Essentials of MIS (13th Edition)
Essentials of MIS (13th Edition)
13th Edition
ISBN: 9780134802756
Author: Kenneth C. Laudon, Jane Laudon
Publisher: PEARSON
bartleby

Concept explainers

Question
Book Icon
Chapter 4, Problem 15CSQ
Program Plan Intro

Facebook:

Facebook is a standard open social networking website that permits recorded users to make profiles, upload photos and videos, send message and keep in touch with friends, and also includes public features.

Explanation of Solution

Factors contributed to the weaknesses of Facebook’s privacy policies and features are as follows:

People:

  • The survey says, 93% of people trust that Internet companies must be compulsory to ask permission before using their personal information and 72% of people need the capacity to opt out of online tracking.
  • This concerns are addressed by the policies and procedures must developed by the executives and managers.
  • At the same time they are evolving a competitive policy to efficiently use particular information to rise the value of the company to advertisers.
  • Privacy advocate groups like the EPIC (Electronic Privacy Information Center) need Facebook to reinstate its more healthy privacy settings from 2009.
  • If, it does that then some of its value to advertisers will reduce.

Organization:

Facebook’s potential growth and value is resolute by how efficiently it may control the particular data that is accumulated about its users to appeal advertisers.

It also stands to gain from avoiding and managing the privacy disquiets elevated by its users and government managers...

Blurred answer
Students have asked these similar questions
What are your thoughts on whether or not Facebook and other social media platforms should provide law enforcement access to user accounts in order to conduct investigations? For what purpose is this inquiry being made? Is it fair that law enforcement agencies can't access the accounts of people who use social media like Facebook? Why would you ever ask such a thing?
In this article, not only are the origins and effects of cyberbullying, but also the many proposed remedies, examined at length.
Examples of data privacy breaches: We'll next discuss several precautionary strategies.
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning