Other types of risks that BUGusa, Inc. can potentially face without property protection and poor management are: loss in customer trust, penalties for law violations, compliance risk, availability risk, access risk, and more. (Priviti, 2008) B. Discuss in detail what types(s), if any, of civil liability Steve and/or WIRETIME may face if caught. a. BUGusa is facing the issues of their work being stolen and internet hacking. Not to mention WIRETIME is unethical in their actions.
Purpose: The author wants people to be aware of the consequences of their action in using social networking sites. Audience: General population. Voice Tone: She is trying to be serious and credible but I find some of the words and examples humorous. Out of all the examples out there in oversharing, she used the South African man calling his boss a serial masturbator. Evidence: Most of her examples come from people she know or are her friends.
Privacy is everything and with people out there who could stalk you over a networking site, that really bothers me. There needs to be something done where we can feel protected while being on a social networking
It’s easy for a person to create a factitious profile and use these anonymous profiles. In Bugeja’s essay they say Facebook forbids such fabrications because of their “Terms of Service,” but is still possible for creators to create fake profiles that look real. Again, in his essay it’s stated that all you see on Facebook is an image. You don’t see that person face-to-face so identities are constructed and easily manipulated. Facebook is an interesting example of
Participants were asked to fill out to main questionnaires: Thoughts about Facebook Scale and Motives for Facebook Use Scale. Questionnaires were collected from undergraduate students from the American College of Greece. Results contradicted the initial hypothesis that the motive of companionship will be a predictor of problematic use. In contrast, the motive of cool and new trend was the only significant predictor for problematic Facebook use. Suggesting that individuals can easily be influenced to conform which can lead to a maladaptive need to belong.
Dislike Button on Facebook One of the greatest evolutions of Facebook is the creation of the ‘Like’ button. With it, people could use it as a tool to provide support to another person’s thoughts and ideas instantaneously. However, the creation of the ‘Like’ button also lead to the debate that a ‘Dislike’ button should also be implemented, so the user can have the option to vote in favor, go against, or be neutral to the certain thought or idea. There are even a few Facebook pages exist for people trying to get a ‘Dislike’ button integrated alongside the ‘Like’ button (Abby, 2013). While implementing the ‘Dislike’ button seems pretty harmless to most of us, it could actually leave a negative impact on individuals, society and businesses.
The tortoise won the race because of his belief and purpose to reach a certain point. In this situation the tortoise, reach his point in victory. (Bilton, 2012) Synopsis of the Situation Facebook and Twitter are two of the most popular social network sites on the internet. They allow users to connect to with one another and be updated what is happening to their friends. The mission statement for facebook is probably a good approach to where facebook is now and will be in the future.
English 101-B55 Essay 2 FD 10/26/2011 Technology and Social Media Between Blessing and Malediction “Technology”, “social media”: two terms that are widely spread nowadays. Everyone or the majority to not exaggerate is related somehow to these emergent extracurricular behaviors of our modern life. Some people use it with being conscious of their reality? And realize it’s a tool to achieve various tasks in the daily life; others melted in this new World making it a type of virtual schizophrenia where they are faking and sometimes isolating themselves from reality seeking intangible fame, success and recognition they might lack in real life. Technological knowledge is a must for everybody to not be left behind in a fast-paced environment we live in.
However, there lies a new set of dangers that come with this age, specifically due to the naivety of young adults. One danger that thrives off naive young adults is the internet. A majority of them give out personal information without thinking about who is going to be reading or looking at it. This information can be used for many things. It could be used by online predators to contact the teenager.
This is a popular act of crime because of its traceability; new ways have been introduced to make your online presence untraceable, invisible and anonymous, which leaves you thinking. Should I really be leaving all my personal information online or, “in the cloud”.This allows a younger, smarter, more intelligent generation to rebel freely without their actions being traced to them which is becoming increasingly dangerous as this trend is