shadow profile
   HOME

TheInfoList



OR:

Shadow profile describes the situation when users' or non-users' information is collected without their consent. One of the most discussed cases of shadow profiling is on
Facebook Facebook is an online social media and social networking service owned by American company Meta Platforms. Founded in 2004 by Mark Zuckerberg with fellow Harvard College students and roommates Eduardo Saverin, Andrew McCollum, Dustin M ...
, which is reported to collect information on people which they did not provide.


Shadow profile's history

Early in 2012, a data breach of over six million Facebook users' personal information indicated the existence of shadow profiles, since the leaked information was not provided by users themselves. After this, Facebook started to combine user's shadow profiles with their public profiles. The combined profiles were then further shared with the users' friends if they used Facebook's Download Your Information (DYI) tool.


Shadow profile's influence


Positive influences

Benefits brought by shadow profile related behaviors include a more efficient way of data collection and anomaly behaviors detection. Some other researches show that integrated conceptualizations of Internet Privacy Concerns (IPC) have several implications: the third-order factor of IPC can differentiate the relation between IPC and other constructions and allows both website users and managers to analyze the importance of various privacy contexts.


Negative influences

Possible harms to users from privacy and information leakage include collection of sensitive data like financial account numbers, health information and precise geolocation. For instance, in the 21st century, the workplace is one of the many social establishments where employees perform in a given and defined condition. As a result, a blurred line emerged between workspace and personal space. Even when people knowingly share their thoughts online through comments or likes, their traces can affect real live events such as recruiting decisions due to the surveillance conducted by employers.


Possible privacy issue factors

Users upload a large amount of personal information onto online spaces, a phenomenon described by many researchers as users' lax attitude. Possible explanations for these behaviors are a combination of high gratification, usage patterns, and a psychological mechanism similar to
third-person effect The third-person effect hypothesis predicts that people tend to perceive that mass media messages have a greater effect on others than on themselves, based on personal biases. The third-person effect manifests itself through an individual's overe ...
. Users themselves are sometimes found as the reason of information leakage. To generate more customized results, sometimes users are willing to share their information with Internet of Things (IoTs) for their own convenience. Other circumstances that users would share their information is when they feel anxious, concerned, or able to protect themselves from privacy invasion, the more likely they will conduct privacy protection behavior. In other words, when users feel no control over privacy invasion, they are less likely to protect their information. There are also researchers who argue that there is a correlation between information leakage and companies' cooperation with third-parties. Online platforms would need to find a balance between the monetization with third-parties and managing users' private information, and a study shows that higher privacy concerns from users would drive up publisher websites’ decision making and third party market structures, such that higher privacy concerns lead to higher industry concentration. Even more, different situations and environmental factors while conducting online behaviors are highly likely to influence people's behaviors, and may lead to rational/irrational decision makings. In terms of protection from the officials, by drawing reference to case law on Article 8 of the
European Convention Several bodies or treaties are known as European Convention. Bodies of the European Union * European Convention (1999–2000) which drafted the: ** ''Charter of Fundamental Rights of the European Union'' (2000 / 2009) * Convention on the Future of ...
on
Human Rights Human rights are Morality, moral principles or Social norm, normsJames Nickel, with assistance from Thomas Pogge, M.B.E. Smith, and Leif Wenar, 13 December 2013, Stanford Encyclopedia of PhilosophyHuman Rights Retrieved 14 August 2014 for ce ...
, some researchers conclude that the current law cannot adequately address the issue of privacy nor provide protection for open source.


Possible privacy issue solutions

To address the issue of leaking personal information there exist multiple facets. One category of the solution suggests focus on users. One of the argued solutions points out the inefficiency of privacy terms that companies use to ask for users' consent, such that they are sometimes too lengthy (Facebook's privacy terms has 9,500 words), involved with professional vocabularies that only few would fully understand or the users do not understand who are the other parties they are granting their information to. As a result, one of the solutions is to advance the privacy terms by making them easy to read and understand. In addition, the conversation among users is another factor that leads to information leakage, such that people share their information with each other but they become incapable of controlling over the spread of that information afterwards. Thus some argue that instead of focusing on what companies can do to provide a clearer picture of the possible information access, users themselves should be the primary target of controlling over their personal information online and this would work as an efficient way to ease both companies' and consumers' concerns with data collection. Another proposed argument also emphasizes the focus on users, which claims that by making users fully aware of what they are doing online and the logistics behind online behaviors, they will put more trust into the virtual world and would take care of their personal information even more. Instead of focusing on users, some others suggest the interdependent relationship between users and online platforms or companies, and the social contract between them: while companies collect personal data and feedback from users, users would benefit from the modified functional improvements. As a result, as companies are not merely the side notifying users about the privacy norms but being a contractor responsible for maintaining a mutually beneficial relationship with users, the privacy tension is eased.


See also

*
Internet privacy Internet privacy involves the right or mandate of personal privacy concerning the storing, re-purposing, provision to third parties, and displaying of information pertaining to oneself via Internet. Internet privacy is a subset of data privacy. Pr ...
*
Communication privacy management theory Communication privacy management (CPM), originally known as communication boundary management, is a systematic research theory designed to develop an evidence-based understanding of the way people make decisions about revealing and concealing priva ...
*
Participatory surveillance Participatory surveillance is community-based monitoring of other individuals. This term can be applied to both digital media studies and ecological field studies. In the realm of media studies, it refers to how users surveil each other using the ...


References

{{reflist Facebook Google Information privacy Internet privacy