Abstract
This chapter discusses the new realities of global computer online social network ecosystems, including moral and ethical dilemmas. Because we believe that a sound and detailed discussion of online social networks is based on a good understanding of the underlying network infrastructure, we start the chapter with a brief discussion of the computer network infrastructure. Based on this communication infrastructure, we define a social network and its subset, the online social network. We discuss the types of social networks, their historical development, and the different and changing services of online social networks. After discussing the basics of online social networks, we then focus on ethical, social, and privacy issues in the online social network noting that while online, we inevitably give off our information to whomever asks for it in order to get services. We note further that routinely information collected from online community members, however, is not always used as intended. It is quite often used for unauthorized purposes, hence an invasion of privacy. We discuss known ways we give off vital personal information while online in social networks. We further discuss ways to protect personal privacy. On the central point of ethical implications of life in the social network, we note that unlike in the traditional network, governance is not centralized, but community based with equally shared authority and responsibility by all users. But the mechanisms are not yet defined, and where they are being defined, it is still too early to say whether they are effective. The complexity, unpredictability, and lack of central authority are further enhanced by the concepts of telepresence and immersion, virtual personality, anonymity , and multiple personalities. These issues are at the core of the social and ethical problems in online social networks in particular and cyberspace in general; the larger and more numerous these communities become, the more urgent the ethical concerns become.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Fox R (2000) News track: age and sex. Commun ACM 43(9):9
Bylaws for internet corporation for assigned names and numbers. ICANN, 8 April 2005. www.icann.org/general/bylaws.htm
Evolving the high performance computing and communications initiative to support the nation’s information infrastructure—executive summary. http://bwlampson.site/55-BrooksSutherland/55-BrooksSutherlandOCR.htm
Kizza JM (1999) Ethical and social issues in the information age. Springer, London
Kizza JM (2011) Computer network security and cyberethics, 3rd edn. McFarland Publishers, Jefferson
Monica Chew Dirk Balfanz Ben Laurie. (Under)mining privacy in social networks. http://www.w2spconf.com/2008/papers/s3p2.pdf
Krishnamurthy B, Wills C. Characterizing privacy in online social networks. https://www.researchgate.net/publication/234818903_Characterizing_Privacy_in_Online_Social_Networks
Schroeder S. Facebook facing $138,000 fine for holding deleted user data. http://mashable.com/2011/10/21/facebook-deleted-data-fine/
Wikipedia: cyberstalking. http://en.wikipedia.org/wiki/Cyberstalking
Cyberbullying statistics. i-SAFE Foundation. https://www.isafe.org/outreach/media/media_cyber_bullying
Young K (1998) Internet addiction: the emergence of a new clinical disorder. Cyberpsychol Behav 1(3):237–244
Misquittaa N. Psychiatry and society in pune. http://blog.pathfinderclinic.com/2011/01/how-to-stop-copycat-suicides-in.html
EVANS v. BAYER. Case No. 08-61952-CIV-GARBER. LEAGLE, 12 Feb 2010
FBI’s Top 5 Cybercrimes. AICPA. https://www.aicpa.org/InterestAreas/ForensicAndValuation/Resources/ElectronicDataAnalysis/DownloadableDocuments/Top-5-CyberCrimes.pdf
Kizza JM (2005) Network security. Springer, New York
Tittel E (2002) Understanding security policies. INFORMIT, 25 Jan 2002
Hayes B. Conducting a security audit: an introductory overview. https://www.symantec.com/connect/articles/conducting-security-audit-introductory-overview
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Kizza, J.M. (2017). Ethical, Privacy, and Security Issues in the Online Social Network Ecosystems. In: Ethical and Social Issues in the Information Age. Texts in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-70712-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-70712-9_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-70711-2
Online ISBN: 978-3-319-70712-9
eBook Packages: Computer ScienceComputer Science (R0)