Data Protection and Security Issues in Social Media

Data Protection and Security Issues in Social Media

Chintan M. Bhatt
Copyright: © 2017 |Pages: 28
DOI: 10.4018/978-1-5225-1002-4.ch008
(Individual Chapters)
No Current Special Offers


Cloud Computing changes the way Information Technology (IT) is expended and oversaw, promising enhanced cost efficiencies, quickened advancement, quicker time-to-market, and the capacity to scale applications of interest (Leighton, 2009). Users have started to explore new ways to interact with each other with the omnipresent nature of Social Networks and Cloud Computing. Facebook, YouTube, Orkut, Twitter, Flickr, Google+, Four Square, Pinterest, and the likes have distorted the way the Internet (Social Cloud) is being used. However, there is an absence of comprehension of protection and security issues of online networking. The protection and security of online networking should be explored, concentrated on and portrayed from different viewpoints (PCs, social, mental and so on). It is basic to distinguish security dangers and shield protection through constant and adaptable frameworks. Subsequent to there is no intelligent limits of the social networking, it is vital to consider the issue from a worldwide viewpoint as well.
Chapter Preview


Social Networking implies the technique for relationship among people in which they make, offer, and/or trade data and thoughts in virtual groups and systems. Over each industry, numerous organizations are thinking that it's vital to have a vicinity on one or more online networking channels, for example, Facebook, XING, LinkedIn, foursquare, MySpace, YouTube, Wikipedia and Twitter. Online networking is a social association where the clients are aloof buyers, as well as have an immediate correspondence with the organization.

Social Networks contain an abundance of data. These include:

  • Date of Birth

  • Email address

  • Home address

  • Family ties

  • Pictures

Social Media is defined as “a group of Internet-based applications that build on the ideological and technological foundations of Web 2.0 and that allow the creation and exchange of user-generated content”. The potential uses of social media correspond to a wide scope of lawful issues. The main purpose of chapter is to discuss various issues regarding security and protection of data in social networking and possible solutions.



Disregarding the few points of interest that Cloud Computing carries alongside it, there are a few concerns and issues which should be fathomed before omnipresent appropriation of this processing worldwide happens. To begin with, in distributed computing, the client might not have the sort of control over his/her information or the execution of his/her applications that he/she might require, or the capacity to review or change the procedures and approaches under which he/she should work. Diverse parts of an application may be in a better place in the cloud that can adversely affect the execution of the application. Consenting to regulations might be troublesome, particularly when discussing cross-out skirt issues – it ought to likewise be noticed that the regulations still should be created to consider all parts of distributed computing. It is entirely common that checking and upkeep is not as straightforward an undertaking when contrasted with what it is really going after sitting in the Intranet. Second, the cloud clients might hazard having so as to lose information they bolted into restrictive configurations and might lose control over their information since the apparatuses for observing who is utilizing them or who can see them are not generally gave to the clients. Information misfortune is, accordingly, a possibly genuine danger in some particular arrangements. Third, it may not be anything but difficult to tailor administration level assertions (SLAs) to the particular needs of a business. Pay for downtime might be insufficient and SLAs are unrealistic to cover the corresponding harms. It is sensible to adjust the expense of ensuring inward uptime against the benefits of selecting the cloud. From the point of view of the associations, having next to zero capital venture might really have charge burdens. From the point of view of the associations, having next to zero capital venture might really have charge drawbacks. At long last, the measures are youthful and looking for taking care of the quickly changing and developing advanced of distributed computing. Thusly, one can't simply move applications to the cloud and anticipate that they will run effectively. At long last, there are idleness and execution issues following the Internet associations and the system connections might add to inertness or might put limitations on the accessible data transfer capacity.

Issue: Old Security Models vs. New Enterprise IT Models

IT security has endured with a static, area based and firm design, however venture IT has continually turned out to be more dynamic, portable, open, outward-confronting and collective. Accordingly, when clients go “versatile”, they are rebuffed by the framework since they can no more get to the same applications. Static security is less receptive to change; more perplexing and vulnerable to the presentation of human mistake. Organizations need to modify their security framework and present a character driven design which offers changing, adaptable, portable, strategy based security. This research work is documented in the work of Andreas M. Antonopoulos (2011).

Complete Chapter List

Search this Book: