logo

Investigation on Use of Social Media for Violating Privacy of Others

   

Added on  2019-09-22

64 Pages17357 Words443 Views
An investigation on useof social media forviolating privacy ofothersDissertationStudent[Pick the date]

1AbstractWhat is and is not appropriate to publish has been a legal and ethical concern for as long asthere have been newspapers and journalists. It is difficult to find a way to strike a goodbalance between privacy - often in situations where people who have committed no crimemay have their lives severely damaged by unwelcome publicity - and defense of democracyand individual human rights. Many people think that Britain, for instance, has got thisseriously wrong. So, to investigate this, the objectives of the research were formulated-to findout the limits that individuals understand regarding their own privacy and other‘s privacywhile using social media, to analyse the appropriateness of privacy standards for others insocial media, to determine the factors that influence individuals in violating the privacy ofothers, to study the ethical code of conduct or legal framework to regulate the use of socialmedia in violating the privacy of others and to investigate the effectiveness of the policiesand standards in protecting the privacy of people in the context of social media. The data wasanalysed with the help of bar graphs that were made in the MS Excel software. Theyrepresented the data which was collected with the help of questionnaires. The calculationswere done on the data, and the functions of the MS Excel software were applied to theresearch like ‘if’, ‘count if’ and ‘%’ etc. It was concluded that the social media has a majorimpact on the privacy violation of people and there is little that people can do to protectthemselves. 1

2AcknowledgementFirst and foremost, I would like to show my gratitude towards the one who had a significantcontribution to the accomplishment of this research paper: my coordinator, who offered allher support and guidance in a timely manner. I was extraordinarily fortunate to benefit fromher valuable and in the same time constructive suggestions and I must confess that I wouldnot have embarked in this academic research without her prior teaching in statistics andeconometrics.My gratitude goes also to the research participants. Their unlimited and indispensable helpgave me the possibility to progress with my research paper; therefore their co-operation isindeed appreciated.I would like to acknowledge the academic and technical support of my institute, particularlyin the award of Bibliographic and External Affairs Research Service offered to the studentsby the Central Library.Finally, I want to express my sincere thanks to all those, who, in one way or another,contributed to the development and completion of this dissertation.2

3ContentsChapter 1: Introduction.........................................................................................................................51.1 Overview......................................................................................................................................51.2 Project motivation.......................................................................................................................71.3 Project objectives........................................................................................................................81.4 Project scope...............................................................................................................................9Chapter 2: Background and Related Research.....................................................................................102.1 Social media...............................................................................................................................102.1.1 Negative impacts of social media.......................................................................................102.1.2 Positive impacts of social media.........................................................................................112.1.3 Legal issues associated with unethical the use of social media..........................................112.2 Privacy on social media..............................................................................................................142.2.1 Definitions of privacy..........................................................................................................142.2.2 The online privacy related to personal information............................................................152.2.3 Ways of privacy violation....................................................................................................172.3 Relation between social media and privacy violation................................................................172.4 Regulations and legal framework for protection of privacy on social media.............................21Chapter 3: Research Methodology......................................................................................................243.1 Research Methods and Framework...........................................................................................243.1.1 Quantitative Research........................................................................................................243.1.2 Qualitative Research...........................................................................................................253.2 Data Generation Methods.........................................................................................................263.2.1 Observation........................................................................................................................263.2.2 Questionnaires....................................................................................................................273.2.3 Documents..........................................................................................................................273.2.4 Interviews...........................................................................................................................283.3 Data Analysis.............................................................................................................................283.4 Research design.........................................................................................................................283.5 Participants................................................................................................................................293.6 Limitations of study...................................................................................................................30Chapter 4: Research Analysis and Findings..........................................................................................314.1 Findings from quantitative sources............................................................................................313

44.2 Findings from qualitative sources..............................................................................................424.3 Research analysis and results....................................................................................................42Chapter 5: Conclusion and Recommendations....................................................................................495.1 Conclusion.................................................................................................................................495.2 Recommendations.....................................................................................................................525.3 Scope for future research..........................................................................................................52References...........................................................................................................................................54Appendix.............................................................................................................................................594

5Chapter 1: Introduction 1.1 OverviewThe thing which is common between your childhood friend, roommate, and your boss andlong distance relatives is that they all are the users of social media and they stay connected toyou via the social networking. There is an online relationship that they have formed. Theinformation is easy to share on the social networks, and not much effort is required to stay intouch with the people via the online mode. But, there may be other people too on the socialmedia who may be looking up to the information that you share with your closed ones. Thereare social networking websites on the social media that allows its users to form theconnections and come in relations with the other users over the internet. The information isstored on the social networks remotely and not on the personal computer. This social mediais used by the people so that they can be in touch with their friends; they can build newcontacts, and other people over the internet who have similar interests and ideas could befound easily. However, there are many other people on the social media apart from theknown ones who are interested in the information that the users of social media post online.For example, there are debt collectors, scam artists, thieves, stalkers, companies, etc. who tryto look into the life of others either to know the consumer behavior, market trends, steal theirconfidential information or any other reason (Xu, 2015). Even the companies stay very activeon the social media platform because it helps them to collect the data of the customers, andfor creating the networks so that they can tailor made the services as per the needs of thepeople and they can also sell their advertisements to the people in the online world. The users of the social media have the option to mask their identities like they may use apseudonym to hide their real name. Some people do this to hide their real identity from theoutside world as they do not like to share their personal data with anyone and others do it for5

6violating the privacy of others. They contact them with some other name, become friendswith them on the social media and then steal their confidential information (Adjerid, 2013).Thus, the violation of privacy is becoming very common on the social media platform. A lotof cases of frauds on the social media have been observed in past few years. Sometimes thepeople use the personal information of the people to get financial gains from them. This isdone by using the information of the person that he has posted online and gathering more andmore information about them so that the theft can be done at the right place and time. Theyeven steal their passwords, information of their bank accounts and the information that isstored in the personal computers of the people (Ahmed, 2015). There are ways by whichpeople access the computers of the users without his consent like they may send a malwareinto the system. Malware (malicious software) is a term that describes a wide range ofprograms that install on a user’s computer often through the use of trickery (Xu, 2015). It hasthe potential to spread quickly on the social networks, and it infects the computer of the user(Dutton, 2014). The virus also spreads to the contacts of the user and a great amount ofconfidential information may be stolen. For example, a company may spread malware intothe competitors’ computer that steals the entire information about the company’s products,customers, technology, etc.There are many social networking sites that allow the users to talk about each other'scommon interests like they are able to share their photos, interests, job details, and politicalviews, etc. on the websites. All the people who have access to the internet are able to vieweach other's posts, and they are able to discuss with them whatever is going on in theirexternal environment. Therefore, one of the most debated topics in today’s world is theprivacy concerns that arise due to the use of social media and the social networking. Peoplehave increased their participation in this area dramatically. There are many types of researchin this area, and many journals and articles have talked about these concerns. Everyone talks6

7about the increased privacy issues due to the use of social networking sites and the increasednumber of crimes due to the use of these websites (Srivastava, 2013). The technology is notused by the people in a proper way, and some of them are not even aware of the privacyviolations that happen with them or they do to others on the social media. People don’trefrain themselves from sharing private information on the websites that increases the risk totheir privacy. When the people share sensitive information on the social media, the concernsrelated to the privacy increases automatically. This project will try to determine the impact of social media on the privacy violation of thepeople, and it will capture many aspects related to privacy violation like why it happens, howit happens, what are the regulations to protect the people, etc.1.2 Project motivation What is and is not appropriate to publish has been a legal and ethical concern for as long asthere have been newspapers and journalists. It is difficult to find a way to strike a goodbalance between privacy - often in situations where people who have committed no crimemay have their lives severely damaged by unwelcome publicity - and defense of democracyand individual human rights. Many people think that Britain, for instance, has got thisseriously wrong. But the World Wide Web and social media systems make publishers of us all: what shouldwe do? Users of Facebook and other social media systems constantly get warned about whatinformation they give out about themselves. But we also give out information about otherpeople, especially when posting photographs and video clips. Different people make differentpersonal choices about how to do this according to their own understanding of the ethicalimplications of what they do: for instance, some people refuse to tag individuals in photos on7

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
A STUDY ON CUSTOMER AWARENESS ON DIGITAL MARKETING AT COMMONDOVE
|60
|10427
|347

investigation of marketing strategies of Apple's iPhone PDF
|55
|11639
|291

The Impact of ECommerce on Individual Habits and Spending in the Fashion Industry: Dissertation (To analyze the impact of Ecommerce on Individual habits and spending in the fashion industry)
|67
|25021
|464

Impact of Social Media Marketing on Sales Promotion in the Hospitality Industry in Sri Lanka
|57
|16182
|24

Impact of Social Media on Youth Buying Decisions
|31
|7952
|27

The Role of Epidemiology in Reducing Negative Health Effects of Smoking on Women
|49
|13230
|1