Policy gaps and technological deficiencies in social networking environments: Implications for information sharing

South African Journal of Information Management

 
 
Field Value
 
Title Policy gaps and technological deficiencies in social networking environments: Implications for information sharing
 
Creator Mutula, Stephen M.
 
Subject Education Social media; Social networks; Africa; Ethics; Information Sharing
Description Background: With the growing adoption and acceptance of social networking, there are increased concerns about the violation of the users’ legitimate rights such as privacy, confidentiality, trust, security, safety, content ownership, content accuracy, integrity, access and accessibility to computer and digital networks amongst others.Objectives: The study sought to investigate the following research objectives to: (1) describe the types of social networks, (2) examine global penetration of the social networks, (3) outline the users’ legitimate rights that must be protected in the social networking sites (SNS), (4) determine the methods employed by SNS to protect the users’ legitimate rights and (5) identify the policy gaps and technological deficiencies in the protection of the users’ legitimate rights in the SNS.Method: A literature survey and content analysis of the SNS user policies were used to address objective four and objective five respectively.Results: The most actively used sites were Facebook and Twitter. Asian markets were leading in participation and in creating content than any other region. Business, education, politics and governance sectors were actively using social networking sites. Social networking sites relied upon user trust and internet security features which however, were inefficient and inadequate.Conclusion: Whilst SNS were impacting people of varying ages and of various professional persuasions, there were increased concerns about the violation and infringement of the users’ legitimate rights. Reliance on user trust and technological security features SNS to protect the users’ legitimate rights seemed ineffectual and inadequate.
 
Publisher AOSIS
 
Contributor None
Date 2013-06-04
 
Type info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion — Literary analysis
Format text/html application/octet-stream text/xml application/pdf
Identifier 10.4102/sajim.v15i1.542
 
Source SA Journal of Information Management; Vol 15, No 1 (2013); 9 pages 1560-683X 2078-1865
 
Language eng
 
Relation
The following web links (URLs) may trigger a file download or direct you to an alternative webpage to gain access to a publication file format of the published article:

https://sajim.co.za/index.php/sajim/article/view/542/626 https://sajim.co.za/index.php/sajim/article/view/542/627 https://sajim.co.za/index.php/sajim/article/view/542/628 https://sajim.co.za/index.php/sajim/article/view/542/625
 
Coverage Africa Information age Social media providers
Rights Copyright (c) 2013 Stephen M. Mutula https://creativecommons.org/licenses/by/4.0
ADVERTISEMENT