From Wikipedia, the free encyclopedia

Wiki Education Foundation-supported course assignment

This article is or was the subject of a Wiki Education Foundation-supported course assignment. Further details are available on the course page. Student editor(s): [

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT ( talk) 02:43, 18 January 2022 (UTC) reply

Wiki Education Foundation-supported course assignment

This article is or was the subject of a Wiki Education Foundation-supported course assignment. Further details are available on the course page. Student editor(s): Kamryngood, Addisonronk, Lastinfreeman. Peer reviewers: Brian.klein.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT ( talk) 02:43, 18 January 2022 (UTC) reply

Wiki Education Foundation-supported course assignment

This article is or was the subject of a Wiki Education Foundation-supported course assignment. Further details are available on the course page. Student editor(s): Jocelyngarroyo, Anna jasmine33, Megancollom, Jorge CSUEB.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT ( talk) 02:43, 18 January 2022 (UTC) reply

Wiki Education Foundation-supported course assignment

This article was the subject of a Wiki Education Foundation-supported course assignment, between 5 October 2018 and 12 December 2018. Further details are available on the course page. Student editor(s): Lpwarner. Peer reviewers: Ianbohn761.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT ( talk) 02:43, 18 January 2022 (UTC) reply

Wiki Education Foundation-supported course assignment

This article was the subject of a Wiki Education Foundation-supported course assignment, between 18 March 2019 and 10 May 2019. Further details are available on the course page. Student editor(s): Eurasia18.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT ( talk) 02:43, 18 January 2022 (UTC) reply

Wiki Education Foundation-supported course assignment

This article was the subject of a Wiki Education Foundation-supported course assignment, between 20 May 2019 and 12 July 2019. Further details are available on the course page. Student editor(s): Erkunkel.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT ( talk) 02:43, 18 January 2022 (UTC) reply

Wiki Education Foundation-supported course assignment

This article was the subject of a Wiki Education Foundation-supported course assignment, between 14 January 2020 and 9 March 2020. Further details are available on the course page. Student editor(s): Kaduoos. Peer reviewers: Kcruz0311.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT ( talk) 02:43, 18 January 2022 (UTC) reply

Wiki Education Foundation-supported course assignment

This article was the subject of a Wiki Education Foundation-supported course assignment, between 6 July 2020 and 14 August 2020. Further details are available on the course page. Student editor(s): BenKeebaugh.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT ( talk) 02:43, 18 January 2022 (UTC) reply

Self-Introduction

Hello everyone, I am a student from CSUEB and I will be working on this article as part of a class project. Here are some sources I have considered adding:


Senthil Kumar N*, Saravanakumar K, Deepa K, On Privacy and Security in Social Media – A Comprehensive Study. School of Information Technology and Engineering, VIT University, Vellore. December 2015.


Alex Koohang, Social media sites privacy concerns: Empirical validation of an instrument. Online Journal of Applied Knowledge Management. 2017.

Additional Topics of Discussion (with regard to ethical dilemma)

Possible perspectives to add in: • Ethical responsibilities of companies, platform and user in involvement and social media activity • Transitions and blending of purpose; that there can be a safety reason for breaches of support, but it transforms into a business purpose and soon one of control and keeping users “hooked.” • Role of the social media user and understanding what exactly you are signing up for • While legalities have been discussed it might be interesting to see how any (if they exist) pursuits of social media rights activism turned out. • Certainly the angle of increased awareness rather than increases in breaches of privacy would be an interesting point to explore. • Employment: JasperRS ( talk) 17:27, 16 February 2017 (UTC) reply

Additional Sources to Consider: Bertot, John Carlo, Paul T. Jaeger, and Derek Hansen. "The impact of polices on government social media usage: Issues, challenges, and recommendations." Government information quarterly 29.1 (2012): 30-40.

Ellison, Nicole B., et al. "Negotiating privacy concerns and social capital needs in a social media environment." Privacy online. Springer Berlin Heidelberg, 2011. 19-32.

McKee, Rebecca. "Ethical issues in using social media for health and health care research." Health Policy 110.2 (2013): 298-301.

McNeilly, Sam, Luke Hutton, and Tristan Henderson. "Understanding ethical concerns in social media privacy studies." Proceedings of the ACM CSCW Workshop on Measuring Networked Social Privacy. 2013. JasperRS ( talk) 17:24, 16 February 2017 (UTC) reply

Improving clarity and method to counter attack privacy problems

I'm a student from social computing class at ischool at University of Pittsburgh. I think this is a fairly good article with rather good words. I think one can work more on the images. The whole page has no images to help illustrating the knowledge. Besides, some secondary titles don't seem to be appropriate. For example, the tile "privacy concerns' has little connection to its content. Also, the structure can be improved. Like the storage part and the concerns parts, we may set up new category "Causes" and "Concerns" and put these parts inside. Last but not least, I believe we can find more about concerns and add something about how to avoid privacy problem on the internet. Yundananagel ( talk) 21:12, 1 November 2015 (UTC) Yundananagel ( talk) 16:02, 4 November 2015 (UTC)Okay, so I will work on adding content involving how to shield oneself from this privacy crimes. Yundananagel ( talk) 16:02, 4 November 2015 (UTC) reply

Updating the Privacy Concern section of this page

Questingwayfarer ( talk) 18:03, 2 November 2015 (UTC) As a part of social computing coursework, I would like to work on improving this article. Like mentioned by the previous user, I agree that the topic sections need more clarity on information provided. Like the Privacy concern page just talks about the Twitter privacy for users and does not really address the concern of Privacy. There are many other such Privacy concerns which are partly highlighted in the Potential Danger section. I would like to work on improving the Privacy Concern section and include the following in the article - Loopholes in data breach, negligence of ignoring terms and conditions in social networks. Questingwayfarer ( talk) 18:03, 2 November 2015 (UTC) reply

Reading the Privacy statement in terms and conditions

Questingwayfarer ( talk) 18:18, 2 November 2015 (UTC)This section explains how to read the Privacy statement in terms and conditions while signing up for any social network Most people skip this section while signing up and seldom understand the what they are buying into. But spending a few extra minutes reading through can just help tremendously Some applications readily collect data like your data of birth while. reply

What to look for in the Privacy Policy? 1) who owns the data that a user posts? 2) What happens to the data when account is closed? 3)How does the changes in the Privacy policy notified to its users? 4)Location and Language of privacy policy 5) Will the social account be completely erased when a user deletes the account. 6)Where and how can a user complain in case of any breach 7)For how long is the personal information stored?


These are some the important question a user should be generally aware of before signing up. The article needs to provide better insights on these questions to create awareness for the user. Questingwayfarer ( talk) 18:18, 2 November 2015 (UTC) reply

Self-Introduction

Hello, I am part of social computing class, from University of Pittsburgh and as part of the same, i am working on this topic.

Blueberry snow ( talk) 01:14, 3 November 2015 (UTC) reply

Awareness of User on Privacy in Social Networking

User is the source and target of information typically on a Social networking. There are Privacy policies and usage by users. User are definitely getting more aware. The extent to which user is aware on privacy is an important question. Is the user aware of privacy? Does the user know what is scope of a personal photo/video view on a social networking? — Preceding unsigned comment added by Blueberry snow ( talkcontribs) 22:27, 3 November 2015 (UTC) reply

Method to counter attack privacy crimes

Yundananagel ( talk) 17:23, 4 November 2015 (UTC)I think we can deal with this problem from mainly three perspectives. First is from the company's view, what actions have those companies taken to protect their clients' information from invasion and how to make sure only the safe and trustworthy people are able to see what their clients posted. Second is from each person's view, what action is more likely to cause privacy problems and what method may a individual take to protect themselves. What should not be posted in their twitter or Facebook account and how to make friends while using social media. Actually the part about what action causes problems can put independently as a new part of the article. The last part may be how government or Law enforcement can do to reduce the chance of privacy problems. Yundananagel ( talk) 17:23, 4 November 2015 (UTC) reply

Some more to add

Blueberry snow ( talk) 21:45, 4 November 2015 (UTC) ~~Yundananagel Thank you for sharing. agree with the points. We can think of finding any papers or how existing sites looks at the three perspectives you have shared. Also we have to include existing privacy policy and presentation of it to a user and also how user interprets it. User awareness and interpretation are very crucial and I found some information and a paper on this. Blueberry snow ( talk) 21:45, 4 November 2015 (UTC) reply

-- Lanuordiy ( talk) 06:01, 7 November 2015 (UTC) reply
I'm a student from social computing class at ischool at University of Pittsburgh.

First, some paragraphs can be divided into two parts. Second, there are lots of experiments in this article, but some of them don’t have appropriate citations and not in the right section. Third, about the content above “storage of data”, it is supposed to give readers a brief knowledge about privacy in social networking services. For example, in this article, interpret how to identify the privacy in social network firstly. Then show how the aggregation of information can be used to identify a specific person, finally, interpret how it intrudes users’ privacy.

Adding several sections is a good idea. We can arrange the sections in this order.
(1) Current status of users' awareness about the privacy.
(2) How those companies and institutional make use of users’ data. So we can conclude “privacy concerns” and “institutional concerns” in this section. Actually, we can show some positive aspects when institutional or companies deal with users’ data.
(3) Potential dangers.
(4) Methods to counter attack privacy problems.

After we decide the contents, we can reassign the original sections to this new contents.
Lanuordiy ( talk)


I agree, there could be some paragraphs that could be divided. There also needs to be more information added about "privacy". Also, where is the evidence that studies show that there are privacy concerns? BFE68 ( talk) 16:32, 25 March 2018 (UTC) reply

Decision of changes

So, based on our discussion, we'll improve the article from three major perspective. First is adding new section 'Methods to counter attack privacy problems', which will be separate into 3 parts: individual approaches, companies approaches and government policies. Second is adding content about reading privacy policy, what policy already exist, how are people doing with these policies and what to look for in the policies. Third is develop a section about the current status of users' awareness about the privacy risks. Besides all of above, we will also try to improve the overall structure of the article, add some images to help illustrating the knowledge and also updating the privacy concerns section with more content. The references of the articles seem to be out of date since most of them were published 4 to 5 years ago, so we would find newer version or alternatives. Yundananagel ( talk) 18:10, 6 November 2015 (UTC) reply

Decision changes

Questingwayfarer ( talk) 02:27, 8 November 2015 (UTC) Thank you all for coordinating on deciding the decision changes. I agree with the changes proposed and willing to work on them. Questingwayfarer ( talk) 02:27, 8 November 2015 (UTC) reply

Potential Dangers in Privacy of Social Networking

Questingwayfarer ( talk) 02:50, 8 November 2015 (UTC) In regard to our decision changes and points given by users, I felt it would be appropriate to have the following content in Potential Dangers. Please add your comments if you wish to include more under this section. Potential Dangers of Social Networking services : 1) Identity theft 2) Revealing location, privacy of updates and information 3) Potential hacking into your system 4) Being harassed by strangers 5) Lack of age verification mechanisms 6) Easy access by predators and cyberbullies 7) Excessive or addictive access to networks 8) Job background check reply

These are the subtopics under potential dangers which I would like to cover. Questingwayfarer ( talk) 02:50, 8 November 2015 (UTC) reply

-- Lanuordiy ( talk) 03:49, 8 November 2015 (UTC)Questingwayfarer,Thanks for listing the subtopics under potential dangers. Can you explain more about the subtopics above? how will you deal with the original potential danger section? Lanuordiy ( talk) reply

Summary

Blueberry snow ( talk) 05:08, 8 November 2015 (UTC) I agree withchanges suggested by Questingwayfarer and YUdanangel and Laude. A reference for points I suggested can be found here: reply

https://cs.uwaterloo.ca/~uhengart/publications/passat09.pdf http://www.isaca.org/Journal/archives/2012/Volume-6/Pages/Lack-of-Privacy-Awareness-in-Social-Networks.aspx

User Awareness:

Blueberry snow ( talk) 05:28, 8 November 2015 (UTC)Lack of user awareness is due to following: 1) People's disregard of privacy risk due to trust in privacy and protection offered in social networking sites. 2) Availability of User's personal details to thirdparty tools/applications. 3) APIs and Frameworks also enable any user, who has fair amount of knowledge to extract the user's data. 4) Cross-site forgery and possible other website threats reply

User can be any of the following roles in social networking: 1) A person, 2) Celebrity/popular person such as actor, musician, performers 3) Organization/company Blueberry snow ( talk) 05:28, 8 November 2015 (UTC) reply

tasks

-- Lanuordiy ( talk) 22:16, 15 November 2015 (UTC) reply

hi, all, I want to make sure the tasks is clear to everyone.

According to our discussion, Questingwayfarer will cover the user awareness section, right? And Yundananagel would like to cover method to counter attack privacy problems, and Blueberry snow will do privacy policy part. I will work on how companies or institutes make use of uses’ information. If you change your mind, and want to do another section, be free to tell us. And after finishing our own part, I hope we can revise each other’s part or add anything relevant. Then we can improve the structure, grammar mistakes and so on.
-- Lanuordiy ( talk) 22:16, 15 November 2015 (UTC) reply

Clarity on assignment of roles

Questingwayfarer ( talk) 02:48, 17 November 2015 (UTC) Hi Lanuordiy. Thanks for starting this thread to get the assignments clear. I would be handling the Potential Dangers and Privacy Statement policy. I think I hope the rest of them also reply confirming their roles so that we can go ahead and make the changes. reply

Questingwayfarer ( talk) 02:48, 17 November 2015 (UTC) Hi everyone. I'm aware of my job in counter attack part Yundananagel ( talk) 02:19, 18 November 2015 (UTC) reply

progress so far

-- Lanuordiy ( talk) 14:38, 29 November 2015 (UTC)Hi, all, I edited the article. Those above "contents" is too long, so I create a "causation" part to contain this. Also, I added some information about ways to access data and how companies benefits from data. If you think it is not proper to organize content in this order or you find any mistakes, don't hesitate to tell me. Lanuordiy ( talk) 14:38, 29 November 2015 (UTC) reply

User awareness Draft posted: Inviting your views!

Draft available at: /info/en/?search=User:Blueberry_snow/sandbox

-- Questingwayfarer -- Yundananagel -- Lanuordiy
Yundananagel ( talk) 23:26, 2 December 2015 (UTC)Hi,-- Blueberry snow, I was going through the article when I found some mistakes in your part User awareness. I changed some spelling error about Carnegie Mellon University and a small mistake near the reference label at second paragraph. The reference at the last paragraph is not in its right form so I deleted it and added some returns in the third paragraph. Please allow me to suggest you to recheck your references in second and third paragraph, I'm not sure if they are linked to the right paper. By the way, all these alters have been made directly on the article. Yundananagel ( talk) 23:26, 2 December 2015 (UTC) reply

Views

Hello -- Questingwayfarer -- Lanuordiy Thank you for the updates on your changes.

W.r.t data access methods by -- Lanuordiy, that was pretty good point you have mentioned. While, popular social networking API not only uses social networking services, but API for a Messenger/chat reveals that it has developed APIs that can get details such as user location, user mobile device and are in fact the latest versions deployed on their websites.

Questingwayfarer ( talk) 15:19, 30 November 2015 (UTC) I read your draft Blueberry snow. I think you need to explain the data access a little further. The introduction with the trust aspect is a great start. The points you have mentioned about the APIs and personal information can be explained further w.r.t data access. Questingwayfarer ( talk) 15:19, 30 November 2015 (UTC) reply

-- Questingwayfarer Thank you. Actually I dint plan to update data access part as I was just sharing that the Lanuordiy has written so well. BUt I can definitely edit and elaborate further to Data access section.

Hi-- Questingwayfarer-- Lanuordiy I just erase the title of storage of data and put the content of this part to the how to read terms part because they appear to be relevant. By the way, I think there are more we can do about the privacy concerns part. I mean the first company part refer to concerns towards these companies while the second institutional part are concerns from these institutions. I haven't figure out the best way to improve it. Yundananagel ( talk) 19:55, 2 December 2015 (UTC) reply

Completed my updates

Questingwayfarer ( talk) 04:01, 1 December 2015 (UTC)Hi All, reply

I have updated the potential dangers section in many places and also including a section for location update. Along with that I have also created a new main section for reading a privacy statement with what a user needs to look for. Please go through these changes and let me know if its appropriate. If you have suggestions please mention. Questingwayfarer ( talk) 04:01, 1 December 2015 (UTC) reply

-- Lanuordiy ( talk) 04:57, 1 December 2015 (UTC) Questingwayfarer, the reading part is necessary, but "This section explains how to read " seems like informal, can you change it? Also, can you include "storage of data" in this section, which also give us some information about terms of use policy. And also, thanks for the advice for API part, I will add "popular social networking API not only uses social networking services, but API for a Messenger/chat reveals that it has developed APIs that can get details such as user location, user mobile device and are in fact the latest versions deployed on their websites.", can you give me more information about this, so I can add that to the article Lanuordiy ( talk) 04:57, 1 December 2015 (UTC) reply

blueberry, about your draft, some mistakes about citation should be corrected. If it is necessary, you can also combine people concern part with your draft. Lanuordiy ( talk) 04:57, 1 December 2015 (UTC) reply

-- Lanuordiy Please elaborate and share details. I dint understand what you are saying/which parts of article you are commenting about from my section.

-- Questingwayfarer , -- Lanuordiy : Updated in People concern section as a sub-section. -- Lanuordiy : Can you please elaborate and share details on your comment? I dint understand which parts of citation you are referring to?

Yundananagel ( talk) 07:27, 2 December 2015 (UTC)Hi everyone, sorry about the delay. My part is available at /info/en/?search=User_talk:Yundananagel now. I didn't actually find anything worth putting in the article about what the companies and governments did to protect people's privacy. It's basically what they did to invade people's privacy. I can use some advice on references and spellings Yundananagel ( talk) 07:27, 2 December 2015 (UTC) blue berry, I think your draft are good but you may want to check some of your spellings again. Yundananagel ( talk) 19:01, 2 December 2015 (UTC) reply

Yundananagel Thanks for sharing. I see few betterment may be required in the points you ahve updated such as when you say "Encrypt devices", do you want to elaborate if it is user point of view or developer's and also what form of encryption is applicable if its a user. — Preceding unsigned comment added by Blueberry snow ( talkcontribs) 02:48, 3 December 2015 (UTC) reply

-- Blueberry snow sorry for the delay, I noticed you have updated user awareness as a sub-section, I think subheading is not necessary, they are all about people concern, what's your opinion?-- Lanuordiy ( talk) 01:08, 3 December 2015 (UTC) reply

-- Lanuordiy No problem. The reason I have put it on is because of the reason this topic is sidelined. SO, will let it be there. — Preceding unsigned comment added by Blueberry snow ( talkcontribs) 02:25, 3 December 2015 (UTC) reply

Information explaining what social networking

I just wanted to point out in the history portion of this article there are no academic sources, perhaps looking at more archives on privacy on social networking sites like Facebook. Please see The Political Economy of Facebook by Christian Fuchs -- Alleiyat ( talk) 17:48, 3 October 2016 (UTC) reply

Delete or keep an index to this subject?

This week there's discussion about whether to delete or keep the Index of Articles Relating to Terms of Service and Privacy Policies, which I created in early August. That index helps readers find:

  • this article
  • articles on different aspects of privacy policies
  • articles which cover privacy at specific companies

Wikipedians are welcome to improve the index, and/or discuss if it should be deleted or kept available. Numbersinstitute ( talk) 17:23, 13 September 2017 (UTC) reply


Hello I am in a college class that is directed toward how teens use social media, and had to pick and article that I found interesting. Teens today do not understand some of the privacy concerns that comes along with using social media, or the causes it can have. I plan to contribute to this article by editing the Privacy Concerns and Causes section with information I find by researching this topic. I also plan to do small fixes like adding citations and sentences in other sections that seem to have a context gaps. Kamryngood ( talk) 22:33, 9 March 2018 (UTC) reply

Privacy Concerns with Social Networking Services Bibliography

Boyd, Danah. It's Complicated : The Social Lives of Networked Teens. Yale University Press, 2014.

Quinn, Kelly. "Why We Share: A Uses and Gratifications Approach to Privacy Regulation in Social Media Use." Journal of Broadcasting & Electronic Media, vol. 60, no. 1, Mar. 2016, pp. 61-86. EBSCOhost, doi:10.1080/08838151.2015.1127245.

Jennifer, Jolly and TODAY Special for USA. "How to Protect Your Kids' Privacy and Track Their Time .." USA Today, n.d. EBSCOhost, 199.245.164.25:2048/login?url= http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=J0E032797580617&site=ehost-live&scope=site.

Ortutay, Barbara. Facebook users still waiting on privacy scandal notices . Washington Post, April 9, 2018. Washingtonpost.com

Draft

Social media is evolving faster than many thought it would. With new updates in many of the popular social media apps such as, Instagram, Twitter, and Snapchat, it is becoming harder and harder to keep things private. Snapchat has a new update that shows all your friends on a map, including yourself. While there is an option to have your location off, keeping it on could be very dangerous. This is because people can see where you are as long as you are on the app, making it easier for lets say, sexual predators, to track you. Because these new apps have so many updates where your posts or snaps are out to the public, it can seem like a very unsafe place to be, especially for teenagers. Parents are usually on their kids about their social media accounts and how they post on it. Just to make sure kids aren't interacting with the wrong people, or posting inappropriate stuff on social media. With parents breathing down kids necks on social media, it invades their privacy, but at the same time it keeps them safe. Another application with privacy concerns is Facebook. Facebook is facing a scandal due to the lack of privacy with their users.

-Facebook Facebook users are in a rage because of the leak of their private information and posts on the Cambridge Analytica. Washington Post says that "The 87 million users who might have had their data shared with Cambridge Analytica were supposed to get a detailed message on their news feeds starting on monday. Facebook says more than 70 million of the affected users are in the U.S., though there are over a million each in the Philippines, Indonesia and the UK." Mark Zuckerberg, CEO and founder of Facebook, stated that the data collected was from in-app purchases such as quizzes and games, as said in the Washington Post. Lastinfreeman ( talk) 13:57, 29 March 2018 (UTC) reply

Section on responses to criticisms

On 2020-03-02, @Estrockis added text and @GermanJoe removed it, criticizing tone and the Forbes contributor as source. I agree with Estrockis the info is valid, the CPO source is valid (and its underlying research study), and I see no reason Forbes contributors are not valid: they are vetted and paid by Forbes, similar to any magazine's online version. Randall Lane wrote in 2018,

  • "my new role as Forbes’ chief content officer, providing a unified reporting structure for every editorial platform... One focus: the Forbes contributor network, our key digital driver since we introduced it in 2010. In bringing in hundreds of expert voices, both paid and unpaid, to the Forbes audience, we were able to create a viable model in a field with too few of them, that greatly increased how much and what we could cover, while also allowing us to expand our full-time newsroom."
  • "effective immediately, every individual contributor will be on a paid contract."
  • https://www.forbes.com/sites/randalllane/2018/02/14/why-forbes-is-investing-big-money-in-its-contributor-network/#4b625b032a3e

I don't have a problem with Estrockis' tone, and the solution is to correct it, or point out issues here in the Talk page, not delete meaningful, well-sourced, content. Numbersinstitute ( talk) 21:32, 2 March 2020 (UTC) reply

Please see WP:RSP for the current consensus about Forbes contributor articles, and I doubt that a PR announcement from the Forbes content manager will change this stance. Guidance about encyclopedic language can be found at WP:NPOV and WP:TONE. I appreciate that the edit was a good-faith contribution and left the user some more information on their user talkpage, but the content in question clearly needs more work before it could be added. It's not just 1-2 minor flaws that could be fixed easily. GermanJoe ( talk) 17:23, 3 March 2020 (UTC) reply

Article should be split

Article should be split. It is too long; currently 88k characters in size. WP:SIZERULE suggests articles > 100k characters should almost certainly be divided, and > 60k probably divided. This article conflates multiple topics currently.

I propose:

ProcrasinatingReader ( talk) 16:48, 4 June 2020 (UTC) reply

Actually, seeing as Social networking service#Issues probably also needs a split and there's many layers of overlap. e.g. The preteen and sexual predators sections in this article overlap with the risk for child safety section in that article. Hence, there should be a broader approach (and a different name) to the split on the "Potential dangers" section. Perhaps just Issues with social networking sites (or 'Risks' / 'Potential dangers', to name a few more suggestions). ProcrasinatingReader ( talk) 17:14, 4 June 2020 (UTC) reply
I went ahead and split the section from the article, although the lede is very short and the section on the former page is also short. Buffaboy talk 02:51, 26 June 2020 (UTC) reply

Wiki Education assignment: Digital Citizenship

This article was the subject of a Wiki Education Foundation-supported course assignment, between 23 August 2022 and 16 October 2022. Further details are available on the course page. Student editor(s): LeanneGagnon ( article contribs).

— Assignment last updated by LeanneGagnon ( talk) 22:05, 12 September 2022 (UTC) reply

Social networking in site intrude into one's

Social networking in site 42.107.193.55 ( talk) 15:09, 24 November 2022 (UTC) reply

Social networking

hii 103.206.10.148 ( talk) 08:55, 25 March 2023 (UTC) reply

Source 100 in "Invasive privacy agreements" not relevant

The following sentence:

Employers have often been found to hire individuals or companies to search deep into the SNSs user database to find "less than pleasant" information regarding applicants during the review process.

Is cited with source 100 (arXiv:1410.1348), which is a paper about finding employment and place of residence information of certain university graduates on LinkedIn. As stated in the paper, this information is registered on LinkedIn by the user.

This is not "less than pleasant" information "deep into the user database"; it's literally surface level information provided by the user to be shared with others. Narilth ( talk) 19:31, 11 July 2023 (UTC) reply

Deepakumrgil

main iska Facebook ID ka link bhul gai hun number kho Gaya please kaise bigad Gaye iska Deepak Kumar ka naam se mere ko Bata dijiye number bata do 110.235.217.179 ( talk) 18:01, 10 March 2024 (UTC) reply