Social Networking sites have been popular since their introduction. But you sacrifice so much in privacy as far as pictures, location of you, your residence and even what your habits on a daily basis. People all over the world are on SNS put up information that some time too personal all the time but then at the same time complain about privacy issues. Why is that? Do they have the right to complain? If so, to what the degree can they before the fault fall on them? And how does the lack of knowledge by the young of what to disclose on the SNS to strangers hurt them?
1. Taraszow, T., Aristodemou, E., Shitta, G., Laouris, Y., & Arsoy, A. (2010). Disclosure of personal and contact information by young people in social networking sites: An analysis using facebook™ profiles as an example. International Journal of Media & Cultural Politics, 6(1), 81-101. doi:10.1386/macp.6.1.81/1
This a study that goes into how information is put out on the internet by young people. It also shows the differences between male and females in the disclosure of information. It also shows that people have full knowledge of SNS but still reveal great amounts of information to the public. As well as that most males are more likely to disclose information like their home address. It goes into how people knowingly set up profiles with all real time information like real pictures, real address, as well as address to other friends’ locations. But the main goal of this article is to show how young people are totally unaware of the dangers on the internet by disclosing personal information and by accepting request from total strangers. As well as not being knowledgeable of the privacy setting on SNS like Facebook. It also shows what is seem to be a concept of privacy and what is considered to be the right to privacy.
2. Ahn, J. (2011). The effect of social network sites on adolescents' social and academic development: Current theories and controversies. Journal of the American Society for Information Science & Technology, 62(8), 1435-1445. doi:10.1002/asi.21540
This article goes into in depth perspective on youth in SNS and how teenagers interactive using SNS to communicate to others. The author main point is to show the adolescent interaction, how he does it, why he does it and how it follow him or her into the future. It shows that adolescents have no knowledge to the threats online or strangers lurking. And that they join to seek acceptance and to evolve their socially, psychologically and emotionally, as well as their cognitive effects. That eventually carries on into adult life. It shows that through wall post and what is put out there by them.
3. DETERMANN, L. (2012). Social media privacy: A dozen myths and facts. Stanford Technology Law Review, 1-14.
The author of this article shows myths and facts about privacy on social media sites. It goes into great detail and shows interesting points for example you can sue social media sites for sell your information. Or for using your information without permission for self-gain. And the right to remain anonymous on the internet or to make up a fake profile for example. In fact in this article you can be subject to criminal charges on the US Computer Fraud and Abuse Act. This article goes on many different myths that you thought were true but are not.
4. Woo, J. (2006). The right not to be identified: Privacy and anonymity in the interactive media environment. New Media & Society, 8(6), 949-967. doi:10.1177/1461444806069650
This article explores how the development of information technology, especially interactive computers, changes the privacy environment as experienced by individuals and the policy implications of these changes. Such as governments and commercial industries, that ‘invade’ people’s rights to be left alone are of less concern now than individuals who
Related Documents: Fish: Social Network Service Essay
67% of businesses reported at least one incident related to computer or cybercrime in the past year (Galicki et. al). A computer can be subjected to attacks through various cyber mechanisms such as spam, viruses, sniffers, Trojan horses, denial of service attacks, unauthorized web bots or spiders and logic bombs. Computer is also an instrument to commit traditional crimes, including identity theft, copyright violations, distribution of child pornography, and wire fraud (Galicki et. al). Most of the…
station – Liepaja 7 Accessibility and mobility 8-9 2.5-Migration 9 2.6- Transport link and connections 9 Economic and Social Development 10-11 2.9- Small industries 10 1. Tourism 11 2. Algae Industries 11 Section three 12-16 3.1-Justifications…
better than your competition.” Now we need to source and locate operations around the world to find the skills we need. You must expand your sourcing and recruiting to a global level. Locate work where you can best find talent. And build talent networks which attract people around the world” (Josh Bersin Dec 19 2013). There is always a challenge to find the right person for the job, which fits as per the organization’s need and further to achieve its goals and mission. Around the world companies…
we are investing significantly in our own distribution platform, which consumers are already using to purchase and play games directly from us. Through online portals such as Origin and Play4Free, we are acquiring consumers of our games and game services directly, and establishing on-going relationships with them. Through these relationships, we are engaging them in their favorite brands across a number of devices, allowing them to communicate with their friends, and inviting them to try our other…
Economics: the social science that deals with the production, distribution, and consumption of goods and services the theory and management of economies or economic systems Economic goods and services are connected to, and depend on, the environment We need to understand the biological and physical world Relationships Between Economic Development And The Environment An economy: the system of exchanges of goods and services worked out by members of society Goods and services are produced, distributed…
are radically different since they are based on ideologically opposing government structures. The U.S government is based on a free market capitalist economy supported by a representative democracy. On the other hand that of China is founded on a social communist ideology. As for demographic figures, the U.S. has roughly 355 million citizens while China has over one billion, which makes up one fourth of the world population. Klaus Mühlhahn (2009), in his book “Criminal Justice in China”, states that…
technology at our disposal: the Internet, virtual reality, blogs, video games, chat bots, and, of course, social network platforms could be used for various purposes. For years, terrorists have communicated on-line, sharing al-Qaeda propaganda or writing in on-line forums dedicated entirely to the prospect of Islamist terrorism. But they have recently evolved with technological changes, utilizing social media sites such as Facebook and YouTube to enhance their capabilities. The same place the average person…
Unemployment Definition: Unemployment means that scarce human resources are not being used to produce goods and services to meet people's needs and wants. The unemployed are people able, available and willing to work at the going wage rate but cannot find a job despite an active search for work. Claimant Count: * The claimant count measure includes people who are eligible to claim the Job Seeker's Allowance. * The data is adjusted seasonally to take into account predictable seasonal…
access can bring the whole security subsystem down. All of the worked up controversy has to be put away that they (hackers) are the most powerful computer users that exist as well. If there was an Information system developed involving a large network of computer systems, who would be the most potentially dangerous person? The hacker infiltrating the system sequentially, or the System Administrator that oversees the entire maintenance of the systems with a completeness of this view much like the…
PART A Question 1 Conflicting impact during the construction of the Three Gorges Dam Social Impact Funding for resettlement. This led to corruption and embezzlement where many officials inflated the land value in order to gain more funds from the Government Many farmers had to switch what they were farming in the past and some farmers were not given land when they were relocated Floods would claim many lives as the water levels would increase and decrease The land became less fertile which…