Evaluation of user data privacy and security on social networks
DOI:
https://doi.org/10.59169/pentaciencias.v7i5.1641Keywords:
social media; data privacy; information security; user perception; cybersecurityAbstract
Social media has redefined the way people share and manage personal information online, increasing the amount of data collected daily. This study takes an in-depth look at privacy policies and security strategies on three major platforms: Facebook, Instagram, and Twitter (currently called X), identifying their strengths and areas for improvement. Using a mixed approach combining qualitative and quantitative methods, users’ perceptions of their data privacy are analyzed and available security measures are assessed, exploring scenarios of potential vulnerabilities. The results indicate that although platforms implement extensive policies to protect privacy, significant vulnerabilities persist that can be exploited. For example, Facebook frequently collects location data, which carries specific risks if not managed properly. Furthermore, users’ levels of trust in privacy vary, with greater distrust towards Facebook compared to Instagram and X, possibly related to previous incidents and data management. In conclusion, it is critical that platforms not only maintain but continually strengthen their security systems, implementing more robust protocols and promoting greater transparency in their data practices. It is also recommended to educate users on the importance of managing their privacy settings to mitigate the risks inherent in using social media.
Downloads
References
Abuali, K. M., Nissirat, L., & Al-Samawi, A. (2023). Intrusion Detection Techniques in Social Media Cloud: Review and Future Directions. Wireless Communications and Mobile Computing, 2023, 1-25. https://doi.org/10.1155/2023/6687023
Alcívar, J. A. M., & Jaya, V. M. B. (2023). La cibercriminalidad un nuevo desafío para el derecho penal ecuatoriano. 1-33.
Anne cheryl. (2024, mayo 7). The Data Collection Practices of Social Media Platforms. https://medium.com/@annecheryl853/the-data-collection-practices-of-social-media-platforms-bdf162b23849
Baldwin, L., Gores, J., & Kilbride, J. (2023). Social Media Use and Awareness of Privacy Concerns. Concordia Journal of Communication Research, 8. https://doi.org/10.54416/HQWT8424
Basholli, F., & Minga, J. (2024). Education in cyber security. https://doi.org/10.13140/RG.2.2.12657.45925
Carles, J. (2021, octubre 10). Uso del comando SED en Linux y UNIX con ejemplos. geekland. https://geekland.eu/uso-del-comando-awk-en-linux-y-unix-con-ejemplos/
Chérrez, M., Eduardo, W., Pesantez, Á., & Fernando, D. (2021). Ciberseguridad en las redes sociales: Una revisión teórica. 8.
Cote Peña, L. F. (2020). Del tratamiento de datos personales en colombia y responsabilidad proactiva. https://www.redipd.org/documento/evaluacion-de-impacto-y-responsabilidad-proactiva.pdf
Cypherdog Security Inc. (2023, junio 19). Encryption and Privacy on Social Media. Medium. https://medium.com/@e.kozera/encryption-and-privacy-on-social-media-538885ebe6b0
Das, S., Wang, B., Tingle, Z., & Camp, L. J. (2019). Evaluating User Perception of Multi-Factor Authentication, A Systematic Review. https://doi.org/10.48550/arXiv.1908.05901
Dwi Santoso, A. M. B., Eva Alisya Febrianti, & Fitri Mutia. (2024). Comparison of Data Security and User Privacy on Instagram and Twitter: A Literature Study. Khizanah Al-Hikmah: Jurnal Ilmu Perpustakaan, Informasi, Dan Kearsipan, 12(1), 77-88. https://doi.org/10.24252/kah.v12i1a7
Giménez, S. (2023). Redes Sociales, estado actual y tendencias 2023. https://marketing.onlinebschool.es/Prensa/Informe%20OBS%20Tendencias%20Redes%20Sociales%202023.pdf
Giraldo Ríos, L. (2021). Ciberseguridad y redes sociales. Revista de las Fuerzas Armadas, 257, 69-88. https://doi.org/10.25062/0120-0631.417
Griffin, A. (2024, septiembre 3). Is my phone listening to me? INDEPENDENT. https://www.independent.co.uk/tech/is-my-phone-listening-to-me-ad-microphone-privacy-b2606445.html
Instituto de la Comunicación e Imagen, Universidad de Chile, & Valdivia, A. (2021). Aprendizaje en las redes sociales: Literacidades vernaculares y académicas en la producción digital de jóvenes escolares. Pensamiento Educativo: Revista de Investigación Educacional Latinoamericana, 58(2). https://doi.org/10.7764/PEL.58.2.2021.8
Jacob Morrow. (2024, marzo 29). A Complete Guide to One-Time Passwords (OTPs): How They Enhance Security. engagelab. https://www.engagelab.com/blog/one-time-password-otp
Jacqueline Zote. (2024, febrero 14). Social media demographics to inform your 2024 strategy. sproutsocial. https://sproutsocial.com/insights/new-social-media-demographics/
Karishma Borkakoty. (2024, octubre 1). The Expert’s Guide to Doing a Social Media Audit. Sprinklr. https://www.sprinklr.com/blog/social-media-audit/
Kaspersky. (2022, octubre 21). Consejos para generar contraseñas seguras y únicas. Latam.kaspersky. https://latam.kaspersky.com/resource-center/threats/how-to-create-a-strong-password?srsltid=AfmBOorUqOh9UDMUFwcvC-Xzqc9Nm8TeYs07UF1Q-0X4Q1Pejp1wEYRg
Kumari, D., Namburi, A., Tanuj, K., Rangu, R., Muniswamy Naidu, N. K., & Mahmoud, M. (2023). Quantum Computing in Cryptography. 2023 International Conference on Computational Science and Computational Intelligence (CSCI), 490-495. https://doi.org/10.1109/CSCI62032.2023.00086
López Cruz, C. (2024). AUDITORÍA DE TI Y CIBERSEGURIDAD. https://www.seps.gob.ec/wp-content/uploads/Taller-Auditori%CC%81a-de-TI.pdf
Luke Irwin. (2021, noviembre 27). The GDPR: Why you need to adopt privacy by design. itgovernance. https://www.itgovernance.eu/blog/en/the-gdpr-why-you-need-to-adopt-the-principles-of-privacy-by-design
Mahmood Saqib, R., Shahid Khan, A., Javed, Y., Ahmad, S., Nisar, K., A. Abbasi, I., Reazul Haque, M., & Ahmadi Julaihi, A. (2022). Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security. Intelligent Automation & Soft Computing, 32(3), 1633-1647. https://doi.org/10.32604/iasc.2022.021786
Maria Hosken. (2024, septiembre 8). Privacy by Design and Its 7 Principles You Must Know About. websitepolicies.
Mero, R., & Paulina, A. (2022). Determinación de los peligros en las redes sociales en entorno a niños y adolescentes para uso y prevención.
Meta Platforms, Inc. (2025a). Meta Developers. Meta Platforms, Inc. https://developers.facebook.com/docs/apis
Meta Platforms, Inc. (2025b). Política de Privacidad de Facebook. Meta Platforms, Inc. https://www.facebook.com/privacy/policy
Meta Platforms, Inc. (2025c). Política de Privacidad de Instagram. Meta Platforms, Inc. https://privacycenter.instagram.com/policy/?entry_point=ig_help_center_data_policy_redirect
Namrata Maheshwari. (2024, septiembre 11). Encryption FAQ: encrypted messaging, AI, content moderation, and more. Accessnow.org.
National Institute of Standards and Technology (US). (2023). Advanced Encryption Standard (AES) (NIST FIPS 197-upd1; p. NIST FIPS 197-upd1). National Institute of Standards and Technology (U.S.). https://doi.org/10.6028/NIST.FIPS.197-upd1
Navas, V., & Alexander, N. (2021). Modelo de seguridad informática para riesgos de robo de información por el uso de las redes sociales. 1-13.
Obar, J. A., & Oeldorf-Hirsch, A. (2020). The biggest lie on the internet: Ignoring the privacy policies and terms of service policies of social networking services. Information, Communication & Society, Vol.23(N°1), 128-147. https://doi.org/10.1080/1369118X.2018.1486870
Quach, S., Thaichon, P., Martin, K. D., Weaven, S., & Palmatier, R. W. (2022). Digital technologies: Tensions in privacy and data. Journal of the Academy of Marketing Science, 50(6), 1299-1323. https://doi.org/10.1007/s11747-022-00845-y
Rodriguez Fabricio, K. A. (2024, septiembre 11). ¿Qué está pasando con nuestros datos personales en las redes sociales? Gobernarte. https://blogs.iadb.org/administracion-publica/es/que-esta-pasando-con-nuestros-datos-personales-en-las-redes-sociales/
Rosas-Lanas, G., & Pila-Cárdenas, G. (2023). protección de datos personales en Ecuador: Una revisión histórica-normativa de este derecho fundamental en el país suramericano. VISUAL REVIEW. International Visual Culture Review / Revista Internacional de Cultura Visual, 13(2), 1-16. https://doi.org/10.37467/revvisual.v10.4568
Ruiz, E. O., Herrerías, B. Y. R., Santiago, J. M., Valdivia, R. C., & García, A. E. (2020). Seguridad aplicada en las Redes Sociales mediante extracción de datos. División de Posgrado del Instituto Tecnológico de Orizaba.
Sánchez Bracho, M., Fernández, M., & Díaz, J. (2021). Técnicas e instrumentos de recolección de información: Análisis y procesamiento realizado por el investigador cualitativo. Revista Científica UISRAEL, 8(1), 107-121. https://doi.org/10.35290/rcui.v8n1.2021.400
Saz, P. E., & Pastor, L. M. T. (2020). Prevención de riesgos en Internet y redes sociales en Secundaria, desde la tríada alumnos, padres y profesores. http://hdl.handle.net/10952/4425
Serrano, R., & Razza, C. (2022, octubre 11). Instagram multado por violar la privacidad. Corral Rosales. https://corralrosales.com/instagram-multado-por-violar-privacidad/
SHARDSECURE. (2023, septiembre 19). The Advantages of Data Encryption. SHARDSECURE. https://shardsecure.com/blog/advantages-data-encryption
Srividhya Karthik. (2024, agosto 26). Data Sharing and Third Parties—Risks and Benefits Unveiled. cybersierra.
Stephanie Bodoni. (2021, diciembre 15). Multan a Twitter con más de 500 mil dólares por violar ley de privacidad de datos de la UE. El Financiero. https://www.elfinanciero.com.mx/tech/multan-a-twitter-con-mas-de-500-mil-dolares-por-violar-ley-de-privacidad-de-datos-de-la-ue/
Stewart, H. (2021). Cloud Computing Security Evaluation.
Temitayo Oluwaseun Abrahams, Oluwatoyin Ajoke Farayola, Simon Kaggwa, Prisca Ugomma Uwaoma, Azeez Olanipekun Hassan, & Samuel Onimisi Dawodu. (2024). Cybersecurity awareness and education programs: a review of employee engagement and accountability. Computer Science & IT Research Journal, 5(1), 100-119. https://doi.org/10.51594/csitrj.v5i1.708
Vercelli, A. (2019). La (des)protección de los datos personales: Análisis del caso Facebook Inc. - Cambridge Analytica. Electronic Journal of SADIO, 18(2), 57-70.
Vispo, S. E. (2023). Seguridad en las Redes Sociales Actuales. ARCHIVO DIGITAL UPM, 1-79. https://orcid.org/0000-0003-1790-5941
X corp. (2023). Políticas de Privacidad de Twitter. X corp. https://x.com/en/privacy
Yang, P., Xiong, N., & Ren, J. (2020). Data Security and Privacy Protection for Cloud Storage: A Survey. IEEE Access, 8, 131723-131740. https://doi.org/10.1109/ACCESS.2020.3009876
Yogi, K. S., V, D. G., Poornima, G., Prasad, K., D, Srinivas., & Prasanth, P. V. (2024). Comparative Analysis of Machine Learning Techniques for Detecting Sentiments in Social Media. 2024 2nd International Conference on Artificial Intelligence and Machine Learning Applications Theme: Healthcare and Internet of Things (AIMLA), 1-6. https://doi.org/10.1109/AIMLA59606.2024.10531524
Zaimy, N. A., & Kasiran, M. K. (2023). A Comparative Analysis of Security Measures in Social Media: Instagram and TikTok. 6(N°2), 1-7 pag.
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Revista Científica Arbitrada Multidisciplinaria PENTACIENCIAS - ISSN 2806-5794.

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

