Abstract
This paper discusses the issue of privacy in social networks with respect to advances in machine learning. It shows how machine learning protocols have been developed both to enhance and secure privacy as well as to invade privacy and collect, analyze, predict data based on users’ information and experience online. The conflict between these two directions in machine learning is likely to lead to a system wherein machine learning algorithms are actively engaged in the subversion of one another, with one attempting to conceal data and the other attempting to uncover it. This paper concludes with recommendations for social networks and the issue of privacy regarding machine learning.
Introduction
Social networks have allowed an ocean of personal data to form that is now sitting there waiting for machine learning algorithms to collect it, analyze it, and recognize individuals on social media (Oh, Benenson, Fritz & Schiele, 2016). Machine learning algorithms are thus being used more and more in social networks to collect data on users and to assess their browsing and personal information—and in doing so they could soon be predicting someone’s recreational activities or political affiliation through a simple analysis of an individual’s social media use, such as posts on Twitter or the friends one has on Facebook (Lindsey, 2019). As a result, the privacy of individual social media users may be in jeopardy. This paper will review the findings of the related literature on this subject and discuss them and the recommendations for addressing this issue in the future.
Review of Literature
Privacy and information sharing may seem like two diametrically opposed concepts in the context of social media, and to a high degree they are. Mobile devices allow users to set information sharing settings that allow algorithms on other applications to identify a person’s location, habits, and view other information to personalize ads and so on. The information that is available for viewing by machine learning programs is enormous, and many users do not even realize it. Machine learning algorithms often know more about a user’s habits and choices than the user does. Bilogrevic et al. (2016) point out that “by analyzing people’s sharing behaviors in different contexts, it is shown in these works that it is possible to determine the features that most influence users’ sharing decisions, such as the identity of the person that is requesting the information and the current location” (p. 126). The problem is that users do not know how to articulate their own personal information settings desires, nor are these desires static. For that reasons Bilogrevic et al. (2016) created a program that uses machine learning AI to automatically set those settings based on user interaction on the Web, reducing the user’s worry about when it is appropriate to share information and when it is not. The program developed by Bilogrevic et al. (2016) will do it for them.
Such a program is one example of the way privacy concerns and machine learning advancements are meeting in the realm of social media. One reason it is needed is, as Oh et al. (2016) show, there is no such thing as privacy on the Internet, and AI is being developed to collect as much data on what is out there as possible. The implications for one’s privacy are enormous, especially as more and more people put their entire lives online (Oh et al., 2016). Yet while there are machine learning programs...
Internet: Privacy for High School Students An Analysis of Privacy Issues and High School Students in the United States Today In the Age of Information, the issue of invasion of privacy continues to dominate the headlines. More and more people, it seems, are becoming victims of identity theft, one of the major forms of privacy invasion, and personal information on just about everyone in the world is available at the click of
Physical Security in Public AreasAbstract/SummaryThis paper examines the effectiveness of physical security measures in public areas, by looking at spaces such as schools, airports, stadiums, and malls. It discusses current strategies, including surveillance cameras, metal detectors, and access control systems. It also examines the need customized approaches since all spaces are different. Schools require security that balances safety with an open, welcoming environment, whereas airports can use stricter, more invasive
Wealth of Networks Communication (general) It is said that the Western culture is going through some sort of cultural war in terms of communication and technology (Braman 153-182). The battlegrounds are seen in the courts, the legislatures, international bodies, local communities, and distant countries that individually may not have much power to affect the outcome though they do have a vital interest in who wins. The war is global -- and is
Integrating Technology in My High School Social Studies Classroom The utilization of technology in education has gained a lot of popularity in the recent years. Great enhancements in computer software and hardware in the past decades have been noted and this has resulted to the increase of computer integration in education. The employment of computers in education unlocks a fresh area of knowledge in addition to providing a means which has
Open source software has recently emerged as the frontrunner for many industries as the primary method of code production, as it is widely predicted to provide more options for its users in a quicker, quality improved, and cost effective format than the more traditional proprietary software. Linux, the dominant player in the market, is a considerable threat to the Microsoft operating system, which has successfully established itself in the global
Pedagogic Model for Teaching of Technology to Special Education Students Almost thirty years ago, the American federal government passed an act mandating the availability of a free and appropriate public education for all handicapped children. In 1990, this act was updated and reformed as the Individuals with Disabilities Education Act, which itself was reformed in 1997. At each step, the goal was to make education more equitable and more accessible to
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now