1959:
While there is an option to have your location off, keeping it on could be very dangerous. This is because people can see where you are as long as you are on the app, making it easier for lets say, sexual predators, to track you. Because these new apps have so many updates where your posts or snaps are out to the public, it can seem like a very unsafe place to be, especially for teenagers. Parents are usually on their kids about their social media accounts and how they post on it. Just to make sure kids aren't interacting with the wrong people, or posting inappropriate stuff on social media. With parents breathing down kids necks on social media, it invades their privacy, but at the same time it keeps them safe. Another application with privacy concerns is
Facebook. Facebook is facing a scandal due to the lack of privacy with their users.
1142:) 17:23, 4 November 2015 (UTC)I think we can deal with this problem from mainly three perspectives. First is from the company's view, what actions have those companies taken to protect their clients' information from invasion and how to make sure only the safe and trustworthy people are able to see what their clients posted. Second is from each person's view, what action is more likely to cause privacy problems and what method may a individual take to protect themselves. What should not be posted in their twitter or Facebook account and how to make friends while using social media. Actually the part about what action causes problems can put independently as a new part of the article. The last part may be how government or Law enforcement can do to reduce the chance of privacy problems.
1683:) 04:57, 1 December 2015 (UTC) Questingwayfarer, the reading part is necessary, but "This section explains how to read " seems like informal, can you change it? Also, can you include "storage of data" in this section, which also give us some information about terms of use policy. And also, thanks for the advice for API part, I will add "popular social networking API not only uses social networking services, but API for a Messenger/chat reveals that it has developed APIs that can get details such as user location, user mobile device and are in fact the latest versions deployed on their websites.", can you give me more information about this, so I can add that to the article
1023:) 18:03, 2 November 2015 (UTC) As a part of social computing coursework, I would like to work on improving this article. Like mentioned by the previous user, I agree that the topic sections need more clarity on information provided. Like the Privacy concern page just talks about the Twitter privacy for users and does not really address the concern of Privacy. There are many other such Privacy concerns which are partly highlighted in the Potential Danger section. I would like to work on improving the Privacy Concern section and include the following in the article - Loopholes in data breach, negligence of ignoring terms and conditions in social networks.
1252:
reading privacy policy, what policy already exist, how are people doing with these policies and what to look for in the policies. Third is develop a section about the current status of users' awareness about the privacy risks. Besides all of above, we will also try to improve the overall structure of the article, add some images to help illustrating the knowledge and also updating the privacy concerns section with more content. The references of the articles seem to be out of date since most of them were published 4 to 5 years ago, so we would find newer version or alternatives.
1553:, I was going through the article when I found some mistakes in your part User awareness. I changed some spelling error about Carnegie Mellon University and a small mistake near the reference label at second paragraph. The reference at the last paragraph is not in its right form so I deleted it and added some returns in the third paragraph. Please allow me to suggest you to recheck your references in second and third paragraph, I'm not sure if they are linked to the right paper. By the way, all these alters have been made directly on the article.
398:
380:
169:
71:
151:
53:
81:
1991:"my new role as Forbes’ chief content officer, providing a unified reporting structure for every editorial platform... One focus: the Forbes contributor network, our key digital driver since we introduced it in 2010. In bringing in hundreds of expert voices, both paid and unpaid, to the Forbes audience, we were able to create a viable model in a field with too few of them, that greatly increased how much and what we could cover, while also allowing us to expand our full-time newsroom."
262:
1168:) 21:45, 4 November 2015 (UTC) ~~Yundananagel Thank you for sharing. agree with the points. We can think of finding any papers or how existing sites looks at the three perspectives you have shared. Also we have to include existing privacy policy and presentation of it to a user and also how user interprets it. User awareness and interpretation are very crucial and I found some information and a paper on this.
934:
keeping users “hooked.” • Role of the social media user and understanding what exactly you are signing up for • While legalities have been discussed it might be interesting to see how any (if they exist) pursuits of social media rights activism turned out. • Certainly the angle of increased awareness rather than increases in breaches of privacy would be an interesting point to explore. • Employment:
2182:
862:
809:
760:
711:
658:
605:
552:
515:
981:
appropriate. For example, the tile "privacy concerns' has little connection to its content. Also, the structure can be improved. Like the storage part and the concerns parts, we may set up new category "Causes" and "Concerns" and put these parts inside. Last but not least, I believe we can find more about concerns and add something about how to avoid privacy problem on the internet.
22:
473:
1504:) 14:38, 29 November 2015 (UTC)Hi, all, I edited the article. Those above "contents" is too long, so I create a "causation" part to contain this. Also, I added some information about ways to access data and how companies benefits from data. If you think it is not proper to organize content in this order or you find any mistakes, don't hesitate to tell me.
609:
670:
1967:
monday. Facebook says more than 70 million of the affected users are in the U.S., though there are over a million each in the
Philippines, Indonesia and the UK." Mark Zuckerberg, CEO and founder of Facebook, stated that the data collected was from in-app purchases such as quizzes and games, as said in the Washington Post.
1587:, that was pretty good point you have mentioned. While, popular social networking API not only uses social networking services, but API for a Messenger/chat reveals that it has developed APIs that can get details such as user location, user mobile device and are in fact the latest versions deployed on their websites.
1986:
On 2020-03-02, @Estrockis added text and @GermanJoe removed it, criticizing tone and the Forbes contributor as source. I agree with
Estrockis the info is valid, the CPO source is valid (and its underlying research study), and I see no reason Forbes contributors are not valid: they are vetted and paid
1958:
Social media is evolving faster than many thought it would. With new updates in many of the popular social media apps such as, Instagram, Twitter, and
Snapchat, it is becoming harder and harder to keep things private. Snapchat has a new update that shows all your friends on a map, including yourself.
1392:
Lack of user awareness is due to following: 1) People's disregard of privacy risk due to trust in privacy and protection offered in social networking sites. 2) Availability of User's personal details to thirdparty tools/applications. 3) APIs and
Frameworks also enable any user, who has fair amount of
1199:
First, some paragraphs can be divided into two parts. Second, there are lots of experiments in this article, but some of them don’t have appropriate citations and not in the right section. Third, about the content above “storage of data”, it is supposed to give readers a brief knowledge about privacy
1053:
This section explains how to read the
Privacy statement in terms and conditions while signing up for any social network Most people skip this section while signing up and seldom understand the what they are buying into. But spending a few extra minutes reading through can just help tremendously Some
1912:
Hello I am in a college class that is directed toward how teens use social media, and had to pick and article that I found interesting. Teens today do not understand some of the privacy concerns that comes along with using social media, or the causes it can have. I plan to contribute to this article
1660:
I have updated the potential dangers section in many places and also including a section for location update. Along with that I have also created a new main section for reading a privacy statement with what a user needs to look for. Please go through these changes and let me know if its appropriate.
1626:
I just erase the title of storage of data and put the content of this part to the how to read terms part because they appear to be relevant. By the way, I think there are more we can do about the privacy concerns part. I mean the first company part refer to concerns towards these companies while the
1433:
According to our discussion, Questingwayfarer will cover the user awareness section, right? And
Yundananagel would like to cover method to counter attack privacy problems, and Blueberry snow will do privacy policy part. I will work on how companies or institutes make use of uses’ information. If you
1308:
In regard to our decision changes and points given by users, I felt it would be appropriate to have the following content in
Potential Dangers. Please add your comments if you wish to include more under this section. Potential Dangers of Social Networking services : 1) Identity theft 2) Revealing
1057:
What to look for in the
Privacy Policy? 1) who owns the data that a user posts? 2) What happens to the data when account is closed? 3)How does the changes in the Privacy policy notified to its users? 4)Location and Language of privacy policy 5) Will the social account be completely erased when a
933:
Possible perspectives to add in: • Ethical responsibilities of companies, platform and user in involvement and social media activity • Transitions and blending of purpose; that there can be a safety reason for breaches of support, but it transforms into a business purpose and soon one of control and
1102:
User is the source and target of information typically on a Social networking. There are
Privacy policies and usage by users. User are definitely getting more aware. The extent to which user is aware on privacy is an important question. Is the user aware of privacy? Does the user know what is scope
1597:) 15:19, 30 November 2015 (UTC) I read your draft Blueberry snow. I think you need to explain the data access a little further. The introduction with the trust aspect is a great start. The points you have mentioned about the APIs and personal information can be explained further w.r.t data access.
1966:
Facebook users are in a rage because of the leak of their private information and posts on the Cambridge Analytica. Washington Post says that "The 87 million users who might have had their data shared with Cambridge Analytica were supposed to get a detailed message on their news feeds starting on
980:
I'm a student from social computing class at ischool at University of Pittsburgh. I think this is a fairly good article with rather good words. I think one can work more on the images. The whole page has no images to help illustrating the knowledge. Besides, some secondary titles don't seem to be
2140:
probably also needs a split and there's many layers of overlap. e.g. The preteen and sexual predators sections in this article overlap with the risk for child safety section in that article. Hence, there should be a broader approach (and a different name) to the split on the "Potential dangers"
1251:
So, based on our discussion, we'll improve the article from three major perspective. First is adding new section 'Methods to counter attack privacy problems', which will be separate into 3 parts: individual approaches, companies approaches and government policies. Second is adding content about
1894:
874:
821:
772:
1309:
location, privacy of updates and information 3) Potential hacking into your system 4) Being harassed by strangers 5) Lack of age verification mechanisms 6) Easy access by predators and cyberbullies 7) Excessive or addictive access to networks 8) Job background check
1200:
in social networking services. For example, in this article, interpret how to identify the privacy in social network firstly. Then show how the aggregation of information can be used to identify a specific person, finally, interpret how it intrudes users’ privacy.
1466:
Hi Lanuordiy. Thanks for starting this thread to get the assignments clear. I would be handling the Potential Dangers and Privacy Statement policy. I think I hope the rest of them also reply confirming their roles so that we can go ahead and make the changes.
2031:. I appreciate that the edit was a good-faith contribution and left the user some more information on their user talkpage, but the content in question clearly needs more work before it could be added. It's not just 1-2 minor flaws that could be fixed easily.
1770:
Thanks for sharing. I see few betterment may be required in the points you ahve updated such as when you say "Encrypt devices", do you want to elaborate if it is user point of view or developer's and also what form of encryption is applicable if its a user.
556:
1208:(2) How those companies and institutional make use of users’ data. So we can conclude “privacy concerns” and “institutional concerns” in this section. Actually, we can show some positive aspects when institutional or companies deal with users’ data.
2237:
Is cited with source 100 (arXiv:1410.1348), which is a paper about finding employment and place of residence information of certain university graduates on LinkedIn. As stated in the paper, this information is registered on LinkedIn by the user.
1935:
Quinn, Kelly. "Why We Share: A Uses and Gratifications Approach to Privacy Regulation in Social Media Use." Journal of Broadcasting & Electronic Media, vol. 60, no. 1, Mar. 2016, pp. 61-86. EBSCOhost, doi:10.1080/08838151.2015.1127245.
280:
1744:
now. I didn't actually find anything worth putting in the article about what the companies and governments did to protect people's privacy. It's basically what they did to invade people's privacy. I can use some advice on references and
1434:
change your mind, and want to do another section, be free to tell us. And after finishing our own part, I hope we can revise each other’s part or add anything relevant. Then we can improve the structure, grammar mistakes and so on.
519:
1913:
by editing the Privacy Concerns and Causes section with information I find by researching this topic. I also plan to do small fixes like adding citations and sentences in other sections that seem to have a context gaps.
2194:
2022:
for the current consensus about Forbes contributor articles, and I doubt that a PR announcement from the Forbes content manager will change this stance. Guidance about encyclopedic language can be found at
951:
Bertot, John Carlo, Paul T. Jaeger, and Derek Hansen. "The impact of polices on government social media usage: Issues, challenges, and recommendations." Government information quarterly 29.1 (2012): 30-40.
1231:
I agree, there could be some paragraphs that could be divided. There also needs to be more information added about "privacy". Also, where is the evidence that studies show that there are privacy concerns?
961:
McNeilly, Sam, Luke Hutton, and Tristan Henderson. "Understanding ethical concerns in social media privacy studies." Proceedings of the ACM CSCW Workshop on Measuring Networked Social Privacy. 2013.
1852:
I just wanted to point out in the history portion of this article there are no academic sources, perhaps looking at more archives on privacy on social networking sites like Facebook. Please see
2233:
Employers have often been found to hire individuals or companies to search deep into the SNSs user database to find "less than pleasant" information regarding applicants during the review process.
1615:
Thank you. Actually I dint plan to update data access part as I was just sharing that the Lanuordiy has written so well. BUt I can definitely edit and elaborate further to Data access section.
1062:
These are some the important question a user should be generally aware of before signing up. The article needs to provide better insights on these questions to create awareness for the user.
723:
1338:
Questingwayfarer,Thanks for listing the subtopics under potential dangers. Can you explain more about the subtopics above? how will you deal with the original potential danger section?
2202:
2318:
445:
2303:
209:
451:
349:
1802:
sorry for the delay, I noticed you have updated user awareness as a sub-section, I think subheading is not necessary, they are all about people concern, what's your opinion?--
215:
955:
Ellison, Nicole B., et al. "Negotiating privacy concerns and social capital needs in a social media environment." Privacy online. Springer Berlin Heidelberg, 2011. 19-32.
2003:
I don't have a problem with Estrockis' tone, and the solution is to correct it, or point out issues here in the Talk page, not delete meaningful, well-sourced, content.
311:
2098:
2078:
2065:
489:
2241:
This is not "less than pleasant" information "deep into the user database"; it's literally surface level information provided by the user to be shared with others.
1396:
User can be any of the following roles in social networking: 1) A person, 2) Celebrity/popular person such as actor, musician, performers 3) Organization/company
421:
2308:
499:
298:
1997:
185:
2288:
1939:
Jennifer, Jolly and TODAY Special for USA. "How to Protect Your Kids' Privacy and Track Their Time .." USA Today, n.d. EBSCOhost, 199.245.164.25:2048/login?url=
325:
294:
127:
1278:) 02:27, 8 November 2015 (UTC) Thank you all for coordinating on deciding the decision changes. I agree with the changes proposed and willing to work on them.
2071:
1697:
blueberry, about your draft, some mistakes about citation should be corrected. If it is necessary, you can also combine people concern part with your draft.
909:
Hello everyone, I am a student from CSUEB and I will be working on this article as part of a class project. Here are some sources I have considered adding:
133:
2313:
336:
1940:
2298:
1876:
417:
408:
385:
886:
837:
784:
735:
686:
633:
580:
527:
176:
156:
2260:
main iska Facebook ID ka link bhul gai hun number kho Gaya please kaise bigad Gaye iska Deepak Kumar ka naam se mere ko Bata dijiye number bata do
2293:
1371:
103:
2261:
1836:
1787:
1715:
Please elaborate and share details. I dint understand what you are saying/which parts of article you are commenting about from my section.
1119:
287:
2142:
1058:
user deletes the account. 6)Where and how can a user complain in case of any breach 7)For how long is the personal information stored?
2159:
I went ahead and split the section from the article, although the lede is very short and the section on the former page is also short.
2283:
1365:
I agree withchanges suggested by Questingwayfarer and YUdanangel and Laude. A reference for points I suggested can be found here:
94:
58:
1081:
Hello, I am part of social computing class, from University of Pittsburgh and as part of the same, i am working on this topic.
958:
McKee, Rebecca. "Ethical issues in using social media for health and health care research." Health Policy 110.2 (2013): 298-301.
1998:
https://www.forbes.com/sites/randalllane/2018/02/14/why-forbes-is-investing-big-money-in-its-contributor-network/#4b625b032a3e
1753:) 07:27, 2 December 2015 (UTC) blue berry, I think your draft are good but you may want to check some of your spellings again.
1730:: Can you please elaborate and share details on your comment? I dint understand which parts of citation you are referring to?
997:) 16:02, 4 November 2015 (UTC)Okay, so I will work on adding content involving how to shield oneself from this privacy crimes.
305:
274:
33:
2150:
2126:
608:
This article is or was the subject of a Wiki Education Foundation-supported course assignment. Further details are available
555:
This article is or was the subject of a Wiki Education Foundation-supported course assignment. Further details are available
518:
This article is or was the subject of a Wiki Education Foundation-supported course assignment. Further details are available
2104:
2084:
1941:
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=J0E032797580617&site=ehost-live&scope=site
1820:
No problem. The reason I have put it on is because of the reason this topic is sidelined. SO, will let it be there.
2269:
2250:
2218:
2167:
2154:
2130:
2040:
2012:
1976:
1922:
1906:
1865:
1840:
1811:
1791:
1762:
1706:
1692:
1670:
1654:
1636:
1606:
1562:
1513:
1486:
1463:
1445:
1424:
1405:
1389:
1362:
1335:
1321:
1305:
1287:
1261:
1241:
1191:
1177:
1151:
1123:
1092:
1071:
1050:
1032:
1006:
970:
943:
898:
849:
796:
747:
698:
645:
592:
539:
2008:
1902:
1666:
1650:
1602:
1594:
1474:
1459:
1317:
1301:
1283:
1275:
1067:
1046:
1028:
1020:
2146:
2137:
2122:
1627:
second institutional part are concerns from these institutions. I haven't figure out the best way to improve it.
2265:
1832:
1783:
1401:
1385:
1358:
1173:
1165:
1115:
1088:
39:
913:
Senthil Kumar N*, Saravanakumar K, Deepa K, On Privacy and Security in Social Media – A Comprehensive Study.
1972:
397:
379:
1824:
1775:
1372:
http://www.isaca.org/Journal/archives/2012/Volume-6/Pages/Lack-of-Privacy-Awareness-in-Social-Networks.aspx
1107:
2214:
2089:
1758:
1750:
1737:
1632:
1558:
1546:
1482:
1257:
1147:
1139:
1002:
994:
986:
2004:
1898:
1719:
1662:
1646:
1619:
1612:
1598:
1590:
1573:
1530:
1470:
1455:
1313:
1297:
1279:
1271:
1063:
1042:
1024:
1016:
184:
on Knowledge (XXG). If you would like to participate, please visit the project page, where you can join
102:
on Knowledge (XXG). If you would like to participate, please visit the project page, where you can join
2246:
2052:
168:
150:
80:
70:
52:
2114:
1918:
492:
on 17 August 2016. For the contribution history and old versions of the redirected page, please see
485:
21:
2036:
1828:
1807:
1799:
1779:
1702:
1688:
1680:
1550:
1509:
1501:
1441:
1420:
1397:
1381:
1354:
1343:
1331:
1222:
1187:
1169:
1161:
1111:
1084:
617:
613:
2242:
1932:
Boyd, Danah. It's Complicated : The Social Lives of Networked Teens. Yale University Press, 2014.
2185:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
2165:
1968:
1861:
966:
939:
894:
865:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
845:
812:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
792:
763:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
743:
714:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
694:
661:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
641:
588:
568:
535:
1393:
knowledge to extract the user's data. 4) Cross-site forgery and possible other website threats
2210:
2198:
1767:
1754:
1746:
1733:
1628:
1554:
1542:
1534:
1478:
1368:
1253:
1143:
1135:
998:
990:
982:
413:
2028:
2024:
318:
878:
625:
621:
572:
564:
2019:
1914:
1740:) 07:27, 2 December 2015 (UTC)Hi everyone, sorry about the delay. My part is available at
1237:
921:
Alex Koohang, Social media sites privacy concerns: Empirical validation of an instrument.
678:
560:
86:
1216:
After we decide the contents, we can reassign the original sections to this new contents.
2032:
1817:
1803:
1727:
1723:
1712:
1698:
1684:
1676:
1623:
1584:
1577:
1538:
1505:
1497:
1477:) 02:48, 17 November 2015 (UTC) Hi everyone. I'm aware of my job in counter attack part
1437:
1416:
1339:
1327:
1218:
1183:
829:
727:
261:
2277:
2160:
1857:
962:
935:
890:
841:
788:
776:
739:
690:
674:
637:
584:
531:
1204:
Adding several sections is a good idea. We can arrange the sections in this order.
825:
181:
1524:
416:
and mass surveillance-related topics. If you would like to participate, visit the
1994:"effective immediately, every individual contributor will be on a paid contract."
1987:
by Forbes, similar to any magazine's online version. Randall Lane wrote in 2018,
1195:
I'm a student from social computing class at ischool at University of Pittsburgh.
2181:
861:
808:
759:
710:
657:
604:
551:
514:
1233:
76:
1312:
These are the subtopics under potential dangers which I would like to cover.
2051:
Article should be split. It is too long; currently 88k characters in size.
1741:
915:
School of Information Technology and Engineering, VIT University, Vellore.
2109:
99:
2057:
60k probably divided. This article conflates multiple topics currently.
340:
343:
to FA; Tag all articles you find with {{WikiProject Internet culture}}
2145:(or 'Risks' / 'Potential dangers', to name a few more suggestions).
1877:
Index of Articles Relating to Terms of Service and Privacy Policies
1879:, which I created in early August. That index helps readers find:
1054:
applications readily collect data like your data of birth while.
1875:
This week there's discussion about whether to delete or keep the
929:
Additional Topics of Discussion (with regard to ethical dilemma)
976:
Improving clarity and method to counter attack privacy problems
467:
15:
2056:
100k characters should almost certainly be divided, and : -->
1928:
Privacy Concerns with Social Networking Services Bibliography
1430:
hi, all, I want to make sure the tasks is clear to everyone.
1369:
https://cs.uwaterloo.ca/~uhengart/publications/passat09.pdf
1206:(1) Current status of users' awareness about the privacy.
2225:
Source 100 in "Invasive privacy agreements" not relevant
1948:
Facebook users still waiting on privacy scandal notices
1726:: Updated in People concern section as a sub-section. --
1103:
of a personal photo/video view on a social networking?
98:, a collaborative effort to improve the coverage of the
494:
480:
250:
245:
240:
235:
1950:. Washington Post, April 9, 2018. Washingtonpost.com
1893:
Wikipedians are welcome to improve the index, and/or
412:, which aims to improve Knowledge (XXG)'s coverage of
1038:
Reading the Privacy statement in terms and conditions
856:
Wiki Education Foundation-supported course assignment
803:
Wiki Education Foundation-supported course assignment
754:
Wiki Education Foundation-supported course assignment
705:
Wiki Education Foundation-supported course assignment
652:
Wiki Education Foundation-supported course assignment
599:
Wiki Education Foundation-supported course assignment
546:
Wiki Education Foundation-supported course assignment
509:
Wiki Education Foundation-supported course assignment
1854:
The Political Economy of Facebook by Christian Fuchs
1525:
https://en.wikipedia.org/User:Blueberry_snow/sandbox
350:
Category:Internet culture articles needing attention
180:, a collaborative effort to improve the coverage of
1889:articles which cover privacy at specific companies
450:This article has not yet received a rating on the
214:This article has not yet received a rating on the
132:This article has not yet received a rating on the
1886:articles on different aspects of privacy policies
1519:User awareness Draft posted: Inviting your views!
1293:Potential Dangers in Privacy of Social Networking
1098:Awareness of User on Privacy in Social Networking
1012:Updating the Privacy Concern section of this page
312:Category:Internet culture articles needing images
490:Privacy concerns with social networking services
404:Privacy concerns with social networking services
1742:https://en.wikipedia.org/User_talk:Yundananagel
1212:(4) Methods to counter attack privacy problems.
923:Online Journal of Applied Knowledge Management.
2176:Wiki Education assignment: Digital Citizenship
2319:Unknown-importance Mass surveillance articles
1848:Information explaining what social networking
430:Knowledge (XXG):WikiProject Mass surveillance
8:
2304:Unknown-importance Internet culture articles
2072:Potential dangers of social networking sites
1580:Thank you for the updates on your changes.
281:View all requested internet culture articles
194:Knowledge (XXG):WikiProject Internet culture
1897:if it should be deleted or kept available.
498:; for the discussion at that location, see
337:Category:Internet self-classification codes
374:
269:Here are some tasks awaiting attention:
223:
145:
47:
2090:Privacy section at Criticisms of Facebook
887:Template:Dashboard.wikiedu.org assignment
838:Template:Dashboard.wikiedu.org assignment
785:Template:Dashboard.wikiedu.org assignment
736:Template:Dashboard.wikiedu.org assignment
687:Template:Dashboard.wikiedu.org assignment
634:Template:Dashboard.wikiedu.org assignment
581:Template:Dashboard.wikiedu.org assignment
528:Template:Dashboard.wikiedu.org assignment
481:Privacy issues of social networking sites
1871:Delete or keep an index to this subject?
1661:If you have suggestions please mention.
1131:Method to counter attack privacy crimes
885:Above undated message substituted from
836:Above undated message substituted from
783:Above undated message substituted from
734:Above undated message substituted from
685:Above undated message substituted from
632:Above undated message substituted from
579:Above undated message substituted from
526:Above undated message substituted from
376:
147:
49:
19:
2088:(merged with a split of the very long
433:Template:WikiProject Mass surveillance
2309:WikiProject Internet culture articles
197:Template:WikiProject Internet culture
7:
2289:Unknown-importance Internet articles
174:This article is within the scope of
112:Knowledge (XXG):WikiProject Internet
92:This article is within the scope of
2143:Issues with social networking sites
1549:) 23:26, 2 December 2015 (UTC)Hi,--
227:WikiProject Internet culture To-do:
38:It is of interest to the following
2314:C-Class Mass surveillance articles
2190:
2186:
1982:Section on responses to criticisms
870:
866:
817:
813:
768:
764:
719:
715:
666:
662:
14:
2299:C-Class Internet culture articles
2193:. Further details are available
2180:
2138:Social networking service#Issues
873:. Further details are available
860:
820:. Further details are available
807:
771:. Further details are available
758:
722:. Further details are available
709:
669:. Further details are available
656:
603:
550:
513:
471:
396:
378:
260:
167:
149:
79:
69:
51:
20:
2110:Controversy section on Snapchat
1583:W.r.t data access methods by --
989:) 21:12, 1 November 2015 (UTC)
949:Additional Sources to Consider:
2219:22:05, 12 September 2022 (UTC)
1907:17:23, 13 September 2017 (UTC)
1451:Clarity on assignment of roles
1:
2294:WikiProject Internet articles
2209:— Assignment last updated by
1607:15:19, 30 November 2015 (UTC)
1514:14:38, 29 November 2015 (UTC)
1487:02:19, 18 November 2015 (UTC)
1464:02:48, 17 November 2015 (UTC)
1446:22:16, 15 November 2015 (UTC)
1425:22:16, 15 November 2015 (UTC)
971:17:24, 16 February 2017 (UTC)
944:17:27, 16 February 2017 (UTC)
409:WikiProject Mass surveillance
188:and see a list of open tasks.
115:Template:WikiProject Internet
106:and see a list of open tasks.
2105:Privacy concerns of Snapchat
2085:Privacy concerns of Facebook
1841:02:25, 3 December 2015 (UTC)
1812:01:08, 3 December 2015 (UTC)
1792:02:48, 3 December 2015 (UTC)
1763:19:01, 2 December 2015 (UTC)
1707:04:57, 1 December 2015 (UTC)
1693:04:57, 1 December 2015 (UTC)
1671:04:01, 1 December 2015 (UTC)
1655:04:01, 1 December 2015 (UTC)
1637:19:55, 2 December 2015 (UTC)
1563:23:26, 2 December 2015 (UTC)
1406:05:28, 8 November 2015 (UTC)
1390:05:28, 8 November 2015 (UTC)
1363:05:08, 8 November 2015 (UTC)
1336:03:49, 8 November 2015 (UTC)
1322:02:50, 8 November 2015 (UTC)
1306:02:50, 8 November 2015 (UTC)
1288:02:27, 8 November 2015 (UTC)
1262:18:10, 6 November 2015 (UTC)
1192:06:01, 7 November 2015 (UTC)
1178:21:45, 4 November 2015 (UTC)
1152:17:23, 4 November 2015 (UTC)
1124:22:27, 3 November 2015 (UTC)
1093:01:14, 3 November 2015 (UTC)
1072:18:18, 2 November 2015 (UTC)
1051:18:18, 2 November 2015 (UTC)
1033:18:03, 2 November 2015 (UTC)
1007:16:02, 4 November 2015 (UTC)
899:02:43, 18 January 2022 (UTC)
850:02:43, 18 January 2022 (UTC)
797:02:43, 18 January 2022 (UTC)
748:02:43, 18 January 2022 (UTC)
699:02:43, 18 January 2022 (UTC)
646:02:43, 18 January 2022 (UTC)
593:02:43, 18 January 2022 (UTC)
540:02:43, 18 January 2022 (UTC)
177:WikiProject Internet culture
1866:17:48, 3 October 2016 (UTC)
2335:
2270:18:01, 10 March 2024 (UTC)
1977:13:57, 29 March 2018 (UTC)
1242:16:32, 25 March 2018 (UTC)
452:project's importance scale
436:Mass surveillance articles
216:project's importance scale
134:project's importance scale
2284:C-Class Internet articles
2251:19:31, 11 July 2023 (UTC)
2168:02:51, 26 June 2020 (UTC)
2041:17:23, 3 March 2020 (UTC)
2013:21:32, 2 March 2020 (UTC)
1923:22:33, 9 March 2018 (UTC)
449:
391:
222:
213:
200:Internet culture articles
162:
131:
64:
46:
2229:The following sentence:
2155:17:14, 4 June 2020 (UTC)
2131:16:48, 4 June 2020 (UTC)
2055:suggests articles : -->
2047:Article should be split
522:. Student editor(s): [
420:, or contribute to the
406:is within the scope of
2141:section. Perhaps just
1210:(3) Potential dangers.
324:All stubs are located
28:This article is rated
2197:. Student editor(s):
877:. Student editor(s):
824:. Student editor(s):
775:. Student editor(s):
726:. Student editor(s):
673:. Student editor(s):
612:. Student editor(s):
559:. Student editor(s):
478:The contents of the
293:Pick an article from
32:on Knowledge (XXG)'s
2147:ProcrasinatingReader
2136:Actually, seeing as
2123:ProcrasinatingReader
2115:Concerns of Snapchat
2108:(or, along with the
1642:Completed my updates
1523:Draft available at:
95:WikiProject Internet
1247:Decision of changes
2195:on the course page
1946:Ortutay, Barbara.
875:on the course page
828:. Peer reviewers:
822:on the course page
773:on the course page
724:on the course page
677:. Peer reviewers:
671:on the course page
610:on the course page
571:. Peer reviewers:
557:on the course page
520:on the course page
34:content assessment
2066:Potential dangers
1844:
1827:comment added by
1795:
1778:comment added by
1127:
1110:comment added by
1077:Self-Introduction
905:Self-Introduction
506:
505:
466:
465:
462:
461:
458:
457:
427:Mass surveillance
414:mass surveillance
386:Mass surveillance
373:
372:
369:
368:
365:
364:
361:
360:
339:(!?); Try to get
144:
143:
140:
139:
118:Internet articles
2326:
2221:
2203:article contribs
2192:
2188:
2184:
2163:
2005:Numbersinstitute
1899:Numbersinstitute
1843:
1821:
1794:
1772:
1720:Questingwayfarer
1663:Questingwayfarer
1647:Questingwayfarer
1620:Questingwayfarer
1613:Questingwayfarer
1599:Questingwayfarer
1591:Questingwayfarer
1574:Questingwayfarer
1531:Questingwayfarer
1471:Questingwayfarer
1456:Questingwayfarer
1314:Questingwayfarer
1298:Questingwayfarer
1280:Questingwayfarer
1272:Questingwayfarer
1267:Decision changes
1157:Some more to add
1126:
1104:
1064:Questingwayfarer
1043:Questingwayfarer
1025:Questingwayfarer
1017:Questingwayfarer
901:
872:
868:
864:
852:
819:
815:
811:
799:
770:
766:
762:
750:
721:
717:
713:
701:
668:
667:12 December 2018
664:
660:
648:
607:
595:
554:
542:
517:
497:
475:
474:
468:
438:
437:
434:
431:
428:
400:
393:
392:
382:
375:
275:Article requests
264:
257:
256:
224:
202:
201:
198:
195:
192:
191:Internet culture
182:internet culture
171:
164:
163:
157:Internet culture
153:
146:
120:
119:
116:
113:
110:
89:
84:
83:
73:
66:
65:
55:
48:
31:
25:
24:
16:
2334:
2333:
2329:
2328:
2327:
2325:
2324:
2323:
2274:
2273:
2262:110.235.217.179
2258:
2227:
2208:
2191:16 October 2022
2178:
2161:
2049:
1984:
1956:
1930:
1873:
1850:
1822:
1773:
1644:
1570:
1521:
1494:
1492:progress so far
1453:
1413:
1379:
1377:User Awareness:
1352:
1295:
1269:
1249:
1159:
1133:
1105:
1100:
1079:
1040:
1014:
978:
931:
917:December 2015.
907:
884:
858:
835:
814:14 January 2020
805:
782:
756:
733:
707:
684:
654:
631:
601:
578:
548:
525:
511:
493:
472:
435:
432:
429:
426:
425:
357:
255:
199:
196:
193:
190:
189:
117:
114:
111:
108:
107:
87:Internet portal
85:
78:
29:
12:
11:
5:
2332:
2330:
2322:
2321:
2316:
2311:
2306:
2301:
2296:
2291:
2286:
2276:
2275:
2257:
2254:
2226:
2223:
2187:23 August 2022
2177:
2174:
2173:
2172:
2171:
2170:
2120:
2119:
2095:
2075:
2048:
2045:
2044:
2043:
2001:
2000:
1995:
1992:
1983:
1980:
1955:
1952:
1929:
1926:
1911:
1891:
1890:
1887:
1884:
1872:
1869:
1849:
1846:
1829:Blueberry snow
1800:Blueberry snow
1780:Blueberry snow
1643:
1640:
1569:
1566:
1551:Blueberry snow
1541:
1520:
1517:
1493:
1490:
1452:
1449:
1435:
1432:
1431:
1427:
1412:
1409:
1398:Blueberry snow
1382:Blueberry snow
1378:
1375:
1355:Blueberry snow
1351:
1348:
1294:
1291:
1268:
1265:
1248:
1245:
1228:
1217:
1213:
1211:
1209:
1207:
1205:
1201:
1196:
1194:
1181:
1180:
1170:Blueberry snow
1162:Blueberry snow
1158:
1155:
1132:
1129:
1112:Blueberry snow
1099:
1096:
1085:Blueberry snow
1078:
1075:
1061:
1039:
1036:
1013:
1010:
977:
974:
930:
927:
920:
912:
906:
903:
871:14 August 2020
857:
854:
804:
801:
755:
752:
706:
703:
663:5 October 2018
653:
650:
618:Anna jasmine33
614:Jocelyngarroyo
600:
597:
547:
544:
510:
507:
504:
503:
476:
464:
463:
460:
459:
456:
455:
448:
442:
441:
439:
401:
389:
388:
383:
371:
370:
367:
366:
363:
362:
359:
358:
356:
355:
354:
353:
344:
328:
314:
301:
283:
268:
266:
265:
254:
253:
248:
243:
238:
232:
229:
228:
220:
219:
212:
206:
205:
203:
186:the discussion
172:
160:
159:
154:
142:
141:
138:
137:
130:
124:
123:
121:
104:the discussion
91:
90:
74:
62:
61:
56:
44:
43:
37:
26:
13:
10:
9:
6:
4:
3:
2:
2331:
2320:
2317:
2315:
2312:
2310:
2307:
2305:
2302:
2300:
2297:
2295:
2292:
2290:
2287:
2285:
2282:
2281:
2279:
2272:
2271:
2267:
2263:
2255:
2253:
2252:
2248:
2244:
2239:
2235:
2234:
2230:
2224:
2222:
2220:
2216:
2212:
2206:
2204:
2200:
2196:
2183:
2175:
2169:
2166:
2164:
2158:
2157:
2156:
2152:
2148:
2144:
2139:
2135:
2134:
2133:
2132:
2128:
2124:
2117:
2116:
2111:
2107:
2106:
2101:
2100:
2096:
2094:
2091:
2087:
2086:
2081:
2080:
2076:
2074:
2073:
2068:
2067:
2063:
2062:
2061:
2058:
2054:
2046:
2042:
2038:
2034:
2030:
2026:
2021:
2017:
2016:
2015:
2014:
2010:
2006:
1999:
1996:
1993:
1990:
1989:
1988:
1981:
1979:
1978:
1974:
1970:
1969:Lastinfreeman
1965:
1960:
1953:
1951:
1949:
1944:
1942:
1937:
1933:
1927:
1925:
1924:
1920:
1916:
1909:
1908:
1904:
1900:
1896:
1888:
1885:
1882:
1881:
1880:
1878:
1870:
1868:
1867:
1863:
1859:
1855:
1847:
1845:
1842:
1838:
1834:
1830:
1826:
1819:
1814:
1813:
1809:
1805:
1801:
1796:
1793:
1789:
1785:
1781:
1777:
1769:
1765:
1764:
1760:
1756:
1752:
1748:
1743:
1739:
1735:
1731:
1729:
1725:
1721:
1716:
1714:
1709:
1708:
1704:
1700:
1695:
1694:
1690:
1686:
1682:
1678:
1673:
1672:
1668:
1664:
1658:
1656:
1652:
1648:
1641:
1639:
1638:
1634:
1630:
1625:
1621:
1616:
1614:
1609:
1608:
1604:
1600:
1596:
1592:
1588:
1586:
1581:
1579:
1575:
1567:
1565:
1564:
1560:
1556:
1552:
1548:
1544:
1540:
1536:
1532:
1527:
1526:
1518:
1516:
1515:
1511:
1507:
1503:
1499:
1491:
1489:
1488:
1484:
1480:
1476:
1472:
1468:
1465:
1461:
1457:
1450:
1448:
1447:
1443:
1439:
1428:
1426:
1422:
1418:
1410:
1408:
1407:
1403:
1399:
1394:
1391:
1387:
1383:
1376:
1374:
1373:
1370:
1366:
1364:
1360:
1356:
1349:
1347:
1345:
1341:
1337:
1333:
1329:
1324:
1323:
1319:
1315:
1310:
1307:
1303:
1299:
1292:
1290:
1289:
1285:
1281:
1277:
1273:
1266:
1264:
1263:
1259:
1255:
1246:
1244:
1243:
1239:
1235:
1229:
1226:
1224:
1220:
1214:
1202:
1197:
1193:
1189:
1185:
1179:
1175:
1171:
1167:
1163:
1156:
1154:
1153:
1149:
1145:
1141:
1137:
1130:
1128:
1125:
1121:
1117:
1113:
1109:
1097:
1095:
1094:
1090:
1086:
1082:
1076:
1074:
1073:
1069:
1065:
1059:
1055:
1052:
1048:
1044:
1037:
1035:
1034:
1030:
1026:
1022:
1018:
1011:
1009:
1008:
1004:
1000:
996:
992:
988:
984:
975:
973:
972:
968:
964:
959:
956:
953:
950:
946:
945:
941:
937:
928:
926:
924:
918:
916:
910:
904:
902:
900:
896:
892:
888:
882:
880:
876:
863:
855:
853:
851:
847:
843:
839:
833:
831:
827:
823:
810:
802:
800:
798:
794:
790:
786:
780:
778:
774:
761:
753:
751:
749:
745:
741:
737:
731:
729:
725:
716:18 March 2019
712:
704:
702:
700:
696:
692:
688:
682:
680:
676:
672:
659:
651:
649:
647:
643:
639:
635:
629:
627:
623:
619:
615:
611:
606:
598:
596:
594:
590:
586:
582:
576:
574:
570:
569:Lastinfreeman
566:
562:
558:
553:
545:
543:
541:
537:
533:
529:
523:
521:
516:
508:
501:
500:its talk page
496:
491:
487:
483:
482:
477:
470:
469:
453:
447:
444:
443:
440:
423:
419:
415:
411:
410:
405:
402:
399:
395:
394:
390:
387:
384:
381:
377:
352:
351:
346:
345:
342:
338:
335:
333:
329:
327:
323:
321:
320:
315:
313:
310:
308:
307:
302:
300:
296:
292:
290:
289:
284:
282:
279:
277:
276:
271:
270:
267:
263:
259:
258:
252:
249:
247:
244:
242:
239:
237:
234:
233:
231:
230:
226:
225:
221:
217:
211:
208:
207:
204:
187:
183:
179:
178:
173:
170:
166:
165:
161:
158:
155:
152:
148:
135:
129:
126:
125:
122:
105:
101:
97:
96:
88:
82:
77:
75:
72:
68:
67:
63:
60:
57:
54:
50:
45:
41:
35:
27:
23:
18:
17:
2259:
2256:Deepakumrgil
2240:
2236:
2232:
2231:
2228:
2211:LeanneGagnon
2207:
2199:LeanneGagnon
2179:
2121:
2113:
2112:, a broader
2103:
2097:
2092:
2083:
2077:
2070:
2064:
2059:
2050:
2002:
1985:
1963:
1961:
1957:
1947:
1945:
1938:
1934:
1931:
1910:
1892:
1883:this article
1874:
1853:
1851:
1823:— Preceding
1815:
1797:
1774:— Preceding
1768:Yundananagel
1766:
1755:Yundananagel
1747:Yundananagel
1734:Yundananagel
1732:
1717:
1710:
1696:
1674:
1659:
1645:
1629:Yundananagel
1617:
1610:
1589:
1582:
1571:
1555:Yundananagel
1543:Yundananagel
1535:Yundananagel
1528:
1522:
1495:
1479:Yundananagel
1469:
1454:
1429:
1414:
1395:
1380:
1367:
1353:
1325:
1311:
1296:
1270:
1254:Yundananagel
1250:
1230:
1227:
1215:
1203:
1198:
1160:
1144:Yundananagel
1136:Yundananagel
1134:
1106:— Preceding
1101:
1083:
1080:
1060:
1056:
1041:
1015:
999:Yundananagel
991:Yundananagel
983:Yundananagel
979:
960:
957:
954:
948:
947:
932:
922:
919:
914:
911:
908:
883:
859:
834:
818:9 March 2020
806:
781:
769:12 July 2019
757:
732:
708:
683:
655:
630:
602:
577:
549:
524:
512:
479:
418:project page
407:
403:
347:
331:
330:
317:
316:
304:
303:
286:
285:
273:
272:
175:
93:
40:WikiProjects
2060:I propose:
2053:WP:SIZERULE
2018:Please see
879:BenKeebaugh
867:6 July 2020
765:20 May 2019
720:10 May 2019
626:Jorge CSUEB
622:Megancollom
573:Brian.klein
565:Addisonronk
495:its history
2278:Categories
1915:Kamryngood
679:Ianbohn761
561:Kamryngood
484:page were
422:discussion
2033:GermanJoe
1818:Lanuordiy
1804:Lanuordiy
1745:spellings
1728:Lanuordiy
1724:Lanuordiy
1713:Lanuordiy
1699:Lanuordiy
1685:Lanuordiy
1677:Lanuordiy
1657:Hi All,
1624:Lanuordiy
1585:Lanuordiy
1578:Lanuordiy
1539:Lanuordiy
1506:Lanuordiy
1498:Lanuordiy
1438:Lanuordiy
1417:Lanuordiy
1340:Lanuordiy
1328:Lanuordiy
1219:Lanuordiy
1184:Lanuordiy
830:Kcruz0311
728:Eurasia18
348:See also
2162:Buffaboy
2099:Snapchat
2079:Facebook
1964:Facebook
1858:Alleiyat
1837:contribs
1825:unsigned
1788:contribs
1776:unsigned
1572:Hello --
1120:contribs
1108:unsigned
963:JasperRS
936:JasperRS
891:PrimeBOT
842:PrimeBOT
789:PrimeBOT
777:Erkunkel
740:PrimeBOT
691:PrimeBOT
675:Lpwarner
638:PrimeBOT
585:PrimeBOT
532:PrimeBOT
109:Internet
100:Internet
59:Internet
2243:Narilth
2029:WP:TONE
2025:WP:NPOV
1895:discuss
1350:Summary
826:Kaduoos
341:YouTube
241:history
30:C-class
2102:-: -->
2082:-: -->
2069:-: -->
2020:WP:RSP
925:2017.
486:merged
288:Expand
36:scale.
1954:Draft
1568:Views
1411:tasks
1234:BFE68
488:into
332:Other
319:Stubs
306:Photo
251:purge
246:watch
2266:talk
2247:talk
2215:talk
2189:and
2151:talk
2127:talk
2037:talk
2027:and
2009:talk
1973:talk
1919:talk
1903:talk
1862:talk
1833:talk
1808:talk
1784:talk
1759:talk
1751:talk
1738:talk
1722:, --
1703:talk
1689:talk
1681:talk
1667:talk
1651:talk
1633:talk
1618:Hi--
1603:talk
1595:talk
1559:talk
1547:talk
1510:talk
1502:talk
1483:talk
1475:talk
1460:talk
1442:talk
1421:talk
1402:talk
1386:talk
1359:talk
1344:talk
1332:talk
1318:talk
1302:talk
1284:talk
1276:talk
1258:talk
1238:talk
1223:talk
1188:talk
1174:talk
1166:talk
1148:talk
1140:talk
1116:talk
1089:talk
1068:talk
1047:talk
1029:talk
1021:talk
1003:talk
995:talk
987:talk
967:talk
940:talk
895:talk
869:and
846:talk
816:and
793:talk
767:and
744:talk
718:and
695:talk
665:and
642:talk
589:talk
536:talk
326:here
299:here
295:here
236:edit
2205:).
889:by
840:by
787:by
738:by
689:by
636:by
583:by
530:by
446:???
297:or
210:???
128:???
2280::
2268:)
2249:)
2217:)
2153:)
2129:)
2039:)
2011:)
1975:)
1943:.
1921:)
1905:)
1864:)
1856:--
1839:)
1835:•
1816:--
1810:)
1798:--
1790:)
1786:•
1761:)
1718:--
1711:--
1705:)
1691:)
1675:--
1669:)
1653:)
1635:)
1622:--
1611:--
1605:)
1576:--
1561:)
1537:--
1533:--
1529:--
1512:)
1496:--
1485:)
1462:)
1444:)
1436:--
1423:)
1415:--
1404:)
1388:)
1361:)
1346:)
1334:)
1326:--
1320:)
1304:)
1286:)
1260:)
1240:)
1225:)
1190:)
1182:--
1176:)
1150:)
1122:)
1118:•
1091:)
1070:)
1049:)
1031:)
1005:)
969:)
942:)
897:)
881:.
848:)
832:.
795:)
779:.
746:)
730:.
697:)
681:.
644:)
628:.
624:,
620:,
616:,
591:)
575:.
567:,
563:,
538:)
2264:(
2245:(
2213:(
2201:(
2149:(
2125:(
2118:)
2093:)
2035:(
2007:(
1971:(
1962:-
1917:(
1901:(
1860:(
1831:(
1806:(
1782:(
1757:(
1749:(
1736:(
1701:(
1687:(
1679:(
1665:(
1649:(
1631:(
1601:(
1593:(
1557:(
1545:(
1508:(
1500:(
1481:(
1473:(
1458:(
1440:(
1419:(
1400:(
1384:(
1357:(
1342:(
1330:(
1316:(
1300:(
1282:(
1274:(
1256:(
1236:(
1221:(
1186:(
1172:(
1164:(
1146:(
1138:(
1114:(
1087:(
1066:(
1045:(
1027:(
1019:(
1001:(
993:(
985:(
965:(
938:(
893:(
844:(
791:(
742:(
693:(
640:(
587:(
534:(
502:.
454:.
424:.
334::
322::
309::
291::
278::
218:.
136:.
42::
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.