Saturday, February 23, 2019

Privacy and Social Networks Essay

Privacy seems to encompass e precisething, and therefore it appears to be nonhing in itself (Solove, 2008, p. 7). It is an oversimplification to define l one and further(a)liness as wholly(a) what an man-to-man owns. With the evolution of in the raw technologies nowadays, it is precise hard to define seclusion be causation it varies from one person to an around early(a) and from one culture to an different (Solove, 2008). With the modernize of societal mesh topologys during the last decade, new-made views near clannishness started to emerge referable(p) to its special mechanism in sharing instruction.sociable engagements enable drug users to instanter dower information, thoughts, photos, products and videos with the mein truth users in the network at once. Unlike other substance of communicating, the information in cordial networks displace spread to hundreds of users in seconds. Then, the users who received the information may share it among their network, and then further to other networks, which will end up in spreading the information to one thousand thousands of nation in no time, just like a chain re achieve. This new mechanism of sharing, which is becoming faster every day, raised new concerns some secrecy among single(a)s and organizations.In spite of tout ensemble these concerns ab go forth the private secrecy on the fond networks, loving networks websites are the most visited websites in the internet. For example, Facebook has reached 901 million monthly active users in April, 2012 (Hachman, 2012). Although genial networks enables an easy sharing of clannish information close various(prenominal)s or low profile information about organizations, individuals and organization should non be afraid of exploitation companionable networks due to concealing concerns, and instead they should be more public and utilize the kindly network.Being public and open to the earth is better than being undercover and closed b ecause it enables people to learn from others personal experience. Naturally, any individual or organization benefits from communicating with others. Nevertheless, communication with others, regardless of the mean of communication, usually involves large away some closed-door information to the other. However, friendly networks empowered the world a new mean of communication that benefits all the users in the network by sharing private information.For example, an individual can share some previous experiences such(prenominal) as overcoming an illness, eating habit, or making a project. Being afraid of sharing experience, because of privacy, would only deprive others from benefit of these experiences. correspond to Tapscott (2012) Fully 20 percent of all patients with the fatal complaint amyotrophic lateral sclerosis share intimate information about their treatment and condition on the network PatientsLikeMe. com. And tens of thousands of others with rare diseases who use that w ebsite report that sharing has helped them better carry away their illness.Because the cordial network enabled them to share information about their medical conditions, which is very private information, they supported each others with valuable information about their disease and inspired each others with their experience. Social networks enhanced collaboration, which in return brings benefits to all individuals, at the cost of personal information. Some may argue that because of circular private information on mixer networks, some employee may raise from being fired from or being denied for a job.In other words, social networks negatively affect employment because they allow the employers or managers to feeler an employees or a job applicants private selective information. For example, Andrews (2012) states in her book that a high school teacher, called Ashly Payne, was asked to resign because she uploaded a photo of her on Facebook drinking an alcoholic drink even though it is legal to drink in her country. She withal claims that employers will not claim soul whose Facebook knave includes photo of that person drinking or in provocative dress (p. 122).However, the information on social networks could not be utilise against an employee or a job applicant because it is considered wrong and illegal. First, it is unethical to judge a worker from the personal aspects rather than working skills. Besides, Jarvis (2011) defines privacy as the ethics of knowing and publicness as the ethics of sharing (p. 110). Therefore, it depends how the individual sympathise others information. On the other hand, employers can also look into a job applicants profile in a social network to see his/her previous experience in work.Second, it is illegal to organize ecision on an employee or a job applicant found on social networks personal information. Furthermore, this act is considered discrimination and the company can be sued for this action (Waring & Buchanan, 2010 ). Therefore, employees and job applicants should not be afraid of posting information in social networks. Social network is a safe point to share private information with others. The main publicize is that private data on the social network is accessible anytime and anywhere. Without a doubt, the privacy of individuals profile data in the social network should be protected to make the network a safer place for sharing.Therefore, many social networks interpret powerful tools to control the access on private information. First, social networks do not grant access to other users profile data anonymously. In order to access any data even if it is public, the individual needs gain the social networks trust by registering an account in the social network. This enables the social network administration control over the social network. Second, the user can choose who is able to view his/her profile private information and what information others can see. For instance, the user can bl ock accounts, narrow groups and set privileges.Third, social networks also provide a help halfway to report abuse of the services such as spamming, bullying or hateful speeches. The social network administration can stop any account permanently or even take legal action if an individual is reported abusing others privacy. Finally, most social networks provide a maternal control to help parents control how their children use the social network. Since social networks commit on the trust between the users, these tools does not only make a social network a safer place, just also authentic.Richters and Peixoto (2011) performed a query to show the transitivity of trust in social networks. They found out that people decide who to trust based on other peers who trust. To stress this to the topic, users trust only specific users over their private information and indeed they trust the social network. Conversely, trusting the social network increases the trust among the users. In add ition, trustworthiness implies a social network sentry duty, which in return means users being more comfortable sharing their information using the social network.For example, one of the reasons that made Facebook the most successful social network is the trustworthy of the users. According to Jesdanun (2006, as cited in Fogel & Nehmad, 2009), because Facebook was only restricted for students, the users felt safer to share data through the social network. Nowadays, Facebook is open to the public, but they are very strict in term of network safety. In fact, Fogels and Nehmads (2009) research statistics showed that those who had social networking profiles had significantly greater mean scores indicating that they believed Facebook is a more trustworthy social network (p. 175).For any social network to be successful, the social network has to maintain the trust of their users through the safety of the social network. Therefore, social networks are trustworthy over the users private in the social network. Despite of these control tools, some may argue that social networks still a potential threat to the users privacy. For instance, many believe that social networks made a fertile ground for individuality theft and stalking. mountain usually fear the technology because social networks are also considered one of them, every possible problem falls under the umbrella of privacy concerns on social networks.Privacy, however, is not only controlling the data access, but also controlling how it is used or interpreted (Boyd, 2010). Let us discuss these problems one by one. First, identity theft occurs when someone steals someones secret information and pretending to be that person. According to Jarvis, the identity theft issue is less an issue of privacy than larceny (2011, p. 96). Assuming it is an issue of privacy, suppose someone hacked someone elses account or page on a social network, then accessing or using the dupes information. Should this be considered the soc ial network fault?The user, the victim, probably did not take security precautions to protect what he/she considered a private data. Additionally, the social network provides tools to retrieve, to report or to suspend a stolen account. Second, stalking is compulsively observing an individuals behavior or information. Unfortunately, stalking can mostly be from those who have access to the profile information such as friends and coworkers. However, it still depends on how they interpret the information. For example, if someone knew that his friend is acquire divorced, he decides whether to support him, help him, or stand against him.Social networks databases do not only contain data about their users, but also how the users actions with the social networks and other users. Therefore, the data in social networks are very valuable as some refers to it as the new oil. Social networks use these data, through data excavation, to improve its services and to gain revenue. most social net works gain revenue from targeted advertising. For example, if a user often reads about cars, or writes posts cerebrate cars, the data mining system is going to withdraw this user is interested in cars.Therefore, the social network shows that user advertisements related to cars within the users living area. Social networks created a new marketing option that helps the companies to expand their production and services (Andresen, 2011). On the other hand, data mining and targeted advertisement raises new privacy concern in social networks. For example, some users may feel uncomfortable when these advertisements are based on some information that were marked as private, a personal chat with a friend for instance.However, data mining and targeted advertising does not violate privacy laws or ethics. According to Seltzer research in data mining ethics (2005) like most statistical methodologies data mining by itself is ethically neutral (p. 1441). This is mainly because the data mining pr ocess is carried on by computer programs, which will not interact with these data the way a human would. They will not fuck off any judgment or feelings about the user no subject how sensitive the data is.Moreover, social networks provide advertisers with anonymous statistical data. In other word, advertisers do not know the identities of users in the statistics provided by the social network. In conclusion, social networks are new powerful tool for communication with the others. The data on the social networks are can easily be accessed anywhere and anytime, and therefore this created a controversial debate between privacy and the social networks. However, being afraid of using social networks would have only deprived the benefits of using these tools.Besides, employees and job applicants should not be afraid of using social networks because their information in social networks could not be used against them as it is considered illegal and unethical to be used against them. Never theless, social networks provide powerful tools to control over the users private information, thus implying that the social networks are trustworthy over private information. In sprit of all privileges control tools, many people believe that the social networks can cause problems such as identity theft and stalking.However, these problems are not needs due to social networks, but instead it is due to how people interpret the information in the social networks. As a result the, the user should be more careful when posting a sensitive data and think before sharing any information. Finally, because social networks databases contains tremendous amount of money of data, social networks created a new form of business using these data while protecting the identity of the data. Therefore, individuals and organization should not concern privacy when using social networks and utilize its benefits.

No comments:

Post a Comment