2.3 Conclusion This chapter has gone through six related researches that have been done by other
researchers on the same topic. The first literature by Loeffler has looked at the prevailing
privacy issues on social media. The reason why this work was picked is because it focuses on
the infrastructure of social media platforms that have led to the current privacy issues. The
second work of literature that has been discussed is by Heyman, Wolf, and Pierson. They
have helped solve the conundrum surrounding the definition of privacy. They take a unique
approach that this research adapts; they view privacy from two perspectives.
The third work is a real-life comparison of privacy between users of two different
regions, the US and China. This research is only picked due to its real-life approach to this
topic. The researchers have conducted a research on two types of users and they share their
findings. The researchers do a good job trying to explain the distinct characteristics between
the two groups of users that lead them to show the observed behavior on social media.
The fourth work of literature that this research has discussed is by Bryan Hammer
who discusses social media privacy using a very interesting approach. Instead of approaching
the topic from a singular viewpoint, Hammer breaks his research into three, where each part
views privacy from a different lens. The last two pieces of literature give short but important
contributions to this topic of social media privacy. The first of these two looks at the direct
impacts of increased user awareness on social media content sharing. The second literature is
on the legal side of the discussion about social media privacy. It examines the legality of the
ways that organizations can use to protect themselves from social media privacy and security
risks.