Influential Factors of Data Protection on Users’ Trust in Social Media: A Situational Analysis

Document Type : Original Article

Authors

1 MSc. Department of Media Management, Faculty of Management, University of Tehran, Tehran, Iran.

2 Associate Prof., Department of Business Management, Faculty of Management, University of Tehran, Tehran, Iran.

3 Assistant Prof., Department of Business Management, Faculty of Management, University of Tehran, Tehran, Iran.

Abstract

Objective
Using the Internet and its developing facilities has become intertwined with people's lives so that many things are done only through this space. Data storage on different servers is another aspect of using the Internet and social media, which requires building trust between internet users and implementing data protection policies. This paper investigates the influential factors in data protection regarding social media's trustworthiness for users.
Research Methodology
The participants consisted of 27 cyberspace and social media experts, who were selected through judgmental and snowball sampling. The method of data analysis is Grounded Theory with Clark's situational analysis approach. In this method, all data is obtained from coding interviews with media industry professionals.
Findings
The components of data protection in social media and human/non-human factors of data protection affecting the trust of social media users were identified. As a result of code analysis, social media will be able to take this path with the support of the technical and hardware components. Poor quality and usability, access of the information and security institutions of the Islamic Republic of Iran to users' data, unequal marketing of Iranian social media platforms in comparison with international peers, and monopolization of Iranian social media through extensive governmental filtering of some international social media platforms are some of the crucial factors that have led society to distrust social media. This study has identified the factors affecting data protection on the trust of social media users with the grounded theory approach, which is innovative in terms of method.
Undoubtedly, studying different aspects of social media extension has been got vital. One of these aspects which recently has been highlighted in social studies is user personal data protection. Social media platforms request their users to create a profile at first and this would result in sharing personal information. Users give data usage permission to social media companies voluntarily to communicate with others worldwide. Although social media expansion has developed social communications, it can put users in danger. Considering the previous studies, no research was found about recognizing the effective elements of users’ trust, and problems regarding user rights protection. Furthermore, identifying the elements is useful for creating a new social media or understanding the cause of the prevalence of a particular social platform among users in comparison with others. In this research, we are evaluating the data protection policies in social media to gain an in-depth understanding of the reasons behind trusting social networks. The research results can contribute to the research literature in the field of trust in social networks.
According to studies, there are several key suggestions for active players in the field of social media. First, the social media managers are recommended to pay special attention to enhancing the quality and performance of these networks, regularly developing and updating the server’s security, and providing proper support for a significant amount of registration. Second, several interviews have pointed out the creativity in national social networks’ terms of service along with equal marketing opportunities and preventing monopolization. Social media managers are recommended to focus their efforts on creativity, updating their knowledge, and creating equal marketing opportunities. Finally, some of the participants stated that the clarity of the amount of access of social networks to users’ data and building mental trust regarding the data protection in these networks are among the other important factors that social media managers must consider.
Conclusion
In this research, some other factors related to the components of protection of social media users also human and non-human factors that affect social media users' trust were identified using grounded theory and Clarke's approach. If social media management takes steps to develop secure servers, it can create operational assurance for users to ensure the protection of servers. The ease of use and desirable quality of social media can automatically increase the trust and acceptance of users towards that media.
The key factors decreasing the trust in Iranian social media can be blamed on the lack of desirable quality, user-unfriendliness, and access of Iranian government security agency to users ' data and unfair marketing of Iranian social media with extensive filtering of some foreign social media. Creating trust for users in a society is a long-term process and requires practical persuasion with diverse methods. One of the consequences of selling user data for advertising is the lack of faithful representation of information by the user that it can disrupt the full and accurate protection of data and support and counter criminal action. The universality of social media and global trust is the other component of data protection. that is, on the one hand, when social media is global or pervasive in society, and the trusted people of the community and the celebrities are social media members, the possibility of data protection is reinforced increase in their minds and make it possible to select that social media. On the other hand, creating a framework by the user to limit access to personal data, the relationship between user trust and the amount of data value, and the type of social media usage of data and authorization to use user’s data affect their trust. Whatever the extent to which the number of users in social media is greater; causes more value, then acceptance by other people will be easier. Whether which social media belongs to which country as owned, and where it is managed, is an indication of who has access to users' data or at least has easier access. For this reason, users have less willingness to use some social networks that increase their concern over stakeholders about accessing their data.

Keywords


References
Bennur, S. (2010). From apparel, product attributes to brand loyalty: a cross-cultural investigation of U.S and Indian consumers attribute choices applying Kano’s theory. Ph.D. Dissertation. Oklahoma State University.
Bilge, L. (2009). All your contacts are belong to us: automated identity theft attacks on social networks. WWW '09: Proceedings of the 18th international conference on World wide web, April 2009 pp. 551–560, https://doi.org/10.1145/1526709.1526784
Boyd, D. M. (2008). Facebook’s privacy train wreck: Exposure, invasion, and social convergence. Int’l J. Research into New Media Tech, 14(1), 13–20.
Brown, I. (2012), Government access to private-sector data in the United Kingdom, International Data Privacy Law, 2 (4), 230–38.
Clarke, A.E. (2005).  Situational analysis: Grounded theory after the postmodern turn. Sage Publications, Inc. https://doi.org/10.4135/9781412985833
Dewar, K. (2017). The value exchange: Generating trust in the digital world. Business Information Review, 34 (2), 96–100.
Dumdum, O. & Crielda, G. (2009). Casting credibility, University of the Philippines, college of mass communication, for presentation during the pre-conference on “ Affective Audiene” in the 59th. Annual conference of international communication association, in Chicago.
Elmetwaly, M.A. & Babin, L. (2020). Relationship between Saudi customers’ electronic-trust and electronic-loyalty. Journal of Advanced Pharmacy Education & Research, 10(3), 160-166.
Fortin, D., Dholakia, R. & Dholakia, N. (2002). Emerging issues in electronic marketing: thinking outside the square. Journal of Business Research, 55 (8), 623-627.
Future of Life Institute (2017). Response to the request for Information: Artificial Intelligence Risk Management Framework. Available at: https://futureoflife.org/policy-work/.
Goddard, M. (2017). The EU General Data Protection Regulation (GDPR): European regulation that has a global impact. International Journal of Market Research, 59(6), 703-705.
Gross, R. & Acquisti, A. (2005). Information revelation and privacy in online social networks. Workshop on Privacy in the Electronic Society.
Gruschka, N., Mavroeidis, V., Vishi, K. & Jensen, M. (2018). Privacy issues and data protection in big data: A case study analysis under GDPR. 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, 2018, pp. 5027-5033, doi: 10.1109/BigData.2018.8622621.
Gupta, A. & Dhami, A. (2015). Measuring the impact of security, trust and privacy in information sharing: A study on social networking sites. Ubiquity the Journal of Pervasive Media, 17(1). DOI:10.1057/dddmp.2015.32
Hill, K. (2012). How target figured out a teen girl was pregnant before her father did. Forbes, Inc.
Hoffmann, C. P., Lutz, C. & Ranzini, G. (2016). Privacy cynicism: A new approach to the privacy paradox. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 10(4), 7-26.
Jayasinghe, U. (2018). Trust evaluation in the IoT environment, PQDT-UK & Ireland. Liverpool John Moores University (United Kingdom).
Kinast, S., Ashkenazy, Y. & Meron, E. A. (2014). Coupled Vegetation–crust model for patchy landscapes. Pure Applied Geophysics, 173, 983–993.
Kroll, J. A. (2016). Accountable algorithms. rithms. University of Pennsylvania Law Review. Law Review. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2765268.
Layton, R. (2017). How the GDPR compares to best practices for privacy, accountability and trust. Visiting Researcher, Aalborg University, Denmark and Independent Data Scientist, Italy.
Leonnard, A. (2019). Exploring the relationship among e-service quality, e-trust, e-satisfaction and loyalty at higher education institutions. Journal on Efficiency and Responsibility in Education and Science, 12(4), 103- 110.
Lewis, D. & Moorkens, J. (2020). A rights-based approach to trustworthy AI in social media. Social Media + Society, 6(3), 516-539.
Liu, D., Ainsworth, S. E. & Baumeister, R. F. (2016). A meta-analysis of social networking online and social capital. Review of General Psychology, 20(4), 369–391.
Mittelstadt, B. D., Allo, P., Taddeo, M., Wachter, S. & Floridi, L. (2016). The ethics of algorithms: Mapping the debate. Big Data & Society, 3(2), 365-394.
Mostert, M., Bredenoord, A.L., Biesaart, M.C. & van Delden, J.J. (2016), Big Data in medical research and EU data protection law: challenges to the consent or anonyms approach. European Journal of Human Genetics, 24(7), 956-960.
Orlowski, P. (2011), Teaching about hegemony: Race, class and democracy in the 21st Century. Springer Science+Business Media, https://doi.org/10.1007/978-94-007-1418-2.
Romansky, R. (2014). Social media and personal data protection. International Journal on Information Technologies & Security, 11(4), 65-80.
 Shareef, M. A., Mukerji, B., Dwivedi, Y. K., Rana, N. P. & Islam, R. (2019). Social media marketing: Comparative effect of advertisement sources. Journal of Retailing and Consumer Services, 46, 58-69.
Sophos, R. (2007). Reverse Social Engineering Attacks in Online Social Networks. In: Holz, T., Bos, H. (eds) Detection of intrusions and malware, and vulnerability assessment. Lecture Notes in Computer Science, vol 6739. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22424-9_4
Sukhu, A., Zhang T. & Bilgihan, A. (2015) Factors Influencing Information-Sharing Behaviors in Social Networking Sites, Services Marketing Quarterly, 36(4), 317-334.
Tran, V. V. & Quang Vu, H. (2019). Inspecting the relationship among e-service quality, e-trust, e-customer satisfaction, and behavioral intentions of online shopping customers. Global Business and Finance Review, 24(3), 29-42.
Weichert, S. (2013). E-trust building in the hotel industry. Journal of Islamic Marketing, 12(2), 123-146.
Živković, P. D. (2018). An international publication for theory and practice of Management Science. University of Belgrade, Technical Faculty in Bor, Department of Engineering Management.