Shadow profile's history
Early in 2012, a data breach of over six million Facebook users' personal information indicated the existence of shadow profiles, since the leaked information was not provided by users themselves. After this, Facebook started to combine user's shadow profiles with their public profiles. The combined profiles were then further shared with the users' friends if they used Facebook's Download Your Information (DYI) tool.Shadow profile's influence
Positive influences
Benefits brought by shadow profile related behaviors include a more efficient way of data collection and anomaly behaviors detection. Some other researches show that integrated conceptualizations of Internet Privacy Concerns (IPC) have several implications: the third-order factor of IPC can differentiate the relation between IPC and other constructions and allows both website users and managers to analyze the importance of various privacy contexts.Negative influences
Possible harms to users from privacy and information leakage include collection of sensitive data like financial account numbers, health information and precise geolocation. For instance, in the 21st century, the workplace is one of the many social establishments where employees perform in a given and defined condition. As a result, a blurred line emerged between workspace and personal space. Even when people knowingly share their thoughts online through comments or likes, their traces can affect real live events such as recruiting decisions due to the surveillance conducted by employers.Possible privacy issue factors
Users upload a large amount of personal information onto online spaces, a phenomenon described by many researchers as users' lax attitude. Possible explanations for these behaviors are a combination of high gratification, usage patterns, and a psychological mechanism similar toPossible privacy issue solutions
To address the issue of leaking personal information there exist multiple facets. One category of the solution suggests focus on users. One of the argued solutions points out the inefficiency of privacy terms that companies use to ask for users' consent, such that they are sometimes too lengthy (Facebook's privacy terms has 9,500 words), involved with professional vocabularies that only few would fully understand or the users do not understand who are the other parties they are granting their information to. As a result, one of the solutions is to advance the privacy terms by making them easy to read and understand. In addition, the conversation among users is another factor that leads to information leakage, such that people share their information with each other but they become incapable of controlling over the spread of that information afterwards. Thus some argue that instead of focusing on what companies can do to provide a clearer picture of the possible information access, users themselves should be the primary target of controlling over their personal information online and this would work as an efficient way to ease both companies' and consumers' concerns with data collection. Another proposed argument also emphasizes the focus on users, which claims that by making users fully aware of what they are doing online and the logistics behind online behaviors, they will put more trust into the virtual world and would take care of their personal information even more. Instead of focusing on users, some others suggest the interdependent relationship between users and online platforms or companies, and the social contract between them: while companies collect personal data and feedback from users, users would benefit from the modified functional improvements. As a result, as companies are not merely the side notifying users about the privacy norms but being a contractor responsible for maintaining a mutually beneficial relationship with users, the privacy tension is eased.See also
*References
{{reflist Facebook Google Information privacy Internet privacy