Sexting and Privacy Violations: A Case Study [CMAF 1010]
Verified
Added on 2022/08/17
|4
|1097
|16
AI Summary
The assignment is simply just summarizing the article I've attached. APA form but a little bit more different, see attachment. The in-text citations and references are all they really care for. Suppose to be 2.5 to 3 pages long only. non-format info: xyz, ID:*********9 Instructor: CMAF 1010, Lab 52 03/02/2020
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head SEXTING Lara Al Kabbani, ID – Instructor: Steve Jankowski GA: Amanda Milanis CMAF 1010, Lab 52 03/02/2020 SEXTING: AS A MEANS OF PRIVACY VIOLATION The key idea of this research article is the impact of sexting among the young generation. In this regard, the concept of sexting should be defined before steeping into the consequences. Sexting refers to the process of sending and receiving unsolicited images, videos, and messages. The young generation is very much into this procedure due the raise various social media applications and online dating applications (Hasinoff & Shepherd, 2014, p. 8, 24).The research states that there is zero percent privacy in the usage of the medium of internet to send or receive sexually explicit pictures or messages. Many researchers consider this practice as a merely foolish and unsafe way spreading continuously among the young generation. The legal and psychological consequences of sexting often raises issues including child pornography. The paper provides some examples of legal consequences of sexting. However, there are researchers who do not consider sexting as a negative act (Albury, Hasinoff & Senft, 2017,pp. 527- 545).They consider sexting as a part of risky sexual behavior and attributes. These researcher consider the consequences of sexting as equivalent to the outcomes of overdose of drugs, casual sex, and even the unprotected sex. The paper also mentioned that, irrespective of the offensive impact, the community must avoid the act of shaming young people for the activities of consensual sexting. Instead of
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2SEXTING shaming, they must acknowledge the teenage group and their entrance phase into adulthood and engaging sexting as a mode of interpersonal intimacy, expression, and communication. In this regard, the expert mentioned the nature of norms and policies of online privacy. Experts from the domain of digital media argues about considering the entire internet thing as an automatically public zone. According to the study, the pictures or messages sent through online mediums are generally stored in the cloud that has kept the privacy of users into a questionable situation. The privacy concerns attached with networking services of social media is considered as a subset of privacy of data. It involves the right of authorizing the subjective privacy regarding keeping, re-purposing, endowment to third parties, and exhibiting information concerning to an individual through the internet. Researchers often state that during this 21stcentury information are as important as currency (Wright & Xie, 2019, pp. 123- 140). Hence, giving away the access of the personal information is not a wise decision of the educated society. All the social networking sites provides a set of policy and norms before joining. Being an educated individual, a wise suggestion is to go through all the policies and norms before joining the social networking sites rather merely skimming the entire content to save time. A safer way is not to share any image, text, or erotic posts on the reputed social media platforms. However, majority of the population consider the matter of not sharing explicit contents through digital media as unrealistic (Klettke, Hallford & Mellor, 2014, pp. 44-53).On other terms, it is a way to allow the social networking reservoirs to preserve the contents posted by any particular individual. Sexting is becoming a way of violation of privacy. This concept has a close connection with interpersonal trust, expectation, privacy, and intimacy.
3SEXTING This research work mentions that sexting is the recent digital incarnation of the ancient incident of producing personal sexual media that may include love letters, Polaroid photos, and diary entries (Moore et al., 2015, pp. 42-53). All the concepts can be subjected to violation, which is not an expected activity. Hence, the research work seeks the answer of the question about the privacy norms of young people at the time of sexting. The research was designed with the method of online survey. The survey includes two scenarios of sexting with multiple ‘yes’ ‘no’ questions. The questions were based on whether it should be considered of sharing one’s personal images in certain circumstances as alright or not (Hasinoff & Shepherd, 2014,pp. 8, 24). The participants for this research work were divided into three groups consisted of undergraduate students of Canadian University. The findings of the research reflect that majority of the participants expect privacy at the time of sexting to consider as social norm. The study also found privacy violation can be determined by a range of particular contextual factors. Both the survey and participant groups are unwilling to accept the violation of privacy irrespective of the nature of content. According to the respondents sharing suggestive pictures in an intimate relationship is a mandatorily private thing that should not be violated.
4SEXTING References Albury, K., Hasinoff, A. A., & Senft, T. (2017). From media abstinence to media production: Sexting,youngpeopleandeducation.InThePalgravehandbookofsexuality education(pp. 527-545). Palgrave Macmillan, London. Hasinoff,A.A.,&Shepherd,T.(2014).Sextingincontext:Privacynormsand expectations.International Journal of Communication,8, 24. Klettke, B., Hallford, D. J., & Mellor, D. J. (2014). Sexting prevalence and correlates: A systematic literature review.Clinical psychology review,34(1), 44-53. Moore, R. S., Moore, M. L., Shanahan, K. J., & Mack, B. (2015). Creepy marketing: Three dimensionsofperceivedexcessiveonlineprivacyviolation.Marketing Management,25(1), 42-53. Wright, S. A., & Xie, G. X. (2019). Perceived Privacy Violation: Exploring the Malleability of Privacy Expectations.Journal of Business Ethics,156(1), 123-140.