Reflection Tag: This annotated Bibliography was a starting point for the research required for the exploratory and research essay. It allowed you to really evaluate your sources and develop opinions about them, which in turn would develop your thesis. This was very helpful in helping to organize my thoughts about technology and privacy.
Download Link: ERH102-06AnnotatedBibliography
Olivia-Aman Cotton
ERH-102-06
Mrs. Smith
Help Received: None
Annotated Bibliography
- Kuzma, Joanne. “Empirical Study of Privacy Issues among Social Networking Sites.” Journal of International Commercial Law & Technology2 (2011): 74-85. Academic Search Complete. Web. 28 Feb. 2016.
This article is the result of a study done with sixty online social networking sights (OSNs). These OSNs are evaluated based on different privacy factors. A study done in 2009 found that forty-five percent of people do not even read the privacy policies. Many people accept that they are giving up some of their privacy when signing up for these sights, but are not fully aware of what privacy they are sacrificing. Data collecting mechanisms is discussed in this article because software, such as cookies, is constantly tracking the number of times a user is visiting a website, what website they are visiting, and what they are buying. Third Parties can gain access to this information and it can be used for targeted advertisement or private information can be shared this way.
Most people claim that they are concerned with privacy, but almost half the population does not read their rights to privacy when signing up for these social networking sights. Which I think highlight the point that people a re not really concerned about the weak privacy, because they know they give up privacy when creating an account. However, I think it is the unknown software and beacons that people don’t know about that are extremely harmful, because it is tracking your information and can release secure to an unwanted party without your knowledge.
I will use the data provided about the percentage of people who do not actually read the privacy policy as a counter argument \ to raise the issue that many people are not as concerned as with privacy as they claim. I also want to use the information about cookies and beacons as a support to my argument that many people do not truly understand the power of the Internet and software and many people might feel protected with the privacy policies provided, but it might not be the social networking sight that is the problem.
- YÜKSEL, Mehmet Erkan, Asİm Sinan YÜKSEL, and Abdül Halim ZAİM. “A Reputation-based Privacy Management System for Social Networking Sites.” Turkish Journal of Electrical Engineering & Computer Sciences3 (2013): 766-84. Academic Search Complete. Web. 28 Feb. 2016.
This article states the well-known problem that, once one puts something on the Internet it is on there forever. With social networking expanding many people are taking advantage of the ability to share anything online, however, information that is not meant for the public often can be found or seen online if someone knows how to find it. People seeing information that you do not want them to can hurt your reputation, or worse it could be dangerous if in the wrong hands. This article has a solution which is an algorithm that can be installed into these programs which creates like circles of friends that you are apart of that only allows certain groups to see certain information. It also would increase the amount of privacy because you would have more control over who exactly can see what on your profile.
I think that people believe that once you delete something it is gone and do not understand the concept of a digital footprint. It is cool that technology has increased communication and allows new people to meet but this also means people you don’t want to see can view your profile. We can post and share whatever online, but at the same time it is important to be careful what is posted because our social media profiles will follow us in the real world. Especially, with employers checking on potential employees or their current employees social medias. I think that there algorithm has a lot of potential but it also leaves it up to the user to take advantage of this privacy feature, which many people do not use the current ones there are.
The information about sharing data online and how it can be viewed by anyone is useful. It brings up a good point that people often forget if it was posted online it will never truly disappear and that is why it is so important to be careful what we post because that is our reputations. If I wanted to provide a possible solution to some of these privacy issues I could bring up the algorithm and details regarding how it works.
- Baumhart, Peter B. “Social Media and the Job Market: How to Reconcile Applicant Privacy with Employer Needs.” University of Michigan Journal of Law Reform 48.2 (2015): 503-33. Academic Search Complete. Web. 28 Feb. 2016.
Employers are starting to check social media of their employees and potential employees. Many people don’t worry because they have settings that they think protect them, only allowing employers to see what they want them to see, however, employers are digging deeper and requesting usernames and passwords, friend requesting, or finding a way to view the complete profile. The job market being so small employees are able to be picky about whom they hire and your social media profile could be the difference between getting a job and not getting a job. This issue raises another concern in terms of privacy, should employees be allowed to request your information, or should they only have access to what the public has access to.
I understand that employees are a reflection of the company; I do not think that employers should be allowed to dig deeper than whatever the employees allows them to see. Your personal life and right to privacy I think includes your social media and I do not think that that should be held against someone. At the same time, if an employer is able to find information in a legal manner when the person posted it on the web it no longer became private and they have to understand that. This I think brings up a new aspect of privacy. Not just privacy settings, but applying social media to real life.
I think this article is beneficial to my argument because it brings up another side of privacy. With technology advancing so quickly there are very few laws or rules about what is acceptable and what is an invasion of privacy. This brings up a good point also, that people forget that what they do on social media can have a real impact on someone lives and that things that are meant to stay private should not be placed on social media period. Part of the privacy aspect of social media is just about being smart and that is what employers are searching for.
- Greenberg, Joshua M. “The Privacy-proof Plaintiff: But First, Let Me Share Your #selfie.” Journal of Law & Policy 23.2 (2015): 689-740. Academic Search Complete. Web. 28 Feb. 2016.
This article discusses more the litigation side of privacy and how violation of privacy can be viewed under the law. There is an unspoken code of managing privacy among social media users. If you don’t want to be associated with something you can un-tag yourself, remove posts of your page, follow, un-follow, or block another user as well. It states how posting something of yourself that somehow spreads or becomes public is not a violation of privacy. We share things with the intent that all our followers, and followers of our followers are going to see it; it is called self-exposure and eliminates your right to privacy. However, if someone else posts harmful or hurtful material of another person without his or her consent that then can become a violation of privacy.
I agree that generally you post something on social media to get as many likes or people to see it as you can, so it would make sense that in this sense you give up privacy. It also makes sense that anything that you post without privacy settings would be self-exposure and in a sense marketing yourself and your own image. The part that gets cloudy is when someone else posts something of you without consent, or someone is harming or hurting your image. What measures then can be taken because violating someone else’s privacy so that information they did not intend for everyone else can be considered bullying, or can easily turn into a life threatening situation.
I think this article would be useful for my essay because of the idea of self-exposure and understanding that if you get yourself into trouble there is very little the law can help you with, but there are measures that can be taken when someone else invades your privacy. If I want to take the law aspect from the article it does have very specific detail relating to the law and what is acceptable and inacceptable. This provides another example of another version of privacy in a sense and how you can rid the right to your own privacy.
- Richards, Robert D. “Compulsory Process in Cyberspace: Rethinking Privacy in the Social Networking Age.” Harvard Journal of Law & Public Policy 36.2 (2013): 519-48. Academic Search Complete. Web. 29 Feb. 2016.
This article also talks about privacy from a law standpoint and what action can be taken. It mentions that the current laws and regulations we have might be outdated considering the pace technology is moving at. It talks about the dangers of invading people’s privacy by not holding to the first amendment, which is freedom of speech. It gives two examples that stand out to me an example on twitter where the police tried to subpoena twitter to find out who made a certain comment. Twitter denied to allow them access because upon review did not find it to be a threatening situation and believed they had the freedom to say what they did. The second one was the case with Zimmerman they wanted to use his twitter and social media’s to make it appear that he was capable of threatening the officer. Essentially, they wanted to use the dead child’s social media to defame his character and use his freedom of speech against him.
This article brings up a problem that is very commonly struggled with, when is it okay to invade someone’s privacy, when is a threat considered dangerous enough that the someone’s private information should be released. Should someone’s freedom of speech on social media then be allowed to be used against them in a court, or to build a profile? The case with Zimmerman brings up a point of privacy after someone is dead should someone’s social media be allowed to be used in courts or against them when they cannot defend themselves. And should these websites be allowed to tell police and government agencies no if they believe it is a violation of privacy. I am personally on the side of privacy so I think that people’s protection of their freedom of speech and right to post on social media should be protected.
This article can be used in my research as another vantage point of what is privacy and what do we need to do to protect it. It brings up the first amendment and how freedom of speech also applies to social media. This is important when analyzing what kinds of things are considered hurtful, harmful, or a threat. And when is a threat so dangerous that a privacy policy needs to be violated versus the police believing there is a threat and using it as an opportunity to invade someone’s privacy.