BNMC Blog

Privacy Concerns Hang Over Social Media

Privacy Concerns Hang Over Social Media

Social media has brought about a massive shift in the way people interact. Today we share our opinions, photos, and videos; and, we can even choose our dates by swiping right or left. With social media, people share moments, opinions, and other information, but is all this sharing actually setting people, and the organizations they interact with, up for failure? We’ll take a look at social media privacy concerns and potentially hazardous practices that could exacerbate the problems further.

The basic tenet of social media is the ability for individuals to share part of themselves easily. With more computing done on mobile platforms today than ever before, more people are using these applications to share little pieces of their lives. One study conducted in 2018 found that not including YouTube, it was found that 69 percent of all American adults (18+) used some form of social media regularly over the subsequent year. That number continues to grow. So much so that now nearly 40 percent of seniors use some form of social media today, up nearly 200 percent since 2012.

With so many people using social media it stands to reason that the number of people looking to steal money, information, and identities would also grow as well. This has proven to be accurate, and now today there are a fair amount of major privacy concerns that all social media users have to be cognizant of. The study also laid out what people use social media for. It won’t be a surprise to those who do use social media a fair amount that a lot of what is done is actually substituting as a social interactions hub to those people that don’t have the time (or the inclination) to interact with people in person or through other traditional methods. In fact, most people cite social media as where they share most of their civil and political views, personal health information, learn scientific information, engage in job, familial, and society-related activities; and, probably most alarming of all, it’s the place they go to get their news.

Role of Privacy

Privacy has, and will likely always be, dependent on how much an individual prioritizes the security of his/her personal information. If someone wants to keep some semblance of their life private, he/she can still do it, as long as it’s not available for people to steal. This is increasingly a problem. As social media use increases, the amount of direct integration that developers create with these social websites increases, making it easier for people to lose control over their private information.

That’s not to say that by allowing social media companies access to some of your most personal information that you will completely lose control over it, but it seems fair to suggest. In a 2014 survey, 91 percent of polled Americans suggested that they had lost control over their personal information (or how it was collected), with 80 percent showing at least some concern over the relationship advertisers and other businesses have with these social media companies.

One problem is that over half of Americans are cognizant of the dangers of having personal information fall into the wrong hands, and as a result they are actively monitoring their private information and where it is shared more effectively. The problem that faces them over time is that in order to use social media (or e-commerce for that matter), many companies are now demanding access to personal information that isn’t relevant to the transactions. This kind of data mining is beginning to creep out users as much as some of the content they find on these platforms, and it's only a matter of time before a new social platform is created that doesn’t present users these problems; or, people just begin leaving the current platforms en masse. Thus far, there hasn’t been much real negative movement on that front.

So Why Do We Stay?

This actually begs the question, “why do they stay?” If a professional lumberjack were to tell you that they have a great concern that a tree is going to fall over, would you stand directly under that tree? Obviously not. So why, when professional IT consultants tell you that you are going to have a complete social profile of you as a consumer made up of every click you make on a website, that will be sold off to advertisers of all kinds, do you not just opt out?

It could be for a multitude of reasons. Maybe you need a platform for marketing purposes. Maybe you use it differently than most and don’t share a lot of personal information? Maybe, you are one of the millions of people today that are trading their privacy for convenience? Whatever the reason is, if social media has become an important part of your life, you most likely have made some privacy concessions, knowingly-or-not, in order to use it.

Between social media and online commerce, more personally identifiable information is shared with corporate entities than you would ever share with some of your closest family members in person, let alone over the Internet. This may be a testament to the built-in encryption these services use, but more likely, people don’t consider that their personal or financial information is at risk when using these reputable outlets. This perception is a bit off, especially given the amount of information organizations are able to mine from a single, typical user.

The reality is that people find personal value in social networking and other social media. Whether it is sharing thoughts with the people they love, learning new information, entering into one of the countless discussions available, or simply as an information subsidy to their busy life, social media users have a tendency to use any downtime they have to focus on their social media. When you consider 30 percent of all online time is spent on social media (which only increases when people go mobile), you begin to understand that it carries value for hundreds of millions of people.

How do you use your social profiles? Would you consider yourself a heavy user? Do you have concerns over social media platforms’ use of your social media behaviors and other personal information? Leave your thoughts about it in the comments section and return to our blog for more great technology-related articles.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, June 20 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Email Business Computing Privacy User Tips Google Malware Productivity Hackers Network Security Microsoft Business Software Computer Hosted Solutions Tech Term Communication Data Ransomware Internet Small Business IT Services Efficiency Mobile Devices Cloud Computing Workplace Tips Data Recovery Backup IT Support Hardware Smartphone Android Saving Money Innovation Managed IT Services Microsoft Office Business Continuity Windows Information Data Backup Data Management Internet of Things Mobile Device Users Social Media Browser Managed IT Services Windows 10 Outsourced IT Word Passwords Productivity Vulnerability Upgrade Server Cybersecurity Facebook Phishing Office 365 Gmail App Business Management Windows 10 Encryption Smartphones Chrome Remote Monitoring communications Artificial Intelligence Network Disaster Recovery Save Money VoIP Employer-Employee Relationship Miscellaneous Virtual Reality Gadgets Managed Service Provider Analytics Applications Infrastructure BYOD Website IT Support Money Managed Service Tip of the week Robot Big Data Antivirus Google Drive Bandwidth Automation Content Filtering Settings Apps VPN Education Access Control Apple IT Management Paperless Office Government Router YouTube Risk Management Hacker Data storage Unified Threat Management Company Culture Office Tips Employee-Employer Relationship Display Maintenance Vendor Management The Internet of Things Avoiding Downtime Monitors LiFi Development Document Management Scam Chromebook Hosted Solution Administration Wireless Downtime Solid State Drive Mouse Networking End of Support HIPAA Mobile Security Hard Disk Drive Storage Data Security Business Technology SaaS Printing Server Management Virtual Private Network Touchscreen Business Intelligence Holiday Quick Tips Computers Virtualization Data loss Tablet Telephone Systems Retail Alert desktop Outlook Augmented Reality Spam Computing Bring Your Own Device Operating System Laptop Firewall WiFi Two-factor Authentication Managing Stress Managed IT Service Tech Support Star Wars Social PowerPoint User Error Chatbots eWaste Budget Laptops Patch Management Nanotechnology Spyware Typing Humor Data Breach Customer Relationship Management Wearable Technology Network upgrade Uninterrupted Power Supply Information Technology Mobility Specifications Best Practice Alerts USB File Sharing Current Events Co-Managed IT Heating/Cooling Multi-Factor Security Social Engineering Motherboard Cables Computer Care IBM Break Fix Websites Fraud Cost Management Cybercrime Onboarding Time Management Printer Identity Continuity Software as a Service Screen Reader Charging Identity Theft Cryptocurrency Slack Hard Disk Drives Marketing Smart Office Print Toner Search Black Friday Corporate Profile Google Docs Messaging Emergency Licensing Dongle IT solutions Going Green Content Servers Google Calendar Safety Wires Training Dark Web Assessment Automobile Hacks Digital Signage Network Management Remote Computing Solar G Suite Entertainment Smart Tech Bitcoin Monitoring Solid State Drives Network Congestion Work Dell Google Wallet Shortcuts Cyber Monday WannaCry Business Growth Employee-Employer Relationships Cooperation Service Level Agreement Halloween Cabling Streaming Legislation Voice over Internet Protocol iOS Microsoft Excel Wi-Fi Hotspot Internet Exlporer Google Maps Password Troubleshooting SharePoint Writing Compliance Legal Connectivity Windows 8 Spying National Security Techology IT Technicians Optimization Unified Communications Drones Security Cameras Managed IT Smart Technology FinTech Analysis Students How To Lenovo Dark Data Update Staff Leominster Scary Stories Human Error Statistics Modem Scalability Mail Merge Blockchain Language Value Running Cable Mobile Device Management Downloads Regulations Deep Learning Politics IoT Digital Payment VoIP Unified Threat Management Mirgation Recycling Buisness Managed Services Shortcut Distributed Denial of Service Cookies MSP Virtual Desktop Digital Alt Codes Mixed Reality Firefox Superfish Customer Service K-12 Schools Sports Disaster Device Bluetooth Comparison Migration Address Permissions Private Cloud Computing Infrastructure Professional Services Collaboration LED Office Samsung Social Networking Black Market CCTV Webcam Law Enforcement Windows 7 Electronic Medical Records Notifications Physical Security Error Twitter Emoji Point of Sale Ben McDonald shares Upgrades Gadget Travel Crowdsourcing BDR Personal Information Botnet Regulation Supercomputer CrashOverride Cortana 3D Printing Staffing Motion Sickness Machine Learning Administrator Processors Taxes IT Budget Web Server what was your? Unsupported Software GPS Computer Repair Relocation Printers IT Consultant Mobile Data Updates Cameras Tracking Recovery Meetings How To Work/Life Balance Health Mobile Computing Cleaning

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3