...FACEBOOK: MANAGING YOUR PRIVACY FOR THEIR PROFITCASE STUDY QUESTIONS1. What concepts in the chapter are illustrated in this case?Facebook is the largest social networking site in the world. So it is moving commerce to the internet and Web. In this e-commerce case, the basic construct of ecommerce are illustrated, use of the internet and Web to transact business; digitally enabled transactions. Moreover, this case includes unique features of ecommerce: richness, interactivity, information density, and personalization/customization. Richness is possible to deliver rich messages with text, audio and video simultaneously to large numbers of people. Interactivity is the technology works through interaction with the user. Information density is the total amount and quality of information available to all market participants. Personalization\customization is technology permits modification of messages, goods. 2. Describe the weaknesses of Facebook's privacy policies and features. What management, organization, and technology factors have contributed to those weaknesses? The weaknesses of Facebook’s privacy policies are the launch of Facebook’s Beacon advertising service. Beacon was shared automatically users' information of purchase with their friends. Users were angry that even user opted out of the service Beacon continued to communicate private information. Moreover it was almost impossible to delete an account even a user does not wanted to use. Under significant public backlash...
Words: 681 - Pages: 3
...Argumentative Essay – Facebook Should the German Government strictly regulate Facebook and Google’s use of your information or is their use of your information simply the cost of your user access to their websites? Construct an argumentative essay to answer this question referencing the two articles you were given on the topic. This essay will argue that the German Government should strictly regulate the use of information by presenting arguments in favour of this thesis, debilitating a counter argument and referencing the articles “Facebook’s Targeted Ads Expand To The Web” by Vauhini Vara and “Germany’s War with Facebook and Google over Privacy” by Heather Horn. Facebook and its broad collection of Facebook user’s data rises privacy concerns. When a person registers, they agree with Facebook’s privacy agreement and allow them to use their data for customized ads and other apolitical purposes that are mentioned in the agreement. But also when someone isn’t registered logged in, Facebook tracks which sides this person visits and saves this data to present them with personalized ads – same as Google. Vara states that Facebook uses people’s names and friends to make an ad more believable. Here, there is the possibility to opt out by following a very difficult path through the personal settings. But this only means that the ads won’t be seen anymore. Facebook will still collect personal information and store all that data. It is really hard to get insight in that process and...
Words: 670 - Pages: 3
...Privacy Concerns on Facebook With the increasing use of online social networks such as Facebook in recent years, a lot of research has been focusing on the privacy issue of the network. The main question being asked is: how do users navigate their privacy on Facebook? In Facebook’s short history it has quickly become a repeat offender on privacy and plays loose and easy with our data which means that we need to be even more vigilant about privacy issues (Malik, 2013). The concept of privacy can be defined in several ways, both legally and philosophically. Also, privacy has been found to be culturally relative, based on economic and cultural factors. Privacy is a form of protection and it can protect the general population as well as individuals. (Moor, 1997). However, one definition that seems especially applicable to this paper is the one put forth by Alan Westin in his 1967 book Privacy and Freedom. He defines privacy as “The claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.” (Westin, 1967). By this definition, Facebook has infringed upon this right on several occasions. I believe Facebook has an ethical responsibility to provide its users with a high degree of privacy. I believe the company should engage in what privacy advocate Michael Zimmer calls “value-conscious design.” (Zimmer, 2007) This type of design can be related to a virtue-based model of ethics. Under this...
Words: 2790 - Pages: 12
...“PRIVACY INVASION IN FACEBOOK AND TWITTER ACCOUNTS” RUSELLE ALFECHE ARVEY JAYE CABAUATAN JOSHUA DELA CRUZ 2:00 – 3:30/ TTH CHAPTER 1 INTRODUCTION Having online accounts is common to every individual today. Most have established their social life in the internet. However cyber bullying is very common. In 2011, Zottola and Tenenbaum explain how a person can destroy your privacy on the internet. Some Kidnapped because of the information see in one’s personal account on the internet. The problem of many online users’ right now is how to avoid the so-called “privacy invasion” particularly on Facebook and Twitter. According to Tagvoryan & Briones in 2009, the explosion of social networking sites on the Internet has raised many questions regarding this expectation of privacy for users. Recent legal developments around the world provide insights into the future interpretation of the Fourth Amendment’s “expectation of privacy” as it applies to the users of these websites. Hughes, Horn, Debatin and Lovejoy in 2009 illustrates particularly how useful Facebook and Twitter for viewing this evolving legal landscape, two of the most popular social networking sites. Specific privacy concerns of online social networking include inadvertent disclosure of personal information, damaged reputation due to rumors and gossip, unwanted contact and harassment...
Words: 4711 - Pages: 19
...Facebook Facebook has always been accused for giving users a false sense of control over their data privacy. Firstly, it is because Facebook places too much burden on users to navigate a complex web of settings, including for privacy, advertisements and followers. Since the process of changing setting is so tedious, many users may just do not care about the privacy setting. Opt-outs for sponsored stories or collection of location data aren’t provided so users are forced to tell their locations to Facebook. Secondly, Facebook’s ability to track users’ activity outside Facebook have increased exponentially as time has passed. Facebook now gathers information through these plugins regardless of whether the buttons are used. Every time a user goes on a website with a Facebook like button, the browsing history with be recorded and Facebook may give the information to a third party for advertising and other purposes. In addition, Facebook’s acquisition of Instagram and WhatsApp has allowed them to collect more kinds of user data, which enables more detailed profiling. Facebook’s terms don’t properly acknowledge the data subject rights of users as well. Though users have some options to control the visibility of their information within their networks, they are not able to prevent Facebook from further using this information for its purposes. The privacy settings were less clear in relation to the collection and use of data by Facebook itself or by third-parties like application...
Words: 496 - Pages: 2
...Is using social media for marketing a form of infringement of personal privacy? We are now in the 21st century and social media has become a very big hit. So the topic here is, is it an invasion of personal privacy when marketers use social media in marketing? First let me explain what personal privacy is. It is personal freedom from unwanted disturbance in someone’s private life meaning that we have the freedom to be not constantly disturbed. However, the internet is a public library, when you add something on the internet it is already public even if it wasn’t meant to be, and to be honest there are many people out there who just like to cause disturbance, but you have the choice to post it privately or publicly. It is not eavesdropping if you posted something publicly and a stranger saw it. There are also possibilities that the marketers collect personal data like workplace or home address so that he can personally meet face to face with the customer or consumer to conduct his survey. If the marketer constantly visits your workplace or home it is an invasion of privacy, but I find this very rare because it doesn’t benefit him, in fact it is a waste of time for him if he keeps getting rejected, in anyways so it is not practical. The reasons why marketers have started using social media for marketing is because the users are massive, like Facebook it has more than 1 billion users. Because of this massive amount of users’ marketers will use this advantage to gain knowledge...
Words: 883 - Pages: 4
...for people to create and publish or communicate their work to the world. The nature of this technology makes it easy and popular way to communicate information to a much wider audience. There are number of different types of web 2.0 applications including wikis, blogs, social networking, folksonomies, podcasting & content hosting service, YouTube, Facebook, MySpace, and Flickr (Thomson, 2008). However, despite it greater advantageous to our world today, there are some threats involved on the other hand. In this essay, I will discuss some number of privacy and ethical issues associated with the use of this type of technologies. As well some threats such technologies pose for small Pacific Island communities. Lastly, I will discuss the reasons why a privacy bill should or should not be adopted in the Pacific. Ethical and privacy issues related with the use of web 2.0 technologies? Copyright is one of a major issue related with the use of web 2.0 technologies. This ethical issue is referring to copy of others information illegally, by means without the permission of the copyright holder. Using of web 2.0 technologies like Facebook, you tube and other applications nowadays are rapidly growth all over the world. So, this great revolution supports us in every aspects of life. For example, businesses use it to enhance business activities such as advertisement of their products and other related activities. In somehow, these great opportunities of communication and exchange misuse...
Words: 774 - Pages: 4
...Privacy in the 21st Century Eng 122 Mrs. Samaniego 10 June, 2013 In today’s society cameras are watching every step you take and every move you make. How do you feel about that? Someone is watching you, whether it is the surveillance cameras at a gas station or it’s the security guard in a shopping mall. Does this make you feel uncomfortable? You post something on Facebook and decide to delete it 5 minutes later, but did you know that it will always be on the internet although you deleted it? You may not see it but others will. In today’s society, personal privacy rarely exists. There are certain devices and tools that people use when trying to invade someone’s privacy including hidden cameras and satellites. Privacy no longer exists due to all of the new technologies and programs enabling the invasion of someone’s privacy. What is privacy? Do people today really understand what privacy is? Have they had the opportunity to experience privacy? The definition of privacy is “allowing an individual or group to seclude themselves or information about themselves and thereby reveal them selectively.” When something is private it is usually something personal or valuable to someone. Everyone likes privacy but...
Words: 1903 - Pages: 8
...205 How would you feel if someone that had never met you and had never seen your face was able to tell you that your favorite movies were “50 First Dates, 10 Things I Hate About You, and The Princess Bride,” and that you “browse entertainment news and like to take quizzes” (Angwin, 2010). Would you feel your privacy had been sbreached because someone must have spied on you without your knowledge? That is what happened to Ashley Hayes-Beaty. “Miss Hayes-Beaty is being monitored by Lotame Solutions Inc., a New York company that uses sophisticated software called ‘beacon’ to capture what people are typing on a website” (Angwin, 2010). According to PCWorld Magazine (Sullivan, 2012), personal web habits are being tracked by companies such as Lotame Inc. and Facebook, advertisers, and corporations that “stalk” consumers on the web, and then sold to marketers and the government without web users being informed or aware of it. People like Ashley are suing data brokers that “sold consumer profiles to other companies without taking steps required under the U.S. Fair Credit Reporting Act to protect consumers” (Gross, 2012). Digital consumer monitoring is a breach of privacy that needs to be addressed. Personal data is being collected and sold without consumer consent, and the current regulatory environment is weak. As this issue becomes more prominent, a variety of solutions have been proposed, such as personal data “lockers,” Shine the Light Law, and transparency within companies....
Words: 4209 - Pages: 17
...Big Brother is Real and Active in Our Lives George Orwell’s novel, 1984, speaks of a world where an all-powerful dictator named Big Brother eliminates personal freedom and thought. There is much argument about whether or not the world in his novel ties in with our own world. Do we have enough privacy or are we constantly under surveillance? The argument on personal privacy is far from a new debate. Some people argue that the government has too much access to what we do, while others say that the government’s intrusion is fine. In our age, the digital age, everything is online and private information is available to the government. The so called “Big Brother”, or, our government and algorithms, is watching over US citizens in illegal and inappropriate ways. Private companies like Facebook or Google have access to what one searches on those sites, but the video “What Google and Facebook Are Hiding” demonstrates how those sites save and...
Words: 740 - Pages: 3
...Human Element in information technology Henok Bekele, Individual Task One 1. Analyse your personal digital footprint. Identify potential security and privacy risks and their possible consequences. As we have covered in our group tasks, literary it is not possible to avoid digital footprints. It is possible to minimizing footprints, but if we consider how present day life routine goes everything is electronic. Even if we are aware of our active digital footprints, it is easy to find passive digital footprints for somewhere on the internet. I do not take myself as an active online user. For this task, I have try to check my footprints from Google download my data and Facebook personal data request. I consider myself to be not too active online at least in recent years, even though I have able to find a lot of digital footprints and some of the digital footprint are surprising....
Words: 695 - Pages: 3
...bargaining agreements negotiated by employee unions; nonunion workers rarely have this form of protection. The at-will doctrine also does not apply to contracts for a specified term, such as an employment contract that contemplates the employee providing service for a expressly designated number of years. In the following scenarios, the company’s human resources team must take action and decide whether to fire several employees for harmful actions. The scenarios are: John posted a rant on his Facebook page in which he criticized the company’s most important customer. In this scenario, John has publicly criticized the company’s most important customer, which might lead the customer to suspend all business with the company. Due to this customer being the most-profitable account for the company, John is greatly putting the company at risk, and to do some damage control and prevent the customer from leaving, the company must give this employee a stop and desist order to remove the rant from Facebook. In this case it would be better not to fire John as to set him on course and have been be the lead “apologist” for this transgression would be...
Words: 1771 - Pages: 8
... Nevertheless, problems exist in various aspects, such as misuse of the Internet, Internet addiction and information security, which includes individual privacy, business secrets and national information. According to the data provided by The World Bank (2011), 83.2% people have access to the Internet in the United Kingdom until 2009, but there was almost nobody surfing the Internet 20 years ago. Although increasing number of consumers are using the high technology, individual privacy and business secrets are exposed to potential risks. This essay aims to analyse the consequences of the problem and propose possible methods. Firstly, the essay will describe the major problems currently. Then discuss executable measures to address the problem. Finally, it will provide evaluation and conclusion. Problems: Internet information security is a new concept which for the purpose of protecting personal, commercial or national information on the internet, and guaranteeing privacy and business secrets not being destroyed or leaked out. Online privacy contains private information unconsciously disclosure, damaged fame because of libel or gossip, individual data used by strangers, hacking and identity pilferage (Boyd and Ellison, 2008, in Debatin, Lovejoy, 2009). For example, most adolescents addict to Facebook in recent years. Facebook is a kind of community on the Internet where people can connect with their friends and share real life with other strangers. If someone...
Words: 1376 - Pages: 6
...Privacy and security (Initial essay) Introduction When I think back one of firsts times I thought knowingly about privacy and security in my life at category of every data being stored and maybe later analyzed it was back my previous student days when one of my friend refused to pay with bank card in Alco-store. At that time it seemed to me really paranoiac and weird, but now I get his idea behind it. If one is a gambler for instance, it really isn’t very smart to pay with credit card in gambling-den. But at the other hand nobody can also blackmail you at basis of your sins which are known to everybody. Is privacy possible in the digital age? In current days one of the biggest and influential databases about private persons Facebook is launching a new profile type “Timeline” – it really brings users history in silver plate to everyone interested – unless he has taken precautions in privacy-settings. Many people say they’re not worried about the info reachable to everyone, “I’ve got nothing to hide,” they declare. Those advancing the nothing-to-hide argument have in mind a particular kind of appalling privacy harm, one in which privacy is violated only when something deeply embarrassing or discrediting is revealed, says Solove (2011). Privacy itself is a concept in disarray. Nobody can articulate what it means, claims Solove (2006). It isn’t seen everywhere same way as in Western countries, also understanding differs individually. Already in 1976 the secretary-general of...
Words: 1609 - Pages: 7
...Personal privacy rights are dead in the workplace because of the advent of the digital age resulting in the blurring of boundaries between an employer respecting the employees’ personal life in a widely accessible digital realm. Erosion of Privacy: As technological advancements grow, personal privacy is also eroding congruently. The usage of social media platforms has become a norm through social cues and expectations that are formed by living in the digital age. These platforms create cultural hubs in which one digresses personal information, from their name, to pictures, personal statuses, likes and dislikes. “Balancing "We" And "Me" Congdon suggests “Cultures are built and reinforced when people exhibit certain behaviors over time and...
Words: 658 - Pages: 3