countries around the world  Aimed more at regulating rights to broadcast in traditional mass Broad- media, which are more proactively controlled by the MDA casting Act  Recognition of the impracticality of full-on Internet content regulation led to introduction of a ‘class license’ which allows anyone and everyone to post and disseminate content online  License could be revoked in principle for those who repeatedly post illegal content (resulting possibly to termination of Internet access), although there is no such precedent yet  Gives government greater power to forbid the publication of Internal content that is deemed a threat to national security (in addition Security Act to other laws, such as the Undesirable Publications Act and the Government Secrets Act) 12 CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
  • 13. Practical advice for social media users  Protect your privacy online by fine-tuning privacy settings on platforms that you use and being more careful with whom you invite to your online networks  Avoid sharing any information that could compromise your privacy, safety, or reputation in the eyes of your friends and others  Do not assume that because an online communication may be private, it is absolutely safe  Show appropriate respect for institutions and persons online, even in communications that are not public, and even while you may criticize people, institutions, or events  Be careful when posting comments that may be damaging to the reputation of third parties, especially when those are held in high esteem by a majority of a country’s citizens (although respectful criticism and disagreement should always be preferred, irrespective of one’s social standing)  Avoid discussing and promoting online topics that are de facto taboo in a given culture or country, or that may easily offend others, or may be easily misunderstood as offensive  Do not assume that posting with a pseudonym or as ‘anonymous’ is entirely safe; your IP address is probably logged by your ISP and can be requested by law enforcement  Be keenly aware of the potential for copyright infringement when you copy or share content created by others 13 CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
  • 14. Practical advice for social media site owners  Consider whether you should actively moderate user-supplied content on your site; it might be better to act purely as an intermediary, thus also making clear that you provide a communication platform and are not responsible for what users post (this may work well in some jurisdictions only, depending on a country’s statutes and legal precedents)  Consider whether your site has significant legal use or whether it is more likely to be used for purposes that may be illegal in your jurisdiction, or in the jurisdiction(s) of your users  Comply with notice and take-down procedures for copyright-infringing material to avail of ‘safe harbors’ in copyright law (clauses providing indemnity to the operator of the site for infringing activities of users)  Provide also an easy mechanism for users to appeal such take-downs to avoid the chilling effects on speech that aggressive take-down policies may have  Make your policies on what is acceptable material absolutely clear to your users, especially to new members (also consider carefully whether you wish to allow for anonymous postings and/or access to content)  Promote the use of appropriate ‘netiquette’ and allow for the easy reporting of users who abuse the site’s policies or are an annoyance to other users  Do not reveal user data nor take down user-supplied content, unless proper procedure is followed by the party requesting the action, in accordance with jurisdiction and international law; seek legal advice where necessary, otherwise you risk alienating your users and possibly even a lawsuit for acting against your users’ interests when you shouldn’t have 14 CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
  • 15. Thoughts on design… How can an SNS give more control to users over the content that others in their network post that may be compromising? (e.g., photos on Facebook) How can we simplify privacy controls, while also promoting more user control and awareness of what is broadcast to whom? How can we create safer and more intimate private spaces for online communication that are less prone to manipulation by others and less risky for the individual? When should an online community allow for anonymous access and should it actively moderate postings? Think about online platforms you know and How can a site empower its users to self-moderate and how they attempt to create report abuses to the site administrator? virtual environments that users can trust; also, how How can an online community or SNS effectively verify the that trust can be validity of user accounts or otherwise limit membership to compromised ‘trusted’ members only, when this is desirable? 15 CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)
  • 16. Credits and licensing  Front page photo by cobalt123 (license: CC BY-NC)  Privacy photo by alancleaver_2000 (license: CC BY)  Drawing of network of different ages by lucas.leite (license: CC BY-NC-ND) Original content in this presentation is licensed under the Creative Commons Singapore Attribution 3.0 license unless stated otherwise (see above) 16 CNM Social Media Module – Giorgos Cheliotis (gcheliotis@nus.edu.sg)