Explain various issues addressed in privacy policy
1. Data Collection and Sharing
Platforms collect user data and may share it with advertisers or partners.
2. Persistence of Information
Deleted content may still exist in cached or archived forms.
3. User Consent and Awareness
Users must be informed and give consent before data collection or
sharing.
4. Visibility and Control
Users can manage who sees their data, but defaults may expose it
publicly.
5. Commercial Use of Personal Data
User data may be used or sold for ads and marketing purposes.
6. Security Threats and Third-Party Access
Policies address risks like hacking, phishing, and unauthorized access.
7. Legal and Ethical Issues
Platforms must follow laws like GDPR and act ethically with user data.
8. Protection of Minors
Special rules protect kids from harm and inappropriate content.
1. How is success measured in social media? C2M SWREF
Success in social media is evaluated through a combination of
quantitative metrics and qualitative insights. These measurements help
individuals and organizations understand the effectiveness, reach, and
impact of their social media efforts.
1. Reach and Audience Size
• Reach refers to the number of unique users who have seen the content.
• It helps determine how far the content has traveled across the platform.
• High reach indicates strong visibility and awareness among the target
audience.
2. Engagement and Interaction
• Engagement includes likes, comments, shares, retweets, mentions,
replies, and reactions.
• Engagement Rate is a critical metric that measures the level of user
interaction relative to followers or impressions.
• High engagement indicates that the audience finds the content valuable
and relevant.
3. Follower and Subscriber Growth
• Growth in followers or subscribers over time reflects increasing interest
and brand popularity.
• Sudden spikes or drops in follower count can help assess the impact of
specific campaigns or posts.
4. Website Traffic and Conversions
• Social media platforms can drive users to official websites or landing
pages.
• Referral traffic is measured using tools like Google Analytics.
• Conversions refer to the number of users who complete a desired action
(e.g., purchase, registration, download) through social media.
5. Sentiment Analysis
• Sentiment analysis helps understand public opinion regarding a brand or
topic.
• It categorizes social media conversations as positive, negative, or
neutral.
• Useful for managing brand reputation and responding to crises or
complaints
6. Content Performance
• Measures how different types of content (images, videos, polls, etc.)
perform.
• Metrics include views, watch time, reactions, comments, and clicks.
• Helps in optimizing future content strategies.
7. Customer Feedback and Satisfaction
• Feedback through comments, direct messages, and reviews reveals
customer satisfaction.
• Prompt responses and positive experiences enhance brand loyalty and
trust.
8. Monitoring and Analytics Tools
• Success is also measured using analytics platforms like:
o Facebook Insights
o Twitter Analytics
o Instagram Insights
o Google Analytics
o Third-party tools like Hootsuite, Buffer, and Sprout Social
• These tools provide detailed reports on audience behavior, engagement,
and performance trends.
2. What are privacy policies? Explain any three threats to privacy on
social media? How can we maintain privacy online?
What are Privacy Policies?
Privacy policies are formal statements or legal documents that explain how a
website or social media platform collects, uses, stores, and protects users'
personal information.
They inform users about:
• What data is collected (e.g., name, location, browsing history)
• How it is used (e.g., advertising, analytics)
• With whom it may be shared (e.g., third-party apps)
• Users' rights over their data
Four Threats to Privacy on Social Media
1. Data Harvesting and Third-Party Sharing:
o Social media platforms collect massive amounts of user data and
may share or sell it to advertisers or third parties.
o Threat: Users might unknowingly give apps access to sensitive
information like contacts, emails, etc., which can be stored or
misused.
2. Phishing and Social Engineering Attacks:
o Hackers use fake messages or links to trick users into revealing
sensitive information (like passwords or banking info).
o Threat: These attacks often lead to identity theft or financial loss.
3. Location Tracking and Geo-Tagging:
o Social apps tag user locations when posting, which can reveal
home or work addresses.
o Threat: Criminals can misuse this information to stalk, harass, or
plan crimes.
4. Weak Passwords and Lack of Two-Factor Authentication (2FA):
o Using simple or repeated passwords across platforms increases
vulnerability.
o Threat: If a hacker cracks one password, they can access multiple
accounts.
How to Maintain Privacy Online
1. Regularly Review Privacy Settings:
Check your app settings frequently to ensure only trusted users can see
your posts or details.
2. Avoid Oversharing Personal Information:
Don’t share sensitive info like your phone number, address, or financial
details on public profiles.
3. Use Strong Passwords and Enable Two-Factor Authentication (2FA):
Use complex, unique passwords and enable 2FA for added security.
4. Be Cautious of Unknown Links and Apps:
Avoid clicking suspicious links or installing apps that ask for unnecessary
permissions.
5. Log Out of Shared Devices:
Always log out from your accounts when using public or shared devices.
.
Q5. Discuss various privacy attributes of social media sites
Privacy Attributes (Short One-Liners)
1. Data Collection Transparency: Platforms clearly state what user data
they gather (e.g., profile info, activity logs).
2. User Consent & Control: Users must opt in/out and choose which data
to share and with whom.
3. Visibility & Audience Settings: Granular controls let you set content
visibility (Public, Friends, Custom).
4. Third-Party Sharing Controls: You’re informed of—and can opt out
from—data sharing with advertisers or apps.
5. Data Retention & Deletion: Policies specify how long data is stored and
ensure you can permanently delete it.
6. Child/Minor Protection: Age-based restrictions, parental controls, and
predator safeguards for under-age users.
7. Security Features: Tools like 2FA, login alerts, and end-to-end
encryption prevent unauthorized access.
8. Data Ownership & User Rights: You retain rights to access, correct,
export, or erase your personal data.
Explain the Benefits of Brand Building
Brand Building – Key Benefits (Short Notes)
1. Customer Recognition
✔ Familiar logos and visuals make brands easily identifiable.
2. Customer Loyalty
✔ Positive experiences build emotional bonds and repeat purchases.
3. Trust & Credibility
✔ Consistent quality leads to customer confidence and premium pricing.
4. Competitive Advantage
✔ Unique identity helps stand out and retain loyal customers.
5. New Product Support
✔ Trusted brands ease the launch of new offerings.
6. Increased Business Value
✔ Strong brands attract investors and boost market worth.
7. Marketing Effectiveness
✔ Easier promotions with familiar, trusted brand names.
8. Employee Motivation
✔ Staff feel proud to work for well-known, respected brands.