{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T04:27:16Z","timestamp":1771820836754,"version":"3.50.1"},"reference-count":53,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"abstract":"<jats:p>With the amplification of social media platforms, the importance of social media analytics has exponentially increased for many brands and organizations across the world. Tracking and analyzing the social media data has been contributing as a success parameter for such organizations, however, the data is being poorly harnessed. Therefore, the ethical implications of social media analytics need to be identified and explored for both the organizations and targeted users of social media data. The present work is an exploratory study to identify the various techno-ethical concerns of social media engagement, as well as social media analytics. The impact of these concerns on the individuals, organizations, and society as a whole are discussed. Ethical engagement for the most common social media platforms has been outlined with a number of specific examples to understand the prominent techno-ethical concerns. Both the individual and organizational perspectives have been taken into account to identify the implications of social media analytics.<\/jats:p>","DOI":"10.4018\/ijt.2019070104","type":"journal-article","created":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T10:58:30Z","timestamp":1559041110000},"page":"57-70","source":"Crossref","is-referenced-by-count":27,"title":["Social Media to Social Media Analytics"],"prefix":"10.4018","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6753-1557","authenticated-orcid":true,"given":"Vikas","family":"Kumar","sequence":"first","affiliation":[{"name":"School of Business Studies, Sharda University, Noida, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4392-1788","authenticated-orcid":true,"given":"Pooja","family":"Nanda","sequence":"additional","affiliation":[{"name":"School of Business Studies, Sharda University, Greater Noida, India"}]}],"member":"2432","reference":[{"key":"IJT.2019070104-0","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2015.12.019"},{"key":"IJT.2019070104-1","unstructured":"Ahmad, I. (2018). The Rising Importance of Influencer Marketing \u2013 Statistics and Trends [Infographic]. Social Media Today. Retrieved from https:\/\/www.socialmediatoday.com\/news\/the-rising-importance-of-influencer-marketing-statistics-and-trends-info\/519084\/"},{"key":"IJT.2019070104-2","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242598"},{"key":"IJT.2019070104-3","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v20i12.5968"},{"key":"IJT.2019070104-4","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2011.583802"},{"key":"IJT.2019070104-5","unstructured":"Betancourt, L. (2010). How Companies Are Using Your Social Media Data. Mashable. Retrieved from https:\/\/mashable.com\/2010\/03\/02\/data-mining-social-media"},{"key":"IJT.2019070104-6","unstructured":"Buytendijk, F., & Heiser, J. (2013). Confronting the privacy and ethical risks of Big Data. Financial Times. Retrieved from https:\/\/www.ft.com\/content\/105e30a4-2549-11e3-b349-00144feab7de"},{"key":"IJT.2019070104-7","unstructured":"Call center agent arrested for Facebook \u2018identity theft.\u2019 (2012). ABS-CBN. Retrieved from http:\/\/news.abs-cbn.com\/-depth\/04\/20\/12\/call-center-agent-arrested-facebook-identity-theft"},{"key":"IJT.2019070104-8","unstructured":"Cohen, N. (2009). When Stars Twitter, a Ghost May Be Lurking. The New York Times. Retrieved from https:\/\/www.nytimes.com\/2009\/03\/27\/technology\/internet\/27twitter.html"},{"key":"IJT.2019070104-9","unstructured":"Cohen, P. R., Adams, N. M., & Berthold, M. R. (Eds.). (2010). Advances in Intelligent Data Analysis IX: 9th International Symposium, IDA 2010, Tucson, AZ, USA, 2010, Proceedings. Springer."},{"key":"IJT.2019070104-10","unstructured":"Collamer, N. (2013). Has LinkedIn crossed an ethical line? Forbes. Retrieved from https:\/\/www.forbes.com\/sites\/nextavenue\/2013\/09\/03\/has-linkedin-crossed-an-ethical-line\/#2f426412b33c"},{"key":"IJT.2019070104-11","unstructured":"Dada, G. (2017). What Is Influencer Marketing And How Can Marketers Use It Effectively? Forbes. Retrieved from https:\/\/www.forbes.com\/sites\/forbescommunicationscouncil\/2017\/11\/14\/what-is-influencer-marketing-and-how-can-marketers-use-it-effectively\/#3fea493923d1"},{"key":"IJT.2019070104-12","doi-asserted-by":"crossref","unstructured":"Donath, J., & Boyd, D. (2004). Public displays of connection. bt technology Journal, 22(4), 71-82.","DOI":"10.1023\/B:BTTJ.0000047585.06264.cc"},{"key":"IJT.2019070104-13","unstructured":"Ethical issues in social networking. (2018). Cariblogger. Retrieved from https:\/\/cariblogger.com\/ethical-issues-in-social-networking\/"},{"key":"IJT.2019070104-14","doi-asserted-by":"publisher","DOI":"10.1051\/matecconf\/201816701008"},{"key":"IJT.2019070104-15","unstructured":"Garisde, J. (2015). Twitter puts trillions of tweets up for sale to data miners. The Guardian. Retrieved from https:\/\/www.theguardian.com\/technology\/2015\/mar\/18\/twitter-puts-trillions-tweets-for-sale-data-miners"},{"issue":"2","key":"IJT.2019070104-16","first-page":"77","article-title":"The Rise of Social Media Influencer Marketing on Lifestyle Branding: A Case Study of Lucie Fink.","volume":"8","author":"M.Glucksman","year":"2017","journal-title":"Elon Journal of Undergraduate Research in Communications"},{"key":"IJT.2019070104-17","unstructured":"Hamby, S. (2012). Five reasons to use social media analysis. Huffington Post. Retrieved from https:\/\/www.huffingtonpost.com\/steve-hamby\/social-media-analysis_b_1344666.html"},{"key":"IJT.2019070104-18","unstructured":"Isaac, M. (2016). Facebook Said to Create Censorship Tool to Get Back Into China. The New York Times. Retrieved from https:\/\/www.nytimes.com\/2016\/11\/22\/technology\/facebook-censorship-tool-china.html"},{"key":"IJT.2019070104-19","unstructured":"Kaminski, M. E., & Klonick, K. (2017). Facebook, Free Expression and the Power of a Leak. The New York Times. Retrieved from https:\/\/www.nytimes.com\/2017\/06\/27\/opinion\/facebook-first-amendment-leaks-free-speech.html"},{"key":"IJT.2019070104-20","author":"A.Khan","year":"2015","journal-title":"Ethical Issues in Social Networking"},{"key":"IJT.2019070104-21","doi-asserted-by":"publisher","DOI":"10.4018\/jte.2012010104"},{"key":"IJT.2019070104-22","doi-asserted-by":"publisher","DOI":"10.4018\/IJSDS.2018010105"},{"key":"IJT.2019070104-23","doi-asserted-by":"publisher","DOI":"10.4018\/IJICTE.2019010108"},{"key":"IJT.2019070104-24","doi-asserted-by":"publisher","DOI":"10.4018\/IJEIS.2016010102"},{"key":"IJT.2019070104-25","unstructured":"Larson, S. (2017). Instagram hackers are selling user emails and phone numbers. CNN. Retrieved from http:\/\/money.cnn.com\/2017\/09\/01\/technology\/business\/instagram-hack\/index.html"},{"key":"IJT.2019070104-26","author":"K. C.Laudon","year":"2016","journal-title":"Management information system"},{"key":"IJT.2019070104-27","unstructured":"Madanapalle, A. (2017). Big data and psychographic profiling helped Donald Trump win the US presidential election. First Post. Retrieved from https:\/\/www.firstpost.com\/tech\/news-analysis\/big-data-and-psychographic-profiling-helped-donald-trump-win-the-us-presidential-election-3696847.html"},{"issue":"2","key":"IJT.2019070104-28","first-page":"67","article-title":"Ethical issues in the big data industry.","volume":"14","author":"K. E.Martin","year":"2015","journal-title":"MIS Quarterly Executive"},{"key":"IJT.2019070104-29","unstructured":"Naik, D. A. (2015). Organizational use of social media: The shift in communication, collaboration and decision-making."},{"key":"IJT.2019070104-30","unstructured":"Nelis, M. (2013). Instagram: An Issue of User Privacy. Business Ethics Cases. Retrieved from http:\/\/businessethicscases.blogspot.in\/2013\/04\/instagram-issue-of-user-privacy.html"},{"key":"IJT.2019070104-31","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.2.05"},{"key":"IJT.2019070104-32","unstructured":"Osterrieder, A. (2013). Connect with plant scientists on social networking sites. Plant Cell Biology. Retrieved from http:\/\/www.plantcellbiology.com\/2013\/02\/connect-with-plant-scientists-on-social-networking-sites\/"},{"key":"IJT.2019070104-33","unstructured":"Parez, M. E. (2013). Linked Into a Job?: the Ethical Considerations of Recruiting Through LinkedIn. Management. Retrieved from http:\/\/docs.rwu.edu\/management_theses\/1"},{"key":"IJT.2019070104-34","unstructured":"Pham, M. (2017). Vietnam says Facebook commits to preventing offensive content. Reuters. Retrieved from https:\/\/in.reuters.com\/article\/facebook-vietnam\/vietnam-says-facebook-commits-to-preventing-offensive-content-idINKBN17T0BN"},{"key":"IJT.2019070104-35","unstructured":"Rannard, G. (2017). How fake news plagued 2017. BBC News. Retrieved from http:\/\/www.bbc.com\/news\/world-42487425"},{"key":"IJT.2019070104-36","unstructured":"Ransbotham, S., & Kiron, D. (2017). Analytics as a Source of Business Innovation. MIT Sloan Management Review. Retrieved from https:\/\/sloanreview.mit.edu\/projects\/analytics-as-a-source-of-business-innovation\/"},{"key":"IJT.2019070104-37","doi-asserted-by":"crossref","unstructured":"Reuters (2017). Twitter Says It Might Finally Turn Profitable Quarter for the First Time Ever - Soon.(2017). Reuters.retrievd from http:\/\/fortune.com\/2017\/10\/26\/twitter-stock-profits-sales-earnings\/","DOI":"10.1016\/S0306-3747(17)30093-3"},{"key":"IJT.2019070104-38","unstructured":"Richardson, M. A. (2017). Data Re-Identification and The End of Privacy. Medium. Retrieved from https:\/\/medium.com\/@michaelarleigh\/data-re-identification-and-the-end-of-privacy-4cf7f4102612"},{"key":"IJT.2019070104-39","unstructured":"Roberts, J. J. (2016). Twitter, Surveillance, and the Challenges of Selling Social Data. Fortune. Retrieved from http:\/\/fortune.com\/2016\/12\/09\/twitter-social-media-data-surveillance"},{"key":"IJT.2019070104-40","unstructured":"Rosenberg, M., Confessore, N., & Cadwalladr, C. (2018). How Trump Consultants Exploited the Facebook Data of Millions. The New York Times. Retrieved from https:\/\/www.nytimes.com\/2018\/03\/17\/us\/politics\/cambridge-analytica-trump-campaign.html"},{"key":"IJT.2019070104-41","first-page":"2","article-title":"Big data: The end of privacy or a new beginning?","volume":"3","author":"I.Rubinstein","year":"2012","journal-title":"International Data Privacy Law"},{"key":"IJT.2019070104-42","unstructured":"Saylin, G. M., & Horrocks, T. C. (2013). The Risks of Pre-employment Social Media Screening. Society for Human Resource Management. Retrieved from https:\/\/www.shrm.org\/resourcesandtools\/hr-topics\/talent-acquisition\/pages\/preemployment-social-media-screening.aspx"},{"key":"IJT.2019070104-43","author":"C.Silverman","year":"2016","journal-title":"Most Americans who see fake news believe it, new survey says"},{"key":"IJT.2019070104-44","unstructured":"Statista (2017). Share of internet users in the United States who have ever had negative experiences as a result of being active on social media as of August 2017, by age group. Retrieved from https:\/\/www.statista.com\/statistics\/379407\/negative-experiences-from-being-on-social-media-by-generation\/"},{"key":"IJT.2019070104-45","unstructured":"Statista (2018). Number of monthly active Twitter users worldwide from 1st quarter 2010 to 4th quarter 2018 (in millions). Retrieved from https:\/\/www.statista.com\/statistics\/282087\/number-of-monthly-active-twitter-users"},{"key":"IJT.2019070104-46","unstructured":"Tech World. (2018). The most infamous data breaches. Retrieved from https:\/\/www.techworld.com\/security\/uks-most-infamous-data-breaches-3604586\/"},{"key":"IJT.2019070104-47","unstructured":"Thompson, C. (2015). What you really sign up for when you use social media. CNBC. Retrieved from https:\/\/www.cnbc.com\/2015\/05\/20\/what-you-really-sign-up-for-when-you-use-social-media.html"},{"key":"IJT.2019070104-48","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2014.08.317"},{"key":"IJT.2019070104-49","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.195"},{"key":"IJT.2019070104-50","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2010.151"},{"key":"IJT.2019070104-51","first-page":"153","article-title":"Evaluating event credibility on twitter.","author":"P.Zhao","year":"2012","journal-title":"Proceedings of the 2012 SIAM International Conference on Data Mining"},{"key":"IJT.2019070104-52","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2015.5"}],"container-title":["International Journal of Technoethics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=230343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T23:25:43Z","timestamp":1694906743000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJT.2019070104"}},"subtitle":["Ethical Challenges"],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":53,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.4018\/ijt.2019070104","relation":{},"ISSN":["1947-3451","1947-346X"],"issn-type":[{"value":"1947-3451","type":"print"},{"value":"1947-346X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7]]}}}