Knowledge (XXG)

Talk:Privacy concerns with social networking services

Source đź“ť

1959:
While there is an option to have your location off, keeping it on could be very dangerous. This is because people can see where you are as long as you are on the app, making it easier for lets say, sexual predators, to track you. Because these new apps have so many updates where your posts or snaps are out to the public, it can seem like a very unsafe place to be, especially for teenagers. Parents are usually on their kids about their social media accounts and how they post on it. Just to make sure kids aren't interacting with the wrong people, or posting inappropriate stuff on social media. With parents breathing down kids necks on social media, it invades their privacy, but at the same time it keeps them safe. Another application with privacy concerns is Facebook. Facebook is facing a scandal due to the lack of privacy with their users.
1142:) 17:23, 4 November 2015 (UTC)I think we can deal with this problem from mainly three perspectives. First is from the company's view, what actions have those companies taken to protect their clients' information from invasion and how to make sure only the safe and trustworthy people are able to see what their clients posted. Second is from each person's view, what action is more likely to cause privacy problems and what method may a individual take to protect themselves. What should not be posted in their twitter or Facebook account and how to make friends while using social media. Actually the part about what action causes problems can put independently as a new part of the article. The last part may be how government or Law enforcement can do to reduce the chance of privacy problems. 1683:) 04:57, 1 December 2015 (UTC) Questingwayfarer, the reading part is necessary, but "This section explains how to read " seems like informal, can you change it? Also, can you include "storage of data" in this section, which also give us some information about terms of use policy. And also, thanks for the advice for API part, I will add "popular social networking API not only uses social networking services, but API for a Messenger/chat reveals that it has developed APIs that can get details such as user location, user mobile device and are in fact the latest versions deployed on their websites.", can you give me more information about this, so I can add that to the article 1023:) 18:03, 2 November 2015 (UTC) As a part of social computing coursework, I would like to work on improving this article. Like mentioned by the previous user, I agree that the topic sections need more clarity on information provided. Like the Privacy concern page just talks about the Twitter privacy for users and does not really address the concern of Privacy. There are many other such Privacy concerns which are partly highlighted in the Potential Danger section. I would like to work on improving the Privacy Concern section and include the following in the article - Loopholes in data breach, negligence of ignoring terms and conditions in social networks. 1252:
reading privacy policy, what policy already exist, how are people doing with these policies and what to look for in the policies. Third is develop a section about the current status of users' awareness about the privacy risks. Besides all of above, we will also try to improve the overall structure of the article, add some images to help illustrating the knowledge and also updating the privacy concerns section with more content. The references of the articles seem to be out of date since most of them were published 4 to 5 years ago, so we would find newer version or alternatives.
1553:, I was going through the article when I found some mistakes in your part User awareness. I changed some spelling error about Carnegie Mellon University and a small mistake near the reference label at second paragraph. The reference at the last paragraph is not in its right form so I deleted it and added some returns in the third paragraph. Please allow me to suggest you to recheck your references in second and third paragraph, I'm not sure if they are linked to the right paper. By the way, all these alters have been made directly on the article. 398: 380: 169: 71: 151: 53: 81: 1991:"my new role as Forbes’ chief content officer, providing a unified reporting structure for every editorial platform... One focus: the Forbes contributor network, our key digital driver since we introduced it in 2010. In bringing in hundreds of expert voices, both paid and unpaid, to the Forbes audience, we were able to create a viable model in a field with too few of them, that greatly increased how much and what we could cover, while also allowing us to expand our full-time newsroom." 262: 1168:) 21:45, 4 November 2015 (UTC) ~~Yundananagel Thank you for sharing. agree with the points. We can think of finding any papers or how existing sites looks at the three perspectives you have shared. Also we have to include existing privacy policy and presentation of it to a user and also how user interprets it. User awareness and interpretation are very crucial and I found some information and a paper on this. 934:
keeping users “hooked.” • Role of the social media user and understanding what exactly you are signing up for • While legalities have been discussed it might be interesting to see how any (if they exist) pursuits of social media rights activism turned out. • Certainly the angle of increased awareness rather than increases in breaches of privacy would be an interesting point to explore. • Employment:
2182: 862: 809: 760: 711: 658: 605: 552: 515: 981:
appropriate. For example, the tile "privacy concerns' has little connection to its content. Also, the structure can be improved. Like the storage part and the concerns parts, we may set up new category "Causes" and "Concerns" and put these parts inside. Last but not least, I believe we can find more about concerns and add something about how to avoid privacy problem on the internet.
22: 473: 1504:) 14:38, 29 November 2015 (UTC)Hi, all, I edited the article. Those above "contents" is too long, so I create a "causation" part to contain this. Also, I added some information about ways to access data and how companies benefits from data. If you think it is not proper to organize content in this order or you find any mistakes, don't hesitate to tell me. 609: 670: 1967:
monday. Facebook says more than 70 million of the affected users are in the U.S., though there are over a million each in the Philippines, Indonesia and the UK." Mark Zuckerberg, CEO and founder of Facebook, stated that the data collected was from in-app purchases such as quizzes and games, as said in the Washington Post.
1587:, that was pretty good point you have mentioned. While, popular social networking API not only uses social networking services, but API for a Messenger/chat reveals that it has developed APIs that can get details such as user location, user mobile device and are in fact the latest versions deployed on their websites. 1986:
On 2020-03-02, @Estrockis added text and @GermanJoe removed it, criticizing tone and the Forbes contributor as source. I agree with Estrockis the info is valid, the CPO source is valid (and its underlying research study), and I see no reason Forbes contributors are not valid: they are vetted and paid
1958:
Social media is evolving faster than many thought it would. With new updates in many of the popular social media apps such as, Instagram, Twitter, and Snapchat, it is becoming harder and harder to keep things private. Snapchat has a new update that shows all your friends on a map, including yourself.
1392:
Lack of user awareness is due to following: 1) People's disregard of privacy risk due to trust in privacy and protection offered in social networking sites. 2) Availability of User's personal details to thirdparty tools/applications. 3) APIs and Frameworks also enable any user, who has fair amount of
1199:
First, some paragraphs can be divided into two parts. Second, there are lots of experiments in this article, but some of them don’t have appropriate citations and not in the right section. Third, about the content above “storage of data”, it is supposed to give readers a brief knowledge about privacy
1053:
This section explains how to read the Privacy statement in terms and conditions while signing up for any social network Most people skip this section while signing up and seldom understand the what they are buying into. But spending a few extra minutes reading through can just help tremendously Some
1912:
Hello I am in a college class that is directed toward how teens use social media, and had to pick and article that I found interesting. Teens today do not understand some of the privacy concerns that comes along with using social media, or the causes it can have. I plan to contribute to this article
1660:
I have updated the potential dangers section in many places and also including a section for location update. Along with that I have also created a new main section for reading a privacy statement with what a user needs to look for. Please go through these changes and let me know if its appropriate.
1626:
I just erase the title of storage of data and put the content of this part to the how to read terms part because they appear to be relevant. By the way, I think there are more we can do about the privacy concerns part. I mean the first company part refer to concerns towards these companies while the
1433:
According to our discussion, Questingwayfarer will cover the user awareness section, right? And Yundananagel would like to cover method to counter attack privacy problems, and Blueberry snow will do privacy policy part. I will work on how companies or institutes make use of uses’ information. If you
1308:
In regard to our decision changes and points given by users, I felt it would be appropriate to have the following content in Potential Dangers. Please add your comments if you wish to include more under this section. Potential Dangers of Social Networking services : 1) Identity theft 2) Revealing
1057:
What to look for in the Privacy Policy? 1) who owns the data that a user posts? 2) What happens to the data when account is closed? 3)How does the changes in the Privacy policy notified to its users? 4)Location and Language of privacy policy 5) Will the social account be completely erased when a
933:
Possible perspectives to add in: • Ethical responsibilities of companies, platform and user in involvement and social media activity • Transitions and blending of purpose; that there can be a safety reason for breaches of support, but it transforms into a business purpose and soon one of control and
1102:
User is the source and target of information typically on a Social networking. There are Privacy policies and usage by users. User are definitely getting more aware. The extent to which user is aware on privacy is an important question. Is the user aware of privacy? Does the user know what is scope
1597:) 15:19, 30 November 2015 (UTC) I read your draft Blueberry snow. I think you need to explain the data access a little further. The introduction with the trust aspect is a great start. The points you have mentioned about the APIs and personal information can be explained further w.r.t data access. 1966:
Facebook users are in a rage because of the leak of their private information and posts on the Cambridge Analytica. Washington Post says that "The 87 million users who might have had their data shared with Cambridge Analytica were supposed to get a detailed message on their news feeds starting on
980:
I'm a student from social computing class at ischool at University of Pittsburgh. I think this is a fairly good article with rather good words. I think one can work more on the images. The whole page has no images to help illustrating the knowledge. Besides, some secondary titles don't seem to be
2140:
probably also needs a split and there's many layers of overlap. e.g. The preteen and sexual predators sections in this article overlap with the risk for child safety section in that article. Hence, there should be a broader approach (and a different name) to the split on the "Potential dangers"
1251:
So, based on our discussion, we'll improve the article from three major perspective. First is adding new section 'Methods to counter attack privacy problems', which will be separate into 3 parts: individual approaches, companies approaches and government policies. Second is adding content about
1894: 874: 821: 772: 1309:
location, privacy of updates and information 3) Potential hacking into your system 4) Being harassed by strangers 5) Lack of age verification mechanisms 6) Easy access by predators and cyberbullies 7) Excessive or addictive access to networks 8) Job background check
1200:
in social networking services. For example, in this article, interpret how to identify the privacy in social network firstly. Then show how the aggregation of information can be used to identify a specific person, finally, interpret how it intrudes users’ privacy.
1466:
Hi Lanuordiy. Thanks for starting this thread to get the assignments clear. I would be handling the Potential Dangers and Privacy Statement policy. I think I hope the rest of them also reply confirming their roles so that we can go ahead and make the changes.
2031:. I appreciate that the edit was a good-faith contribution and left the user some more information on their user talkpage, but the content in question clearly needs more work before it could be added. It's not just 1-2 minor flaws that could be fixed easily. 1770:
Thanks for sharing. I see few betterment may be required in the points you ahve updated such as when you say "Encrypt devices", do you want to elaborate if it is user point of view or developer's and also what form of encryption is applicable if its a user.
556: 1208:(2) How those companies and institutional make use of users’ data. So we can conclude “privacy concerns” and “institutional concerns” in this section. Actually, we can show some positive aspects when institutional or companies deal with users’ data. 2237:
Is cited with source 100 (arXiv:1410.1348), which is a paper about finding employment and place of residence information of certain university graduates on LinkedIn. As stated in the paper, this information is registered on LinkedIn by the user.
1935:
Quinn, Kelly. "Why We Share: A Uses and Gratifications Approach to Privacy Regulation in Social Media Use." Journal of Broadcasting & Electronic Media, vol. 60, no. 1, Mar. 2016, pp. 61-86. EBSCOhost, doi:10.1080/08838151.2015.1127245.
280: 1744:
now. I didn't actually find anything worth putting in the article about what the companies and governments did to protect people's privacy. It's basically what they did to invade people's privacy. I can use some advice on references and
1434:
change your mind, and want to do another section, be free to tell us. And after finishing our own part, I hope we can revise each other’s part or add anything relevant. Then we can improve the structure, grammar mistakes and so on.
519: 1913:
by editing the Privacy Concerns and Causes section with information I find by researching this topic. I also plan to do small fixes like adding citations and sentences in other sections that seem to have a context gaps.
2194: 2022:
for the current consensus about Forbes contributor articles, and I doubt that a PR announcement from the Forbes content manager will change this stance. Guidance about encyclopedic language can be found at
951:
Bertot, John Carlo, Paul T. Jaeger, and Derek Hansen. "The impact of polices on government social media usage: Issues, challenges, and recommendations." Government information quarterly 29.1 (2012): 30-40.
1231:
I agree, there could be some paragraphs that could be divided. There also needs to be more information added about "privacy". Also, where is the evidence that studies show that there are privacy concerns?
961:
McNeilly, Sam, Luke Hutton, and Tristan Henderson. "Understanding ethical concerns in social media privacy studies." Proceedings of the ACM CSCW Workshop on Measuring Networked Social Privacy. 2013.
1852:
I just wanted to point out in the history portion of this article there are no academic sources, perhaps looking at more archives on privacy on social networking sites like Facebook. Please see
2233:
Employers have often been found to hire individuals or companies to search deep into the SNSs user database to find "less than pleasant" information regarding applicants during the review process.
1615:
Thank you. Actually I dint plan to update data access part as I was just sharing that the Lanuordiy has written so well. BUt I can definitely edit and elaborate further to Data access section.
1062:
These are some the important question a user should be generally aware of before signing up. The article needs to provide better insights on these questions to create awareness for the user.
723: 1338:
Questingwayfarer,Thanks for listing the subtopics under potential dangers. Can you explain more about the subtopics above? how will you deal with the original potential danger section?
2202: 2318: 445: 2303: 209: 451: 349: 1802:
sorry for the delay, I noticed you have updated user awareness as a sub-section, I think subheading is not necessary, they are all about people concern, what's your opinion?--
215: 955:
Ellison, Nicole B., et al. "Negotiating privacy concerns and social capital needs in a social media environment." Privacy online. Springer Berlin Heidelberg, 2011. 19-32.
2003:
I don't have a problem with Estrockis' tone, and the solution is to correct it, or point out issues here in the Talk page, not delete meaningful, well-sourced, content.
311: 2098: 2078: 2065: 489: 2241:
This is not "less than pleasant" information "deep into the user database"; it's literally surface level information provided by the user to be shared with others.
1396:
User can be any of the following roles in social networking: 1) A person, 2) Celebrity/popular person such as actor, musician, performers 3) Organization/company
421: 2308: 499: 298: 1997: 185: 2288: 1939:
Jennifer, Jolly and TODAY Special for USA. "How to Protect Your Kids' Privacy and Track Their Time .." USA Today, n.d. EBSCOhost, 199.245.164.25:2048/login?url=
325: 294: 127: 1278:) 02:27, 8 November 2015 (UTC) Thank you all for coordinating on deciding the decision changes. I agree with the changes proposed and willing to work on them. 2071: 1697:
blueberry, about your draft, some mistakes about citation should be corrected. If it is necessary, you can also combine people concern part with your draft.
909:
Hello everyone, I am a student from CSUEB and I will be working on this article as part of a class project. Here are some sources I have considered adding:
133: 2313: 336: 1940: 2298: 1876: 417: 408: 385: 886: 837: 784: 735: 686: 633: 580: 527: 176: 156: 2260:
main iska Facebook ID ka link bhul gai hun number kho Gaya please kaise bigad Gaye iska Deepak Kumar ka naam se mere ko Bata dijiye number bata do
2293: 1371: 103: 2261: 1836: 1787: 1715:
Please elaborate and share details. I dint understand what you are saying/which parts of article you are commenting about from my section.
1119: 287: 2142: 1058:
user deletes the account. 6)Where and how can a user complain in case of any breach 7)For how long is the personal information stored?
2159:
I went ahead and split the section from the article, although the lede is very short and the section on the former page is also short.
2283: 1365:
I agree withchanges suggested by Questingwayfarer and YUdanangel and Laude. A reference for points I suggested can be found here:
94: 58: 1081:
Hello, I am part of social computing class, from University of Pittsburgh and as part of the same, i am working on this topic.
958:
McKee, Rebecca. "Ethical issues in using social media for health and health care research." Health Policy 110.2 (2013): 298-301.
1998:
https://www.forbes.com/sites/randalllane/2018/02/14/why-forbes-is-investing-big-money-in-its-contributor-network/#4b625b032a3e
1753:) 07:27, 2 December 2015 (UTC) blue berry, I think your draft are good but you may want to check some of your spellings again. 1730:: Can you please elaborate and share details on your comment? I dint understand which parts of citation you are referring to? 997:) 16:02, 4 November 2015 (UTC)Okay, so I will work on adding content involving how to shield oneself from this privacy crimes. 305: 274: 33: 2150: 2126: 608:
This article is or was the subject of a Wiki Education Foundation-supported course assignment. Further details are available
555:
This article is or was the subject of a Wiki Education Foundation-supported course assignment. Further details are available
518:
This article is or was the subject of a Wiki Education Foundation-supported course assignment. Further details are available
2104: 2084: 1941:
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=J0E032797580617&site=ehost-live&scope=site
1820:
No problem. The reason I have put it on is because of the reason this topic is sidelined. SO, will let it be there.
2269: 2250: 2218: 2167: 2154: 2130: 2040: 2012: 1976: 1922: 1906: 1865: 1840: 1811: 1791: 1762: 1706: 1692: 1670: 1654: 1636: 1606: 1562: 1513: 1486: 1463: 1445: 1424: 1405: 1389: 1362: 1335: 1321: 1305: 1287: 1261: 1241: 1191: 1177: 1151: 1123: 1092: 1071: 1050: 1032: 1006: 970: 943: 898: 849: 796: 747: 698: 645: 592: 539: 2008: 1902: 1666: 1650: 1602: 1594: 1474: 1459: 1317: 1301: 1283: 1275: 1067: 1046: 1028: 1020: 2146: 2137: 2122: 1627:
second institutional part are concerns from these institutions. I haven't figure out the best way to improve it.
2265: 1832: 1783: 1401: 1385: 1358: 1173: 1165: 1115: 1088: 39: 913:
Senthil Kumar N*, Saravanakumar K, Deepa K, On Privacy and Security in Social Media – A Comprehensive Study.
1972: 397: 379: 1824: 1775: 1372:
http://www.isaca.org/Journal/archives/2012/Volume-6/Pages/Lack-of-Privacy-Awareness-in-Social-Networks.aspx
1107: 2214: 2089: 1758: 1750: 1737: 1632: 1558: 1546: 1482: 1257: 1147: 1139: 1002: 994: 986: 2004: 1898: 1719: 1662: 1646: 1619: 1612: 1598: 1590: 1573: 1530: 1470: 1455: 1313: 1297: 1279: 1271: 1063: 1042: 1024: 1016: 184:
on Knowledge (XXG). If you would like to participate, please visit the project page, where you can join
102:
on Knowledge (XXG). If you would like to participate, please visit the project page, where you can join
2246: 2052: 168: 150: 80: 70: 52: 2114: 1918: 492:
on 17 August 2016. For the contribution history and old versions of the redirected page, please see
485: 21: 2036: 1828: 1807: 1799: 1779: 1702: 1688: 1680: 1550: 1509: 1501: 1441: 1420: 1397: 1381: 1354: 1343: 1331: 1222: 1187: 1169: 1161: 1111: 1084: 617: 613: 2242: 1932:
Boyd, Danah. It's Complicated : The Social Lives of Networked Teens. Yale University Press, 2014.
2185:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
2165: 1968: 1861: 966: 939: 894: 865:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
845: 812:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
792: 763:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
743: 714:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
694: 661:
This article was the subject of a Wiki Education Foundation-supported course assignment, between
641: 588: 568: 535: 1393:
knowledge to extract the user's data. 4) Cross-site forgery and possible other website threats
2210: 2198: 1767: 1754: 1746: 1733: 1628: 1554: 1542: 1534: 1478: 1368: 1253: 1143: 1135: 998: 990: 982: 413: 2028: 2024: 318: 878: 625: 621: 572: 564: 2019: 1914: 1740:) 07:27, 2 December 2015 (UTC)Hi everyone, sorry about the delay. My part is available at 1237: 921:
Alex Koohang, Social media sites privacy concerns: Empirical validation of an instrument.
678: 560: 86: 1216:
After we decide the contents, we can reassign the original sections to this new contents.
2032: 1817: 1803: 1727: 1723: 1712: 1698: 1684: 1676: 1623: 1584: 1577: 1538: 1505: 1497: 1477:) 02:48, 17 November 2015 (UTC) Hi everyone. I'm aware of my job in counter attack part 1437: 1416: 1339: 1327: 1218: 1183: 829: 727: 261: 2277: 2160: 1857: 962: 935: 890: 841: 788: 776: 739: 690: 674: 637: 584: 531: 1204:
Adding several sections is a good idea. We can arrange the sections in this order.
825: 181: 1524: 416:
and mass surveillance-related topics. If you would like to participate, visit the
1994:"effective immediately, every individual contributor will be on a paid contract." 1987:
by Forbes, similar to any magazine's online version. Randall Lane wrote in 2018,
1195:
I'm a student from social computing class at ischool at University of Pittsburgh.
2181: 861: 808: 759: 710: 657: 604: 551: 514: 1233: 76: 1312:
These are the subtopics under potential dangers which I would like to cover.
2051:
Article should be split. It is too long; currently 88k characters in size.
1741: 915:
School of Information Technology and Engineering, VIT University, Vellore.
2109: 99: 2057:
60k probably divided. This article conflates multiple topics currently.
340: 343:
to FA; Tag all articles you find with {{WikiProject Internet culture}}
2145:(or 'Risks' / 'Potential dangers', to name a few more suggestions). 1877:
Index of Articles Relating to Terms of Service and Privacy Policies
1879:, which I created in early August. That index helps readers find: 1054:
applications readily collect data like your data of birth while.
1875:
This week there's discussion about whether to delete or keep the
929:
Additional Topics of Discussion (with regard to ethical dilemma)
976:
Improving clarity and method to counter attack privacy problems
467: 15: 2056:
100k characters should almost certainly be divided, and : -->
1928:
Privacy Concerns with Social Networking Services Bibliography
1430:
hi, all, I want to make sure the tasks is clear to everyone.
1369:
https://cs.uwaterloo.ca/~uhengart/publications/passat09.pdf
1206:(1) Current status of users' awareness about the privacy. 2225:
Source 100 in "Invasive privacy agreements" not relevant
1948:
Facebook users still waiting on privacy scandal notices
1726:: Updated in People concern section as a sub-section. -- 1103:
of a personal photo/video view on a social networking?
98:, a collaborative effort to improve the coverage of the 494: 480: 250: 245: 240: 235: 1950:. Washington Post, April 9, 2018. Washingtonpost.com 1893:
Wikipedians are welcome to improve the index, and/or
412:, which aims to improve Knowledge (XXG)'s coverage of 1038:
Reading the Privacy statement in terms and conditions
856:
Wiki Education Foundation-supported course assignment
803:
Wiki Education Foundation-supported course assignment
754:
Wiki Education Foundation-supported course assignment
705:
Wiki Education Foundation-supported course assignment
652:
Wiki Education Foundation-supported course assignment
599:
Wiki Education Foundation-supported course assignment
546:
Wiki Education Foundation-supported course assignment
509:
Wiki Education Foundation-supported course assignment
1854:
The Political Economy of Facebook by Christian Fuchs
1525:
https://en.wikipedia.org/User:Blueberry_snow/sandbox
350:
Category:Internet culture articles needing attention
180:, a collaborative effort to improve the coverage of 1889:articles which cover privacy at specific companies 450:This article has not yet received a rating on the 214:This article has not yet received a rating on the 132:This article has not yet received a rating on the 1886:articles on different aspects of privacy policies 1519:User awareness Draft posted: Inviting your views! 1293:Potential Dangers in Privacy of Social Networking 1098:Awareness of User on Privacy in Social Networking 1012:Updating the Privacy Concern section of this page 312:Category:Internet culture articles needing images 490:Privacy concerns with social networking services 404:Privacy concerns with social networking services 1742:https://en.wikipedia.org/User_talk:Yundananagel 1212:(4) Methods to counter attack privacy problems. 923:Online Journal of Applied Knowledge Management. 2176:Wiki Education assignment: Digital Citizenship 2319:Unknown-importance Mass surveillance articles 1848:Information explaining what social networking 430:Knowledge (XXG):WikiProject Mass surveillance 8: 2304:Unknown-importance Internet culture articles 2072:Potential dangers of social networking sites 1580:Thank you for the updates on your changes. 281:View all requested internet culture articles 194:Knowledge (XXG):WikiProject Internet culture 1897:if it should be deleted or kept available. 498:; for the discussion at that location, see 337:Category:Internet self-classification codes 374: 269:Here are some tasks awaiting attention: 223: 145: 47: 2090:Privacy section at Criticisms of Facebook 887:Template:Dashboard.wikiedu.org assignment 838:Template:Dashboard.wikiedu.org assignment 785:Template:Dashboard.wikiedu.org assignment 736:Template:Dashboard.wikiedu.org assignment 687:Template:Dashboard.wikiedu.org assignment 634:Template:Dashboard.wikiedu.org assignment 581:Template:Dashboard.wikiedu.org assignment 528:Template:Dashboard.wikiedu.org assignment 481:Privacy issues of social networking sites 1871:Delete or keep an index to this subject? 1661:If you have suggestions please mention. 1131:Method to counter attack privacy crimes 885:Above undated message substituted from 836:Above undated message substituted from 783:Above undated message substituted from 734:Above undated message substituted from 685:Above undated message substituted from 632:Above undated message substituted from 579:Above undated message substituted from 526:Above undated message substituted from 376: 147: 49: 19: 2088:(merged with a split of the very long 433:Template:WikiProject Mass surveillance 2309:WikiProject Internet culture articles 197:Template:WikiProject Internet culture 7: 2289:Unknown-importance Internet articles 174:This article is within the scope of 112:Knowledge (XXG):WikiProject Internet 92:This article is within the scope of 2143:Issues with social networking sites 1549:) 23:26, 2 December 2015 (UTC)Hi,-- 227:WikiProject Internet culture To-do: 38:It is of interest to the following 2314:C-Class Mass surveillance articles 2190: 2186: 1982:Section on responses to criticisms 870: 866: 817: 813: 768: 764: 719: 715: 666: 662: 14: 2299:C-Class Internet culture articles 2193:. Further details are available 2180: 2138:Social networking service#Issues 873:. Further details are available 860: 820:. Further details are available 807: 771:. Further details are available 758: 722:. Further details are available 709: 669:. Further details are available 656: 603: 550: 513: 471: 396: 378: 260: 167: 149: 79: 69: 51: 20: 2110:Controversy section on Snapchat 1583:W.r.t data access methods by -- 989:) 21:12, 1 November 2015 (UTC) 949:Additional Sources to Consider: 2219:22:05, 12 September 2022 (UTC) 1907:17:23, 13 September 2017 (UTC) 1451:Clarity on assignment of roles 1: 2294:WikiProject Internet articles 2209:— Assignment last updated by 1607:15:19, 30 November 2015 (UTC) 1514:14:38, 29 November 2015 (UTC) 1487:02:19, 18 November 2015 (UTC) 1464:02:48, 17 November 2015 (UTC) 1446:22:16, 15 November 2015 (UTC) 1425:22:16, 15 November 2015 (UTC) 971:17:24, 16 February 2017 (UTC) 944:17:27, 16 February 2017 (UTC) 409:WikiProject Mass surveillance 188:and see a list of open tasks. 115:Template:WikiProject Internet 106:and see a list of open tasks. 2105:Privacy concerns of Snapchat 2085:Privacy concerns of Facebook 1841:02:25, 3 December 2015 (UTC) 1812:01:08, 3 December 2015 (UTC) 1792:02:48, 3 December 2015 (UTC) 1763:19:01, 2 December 2015 (UTC) 1707:04:57, 1 December 2015 (UTC) 1693:04:57, 1 December 2015 (UTC) 1671:04:01, 1 December 2015 (UTC) 1655:04:01, 1 December 2015 (UTC) 1637:19:55, 2 December 2015 (UTC) 1563:23:26, 2 December 2015 (UTC) 1406:05:28, 8 November 2015 (UTC) 1390:05:28, 8 November 2015 (UTC) 1363:05:08, 8 November 2015 (UTC) 1336:03:49, 8 November 2015 (UTC) 1322:02:50, 8 November 2015 (UTC) 1306:02:50, 8 November 2015 (UTC) 1288:02:27, 8 November 2015 (UTC) 1262:18:10, 6 November 2015 (UTC) 1192:06:01, 7 November 2015 (UTC) 1178:21:45, 4 November 2015 (UTC) 1152:17:23, 4 November 2015 (UTC) 1124:22:27, 3 November 2015 (UTC) 1093:01:14, 3 November 2015 (UTC) 1072:18:18, 2 November 2015 (UTC) 1051:18:18, 2 November 2015 (UTC) 1033:18:03, 2 November 2015 (UTC) 1007:16:02, 4 November 2015 (UTC) 899:02:43, 18 January 2022 (UTC) 850:02:43, 18 January 2022 (UTC) 797:02:43, 18 January 2022 (UTC) 748:02:43, 18 January 2022 (UTC) 699:02:43, 18 January 2022 (UTC) 646:02:43, 18 January 2022 (UTC) 593:02:43, 18 January 2022 (UTC) 540:02:43, 18 January 2022 (UTC) 177:WikiProject Internet culture 1866:17:48, 3 October 2016 (UTC) 2335: 2270:18:01, 10 March 2024 (UTC) 1977:13:57, 29 March 2018 (UTC) 1242:16:32, 25 March 2018 (UTC) 452:project's importance scale 436:Mass surveillance articles 216:project's importance scale 134:project's importance scale 2284:C-Class Internet articles 2251:19:31, 11 July 2023 (UTC) 2168:02:51, 26 June 2020 (UTC) 2041:17:23, 3 March 2020 (UTC) 2013:21:32, 2 March 2020 (UTC) 1923:22:33, 9 March 2018 (UTC) 449: 391: 222: 213: 200:Internet culture articles 162: 131: 64: 46: 2229:The following sentence: 2155:17:14, 4 June 2020 (UTC) 2131:16:48, 4 June 2020 (UTC) 2055:suggests articles : --> 2047:Article should be split 522:. Student editor(s): [ 420:, or contribute to the 406:is within the scope of 2141:section. Perhaps just 1210:(3) Potential dangers. 324:All stubs are located 28:This article is rated 2197:. Student editor(s): 877:. Student editor(s): 824:. Student editor(s): 775:. Student editor(s): 726:. Student editor(s): 673:. Student editor(s): 612:. Student editor(s): 559:. Student editor(s): 478:The contents of the 293:Pick an article from 32:on Knowledge (XXG)'s 2147:ProcrasinatingReader 2136:Actually, seeing as 2123:ProcrasinatingReader 2115:Concerns of Snapchat 2108:(or, along with the 1642:Completed my updates 1523:Draft available at: 95:WikiProject Internet 1247:Decision of changes 2195:on the course page 1946:Ortutay, Barbara. 875:on the course page 828:. Peer reviewers: 822:on the course page 773:on the course page 724:on the course page 677:. Peer reviewers: 671:on the course page 610:on the course page 571:. Peer reviewers: 557:on the course page 520:on the course page 34:content assessment 2066:Potential dangers 1844: 1827:comment added by 1795: 1778:comment added by 1127: 1110:comment added by 1077:Self-Introduction 905:Self-Introduction 506: 505: 466: 465: 462: 461: 458: 457: 427:Mass surveillance 414:mass surveillance 386:Mass surveillance 373: 372: 369: 368: 365: 364: 361: 360: 339:(!?); Try to get 144: 143: 140: 139: 118:Internet articles 2326: 2221: 2203:article contribs 2192: 2188: 2184: 2163: 2005:Numbersinstitute 1899:Numbersinstitute 1843: 1821: 1794: 1772: 1720:Questingwayfarer 1663:Questingwayfarer 1647:Questingwayfarer 1620:Questingwayfarer 1613:Questingwayfarer 1599:Questingwayfarer 1591:Questingwayfarer 1574:Questingwayfarer 1531:Questingwayfarer 1471:Questingwayfarer 1456:Questingwayfarer 1314:Questingwayfarer 1298:Questingwayfarer 1280:Questingwayfarer 1272:Questingwayfarer 1267:Decision changes 1157:Some more to add 1126: 1104: 1064:Questingwayfarer 1043:Questingwayfarer 1025:Questingwayfarer 1017:Questingwayfarer 901: 872: 868: 864: 852: 819: 815: 811: 799: 770: 766: 762: 750: 721: 717: 713: 701: 668: 667:12 December 2018 664: 660: 648: 607: 595: 554: 542: 517: 497: 475: 474: 468: 438: 437: 434: 431: 428: 400: 393: 392: 382: 375: 275:Article requests 264: 257: 256: 224: 202: 201: 198: 195: 192: 191:Internet culture 182:internet culture 171: 164: 163: 157:Internet culture 153: 146: 120: 119: 116: 113: 110: 89: 84: 83: 73: 66: 65: 55: 48: 31: 25: 24: 16: 2334: 2333: 2329: 2328: 2327: 2325: 2324: 2323: 2274: 2273: 2262:110.235.217.179 2258: 2227: 2208: 2191:16 October 2022 2178: 2161: 2049: 1984: 1956: 1930: 1873: 1850: 1822: 1773: 1644: 1570: 1521: 1494: 1492:progress so far 1453: 1413: 1379: 1377:User Awareness: 1352: 1295: 1269: 1249: 1159: 1133: 1105: 1100: 1079: 1040: 1014: 978: 931: 917:December 2015. 907: 884: 858: 835: 814:14 January 2020 805: 782: 756: 733: 707: 684: 654: 631: 601: 578: 548: 525: 511: 493: 472: 435: 432: 429: 426: 425: 357: 255: 199: 196: 193: 190: 189: 117: 114: 111: 108: 107: 87:Internet portal 85: 78: 29: 12: 11: 5: 2332: 2330: 2322: 2321: 2316: 2311: 2306: 2301: 2296: 2291: 2286: 2276: 2275: 2257: 2254: 2226: 2223: 2187:23 August 2022 2177: 2174: 2173: 2172: 2171: 2170: 2120: 2119: 2095: 2075: 2048: 2045: 2044: 2043: 2001: 2000: 1995: 1992: 1983: 1980: 1955: 1952: 1929: 1926: 1911: 1891: 1890: 1887: 1884: 1872: 1869: 1849: 1846: 1829:Blueberry snow 1800:Blueberry snow 1780:Blueberry snow 1643: 1640: 1569: 1566: 1551:Blueberry snow 1541: 1520: 1517: 1493: 1490: 1452: 1449: 1435: 1432: 1431: 1427: 1412: 1409: 1398:Blueberry snow 1382:Blueberry snow 1378: 1375: 1355:Blueberry snow 1351: 1348: 1294: 1291: 1268: 1265: 1248: 1245: 1228: 1217: 1213: 1211: 1209: 1207: 1205: 1201: 1196: 1194: 1181: 1180: 1170:Blueberry snow 1162:Blueberry snow 1158: 1155: 1132: 1129: 1112:Blueberry snow 1099: 1096: 1085:Blueberry snow 1078: 1075: 1061: 1039: 1036: 1013: 1010: 977: 974: 930: 927: 920: 912: 906: 903: 871:14 August 2020 857: 854: 804: 801: 755: 752: 706: 703: 663:5 October 2018 653: 650: 618:Anna jasmine33 614:Jocelyngarroyo 600: 597: 547: 544: 510: 507: 504: 503: 476: 464: 463: 460: 459: 456: 455: 448: 442: 441: 439: 401: 389: 388: 383: 371: 370: 367: 366: 363: 362: 359: 358: 356: 355: 354: 353: 344: 328: 314: 301: 283: 268: 266: 265: 254: 253: 248: 243: 238: 232: 229: 228: 220: 219: 212: 206: 205: 203: 186:the discussion 172: 160: 159: 154: 142: 141: 138: 137: 130: 124: 123: 121: 104:the discussion 91: 90: 74: 62: 61: 56: 44: 43: 37: 26: 13: 10: 9: 6: 4: 3: 2: 2331: 2320: 2317: 2315: 2312: 2310: 2307: 2305: 2302: 2300: 2297: 2295: 2292: 2290: 2287: 2285: 2282: 2281: 2279: 2272: 2271: 2267: 2263: 2255: 2253: 2252: 2248: 2244: 2239: 2235: 2234: 2230: 2224: 2222: 2220: 2216: 2212: 2206: 2204: 2200: 2196: 2183: 2175: 2169: 2166: 2164: 2158: 2157: 2156: 2152: 2148: 2144: 2139: 2135: 2134: 2133: 2132: 2128: 2124: 2117: 2116: 2111: 2107: 2106: 2101: 2100: 2096: 2094: 2091: 2087: 2086: 2081: 2080: 2076: 2074: 2073: 2068: 2067: 2063: 2062: 2061: 2058: 2054: 2046: 2042: 2038: 2034: 2030: 2026: 2021: 2017: 2016: 2015: 2014: 2010: 2006: 1999: 1996: 1993: 1990: 1989: 1988: 1981: 1979: 1978: 1974: 1970: 1969:Lastinfreeman 1965: 1960: 1953: 1951: 1949: 1944: 1942: 1937: 1933: 1927: 1925: 1924: 1920: 1916: 1909: 1908: 1904: 1900: 1896: 1888: 1885: 1882: 1881: 1880: 1878: 1870: 1868: 1867: 1863: 1859: 1855: 1847: 1845: 1842: 1838: 1834: 1830: 1826: 1819: 1814: 1813: 1809: 1805: 1801: 1796: 1793: 1789: 1785: 1781: 1777: 1769: 1765: 1764: 1760: 1756: 1752: 1748: 1743: 1739: 1735: 1731: 1729: 1725: 1721: 1716: 1714: 1709: 1708: 1704: 1700: 1695: 1694: 1690: 1686: 1682: 1678: 1673: 1672: 1668: 1664: 1658: 1656: 1652: 1648: 1641: 1639: 1638: 1634: 1630: 1625: 1621: 1616: 1614: 1609: 1608: 1604: 1600: 1596: 1592: 1588: 1586: 1581: 1579: 1575: 1567: 1565: 1564: 1560: 1556: 1552: 1548: 1544: 1540: 1536: 1532: 1527: 1526: 1518: 1516: 1515: 1511: 1507: 1503: 1499: 1491: 1489: 1488: 1484: 1480: 1476: 1472: 1468: 1465: 1461: 1457: 1450: 1448: 1447: 1443: 1439: 1428: 1426: 1422: 1418: 1410: 1408: 1407: 1403: 1399: 1394: 1391: 1387: 1383: 1376: 1374: 1373: 1370: 1366: 1364: 1360: 1356: 1349: 1347: 1345: 1341: 1337: 1333: 1329: 1324: 1323: 1319: 1315: 1310: 1307: 1303: 1299: 1292: 1290: 1289: 1285: 1281: 1277: 1273: 1266: 1264: 1263: 1259: 1255: 1246: 1244: 1243: 1239: 1235: 1229: 1226: 1224: 1220: 1214: 1202: 1197: 1193: 1189: 1185: 1179: 1175: 1171: 1167: 1163: 1156: 1154: 1153: 1149: 1145: 1141: 1137: 1130: 1128: 1125: 1121: 1117: 1113: 1109: 1097: 1095: 1094: 1090: 1086: 1082: 1076: 1074: 1073: 1069: 1065: 1059: 1055: 1052: 1048: 1044: 1037: 1035: 1034: 1030: 1026: 1022: 1018: 1011: 1009: 1008: 1004: 1000: 996: 992: 988: 984: 975: 973: 972: 968: 964: 959: 956: 953: 950: 946: 945: 941: 937: 928: 926: 924: 918: 916: 910: 904: 902: 900: 896: 892: 888: 882: 880: 876: 863: 855: 853: 851: 847: 843: 839: 833: 831: 827: 823: 810: 802: 800: 798: 794: 790: 786: 780: 778: 774: 761: 753: 751: 749: 745: 741: 737: 731: 729: 725: 716:18 March 2019 712: 704: 702: 700: 696: 692: 688: 682: 680: 676: 672: 659: 651: 649: 647: 643: 639: 635: 629: 627: 623: 619: 615: 611: 606: 598: 596: 594: 590: 586: 582: 576: 574: 570: 569:Lastinfreeman 566: 562: 558: 553: 545: 543: 541: 537: 533: 529: 523: 521: 516: 508: 501: 500:its talk page 496: 491: 487: 483: 482: 477: 470: 469: 453: 447: 444: 443: 440: 423: 419: 415: 411: 410: 405: 402: 399: 395: 394: 390: 387: 384: 381: 377: 352: 351: 346: 345: 342: 338: 335: 333: 329: 327: 323: 321: 320: 315: 313: 310: 308: 307: 302: 300: 296: 292: 290: 289: 284: 282: 279: 277: 276: 271: 270: 267: 263: 259: 258: 252: 249: 247: 244: 242: 239: 237: 234: 233: 231: 230: 226: 225: 221: 217: 211: 208: 207: 204: 187: 183: 179: 178: 173: 170: 166: 165: 161: 158: 155: 152: 148: 135: 129: 126: 125: 122: 105: 101: 97: 96: 88: 82: 77: 75: 72: 68: 67: 63: 60: 57: 54: 50: 45: 41: 35: 27: 23: 18: 17: 2259: 2256:Deepakumrgil 2240: 2236: 2232: 2231: 2228: 2211:LeanneGagnon 2207: 2199:LeanneGagnon 2179: 2121: 2113: 2112:, a broader 2103: 2097: 2092: 2083: 2077: 2070: 2064: 2059: 2050: 2002: 1985: 1963: 1961: 1957: 1947: 1945: 1938: 1934: 1931: 1910: 1892: 1883:this article 1874: 1853: 1851: 1823:— Preceding 1815: 1797: 1774:— Preceding 1768:Yundananagel 1766: 1755:Yundananagel 1747:Yundananagel 1734:Yundananagel 1732: 1717: 1710: 1696: 1674: 1659: 1645: 1629:Yundananagel 1617: 1610: 1589: 1582: 1571: 1555:Yundananagel 1543:Yundananagel 1535:Yundananagel 1528: 1522: 1495: 1479:Yundananagel 1469: 1454: 1429: 1414: 1395: 1380: 1367: 1353: 1325: 1311: 1296: 1270: 1254:Yundananagel 1250: 1230: 1227: 1215: 1203: 1198: 1160: 1144:Yundananagel 1136:Yundananagel 1134: 1106:— Preceding 1101: 1083: 1080: 1060: 1056: 1041: 1015: 999:Yundananagel 991:Yundananagel 983:Yundananagel 979: 960: 957: 954: 948: 947: 932: 922: 919: 914: 911: 908: 883: 859: 834: 818:9 March 2020 806: 781: 769:12 July 2019 757: 732: 708: 683: 655: 630: 602: 577: 549: 524: 512: 479: 418:project page 407: 403: 347: 331: 330: 317: 316: 304: 303: 286: 285: 273: 272: 175: 93: 40:WikiProjects 2060:I propose: 2053:WP:SIZERULE 2018:Please see 879:BenKeebaugh 867:6 July 2020 765:20 May 2019 720:10 May 2019 626:Jorge CSUEB 622:Megancollom 573:Brian.klein 565:Addisonronk 495:its history 2278:Categories 1915:Kamryngood 679:Ianbohn761 561:Kamryngood 484:page were 422:discussion 2033:GermanJoe 1818:Lanuordiy 1804:Lanuordiy 1745:spellings 1728:Lanuordiy 1724:Lanuordiy 1713:Lanuordiy 1699:Lanuordiy 1685:Lanuordiy 1677:Lanuordiy 1657:Hi All, 1624:Lanuordiy 1585:Lanuordiy 1578:Lanuordiy 1539:Lanuordiy 1506:Lanuordiy 1498:Lanuordiy 1438:Lanuordiy 1417:Lanuordiy 1340:Lanuordiy 1328:Lanuordiy 1219:Lanuordiy 1184:Lanuordiy 830:Kcruz0311 728:Eurasia18 348:See also 2162:Buffaboy 2099:Snapchat 2079:Facebook 1964:Facebook 1858:Alleiyat 1837:contribs 1825:unsigned 1788:contribs 1776:unsigned 1572:Hello -- 1120:contribs 1108:unsigned 963:JasperRS 936:JasperRS 891:PrimeBOT 842:PrimeBOT 789:PrimeBOT 777:Erkunkel 740:PrimeBOT 691:PrimeBOT 675:Lpwarner 638:PrimeBOT 585:PrimeBOT 532:PrimeBOT 109:Internet 100:Internet 59:Internet 2243:Narilth 2029:WP:TONE 2025:WP:NPOV 1895:discuss 1350:Summary 826:Kaduoos 341:YouTube 241:history 30:C-class 2102:-: --> 2082:-: --> 2069:-: --> 2020:WP:RSP 925:2017. 486:merged 288:Expand 36:scale. 1954:Draft 1568:Views 1411:tasks 1234:BFE68 488:into 332:Other 319:Stubs 306:Photo 251:purge 246:watch 2266:talk 2247:talk 2215:talk 2189:and 2151:talk 2127:talk 2037:talk 2027:and 2009:talk 1973:talk 1919:talk 1903:talk 1862:talk 1833:talk 1808:talk 1784:talk 1759:talk 1751:talk 1738:talk 1722:, -- 1703:talk 1689:talk 1681:talk 1667:talk 1651:talk 1633:talk 1618:Hi-- 1603:talk 1595:talk 1559:talk 1547:talk 1510:talk 1502:talk 1483:talk 1475:talk 1460:talk 1442:talk 1421:talk 1402:talk 1386:talk 1359:talk 1344:talk 1332:talk 1318:talk 1302:talk 1284:talk 1276:talk 1258:talk 1238:talk 1223:talk 1188:talk 1174:talk 1166:talk 1148:talk 1140:talk 1116:talk 1089:talk 1068:talk 1047:talk 1029:talk 1021:talk 1003:talk 995:talk 987:talk 967:talk 940:talk 895:talk 869:and 846:talk 816:and 793:talk 767:and 744:talk 718:and 695:talk 665:and 642:talk 589:talk 536:talk 326:here 299:here 295:here 236:edit 2205:). 889:by 840:by 787:by 738:by 689:by 636:by 583:by 530:by 446:??? 297:or 210:??? 128:??? 2280:: 2268:) 2249:) 2217:) 2153:) 2129:) 2039:) 2011:) 1975:) 1943:. 1921:) 1905:) 1864:) 1856:-- 1839:) 1835:• 1816:-- 1810:) 1798:-- 1790:) 1786:• 1761:) 1718:-- 1711:-- 1705:) 1691:) 1675:-- 1669:) 1653:) 1635:) 1622:-- 1611:-- 1605:) 1576:-- 1561:) 1537:-- 1533:-- 1529:-- 1512:) 1496:-- 1485:) 1462:) 1444:) 1436:-- 1423:) 1415:-- 1404:) 1388:) 1361:) 1346:) 1334:) 1326:-- 1320:) 1304:) 1286:) 1260:) 1240:) 1225:) 1190:) 1182:-- 1176:) 1150:) 1122:) 1118:• 1091:) 1070:) 1049:) 1031:) 1005:) 969:) 942:) 897:) 881:. 848:) 832:. 795:) 779:. 746:) 730:. 697:) 681:. 644:) 628:. 624:, 620:, 616:, 591:) 575:. 567:, 563:, 538:) 2264:( 2245:( 2213:( 2201:( 2149:( 2125:( 2118:) 2093:) 2035:( 2007:( 1971:( 1962:- 1917:( 1901:( 1860:( 1831:( 1806:( 1782:( 1757:( 1749:( 1736:( 1701:( 1687:( 1679:( 1665:( 1649:( 1631:( 1601:( 1593:( 1557:( 1545:( 1508:( 1500:( 1481:( 1473:( 1458:( 1440:( 1419:( 1400:( 1384:( 1357:( 1342:( 1330:( 1316:( 1300:( 1282:( 1274:( 1256:( 1236:( 1221:( 1186:( 1172:( 1164:( 1146:( 1138:( 1114:( 1087:( 1066:( 1045:( 1027:( 1019:( 1001:( 993:( 985:( 965:( 938:( 893:( 844:( 791:( 742:( 693:( 640:( 587:( 534:( 502:. 454:. 424:. 334:: 322:: 309:: 291:: 278:: 218:. 136:. 42::

Index


content assessment
WikiProjects
WikiProject icon
Internet
WikiProject icon
icon
Internet portal
WikiProject Internet
Internet
the discussion
???
project's importance scale
WikiProject icon
Internet culture
WikiProject icon
WikiProject Internet culture
internet culture
the discussion
???
project's importance scale
edit
history
watch
purge

Article requests
View all requested internet culture articles
Expand
here

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑