SlideShare a Scribd company logo
Data protection and
    social networks
Data: Pew Research Center, Internet and American Life Surveys
Graphic: Jenise Uehara Henrikson, Search Engine Journal, 30/8/11
Which data are social networks
storing?
• In 2011, Austrian law student
  Max Schrems received 1,222
  pages of data after subject
  access request to Facebook
• Searches, pages viewed,
  relationships with friends,
  events, like button tracking,
  cookies, conversation tracking…
• Facebook now has data
  download tool, supplies 39 of 84
  data categories held               TouchGraph Facebook Browser
Data: CareerBuilder, online, fieldwork 17/11/09-2/12/09, probability
 sample of 407 UK private sector employers, sample error ±4.41%
Graphic: Jenise Uehara Henrikson, Search Engine Journal, 30/8/11
Data protection and social networks
Reasonable expectations?
     • Oxford students fined on basis of Facebook photos of exam
       celebrations. Whose “fault”?
        • Students who didn’t take appropriate security measures
          using available tools?
        • Oxford proctors for snooping on a “private place”?
        • Facebook because it did not provide the right defaults for
          a “reasonable expectation of privacy”?
     • A29WP: “SNS should ensure privacy-friendly and free of
       charge default settings are in place restricting access to self-
       selected contacts”
     • Canadian Privacy Commissioner: “Facebook’s default
       settings in respect of photo albums and search engines do
       not meet users’ reasonable expectations”
Data shared about third parties
                              • How far can users control what
                                is “tagged” with their identifier?
                              • Facial recognition
                              • A29WP: “Users should be
                                advised by SNS that pictures or
                                information about other
                                individuals, should only be
                                uploaded with the individual’s
TouchGraph Facebook Browser
                                consent.”
Facebook Platform
• Over 9m apps and integrated websites as of March 2012
• “Social Plugins” are revealing browsing behaviour across the Web to
  Facebook and Twitter – used by latter for profiling (10 days of
  records). Banned in Schleswig-Holstein
• X’s app consent may reveal personal data about Y, and transmit
  user IDs to ad tracking companies
• Canadian Privacy Commissioner: “Facebook should be doing much
  more to ensure that meaningful consent is duly obtained from users
  when developers access their personal information [and]
  technological safeguards that will not simply forbid, but effectively
  prevent, developers’ unauthorized access to personal information
  that they do not need.”
Young people and privacy
• Most young people see Internet as private space for talking to
    (already-known) friends, and target information to peer group
•   Lenhart et al. (2007) found stricter access controls on photos/videos
    by teens than adults (76% v 58% most of time/sometimes)
•   Teens showed higher privacy concerns with parental monitoring;
    parental discussions increased privacy concerns and reduced
    disclosure
•   Human impulse to connect and share information with friends, but
    when mediated can easily be replicated and spread to places never
    intended. Teens less good at managing collapsed contexts (boyd,
    Marwick)
•   Adult users of social media are developing similar behaviours –
    consequence of mediation, not age (Marwick et al. 2010)
Young adults and privacy
• Hoofnagle et al. (2010) found very limited understanding
  of privacy laws among young adults – 42% answered all 5
  questions incorrectly
• Jones et al. surveyed 7,421 students at 40 US colleges.
  75% concerned about passwords, SSNs, credit card
  numbers but few about SNSes due to insignificant
  consequences (2009)
Student information disclosure




 What kind of personal information do you post online? (first year N=177, final year N=133) Oostveen
 (2010)
Sampling Facebook Experiences
                                                       Facebook Application
                                                        Location disclosed to friends



                                Server
                                 Data are collected
                                in our server
                                 Questions are
                                sent to participants
                                                            Aims
                                                            To understand:
                                through SMS
                                                             Why do students share
                                                            their location
                                                             How (text, picture)
                                                             When, to whom they
Mobile phones carried by students                           share this location
 Location retrieved with embedded GPS                       At what locations are
 Subjects answer questions (e.g., sharing choices)         they more willing to share
Location sharing




•    40 participants responded to over 2000 questions over 2 weeks
•    Participants are more willing to share their location when they are in ‘Leisure’ or
    ‘Academic’ locations than in the ‘Library’ or in ‘Residential’ areas.
                                                 Abdesslem, Parris & Henderson (2010)
Privacy is contextual
• “Contrary to the assumption … that people have
 stable, coherent, preferences with respect to
 privacy, we find that concern about privacy … is
 highly sensitive to contextual factors”
 • Privacy salience primes concerns
 • “People, it seems, feel more comfortable providing
   personal information on unprofessional sites that are
   arguably particularly likely to misuse it.”
 • “Covert inquiries … do not trigger concerns about
   privacy, and hence promote disclosure.”


                               John, Acquisti and Loewenstein (2011)
Homo economicus vs. sapiens
• Bounded rationality
• Privacy risks are highly probabilistic, cumulative, and
  difficult to calculate
• Most individuals bad at deferred gratification, and have
  time-inconsistent preferences




                                                    Acquisti (2009)
How to further privacy in social
networks?
• Is the consent given when signing up for Facebook (and apps) good
  enough? Informed? “Explicit” for sensitive data? EC: “general
  principle of transparent processing”, “improving the modalities for the
  actual exercise of the rights of access, rectification”, “clarifying and
  strengthening the rules on consent”
• Should current consent expose users to future risks? “The eternal
  memory of Google” vs. the “right to be forgotten”; “data portability”
• Can T & C which exclude liability for privacy and security breaches be
  potentially void as unfair consumer terms? EC: “general personal
  data breach notification”, “extending the power to bring an action
  before the national courts”, “strengthening the existing provisions on
  sanctions”
• EC: “further promoting the use of PETs and the possibilities for the
  concrete implementation of the concept of ‘Privacy by Design’”,
  “continue to promote the development of high legal and technical
  standards of data protection in third countries and at international
  level”
Individuals ≠ data controllers

                 • How sustainable is Lindqvist?
                 • A29WP: “when access to a profile is
                   provided to all members within the SNS
                   or the data is indexable by search
                   engines, access goes beyond the
                   personal or household sphere.”
                 • Better privacy protection by
                   infomediaries?
                   • Defaults/Nudges?
                   • Expedited temporary restrictions on sharing?
References
SNS market penetration




                         Source: Le Monde, 15/5/08
Is competition regulation required?
• OpenSocial and related efforts may reduce switching
  costs,
• but network effects will still act as a barrier to entry
• vertical integration will limit consumer choice


Competition authorities could:
• impose ex ante interoperability requirements
• upon dominant social utilities
• between vertically integrated value chains
• to minimise network barriers
Three models
Model 1: Must-carry obligations
• on broadcasters and Electronic Programme Guides
Model 2: API disclosure requirements
• on Microsoft from DoJ and EC rulings
Model 3: Interconnect requirements
• on telcos, especially with SMP
• for IM clients, from Time Warner/AOL merger case
Model comparison
• API disclosure requirements are necessary but not
 sufficient - ability to program platform apps is of little use if
 they cannot run
• Must-carry obligations enable one platform to “break in” to
 another (eg Flickr app on Facebook)
• Interconnect requirements most likely to lead to seamless
 user experience that will create real competition

More Related Content

PDF
Social Multimedia as Sensors
PPTX
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
PPTX
Trusting the internet
PPT
Information Architecture & Findability
PPT
PPT
Social computing meet & greet
PDF
Over the Horizon: Connecting Technology Trends with the Library of Tomorrow (...
PDF
Places for News: an exploration of context and situated methods
Social Multimedia as Sensors
empowerment technologies: jaerialyn pagoyo,adelfa pagoyo,renelie kyle pepe,me...
Trusting the internet
Information Architecture & Findability
Social computing meet & greet
Over the Horizon: Connecting Technology Trends with the Library of Tomorrow (...
Places for News: an exploration of context and situated methods

What's hot (19)

PDF
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
PDF
Mobile Access to Licensed Databases in Medicine and Other Subject Areas
PDF
Report: Future Of Internet IV | AAAS
PPT
Digital Trails Dave King 1 5 10 Part 1 D3
PPTX
Singapore iatul keynote
PPTX
Empowerment technologies byShyna Gane Daleon and Galasao
PDF
Digital students - Is there a Gap? presentation at the EDEN 2012, Porto
PPTX
Participant Consent and Withdrawal when using publicly archived data
PDF
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
PDF
THE RELATIONSHIP BETWEEN THE USE OF BLACKBERRY WITH THE STUDENTS’ DEMAND FULF...
PDF
Peer computing complete project
PPT
Illegal File Sharing
PPT
Illegal file sharing4
PPTX
What's on the Horizon? Trends and Trials in Educational Technology
PDF
Admshs emp tech_q1_m1_l1-ict
PPTX
Damásio et al, 'Mobile Devices as drivers of Social Capital' at Communities i...
PPT
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
PDF
H018144450
PDF
The Googling Juror 2014 - The Fate of the Jury in the Digital Paradigm
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
Mobile Access to Licensed Databases in Medicine and Other Subject Areas
Report: Future Of Internet IV | AAAS
Digital Trails Dave King 1 5 10 Part 1 D3
Singapore iatul keynote
Empowerment technologies byShyna Gane Daleon and Galasao
Digital students - Is there a Gap? presentation at the EDEN 2012, Porto
Participant Consent and Withdrawal when using publicly archived data
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
THE RELATIONSHIP BETWEEN THE USE OF BLACKBERRY WITH THE STUDENTS’ DEMAND FULF...
Peer computing complete project
Illegal File Sharing
Illegal file sharing4
What's on the Horizon? Trends and Trials in Educational Technology
Admshs emp tech_q1_m1_l1-ict
Damásio et al, 'Mobile Devices as drivers of Social Capital' at Communities i...
Usable Privacy and Security: A Grand Challenge for HCI, Human Computer Inter...
H018144450
The Googling Juror 2014 - The Fate of the Jury in the Digital Paradigm
Ad

Viewers also liked (17)

PPTX
Data protection and privacy in the social web en 17072010
PDF
Privacy and social media in the workplace
PDF
Who do you trust: Facebook or your friends? - Analyzing predictors of privacy...
PPTX
Social media & data protection policy v1.0 141112
PPTX
Chapter 8 big data and privacy - social media 3533
PPTX
Group 4 discussion leading
KEY
Look before you leap - research as foundation for brand identity development
PPT
Data privacy & social media
PPT
Legal Implications Of Social Media
PDF
Data Protection
 in the Age of Big Data
PPTX
Personal data protection in the EU
PPTX
Privacy & Data Protection
PDF
2017 02-05 en-eu-data-security_v2
PDF
The Dark Side of Social Media: Privacy Concerns
PPTX
Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...
PDF
Deep Learning - The Past, Present and Future of Artificial Intelligence
PDF
Information Privacy & Social Media Issues in Healthcare
Data protection and privacy in the social web en 17072010
Privacy and social media in the workplace
Who do you trust: Facebook or your friends? - Analyzing predictors of privacy...
Social media & data protection policy v1.0 141112
Chapter 8 big data and privacy - social media 3533
Group 4 discussion leading
Look before you leap - research as foundation for brand identity development
Data privacy & social media
Legal Implications Of Social Media
Data Protection
 in the Age of Big Data
Personal data protection in the EU
Privacy & Data Protection
2017 02-05 en-eu-data-security_v2
The Dark Side of Social Media: Privacy Concerns
Sirius friday data protection en privacy is uw bedrijf klaar voor de nieuwe e...
Deep Learning - The Past, Present and Future of Artificial Intelligence
Information Privacy & Social Media Issues in Healthcare
Ad

Similar to Data protection and social networks (20)

PPT
Social media and Missing workshop
PPTX
Mobile Media Privacy
PPT
Hum 140: Social Media: Privacy
PDF
Week 7: Privacy-rev2013
PPTX
The impacts of facebook on young adults
PDF
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
PDF
Analysis, modelling and protection of online private data.
PPT
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
PDF
Privacy & Social Media
PDF
Online Privacy
PPT
Social Media and Privacy - Education Across the Nation - Australian Computer ...
PPT
Social Media and Privacy - Education Across the Nation - Australian Computer ...
PPT
Privacy Management and the Social Web
PPTX
Is the Age of privacy over? Facebook, Privacy and Qualitative Research
PDF
Social Networking Websites and Image Privacy
PPTX
Data Protection and Privacy in the Social Web
PPT
Privacy and Social Networks
PDF
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PDF
Social network privacy guide
PPTX
Online Privacy
Social media and Missing workshop
Mobile Media Privacy
Hum 140: Social Media: Privacy
Week 7: Privacy-rev2013
The impacts of facebook on young adults
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
Analysis, modelling and protection of online private data.
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Privacy & Social Media
Online Privacy
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Social Media and Privacy - Education Across the Nation - Australian Computer ...
Privacy Management and the Social Web
Is the Age of privacy over? Facebook, Privacy and Qualitative Research
Social Networking Websites and Image Privacy
Data Protection and Privacy in the Social Web
Privacy and Social Networks
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
Social network privacy guide
Online Privacy

More from blogzilla (20)

PDF
Interoperability for SNS competition
PPTX
Transatlantic data flows following the Schrems II judgment
PPTX
Lessons for interoperability remedies from UK Open Banking
PPTX
Covid exposure apps in England and Wales
PPTX
Key issues in data protection policy
PPTX
Trusted government access to private sector data
PDF
Interoperability in the Digital Services Act
PPTX
Making effective policy use of academic expertise
PPTX
Introduction to Cybersecurity for Elections
PPTX
Cyber Essentials for Managers
PDF
Privacy and Data Protection in South Africa
PPTX
Human rights and the future of surveillance - Lord Anderson QC
PDF
Data science and privacy regulation
PPTX
Where next for encryption regulation?
PPTX
Where next for the Regulation of Investigatory Powers Act?
PPTX
Regulation and the Internet of Things
PPTX
Global Cyber Security Capacity Centre
PPTX
Privacy post-Snowden
PPTX
Keeping our secrets? Shaping Internet technologies for the public good
PPT
The Data Retention Directive: recent developments
Interoperability for SNS competition
Transatlantic data flows following the Schrems II judgment
Lessons for interoperability remedies from UK Open Banking
Covid exposure apps in England and Wales
Key issues in data protection policy
Trusted government access to private sector data
Interoperability in the Digital Services Act
Making effective policy use of academic expertise
Introduction to Cybersecurity for Elections
Cyber Essentials for Managers
Privacy and Data Protection in South Africa
Human rights and the future of surveillance - Lord Anderson QC
Data science and privacy regulation
Where next for encryption regulation?
Where next for the Regulation of Investigatory Powers Act?
Regulation and the Internet of Things
Global Cyber Security Capacity Centre
Privacy post-Snowden
Keeping our secrets? Shaping Internet technologies for the public good
The Data Retention Directive: recent developments

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Electronic commerce courselecture one. Pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Cloud computing and distributed systems.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
sap open course for s4hana steps from ECC to s4
NewMind AI Weekly Chronicles - August'25 Week I
Electronic commerce courselecture one. Pdf
Chapter 3 Spatial Domain Image Processing.pdf
Spectral efficient network and resource selection model in 5G networks
Cloud computing and distributed systems.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
The Rise and Fall of 3GPP – Time for a Sabbatical?
Network Security Unit 5.pdf for BCA BBA.
Unlocking AI with Model Context Protocol (MCP)
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
MIND Revenue Release Quarter 2 2025 Press Release
“AI and Expert System Decision Support & Business Intelligence Systems”
Dropbox Q2 2025 Financial Results & Investor Presentation
MYSQL Presentation for SQL database connectivity
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Programs and apps: productivity, graphics, security and other tools
Mobile App Security Testing_ A Comprehensive Guide.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
sap open course for s4hana steps from ECC to s4

Data protection and social networks

  • 1. Data protection and social networks
  • 2. Data: Pew Research Center, Internet and American Life Surveys Graphic: Jenise Uehara Henrikson, Search Engine Journal, 30/8/11
  • 3. Which data are social networks storing? • In 2011, Austrian law student Max Schrems received 1,222 pages of data after subject access request to Facebook • Searches, pages viewed, relationships with friends, events, like button tracking, cookies, conversation tracking… • Facebook now has data download tool, supplies 39 of 84 data categories held TouchGraph Facebook Browser
  • 4. Data: CareerBuilder, online, fieldwork 17/11/09-2/12/09, probability sample of 407 UK private sector employers, sample error ±4.41% Graphic: Jenise Uehara Henrikson, Search Engine Journal, 30/8/11
  • 6. Reasonable expectations? • Oxford students fined on basis of Facebook photos of exam celebrations. Whose “fault”? • Students who didn’t take appropriate security measures using available tools? • Oxford proctors for snooping on a “private place”? • Facebook because it did not provide the right defaults for a “reasonable expectation of privacy”? • A29WP: “SNS should ensure privacy-friendly and free of charge default settings are in place restricting access to self- selected contacts” • Canadian Privacy Commissioner: “Facebook’s default settings in respect of photo albums and search engines do not meet users’ reasonable expectations”
  • 7. Data shared about third parties • How far can users control what is “tagged” with their identifier? • Facial recognition • A29WP: “Users should be advised by SNS that pictures or information about other individuals, should only be uploaded with the individual’s TouchGraph Facebook Browser consent.”
  • 8. Facebook Platform • Over 9m apps and integrated websites as of March 2012 • “Social Plugins” are revealing browsing behaviour across the Web to Facebook and Twitter – used by latter for profiling (10 days of records). Banned in Schleswig-Holstein • X’s app consent may reveal personal data about Y, and transmit user IDs to ad tracking companies • Canadian Privacy Commissioner: “Facebook should be doing much more to ensure that meaningful consent is duly obtained from users when developers access their personal information [and] technological safeguards that will not simply forbid, but effectively prevent, developers’ unauthorized access to personal information that they do not need.”
  • 9. Young people and privacy • Most young people see Internet as private space for talking to (already-known) friends, and target information to peer group • Lenhart et al. (2007) found stricter access controls on photos/videos by teens than adults (76% v 58% most of time/sometimes) • Teens showed higher privacy concerns with parental monitoring; parental discussions increased privacy concerns and reduced disclosure • Human impulse to connect and share information with friends, but when mediated can easily be replicated and spread to places never intended. Teens less good at managing collapsed contexts (boyd, Marwick) • Adult users of social media are developing similar behaviours – consequence of mediation, not age (Marwick et al. 2010)
  • 10. Young adults and privacy • Hoofnagle et al. (2010) found very limited understanding of privacy laws among young adults – 42% answered all 5 questions incorrectly • Jones et al. surveyed 7,421 students at 40 US colleges. 75% concerned about passwords, SSNs, credit card numbers but few about SNSes due to insignificant consequences (2009)
  • 11. Student information disclosure What kind of personal information do you post online? (first year N=177, final year N=133) Oostveen (2010)
  • 12. Sampling Facebook Experiences Facebook Application  Location disclosed to friends Server  Data are collected in our server  Questions are sent to participants Aims To understand: through SMS  Why do students share their location  How (text, picture)  When, to whom they Mobile phones carried by students share this location  Location retrieved with embedded GPS  At what locations are  Subjects answer questions (e.g., sharing choices) they more willing to share
  • 13. Location sharing • 40 participants responded to over 2000 questions over 2 weeks • Participants are more willing to share their location when they are in ‘Leisure’ or ‘Academic’ locations than in the ‘Library’ or in ‘Residential’ areas. Abdesslem, Parris & Henderson (2010)
  • 14. Privacy is contextual • “Contrary to the assumption … that people have stable, coherent, preferences with respect to privacy, we find that concern about privacy … is highly sensitive to contextual factors” • Privacy salience primes concerns • “People, it seems, feel more comfortable providing personal information on unprofessional sites that are arguably particularly likely to misuse it.” • “Covert inquiries … do not trigger concerns about privacy, and hence promote disclosure.” John, Acquisti and Loewenstein (2011)
  • 15. Homo economicus vs. sapiens • Bounded rationality • Privacy risks are highly probabilistic, cumulative, and difficult to calculate • Most individuals bad at deferred gratification, and have time-inconsistent preferences Acquisti (2009)
  • 16. How to further privacy in social networks? • Is the consent given when signing up for Facebook (and apps) good enough? Informed? “Explicit” for sensitive data? EC: “general principle of transparent processing”, “improving the modalities for the actual exercise of the rights of access, rectification”, “clarifying and strengthening the rules on consent” • Should current consent expose users to future risks? “The eternal memory of Google” vs. the “right to be forgotten”; “data portability” • Can T & C which exclude liability for privacy and security breaches be potentially void as unfair consumer terms? EC: “general personal data breach notification”, “extending the power to bring an action before the national courts”, “strengthening the existing provisions on sanctions” • EC: “further promoting the use of PETs and the possibilities for the concrete implementation of the concept of ‘Privacy by Design’”, “continue to promote the development of high legal and technical standards of data protection in third countries and at international level”
  • 17. Individuals ≠ data controllers • How sustainable is Lindqvist? • A29WP: “when access to a profile is provided to all members within the SNS or the data is indexable by search engines, access goes beyond the personal or household sphere.” • Better privacy protection by infomediaries? • Defaults/Nudges? • Expedited temporary restrictions on sharing?
  • 19. SNS market penetration Source: Le Monde, 15/5/08
  • 20. Is competition regulation required? • OpenSocial and related efforts may reduce switching costs, • but network effects will still act as a barrier to entry • vertical integration will limit consumer choice Competition authorities could: • impose ex ante interoperability requirements • upon dominant social utilities • between vertically integrated value chains • to minimise network barriers
  • 21. Three models Model 1: Must-carry obligations • on broadcasters and Electronic Programme Guides Model 2: API disclosure requirements • on Microsoft from DoJ and EC rulings Model 3: Interconnect requirements • on telcos, especially with SMP • for IM clients, from Time Warner/AOL merger case
  • 22. Model comparison • API disclosure requirements are necessary but not sufficient - ability to program platform apps is of little use if they cannot run • Must-carry obligations enable one platform to “break in” to another (eg Flickr app on Facebook) • Interconnect requirements most likely to lead to seamless user experience that will create real competition

Editor's Notes

  • #3: http://www.searchenginejournal.com/the-growth-of-social-media-an-infographic/32788/
  • #4: http://www.nytimes.com/2012/02/06/technology/06iht-rawdata06.html?pagewanted=all http://www.europe-v-facebook.org/fb_cat1.pdf
  • #5: http://www.searchenginejournal.com/the-growth-of-social-media-an-infographic/32788/ http://www.careerbuilder.co.uk/UK/share/aboutus/pressreleasesdetail.aspx?id=pr28&sd=1%2F13%2F2010&ed=12%2F31%2F2010
  • #6: http://online.wsj.com/article/SB10001424052748704648604575620750998072986.html
  • #9: http://ebiquity.umbc.edu/blogger/2010/10/17/wsj-many-facebook-apps-transmit-user-ids-to-advertising-tracking-companies/ http://www.gov2u.org/index.php/blog/157-a-german-state-which-unlikes-facebook https://www.datenschutzzentrum.de/presse/20110819-facebook-en.htm
  • #19: http://www.priv.gc.ca/cf-dc/2009/2009_008_0716_e.cfm