Goal: Now that you have done more research and are working on your outline, I want to focus this journal on revisiting your thesis. Task: 1. 1. Now that you have more information about your topic, does your thesis still feel valid? 2. If no, how might you adjust it? 3. If yes, how can you refine your thesis to be more succinct? 2. Look to see if I gave you feedback on your thesis statement 3. Write your intro paragraph and include an updated thesis that both reflects your reflection above as well as any feedback I gave you Remember! Your thesis really should do two things! First, it should attempt to answer your research question. Second, it should take a clear stance so that you can focus your paper on proving that stance. Social Media and Data Privacy SOCIAL MEDIA AND DATA PRIVACY 1 Social Media and Data Privacy Social media and data privacy With the rise in unethical hacking, there is a greater threat to data privacy on social media. Data privacy is one of the major concerns today because of the advancement in technology and unethical hacking practices. Privacy concern is one of the major concerns for internet users. The use of the social media platform has increased significantly and people are using it in their personal as well as professional lives. Personal data is being stored on social media that could be compromised by hackers for their personal gain. Posting personal information online on social media is a major threat because even after applying privacy measures friends, colleagues, or companies people interact on social media can end up leaking personal information (Beigi & Liu, 2018). Thus, it can be said that the use of social media may lead an individual to lose personal data or put at the risk of data privacy. Here, the role of social media in data privacy will be analyzed in order to give an idea to the internet users to protect their personal information and avoid the concern of data privacy. I am interested in this project because of various reasons. The first and foremost reason is to identify the medium to safeguard personal information on social media platforms. Social media platforms are being extensively used by people that have put them on the risk of privacy. Apart from this, I want to explore the way unethical hackers might compromise the personal information on social media so that effective steps or measures could be taken to safeguard the information. This project will also help me understand the measures taken by companies such as Facebook, Twitter, Instagram, LinkedIn, etc. to protect the privacy of their users. Caroline Buinicky This is a strong and clear thesis! Caroline Buinicky 2 Social Media and Data Privacy References Beigi, G., & Liu, H. (2018). Privacy in social media: Identification, mitigation, and applications. arXiv preprint arXiv:1808.02191. Social Media Data Privacy Introduction · What is Social Media? · Importance and role of social media · What is data breach? · How are personal data breach and social media related? Literature review This section would review preview previous studies conducted in the same field of study. Previous researches that included social experiments to understand how data breach happens on social media and how it is prevented. People and Data Awareness About Data Breach · How much do people know about data breach? · Is there enough understanding of the impact that data breach can cause? · Statistical data would be presented in this section. Perception of Social Media and Privacy · How to people perceive the link between social media and privacy? · How does this perception differ across different age groups? Importance of Data Privacy in Daily Life · Why is it important to protect personal data on social media? · What is the impact of data breach? Principles of Personal Data Processing · Stages of personal data processing such as collection, actualization, archiving, transfer etc. · Levels of personal data security system such as technical level, hardware level, instruments policies etc. Common Types/Modes of Data Breach on Social Media · Phishing, Spam, Malware · Fake profiles · Identity clone · De-anonymization · Cyberstalking · User profiling Legal Compliance: Example of GDPR · Principles and application of GDPR in European Union Measures to Protect Data on Social Media · Technical and human aspects of data protection. · Privacy settings · Sharing location and personal information: How much information is too much information? · Antivirus · Use of Third-party applications Conclusion · Summary of main findings · Reflections on findings