Evaluation of user data privacy and security on social networks

Authors

DOI:

https://doi.org/10.59169/pentaciencias.v7i5.1641

Keywords:

social media; data privacy; information security; user perception; cybersecurity

Abstract

Social media has redefined the way people share and manage personal information online, increasing the amount of data collected daily. This study takes an in-depth look at privacy policies and security strategies on three major platforms: Facebook, Instagram, and Twitter (currently  called X), identifying their strengths and areas for improvement. Using a mixed approach  combining qualitative and quantitative methods, users’ perceptions of their data privacy are  analyzed and available security measures are assessed, exploring scenarios of potential  vulnerabilities. The results indicate that although platforms implement extensive policies to protect privacy, significant vulnerabilities persist that can be exploited. For example, Facebook frequently collects  location data, which carries specific risks if not managed properly. Furthermore, users’ levels of trust in privacy vary, with greater distrust towards Facebook compared to Instagram and X, possibly related to previous incidents and data management. In conclusion, it is critical that platforms not only maintain but continually strengthen their security systems, implementing more robust protocols and promoting greater transparency in their data practices. It is also recommended to educate users on the importance of managing their privacy settings to mitigate the risks inherent in using social media.

Downloads

Download data is not yet available.

References

Abuali, K. M., Nissirat, L., & Al-Samawi, A. (2023). Intrusion Detection Techniques in Social Media Cloud: Review and Future Directions. Wireless Communications and Mobile Computing, 2023, 1-25. https://doi.org/10.1155/2023/6687023

Alcívar, J. A. M., & Jaya, V. M. B. (2023). La cibercriminalidad un nuevo desafío para el derecho penal ecuatoriano. 1-33.

Anne cheryl. (2024, mayo 7). The Data Collection Practices of Social Media Platforms. https://medium.com/@annecheryl853/the-data-collection-practices-of-social-media-platforms-bdf162b23849

Baldwin, L., Gores, J., & Kilbride, J. (2023). Social Media Use and Awareness of Privacy Concerns. Concordia Journal of Communication Research, 8. https://doi.org/10.54416/HQWT8424

Basholli, F., & Minga, J. (2024). Education in cyber security. https://doi.org/10.13140/RG.2.2.12657.45925

Carles, J. (2021, octubre 10). Uso del comando SED en Linux y UNIX con ejemplos. geekland. https://geekland.eu/uso-del-comando-awk-en-linux-y-unix-con-ejemplos/

Chérrez, M., Eduardo, W., Pesantez, Á., & Fernando, D. (2021). Ciberseguridad en las redes sociales: Una revisión teórica. 8.

Cote Peña, L. F. (2020). Del tratamiento de datos personales en colombia y responsabilidad proactiva. https://www.redipd.org/documento/evaluacion-de-impacto-y-responsabilidad-proactiva.pdf

Cypherdog Security Inc. (2023, junio 19). Encryption and Privacy on Social Media. Medium. https://medium.com/@e.kozera/encryption-and-privacy-on-social-media-538885ebe6b0

Das, S., Wang, B., Tingle, Z., & Camp, L. J. (2019). Evaluating User Perception of Multi-Factor Authentication, A Systematic Review. https://doi.org/10.48550/arXiv.1908.05901

Dwi Santoso, A. M. B., Eva Alisya Febrianti, & Fitri Mutia. (2024). Comparison of Data Security and User Privacy on Instagram and Twitter: A Literature Study. Khizanah Al-Hikmah: Jurnal Ilmu Perpustakaan, Informasi, Dan Kearsipan, 12(1), 77-88. https://doi.org/10.24252/kah.v12i1a7

Giménez, S. (2023). Redes Sociales, estado actual y tendencias 2023. https://marketing.onlinebschool.es/Prensa/Informe%20OBS%20Tendencias%20Redes%20Sociales%202023.pdf

Giraldo Ríos, L. (2021). Ciberseguridad y redes sociales. Revista de las Fuerzas Armadas, 257, 69-88. https://doi.org/10.25062/0120-0631.417

Griffin, A. (2024, septiembre 3). Is my phone listening to me? INDEPENDENT. https://www.independent.co.uk/tech/is-my-phone-listening-to-me-ad-microphone-privacy-b2606445.html

Instituto de la Comunicación e Imagen, Universidad de Chile, & Valdivia, A. (2021). Aprendizaje en las redes sociales: Literacidades vernaculares y académicas en la producción digital de jóvenes escolares. Pensamiento Educativo: Revista de Investigación Educacional Latinoamericana, 58(2). https://doi.org/10.7764/PEL.58.2.2021.8

Jacob Morrow. (2024, marzo 29). A Complete Guide to One-Time Passwords (OTPs): How They Enhance Security. engagelab. https://www.engagelab.com/blog/one-time-password-otp

Jacqueline Zote. (2024, febrero 14). Social media demographics to inform your 2024 strategy. sproutsocial. https://sproutsocial.com/insights/new-social-media-demographics/

Karishma Borkakoty. (2024, octubre 1). The Expert’s Guide to Doing a Social Media Audit. Sprinklr. https://www.sprinklr.com/blog/social-media-audit/

Kaspersky. (2022, octubre 21). Consejos para generar contraseñas seguras y únicas. Latam.kaspersky. https://latam.kaspersky.com/resource-center/threats/how-to-create-a-strong-password?srsltid=AfmBOorUqOh9UDMUFwcvC-Xzqc9Nm8TeYs07UF1Q-0X4Q1Pejp1wEYRg

Kumari, D., Namburi, A., Tanuj, K., Rangu, R., Muniswamy Naidu, N. K., & Mahmoud, M. (2023). Quantum Computing in Cryptography. 2023 International Conference on Computational Science and Computational Intelligence (CSCI), 490-495. https://doi.org/10.1109/CSCI62032.2023.00086

López Cruz, C. (2024). AUDITORÍA DE TI Y CIBERSEGURIDAD. https://www.seps.gob.ec/wp-content/uploads/Taller-Auditori%CC%81a-de-TI.pdf

Luke Irwin. (2021, noviembre 27). The GDPR: Why you need to adopt privacy by design. itgovernance. https://www.itgovernance.eu/blog/en/the-gdpr-why-you-need-to-adopt-the-principles-of-privacy-by-design

Mahmood Saqib, R., Shahid Khan, A., Javed, Y., Ahmad, S., Nisar, K., A. Abbasi, I., Reazul Haque, M., & Ahmadi Julaihi, A. (2022). Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security. Intelligent Automation & Soft Computing, 32(3), 1633-1647. https://doi.org/10.32604/iasc.2022.021786

Maria Hosken. (2024, septiembre 8). Privacy by Design and Its 7 Principles You Must Know About. websitepolicies.

Mero, R., & Paulina, A. (2022). Determinación de los peligros en las redes sociales en entorno a niños y adolescentes para uso y prevención.

Meta Platforms, Inc. (2025a). Meta Developers. Meta Platforms, Inc. https://developers.facebook.com/docs/apis

Meta Platforms, Inc. (2025b). Política de Privacidad de Facebook. Meta Platforms, Inc. https://www.facebook.com/privacy/policy

Meta Platforms, Inc. (2025c). Política de Privacidad de Instagram. Meta Platforms, Inc. https://privacycenter.instagram.com/policy/?entry_point=ig_help_center_data_policy_redirect

Namrata Maheshwari. (2024, septiembre 11). Encryption FAQ: encrypted messaging, AI, content moderation, and more. Accessnow.org.

National Institute of Standards and Technology (US). (2023). Advanced Encryption Standard (AES) (NIST FIPS 197-upd1; p. NIST FIPS 197-upd1). National Institute of Standards and Technology (U.S.). https://doi.org/10.6028/NIST.FIPS.197-upd1

Navas, V., & Alexander, N. (2021). Modelo de seguridad informática para riesgos de robo de información por el uso de las redes sociales. 1-13.

Obar, J. A., & Oeldorf-Hirsch, A. (2020). The biggest lie on the internet: Ignoring the privacy policies and terms of service policies of social networking services. Information, Communication & Society, Vol.23(N°1), 128-147. https://doi.org/10.1080/1369118X.2018.1486870

Quach, S., Thaichon, P., Martin, K. D., Weaven, S., & Palmatier, R. W. (2022). Digital technologies: Tensions in privacy and data. Journal of the Academy of Marketing Science, 50(6), 1299-1323. https://doi.org/10.1007/s11747-022-00845-y

Rodriguez Fabricio, K. A. (2024, septiembre 11). ¿Qué está pasando con nuestros datos personales en las redes sociales? Gobernarte. https://blogs.iadb.org/administracion-publica/es/que-esta-pasando-con-nuestros-datos-personales-en-las-redes-sociales/

Rosas-Lanas, G., & Pila-Cárdenas, G. (2023). protección de datos personales en Ecuador: Una revisión histórica-normativa de este derecho fundamental en el país suramericano. VISUAL REVIEW. International Visual Culture Review / Revista Internacional de Cultura Visual, 13(2), 1-16. https://doi.org/10.37467/revvisual.v10.4568

Ruiz, E. O., Herrerías, B. Y. R., Santiago, J. M., Valdivia, R. C., & García, A. E. (2020). Seguridad aplicada en las Redes Sociales mediante extracción de datos. División de Posgrado del Instituto Tecnológico de Orizaba.

Sánchez Bracho, M., Fernández, M., & Díaz, J. (2021). Técnicas e instrumentos de recolección de información: Análisis y procesamiento realizado por el investigador cualitativo. Revista Científica UISRAEL, 8(1), 107-121. https://doi.org/10.35290/rcui.v8n1.2021.400

Saz, P. E., & Pastor, L. M. T. (2020). Prevención de riesgos en Internet y redes sociales en Secundaria, desde la tríada alumnos, padres y profesores. http://hdl.handle.net/10952/4425

Serrano, R., & Razza, C. (2022, octubre 11). Instagram multado por violar la privacidad. Corral Rosales. https://corralrosales.com/instagram-multado-por-violar-privacidad/

SHARDSECURE. (2023, septiembre 19). The Advantages of Data Encryption. SHARDSECURE. https://shardsecure.com/blog/advantages-data-encryption

Srividhya Karthik. (2024, agosto 26). Data Sharing and Third Parties—Risks and Benefits Unveiled. cybersierra.

Stephanie Bodoni. (2021, diciembre 15). Multan a Twitter con más de 500 mil dólares por violar ley de privacidad de datos de la UE. El Financiero. https://www.elfinanciero.com.mx/tech/multan-a-twitter-con-mas-de-500-mil-dolares-por-violar-ley-de-privacidad-de-datos-de-la-ue/

Stewart, H. (2021). Cloud Computing Security Evaluation.

Temitayo Oluwaseun Abrahams, Oluwatoyin Ajoke Farayola, Simon Kaggwa, Prisca Ugomma Uwaoma, Azeez Olanipekun Hassan, & Samuel Onimisi Dawodu. (2024). Cybersecurity awareness and education programs: a review of employee engagement and accountability. Computer Science & IT Research Journal, 5(1), 100-119. https://doi.org/10.51594/csitrj.v5i1.708

Vercelli, A. (2019). La (des)protección de los datos personales: Análisis del caso Facebook Inc. - Cambridge Analytica. Electronic Journal of SADIO, 18(2), 57-70.

Vispo, S. E. (2023). Seguridad en las Redes Sociales Actuales. ARCHIVO DIGITAL UPM, 1-79. https://orcid.org/0000-0003-1790-5941

X corp. (2023). Políticas de Privacidad de Twitter. X corp. https://x.com/en/privacy

Yang, P., Xiong, N., & Ren, J. (2020). Data Security and Privacy Protection for Cloud Storage: A Survey. IEEE Access, 8, 131723-131740. https://doi.org/10.1109/ACCESS.2020.3009876

Yogi, K. S., V, D. G., Poornima, G., Prasad, K., D, Srinivas., & Prasanth, P. V. (2024). Comparative Analysis of Machine Learning Techniques for Detecting Sentiments in Social Media. 2024 2nd International Conference on Artificial Intelligence and Machine Learning Applications Theme: Healthcare and Internet of Things (AIMLA), 1-6. https://doi.org/10.1109/AIMLA59606.2024.10531524

Zaimy, N. A., & Kasiran, M. K. (2023). A Comparative Analysis of Security Measures in Social Media: Instagram and TikTok. 6(N°2), 1-7 pag.

Published

2025-10-17

How to Cite

Orellana Reyes, G. ., & Cotera Ramirez, G. (2025). Evaluation of user data privacy and security on social networks . Revista Científica Arbitrada Multidisciplinaria PENTACIENCIAS - ISSN 2806-5794., 7(5), 87–110. https://doi.org/10.59169/pentaciencias.v7i5.1641

Issue

Section

Artículos originales