Social Networking: A Retrospective into the Trust Formation and Threats

Social Networking: A Retrospective into the Trust Formation and Threats

Vladlena Benson
ISBN13: 9781466674011|ISBN10: 1466674016|EISBN13: 9781466674028
DOI: 10.4018/978-1-4666-7401-1.ch006
Cite Chapter Cite Chapter

MLA

Benson, Vladlena. "Social Networking: A Retrospective into the Trust Formation and Threats." Implications of Social Media Use in Personal and Professional Settings, edited by Vladlena Benson and Stephanie Morgan, IGI Global, 2015, pp. 118-130. https://doi.org/10.4018/978-1-4666-7401-1.ch006

APA

Benson, V. (2015). Social Networking: A Retrospective into the Trust Formation and Threats. In V. Benson & S. Morgan (Eds.), Implications of Social Media Use in Personal and Professional Settings (pp. 118-130). IGI Global. https://doi.org/10.4018/978-1-4666-7401-1.ch006

Chicago

Benson, Vladlena. "Social Networking: A Retrospective into the Trust Formation and Threats." In Implications of Social Media Use in Personal and Professional Settings, edited by Vladlena Benson and Stephanie Morgan, 118-130. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-7401-1.ch006

Export Reference

Mendeley
Favorite

Abstract

As the social technology matured in recent years, so did the threat landscape of the online medium. Fears about breaches of privacy and personal information security seem to dominate the list of concerns of social media users described in literature. Popular press continually reports cases of inadvertent and malicious information disclosure and breaches, cyberbullying, and stalking. Yet, social networking sites proliferated into all areas of human activity. The factor causing this phenomenon lies in the trusted nature of networks and the sense of trustworthiness of this easy-to-use technology. The formation of trust into social technology has attracted much attention, and this chapter offers an overview of the trust predictors in social settings. It continues with a retrospective into the threat landscape and the use of personalisation by social networking services to counter some of these threats. Further research directions are discussed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.