What are the basic ethical issues to consider when sharing personal information in social networks? PDF

Title What are the basic ethical issues to consider when sharing personal information in social networks?
Author Jay
Course Computer Engineering
Institution Polytechnic University of the Philippines
Pages 2
File Size 64.5 KB
File Type PDF
Total Downloads 400
Total Views 461

Summary

Activity 11Write at least 2 paragraphs for each item. What are the basic ethical issues to consider when sharing personal information in social networks? -Privacy. Intrusion, misuse of information, interception of information, and information matching are all ways that privacy can be violated anywhe...


Description

Activity 11 Write at least 2 paragraphs for each item. 1. What are the basic ethical issues to consider when sharing personal information in social networks? -Privacy. Intrusion, misuse of information, interception of information, and information matching are all ways that privacy can be violated anywhere, including online social network communities. Although terms and conditions were always made to be seen and agreed upon during the user's registration process, most of the time, we as users tend to ignore the policy and confidently assume that everything will be fine, not realizing that we may only be allowing a gateway access of breach to our valuable personal information. Free speech. Although many people see free speech as unobtrusive and democratic ideology supports it, it is a dangerous weapon for a small group of people to use it to release or spark unethical sentiments such as racial or religious hatred in the digital space via social media. Data leakage. Data security and protection is both costly and difficult to achieve. Although many new data security and protection technologies have been introduced to the market in recent years, data leakage continues to be a major concern. The data leakage problem on social networking sites can be traced back to users' lack of awareness and understanding of the ethical privacy and protection value of the policies used by each respective social networking site. Identity theft. Identity theft is just one example of the ethical issues that exist in social networking. Criminals use this technique to impersonate someone's identity with the intent to pursue or commit a crime. The victim will be held liable for the consequences of the impersonators' fraud or actions. On the Internet, identity theft can take place in two ways: either by creating a fake account or by stealing and hacking the victim's password. 2. What are the advantages and disadvantages of the Data Privacy Act of 2012? -The advantage of Data Privacy Act is it’s secures individuals' privacy while allowing for the free flow of information necessary for innovation and growth. And the disadvantages are freedom of speech is compromised, intrusion of privacy, only positive things must be posted, liking, sharing, tweeting or re-tweeting post are libelous, and the ability to take down websites without warning.

3. Explain why privacy and confidentiality matter in one’s life. - Maintaining privacy and confidentiality helps to protect someone from potential harms such as embarrassment or distress on a psychological level; social harms such as job loss or financial harm; and criminal or civil liability on a legal level. Especially in the social/behavioral realm, where privacy and confidentiality are frequently violated. 4. What can you do to help prevent and effectively manage the spread of identity theft, false information, and fake news in the country? -Never share a social media post without double-checking the facts. This is especially true if the information comes from a reliable source. If you want to spread the truth, you must assume that others aren't perfect and that they will make mistakes. Locate the sources. The quality of mainstream news is only as good as the sources it uses. Stories with a single source of confirmation are more suspect than stories with multiple sources of confirmation. This does not rule out the possibility that they are false; many significant leaks and stories have originated from single anonymous sources. However, don't assume they're true until you get confirmation, especially if they're sensational. Learn how to recognize spam and scams. Though some phishing scams are obvious, others in an email, instant message, social networking site, or website can appear to be legitimate. The only way to avoid falling victim to a phishing scam is to never click on a link sent to you. For example, if the email claims to be from your bank and includes all of the appropriate logos as well as your name, it may or may not be from your bank. Instead of using the provided link, use a search engine to find the website. This way, you'll know you've arrived at the real website rather than a spoof.

Assessment 11 SELF-TEST: IDENTIFICATION Personal Identity 1. This is the interpersonal level of self which differentiates the individual as unique from others. Digital Self 2. This is the aspect of the self that is expressed with others through online interactions on the internet. Disinhibition effect 3. This causes people to believe that they are able to express their “true self” better online than they ever could in face-to-face contexts. Self-presentation 4. This is the process of controlling how one is perceived by other people. Social Identity 5. This is the level of self whereby the individual is identified by his or her group memberships....


Similar Free PDFs