This paper researched two issues; targeted advertising and politics in social media. In its findings, it was apparent that many social media platforms actively collected user data and used big data to store and analyze it so as to profile the users. From these profiles, targeted adverts were served to the users on their social media feeds. The data collection process was however found to be unethical and full of privacy intrusions. Concerning politics, it was found out that social media had been used as a political tool. There were findings that most users were annoyed with political posts being shown on their feeds. The culprits were found to be the algorithms behind social media feeds and suggestions and the users themselves. The paper gave recommendations said to be temporary solutions for the issues surrounding target advertising and politics in social media.
Original languageEnglish
Title of host publicationSecurity and privacy in communication networks
Subtitle of host publicationSecureComm 2017 international workshops, proceedings
EditorsXiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang
Place of PublicationCham, Switzerland
Number of pages8
ISBN (Electronic)9783319788166
ISBN (Print)9783319788159
Publication statusPublished - 25 Apr 2018
Event13th International Conference on Security and Privacy in Communication Networks: SecureComm 2017 - Crowne Plaza Niagara Falls – Fallsview, Niagara Falls, Canada
Duration: 22 Oct 201725 Oct 2017
https://securecomm.eai-conferences.org/2017/ (Conference website)

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
ISSN (Print)1867-8211
ISSN (Electronic)1867-822X


Conference13th International Conference on Security and Privacy in Communication Networks
CityNiagara Falls
OtherSecureComm seeks high-quality research contributions in the form of well-developed papers. Topics of interest encompass research advances in ALL areas of secure communications and networking. Topics in other areas (e.g., formal methods, database security, secure software, theoretical cryptography) will be considered only if a clear connection to private or secure communication/networking is demonstrated.
Internet address


Dive into the research topics of 'Privacy in social media'. Together they form a unique fingerprint.

Cite this