{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T16:43:30Z","timestamp":1717692210178},"reference-count":39,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2015,1,19]],"date-time":"2015-01-19T00:00:00Z","timestamp":1421625600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1,19]]},"abstract":"Purpose<\/jats:title>\u2013 The purpose of this paper is to identify the risks faced by users of online social networking services (SNSs) in the UK and to develop a typology of risk that can be used to assess regulatory effectiveness.<\/jats:p><\/jats:sec>Design\/methodology\/approach<\/jats:title>\u2013 An initial investigation of the literature revealed no detailed taxonomies of risk in this area. Existing taxonomies were reviewed and merged with categories identified in a pilot survey and expanded in purposive sample survey directed at the library and information services (LIS) community in the UK.<\/jats:p><\/jats:sec>Findings<\/jats:title>\u2013 Analysis of the relationships between different risk categories yielded a grouping of risks by their consequences. This aligns with one of the objectives of regulation, which is to mitigate risks.<\/jats:p><\/jats:sec>Research limitations\/implications<\/jats:title>\u2013 This research offers a tool for evaluation of different modes of regulation of social media.<\/jats:p><\/jats:sec>Practical implications<\/jats:title>\u2013 Awareness of the risks associated with use of online SNSs and wider social media contributes to the work of LIS professionals in their roles as: educators; intermediaries; and users of social media. An understanding of risk also informs the work of policy makers and legislators responsible for regulating access to personal data.<\/jats:p><\/jats:sec>Originality\/value<\/jats:title>\u2013 A risk-based view of regulation of personal data on social media has not been attempted in such a comprehensive way before.<\/jats:p><\/jats:sec>","DOI":"10.1108\/ajim-07-2014-0087","type":"journal-article","created":{"date-parts":[[2015,1,14]],"date-time":"2015-01-14T12:44:09Z","timestamp":1421239449000},"page":"94-115","source":"Crossref","is-referenced-by-count":15,"title":["Defining user risk in social networking services"],"prefix":"10.1108","volume":"67","author":[{"given":"David","family":"Haynes","sequence":"first","affiliation":[]},{"given":"Lyn","family":"Robinson","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020122701141716800_b1","unstructured":"Agate, J. and Ledward, J. (2013), \u201cSocial media: how the net is closing in on cyber bullies\u201d, Entertainment Law Review , Vol. 24 No. 8, pp. 263-268."},{"key":"key2020122701141716800_b2","unstructured":"Anderson, J. (2013), \u201cPrivacy Engineering for Social Networks\u201d, Computer Laboratory, Cambridge, available at: www.repository.cam.ac.uk\/handle\/1810\/244239 (accessed 7 December 2013)."},{"key":"key2020122701141716800_b4","doi-asserted-by":"crossref","unstructured":"Andrienko, G. and Andrienko, N. (2012), \u201cPrivacy issues in geospatial visual analytics\u201d, in Gartner, G. and Ortag, F. (Eds), Advances in Location-Based Services, 8th International Conference on Location Based Services, 2011, Springer, Vienna, Heidelberg, pp. 239-246.","DOI":"10.1007\/978-3-642-24198-7_16"},{"key":"key2020122701141716800_b40","doi-asserted-by":"crossref","unstructured":"Andrienko, G. , Gkoulalas-Divanis, A. , Gruteser, M. , Kopp, C. , Liebig, T. and Rechert, K. (2013), \u201cReport from dagstuhl\u201d, ACM SIGMOBILE Mobile Computing and Communications Review , Vol. 17 No. 2, p. 7.","DOI":"10.1145\/2505395.2505398"},{"key":"key2020122701141716800_b5","unstructured":"Article 29 Working Party (2013), \u201cWP29 opinion on apps on mobile devices\u201d, 00461\/13\/EN WP 202, Brussels, available at: www.huntonprivacyblog.com\/wp-content\/uploads\/2013\/03\/wp202_en.pdf (accessed 4 March 2014)."},{"key":"key2020122701141716800_b6","doi-asserted-by":"crossref","unstructured":"Aven, T. and Renn, O. (2009), \u201cOn risk defined as an event where the outcome is uncertain\u201d, Journal of Risk Research , Vol. 12 No. 1, pp. 1-11.","DOI":"10.1080\/13669870802488883"},{"key":"key2020122701141716800_b7","doi-asserted-by":"crossref","unstructured":"Baldwin, R. , Cave, M. and Lodge, M. (2012), Understanding Regulation: Theory, Strategy, and practice , 2nd ed., Oxford University Press, Oxford.","DOI":"10.1093\/acprof:osobl\/9780199576081.001.0001"},{"key":"key2020122701141716800_b8","doi-asserted-by":"crossref","unstructured":"Bawden, D. and Robinson, L. (2013), \u201cNo such thing as society? On the individuality of information behavior\u201d, Journal of the American Society for Information Science & Technology , Vol. 64 No. 12, pp. 2587-2590.","DOI":"10.1002\/asi.22971"},{"key":"key2020122701141716800_b10","unstructured":"BBC News (2012), \u201cBBC news \u2013 Wikileaks revelations\u201d, BBC News Online , available at: www.bbc.co.uk\/news\/world-11863274 (accessed 7 July 2014)."},{"key":"key2020122701141716800_b9","unstructured":"BBC News (2013), \u201cBBC news \u2013 arrests made in brian holloway\u2019s trashed house party\u201d, BBC News , available at: www.bbc.co.uk\/news\/world-us-canada-24293414 (accessed 11 February 2014)."},{"key":"key2020122701141716800_b11","unstructured":"British Standards Institution (2010), BS ISO 31000:2009 Risk Management \u2013 Principles and Guidelines , British Standards Institution, London."},{"key":"key2020122701141716800_b12","doi-asserted-by":"crossref","unstructured":"Cooke, L. and Hall, H. (2013), \u201cFacets of DREaM: a social network analysis exploring network development in the UK LIS research community\u201d, Journal of Documentation , Vol. 69 No. 6, pp. 786-806.","DOI":"10.1108\/JD-09-2012-0124"},{"key":"key2020122701141716800_b13","unstructured":"David, M. and Sutton, C.D. (2011), Social Research: an Introduction , SAGE, Los Angeles, CA."},{"key":"key2020122701141716800_b14","unstructured":"Dutton, W.H. and Blank, G. (2013), Cultures of the internet: the internet in Britain, Oxford internet survey 2013, Oxford, available at: http:\/\/oxis.oii.ox.ac.uk\/sites\/oxis.oii.ox.ac.uk\/files\/content\/files\/publications\/OxIS_2013.pdf (accessed 19 May 2014)."},{"key":"key2020122701141716800_b15","unstructured":"Ellison, E.B. and Boyd, D.M. (2013), \u201cSociality through social network sites\u201d, in Dutton, W.H. (Ed.), The Oxford Handbook of Internet Studies , Oxford University Press, Oxford, pp. 151-172."},{"key":"key2020122701141716800_b16","unstructured":"European Economic and Social Committee (2010), Opinion of the European Economic and Social Committee on the \u201cimpact of social networking sites on citizens\/consumers\u201d (own-initiative opinion) (2010\/C 128\/12), European Union: OJ (2010\/C 128\/12) 18 May, available at: http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=OJ:C:2010:128:0069:0073:EN:PDF"},{"key":"key2020122701141716800_b17","unstructured":"Farr, C. (2013), \u201cCan you trust Facebook with your genetic code?\u201d, VentureBeat , available at: http:\/\/venturebeat.com\/2013\/10\/07\/can-you-trust-facebook-with-your-genetic-code\/ (accessed10 October 2013)."},{"key":"key2020122701141716800_b18","unstructured":"Greenwald, G. (2013), \u201cNSA collecting phone records of millions of Verizon customers daily\u201d, The Guardian , available at: www.theguardian.com\/world\/2013\/jun\/06\/nsa-phone-records-verizon-court-order (accessed 7 July 2014)."},{"key":"key2020122701141716800_b19","doi-asserted-by":"crossref","unstructured":"Hansson, S.O. (2004), \u201cFallacies of risk\u201d, Journal of Risk Research , Vol. 7 No. 7, pp. 353-360.","DOI":"10.1080\/1366987042000176262"},{"key":"key2020122701141716800_b20","doi-asserted-by":"crossref","unstructured":"Hutter, B.M. (2006), \u201cRisk, regulation and management\u201d, in Taylor-Gooby, J. and Peter, Z. (Eds), Risk in Social Science , Oxford University Press, Oxford, pp. 202-227.","DOI":"10.1093\/oso\/9780199285952.003.0010"},{"key":"key2020122701141716800_b21","doi-asserted-by":"crossref","unstructured":"Langheinrich, M. and Karjoth, G. (2010), \u201cSocial networking and the risk to companies and institutions\u201d, Information Security Technical Report , Vol. 15 No. 2, pp. 51-56.","DOI":"10.1016\/j.istr.2010.09.001"},{"key":"key2020122701141716800_b22","unstructured":"Leigh, D. and Harding, L. (2011), Wikileaks: Inside Julian Assange\u2019s War on Secrecy , Guardian Books, London."},{"key":"key2020122701141716800_b23","unstructured":"Lynskey, O. (2012), Identifying the Objectives of EU Data Protection Regulation and Justifying its Costs, PhD thesis, University of Cambridge, Lucy Cavendish College, Cambridge."},{"key":"key2020122701141716800_b27","unstructured":"McDonald, T. (2013), \u201cKids + Facebook = home invasion?\u201d, Business 2 Community , available at: www.business2community.com\/facebook\/kids-facebook-home-invasion-0618724 (accessed 10 October 2013)."},{"key":"key2020122701141716800_b24","doi-asserted-by":"crossref","unstructured":"Macgill, S.M. and Siu, Y.L. (2005), \u201cA new paradigm for risk analysis\u201d, Futures , Vol. 37 No. 10, pp. 1105-1131.","DOI":"10.1016\/j.futures.2005.02.008"},{"key":"key2020122701141716800_b25","doi-asserted-by":"crossref","unstructured":"Mann, B.L. (2009), \u201cSocial networking websites: a concatenation of impersonation, denigration, sexual agressive solicitation, cyber-bullying or happy snapping videos\u201d, International Journal of Law and Information Technology , Vol. 17 No. 3, pp. 252-264.","DOI":"10.1093\/ijlit\/ean008"},{"key":"key2020122701141716800_b26","unstructured":"Mayer-Sch\u00f6nberger, V. and Cukier, K. (2013), Big Data: a Revolution That Will Transform How We Live, Work and Think , John Murray, London."},{"key":"key2020122701141716800_b28","unstructured":"Mendel, T. , Puddephatt, A. , Wagner, B. , Hawtin, D. and Torres, N. (2012), Global Survey on Internet Privacy and Freedom of Expression (Unesco Series on Internet Freedom) , UNESCO Publishing, Paris."},{"key":"key2020122701141716800_b29","doi-asserted-by":"crossref","unstructured":"Nissenbaum, H.F. (2010), Privacy in Context: Technology, Policy, and the Integrity of Social Life , Stanford Law Books, Stanford, CA.","DOI":"10.1515\/9780804772891"},{"key":"key2020122701141716800_b30","unstructured":"Pearsall, J. and Hanks, P. (Eds) (1999), The New Oxford Dictionary of English , Oxford University Press, Oxford."},{"key":"key2020122701141716800_b31","unstructured":"Roberts, L. (2010), \u201cBBC news \u2013 Facebook status updates are \u201cburglary risk\u201d, BBC News Online , available at: www.bbc.co.uk\/news\/uk-england-birmingham-12062331 (accessed 7 July 2014)."},{"key":"key2020122701141716800_b32","doi-asserted-by":"crossref","unstructured":"Rosenblum, D. (2007), \u201cWhat anyone can know: the privacy risks of social networking sites\u201d, IEEE Security & Privacy , Vol. 5 No. 3, pp. 40-49.","DOI":"10.1109\/MSP.2007.75"},{"key":"key2020122701141716800_b33","unstructured":"Solovic, S. (2013), \u201cThe social media dilemma: managing business benefits and personal risks\u201d, Business 2 Community , available at: www.business2community.com\/social-media\/social-media-dilemma-managing-business-benefits-personal-risks-0597574 (accessed 10 October 2013)."},{"key":"key2020122701141716800_b34","doi-asserted-by":"crossref","unstructured":"Strau\u00df, S. and Nentwich, M. (2013), \u201cSocial network sites, privacy and the blurring boundary between public and private spaces\u201d, Science and Public Policy , Vol. 40 No. 6, pp. 724-732.","DOI":"10.1093\/scipol\/sct072"},{"key":"key2020122701141716800_b35","doi-asserted-by":"crossref","unstructured":"Swedlow, B. , Kall, D. , Zhou, Z. , Hammitt, J.K. and Wiener, J.B. (2009), \u201cTheorizing and generalizing about risk assessment and regulation through comparative nested analysis of representative cases\u201d, Law & Policy , Vol. 31 No. 2, pp. 236-269.","DOI":"10.1111\/j.1467-9930.2009.00296.x"},{"key":"key2020122701141716800_b36","doi-asserted-by":"crossref","unstructured":"Thomas, K. , Grier, C. and Nicol, D.M. (2010), \u201cUnFriendly: multi-party privacy risks in social networks\u201d, in Atallah, M. and Hopper, N. (Eds), Privacy Enhancing Technologies, 10th International Symposium, 21-23 July 2010 , Springer Verlag Berlin Heidelberg, Berlin, pp. 236-252.","DOI":"10.1007\/978-3-642-14527-8_14"},{"key":"key2020122701141716800_b37","doi-asserted-by":"crossref","unstructured":"Tulloch, J. (2006), \u201cEveryday life and leisure time\u201d, in Taylor-Gooby, P. and Zinn, J. (Eds), Risk in Social Science , Oxford University Press, Oxford, pp. 117-139.","DOI":"10.1093\/oso\/9780199285952.003.0006"},{"key":"key2020122701141716800_b38","unstructured":"Wakefield, J. (2014), \u201cBBC news \u2013 cyberbullies: how best to tackle online abuse?\u201d, BBC News Online , available at: www.bbc.co.uk\/news\/technology-26121199 (accessed 7 July 2014)."},{"key":"key2020122701141716800_b39","doi-asserted-by":"crossref","unstructured":"Wilson, R.E. , Gosling, S.D. and Graham, L.T. (2012), \u201cA review of facebook research in the social sciences\u201d, Perspectives on Psychological Science , Vol. 7 No. 3, pp. 203-220.","DOI":"10.1177\/1745691612442904"}],"container-title":["Aslib Journal of Information Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/AJIM-07-2014-0087","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/AJIM-07-2014-0087\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/AJIM-07-2014-0087\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T15:30:44Z","timestamp":1717687844000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/AJIM-07-2014-0087\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,19]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1,19]]}},"alternative-id":["10.1108\/AJIM-07-2014-0087"],"URL":"https:\/\/doi.org\/10.1108\/ajim-07-2014-0087","relation":{},"ISSN":["2050-3806"],"issn-type":[{"value":"2050-3806","type":"print"}],"subject":[],"published":{"date-parts":[[2015,1,19]]}}}