Abstract
Social networking creates relationships through the internet and it gains indivisible relation with human life nowadays. Social networking sites and applications handle a large volume of data. As more personal information flows in and out of social networks, data privacy and security in the social network become a topic of discussion and arguments. This chapter emphasizes data privacy and also differentiates privacy from security. Initial sections of the chapter explain privacy in its elementary form as a need and right of a human being under the perspective of anthropology and behavioral science. Personal data privacy, its current scenario, threats and its protection by law and policymaking by various governments around the world are discussed further. The chapter considers social networking beyond networking sites and applications, and hence a discussion on privacy threats for sensitive data which spread across fields such as health data, forensic, smart toys, image and video surveillance is also analyzed. Positives and negatives of social network’s underlying technologies, like machine learning, artificial intelligence, data sciences, the internet of things and blockchain are discussed in terms of data privacy. The personal data privacy measures imposed by law that need to be incorporated as the part of privacy policies of organizations or that need to be implemented with the support of data security mechanisms are discussed in the last part of the chapter.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ortlieb, M.: The Anthropologist’s View on Privacy, Google Switzerland, Co published by the IEEE Computer and Reliability Societies (2014)
Arendt, H.: The Human Condition, Introduction by Margaret Canovan. 2nd ed. (1998)
Han Van der Geest, S.: Privacy from an anthropological perspective. In: Van der Sloot, B., De Groot, A. (eds.) The Handbook of Privacy Studies: An Interdisciplinary Introduction, pp. 413–444. Amsterdam University Press, Amsterdam (2018). JSTOR, www.jstor.org/stable/j.ctvcmxpmp.24. Accessed 9 July 2020
Warren, S.D., Brandeis, L.D.: The right to privacy. Harvard Law Rev. 4(5), pp. 193–220 (1890). JSTOR, www.jstor.org/stable/1321160. Accessed 21 August 2020
https://plato.stanford.edu/entries/privacy/#PriConOveInf. Accessed 29 June 2020
Glancy, D.J.: The invention of the right to privacy. Arizona Law Rev. 21(1) (1979)
Cooley, T.M.: A Treatise on the Law of Torts or the Wrongs Which Arise Independent of Contract. Callaghan and Company, Chicago (1879)
Thomson, J.J.: The right to privacy. Philos. Public Aff. 4(4), 295–314 (Summer, 1975)
Scott, G.: The Death of Privacy: The Battle for Personal Privacy in the Courts, the Media, and Society. ASJA Press (1995)
Regulations (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679
Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) https://gdpr.eu/tag/gdpr/. Accessed on 16 July 2020
https://ico.org.uk/media/2614158/ico-introduction-to-the-data-protection-bill.pdf
https://www.dlapiperdataprotection.com/system/modules/za.co.heliosdesign.dla.lotw.data_protection/functions/handbook.pdf?country-1=AU. Accessed 16 July 2020
https://www.dlapiperdataprotection.com/system/modules/za.co.heliosdesign.dla.lotw.data_protection/functions/handbook.pdf?country-1=BR. Accessed 21 August 2020
Personal Information Protection and Electronic Documents Act https://laws-lois.justice.gc.ca/ENG/ACTS/P-8.6/index.html. Accessed 21 August 2020
Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 (General Data Protection Regulation), p. 9
The Data Protection Bill: https://meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf (2018). Accessed 21 August 2020
An overview of the Data Protection Act 2018, Version 2 January 2019, Information commissioner’s office. https://ico.org.uk/media/2614158/ico-introduction-to-the-data-protection-bill.pdf. Accessed 21 August 2020
van der Geest, S.: Privacy from an Anthropological Perspective, Hand book of privacy
Glancy, D.J: The invention of the right to privacy. Arizona Law Rev. 21(1) (1979)
Kabay, M.E.: Anonymity and pseudonymity in cyberspace: deindividuation, incivility and lawlessness versus freedom and privacy. In: Annual Conference of the European Institute for Computer Anti-virus Research (EICAR), Munich, Germany (1998)
https://dataprivacymanager.net/pseudonymization-according-to-the-gdpr. Accessed on 22 August 2020
https://www.privitar.com/data-privacy/de-dentification/ generalization. Accessed 25 August 2020
Dwork, C., Roth, A.: The Algorithmic Foundations of Differential Privacy. Foundations and Trends® in Theoretical Computer Science, vol. 9, nos. 3–4, pp. 211–407 (2014). doi:https://doi.org/10.1561/0400000042.page-6
Poosarla, S.: Privacy & Data Protection, Infosys Ltd., India, Significance of Data Privacy in Indian IT Industry-A Brief Perspective from Infosys
Rahmouni, H.B., Essefi, I., Ladeb, M.F.: Enhanced privacy governance in Health information systems through business process modelling and HL7. Procedia Comput. Sci. 164, 706–713 (2019), ISSN 1877-0509, doi:https://doi.org/10.1016/j.procs.2019.12.239
Hathaliya, J.J., Tanwar, S.: An exhaustive survey on security and privacy issues in Healthcare 4.0, doi:https://doi.org/10.1016/j.comcom.2020.02.018
Thimbleby, H.: Technology and the future of healthcare. J Public Health Res. 2, e28. College of Science, Swansea University, UK (2013)
Kruse, C.S. et al.: Cybersecurity in healthcare: a systematic review of modern threats and trends. Technol. Health Care 25, 1–10 (2017) IOS Press. doi: https://doi.org/10.3233/THC-161263
https://www.ibm.com/downloads/cas/PLWZ76MM. Accessed 21 August 2020
For the Record: Protecting Electronic Health Information http://www.nap.edu/catalog/5595.html, Committee on Maintaining Privacy and Security in Health Care Applications of the National Information Infrastructure, Commission on Physical Sciences, Mathematics, and Applications, National Research Council, ISBN: 0-309-52425-3, p. 288, 6 x 9, (1997, p. 59)
https://www.hhs.gov/sites/default/files/privacysummary.pdf. Accessed 21 August 2021
https://www.hl7.org/. Accessed 21 August 2020
Mense, A., Blobel, B.: HL7 standards and components to support implementation of the European general data protection regulation. Eur J Biomed Inf 13(1), 27–33 (2017)
Fantinato, M., Hung,, P.C.K., Jiang, Y., Roa, J., Villarreal, P., Melaisib, M., Amancioa, F.: A preliminary study of Hello Barbie in Brazil and Argentina.
Lucht, M., Domagk, S., Mohring, M.: Exer-learning games: transferring hopscotch from the schoolyard to the classroom. In Bramer, M. (ed.): IFIP AI 2010, IFIP AICT 331, pp. 25–34 (2010)
de Carvalho, L.G., Fantinato, M., Elera, M.M.: Security requirements identification and prioritization for smart toys. Electr. Commer. Res. Appl. 41, 100972 (2020). doi:https://doi.org/10.1016/j.elerap.2020.100972
Shasha, S., Mahmoud, M., Mannan, M., Youssef, A.: Playing with danger: a taxonomy and evaluation of threats to smart toys. IEEE Internet Things J. 6(2) (2019)
Kävrestad, J.: Fundamentals of Digital Forensics Theory, Methods, and Real-Life Applications, eBook ISBN 978-3-319-96319-8, doi:https://doi.org/10.1007/978-3-319-96319-8
Afifah, K., Perdana, R.S.: Development of search on encrypted data tools for privacy preserving in digital forensic. In: 2016 International Conference on Data and Software Engineering (ICoDSE), Denpasar, pp. 1–6 (2016) doi:https://doi.org/10.1109/ICODSE.2016.7936152
Halboob, W., Mahmod, R., Udzir, N.I., Abdullah, M.T.: Privacy levels for computer forensics: toward a more efficient privacy-preserving investigation. In: International Workshop on Cyber Security and Digital Investigation (CSDI 2015), Procedia Comp. Sci. 56, pp. 370–375 (2015)
http://www.guidancesoftware.com/encase-forensic. Accessed 22 August 2020
https://accessdata.com/products-services/forensic-toolkit-ftk. Accessed 22 August 2020
Law, F.Y.W., et al.: Protecting digital data privacy in computer forensic examination. In: 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, pp. 1–6 (2011). doi:https://doi.org/10.1109/SADFE.2011.15
International Trends In Video Surveillancepublic Transport Gets Smarter, Statistics Brief, UITP, https://Www.Uitp.Org/Sites/Default/Files/Cck-Focus-Papers-Files/1809-Statistics%20Brief%20-%20Videosurveillance-Final.Pdf. September 2018.
Westin, A.F.: Science, privacy, and freedom: issues and proposals for the 1970's. Part II: balancing the conflicting demands of privacy, disclosure, and surveillance. Columbia Law Rev. 66(7), 1205–1253 (1966). JSTOR, www.jstor.org/stable/1120983. Accessed 14 August 2020
https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-IoT-Overview-20151221-en.pdf
Perera, C., Barhamgi, M., Bandara, A.K., et al.: Designing privacy-aware internet of things applications. Inf Sci 512, 238–257 (2020)
Internet Society Policy Brief: IoT Privacy for Policymakers. https://www.internetsociety.org/policybriefs/iot-privacy-for-policymakers. Accessed 22 August 2020
Always On: Privacy Implications of Microphone-Enabled Devices. https://fpf.org/wp-content/uploads/2016/04/FPF_Always_On_WP.pdf. Accessed 22 August 2020
Timan, T., Mann, Z.Á. (eds.) Data protection in the era of artificial intelligence. Trends, existing solutions and recommendations for privacy-preserving technologies, BDVA (2019)
Bloem, J., van Doorn, M., Duivestein, S., van Manen, T., van Ommeren, E.: Privacy, technology and the law Big Data for everyone through good design, VINT research report 3 of 4 (2013)
Hoepman, J.-H.: Privacy Design Strategies (The Little Blue Book) (2020)
Zhang, R., Xue, R., Liu, L.: Security and privacy on blockchain. ACM Comput. Surv. 1, 1, Article 1, 35 (2019). doi:https://doi.org/10.1145/3316481
Shah, P., Forester, D., Polk, D., Wardwell, L.L.P., Berberich, M., Raspé, C., Mueller, H.: Blockchain Technology: Data Privacy, Issues and Potential Mitigation Strategies, Resource ID: W-021-8235, © 2019 Thomson Reuters, https://www.davispolk.com/files/blockchain_technology _data_privacy_issues_and_potential_mitigation_strategies_w-021–8235.pdf
Artificial intelligence and privacy Issues paper June 2018
The Privacy Expert’s Guide to Artificial Intelligence and Machine Learning October 2018. https://iapp.org/media/pdf/resource_center/FPF_ Artificial_Intelligence_Digital.pdf. Accessed 23 August 2020
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Shejy, G. (2022). Data Privacy and Security in Social Networks. In: Biswas, A., Patgiri, R., Biswas, B. (eds) Principles of Social Networking. Smart Innovation, Systems and Technologies, vol 246. Springer, Singapore. https://doi.org/10.1007/978-981-16-3398-0_17
Download citation
DOI: https://doi.org/10.1007/978-981-16-3398-0_17
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-3397-3
Online ISBN: 978-981-16-3398-0
eBook Packages: EngineeringEngineering (R0)