Business Improvement and Social media
23.3K views | +3 today
Follow
Your new post is loading...
Your new post is loading...
Rescooped by Ricard Lloria from Arquitecturas digitales del aprendizaje para una educación 4.0
Scoop.it!

2023 01 27 CDT Defending Data Privacy Protection-Independent Researchers and Access to Social Media Data

The Center for Democracy & Technology (CDT) is a 28-year-old 501(c)3 nonpartisan nonprofit organization that fights to put democracy and human rights at the center of the digital revolution. It works to promote democratic values by shaping technology policy and architecture, with a focus on equity and justice. The organization is headquartered in Washington, D.C. and has a Europe Office in Brussels, Belgium.

Via Oskar Almazan
Oskar Almazan's curator insight, February 18, 2023 12:25 PM
Access to social media data by independent researchers is at the forefront of efforts to improve tech transparency. Article 40 of the European Union’s Digital Services Act (DSA) requires providers of very large online platforms and very large online search engines to provide vetted researchers with access to data, subject to certain conditions. In the United States, lawmakers are considering several bills, which vary in their details, that would require social media companies to provide data to researchers.

The report recommends that US lawmakers, in particular, may want to consider: Restricting access to research tools that offer public data, such as APIs, to vetted researchers. Requiring government entities to seek access to data subject to the Stored Communications Act only from providers of an electronic communications service or remote computing service subject to the Act’s requirements, and not from a researcher when the researcher obtained such data under a researcher access to data law. Requiring law enforcement agents to obtain a warrant, supported by probable cause, before they may access social media data obtained by researchers under a researcher access to data law, in addition to (2) (with respect to data not covered by the Stored Communications Act) or as an alternative to (2). Prohibiting researchers from voluntarily disclosing data. Enacting a federal shield law and expanding state shield laws to clearly cover researchers. The report recommends that EU lawmakers, in particular, may want to consider: Requiring data sharing agreements that prohibit researchers from sharing data with any other party unless legally obligated to do so. Additional transparency obligations for social media platforms and independent researchers.

Rescooped by Ricard Lloria from MarketingHits
Scoop.it!

Infographic - What Permissions Apps & Websites Ask for When You Connect

Infographic - What Permissions Apps & Websites Ask for When You Connect | Business Improvement and Social media | Scoop.it
Facebook users have scanned with MyPermissions to find out what third party apps and websites have access to their information and just what permissions they have granted. We've created this infogr...

Via Gust MEES, Brian Yanish - MarketingHits.com
Rescooped by Ricard Lloria from visualizing social media
Scoop.it!

Infographic: 13% of social media users are identity theft victims

Infographic: 13% of social media users are identity theft victims | Business Improvement and Social media | Scoop.it

The tension between the monetization of social networks and people’s desire for privacy is something that doesn’t show any signs of resolving. The most valuable thing that social networks have is your information, and this infographic does a good job of vetting out where your information is and how vulnerable we all are because of it.


Via Lauren Moss
2DiFore Marketing Solutions's curator insight, September 24, 2013 8:29 AM

This is a great reminder to be careful what you post and what you share on your social media platforms.

UnkleFrank's curator insight, September 24, 2013 11:38 AM

Identity theft!

Iron Dane Richards's comment, September 26, 2013 10:12 AM
Its a shame that we have so much internet identity theft in this digital age. One solution I highly recommend to many of our clients is the use of prepaid debit cards in order to minimize potential loss with like a Walmart, Netspend or Bancorp Prepaid Visa or Mastercard for online purchases and link that even further through a paypal debit card. Our website has links to business cards also http://ironsolutionsgroup.com/business-credit-cards/
Rescooped by Ricard Lloria from visualizing social media
Scoop.it!

How and Why Social Engineering Works [Infographic]

How and Why Social Engineering Works [Infographic] | Business Improvement and Social media | Scoop.it

For many people in today’s world, being “online” has become a constant status. High-speed internet, smart phones and tablet PC’s have enabled us to stay connected whenever and wherever we are.

Social hackers capitalize on vulnerabilities when it comes to keeping personal details private, and the problem has only seemed to get worse as the digital age has developed.

Techniques as simple as looking over a shoulder as someone enters bank details or passwords are often used, as well as sending out deceiving emails ridden with malware and viruses that can take control of your computer. Hackers pose as a trusted entity in email blasts that utilize mind tricks to get the viewer to click on the link that will trigger the infection of your computer.

Everyone with an internet connection is vulnerable, and public awareness is the first step in ending this growing problem...


Via Lauren Moss
No comment yet.