Privacy, Trust, and Business Ethics for Mobile Business Social Networks

Privacy, Trust, and Business Ethics for Mobile Business Social Networks

István Mezgár, Sonja Grabner-Kräuter
DOI: 10.4018/978-1-4666-7476-9.ch019
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

New information and communication technologies and their integration extend possibilities for high-level human collaboration. Various groups of people can come together according to their private or business interests forming a virtual community through social networks. However, in addition to the positive effects of this technical breakthrough there are dangerous potential side effects using these high-level networked systems; the sensitive personal or business data can be misused. Therefore, privacy has an increasingly important role in social networks and is becoming a significant area related to business ethics taking into consideration the close connection between trust and privacy. The goal of this chapter is to discuss the role and relationships between trust and privacy in mobile (business) social networks and to introduce the possible types of privacy threats and countermeasures in case of online social networks. A short summary on future trends in mobile social networks is also presented.
Chapter Preview
Top

Introduction

There always has been a strong need among people to share information and knowledge. This need of information exchange initiates the communication using different media both in private and professional life. The new technologies widen the world for individuals to reach other human beings independently of where they are on the globe. Various groups of people can come together according to their private or business interests, forming a virtual community through social networks.

A social network (SN) is a social structure made of individuals (or organizations) that can be termed “nodes”, and the links that are the different types of relationships/interdependency established between nodes. In fact, a social network is based on two parameters: nodes and links. The nodes define the content of the relationships (links) according to their theme/interest/attendance (e.g. trade financial, friends, kinship, dislike, trade, sexual relations, disease transmission (epidemiology)). An important attribute of a link is the type of information exchange/communication technology (e.g. using mobile equipment). Today social networks use web-based services, so the type of communication can modify the behavior of nodes, the communication habits of SN users.

In the generation and operation of these communities cooperation and collaboration have a significant role. On the other side these new communication technologies deeply modify traditional forms of social connections, communication and cultural habits as well. These modifications can be observed in particular in hierarchies, social rules, norms, conventions, familiarity and reputation.

A very important element of human contacts is trust. In a networked society, trust is the atmosphere, the medium in which actors are moving (Castelfranchi and Yao-Hua Tan, 2001). Trust can bridge the cultural, geographical and organizational distances of members. Trust is the basis of cooperation, the accepted behavior of the human being in society. As the rate of cooperation is increasing in all fields of life, the importance of trust is evolving even faster. In this new communication environment new methods and techniques of trust building have to be developed, as the conventional rules of the face-to-face approach cannot be applied. According to different experiments the level of trust is highly influenced by the way/mode/medium of communication and by the duration of contact (Mezgár, 2005). Himmelman developed a hierarchy of partnerships (Himmelman, 1997) based on the amount of trust, time, and risk needed to establish and maintain the partnership. In Himmelman's framework, networking, coordinating, cooperating, and collaborating mean different concepts and are built on each other.

Privacy is another important element of using networks. Privacy is the right of an individual to be secure from unauthorized access, disclosure and being able to control information about oneself that is contained in different documents/files, databases or Web-pages. The degree/rate of privacy usually correlates with trust – the stronger privacy is, the higher is the level of trust.

Online Social Networks (OSNs) show an extremely quick expansion today. According to Wikipedia (Wikipedia, 2014 June) the number of members of some OSNs are the following (in millions): Facebook – 1280, MySpace - 30, Tagged - 100, Twitter - 94, LinkedIn - 200, XING – 11. The rate of connecting to OSNs by mobile (smart) phones is about an average 71% of the OSN members (Bullas, 2014) and the role of privacy is increasing as well (this is shown by providers’ announcements on developments in their privacy rules and software abilities).

The remainder of this paper has the following structure. Section one gives a short overview on online social networks (OSNs) including business social networks (BSNs), the application trends of mobile technology both in social networks (mobile social networks - MSNs), and in business social networks (mobile business social networks - MBSNs). In the second section the role of trust and privacy in the mobile business social networks is discussed and an overview is presented on privacy threats and countermeasures in OSNs. The connections between privacy and business ethics in OSN are introduced in this section. The third section summarizes the future trends and research directions in development of mobile business social networks.

Key Terms in this Chapter

Privacy: The right of an individual to be secure from unauthorized access, disclosure and being able to control information about oneself that is contained in different documents/files, databases or Web-pages.

Personal Trusted Device: The Personal Trusted Device (PTD) has to be personal, carried around with the user (owner), almost at anytime and anywhere and it is used in local (personal area networking, local area networking) and in global communications. PTD is small, cheap, battery operated, has common user interface, and is secure as a smart card. Smart Phones can fulfill the role of a Personal Trusted Devices, as mobile phones are well-placed as identity tokens, they have dynamic authentication already proven (e.g. in GSM), some of them uses biometrics instead of password and have secure communications possibilities.

Smartphone: A class of wireless phones typically used to describe handsets with many features and often a keyboard. What makes the phone “smart” is its ability to handle data, not only voice calls. Smartphones can fulfill nearly all communication requirements of the users. a) Users are always available, b) User can reach his/her friends (Internet, e-mail) independent from place and time through different wireless technologies (mobility), c) Smart phones are personal trusted devices (can fulfill the functions/demands of privacy security, trust building), d) Multimedia data (pictures and graphics) can be transferred.

BYOD (Bring Your Own Device): A communicational-organizational tendency where employee-owned devices are involved into business communication of companies. Smartphones and tablets are the most general examples but employees also take their own laptops and other mobile devices into the workplace. Employee-owned devices are sometimes prohibited by the company and company –owned devices are provided instead. In other cases, employee-owned devices are part of the parallel system known as shadow IT inside the company. The employee-owned hardware and software represents security risks to the organization if they are connected to the corporate network or access corporate data independently of whether they are supported or not. Many companies implement special BYOD policies to minimize the risk and to house newcomer technologies.

Online Social Network: An online social network (OSN) is a social structure made of individuals (or organizations) that can be called as “nodes”, and the links that are the different types of relationships/interdependency, established between nodes. In fact, a social network is based on two parameters: nodes and links. The nodes define the content of the relationships (links) according to their theme/interest/attendance (e.g. trade financial, friends, kinship, dislike, trade, sexual relations, disease transmission (epidemiology)). An important attribute of a link is the type of information exchange/communication technology (e.g. using mobile equipment). Today social networks use web-based services, so the type of communication can modify the behavior of nodes, the communication habits of OSN users.

Pervasive Computing Environment: In pervasive computing environments people and devices are mobile and use various wireless networking technologies to discover and access services and devices in their vicinity.

Biometry (synonym: biometrics): Generally, biometrics refers to the study of measurable biological characteristics. In computer security, biometric technologies are defined as automated methods of identifying or authenticating the identity of a living person based on his/her physiological (e.g. fingerprint, hand, ear, face, eye – iris/retina) or behavioral (e.g. signature, voice, keystroke) characteristic. This method of identification is preferred over current methods involving passwords and pin numbers as the person to be identified is required to be physically present at the point-of-identification, so the person of user is identified not the device as in case of PIN and password.

Location Based Services (LBS): Can be used in many fields, such as health, work, personal life, etc. The basic idea of LBSs is to identify a location of a person or object, and based on these data to discover the nearest service needed by the user (e.g. an ATM) or to find a colleague, friend or companion. Other LBSs can be location-based mobile advertising, navigation, recommending different programs in a region/city, traffic jam warnings, etc. The most promising application of mobile business social networks is the location-based service (LBS) that is a real MBSN. Privacy in LBSs is the most critical factor; there is no real good solution yet.

Encryption: The transformation of plaintext into an apparently less readable form (called cipher text) through a mathematical process. The cipher text may be read by anyone who has the key that decrypts (undoes the encryption of) the cipher text.

Trust: In the Web environment is most often defined as a belief or expectation about the website, the web vendor and/or the Internet as the trusted party or object of trust or as a behavioral intention or willingness to depend or rely on the trusted party ( Grabner-Kräuter & Kaluscha, 2003 ). In the context of OSNs other network participants, the social network site and the Web 2.0 technology can be considered as objects of trust (Grabner-Kräuter 2010 AU183: The in-text citation "Grabner-Kräuter 2010" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ). Trust in the OSN captures both characteristics of an organization (the network provider) and a technology (the Internet serving as a transmission medium for online activities, or more specifically the security services and technical solutions embedded in Web 2.0 technologies).

Mobile Business Social Network: In case the content of relationship is business oriented and the used communication technology is a type of mobile device/computer (e.g. PDA, smart phone, Netbook, Smartbook, Tablet computer) the social network can be defined as a Mobile Business Social Network (MBSN).

Complete Chapter List

Search this Book:
Reset