Privacy, Social Network Theory and Patterns of Information Revelation on Linkedin

Privacy, Social Network Theory and Patterns of Information Revelation on Linkedin

iS CHANNEL Privacy, Social Network Theory and Patterns of Information Revelation on LinkedIn Marta Stelmaszak MSc Management of Information Systems and Innovation (2013/2014) Department of Management London School of Economics and Political Science KEYWORDS ABSTRACT Online Social Networks Online social networks and privacy are often discussed in relation to Facebook or other similar predominantly social platforms (e.g. Friendster). LinkedIn, de- Social Network Theory spite many public concerns about privacy, rarely is the scope of research, though Privacy privacy breaches have been identiied coming from other users, the service Information Revelation provider and third-party applications. The scope of this paper is to analyse pri- vacy aspects on LinkedIn in relation to potential risks coming from other users LinkedIn through the application of the social network theory and the analysis of patterns of information revelation on LinkedIn. Following a detailed analysis of LinkedIn proiles and information revealed to diferent degree of connections, a range of indings is presented, including the increase in polarisation of connections, a substantial increase in the number of weak ties, an unprecedented number of connections, as well as potential risks arising from the degree of identiiability, type of information revealed and visibility of information on LinkedIn. Introduction and its purpose is to atract potential connections or job prospects, unlike on Facebook. Though privacy concerns on LinkedIn may not mainly cover the type “LinkedIn has slipped under the radar when it comes to or nature of information revealed, they are present, privacy controls and transparency (…). Everyone points to often causing uproar among members and in nation- Google, Apple and Facebook and prety much stops there.” wide media. In 2014, the most recent controversy (Veldt, 2013) surrounded third-party web browser plug-in software causing unwanted exposure of LinkedIn email LinkedIn, an online social network (OSN) for addresses leading to privacy issues (BBC, 2014). In professionals, was created in 2002 by Reid Hofman 2013, over 5,000 LinkedIn members signed a petition to allow the creation of personal brands and to LinkedIn to request a blocking function preventing identiication online (Lacter, 2009). In 2014, unwantedthe individuals from viewing proiles due to network boasts over 277,000,000 registered membersstalking incidents (Change.org, 2013). Introduced in (LinkedIn, 2014). Though mainly designed to facilitate2013 and quickly abandoned after a severe public professional networking, LinkedIn invites membersreaction, the Intro function in iOS Mail is believed to to add professionally-relevant information about have intercepted emails, added HTML to pull in extra themselves, such as education, skills, present and past information from LinkedIn and displayed it without employment, as well as to share updates of activity. In users’ permission (Sherman, 2013). other words, upon signing to this OSN members are assigned personal proiles which they are encouraged In 2010, the founder of LinkedIn himself caused a to ill out with details of their professional identities controversy after claiming at Davos Annual Meeting and then connect with other members with whom that “privacy is for old people” (YouTube, 2010). they have something in common. Due to the purpose Many commentators concluded that such an atitude of the network, as well as the nature of information should cause concern over how LinkedIn approaches shared, LinkedIn has not been as closely scrutinised privacy in general (Cendella, 2011; Cavoukian, 2011). as other OSNs, such as Facebook, in terms of user privacy and information transparency. This paper aims to examine the issues of privacy on LinkedIn in the light of social network theory (SNT) It seems to be widely accepted by members that and paterns of information revelation (IR). In general, information shared on this OSN is by default visible privacy breaches on OSNs may originate from service providers, from other users or third-party apps (Gao et al., 2011). This paper concentrates on analysing Corresponding Author how the design of LinkedIn as an OSN impacts IR Email Address: [email protected] (M. Stelmaszak) to other users in the light of SNT. Further, the paper iSCHANNEL 9(1): 11-17 11 iS CHANNEL analyses what degree of information revelation and & Ellison, 2007, p. 211). control over privacy is allowed on LinkedIn and to what extent it is used by members. Some authors argue that the development of OSNs “added a new dimension to the way that organisations The irst part of this paper provides a review of search or investigate people” (Qi & Edgar-Nevill, literature on key themes concerning this subject, 2011: 74). A study quoted in the paper, conducted by including privacy and privacy breaches on OSNs, CareerBuilder.com in June 2009 suggests that more social networking searching, as well as social network than 45% of managers who participated in the survey theory. In the second part the paper outlines two main used ONSs to seek information on job candidates theoretical frameworks used to analyse the issue of (Haefner, 2009). It is claimed that users’ sharing a privacy on LinkedIn, namely the privacy aspect of variety of information on OSNs raises concerns about social network theory and paterns of information organisations’ access to personally identiiable data revelation. The third part of the paper consists of an (Qi & Edgar-Nevill, 2011). empirical study of 15 proiles of LinkedIn members. The results of the study are presented and analysed, The stream of research in human resources on using followed by a summary of indings. social media for recruitment cannot be ignored, as it often aims at explaining why certain pieces Literature Review of information are revealed by OSNs members. Some researchers analyse the biases of OSNs on the Privacy and Privacy Breaches on OSNs recruitment and selection procedures (Caers and Castelyns, 2010). In this context, the study conducted The research in privacy and privacy risks on OSNs by the authors reveal that the majority of active has gained momentum with the development of LinkedIn members deem the network suited to be Facebook and Twiter. One of the main topics in this informed on friends’ career developments (85.1%), body of literature aims at deining privacy in the ind updates on other organisations (57.8%) and make context of OSNs, as researchers believe that current professional connections (47%) (Caers and Castelyns, deinitions of privacy may not relect new setings 2014: 442). and challenges (Tomlinson et al., 2010). Therefore authors analysing privacy on OSNs often refer to Social Network Theory more traditional deinitions of privacy and apply them to the online world. A large and relevant body of research for the purposes of this paper stems from the sociological study of A group of researchers argues that privacy can be seen social networks and its application to online social as control of the access to self (referring to Warren and networking sites. Social network theory is primarily Brandeis, 1890; Altman, 1975; DeCew, 1997; Solove, concerned with the study of actors (nodes) and 2006; Houghton and Joinson, 2010). Due to the lack networks they create (links), as well as the relevance of a uniied and simple deinition of privacy, some of the depth and strength of social networks. Some of authors (Tomlinson, Yau, MacDonald, 2010) analyse the main ideas within this theory concern sociological privacy on OSNs following developed dimensions of questions about relationships, such as connections privacy (such as Westin, 1967; Marshall, 1972, 1974; (e.g. Feld and Carter, 1998; Festinger et al., 1950), Pedersen, 1979; Burgoon et al., 1989). homophily (e.g. McPherson, Smith-Lovin &Cook, 2001), distance between nodes (e.g. Freeman & Some authors (Houghton and Joinson, 2010) suggest Linton, 1992). that within the context of OSNs, privacy can be deined as “the claim of individuals, groups, or institutions SNT has been applied to ONSs and the issue of to determine for themselves when, how and to what privacy by a number of researchers. Most notably, extent information about them is communicated to Gross and Acquisti (2005) employ SNT to study others” (Westin, 1967: 7). This stream of literature information revelation and privacy in online social provides a thorough and acceptable deinition of networks using the example of Facebook. Similarly, privacy for the purposes of this paper relecting the following the assumptions of SNT, Houghton and purpose and mechanics behind LinkedIn. Joinson note a range of phenomena occurring on OSNs, such as convergence of relationships or Social Network Searching interconnectivity (2010). While their research largely concerns Facebook, this paper follows similar Another source of literature relevant to the topic theoretical frameworks to analyse LinkedIn. to provide the understanding of the use and type of information revealed on LinkedIn stems fromTheoretical Framework the study of social network searching. As OSNs can be deined as platforms allowing individuals to “construct a public or semi-public proile withinFor the purposes of this paper and due to the nature a bounded system, articulate a list of other users of LinkedIn, the deinition of privacy accepted here with whom they share a connection and view and follows researchers identifying privacy on OSNs as transverse their list of connections and those made by control information about the self revealed to other others within the system, OSNs allow for increased members of a social network (e.g. Houghton & beneits and threats arising from searchability” (Boyd Joinson, 2010). 12 M. Stelmaszak / iSCHANNEL 9(1): 11-17 iS CHANNEL As outlined in the introduction, this paper employs their identities (e.g. dating sites, where often two theoretical frameworks to analyse the issues only the irst name of a user is revealed in the around privacy on LinkedIn, namely social network network). theory and information revelation. SNT has been applied in the context of OSNs before with particular • Second observation covers the type of atention to Facebook and provided a range of valid information revealed or elicited.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    7 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us