ESC
Clarivate

 
Source: Journal Citation ReportsTM from ClarivateTM 2022

Entrepreneurship and Sustainability Issues Open access
Journal Impact FactorTM (2022) 1.7
Journal Citation IndicatorTM (2022) 0.42
Received: 2017-11-16  |  Accepted: 2018-02-20  |  Published: 2018-03-30

Title

Secure personal data administration in the social networks: the case of voluntary sharing of personal data on the Facebook


Abstract

In view of the changes taking place in society, social progress and the achievements of science and technology, the protection of fundamental rights must be strengthened. The aim of the article is to analyse the principles and peculiarities of safe management of the personal data in social networks. In this scientific article, methods of document analysis, scientific literature review, case study and generalization are used. Consumers themselves decide how much and what kind of information to publicize on the Facebook social network. In order to use the third-party applications, users at the time of authorization must confirm that they agree to give access to their personal data otherwise the service will not be provided. Personal data of the Facebook user comprise his/her public profile including user's photo, age, gender, and other public information; a list of friends; e-mail mail; time zone records; birthday; photos; hobbies, etc. Which personal data will be requested from the user depends on the third-party application. Analysis of the legal protection of personal data in the internet social networks reveals that it is limited to the international and European Union legal regulation on protection of the personal data in the online social networks. Users who make publicly available a large amount of personal information on the Facebook social network should decide on the issue if they want to share that information with third parties for the use of their services (applications). This article presents a model for user and third party application interaction, and an analysis of risks and recommendations to ensure the security of personal data of the user.


Keywords

personal data, third-party applications, social network, security of the data


JEL classifications

D80 , D83 , M15


URI

http://jssidoi.org/jesi/article/165


DOI


HAL


Pages

528-541


This is an open access issue and all published articles are licensed under a
Creative Commons Attribution 4.0 International License

Authors

Limba, Tadas
Mykolas Romeris University, Vilnius, Lithuania https://www.mruni.eu
Articles by this author in: CrossRef |  Google Scholar

Šidlauskas, Aurimas
Mykolas Romeris University, Vilnius, Lithuania https://www.mruni.eu
Articles by this author in: CrossRef |  Google Scholar

Journal title

Entrepreneurship and Sustainability Issues

Volume

5


Number

3


Issue date

March 2018


Issue DOI


ISSN

ISSN 2345-0282 (online)


Publisher

VšĮ Entrepreneurship and Sustainability Center, Vilnius, Lithuania

Cited

Google Scholar

Article views & downloads

HTML views: 4664  |  PDF downloads: 2042

References


Besmer, A.; & Lipford, H. 2010. Users' (mis)conceptions of social applications, Proceedings of Graphics Interface. https://pdfs.semanticscholar.org/b5e4/fb0eec3457cacf24ddfa0e6d38e98975edec.pdf

Search via ReFindit


Boyd, D.; & Ellison, N. B. 2007. Social Network Sites: Definition, History, and Scholarship. Journal of Computer–Mediated Communication 13(1): 210-230. https://doi.org/10.1111/j.1083-6101.2007.00393.x

Search via ReFindit


Caers, R.; Feyter T. D.; Couck M. D.; Stough, T.; Vigna, C.; Bois, C. D. 2013. Facebook: A literature review. New Media & Society 15(6): 982-1002. https://doi.org/10.1177/1461444813488061

Search via ReFindit


Carminati, B.; Ferrari, E.; Viviani, M. 2014. Security and trust in online social networking. Morgan & Claypool publishers. https://doi.org/10.2200/S00549ED1V01Y201311SPT008

Search via ReFindit


Comer, R.; Kelvey, N. M.; Curran, C.2012. Privacy on Facebook. International Journal of Engineering and Technology Volume 2(9): 1626-1630. https://doi.org/10.1080/15536548.2014.912909

Search via ReFindit


Debatin, B.; Lovejoy, J. P.; Horn A-K.; Brittany, N.; Hughes, B. N. 2009. Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication 15(1): 83-108. https://doi.org/10.1111/j.1083-6101.2009.01494.x

Search via ReFindit


EUR-Lex, 1995 October 24, Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:31995L0046

Search via ReFindit


EUR-Lex, 2012 October 26, Charter of Fundamental Rights of the European Union. http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:12012P/TXT

Search via ReFindit


European Commission, 2009 June 12. Article 29 Data Protection Working Party: Opinion 5/2009 on online social networking. http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2010/wp179_lt.pdf

Search via ReFindit


European Data Protection Supervisor, Data Subject definition. https://edps.europa.eu/node/3099#data_subject

Search via ReFindit


Fogel, J.; & Nehmad, E. 2009. Internet social network communities: risk taking, trust, and privacy concerns, Computers in Human Behavior 25(1): 153-160. https://doi.org/10.1016/j.chb.2008.08.006

Search via ReFindit


Hammer-Lahav, E.; Recordon, D.; Hardt, D. 2011. The OAuth 2.0 authorization protocol draft-ietf-oauthv2-12. https://tools.ietf.org/html/draft-ietf-oauth-v2-10

Search via ReFindit


Hull, G.; Lipford, H. R.; Latulipe, C. 2011. Contextual gaps: Privacy issues on Facebook. Ethics and Information Technology 13(4): 289-302. https://doi.org/10.1007/s10676-010-9224-8

Search via ReFindit


International Working Group on Data Protection in Telecommunications. 2008. Report and Guidance on Privacy in Social Network Services "Rome Memorandum". https://www.datenschutz-berlin.de/pdf/publikationen/working-paper/2008/2008-Rome_Memorandum-en.pdf

Search via ReFindit


International Working Group on Data Protection in Telecommunications. 2008. Report and Guidance on Privacy International Working Group on Data Protection in Telecommunications. https://icdppc.org/wp-content/uploads/2015/03/International-Working-Group-on-Data-Protection-in-Telecommunications.pdf

Search via ReFindit


Joinson, A. N. 2008. 'Looking at', 'looking up' or 'keeping up with' people? Motives and uses of Facebook. In Proceedings of the 26th Annual SIGCHI Conference "on Human Factors in Computing Systems" Florence, Italy, April 05-10 2008, CHI ’08, ACM, New York, 1027–1036. https://doi.org/10.1145/1357054.1357213

Search via ReFindit


Kang, J. 1998. Information privacy in cyberspace transactions. Standford Law Review 50(4): 1193-1294. https://doi.org/10.2307/1229286

Search via ReFindit


Karg, M.; Fahl, C. 2011. Rechtsgrundlagen für den Datenschutz in sozialen Netzwerken. Komminakation und Recht 7(8): 456-458.

Search via ReFindit


Korauš, A.; Dobrovič, J.; Rajnoha, R.; Brezina, I. 2017. The safety risks related to bank cards and cyber attacks, Journal of Security and Sustainability Issues 6(4): 563-574. https://doi.org/10.9770/jssi.2017.6.4(3)

Search via ReFindit


Lee, E. 2012. Young, black, and connected: Facebook usage among African American college students. Journal of Black Studies 43(3): 336-354. https://doi.org/10.1177/0021934711425044

Search via ReFindit


Lewis, J.; & West, A. 2009. 'Friending': London-based undergraduates’ experience of Facebook. New Media & Society 11(7): 1209-1229. https://doi.org/10.1177/1461444809342058

Search via ReFindit


Malinauskaitė-van de Castel, I. 2017. Duomenų subjekto teisės virtualiuose socialiniuose tinkluose. Mykolo Romerio universitetas. https://vb.mruni.eu/object/elaba:23456482/23456482.pdf

Search via ReFindit


Menshikov, V.; Lavrinenko, O.; Sinica, L.; Simakhova, A. 2017. Network capital phenomenon and its posibilities under the influence of development of information and communication technologies, Journal of Security and Sustainability Issues 6(4): 585-604. https://doi.org/10.9770/jssi.2017.6.4.(5)

Search via ReFindit


Oecd.org, 1980 September 23, OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. http://www.oecd.org/internet/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm

Search via ReFindit


Parent, W. A. 1983. Privacy, Morality, and the Law. Philosophy & Public Affairs 12(4): 269-288. http://www.jstor.org/stable/2265374

Search via ReFindit


Pempek T. A.; Yermolayeva Y. A.; Calvert S. L. 2009. College students’ social networking experiences on Facebook. Journal of Applied Developmental Psychology 30(3): 227-238. https://doi.org/10.1016/j.appdev.2008.12.010

Search via ReFindit


Privacy International.org, Data protection definition. https://www.privacyinternational.org/explainer/41/101-data-protection

Search via ReFindit


Šišulák, S. 2017. Userfocus - tool for criminality control of social networks at both the local and international level, Entrepreneurship and Sustainability Issues 5(2): 297-314. https://doi.org/10.9770/jesi.2017.5.2(10)

Search via ReFindit


Statista.com, 2018. Number of social network users worldwide from 2010 to 2021 (in billions). https://www.statista.com/statistics/278414/number-of-worldwide-social-network-users

Search via ReFindit


Steel, E.; & Fowler, G. 2010 October 18. Facebook in privacy breach. The Wall Street Journal, https://www.wsj.com/articles/SB10001424052702304772804575558484075236968

Search via ReFindit


Štitilis, D.; Gustauskas, V.; Malinauskaitė, I. 2012. Asmens duomenų apsaugos virtualiuose socialiniuose tinkluose teisinė aplinka [The legal environment for personal data protection in virtual social networks]. Societal Innovations for Global Growth 1(1): 288-308. http://etalpykla.lituanistikadb.lt/fedora/objects/LT-LDB-0001:J.04~2012~1367188641078/datastreams/DS.002.0.01.ARTIC/content

Search via ReFindit


Štitilis, D.; Kiškis, M.; Limba, T.; Rotomskis, I.; Agafonov, K.; Gulevičiūtė, G.; Panka, K. 2016. Internet and Technology Law. Vilnius:

Search via ReFindit


Valtysson, B. 2012. Facebook as a Digital Public Sphere: Processes of Colonization and Emancipation. Cognition, Communication, and Co-operation 10(1): 77-91. https://www.triple-c.at/index.php/tripleC/article/view/312/339

Search via ReFindit


Wang, N.; Xu, H.; Grossklags, J. 2011. Third-Party Apps on Facebook: Privacy and the Illusion of Control. In Proceedings of the ACM Symposium on Computer Human Interaction for Management of Information Technology (CHIMIT). Boston, MA.

Search via ReFindit


Wasserman, S.; & Faust, K. 1994. Social network analysis: methods and applications. New York: Cambridge University Press.

Search via ReFindit


Westin, A.1968. Privacy and Freedom, Washington and Lee Law Review 25(1): 166-170. https://scholarlycommons.law.wlu.edu/cgi/viewcontent.cgi?referer=https://www.google.lt/&httpsredir=1&article=3659&context=wlulr

Search via ReFindit


Yau, N.; & Schneider, J. 2009. Self-surveillance. Bulletin of the American Society for Information Science and Technology 35(5): 24-30.

Search via ReFindit


Zaidieh, A. J. Y. 2012. The Use of Social Networking in Education: Challenges and Opportunities. World of Computer Science and Information Technology Journal 2(1): 18-21. http://wcsit.org/pub/2012/vol.2.no.1/The%20Use%20of%20Social%20Networking%20in%20Education%20Challenges%20and%20Opportunities.pdf

Search via ReFindit


Zeman, T.; Břeň, J.; Urban, R. 2017. Role of Internet in Lone Wolf Terrorism, Journal of Security and Sustainability Issues (2): 185-192. https://doi.org/10.9770/jssi.2017.7.2(1)

Search via ReFindit