Advertisement

Ethical, Privacy, and Security Issues in the Online Social Network Ecosystems

  • Joseph Migga KizzaEmail author
Chapter
Part of the Undergraduate Topics in Computer Science book series (UTICS)

Abstract

This chapter discusses the new realities of global computer online social network ecosystems, including moral and ethical dynamisms. Because we believe that a sound and details discuss of online social networks is based on a good understanding of the underlying network infrastructure, we start the chapter with a brief discussion of the computer network infrastructure. Based on this communication infrastructure we define a social network and its subset, the online social network. We discuss the types of social networks, their historical development and the different and changing services of online social networks. After discussing the basics of online social networks, we them focus on ethical, social and privacy issues in the online social network noting that while online, we inevitably give off our information to whomever asks for it in order to get services. We note that routinely information collected from online community members, however, is not always used as intended. It is quite often used for unauthorized purposes, hence an invasion of privacy. We discuss known ways we give off vital personal information while online in social networks. We further discuss ways to protect personal privacy. On the central point of ethical implications of life in the social network, we note that unlike in the traditional network, governance is not centralized, but community based with equally shared authority and responsibility by all users. But the mechanisms are not yet defined, and where they are being defined, it is still too early to say whether they are effective. The complexity, unpredictability, and lack of central authority is further enhanced by a virtual personality, anonymity and multiple personality. These three characteristics are at the core of the social and ethical problems in online social networks in particular and cyberspace in general; the larger and more numerous these communities become, the more urgent the ethical concerns become.

References

  1. 1.
    Kizza JM (2015) Guide to computer network security, 3rd edn. Springer, New York, NYCrossRefGoogle Scholar
  2. 2.
    Newman D, Andrew W. Penetration testing and network defense: performing host reconnaissance. http://www.ciscopress.com/articles/article.asp?p=469623&seqNum=2
  3. 3.
    Tittel E. Understanding security policies. http://www.informit.com/articles/article.aspx?p=25041
  4. 4.
    Hayes B. Conducting a security audit: an introductory overview. https://www.symantec.com/connect/articles/conducting-security-audit-introductory-overview
  5. 5.
    Kizza JM (2013) Ethical and social issues in the information age, 5th edn. Springer, New York, NYCrossRefGoogle Scholar
  6. 6.
    Fox R (2000) News track: age and sex. Commun ACM 43(9):9CrossRefGoogle Scholar
  7. 7.
    Bylaws for Internet Corporation for Assigned Names and Numbers. ICANN. https://www.icann.org/resources/pages/bylaws-2005-04-08-en
  8. 8.
    Kizza JM (2011) Computer network security and cyberethics, 3rd edn. McFarland Publishers Jefferson, North CarolinaGoogle Scholar
  9. 9.
    Unavoidable Ethical Questions About Social Networking. Mekkula Center for Applied Ethics, Santa, Clara University. http://www.scu.edu/ethics/publications/submitted/social-networking.html
  10. 10.
    Number of websites surpasses 1 billion, continues to climb. AFP RELAXNEWS. The Daily News, 17 Sept, 204Google Scholar
  11. 11.
    Communication from the Commission to the Council and the European Parliament. Commission of the European Communities (Com2000), 202Google Scholar
  12. 12.
    Gordon Crovitz L (2008) Information haves and have-nots. Wall Street J, 22 Sept 2008. https://www.wsj.com/articles/SB122204237577161317
  13. 13.
    Evolving the High Performance Computing and Communications Initiative to Support the Nation’s Information Infrastructure—Executive Summary. http://www.nap.edu/search/?term=Evolving+the+High+Performance+Computing+and+Communications+Initiative+to+Support+the+Nation%E2%80%99s+Information+Infrastructure%E2%80%94Executive+Summary&x=0&y=0
  14. 14.
  15. 15.
  16. 16.
  17. 17.
    Young K. Internet addiction: the emergence of a new clinical disorder. CyberPsychology Behav 1(3):237–244CrossRefGoogle Scholar

Further Reading

  1. 18.
  2. 19.
    Schroeder S (2011) Facebook facing $138,000 fine for holding deleted user data. http://mashable.com/2011/10/21/facebook-deleted-data-fine/
  3. 20.
    Walsh M (2010) Court backs student on facebook page criticizing teacher. NewsWeek. http://blogs.edweek.org/edweek/school_law/2010/02/court_backs_student_on_faceboo.html

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.College of Engineering and Computer ScienceUniversity of TennesseeChattanoogaUSA

Personalised recommendations