Wednesday, May 8, 2019
Cultural Economy of the Media Essay Example | Topics and Well Written Essays - 2000 words - 1
Cultural Economy of the Media - Essay warningA study of 540 students at the Carnegie Mellon University reveals that 89% of students at this institution gave their objective names, and 61% of students managed to upload their real photos in the complaisant networking site of Facebook (May, 2013). These users did not alter their privacy settings, and therefore it was possible to access their culture publicly. On this note, therefore, Facebook has come under criticisms for failure of providing adequate privacy options for its various users. These criticisms arise on the accentuate that the teaching that users provide can cause serious security problems to the individual concerned and to the country as a whole. The social network sites also process enormous information on a workaday basis. Features in these social network sites, such as open platform applications, invitations, messages, and photos are avenues in which the privy information of a user is made public. To protect use rs from inappropriate use of their information/data, it is important to decree measures that will regulate the nature of information that the public can view (Austin, 2003). The criterion of choosing this kind of information should be on the background of the effect the data can cause to the individual if it is exposed to the public. This penning analyzes the roles of privacy in the social networking sites. In analyzing these roles, this paper uses Helen Nissenbaums theory of privacy, known as the contextual righteousness theory. It also identifies the specific European Union and UK privacy laws that seek to regulate the privacy of an individual, and it demonstrates the line of descent interests of these social networks in relation to the information they control. This paper has a conclusion, which is a summary of the main points communicate in it. Privacy in a social networking site protects the information of an individual from being utilize by people who are not authorised to use the information (Ritzer and Jurgenson, 2010). The current trends in impress to gathering data and disseminating the same by data collecting companies involve the perusals of information from social networking sites. The inclination of these companies is to sell the information to marketing companies. On most occasions, they collect and use this information without the knowledge of its owners. fit to the contextual integrity theory, this amounts to a breach of an individuals privacy. According to this theory, it is impossible for an individual to turn out complete privacy. On this basis, therefore, people will share their personal information, as long as there are certain principles that govern the nature in which they share their personal information (Pollach, 2005). However, if these principles are contravened, without the license of the parties involved, then a breach of privacy has occurred. Take, for example, these data collecting companies, accessing the information of an individual through their social networking account, and using the information they gain to produce a marketing campaign without their knowledge. According to the contextual integrity theory, this is a breach of an individuals privacy. This theory further goes on to identify two types of behaviors that coif whether there is a breach of an individuals privacy or not (Mowlabocus, 2004). These norms are the norms of diffusion and that of appropriateness.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.