Abstract
Research has shown an increase in both disclosure of personal data and means to gather this data on social media such as Facebook. Little research has been done to analyze what happens with this data and how it circulates between different actors. The aim of this research is to map a subset of the Belgian social media marketing companies as a value network and how these actors use social media users’ data for marketing campaigns. The answer to this research question was obtained through expert interviews with experts from sector organizations and social media marketing companies. The consulted experts confirmed it was possible to use a myriad of personal information but their actual use was limited to age, gender, location and language. The main reasons are the unreliability of the data, legal insecurity and fear of scaring potential customers with privacy invasive questions.
Chapter PDF
Similar content being viewed by others
References
Stutzman, F., Gross, R., Acquisti, A.: Silent Listeners: The evolution of privacy and disclosure on Facebook. Journal of Privacy and Confidentiality 4, 7–41 (2012)
Wang, N., Xu, H., Grossklags, J.: Third-party apps on Facebook: privacy and the illusion of control. In: Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology, p. 4 (2011)
Gutwirth, S., Hildebrandt, M.: Some Caveats on Profiling. In: Gutwirth, S., Poullet, Y., De Hert, P. (eds.) Data Protection in a Profiled World, pp. 31–41. Springer Netherlands, Heidelberg (2010)
Ur, B., Leon, P.G., Cranor, L.F., Shay, R., Wang, Y.: Smart, useful, scary, creepy: perceptions of online behavioral advertising. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, p. 4 (2012)
Heyman, R., De Wolf, R., Pierson, J.: Not all privacy settings are created equal - evaluating social media privacy settings for personal and advertising purposes. Presented at the IAMCR 2012, University of KwaZulu-Natal, Howard College Campus (July 15, 2012)
Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing Facebook Privacy Settings: User Expectations vs. Reality. Presented at the IMC 2011, Berlin (November 2, 2011)
Wang, N., Grossklags, J., Xu, H.: An online experiment of privacy authorization dialogues for social applications. In: Proceedings of the 2013 Conference on Computer Supported Cooperative Work, pp. 261–272 (2013)
Beer, D.: Power through the algorithm? Participatory web cultures and the technological unconscious. New Media & Society 11, 985–1002 (2009)
Pariser, E.: The filter bubble: what the Internet is hiding from you. Penguin Press, New York (2011)
Korolova, A.: Privacy violations using microtargeted ads: A case study. In: 2010 IEEE International Conference on Data Mining Workshops (ICDMW), pp. 474–482 (2010)
Heyman, R., Pierson, J.: Social media use and corporate dataveillance: exploring and as-sessing digital Personal Identifiable Information (PII) collection tools. In: Presented at the IAMCR 2011, Istanbul (July 13, 2011)
Kaplan, A.M., Haenlein, M.: Users of the world, unite! The challenges and opportunities of Social Media. Business Horizons 53, 59–68 (2010)
Boyd, D.M., Ellison, N.B.: Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication 13, 210–230 (2008)
Ciriani, V., Capitani di Vimercati, S., Foresti, S., Samarati, P.: k-anonymity. Secure Data Management in Decentralized Systems, pp. 323–353 (2007)
Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty Fuzziness and Knowledge Based Systems 10, 557–570 (2002)
Ballon, P.: Business modelling revisited: the configuration of control and value. Info. 9, 6–19 (2007)
Bouwman, H., Haaker, T., de Vos, H.: Designing Business Models: a practical and holistic approach. Telematica Institute, Enschede (2005)
Allee, V.: Value-creating networks: organizational issues and challenges. The Learning Organization 16, 427–442 (2009)
UBA: Jaarverslag 2011. UBA, Strombeek-Bever (2012)
Knapp, D., Marouli, E.: Adex Benchmark 2011, European online advertising expenditure. IAB Europe (2012)
Pfadenhauer, M.: At eye level: The expert interview - a talk between expert and quasi-expert. In: Bogner, A., Littig, B., Menz, W. (eds.) Interviewing Experts, pp. 81–97. Palgrave Macmillan, Basingstoke (2009)
Bandara, W., Indulska, M., Chong, S., Sadiq, S.: Major issues in business process man-agement: an expert perspective (2007)
Welch, C., Marschan-Piekkari, R., Penttinen, H., Tahvanainen, M.: Corporate elites as in-formants in qualitative international business research. International Business Review 11, 611–628 (2002)
ACC: Mission statement, http://www.accbelgium.be/Content/acc/whatisacc/missionstatement/index.html
Decocker, G.: Bdma in het kort (2009), http://www.bdma.be/index.php?id=359
IAB: IAB Belgium home, http://www.iab-belgium.be
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Heyman, R., Pierson, J. (2014). An Explorative Mapping of the Belgian Social Media Marketing Value Network and Its Usage of Personal Identifiable Information. In: Hansen, M., Hoepman, JH., Leenes, R., Whitehouse, D. (eds) Privacy and Identity Management for Emerging Services and Technologies. Privacy and Identity 2013. IFIP Advances in Information and Communication Technology, vol 421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55137-6_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-55137-6_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55136-9
Online ISBN: 978-3-642-55137-6
eBook Packages: Computer ScienceComputer Science (R0)