Annotated Bibliography: Prominence of Social Media Affecting Our Privacy

Similar documents
Behind the Screen: Dangers in The Loss of Privacy. use and popularity of social media. Almost all of my peers are associated with social media in

The Internet of Things And what it mean for librarians

Web 2.0 in social science research

Lecture 7 Ethics, Privacy, and Politics in the Age of Data

ANEC response to the CEN-CENELEC questionnaire on the possible need for standardisation on smart appliances

Fahad Al Mannai IT 104 C01 7/8/2016. Biometrics Authentication: An Emerging IT Standard

Should privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009

Video Games Themselves Contribute Little to the Formation of Video Game Addiction: Possible Motivations of Video Game Addiction and Solutions

Pan-Canadian Trust Framework Overview

The Dark Side of Data The NSA ThinThread Tale

Special Eurobarometer 460. Summary. Attitudes towards the impact of digitisation and automation on daily life

Expand Your Reach with Podcasting

Digital Identity Innovation Canada s Opportunity to Lead the World. Digital ID and Authentication Council of Canada Pre-Budget Submission

Publishing open access: a guide for authors

Defining the Line of Personal Data Privacy

Q1 Under the subject "Future of Work and the New Economy", which topics do you find important?

Invitational Speech: Social Networking in Society Introduction

TABLE OF CONTENTS TOPIC AND THEME RESEARCHING THESIS CRAFTING AND ANALYSIS SHOW WHAT YOU KNOW FINAL TIPS

Running head: THE IMPACT OF COMPUTER ENGINEERING 1

5. Why does the government need this information?

2018 NISO Calendar of Educational Events

ITAC RESPONSE: Modernizing Consent and Privacy in PIPEDA

Ling/CSE 472: Introduction to Computational Linguistics. 5/25/17 Ethics & NLP 1

Explore PT - Sample C - score: 8/8

100% Effective Natural Hormone Treatment Menopause, Andropause And Other Hormone Imbalances Impair Healthy Healing In People Over The Age Of 30!

Policy recommendations. Digital literacy

Toward Objective Global Privacy Standards. Ari Schwartz Senior Internet Policy Advisor

Presentation Outline

INTERVIEW WORKBOOK. Remember: You want to leave the interview with the option to pursue the position further.

BARRIE PUBLIC LIBRARY COLLECTION DEVELOPMENT POLICY MOTION #16-34 Revised June 23, 2016

Thematic Forum III: Promoting Learning towards Employment & Entrepreneurship

Violent Intent Modeling System

Where To Access Ideal Client Profile Your Client Avatar

If you have decided to start your own online business and are ready to go, first, there is one thing that you have to decide on.

Technical Programme. Proceedings/technical programme now ready on web site

St. Francis Xavier University Department of Sociology SELECTED TOPICS IN THE SOCIOLOGY OF SURVEILLANCE AND SOCIAL CONTROL (SOCI 435)

Unlock the power of location. Gjermund Jakobsen ITS Konferansen 2017

EU Research Integrity Initiative

Ten Years As A Five Figure A Month Writer And Habitual Idea Scribbler In The Internet Marketing Niche

Paola Bailey, PsyD Licensed Clinical Psychologist PSY# 25263

Semantic Privacy Policies for Service Description and Discovery in Service-Oriented Architecture

Chapter 6: Finding and Working with Professionals

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics

REPORT ON THE INTERNATIONAL CONFERENCE MEMORY OF THE WORLD IN THE DIGITAL AGE: DIGITIZATION AND PRESERVATION OUTLINE

MULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID

Job Search Correspondence Handbook

Public Theologies of Technology and Presence Research Initiative

Creating Projects for Practical Skills

Young Professionals: Tips on Building Business Relationships

What Should I Know About Person Centered Planning?

Towards a Magna Carta for Data

Open Access to music research in Sweden the pros and cons of publishing in university digital archives

SAS PROGRAMMING GUIDELINES INTERVIEW QUESTIONS YOU'LL MOST LIKELY BE ASKED BY VIBRANT PUBLISHERS

THE CONSTRUCTION- AND FACILITIES MANAGEMENT PROCESS FROM AN END USERS PERSPECTIVE - ProFacil

Our Digital Future: An Interview with the UM Dean of School of Information

Issues in Emerging Health Technologies Bulletin Process

Today s Agenda. BIBSAM- The Royal Library Objectives for the 21st Century. Elsevier s Objective for the 21st Century

Before the United States Patent and Trademark Office Alexandria, VA COMMENTS OF COMPUTER & COMMUNICATIONS INDUSTRY ASSOCIATION

Take 1 minute to read the following questions. Listen to the recording. Mark down useful notes and answer the following questions.

NASW Code of Ethics Revisions Effective January 1, 2018

13 Dec 2pm-5pm Olin Hall 218 Final Exam Topics

Event Planning & Management: How to Create a Wildly Successful Offline or Online Event Checklist

2018 NISO Calendar of Educational Events

Global Alliance for Genomics & Health Data Sharing Lexicon

Technologies that will make a difference for Canadian Law Enforcement

Diana Gordick, Ph.D. 150 E Ponce de Leon, Suite 350 Decatur, GA Health Insurance Portability and Accountability Act (HIPAA)

What Makes International Research Ethical (Or Unethical)? Eric M. Meslin, Ph.D Indiana University Center for Bioethics

Enabling Trust in e-business: Research in Enterprise Privacy Technologies

Digital Fabrication Production System Theory: towards an integrated environment for design and production of assemblies

The Effect of Natural Disasters on Climate Change and Sea Level Rise

CREE SMARTCAST TECHNOLOGY BETTER LIGHT, DELIVERED INTELLIGENTLY AND SIMPLY

INTERVIEWING AND POST-INTERVIEW CORRESPONDENCE GUIDE

Firm of the Future Guide to Generating a Stream of Online Leads

On the Internet, No One Knows You re A Researcher

The importance of linking electronic resources and their licence terms: a project to implement ONIX for Licensing Terms for UK academic institutions

Counselling Consent. What is counselling all about? How will counselling help? Risks involved in counselling. Values Statement

IoT in Health and Social Care

What are References?

Science with and for Society Project Partner Search Form

Troublesome paper certificates and why the maritime industry must embrace e-certificates MARCH 2017

When Worlds Collide: Intellectual Property at the Interface Between Systems of Knowledge Creation, Introduction

Guidelines for the Professional Evaluation of Digital Scholarship by Historians

DINING FOR DOLLARS TOOL KIT

DIGITALLY INCLINED: USE TECHNOLOGY WISELY. A Reflective Essay over Digital Citizenship. Presented to

The best way to protect your trademark in EU

Louis Riel Bursary. There are two applications forms- one from your Post-Secondary Institution and one from the LRI.

The BGF-G7 Summit Report The AIWS 7-Layer Model to Build Next Generation Democracy

Innovations in Freelancing

Foreword The Internet of Things Threats and Opportunities of Improved Visibility

Louis Riel Bursary. There are two applications forms- one from your university and one from the LRI.

Workshop on the Open Archives Initiative (OAI) and Peer Review Journals in Europe: A Report

Notice of Privacy Practices

Discussion Points Information Communication Technology: a Legal Practitioners. Perspective. Presented at Law Society of Zimbabwe Winter School 2016

TERMS AND REGULATIONS FOR PARTICIPATION IN THE EVENT

Facebook Guide for Trust My Garage Members

ARAMINTA FREEDOM INITIATIVE

Innovation and Technology Law Curriculum

Key enablers of ICT-enabled social innovation in support of personal social services of general interest

Altmetrics could enable scholarship from developing countries to receive due recognition.

Transcription:

Cheung 1 Matt Cheung Mary Hays RHET 105 12 October 2015 Annotated Bibliography: Prominence of Social Media Affecting Our Privacy Part I For the next major paper, I intend to do research on the intersection of social media and privacy. This paper will primarily focus on the compromise between peer to peer interaction and the loss of privacy. My goal is to determine if it is beneficial for the users to exchange their privacy for the use of social media. As a member of the generation that grew up with the internet, I am very familiar with the use and popularity of social media. Just about every one of my peers is associated with social media in some shape or form. As a result, the topic of social media is deeply ingrained in my culture. Similarly, privacy, which has been rooted in the culture of the United States of America since its inception, greatly interests me. Many of the amendments protect society s innate preference for privacy, yet Edward Snowden proved that the United States of America has abused the trust of its citizens through NSA s surveillance. In light of this recent exposure, it has become much more important for users to become aware about how their digital information may be compromised to others. I am aware that social media has taken advantage of its user base through disclosing the private information of its users in exchange for money. I speculate that such small actions, though minute now, is social media s way to create precedents for much larger future abuse. Though the users privacy is lost in this scenario, the loss of privacy should not receive a negative connotation. The loss of privacy may not always be negative. I hope to find out more about how a user s privacy and social media interact.

Cheung 2 In order to determine if it is beneficial for the users to exchange their privacy for the use of social media, I will dissect my question into multiple manageable research ideas. To fully understand my topic, I will research how privacy is lost through social media, how privacy is gained through social media, why and how social media exposes its users privacy, and what type of information is more vulnerable. I will primarily use online databases as my source of information because my topic is very current. I am hoping to find the most relevant sources that are published online. Though many books may be relevant to my topic, I am unsure if the library will have the most current books. In order to find an online source, I will use one of the UIUC databases, such as EBSCO, and search using key terms. Key terms for my topic are social media, privacy, Facebook, digital privacy, and social privacy. To find printed material, I will search the online library database using similar key terms. If I find a book which summary matches my topic, I will visit the library in which the book is located at and determine if it is actually suited for my research paper. The largest challenge of my research will be finding sources that are as current as my topic. Although there may be a large amount of information regarding social media, not all of the sources may discuss the growing issue of the loss of privacy. In order to circumvent this issue, I will be paying extra attention to the date that article was published to ensure that my information is not too outdated. Another challenge would be to find sources that accurately describe the benefits and the negative impacts of the loss of privacy. Many sources will probably focus on the negative impacts because of the loss of privacy s connotation. Circumventing this issue will be much more difficult. My solution would be to alter my key terms and search through a larger selection of articles. Hopefully this solution will provide me with an article discussing the benefits of social media and the loss of privacy.

Cheung 3 Part II Thesis: The growing prominence of social media has created a compromise between privacy and peer to peer interaction that has overall a negative impact on the users. Faresi, Ahmed Al, Ahmed Alazzawe, and Anis Alazzawe. "Privacy Leakage In Health Social Networks." Computational Intelligence 30.3 (2014): 514-534. Academic Search Complete. Web. 10 Oct. 2015. Summary: This article discusses how privacy can be leaked through the actions of the user. A major point made by this article is that users would often use the same pseudonym (screen name) across many social media platforms. The authors found that the use of the same pseudonym allowed the user to be easily identifiable. Users of an online medical board were identified due to their pseudonym. The results of the experiment showed that using the same pseudonym made the user three times more identifiable. This article shows that users are sometimes compromising their own privacy. Analysis: This source is very credible because it comes from an academic journal that was published one year ago. This source is a peer reviewed journal that includes references at the end of the article. This shows that the article is scholarly. The article also mentions that the authors attend George Mason University. This demonstrates that the authors are part of a higher level of education. This article is mostly a primary source because it describes the research the authors have completed. Humphreys, Lee, and Rowan Wilken. "Social Media, Small Businesses, and the Control of

Cheung 4 Information." Information, Communication & Society. Routledge, 13 Dec. 2014. Web. 01 Oct. 2015. Summary: This article discusses the commercialization of social media and how it compromises its users privacy. It mentions that the protocol behind business and the use of its patrons social media privacy is not established yet. Though there are a few guidelines upheld by the law, specific laws have not been created yet. Buying a user s social media information is also very common. This exchange of information can occur very formally or informally. A worker discussing the information about a client is considered a loss of privacy. Social media facilitates this process much quicker. Analysis: This source seems very credible because it is published in an online academic journal about a year ago. This means that it is very relevant and is part of a scholarly community. This article is peer reviewed and includes a large list of references at the end of the article. The authors also attend Cornell and Swinburne University so a higher degree of education is associated with this article. This article is considered a primary source. It discusses the research done by the authors. There are references to other resources that makes this source part secondary source. Kryder, Cyndy. "Social Media And Privacy Issues: A Matter Of Common Sense." AMWA Journal: American Medical Writers Association Journal 27.1 (2012): 36. Academic Search Complete. Web. 07 Oct. 2015. Summary: This article discusses practices that should become common practices for all social media users that wish to keep their privacy. The author suggests that users separate their private and social, only release information that the user is comfortable with sharing, reading the

Cheung 5 privacy policies and practices, and adjusting the privacy settings. The author also claims that once a person becomes an active user of a social media platform, it is impossible to reverse the information that they have released. Analysis: This article is not as credible as the other articles I have cited. This is a scholarly article from an academic journal that is peer reviewed. This article was published three years ago, so it is not very current. The author claims to be a medical communications specialist. Being a medical communication specialist, though, does not make her any more qualified to write this article. The article is also only a secondary source because the author does provide research of her own. Parsi, Kayhan, and Nanette Elster. "Conducting Research on Social Media Is Facebook Like the Public Square?" The American Journal of Bioethics. Routledge, 17 Sept. 2014. Web. 01 Oct. 2015. Summary: This article discusses the involvement of a specific social media platform, Facebook, and the privacy of its users. The authors discuss the dangers of others accessing the information of underage children through Facebook. It is proved through this article that the access to one s email and address become increasingly accessible as the user becomes more involved in social media. An important figure included in this research is that 60% of the users are indifferent about third-parties accessing the users information. Analysis: This source seems credible because it was published in an online academic journal about a year ago. This means that it is very relevant and is part of a scholarly community. This article is peer reviewed. Its inclusion of its references makes the article more credible. The authors also attend Loyola University Chicago so a higher degree of education is associated with

Cheung 6 this article. This article is a secondary source because the author only describes the case study done by other researchers. Although this source is secondary, it is still very credible. Sanvenero, Richard. "Social Media And Our Misconceptions Of The Realities." Information & Communications Technology Law 22.2 (2013): 89-108. Academic Search Complete. Web. 10 Oct. 2015. Summary: This article claims that leaked information might not necessarily be directly caused by social media. The author mentions that the highly accurate location devices (smart phones) implemented in social media may reveal the location of the user without the knowledge of the user. This article also mentions many supreme court cases that have set precedents for internet privacy laws. The author recommends that the best course of action for people affected by a compromised privacy is to speak to their local legislator. The laws regarding internet privacy are still not very well defined. Analysis: This source seems credible because it is published in an academic journal only two years ago. The journal is peer reviewed. The article is scholarly because it mentions its references at the end. The article is also part of a higher level of education because the author is associated with Barry University, Orlando. The article is a secondary source because it is based on its references rather than the author s own research. Trottier, Daniel. "Interpersonal Surveillance on Social Media." Canadian Journal of Communication. 2012. Web. 01 Oct. 2015. Summary: This article also uses Facebook as a case study. Much of the information in this article is based off of interviews with users. Many users found that they had an online

Cheung 7 presence regardless of whether they are users of social media or not. Social media had a web like effect that connected many users and non-users. This article also addresses how accessible all the information regarding a user is to the world. Whether it is intended information or unintended information, both equally distributed. Many people use social media as a medium to stalk and creep on the lives of other users. This imposes many dangers to the victim of the stalking/creeping. Analysis: This source seems credible because it was published in an online academic journal about three years ago. This means that it is fairly relevant and is part of a scholarly community. Three years may be considered too old for such a current topic. This article is peer reviewed and provides many references at the end of the article. The author attends Uppsala University, a Swedish University. This demonstrates that the author is associated with a higher degree of education. This article is a secondary source because it addresses the summation of ideas gathered by the author. The author did not provide any new research of his own. Although it is a secondary source, this article is still credible. Trottier, Daniel. Social Media As Surveillance. Burlington: Ashgate, 2012. Print. Summary: The author of this book redefines the risk of the loss of privacy. The author believes that there should be a much greater concern for the emergence of surveillance of everyday life. The author uses many case studies to demonstrate the creeping issue of the loss of privacy. Though the author is cautious of the loss of privacy, he also applauds social media platforms. He praises social media for being able to propagate information much faster than any other platform.

Cheung 8 Analysis: This source seems credible because it is a print source that was published three years ago. Three years may be considered too old for my topic. This book is scholarly because it provides a list of references at the end of the book. The author is associated with Uppsala University in Sweden, so the author is associated with a higher level of education. This source is a secondary source. The author refers to the research of outside sources. Van Eecke, Patrick, and Maarten Truyens. "Privacy And Social Networks." Computer Law & Security Review 26.5 (2010): 535-546. Academic Search Complete. Web. 03 Oct. 2015. Summary: The article mainly discusses the users of social media. It mentions how the prominence of social media allows its users to feel more connected. Users also, though, become forgetful of the consequences of releasing personal information. People that find themselves spending too much time on social media may value their online identity more than their offline identity. In terms of privacy, the article mentions that the consent for the loss of privacy is usually signed away in the terms and agreement of the social media platform. Analysis: This article is a credible article that is outdated. The article originates from an academic journal that is peer reviewed. The article was published five years ago. The authors are all associated with the University of Antwerp, Belgium. This shows that the article is associated with a higher level of education. The article is also scholarly because it includes references to other articles at the end. The article is also a primary source because it provides the information regarding the study that the authors completed.