logo

Piracy & Privacy- Doc

15 Pages5222 Words317 Views
   

Added on  2019-09-19

Piracy & Privacy- Doc

   Added on 2019-09-19

ShareRelated Documents
Piracy & Privacy p. 1Online Privacy and Piracy p. 1Online privacy and piracy may seem like two very different topics as you begin this week's content. Privacy and Piracy are all about deciding where to draw lines of acceptable and unacceptable practices. They are linked by two larger issues which are currently quite relevant. They are:1.Technology – How does emerging technology change the availability of personal information online? How does emerging technology change how we pirate content? Hint: Largely, advances in technology capabilities have made it easier to share private information online, and easier to to illegally get content online.2.Economic model – How do media companies make money using your personal information? How do they make money when their content is being pirated?Hint: Your information has value, which is growing, and pirating content tends to have complex effects on industries and varied implications for consumers.Defining PrivacyLet's start with a multiple part definition of privacy, which is the secluding of personal information by individuals about themselves, It generally contains four components:There is a basic assumption that some information is private rather than public. There are some parts of information that the general public has access to, and otherbits of information that the general public does not have access to. You can keep some things to yourself.Different people and entities have access to different types of information about you. Privacy is variable.Individuals should have control over their own private information. If another individual or company takes control of this type of information, that is an invasion of privacy.When we share private information about ourselves with a person or entity, we expect them not to share it and respect our boundaries.It is best to think about our personal information as existing somewhere along a private -- public continuum. There are some types of private information we don't want to sharewith anyone, or very few select others. Number three is an interesting component. Think about who knows these things about you:Where you workYour home addressYour major at UCFYour political and religious affiliationsYour medical historyYour account passwords
Piracy & Privacy- Doc_1
Now, think about if another individual shared this information with others, after you had shared it with them, without your approval or knowing. What if an online company did the same?Some bits of information are very context-dependent. Your doctor should know very personal health information about you, and your accountant should know very personal financial information about you. There are other bits of information that you would not want companies to know about you (out of fear they would bombard you with unwantedmessages) or complete strangers, but that you would share with almost strangers. Think about sharing your phone number, becoming Facebook friends, or connecting with others via Snapchat or Instagram after meeting through friends, in a work environment, or meeting with fellow students to work on a school project out of class.We all have met over-sharers on social media - this is easy evidence that there are individual differences in how much information we allow others to have about us. Personally, I am still shocked at seeing ultrasound photos on social media when people share news about a baby on the way. That's a person's uterus! Inside of their body! I would not like a random ex-coworker, high school classmate, or second cousin to ever see an image of my reproductive organs. But that's me. We're all very different.The nature of information also matters. What types of personal information you may feel comfortable with some people knowing, but uncomfortable talking about with others? In a world of social media, we often think of people who don't take their own privacy seriously . . .
Piracy & Privacy- Doc_2
Piracy & Privacy- Doc_3
You have likely heard advice by now to watch what you post on social media, because employers can find that information and weigh it when determining who secures internships, jobs, promotions, etc. I like this checklist for college students and recent grads: http://blog.suny.edu/2014/06/10-social-media-habits-every-college-student-should-adopt/(Links to an external site.)It's short and covers the major points I would encourage you all to consider.Also, if you think you can avoid it by going under a different name or quitting all social media - you may want to reconsider. Especially if you are studying the media, what will employers think if they can't find you? The implications are pretty bad: You're not tech savvy (killer for media jobs!), or you've panicked and done a major dump, OR you simply have nothing good to offer. Read on . . .http://theundercoverrecruiter.com/why-no-social-media-presence-is-bigger-red-flag/(Links to an externalsite.)Piracy & Privacy p. 2Privacy & Piracy p. 2
Piracy & Privacy- Doc_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Internet safety
|1
|279
|34

Netflix Anti-Piracy Team and Their Policies
|8
|1592
|109

Social media and other people's privacy.
|2
|487
|153

Network Management in Organisations
|4
|1277
|91

Public and Private Profile Audit Report 2022
|8
|2261
|19

ITC596 - IT Risk Management - Assignment
|15
|2520
|51