Piracy & Privacy- Doc

Added on - 19 Sep 2019

  • 15

    pages

  • 5222

    words

  • 104

    views

  • 0

    downloads

Showing pages 1 to 4 of 15 pages
Piracy & Privacy p. 1Online Privacy and Piracy p. 1Online privacy and piracy may seem like two very different topics as you begin thisweek's content. Privacy and Piracy are all about deciding where to draw lines ofacceptable and unacceptable practices. They are linked by two larger issues which arecurrently quite relevant. They are:1.Technology– How does emerging technology change theavailability ofpersonal information online? How does emerging technologychange how wepirate content? Hint: Largely, advances in technologycapabilities have made it easier to share private information online, andeasier to to illegally get content online.2.Economic model– How do media companies make money usingyourpersonal information? How do they make money when theircontent isbeing pirated?Hint: Your information has value, which is growing, andpirating content tends to have complex effects on industries and variedimplications for consumers.Defining PrivacyLet's start with a multiple part definition ofprivacy,which is the secluding of personalinformation by individuals about themselves, It generally contains four components:There is a basic assumption that some information is private rather than public.There are some parts of information that the general public has access to, and otherbits of information that the general public does not have access to. You can keepsome things to yourself.Different people and entities have access to different types of information aboutyou. Privacy isvariable.Individuals should have control over their own private information. If anotherindividual or company takes control of this type of information, that is an invasion ofprivacy.When we share private information about ourselves with a person or entity, weexpect them not to share it and respect our boundaries.It is best to think about our personal information as existing somewhere along a private-- public continuum. There are some types of private information we don't want to sharewith anyone, or very few select others. Number three is an interesting component.Think about who knows these things about you:Where you workYour home addressYour major at UCFYour political and religious affiliationsYour medical historyYour account passwords
Now, think about if another individual shared this information with others, after you hadshared it with them, without your approval or knowing. What if an online company didthe same?Some bits of information are verycontext-dependent. Your doctor should know verypersonal health information about you, and your accountant should know very personalfinancial information about you. There are other bits of information that you would notwant companies to know about you (out of fear they would bombard you with unwantedmessages) or complete strangers,butthat you would share withalmoststrangers.Think about sharing your phone number, becoming Facebook friends, or connectingwith others via Snapchat or Instagram after meeting through friends, in a workenvironment, or meeting with fellow students to work on a school project out of class.We all have met over-sharers on social media - this is easy evidence that there areindividual differencesin how much information we allow others to have about us.Personally, I am still shocked at seeing ultrasound photos on social media when peopleshare news about a baby on the way. That's a person's uterus! Inside of their body! Iwould not like a random ex-coworker, high school classmate, or second cousin to eversee an image of my reproductive organs. But that's me. We're all very different.The nature of information also matters. What types of personal information you mayfeel comfortable with some people knowing, but uncomfortable talking about withothers? In a world of social media, we often think of people who don't take their ownprivacy seriously . . .
You have likely heard advice by now to watch what you post on social media, becauseemployers can find that information and weigh it when determining who securesinternships, jobs, promotions, etc. I like this checklist for college students and recentgrads:http://blog.suny.edu/2014/06/10-social-media-habits-every-college-student-should-adopt/(Links toan external site.)It's short and covers the major points I would encourage you all toconsider.Also, if you think you can avoid it by going under a different name or quitting all socialmedia - you may want to reconsider. Especially if you are studying the media, what willemployers think if they can't find you? The implications are pretty bad: You're not techsavvy (killer for media jobs!), or you've panicked and done a major dump, OR yousimply have nothing good to offer. Read on . . .http://theundercoverrecruiter.com/why-no-social-media-presence-is-bigger-red-flag/(Links to an externalsite.)Piracy & Privacy p. 2Privacy & Piracyp. 2
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Unlock This Document