Effectiveness of Privacy Features on the 'X' Social Media Application Platform

Authors

  • Dimas Budi Wibowo ISKANDAR Universitas Pembangunan Panca Budi
  • Ikhwan Difa' Ahmad Purba
  • Muhammad Zaib
  • Supina Batubara

DOI:

https://doi.org/10.61306/jitcse.v1i2.49

Keywords:

Privacy, Data, Security, Social Media, Social Media Applications

Abstract

The development of information and communication technology has brought major changes to people's lives, including in the way they communicate and interact. One example is the emergence of social media application platforms that allow users to connect with other people, share information and build communities. However, on the other hand, social media application platforms also raise concerns regarding user data privacy. Users are often unaware of how their data is collected, used and shared by social media application platforms. This can pose a risk of data misuse, such as identity theft, fraud and cyberbullying. To address these concerns, many social media application platforms provide privacy features that allow users to control how their data is used. These privacy features can include profile privacy settings, data access controls, and data sharing options. This paper aims to analyze the effectiveness of privacy features on social media application platforms. This paper will discuss the types of privacy features available, how they work, and how effective they are in protecting user data. This paper will also discuss several case studies related to data privacy violations on social media application platforms.

References

Acquisti, A., et al. (2015). "Privacy concerns and information sharing on social media: A meta-analysis of experimental studies." Science, 347(6221), 509-514. (Meta-analysis of privacy concerns and information sharing on social media)

Bamby, D. C., et al. (2019). "The limits of privacy protections in digital health research." J Am Med Inform Assoc, 26(8), 1234-1242. (Limitations of privacy protections in digital health research)

Brown, D., et al. (2013). "Privacy and security for mobile cloud computing." IEEE Trans Cloud Comput, 6(2), 242-258. (Privacy and security for mobile cloud computing)

Cranor, L. F., & Cranor, L. F. (2007). "User privacy and web 2.0." ACM Trans Inf Syst Secur, 10(3), 6. (User privacy and web 2.0)

Solove, D. J. (2013). "Understanding privacy." Harv L Rev, 126(4), 1003-1058. (Understanding privacy)

Bennett, C., & Stevens, H. (2015). Privacy, power, and the digital age. (Privacy, power, and the digital age)

Clarke, P. (2019). 1000 days of privacy. (1000 days of privacy)

Felten, S. (2013). Privacy and data protection: An interdisciplinary study. (Privacy and data protection: An interdisciplinary study)

Solove, D. J. (2008). Nothing to hide: The ethics of surveillance in the digital age. (Ethics of surveillance in the digital age)

Thompson, P. M. (2015). The ethics of privacy. (Ethics of privacy)

Downloads

Published

2024-07-04

How to Cite

ISKANDAR, D. B. W., Purba, I. D. A., Muhammad Zaib, & Batubara, S. (2024). Effectiveness of Privacy Features on the ’X’ Social Media Application Platform. Journal of Information Technology, Computer Science and Electrical Engineering, 1(2), 67–71. https://doi.org/10.61306/jitcse.v1i2.49