{"id":1349,"date":"2013-03-01T14:37:32","date_gmt":"2013-03-01T19:37:32","guid":{"rendered":"http:\/\/www.kaspersky.co.in\/blog\/?p=1349"},"modified":"2020-02-26T20:25:37","modified_gmt":"2020-02-26T14:55:37","slug":"privacy-a-major-concern-for-users-of-facebook-google-and-twitter","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/privacy-a-major-concern-for-users-of-facebook-google-and-twitter\/1349\/","title":{"rendered":"Privacy a Major Concern for Users of Facebook, Google and Twitter"},"content":{"rendered":"<p>While people remain really willing to share details of their lives via social media platforms such as <a href=\"https:\/\/www.kaspersky.co.in\/blog\/defend-privacy-facebooks-graph-search\/\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>, <a href=\"https:\/\/threatpost.com\/en_us\/blogs\/twitter-complied-69-us-government-requests-account-data-012813\" target=\"_blank\" rel=\"noopener nofollow\">Twitter<\/a> and Google Plus, the chief <a href=\"https:\/\/www.kaspersky.co.in\/blog\/tag\/privacy\/\" target=\"_blank\" rel=\"noopener\">privacy<\/a> officers at those companies say they\u2019re hearing more questions about how their personal data is being used and want answers on how to better maintain <a href=\"https:\/\/www.kaspersky.co.in\/blog\/tag\/privacy\/\" target=\"_blank\" rel=\"noopener\">privacy<\/a>.<\/p>\n<p>\u201cIt\u2019s about being sensitive to users and understanding their priorities,\u201d said Google senior corporate counsel for <a href=\"https:\/\/www.kaspersky.co.in\/blog\/tag\/privacy\/\" target=\"_blank\" rel=\"noopener\">privacy<\/a> Keith Enright during a discussion on <a href=\"https:\/\/www.kaspersky.co.in\/blog\/tag\/privacy\/\" target=\"_blank\" rel=\"noopener\">privacy<\/a> at the RSA Conference in San Francisco this week. \u201cOne consistent theme is that users are concerned about financial fraud and identity theft.\u201d<\/p>\n<p>Google has taken proactive security steps across its services, such as adding SSL encryption and the option to use a second form of <a href=\"https:\/\/threatpost.com\/en_us\/blogs\/google-enables-gmail-two-factor-security-150-countries-072811\" target=\"_blank\" rel=\"noopener nofollow\">authentication for logging in to Gmail accounts<\/a>. Not only do these initiatives make services more secure, but keep users\u2019 personal information and ultimately their <a href=\"https:\/\/www.kaspersky.co.in\/blog\/tag\/privacy\/\" target=\"_blank\" rel=\"noopener\">privacy<\/a> intact.<\/p>\n<p>Facebook chief <a href=\"https:\/\/www.kaspersky.co.in\/blog\/tag\/privacy\/\" target=\"_blank\" rel=\"noopener\">privacy<\/a> officer Erin Egan understands her company is a lightning rod for <a href=\"https:\/\/www.kaspersky.co.in\/blog\/tag\/privacy\/\" target=\"_blank\" rel=\"noopener\">privacy<\/a> concerns. \u00a0Not only are its users and their data the company\u2019s principal product, but new features such as <a href=\"https:\/\/www.kaspersky.co.in\/blog\/defend-privacy-facebooks-graph-search\/\" target=\"_blank\" rel=\"noopener\">Facebook Graph Search<\/a> which enables very narrow, plain English searches, have security professionals nervous. Attackers, experts say, have been given yet another tool to mine social media and build victim profiles for phishing and spam campaigns, and ultimately targeted attacks that can result in identity theft and a host of other bad consequences.<\/p>\n<p>Egan said her teams are injected from the ground up on product development, including cross-functional internal organizations that include information security and legal.<\/p>\n<p>\u201cWe look at every product feature as a team and look at all of the complexities (regulatory and legal) and analyze them together,\u201d Egan said. \u201cThe way to manage and understand all of those complexities is to bring in experts in each area to analyze each product and feature review.\u201d<\/p>\n<p>Yet with targeted advertising still the company\u2019s main revenue source, and innovation such as location-based services serving even further targeted ads and marketing, companies are examining the possibilities of contextual privacy interfaces which present users with privacy choices based on what they\u2019re engaged in in real time.<\/p>\n<div class=\"pullquote\">Yet with targeted advertising still the company\u2019s main revenue source, and innovation such as location-based services serving even further targeted ads and marketing, companies are examining the possibilities of contextual <a href=\"https:\/\/www.kaspersky.co.in\/blog\/tag\/privacy\/\" target=\"_blank\" rel=\"noopener\">privacy<\/a> interfaces which present users with <a href=\"https:\/\/www.kaspersky.co.in\/blog\/tag\/privacy\/\" target=\"_blank\" rel=\"noopener\">privacy<\/a> choices based on what they\u2019re engaged in in real time.<\/div>\n<p>\u201cIt will come down to contextual controls at the moment people are engaging with a service where they can determine what they want to share at that moment,\u201d Egan said.<\/p>\n<p>Location-based services make <a href=\"https:\/\/www.kaspersky.co.in\/blog\/tag\/privacy\/\" target=\"_blank\" rel=\"noopener\">privacy<\/a> advocates nervous. With these services in place, users could be fed automated marketing to a smartphone, for example, based on a physical location. Google\u2019s Enright said there are ways to maintain a user\u2019s expectation of <a href=\"https:\/\/www.kaspersky.co.in\/blog\/tag\/privacy\/\" target=\"_blank\" rel=\"noopener\">privacy<\/a> and still deliver on business goals.<\/p>\n<p>\u201cI do think there is a continuum of considerations with location-based services associated with anonymous identifier that are transient and could allow us to deliver services in a privacy sensitive way,\u201d Enright said. \u201cOther persistent anonymous identifier, meanwhile, can deliver more services and follow that same continuum where you are a logged in user and want location-based services optimized for you.<\/p>\n<p>\u201cIt\u2019s all about user expectations and building a product that\u2019s useful for users that they want to engage with.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While people remain really willing to share details of their lives via social media platforms such as Facebook, Twitter and Google Plus, the chief privacy officers at those companies say<\/p>\n","protected":false},"author":32,"featured_media":1350,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[43,211],"class_list":{"0":"post-1349","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-privacy","9":"tag-social-media"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/privacy-a-major-concern-for-users-of-facebook-google-and-twitter\/1349\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/privacy-a-major-concern-for-users-of-facebook-google-and-twitter\/1349\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/privacy-a-major-concern-for-users-of-facebook-google-and-twitter\/1349\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/privacy-a-major-concern-for-users-of-facebook-google-and-twitter\/1349\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/privacy-a-major-concern-for-users-of-facebook-google-and-twitter\/1349\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/privacy-a-major-concern-for-users-of-facebook-google-and-twitter\/500\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/privacy-a-major-concern-for-users-of-facebook-google-and-twitter\/1349\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/privacy-a-major-concern-for-users-of-facebook-google-and-twitter\/1349\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/privacy\/","name":"privacy"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/1349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=1349"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/1349\/revisions"}],"predecessor-version":[{"id":18732,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/1349\/revisions\/18732"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/1350"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=1349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=1349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=1349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}