LinkedIn Dropping User Pictures From AdsLinkedIn Dropping User Pictures From Ads
Incident underscores the uneasy cohabitation of honest communication and calculated commerce on social networks
August 12, 2011
LinkedIn has decided to stop using the pictures of its users in ads. Responding to critical reports in a blog post on Thursday, Ryan Roslansky, director of product management for the business-oriented social network, conceded that LinkedIn could have communicated its intentions regarding social ads more clearly and acknowledged that some of the site's users were unhappy having their names and images used in commercial messages.
"[E]ven though our members are happy to have their actions, such as recommendations, be viewable by their network as a public action, some of those same members may not be comfortable with the use of their names and photos associated with those actions used in ads served to their network," Roslansky wrote.
The revised Ads By LinkedIn Members format will no longer include user pictures but will retain a link that leads to a list of users in the viewer's network that have followed the advertised service or company.
Read the full article here.
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
What Ransomware Groups Look for in Enterprise Victims
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Everything You Need to Know About DNS Attacks
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report
2021 Banking and Financial Services Industry Cyber Threat Landscape Report
5 Reasons To Move your PKI Deployment to the Cloud