Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Research Paper:
2004 and now is one of the world's popular website. Facebook has over 845 monthly active users and over 483 million daily active users. There are also 425 million mobile users (Protalinksi, 2012). The popularity of the site is so much that when security breaches occur, the private information of near one in every seven people in the world is at risk. With the site being a place where people keep their personal information, there is also the risk that this information becomes valuable to potential employers, though for all the wrong reasons. The open nature of Facebook means that people you do not know have access to the information. It is argued that people need to be careful when they use Facebook, and take care of their personal information.
How Facebook Works
Facebook's business model is to gather information about people and sell that information to marketers. This works because the website has created a space for people to interact with one another and share things about their daily lives with one another. This means that people voluntarily put the information onto Facebook. To help people maintain control of the information, Facebook allows its users to have a number of privacy settings. How these work changes frequently, and this confuses the users. In addition, it seems every feature has its own privacy settings. As a result, users often leave key information unprotected. This creates a privacy risk, but there are other types of privacy risks as well with Facebook that will also be discussed. But important is that even when the information is protected so that only friends can see it, Facebook still stores this data, and it stores data from accounts that are deleted. The result of this is that people's personal information still exists on the company's servers, and if those servers were ever hacked this sensitive information could be leaked to the world.
Personal Privacy Risks
Mui (2011) notes that "it is not just about what Facebook does with our data; we have to worry about what they might enable others to do, too." A study done by Carnegie Mellon University showed that Facebook's face recognition software for photographs made it possible for the researchers to identify people based on photographs of them elsewhere, even on protected sites. Anybody with a photo of another person could conceivably, with the right software, find out who that person is based on pictures of them on Facebook.
These risks are going to be even more significant with the rollout of Timeline. Brown (2012) reports that because Timeline is a public feature, more of your personal data is going to be released to the public. Worse, the Timeline seems to operate with different privacy settings again. Users who do not keep their privacy settings up-to-date will find that certain things will appear on their timeline that they wanted to be kept private. It is noted that there is a saying "nothing on the Internet is private." A company like Facebook cannot guarantee privacy, even if all the controls are in place. This puts the onus on the user make sure that the information on Facebook is only the information that the person wants to be in public. Many people, especially younger people, are unaware of the risks and they are unaware of reputational issues that can occur.
Of the biggest areas were Facebook poses a risk to a person is in job searching. Facebook is increasingly being used by companies to help weed out candidates. That means that employers are going onto a job candidate's Facebook page with the specific intent of finding something that is a reason to exclude that person from the job. It is noted that while the practice is on the increase, job-seekers generally oppose it. Indeed, 66% of Generation Y survey respondents were unaware that companies even used Facebook to check out job applicants, and 56% thought that the practice was unfair (Du, 2012).
The situation is so alarming now that some employers are now asking job applicants for their Facebook user names and passwords to check out their accounts themselves. This way, the employer has access to material that is not on the public profile. Other times the employer will make a friend request to the applicant. This practice is highly alarming, but it is not illegal, and the employer basically makes it a condition of employment (Favate, 2012). This can only happen because employers know that most people, especially young people, have a Facebook account, and that on that account there is private information. More alarming is the idea that they only want access to the account to find out something negative about a job applicant. The practice raises significant ethical issues, but until it is made illegal simply having a Facebook account and wanting a job could result in you being asked to surrender all of your privacy rights.
One of the lines of work that uses Facebook the most in applicant screening is law enforcement. The law enforcement community has long been a keen user of Facebook in order to identify criminals and learn about gang members. There are numerous examples of crimes that have been solved because the criminal posted something incriminating on Facebook. Law enforcement often subpoena Facebook for access to the accounts of suspected criminals, so that they can be tracked (Hill, 2012). Now clearly one should be worried about not being a criminal than any Facebook privacy violation, but there is the risk that law enforcement will target the Facebook account of an innocent person and that this will result in a privacy violation to that person.
If you did do something wrong, it is entirely possible that evidence found on your Facebook account could be used against you in a court. Even if there is no evidence, some of your Facebook friends could be contacted by police and coerced into testifying against you. Again, you probably should not commit crimes in the first place, but if you do, you may come to regret having a Facebook account when evidence from the account finds its way into the courtroom.
One has to consider that a lot of the information that is on Facebook is actually quite old. For example, when somebody posts something in high school or college that they might come to regret when they are older, that information is never really removed from the Facebook servers. Thus, that information could turn up later at a job search or some other inopportune time. Users have only limited control about the content that their Facebook account has, so there remains the risk that old items will remain available to people who want to violate your privacy. Even an item that was posted and removed could find its way to your timeline, for example, just in time for somebody to see it that you don't want to see it.
The porous nature of Facebook security is very much a concern. The main security risk that Facebook poses is simply through its existence. The amount of information that the site collects about its users is incredible, and that information is stored by Facebook in perpetuity. For users, that means that there is always a risk associated with having a Facebook account, or even if you only once had an account but cancelled it. It is important to remember that there are many ways having a Facebook account could come back to haunt you.
The different ways Facebook information from your account is used against you are just the tip of the iceberg. Government agencies could petition lawmakers to have access to people's Facebook accounts, so the next thing you know the IRS wants to talk to you, the INS does not like…[continue]
"2004 And Now Is One Of The" (2012, April 25) Retrieved December 5, 2016, from http://www.paperdue.com/essay/2004-and-now-is-one-of-the-79595
"2004 And Now Is One Of The" 25 April 2012. Web.5 December. 2016. <http://www.paperdue.com/essay/2004-and-now-is-one-of-the-79595>
"2004 And Now Is One Of The", 25 April 2012, Accessed.5 December. 2016, http://www.paperdue.com/essay/2004-and-now-is-one-of-the-79595
There have even been reports that have mentioned that this theory is just an "account of crime not a clarification," (Cassell, 2005). The Victim's Right Act of 2004 has been able tom defend those that fall up under this theory because those that committed these crimes are producing victims that will need protection. While these issues have been pointed out, there is no doubt that the Routine Activity Theory
2004 case of Missouri v. Seibert that was appealed to the U.S. Supreme Court to generate a new rule prohibiting a specific practice often used by, and taught to police officers. That technique involved a two-tiered interrogation strategy expressly designed and intended to circumvent the Fifth Amendment constitutional protections guaranteed by the Miranda rule. The way the strategy worked was that police would deliberately delay reading Miranda warnings to
Presidential Candidates The presidential elections are due this November and therefore the campaign by the candidates is in full swing. The two candidates, Senator John Kerry and the present President George W. Bush, have adopted various strategies and campaign styles that could possibly help them win majority's votes. Here, is a comparison of their campaign styles, statements, position on various issues and websites and how this all has affected their poll
The catered champagne supper was designed to communicate the new luxury image of the company and create connections between the various businesspersons who will use our products in their work. We believe that our new branding efforts have already paid off, as we have seen an increase in purchases from customers from the Hollywood area who seek to bring our striking designs into their homes. Reinvention is the key to
conflict of interest is at the core of nearly every ethical dilemma. A conflict of interest, simply put, is a situation in which the decision maker has two or more competing interests. Market timing, late trading, insider trading, illegal trading, fraud, partial disclosure, non-disclosure...the manifestation of conflicts of interest is seemingly endless. The business landscape today is a minefield of ethical disasters, some of which have already occurred, some
South Dakota and its elections of 2004.The entire discussion in the paper will be based on the factors, which are involved in the Senate elections of the South Dakota. This topic, South Dakota Senate Race 2004 will be analyzed and previewed by discussing four areas: Voting history and important political demographics of the state. Candidate characteristics strengths and weaknesses for each of the Major Candidates. Emerging issues in the state that will
Picard: Like this hearing. Maddox: Yes With this acknowledged, Maddox admits Data is intelligent, but lacks self-awareness and consciousness. Picard: What about self-awareness? What does that mean? Why am I self-aware? Maddox: Because you are conscious of your existence and actions. You are aware of your own self and your own ego. Picard: Commander Data. What are you doing now? Data: I am taking part in a legal hearing to determine my rights and status. Am