{"id":188,"date":"2019-04-27T11:22:16","date_gmt":"2019-04-27T03:22:16","guid":{"rendered":"https:\/\/networkconference.netstudies.org\/2019Open\/?p=188"},"modified":"2019-04-27T18:03:16","modified_gmt":"2019-04-27T10:03:16","slug":"linkedin-drives-and-promotes-data-exploitation","status":"publish","type":"post","link":"https:\/\/networkconference.netstudies.org\/2019Open\/2019\/04\/27\/linkedin-drives-and-promotes-data-exploitation\/","title":{"rendered":"LinkedIn drives and promotes data exploitation"},"content":{"rendered":"\n<p><strong>Abstract<\/strong><\/p>\n\n\n\n<p>The emerging technologies have shaped the way users communicate online, where LinkedIn drives users to expand their social network to the greater community to gain significant and objective outcomes. When users expose their profiles and opportunities on LinkedIn, the exposure users gather can be utilised, then users can exploit and store data for future promotion. However, data consent must take in place prior to importing data into a database. Data should be segmented and organised for a potential data analysis report. This has a huge impact on the way users utilise significant data, especially when there are regulations and powerful laws interfering in the way of the users\u2019 ability and views when exporting data from a social network. <\/p>\n\n\n\n<p><br><strong>Keywords<\/strong>: Networking, Social network, data, organisations, data collectors, privacy<br><\/p>\n\n\n\n<p>According to Borgatti and Everett (Cited in Abraham, Hassanien &amp; Panda, 2018), the internet is accessed by millions of social media users, but nonetheless important, the connection and data access are little understood due to the mandatory specification being asked online (Abraham, Hassanien &amp; Panda 2018). LinkedIn is the most used social media platform for businesses and networks to connect and gain online communication (Young Entrepreneur Council, 2018). LinkedIn as a social network platform exposes self-identity to LinkedIn users who have created a LinkedIn account online or through their online application. Though LinkedIn is used to connect and expand self-identity, the extreme ability LinkedIn offers is noted in several aspects of networking digitally and seems it has been understood by LinkedIn account owners. Academic authors such as Abraham, Hassanien &amp; Panda (2018) questions the power of data and the value of LinkedIn which seeks, collects and store data from what LinkedIn offers in order to create noise for their organisation or project\u2019s objective (Kohler, 2019).  Despite LinkedIn affords users with significant data, it is being methodically exterminated because users are uncertain on the ability of the power LinkedIn promotes. <\/p>\n\n\n\n<p>LinkedIn is a social media platform that allows identity expression (G\u00fcnd\u00fcz, 2017), exploration of different online communities (Papacharissi, 2009) and experimenting with data visible online (G\u00fcnd\u00fcz, 2017). LinkedIn is based on a niche audience (Papacharissi, 2009), where profiles are targeted using the information provided by users\u2019 professionalism within and outside of their network (Papacharissi, 2009). LinkedIn specialises to connect with different organisations and allowing associations to establish a networking environment.&nbsp; Furthermore, LinkedIn allows users to \u201cconnect, communicate, and develop valuable relationships that are crucial to a business\u2019 success\u201d (Sean L, August 2018). The social network prior to LinkedIn had a different mechanism, where personal blogs were created and advertised digitally that began to burst into popularity (Hendricks, 2013). This established another networking environment where users can \u201creach the maximum number of people without sacrificing the intimacy of person-to-person communication\u201d (Hendricks, 2013). The observation of this LinkedIn platform only portrays a view of how one\u2019s organisation can reach success just by connecting with other networks (Hendricks, 2013). Exploring data using LinkedIn can provide users with endless options to seek people with similar interests, hierarchy levels and influencers to expand professional online community and knowledge (LinkedIn, 2019). Examples of searching for people using LinkedIn is through keywords such as company or job title or search for titles associated with \u201cdirector\u201d or searches can expand to more than one person by using the search bar (LinkedIn, 2019). LinkedIn has the power of enabling users to explore and experiment with endless information to suit their company\u2019s objective.<\/p>\n\n\n\n<p>A user of LinkedIn can connect with other users, where users will find personal information prior to accepting the connection. When users are, they are given the other users\u2019 identity which means data is given. The information displayed on LinkedIn can be collected and measured to identify the type of data, the performance of users\u2019 interactions and content sharing (Pang et al. 2008, cited in Panda et al., 2018). This entirely means that data can be found anywhere on the world wide web, however, the utilisation and measurement are significant to businesses (Abraham, Hassanien &amp; Panda, 2018). It is vital to understand the background and the mechanism of LinkedIn; however, businesses and professionals are in no doubt connected with other professionals to gain knowledge and support (Abraham, Hassanien &amp; Panda, 2018). Other users will argue their objective differs where they need to grow their database instead. LinkedIn provides data such as job titles, industry, geographical and contact information. Once data is collected, and prior data is stored, data integrity enhances the health and maintenance of any digital information which there are several types of data integrity procedures (Brook, 2019). In this case, Entity Integrity identifies each record from each other. Users of LinkedIn does not provide a numeric number except a number is not provided on LinkedIn, however, an email address can be a unique identifier if data is sourced from LinkedIn. Other ways in storing data may include contacts should not have any spelling mistakes or errors when importing data. <\/p>\n\n\n\n<p>Once data integrity is applied, data should be measured through various methods of data analysis (Brook, 2019). For example, data should be analysed using a tool that is stronger enough to create reports that compare each data that was transferred into a lead or not. Data integrity and data measurements are vital, though there are other ways to do this digitally (Sridhar, 2018). LinkedIn allows administrators to access analytics that can identify the movement across each business\u2019 profile (Sridhar, 2018). Through this type of measurement using Linkedin, users have the potential to analyse the noise made on their page (Sridhar, 2018). For example, the analytics within LinkedIn allows them to explore who clicked and interacted that provides an overall engagement. This will allow boosting inbound marketing procedures which feedback into the organisation\u2019s database. However, this cannot happen unless data collected from LinkedIn\u2019s analytics is only accepted if data integrity is applied (Sridhar, 2018). Subsequently, data analysis is used to compare the inflation between page visits, an analysis of themes and other information an organisation requires. Data analysis is applied through its methodical statistics or rational technique to highlight, summarise and evaluate data within a system (Raulf, 2016). LinkedIn provides this analysis through its own portal. Google analytics is also used to compare and analyse each movement made on a social network (Raulf, 2016). In relation to LinkedIn and an internal database, Power Business Intelligence allows owners to connect a segmented database, social media channels and other systems to analyse movements across the digital platform (Raulf, 2016).<\/p>\n\n\n\n<p>LinkedIn is used on a daily basis, and many organisations are utilising this platform, however, the uncertainty of the importance and use of power can be seen obvious. In all organisation, data is the foundation of success and without quality data, data will not be a significant matter to one\u2019s use. Therefore, it is important to \u201cunderstand the dynamics and mechanisms\u201d (Grindrod et al. 2011 cited in pg. 5, Panda, 2018 behind the formation of the network (Grindrod et al. 2011 cited in pg. 5, Panda, 2018) in order to generate information from LinkedIn. Once data is collected from LinkedIn, the cleaned and aggregated data will then be imported into a data analysis tool. The tools will define the data, capture sequential pattern and provides what-if question, as it ensures the data is gathered in the application of statistical methods (Sridhar, 2018). <\/p>\n\n\n\n<p><br> LinkedIn has the ability to provide data which can be collected and stored in a database, however, precaution discussions on the data protection, for both individual and users must be considered at all times. Mrutyunjaya Panda thoroughly explains that \u201cthe social network is observed to be an inevitable part of human life\u201d (Panda et, al., 2018). Consumers and businesses must be aware of the risks in place when playing with data, especially when personal information is involved. There are concerns in today\u2019s world where data is magically taken away from an individual\u2019s privacy, who can access their data, and the movement from the time data is collected to data applied elsewhere. It is understandable organisations including governments are struggling with modern trends of data protection and ensuring right practices are in place (Stenons, 2018). The Australia government may protect interruptions, only if one gives permission to the other (Eyers, 2018). In some respects, individuals can control the way other users can access their profiles, however, if data is provided by users and displayed online, then data may be used for contact (Constine, 2018). A huge part of the social network is based on providing and consuming data which \u201care rich in content and linkage data\u201d (Panda et, al., 2018) within the social network of LinkedIn. LinkedIn provides all users maximum capability to access other users\u2019 information such as email addresses (Constine, 2018). Users must accept the conditions prior to allowing to provide LinkedIn with their personal information as users can visit profiles where email addresses are provided. Though this procedure may be the easiest yet, valuable way to communicate the objective of a project, data privacy and protection must be in place (Stenons, 2018). The power of LinkedIn allows users access to collect data; however, it is vital that data collectors demonstrate consent prior to processing any personal information (OAIC, 2019). <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>According to the Office of the Australia Information Commissioner, \u201cbusinesses also need to make the withdrawal of consent as easy as giving consent, and, before individuals give consent, must inform individuals about this right to withdraw consent\u201d (OAIC, 2019). When consent is made, a formal written confirmation must be crystallised and uniquely identified on the purpose of the data collection (OAIC, 2019). There is a risk of losing a potential client, however, it is better than interfering with law. Technology and its platforms provide maximum usability to its users. There are cases where LinkedIn is falling short with data protection where some areas do not meet the best practice of compliance (ICE, 2019). Organisations must be vigilant on how they access their data, and whether they are meeting data privacy practices, even though LinkedIn provides vital information to its users. An example of carrying this procedure ethically, data should always be varied by the person who they connect with \u2013 it can either be through cold calling, verifying and asking permission or private message with their enquiry (ICE, 2019). Data protection is not only for the organisation, but it is also for all parties involved. Risks for not having a practice or making a decision only based on business\u2019 selfishness objectives, can interfere with data law (ICE, 2019). Therefore, questions should be raised on the importance of data \u2013 it is basically a decision based upon significant elements of a company\u2019s objective. <\/p>\n\n\n\n<p>LinkedIn has the power of promoting data to users who seek to grow their central database. Therefore, data maintenance is a significant task in ensuring data is segmented according to common themes and codes (Papacharissi, 2009). Segmenting finds the relevance within a database which assists in promoting marketing activities to customers listed in a database (Linthorst, 2013). The exploration and the efficiency of LinkedIn allow users to capture information such as demographic and firmographic answers. Users can go against the power of LinkedIn and segment data into common themes and codes which ensures efficiency, maintenance and accordance. the significant element is the recognition of overall themes within a database, and \u201ccoded according to thematic significance\u201d (Papacharissi, 2009. Pg. 206). Once information is gathered, segmenting data according to preference search will identify the meaning of each data imported into the central database (Papacharissi, 2009). <\/p>\n\n\n\n<p>An example of segmenting data could be coded according to the type of industry and ensuring an email address is a unique identity (Papacharissi, 2009) which this method can identify the purpose of each contact sustained (cited in Boyd and Ellison, 2007. Papacharissi, 2009). Furthermore, when data is extracted from LinkedIn, whether it is personal information or the overall page visits, data should be segmented into common themes such as demographics, interests, users\u2019 industry or position titles (Papacharissi, 2009), depending on the objective of the project. &nbsp;It will not only allow future communication mail-outs to be successful, but it will also provide users of the central databases to search smoother (Papacharissi, 2009). Nevertheless, if data is stored and used for distribution to active LinkedIn users that are being used unethically, users of LinkedIn may report content as spam for purposes such as inappropriate content and profile, fake accounts or phishing or suspicious messaged on LinkedIn (LinkedIn, 2018). Therefore, LinkedIn offers to flag content and profiles directly online (LinkedIn, 2018). LinkedIn will take action and remove content if necessary, as it is against LinkedIn\u2019s privacy policy to continue to share accounts if being used (LinkedIn, 2018).<\/p>\n\n\n\n<p>LinkedIn and its data provided is used for endless reasons. The collection and dissemination of raw data are significant in today&#8217;s world, LinkedIn collects sand expose user\u2019s demographic and firmographic information to existing and potential connections for reasons that can be unknown or beneficial. Organisations may abuse data, and other users seek to source vital information to grow success, though data should be segmented in case of any data loss or confusion when data is stored, above all data should be used with respect by seeking consent prior to sorting and storing the data. LinkedIn a powerful platform that drives and promotes data through providing numerous demographics, geographic firmographic information however, LinkedIn drives exploitation because users have been gathering information and storing data into a centralised database. LinkedIn and data marry together well, LinkedIn provides users with data and LinkedIn\u2019s users provide data. Abraham, Hassanien &amp; Panda (2018) believe big data is taken over the world, therefore the appreciation of data is unfolding thanking the power of social network such as LinkedIn providing data with significant success.  <\/p>\n\n\n\n<p><strong>Reference list:<\/strong><\/p>\n\n\n\n<p>Abraham, Hassanien &amp; Panda. (2018). Big Data Analytics: A social network approach. Retrieved from https:\/\/books.google.com.au\/books?id=x6t-DwAAQBAJ&amp;pg=PP9&amp;lpg=PP9&amp;dq=Borgatti+and+Everett+Panda&amp;source=bl&amp;ots=JGMUjJzfkj&amp;sig=ACfU3U3XqJEi-LTzmEbtMRXs5EykeBICPg&amp;hl=en&amp;sa=X&amp;ved=2ahUKEwjCrd6Tg-_hAhWDe30KHRpfAhQQ6AEwDnoECAgQAQ#v=onepage&amp;q=Borgatti%20and%20Everett%20Panda&amp;f=false<\/p>\n\n\n\n<p>Constine, J. (2018). LinkedIn cuts off email address exports with new privacy setting. <em>Techcrunch<\/em>. Retrieved from https:\/\/techcrunch.com\/2018\/11\/21\/linkedin-email-privacy\/ <\/p>\n\n\n\n<p>Hauff, C., &amp; N\u00fcrnberger, A. (2018). On the Use of Scale-Free Networks for Information Network Modelling, 2-10. Retrieved fromhttps:\/\/pdfs.semanticscholar.org\/c5ba\/5f3f268ea61729e08990709d1f1089550e12.pdf<\/p>\n\n\n\n<p>G\u00fcnd\u00fcz, U. (2017). The Effect of Social Media on Identity Construction, (8)5, 2-8. Retrieved from https:\/\/www.degruyter.com\/downloadpdf\/j\/mjss.2017.8.issue-5\/mjss-2017-0026\/mjss-2017-0026.pdf<\/p>\n\n\n\n<p>Hendricks, D. (2013). Complete History of Social Media: Then And Now. Retrieved from<br> <a href=\"https:\/\/smallbiztrends.com\/2013\/05\/the-complete-history-of-social-media-%20%20%20%20%20%20infographic.html\">https:\/\/smallbiztrends.com\/2013\/05\/the-complete-history-of-social-media-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; infographic.html<\/a><\/p>\n\n\n\n<p>Linthorst, M. (2013). How to effectively segment your data. Retrieved from&nbsp;&nbsp;&nbsp; <a href=\"https:\/\/econsultancy.com\/how-to-effectively-segment-your-data\/\">https:\/\/econsultancy.com\/how-to-effectively-segment-your-data\/<\/a><\/p>\n\n\n\n<p>Lunden,\nI. (2018, November 24).<strong> <\/strong>LinkedIn violated data protection by\nusing 18M email addresses of non-members to buy targeted ads on Facebook. <em>Techcrunch<\/em>. Retrieved from\nhttps:\/\/techcrunch.com\/2018\/11\/24\/linkedin-ireland-data-protection\/<\/p>\n\n\n\n<p>Mrutyunjaya, P, et., al. (2018). <em>Big Data Analytics: A Social Network Approach.<\/em> Retrieved from&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; <em> <a href=\"https:\/\/doi-org.dbgw.lis.curtin.edu.au\/10.1201\/9781315112626\">https:\/\/doi-org.dbgw.lis.curtin.edu.au\/10.1201\/9781315112626<\/a><\/em><\/p>\n\n\n\n<p>Office\nof the Australian Information Commissioner. (2018). Privacy business resource\n21: &nbsp;&nbsp;Australian businesses and the EU General Data Protection\nRegulation. Retrieved from &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; www.oaic.gov.au\/agencies-and-organisations\/business-resources\/privacy-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; business-resource-21-australian-businesses-and-the-eu-general-data-protection-&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; regulation. <\/p>\n\n\n\n<p>Papacharissi, Z. (2009). The virtual geographies of social networks: <em>a comparative analysis of Facebook, LinkedIn and ASmallWorld<\/em>, <em>1<\/em>(1&amp;2), 206-210. &nbsp;DOI: 10.1177\/1461444808099577 <\/p>\n\n\n\n<p>Raulf,\nC. (2016, May 17). How to Measure your LinkedIn Activities. <em>Social media Examiner. <\/em>Retrieved from &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; https:\/\/www.socialmediaexaminer.com\/how-to-measure-your-linkedin-activities\/<\/p>\n\n\n\n<p>Sean.\n2018. <em>What is linkedin used for<\/em>. <em>Digital Shift<\/em>.&nbsp; https:\/\/digitalshiftmedia.com\/author\/sean\/<\/p>\n\n\n\n<p>Sentonas,\nM. (2018, June 1). Australia needs to do more on data protection. <em>The Australian Business Review.<\/em> Retrieved\nfrom https:\/\/www.theaustralian.com.au\/business\/technology\/australia-needs-to-do-more-on-data-protection\/news-story\/1d2abaf1fd4fcef8911fafaaefb2b2b9<\/p>\n\n\n\n<p>Sridhar, J.\n(2018). What is Data Analysis and Why is it important. Retrieved\nfrom&nbsp; <a href=\"https:\/\/www.makeuseof.com\/tag\/what-is-data-analysis\/\">https:\/\/www.makeuseof.com\/tag\/what-is-data-analysis\/<\/a><\/p>\n\n\n\n<p>Search for People on LinkedIn. (2018). https:\/\/www.linkedin.com\/help\/linkedin\/answer\/3544\/searching-for-people-on-linkedin?lang=en<\/p>\n\n\n\n<p>What people can see on your profile. (2018).<br>https:\/\/www.linkedin.com\/help\/linkedin\/answer\/77\/what-people-can-see-on-your-profile?lang=en<\/p>\n\n\n\n<p>Young Entrepreneur Council. (2018). The Pros and Cons of LinkedIn Marketing. https:\/\/www.inc.com\/young-entrepreneur-council\/the-pros-cons-of-linkedin-marketing-in-2018.html<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Abstract The emerging technologies have shaped the way users communicate online, where LinkedIn drives users to expand their social network to the greater community to gain significant and objective outcomes. When users expose their profiles and opportunities on LinkedIn, the exposure users gather can be utilised, then users can exploit and store data for future&hellip; <a href=\"https:\/\/networkconference.netstudies.org\/2019Open\/2019\/04\/27\/linkedin-drives-and-promotes-data-exploitation\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">LinkedIn drives and promotes data exploitation<\/span><\/a><\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[99,101,103,97,100,102,98],"class_list":["post-188","post","type-post","status-publish","format-standard","hentry","category-social","tag-data","tag-data-collectors","tag-linkedin","tag-networking","tag-organisations","tag-privacy","tag-social-network"],"_links":{"self":[{"href":"https:\/\/networkconference.netstudies.org\/2019Open\/wp-json\/wp\/v2\/posts\/188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/networkconference.netstudies.org\/2019Open\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/networkconference.netstudies.org\/2019Open\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/networkconference.netstudies.org\/2019Open\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/networkconference.netstudies.org\/2019Open\/wp-json\/wp\/v2\/comments?post=188"}],"version-history":[{"count":4,"href":"https:\/\/networkconference.netstudies.org\/2019Open\/wp-json\/wp\/v2\/posts\/188\/revisions"}],"predecessor-version":[{"id":200,"href":"https:\/\/networkconference.netstudies.org\/2019Open\/wp-json\/wp\/v2\/posts\/188\/revisions\/200"}],"wp:attachment":[{"href":"https:\/\/networkconference.netstudies.org\/2019Open\/wp-json\/wp\/v2\/media?parent=188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/networkconference.netstudies.org\/2019Open\/wp-json\/wp\/v2\/categories?post=188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/networkconference.netstudies.org\/2019Open\/wp-json\/wp\/v2\/tags?post=188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}