Skip to main content

Data Privacy and Security in Social Networks

  • Chapter
  • First Online:
Principles of Social Networking

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 246))

Abstract

Social networking creates relationships through the internet and it gains indivisible relation with human life nowadays. Social networking sites and applications handle a large volume of data. As more personal information flows in and out of social networks, data privacy and security in the social network become a topic of discussion and arguments. This chapter emphasizes data privacy and also differentiates privacy from security. Initial sections of the chapter explain privacy in its elementary form as a need and right of a human being under the perspective of anthropology and behavioral science. Personal data privacy, its current scenario, threats and its protection by law and policymaking by various governments around the world are discussed further. The chapter considers social networking beyond networking sites and applications, and hence a discussion on privacy threats for sensitive data which spread across fields such as health data, forensic, smart toys, image and video surveillance is also analyzed. Positives and negatives of social network’s underlying technologies, like machine learning, artificial intelligence, data sciences, the internet of things and blockchain are discussed in terms of data privacy. The personal data privacy measures imposed by law that need to be incorporated as the part of privacy policies of organizations or that need to be implemented with the support of data security mechanisms are discussed in the last part of the chapter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ortlieb, M.: The Anthropologist’s View on Privacy, Google Switzerland, Co published by the IEEE Computer and Reliability Societies (2014)

    Google Scholar 

  2. Arendt, H.: The Human Condition, Introduction by Margaret Canovan. 2nd ed. (1998)

    Google Scholar 

  3. Han Van der Geest, S.: Privacy from an anthropological perspective. In: Van der Sloot, B., De Groot, A. (eds.) The Handbook of Privacy Studies: An Interdisciplinary Introduction, pp. 413–444. Amsterdam University Press, Amsterdam (2018). JSTOR, www.jstor.org/stable/j.ctvcmxpmp.24. Accessed 9 July 2020

  4. Warren, S.D., Brandeis, L.D.: The right to privacy. Harvard Law Rev. 4(5), pp. 193–220 (1890). JSTOR, www.jstor.org/stable/1321160. Accessed 21 August 2020

  5. https://plato.stanford.edu/entries/privacy/#PriConOveInf. Accessed 29 June 2020

  6. Glancy, D.J.: The invention of the right to privacy. Arizona Law Rev. 21(1) (1979)

    Google Scholar 

  7. Cooley, T.M.: A Treatise on the Law of Torts or the Wrongs Which Arise Independent of Contract. Callaghan and Company, Chicago (1879)

    Google Scholar 

  8. Thomson, J.J.: The right to privacy. Philos. Public Aff. 4(4), 295–314 (Summer, 1975)

    Google Scholar 

  9. Scott, G.: The Death of Privacy: The Battle for Personal Privacy in the Courts, the Media, and Society. ASJA Press (1995)

    Google Scholar 

  10. Regulations (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016, https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679

  11. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) https://gdpr.eu/tag/gdpr/. Accessed on 16 July 2020

  12. https://ico.org.uk/media/2614158/ico-introduction-to-the-data-protection-bill.pdf

  13. https://www.dlapiperdataprotection.com/system/modules/za.co.heliosdesign.dla.lotw.data_protection/functions/handbook.pdf?country-1=AU. Accessed 16 July 2020

  14. https://www.dlapiperdataprotection.com/system/modules/za.co.heliosdesign.dla.lotw.data_protection/functions/handbook.pdf?country-1=BR. Accessed 21 August 2020

  15. Personal Information Protection and Electronic Documents Act https://laws-lois.justice.gc.ca/ENG/ACTS/P-8.6/index.html. Accessed 21 August 2020

  16. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 (General Data Protection Regulation), p. 9

    Google Scholar 

  17. The Data Protection Bill: https://meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf (2018). Accessed 21 August 2020

  18. An overview of the Data Protection Act 2018, Version 2 January 2019, Information commissioner’s office. https://ico.org.uk/media/2614158/ico-introduction-to-the-data-protection-bill.pdf. Accessed 21 August 2020

  19. van der Geest, S.: Privacy from an Anthropological Perspective, Hand book of privacy

    Google Scholar 

  20. Glancy, D.J: The invention of the right to privacy. Arizona Law Rev. 21(1) (1979)

    Google Scholar 

  21. https://whatis.techtarget.com/definition/data-anonymization

  22. Kabay, M.E.: Anonymity and pseudonymity in cyberspace: deindividuation, incivility and lawlessness versus freedom and privacy. In: Annual Conference of the European Institute for Computer Anti-virus Research (EICAR), Munich, Germany (1998)

    Google Scholar 

  23. https://dataprivacymanager.net/pseudonymization-according-to-the-gdpr. Accessed on 22 August 2020

  24. https://www.privitar.com/data-privacy/de-dentification/ generalization. Accessed 25 August 2020

  25. Dwork, C., Roth, A.: The Algorithmic Foundations of Differential Privacy. Foundations and Trends® in Theoretical Computer Science, vol. 9, nos. 3–4, pp. 211–407 (2014). doi:https://doi.org/10.1561/0400000042.page-6

  26. Poosarla, S.: Privacy & Data Protection, Infosys Ltd., India, Significance of Data Privacy in Indian IT Industry-A Brief Perspective from Infosys

    Google Scholar 

  27. Rahmouni, H.B., Essefi, I., Ladeb, M.F.: Enhanced privacy governance in Health information systems through business process modelling and HL7. Procedia Comput. Sci. 164, 706–713 (2019), ISSN 1877-0509, doi:https://doi.org/10.1016/j.procs.2019.12.239

  28. Hathaliya, J.J., Tanwar, S.: An exhaustive survey on security and privacy issues in Healthcare 4.0, doi:https://doi.org/10.1016/j.comcom.2020.02.018

  29. Thimbleby, H.: Technology and the future of healthcare. J Public Health Res. 2, e28. College of Science, Swansea University, UK (2013)

    Google Scholar 

  30. Kruse, C.S. et al.: Cybersecurity in healthcare: a systematic review of modern threats and trends. Technol. Health Care 25, 1–10 (2017) IOS Press. doi: https://doi.org/10.3233/THC-161263

  31. https://www.ibm.com/downloads/cas/PLWZ76MM. Accessed 21 August 2020

  32. https://www.cms.gov/Medicare-Medicaid-Coordination/Fraud-Prevention/Medicaid-Integrity-Education/Downloads/docmatters-ehr-providerfactsheet.pdf

  33. For the Record: Protecting Electronic Health Information http://www.nap.edu/catalog/5595.html, Committee on Maintaining Privacy and Security in Health Care Applications of the National Information Infrastructure, Commission on Physical Sciences, Mathematics, and Applications, National Research Council, ISBN: 0-309-52425-3, p. 288, 6 x 9, (1997, p. 59)

  34. https://www.hhs.gov/sites/default/files/privacysummary.pdf. Accessed 21 August 2021

  35. https://www.hl7.org/. Accessed 21 August 2020

  36. Mense, A., Blobel, B.: HL7 standards and components to support implementation of the European general data protection regulation. Eur J Biomed Inf 13(1), 27–33 (2017)

    Google Scholar 

  37. Fantinato, M., Hung,, P.C.K., Jiang, Y., Roa, J., Villarreal, P., Melaisib, M., Amancioa, F.: A preliminary study of Hello Barbie in Brazil and Argentina.

    Google Scholar 

  38. Lucht, M., Domagk, S., Mohring, M.: Exer-learning games: transferring hopscotch from the schoolyard to the classroom. In Bramer, M. (ed.): IFIP AI 2010, IFIP AICT 331, pp. 25–34 (2010)

    Google Scholar 

  39. de Carvalho, L.G., Fantinato, M., Elera, M.M.: Security requirements identification and prioritization for smart toys. Electr. Commer. Res. Appl. 41, 100972 (2020). doi:https://doi.org/10.1016/j.elerap.2020.100972

  40. Shasha, S., Mahmoud, M., Mannan, M., Youssef, A.: Playing with danger: a taxonomy and evaluation of threats to smart toys. IEEE Internet Things J. 6(2) (2019)

    Google Scholar 

  41. Kävrestad, J.: Fundamentals of Digital Forensics Theory, Methods, and Real-Life Applications, eBook ISBN 978-3-319-96319-8, doi:https://doi.org/10.1007/978-3-319-96319-8

  42. Afifah, K., Perdana, R.S.: Development of search on encrypted data tools for privacy preserving in digital forensic. In: 2016 International Conference on Data and Software Engineering (ICoDSE), Denpasar, pp. 1–6 (2016) doi:https://doi.org/10.1109/ICODSE.2016.7936152

  43. Halboob, W., Mahmod, R., Udzir, N.I., Abdullah, M.T.: Privacy levels for computer forensics: toward a more efficient privacy-preserving investigation. In: International Workshop on Cyber Security and Digital Investigation (CSDI 2015), Procedia Comp. Sci. 56, pp. 370–375 (2015)

    Google Scholar 

  44. http://www.guidancesoftware.com/encase-forensic. Accessed 22 August 2020

  45. https://accessdata.com/products-services/forensic-toolkit-ftk. Accessed 22 August 2020

  46. Law, F.Y.W., et al.: Protecting digital data privacy in computer forensic examination. In: 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, pp. 1–6 (2011). doi:https://doi.org/10.1109/SADFE.2011.15

  47. International Trends In Video Surveillancepublic Transport Gets Smarter, Statistics Brief, UITP, https://Www.Uitp.Org/Sites/Default/Files/Cck-Focus-Papers-Files/1809-Statistics%20Brief%20-%20Videosurveillance-Final.Pdf. September 2018.

  48. Westin, A.F.: Science, privacy, and freedom: issues and proposals for the 1970's. Part II: balancing the conflicting demands of privacy, disclosure, and surveillance. Columbia Law Rev. 66(7), 1205–1253 (1966). JSTOR, www.jstor.org/stable/1120983. Accessed 14 August 2020

  49. https://www.internetsociety.org/wp-content/uploads/2017/08/ISOC-IoT-Overview-20151221-en.pdf

  50. Perera, C., Barhamgi, M., Bandara, A.K., et al.: Designing privacy-aware internet of things applications. Inf Sci 512, 238–257 (2020)

    Article  Google Scholar 

  51. Internet Society Policy Brief: IoT Privacy for Policymakers. https://www.internetsociety.org/policybriefs/iot-privacy-for-policymakers. Accessed 22 August 2020

  52. Always On: Privacy Implications of Microphone-Enabled Devices. https://fpf.org/wp-content/uploads/2016/04/FPF_Always_On_WP.pdf. Accessed 22 August 2020

  53. Timan, T., Mann, Z.Á. (eds.) Data protection in the era of artificial intelligence. Trends, existing solutions and recommendations for privacy-preserving technologies, BDVA (2019)

    Google Scholar 

  54. Bloem, J., van Doorn, M., Duivestein, S., van Manen, T., van Ommeren, E.: Privacy, technology and the law Big Data for everyone through good design, VINT research report 3 of 4 (2013)

    Google Scholar 

  55. Hoepman, J.-H.: Privacy Design Strategies (The Little Blue Book) (2020)

    Google Scholar 

  56. Zhang, R., Xue, R., Liu, L.: Security and privacy on blockchain. ACM Comput. Surv. 1, 1, Article 1, 35 (2019). doi:https://doi.org/10.1145/3316481

  57. Shah, P., Forester, D., Polk, D., Wardwell, L.L.P., Berberich, M., Raspé, C., Mueller, H.: Blockchain Technology: Data Privacy, Issues and Potential Mitigation Strategies, Resource ID: W-021-8235, © 2019 Thomson Reuters, https://www.davispolk.com/files/blockchain_technology _data_privacy_issues_and_potential_mitigation_strategies_w-021–8235.pdf

  58. Artificial intelligence and privacy Issues paper June 2018

    Google Scholar 

  59. The Privacy Expert’s Guide to Artificial Intelligence and Machine Learning October 2018. https://iapp.org/media/pdf/resource_center/FPF_ Artificial_Intelligence_Digital.pdf. Accessed 23 August 2020

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Shejy, G. (2022). Data Privacy and Security in Social Networks. In: Biswas, A., Patgiri, R., Biswas, B. (eds) Principles of Social Networking. Smart Innovation, Systems and Technologies, vol 246. Springer, Singapore. https://doi.org/10.1007/978-981-16-3398-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-3398-0_17

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-3397-3

  • Online ISBN: 978-981-16-3398-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics