Rui Cong Xia – xiarui – L5 BA2135
Topic: Scenario #4 - Girls Around Me
Thesis Statements: Although the developer of “Girls Around Me” argued that there are many other apps provide similar service, aggregate the information in social media that the users choose to make public, does not make an excuse of the company is using the information without the user’s privity. Companies should only aggregate user data under the circumstance that the users are fully aware of and consent to how the companies will use their data.
Supporting Claim 1: The users possess the right to choose not only the material they make public but also the way companies use it.
• The Online Privacy Law in Canada state that “The knowledge and consent of the individual are required
…show more content…
o Means users did not consent the way that companies use their information. o Choose to make personal information public in social media account does not equal to agree on the companies transfer and aggregate the information. Users should consent again regarding the use of their information.
Supporting Claim 2: Only if the users are fully aware of how the companies are using their data, they could prepare for the consequences and the risk.
• The companies will not able to ensure that their services are not going to harm the users. o The internet allows people to communicate. At the same time, there is cyberbullying. Internet services have two sides. o “Girls Around Me” Example: A real stalker who uses the app.
• It is more dangerous when the user is not aware of the risk and consequence. o “Girls Around Me” example: because the girls do not know/consent that their information is on the app, they have no idea that their information is exposing and someone may be looking after them.
• When users know that they are using the service, they become less passive. They are better prepared to the risk and consequence of using the
Throughout the introduction of his essay, Solove pin points on building his ethos and stating his credibility, as well as makes an ethical appeal to the audience. To aid to the credibility of his plea, he quotes fellow privacy experts, authors, and scholars throughout his whole introduction. These quotations enable Solove to conceal with the audience and speak to his credibility and trustworthiness that he has.
Company "privacy statements" and "End User License Agreements"(EULAs) also change the expectation of privacy in ways that may not be clear without extended reading [12]. In the case of a merger between DoubleClick and Abacus Direct, in which DoubleClick was acquiring Abacus Direct, what was considered a legal use of data for each company individually constituted a breach of privacy if combined [13]. As the expectation of privacy is based on public perception and understanding, continuing technological advancement and the precedents set by court rulings on cases involving privacy will alter these expectations in the
to indulge in what would be called cyberbullying, this would be the area of concern, how the
Cyberbullying is prevalent in today 's society due to the abundance of teenage students having
However, this new Facebook’s feature can be backfired because Facebook invades users’ privacy. Many users felt like their privacy was completely infiltrated, just about everything users updated or changed was instantly blasted out to hundreds of friends. News Feed has kept all the users’ information “loud”, and allowed people to see pictures and posts, which could give out information that users might not want their friends to know. Users claim that News Feed features leave the door open for people to 'creep'. “Facebook has always tried to push the envelope” (p.545) and “Everyone is freaking out” (p.544). Using people’s first reaction to the Facebook’s “News Feed” feature, Thompson later explains the privacy problem that this new feature may have caused. Thompson tries to inform the readers both side of the benefits and disadvantages using Facebook. The author creates a great connection with the readers by doing so, makes the readers feel that he’s on the same with them, that he understands the whole circumstances.
In the 21st century, Technology has transformed society in revolutionary ways. Anyone is able to instantly communicate with someone else via email, text or social media. Even though instant communication can achieve extraordinary things, it can also be used for horrible things. In fact, one of the biggest problems that schools face is cyberbullying. Cyberbullying is the act of harming or harassing another person using the internet.
Congress as a bill in January, 2003 (see H.R. 69). Even though OPPA is just proposed legislation at this point, it encompasses most of the necessary components for comprehensive protection of privacy online called for by privacy advocates and entities such as the FTC. It is also consistent with the Fair Information Practices (FIP) [9], which have operated as a guide for policy makers in the U.S. If the U.S. does indeed enact comprehensive online privacy legislation, it will most likely continue to use the FIPs as a guide and therefore, will closely resemble OPPA. The results presented herein will benefit managers and website designers of companies involved in international business, as well as policy makers.
It is shown, that one of the most prominent sources that prove a danger toward privacy, is through social media, specifically Facebook. This site alone
Private information that was previously segregated now becomes easily accessible to employers, colleagues, recruiters, and clients, among other perhaps unintended audiences” (Abril, 2012, para. 4). Yes, most social media sites attain privacy settings but one must always remember there are hiccups in everything on the internet and no guarantees leaks will not occur.
The firm has developed a program that collects data from its users and is studying the information gathered for trends on which it may capitalize to reach larger audiences of users. A common business practice for overcoming the above mentioned issue is to get consent through broad general terms of service language.
Have you ever been involved in an online crime? Anybody who has, in the point of view as the victim, knows that cyberbullying is very difficult to avoid. Although we depend on the internet for our needs, this does not mean that the internet is not harmful to us.
People are constantly making decisions to disclose or conceal information when posting to social media websites and signing up for online services. At first glance, Privacy Management Theory would suggest that the mere act of disclosing information to these services would create tension. However, the simple act of extending co-ownership to companies alone is not enough to cause tension for the original owner of the information.
addressed before it is widely used in public [5]. Public concern about privacy issues with
Social media can be defined as websites and applications that enable users to create and share content or participate in social networking. As a phenomenon of only the past couple of decades, it has certainly changed the way we live our everyday lives. Whether socially or professionally, it opens the door to incredible amounts of information; most of which is freely shared.
First of all, social networking is dangerous for children, teens, and adults. To be specific, in stating the dangers for teens, (Allen) states, “ But in other cases, disclosure reaches a level that is troubling for parents and those concerned about the safety of online teens, and once children put this information online, they will never get it back”. This quote explains that teens will put their personal information on social media and once they put this information online, it will always be there. The information can always be found and brought back up. This is causing parents to be worried for their children because sometimes this can mean that teens will put their location online. There is also a way that apps can track individuals if they