Potential any missing information on their profile. This is

Potential IT andindustry implications of privacy and social mediaFor the ITindustry, privacy is one of the important steps to take action on as the socialnetworking services must be aware of reputational, legal and operational risks.This includes the services collecting a user’s data and not passing theirinformation to a third-party. The companies must take a proactive approach tomanaging privacy issues in order to keep the networks secure for the users andprevent hackers from creating an invasion of privacy using malware (Essink& Müller, 2016)Some of theseimplications of privacy include identify theft and phishing.

Rainey Reitman(2010), says the hackers can view private profiles however these photos can besearchable using tags on their photo captions and from this, the cybercriminalscan have access to the photos. However he also said that some users haverestrict to their social media profiles and have control to their profilerather than the website’s engineers. The cybercriminals also tend to useshortened URLs to trick their victims into visiting harmful sites or to injectviruses into their computers or mobile phones. Hackers also use spyware to gatherpasswords from users in order to access their account on social media (Cohen,2017).Bethany Brookshire,a blogger for ScienceNews (2017), claims that privacy is no longer a personalchoice.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

She made this statement as some sites has the user’s informationwithout being aware that is being shared on their profile. This happened due abug found on Facebook back in 2013 which shared the e-mail address and phonenumber of some users with all of their friends despite that their personaldetails were private. This include that some users have noticed that theirphone numbers were attached to their Facebook profile even though they havenever entered their number when registering to the site. This is becauseFacebook collected the users from contact lists which were provided by theirfriends which allowed the site to fill any missing information on theirprofile. This is known as a “shadow profile”.  Brookshire also stated that this kind of bugcan be re-enacted on other social networking sites. She noted down that thisbug can also predict information such as the user’s marital status and sexualorientation by stating that married people are normally friends with othermarried couples on the sites and gay men are more likely to be friends withother gay men. This implies that these sites can collect the user’s informationdespite them not adding their information on their profiles.

To prevent theseissues happening, Gail-Joon Ahn (2011) says the sites must bring a depth of securityexperience form multiple security domains and technologies in order to protectthe user’s information that is only visible to friends and ensure a safebrowsing for the users by sharing content to others without requiring them tobe friends on the site.