By: Jacovah Ling
Date: 11/1/2013
What happen to the days of writing a letter, personal conversing, or talking on the telephone? With the invention of social media these conventional ways of communication has become almost non-existed. I could recall my middle school years of writing love letters to little girls and passing funny notes to others students in the classroom. Technology has made communication less interpersonal and more complex. Love letters would only be known to the girls who read and receive them. Yes, some of the girls may tell and allow some of their friends to read the letters, but it's far better for maybe 10 or 20 people to be aware of my personal feelings compared to the millions who could potentially access to it if I were to post it on a Facebook page. How did communication become so less interpersonal? Technology is slowly emerging into critical stages of invasion and negligence of personal privacy.
Web 2.0 allows people to communicate with each other without speaking one word. The creation of Web 2.0 allows social media sites such as Facebook and Twitter possible. “Web 2.0 allows you to read and write content on web pages. The visitors to Web 2.0 pages are the ones responsible for creating the value and content "(Bowles, 2013). We are responsible for the value and content, but who is responsible for the way someone may view a comment which is posted on Facebook or an idea which is tweeted on Twitter. Close friends and family member may laugh at a post which could avertedly maybe frown upon by a stranger. This intuitive creation of communication (Web 2.0) could be both a blessing and a curse depending on who is viewing it. These social media sites make me contemplate on the privacy aspect of people's posts and tweets.
With the increase of technology in social media, I find myself constantly questioning the safety of everyone's personal feelings, emotions, and overall being. "An ounce of discretion is worth a ton of privacy settings" (Awl, 2009, pg.52). Facebook has many components which would conserve one's privacy, yet there are loops holes and ways around these privacy prevention procedures. Someone is unfamiliar with the website may find themselves becoming a victim of privacy invasion. For example, if I would like to see a profile of someone is not my friend, yet we have a mutual friend, all I would have to do is go through that mutual friend's friend list and view the profile of unfriend people of interest. The proper privacy setting would prevent this from happen, but those who are not aware of these settings may not know unfriend members of Facebook maybe viewing their page. This includes their posts, photos, and other material which may not be appropriate for unfriend individuals. The vast moments and increased technology of social media sites may lead to the depletion of personal privacy. “Bad behavior on Facebook can have real-world consequences" (Bowles, 2010). Most of these "real-world" consequences are a result of invasion of privacy, or the negligence of the user to perform privacy setting precautions.
Are you aware that some Social networking websites (SNS) such as Facebook and Twitter trade people’s personal information to marketers for a fee? “It is projected that US marketers will spend over $2 billion on advertise on SNS, while Facebook will receive around $1 billion from advertisers world-wide in 2011(eMarketer, 2010). SNS sites can also generate revenues by supplying mountains of their subscribers’ personal information to marketers, recruiters, and any interested party. There exists an abuse of subscribers’ disclosed privacy information for purposes they did not approve of” (O’Brien, 2010; FTC 2010b). With the right amount of money, anyone’s privacy could be compromised. I would always wonder why I would receive spam and junk emails from advertisers which I was not even aware existed. My Facebook account provides these advertisers my email address, in exchange for a profit. After reading this article, I was upset at the providing of my personal information without my acknowledgment. How much does Facebook really value their subscribers to make such a disturbing and unlawful disclosure? I believed a site where someone feels is trustworthy and honorable would be so deceitful and undermining. Facebook and Twitter offering subscriber’s personal information is not the only method of privacy invasion. Hacking and becoming a cyber-predator is also a method of receiving people’s personal information without their knowledge. “Two Pew Internet Project surveys show that 73% of online teens and 72% of young adults use social network sites (Lenhart, Purcell, Smith & Zickuhr, 2010).” “Popular media and trade press have been voicing the concerns of government and privacy advocacy groups, but they are also creating a myth that teenagers and young adults could care less about their online privacy (e.g., O’Brien, 2010; Dvorak, 2010).” “Another Pew Internet Project survey indicates that 71% of social networking users ages 18-29 had changed the privacy settings on their profile to limit what they share with others online (Madden & Smith, 2010).” “One of the first quantitative studies to evaluate young adults’ online privacy attitudes also concludes that young people ages 18-24 have aspiration for increased privacy like older Americans (Hoofnagle, King Li, Turow, 2010). Some allow themselves to become “sitting ducks” waiting for the attack of hackers or cyber-predators .Most SNS requires people to come up with a user name and password in order to personalize and protect it. A lot of people make the simple mistake of coming up with a password which is easily accessible. Most people use their birthday or a nick name as their password. As stated earlier, personal information such as a birthday could be accessed through a marketer, recruiter, or any person of interest. If I was to portray myself to be a marketer or recruiter, I could easily obtain someone who is subscribed to a particular SNS birthday or other personal information; hereby attaining their password to the SNS page. We as SNS users should eliminate ourselves from becoming victims of personal information invasion by creating user names and passwords more difficultly to receive by hackers or cyber-predators. Gaining personal information is not the only aspect of privacy invasion, but many employers tend to invade the privacy of their employees as well. Delaney said, “If a user chooses to post the publicly on Facebook that is his or her choice. Yet there have been many situations where the employers have requested or even required applicants for employment or employees to provide their user name and password to online social networks to which they belonged. Some situations may also involve employers asking an applicant or employee to log into their Facebook account to allow the employer to search through the account. Even worse, some employers have refused to hire an applicant or disciplined or discharged employees, based on a refusal to supply the information” (Delaney, 87). I could not phantom someone, nevertheless an employer, viewing everything on my Facebook account. My employer looking at everything from my inbox messages, party photographs, and friends list would be unbearable. It is one thing to judge me based on my work performance, but to judge me based on personal items which should be kept private is entirely a different ordeal. Organizations and employees are so quickly to discharge or penalize employees because of violating a signed confidentiality form, but would violate employees privacy without any penalty, consequences, and at times consent. Why should employees be held to higher standards or have more morals than their employers? There should be equal respect for privacy between the employer and the employee. The lack of personal privacy should be one of the major complaints listed in an organization's 360-evaluation report.
The invasion of personal privacy by the usage social media may seem minor to some, but those who are affected by it view it as a huge ordeal. Businesses and employers use social media as a device to determine employment or to discharge employees are some who are affected by it. People who have had their Twitter or Facebook page hacked or had been victims of cyber-predators are affected by it. Those who have been sold out by their SNS to marketer, recruiters, or other group of interested for a profit also have been affected by it. With all of these methods of invading personal privacy makes me contemplate my usage of social networks. With the increase of technology, SNS should apply more settings which decrease the changes of cyber-predators or hackers intruding on subscriber's personal privacy.SNS should also find optional means of obtaining income without using subscriber's personal information as collateral. Employers should not use a potential employees Facebook account as a rubric for deciding employment. Limiting what is said in an inbox message to a friend infringes on and violates our First Amendment Right which grants the freedom of speech.
Reference
Bowles, M.D. (2013). Introduction to Complete Literacy.San Diego, CA:Brigdepoint Education, Inc.Retrieved fromhttps://content.ashford.edu/books/AUINF103.13.1
Delaney, J. (2013). Employer Use of Facebook and Online Social Networks to Discriminate Against Employees. An Analysis Balancing the Risks of Having a Facebook Account and the Need for Protecting Legislation.Labor Law Journal.Summer 2013, vol.64.Issues 2, p.86-102.17p.
Dvorak, J. C. (2010). Why Facebook privacy settings don’t matter. PC Magazine, 29(7), 1.
eMarketer Inc. (2010). Worldwide social network ad spending: A rising tide. Retrieved from www.emarketer.com/Reports/All/ Emarketer_2000692.aspx
Hongwei, Y. (2013). Young American Consumers' Online Privacy Concerns, Trust, Risk, Social Media Use and Regulatory Support. Journal of New Communications Research. Winter 2013, Vol.5 Issue 1, p1-30, 2 Diagrams, 1 Chart
Hoofnagle, C. J., King, J., Li, S., & Turow, J. (2010). How different are young adults from older adults when it comes to information privacy attitudes and policies? Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1589864
Lenhart, A., Purcell, K., Smith, A., & Zickuhr, K. (2010). Social media and young adults. Pew Internet and American life project. Retrieved from www.pewinternet.org/Reports/2010/Social-Media- and-Young-Adults.aspx
Madden, M., & Smith, A. (2010). Reputation management and social media: How people monitor their Internet identity and search for others online. Pew Internet & American life project. Retrieved from www.pewinternet.org/~/media//Files/Reports/2010/PIP_ Reputation_Management_with_topline.pdf
O’Brien, K. (2010, July 12). Despite privacy inquiries, Germans flock to Google, Facebook and Apple. New York Times, p. 8.
You May Also Find These Documents Helpful
-
Children these days rely more on technological advances to interact with each other. Adults are also following these trends just at a slower rate. Any commercial ad you see whether it is on T.V. or a poster ad you see on a building it will have some sort of social media/networking ad along with it. Almost every T.V. show has a Facebook page that anyone can go to and follow. Commercials use Facebook and Twitter to try and reel people into a form of income. If they don’t sell their product they will hopefully make an income off of the social networking advertising. Most fast food restaurants even promote ordering food over a form of social networking. This is allowing people to have less and less physical interaction.…
- 756 Words
- 2 Pages
Satisfactory Essays -
Social media is a way people can share their lives with each other by just the click of a button. Recently, the checking and posting on social media has become a daily routine of almost everyone’s life. This allows people to access an unlimited amount of information in seconds. People that have social media accounts are able to post everything from family vacation photos to what their political views are at any time. While on most social media accounts there are privacy settings where a person cannot see the content of somebody’s account unless the owner of that account has accepted them, once something is online, it no longer is private. By sharing information that everyone can see, people’s private…
- 1546 Words
- 7 Pages
Better Essays -
Invasion of privacy is something that is a major concern among Americans. In this paper I will discuss Steve, who has recently joined a church. The church doctrine is such that members are to reveal indiscretions from their past. Steve has told them of some of his indiscretions but Steve is not happy about this and decides he would rather leave the church. The church leaders have told Steve even if he leaves his neighbors as well as members of the church will be notified of his past. In this paper I will discuss which privacy torts are involved as well as if this is a libel case. I will also discuss whether the expectation of privacy applies to the facts of this case as well as the defenses to the tort and if there is a legal difference in disclosing personal indiscretions to members of the church, its’ elders and to the general public.…
- 968 Words
- 4 Pages
Good Essays -
Privacy is a person’s right to control access to his or her personal information. Everybody value the protection of their personal information. No one wants to see some of their personal information made public, especially on the internet. However, the recent evolution of technology has started to threaten every individual’s privacy by reducing the amount of control that they had over their personal data and making it possible for people who do not have the proper authority to access them. According to Zalta (2014), the 21st century has become the century of Big Data and advanced Information Technology allows for the storage and processing of exabytes of data. The combination of increasing power of new technology and the declining clarity and agreement on privacy give…
- 480 Words
- 2 Pages
Good Essays -
In this case Dharun Ravi, a college student at Rutgers University was accused and charged for knowingly filming and outing his gay roommate, Tyler Clementi, having a sexual encounter with his boyfriend on multiple occasions. The video footage was being broadcasted live to students who Ravi told about it. He set up a camera and used iChat to get the footage. He would tell students when to tune in through his twitter account. This being said Ravi’s roommate saw the tweets about himself and it caused him to later commit suicide. He was so devastated and humiliated from this that he jumped off of the George Washington Bridge.…
- 510 Words
- 2 Pages
Satisfactory Essays -
Many people consider privacy to be important because they do not want others to know personal information about them or anything that would harm them in any way. Total privacy is critical to individual users, but social media users have enabled not only to interact with people they care about, create new connections and widening our networks, but also enable to easily and instantaneously obtain relevant news updates. We can say that privacy is overrated because social media platforms are mainly used for sharing and interacting. Nothing is secret unless shared by oneself so we do not expect secret information to be shared on social media profiles and status updates, yet some still do. Today you do not even have to talk to someone to know who they are, instead visit their profile on a social media such as Facebook or twitter and you know who they are, what type of person they are, where they have travelled and who they are friends…
- 1755 Words
- 8 Pages
Good Essays -
Technology is one of the most influential of the profound changes taking place in the twenty-first century. The easy access, use and dissemination of new technologies has increased the importance and benefits of social networking. People are expanding their ability to communicate with other groups more quickly and efficiently. However the use of social networks has changed how people communicate, their ways of conducting relationships, and led in some ways the loss of our privacy.…
- 1172 Words
- 5 Pages
Better Essays -
Living in an era of increasing technology has made it much easier for a government to spy on its citizens. This paper seeks to examine why the United States government should not spy on its citizens with the use of the Patriot Act. Firstly, the United States citizens will believe that their liberties and freedoms are in jeopardy. Secondly, the government spends exorbitant amounts of money on a yearly basis to spy on its own people. Moreover, where is that money coming from? Lastly, the government risks social retaliation from its people in the forms of protests, lobbying, campaigns, and perhaps even violence When U.S. citizens feel their liberties and freedoms are being tested or at-risk of being lost, they will do what they can retain them.…
- 1636 Words
- 7 Pages
Better Essays -
While straightening your teenager's room, a book falls on the floor. You pick it up and see that it is her diary. As a parent, do you have the right to read it? Would it matter if you found the diary outside her room? Is it okay to read the diary if you suspect there is problem your teen is not telling you about? As a child, did you ever go into your parent's room (without permission) and snoop around? Was that an "invasion of their privacy"? Did you find anything you weren't supposed to? Did you learn from it? Did you tell them? You have every right to read your child's diary whether it's found in the laundry or their bedroom. There is nothing wrong with knowing what your child is thinking, the changes that they are experiencing, or perhaps any troubling matters they don't feel they can approach one of their parents with. Consider yourself lucky you found it. Invasion of privacy? I don't think so; it could save their life.…
- 1063 Words
- 5 Pages
Good Essays -
Governmental power to protect the privacy interests of its citizens by penalizing publication or authorizing causes of action for publication implicates directly First Amendment rights. Privacy is a concept composed of several aspects. As a tort concept, it embraces at least four branches of protected interests: protection from unreasonable intrusion upon one's seclusion, from appropriation of one's name or likeness, from unreasonable publicity given to one's private life, and from publicity which unreasonably places one in a false light before the public. The invasion of privacy is permissible if and only if the user gives access to his/her privacy.…
- 99 Words
- 1 Page
Satisfactory Essays -
With the rise of the social media trend, one of the biggest concerns individuals have is with the issue of privacy and surveillance of their information. Privacy is the ability to control what information about oneself is…
- 968 Words
- 3 Pages
Better Essays -
Every time a photo is taken or posted on social media, the government will have access to it. There are over 66% of American adults that use a social media account on a daily basis. This includes over 900 million posts a day on Facebook and over 340 million tweets per day on Twitter (Browning). Everyone wants to share what they are doing with their friends. American adults want their friends to see what they are doing and where they are at. Through the whole world, people search Google for answers to their questions. Every time a question is asked on Google, it is kept in their database for over 18 months. There are 18.4 billion questions a day searched for on Google (Kerr). With every post on social media, a person…
- 1821 Words
- 8 Pages
Better Essays -
Invasion of privacy is the intrusion into the personal life of another, without just cause, which can give the person whose privacy has been invaded a right to bring a lawsuit for damages against the person or entity that intruded. Certain types of invasion (peeping tom, burglary, etc) are either misdemeanor or felony crimes. Invasion of privacy is generally not defined specifically as a crime. One example of Invasion of Privacy that I found came from an article entitled “Private Moment Made Public, Then a Fatal Jump”…
- 393 Words
- 2 Pages
Good Essays -
Soccer and Tennis are both popular sports in the world. However people probably rarely know the differences between these two sports. In fact soccer and tennis have tremendous differences with each other, such as different score systems, organizational structures, philosophies and so forth.…
- 388 Words
- 2 Pages
Satisfactory Essays -
Privacy and Social media By: Amruta Kalbande Ankita Sen What is Social Media? • Social media is the social interacton among people in which they create, share or exchange informaton and ideas in virtual communites and networks. What is Privacy? “In general, the right to be free from secret surveillance and to determine whether, when, how, and to whom, one's personal or organizatonal informaton is to be revealed.”…
- 142 Words
- 5 Pages
Satisfactory Essays