logo

Social Media Ethics : Social Media and Other People's Privacy

Contents Chapter 1: Abstract Aim Objectives Research question Research structure Chapter 2: Social media concept Types of privacy violation Risk and threats Chapter 3 Research methodology Research philosophy Research approach – (done on google survey) How companies use data from you Chapter 4 : Data findings and analysis - “ based on google surveys min 40 persons responses” Chapter 5: Conclusion: Recommendations:

40 Pages9040 Words20 Views
   

Added on  2022-08-28

Social Media Ethics : Social Media and Other People's Privacy

Contents Chapter 1: Abstract Aim Objectives Research question Research structure Chapter 2: Social media concept Types of privacy violation Risk and threats Chapter 3 Research methodology Research philosophy Research approach – (done on google survey) How companies use data from you Chapter 4 : Data findings and analysis - “ based on google surveys min 40 persons responses” Chapter 5: Conclusion: Recommendations:

   Added on 2022-08-28

ShareRelated Documents
Running head: SOCIAL MEDIA ETHICS
SOCIAL MEDIA AND OTHER PEOPLE'S PRIVACY
Name of the Student:
Name of the University:
Author Note:
Social Media Ethics :  Social Media and Other People's Privacy_1
Table of Contents
Chapter 1: Introduction........................................................................................................4
Abstract............................................................................................................................4
Introduction......................................................................................................................4
Research Aim...................................................................................................................5
Research Objectives.........................................................................................................5
Research question............................................................................................................6
Research structure............................................................................................................6
Chapter 2: Literature Review...............................................................................................8
Social media concept.......................................................................................................8
Types of privacy violation.............................................................................................11
Risk and threats..............................................................................................................14
Mitigation of the threats.................................................................................................16
Chapter 3: Research Methodology....................................................................................17
Introduction....................................................................................................................17
Research philosophy......................................................................................................17
Research approach.........................................................................................................18
Research Design............................................................................................................19
Sampling and Data Collection Method..........................................................................20
Data Analysis Method...................................................................................................20
Social Media Ethics :  Social Media and Other People's Privacy_2
Research Ethical Considerations...................................................................................20
Research Limitations.....................................................................................................21
Chapter 4: Data Analysis...................................................................................................21
Chapter 5: Conclusion and Recommendations..................................................................32
Conclusion.....................................................................................................................32
Recommendations..........................................................................................................32
References..........................................................................................................................33
Social Media Ethics :  Social Media and Other People's Privacy_3
Chapter 1: Introduction
Abstract
The starting of the online social networks (OSN) converted usual passive reader into
content contributor. These networks allowed numerous users to provide information as well as
exchange opinions. The users represented themselves in the virtual communities for interacting
with other OSN users. The main aim of OSNs is to distribute huge information among multiple
individuals. Individual’s privacy is one of the major responsibility of these OSNs. The pricvacy
of the users can be exploited. The OSN providers gather the sensitive and private information of
the users which can be misused by several third parties and can exploit the OSN users.
Introduction
OSNs are used as the source of the information by numerous users. This allow a user to
communicate with other users through internet. Social media can also be represented as a social
graph which represents the relationship between the organization, users and their social
activities. These OSNs allow them to create a virtual community where they are able to transmit
and receive digital data easily. The organizations and the users are represented as the nodes and
the relationship between them is represented as the edges of the graph (Klausen 2015). Thus,
with the emerging technologies and continuous development of these OSNs allow the third
parties to gather sensitive information regarding the users. This hamper an individual’s privacy
and exploit the social media ethics as well. An individual privacy can be hampered in numerous
ways. Privacy protection and preservation are utilized to secure sensitive information of OSNs
user from the third parties and attackers. Privacy preservation is applicable in those situations
where the OSNs users handed their sensitive information to other individuals whereas the
Social Media Ethics :  Social Media and Other People's Privacy_4
privacy protection is applicable in those situation where the end user does not desire to share
their private information within the OSN (Guerra et al. 2013). This particular research study
primarily deals with the security and privacy problems associated with the OSNs. This research
study will also help people to learn about various methods or strategies that can be used by them
to secure themselves from various confidentiality and security concerns in the OSN’s
communication.
Research Aim
This research analysis aims on the effectives of the social media on other people’s
privacy. An in – depth study of various literartures and models that are relevant to the research
topic is conducted to measure the effect of social media on people’s privacy. Moreover, primary
and secondary research are also conducted to conclude the research topic.
Research Objectives
The major research objectives of this research study are mentioned as under:
To analyse the utilization of the social media. To analyse the privacy concerns associated with the OSN. To measure the effectiveness of OSN on people’s privacy. To determine whether people are using the OSN in an ethical way or not. To analyse the challenges faced by the people to protect their privacy in OSNs. To analyse various ethical models appropriate to the research topic To provide recommendation to people to protect their sensitive information from the
threatful environment.
Social Media Ethics :  Social Media and Other People's Privacy_5
Research question
The research questions allow the investigators to attain the listed research objectives as
well as allow them to end the research study faultlessly. The research questions for this research
paper can be structured as follows:
How People use OSN to communicate with other peoples? What are the privacy concerns associated with the OSNs? What is impact of OSNs on people’s privacy? Do people use OSNs in an ethical way or not? What are the challenges faced by the people to protect their privacy in OSNs? What are the ethical models that are relevant to this particular research topic? How can people improve their privacy while working or communicating in the OSNs?
Research structure
This research study is structured in four various chapters. Each chapter provides an in
depth knowledge regarding the research topic. The four chapters of this research are mentioned
and described below:
Chapter 1 Introduction
This particular chapter of the research study introduces the research topic as well
showcased the primary objectives for conducting this research. This chapter details purpose of
conducting this research, portrays the aims and objective of the research as well as the
researchers detailed the research structure of the study which help the readers to know and study
research topic in an appropriate way.
Chapter 2 Literature Review
Social Media Ethics :  Social Media and Other People's Privacy_6
Literature Review is one of the major chapter of this research paper. In this section of the
research paper the investigators studied the research topic in a detailed manner. The research
reviewed numerous literatures that are related to research topic which allow them to cover all
possible points or key sections of the research topic. The existing theories, models and concepts
allow the researcher to gather more knowledge of the study topic.
Chapter 3 Research Methodology
The researchers allowed the readers to learn about the research methods used in this
research study. This particular chapter showcased the various research methods used by the
researchers to complete the research seamlessly. In this section the research discussed the
research philosophy, research approach, research design, sampling methods and data collection
method.
Chapter 4 Data Analysis
In this chapter, the researchers presented the gathered data as charts, graphs and tables.
The results will be analysed in this section depending on the achieved data. The analysed data
will help the audience to know the effectiveness of the social media on the people’s privacy in a
detailed manner. This chapter allowed the research to conclude the research topic.
Chapter 5 Conclusion and Recommendation
The last chapter provides a concise and detailed conclusion on the research topic. The
conclusion was drawn on the basis of the analysed data and the results of the previous chapter.
This chapter also provides recommendation to the people to secure their sensitive data from the
threatful environment. The provided recommendation allow the readers to use the OSNs securely
such that their data are not exploited due to some attacks or misuse.
Social Media Ethics :  Social Media and Other People's Privacy_7
Chapter 2: Literature Review
Social media concept
According to Fuchs 2017, social media are the computer-mediated digital platforms that
promote knowledge, thoughts, ideas, career interests and some other forms of expression across
virtual networks as well as communities to be produced or exchanged. Social media is
the network of online communication networks devoted to feedback, interaction information
exchange and collaboration centered on the culture. Among the various types of social media are
blogs and apps devoted to forums, social networking, microblogging, social curation, content
bookmarking and wikis. According to Lewis 2015, the users generally connect social media
services on computers and laptops through web-based technology, or download
the applications that provide social media capabilities on the mobile devices, such as tablets and
smart phones. When consumers communicate with the electronic resources, they build highly
interactive channels that allow individuals, groups, and organizations to exchange, co-create,
debate, contribute, and change publicly shared self-curated content or user-generated content
(Madden et al. 2013). The range of currently available stand-alone and the incorporated social
media services pose interpretation the challenges; however, some common features there are:
Social media are the Internet-based Web 2.0 applications that are interactive.
The lifeblood of the social media is user-generated content including comments or any
text post, digital images or videos, and data generated through all online interactions.
Users create network-specific website or device accounts and personalities that are built
and managed by the agency of social media.
Social media promotes the development of social networks online by linking the identity
of a person with that of other groups or individuals.
Social Media Ethics :  Social Media and Other People's Privacy_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Privacy and Security Issues on Social Networks
|62
|15464
|497

Online Privacy: Protecting Your Personal Data and Security
|8
|2203
|260

Social Media Risks To Patient Information
|5
|1089
|17

Ethical Issues in Social Media Usage
|20
|4737
|258

Is Privacy Dead in the Age of Social Media?
|10
|4051
|130

CUSTOMER INFORMATION PRIVACY SECURITY
|6
|987
|22