logo

BUSI 1475 : Management in Critical Context

13 Pages3796 Words102 Views
   

Added on  2021-08-11

BUSI 1475 : Management in Critical Context

   Added on 2021-08-11

ShareRelated Documents
University of Greenwich (UOG)
Bachelor of Arts (Hons) Business Management (Top Up)
ASSIGNMENT / PROJECT COVER SHEET
(to be completed individually by student)
UOG ID Number 001146040
Course Specialization
(*Please delete whichever is not
applicable)
Marketing and Sales
Subject Code/Name BUSI 1475 / Management in Critical Context
Assignment Title Essay (100%)
Lecturer/Supervisor Mr. Chris Paget
Word count 3158
DECLARATION
I, the above named student, confirm that by submitting, or causing the attached
assignment to be submitted, I have not plagiarized any other person’s work in
this assignment and except where appropriately acknowledged, this assignment
is my own work, has been expressed in my own words, and has not previously
been submitted for assessment.
1
BUSI 1475 : Management in Critical Context_1
Table of Contents
I. INTRODUCTION..........................................................................................................3
II. GLOBALIZATION.......................................................................................................3
1. The impact of social media on globalization...........................................................................3
2. Globalization and Digital privacy...........................................................................................5
III. TECHNOLOGY AND NETWORK..............................................................................6
IV. CONFLICT AND CO-OPERATION...........................................................................9
1. Conflict....................................................................................................................................9
2. Collaboration..........................................................................................................................9
V. CONCLUSION...........................................................................................................10
REFERENCES...............................................................................................................11
2
BUSI 1475 : Management in Critical Context_2
I. INTRODUCTION
From article from the BBC News “Facebook leak: Irish regulator probes 'old' data
dump”, Ireland's Data Protection Commission (DPC) is investigating the leak of Facebook
user information. Facebook said this was an previous leak, which it found and repaired more
than a year ago. However, cybersecurity officials remain concerned because of the large scale
of the leak, particularly it covers more than 530 million users in 106 countries around the
world. Facebook users whose privacy are affected by a major data breach are advised against
the technology giant to take legal action. About 530 million users were leaked with personal
data, including telephone numbers in some cases. On behalf of the EU people concerned, an
association on data privacy is about to take a case to the Irish courts. Facebook disputes
misconduct by claiming that the details were "scrapped" out of material available on the web.
Throughout the Cambridge Analytica breach, Facebook is being charged for not protecting
the personal data of users. The crisis was that 87 million users have been used for publicity
during elections were mined from Facebook records. Mass court proceedings against
Facebook over privacy theft are being held in England and Wales by over one million people.
The UK database watchdog fined £500,000 on Facebook for its involvement in the
Cambridge Analytica leak in October 2018. Facebook has authorized a "significant violation"
of the rules, the Information Commissioner's Office (ICO). Facebook excused and allowed
users to search the "banned applications" they had accessed.
In recent years social media users have become increasingly concerned for their
privacy. Data incidents have frightened many people and compelled them to replenish their
social media relationships and the safety of their personal information. The dramatic case of
the Cambridge Analytica consulting agency is an example. The company used more than 50
million Facebook users' private information to manipulate the presidential 2016 election in
the United States. This example and others have continuously worsened consumer confidence
and caused many consumers to ask if they have lost control of their own results. 80% of
social media consumers report worrying about companies and marketers who view and use
social media content, according to a survey by Pew trust. This increasing questions about
privacy have sparked stricter rules. Moreover, they have put more scrutiny into the business
of protecting personal records.
Only a couple of decades ago, it was impossible to present to strangers that sort of
physical pictures an data some of us get on social media today. Internet way and cultural
media have radically altered our attitdes about privacy. (Watson, P.W., Apr. 2018) increasing
questions about privacy have sparked stricter rules. Moreover, they have put more security
into the business of protecting personal information.
The social networks are used by 40% of the world's population. According to
information gathered by Hootesuite, 3.48 billion users are connected to some types of social
media. This links will make users more insecure. If personal data is in the wrong hands, it
may have damaging effects.
II. GLOBALIZATION
1. The impact of social media on globalization
This digital technologies, like Internet and mobile phones, make it easier and more
cost-effective for people from almost every corner of the world to exchange thoughts, facts,
photos and sounds opposed to conventional media tools like. It was better to take advantage
of digital media resources to engage in civic parties, protests and meetings, in person or via
Internet with suggestions. The effect of the Internet on culture and business since the late
1990s was widespread. New innovations, such as blogs, video sharing sites and social
3
BUSI 1475 : Management in Critical Context_3
networks, are used more often by people as technology advances increase. As more people
are exercising their rights with this technology, many governments are restricting democracy
on the Internet, in order to keep their powers. In figure 1, the countries that limit net freedom
to what extent are seen. The points would be calculated by taking into account three
categories: entry barriers, content limitations and users rights violations. The below are the
sub - categories:
-Access obstacles: assessment of access barriers in infrastructure and economy;
government attempts to block individual services or technology, and controls on
internet and telephone access providers in law, regulation and ownership.
-Content limitations: examined website blocking and filtering, other types of
surveillance and self-censorship, content manipulation, online media plurality and use
of modern media for social and political advocacy.
-User right violations: legal security provisions and internet interaction restrictions;
monitoring; privacy; and online consequences, such as legal action, detention,
physical assaults or other types of abuse.
Figure 1: Freedom in using internet
In a period of technological development, the 21st century developed. The available
technical tools are constantly being revised and added. It also extends globally as it
4
BUSI 1475 : Management in Critical Context_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ethical Issue relating to Facebook
|13
|2642
|470

Data violation of Facebook Users - Comparative Business Ethics & Social Responsibility
|9
|1493
|181

Facebook-Cambridge Analytica Data Leak: Ethics, Privacy Law and Cyber Security
|7
|1505
|283

Facebook Data Mining Scandal: An Ethical Perspective
|12
|2573
|430

Ethical Issues in Facebook Data Leak
|8
|2543
|491

Recent Data Breaches in Facebook
|16
|3624
|474