6 datasets found
  1. Number of changes by social media companies 2017-2024, by platform

    • statista.com
    Updated Mar 20, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Number of changes by social media companies 2017-2024, by platform [Dataset]. https://www.statista.com/statistics/1607472/changes-social-media-companies-by-platform/
    Explore at:
    Dataset updated
    Mar 20, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide
    Description

    A study conducted between 2017 and 2024, found that four of major tech and social media companies, Google, Snap, Meta, and TikTok have made changes in policies, services, and products. In the measured period, the highest number of changes was registered in 2021, with Meta and TikTok accounting for the highest number of policy changes. In 2023, Meta made the highest number of changes in overall policies, 12 in total.

  2. Number of changes by social media companies 2017-2024

    • statista.com
    Updated Mar 20, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Number of changes by social media companies 2017-2024 [Dataset]. https://www.statista.com/statistics/1607470/changes-social-media-companies/
    Explore at:
    Dataset updated
    Mar 20, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide
    Description

    A study conducted between 2017 and 2024, found that four of major tech and social media companies, Google, Snap, Meta, and TikTok have made changes in policies, services, and products. In the measured period, the highest number of changes was registered in 2021, 42 changes in total. As this was the year Age-Appropriate Design Code (AADC) became effective, industry professionals believe it hugely impacted such a significant number of changes made by tech companies. Furthermore, 2023 saw 30 changes.

  3. Number of data compromises and impacted individuals in U.S. 2005-2023

    • statista.com
    Updated Dec 10, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2024). Number of data compromises and impacted individuals in U.S. 2005-2023 [Dataset]. https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
    Explore at:
    Dataset updated
    Dec 10, 2024
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    United States
    Description

    In 2023, the number of data compromises in the United States stood at 3,205 cases. Meanwhile, over 353 million individuals were affected in the same year by data compromises, including data breaches, leakage, and exposure. While these are three different events, they have one thing in common. As a result of all three incidents, the sensitive data is accessed by an unauthorized threat actor. Industries most vulnerable to data breaches Some industry sectors usually see more significant cases of private data violations than others. This is determined by the type and volume of the personal information organizations of these sectors store. In 2022, healthcare, financial services, and manufacturing were the three industry sectors that recorded most data breaches. The number of healthcare data breaches in the United States has gradually increased within the past few years. In the financial sector, data compromises increased almost twice between 2020 and 2022, while manufacturing saw an increase of more than three times in data compromise incidents. Largest data exposures worldwide In 2020, an adult streaming website, CAM4, experienced a leakage of nearly 11 billion records. This, by far, is the most extensive reported data leakage. This case, though, is unique because cyber security researchers found the vulnerability before the cyber criminals. The second-largest data breach is the Yahoo data breach, dating back to 2013. The company first reported about one billion exposed records, then later, in 2017, came up with an updated number of leaked records, which was three billion. In March 2018, the third biggest data breach happened, involving India’s national identification database Aadhaar. As a result of this incident, over 1.1 billion records were exposed.

  4. o

    Requirements for the protection of personal data (POPD) – Data Management...

    • explore.openaire.eu
    Updated Jul 26, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Hadjipavlou-Litina Dimitra; Vakali Athena (2022). Requirements for the protection of personal data (POPD) – Data Management Plan [Dataset]. http://doi.org/10.5281/zenodo.14509673
    Explore at:
    Dataset updated
    Jul 26, 2022
    Authors
    Hadjipavlou-Litina Dimitra; Vakali Athena
    Description

    The current document constitutes the 2nd version of the Data Management Plan of the EU funded project “RESET – Redesigning Equality and Scientific Excellence Together” (GA number 101006560). RESET is a Horizon 2020 Coordination and support action aiming to address the challenge of Gender Equality in research institutions in a diversity perspective, with the objective to design and implement a user-centered, impact-driven and inclusive vision of scientific excellence. The document outlines the overall approach to data management and defines the dataset, standards and metadata, data-sharing and archiving and preservation with regards to data that might be relevant in relation to the Horizon 2020 Open Research Data Pilot (OpenAIRE ) (EC, 2017) and FAIR Data Management guidelines (EC, 2016). The updated version of this document has been prepared in M17 as the project and research activities evolve to include new data, adjustments in the processes deployed, changes in consortium policies or any other issue regarding the data management of the project.

  5. c

    Security elite, interview data 2015-2017

    • datacatalogue.cessda.eu
    Updated Mar 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Thomson, C (2025). Security elite, interview data 2015-2017 [Dataset]. http://doi.org/10.5255/UKDA-SN-853043
    Explore at:
    Dataset updated
    Mar 1, 2025
    Dataset provided by
    University of Exeter
    Authors
    Thomson, C
    Time period covered
    Apr 1, 2015 - Dec 1, 2017
    Area covered
    United Kingdom
    Variables measured
    Individual
    Measurement technique
    Interviewees were selected on the basis of their familiarity with the design and implementation of foreign policy in the Whitehall community. Initial interviews were conducted with honorary professors/fellows of the University of Exeter’s Strategy and Security Institute (SSI). Subsequent interviewees were selected by employing snowball sampling depending on which security policy areas appeared to be least represented in the sample. Interviewees hold – or recently held – senior positions in their organizations: Senior Civil Servants (and equivalent officials) at Director Grade or above; Armed Forces officers at Brigadier (1*) level or higher.10 Interviewees were either active in the UK system, or recently retired. Most have rotated between different UK governmental agencies, and have represented different organizations in the 2010 and the 2015 SDSRs (and in some cases, the 1998 SDR too) so cannot neatly be categorized as representing (only) one specific department. The final sample comprised representatives from the MoD (four civilian and four military with tri-Service representation, although all were working in joint posts, and two retired), the Foreign and Commonwealth Office (FCO) (two current, one retired), the Department for International Development (DfID) (one), the Cabinet Office (three), defence think-tanks (two), senior academics specializing in UK security (two), the Home Office (one, retired), the National Security Secretariat (one, retired), and a retired Security and Intelligence Coordinator.
    Description

    25 face-to-face semi-structured interviews were conducted with high-level members of the UK’s foreign, defence, and security policy communities over 2015-17. Their identities are protected as part of the conditions under which they could speak candidly (and due to University and MoD ethics requirements). Key personnel from different government security agencies/departments were selected based on their knowledge of and experience with the design of security policy in the UK.

    This project seeks to explain how security policy is developed in the UK, and suggest how relationships between different security and defence agencies can be improved. Security policies protect the borders of a nation-state and the security of its citizens and include military, economic, environmental and cybersecurity policies. These policies are designed and implemented by different agencies including military organizations, the intelligence community, and government departments such as the Cabinet Office and the Ministry of Defence. We live in a fast-paced world where security threats may unexpectedly emerge from state actors such as the Syrian government, or non-state actors such as terrorist organizations. In this rapidly changing security environment it is paramount that national security policies be designed with enough flexibility so as to increase the likelihood of success. Important constraints can hinder this need for flexibility.

    One such constraint is that members of the security and defence community might fear losing support, appearing as incompetent, or harming the reputation of their agency if they fail to implement a security policy they had previously committed to implementing. This can make them wary of significantly modifying a security policy, even in the face of important environmental changes such as budget cuts or the emergence of new information regarding the predicted effectiveness of its implementation. Such fear of domestic backlash likely played a role in American forces continuing to build up Iraqi security forces, even in the face of compelling evidence that suggested these forces were in fact fuelling sectarian conflict.

    The first part of this study combines theories of foreign policy decision-making with the real-life experiences of high-level practitioners developed during residencies in key government departments and military organizations. The applicant will interviews elite members of the security and defence community in the UK involved in the design and implementation of security policies. Although the interviews will be carried out with members of the security and defence communities from the UK, the theory will be pertinent to describe the development of security policy globally.

    In the second part of this study this theory will be tested using innovative experimental techniques to allow a detailed and empirically grounded exploration of the formation of security policy in democracies. Members of the security and defence community will be invited to participate in the online survey experiment. They will read about a hypothetical international security crisis, a policy that was initially proposed by a Whitehall agency, and whether the agency acted consistently or inconsistently regarding its implementation. They will then answer questions about their willingness to support the behaviour of the agency they read about. The answers of all participants will be analysed to determine if inconsistent behaviour is punished when it comes to the design and implementation of security policies.

    Knowledge will be exchanged with members of the security and defence community during the entire study. This will culminate in the third and final part of this study. Findings will be presented at agencies that design and implement security policy in the UK, so each agency can learn more about how other agencies operate and how they view each other. Also, the applicant will organize a two-day practitioner workshop. Here members of the security and defence community, members of the broader civil society such as non-governmental organizations, and representatives of the media and pressure groups will discuss how actors not directly involved security policy play a role in shaping it indirectly.

  6. O

    SoE2017: Extent and rate of change of protected areas

    • data.qld.gov.au
    • data.gov.au
    csv
    Updated Feb 21, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Environment, Tourism, Science and Innovation (2023). SoE2017: Extent and rate of change of protected areas [Dataset]. https://www.data.qld.gov.au/dataset/soe2017-extent-and-rate-of-change-of-protected-areas
    Explore at:
    csv(2355)Available download formats
    Dataset updated
    Feb 21, 2023
    Dataset authored and provided by
    Environment, Tourism, Science and Innovation
    Description

    The protected area estate increased by half a million hectares between 2015–2017 and now covers approximately 8.2% of Queensland

  7. Not seeing a result you expected?
    Learn how you can add new datasets to our index.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Statista (2025). Number of changes by social media companies 2017-2024, by platform [Dataset]. https://www.statista.com/statistics/1607472/changes-social-media-companies-by-platform/
Organization logo

Number of changes by social media companies 2017-2024, by platform

Explore at:
Dataset updated
Mar 20, 2025
Dataset authored and provided by
Statistahttp://statista.com/
Area covered
Worldwide
Description

A study conducted between 2017 and 2024, found that four of major tech and social media companies, Google, Snap, Meta, and TikTok have made changes in policies, services, and products. In the measured period, the highest number of changes was registered in 2021, with Meta and TikTok accounting for the highest number of policy changes. In 2023, Meta made the highest number of changes in overall policies, 12 in total.

Search
Clear search
Close search
Google apps
Main menu