These applications take many forms but some typical and popular forms include: Some social networks allow program developers to access their platforms in order to create these applications.
Information leakage also occurs in mobile online social networks, according to Privacy Leakage in Mobile Online Networks, another study by Krishnamurthy and Wills.
To learn more about cookies and how to browse the Internet safely and privately, see PRC Fact Sheet 18: Privacy and the Internet.
Companies that operate social networks are themselves collecting a variety of data about their users, both to personalize the services for the users and to sell to advertisers.
This fact sheet will provide information about the advantages and disadvantages of using social networks, what kind of information may be safe to post and how to protect it, as well as who is able to access different types of information posted to these networks.