What do the authors mean by the term “nonymity”? The authors’ describe the term noymity as a state or quality of being anonymous. Facebook is a nationwide chat, meet, and greeting network site online so it is not unknown, many people worldwide are aware of Facebook. Part II: Literature review 3. What do the authors mean by “identity”, “identity production”, and “identity claims”?
Social Networking Video Evaluation Question 3 Brief This video is on Social networking, and covers one of the four concepts listed within the criteria. This has been achieved by covering how social sites such as Facebook, help people keep connected through interactive posts and notifications on mobile devices. The time period of 30 seconds the video has been achieved, while it has been produced in an AVI format using a frame ratio of 240 x 320 at 25 fps. The video has used self-created images that have been acknowledged at the end of the video, while also contains one image taken from the TMA resources folder. Text was used at the beginning of the video to provide the Title ‘Social Networking’, and at the end for the credits I’ve partly mentioned before.
Networked Systems Security Task 1 – THREATS AND IMPACT OF NETWORK THREATS There are many types of threats that can damage your computer either temporarily or permanently. Some threats posed may not threaten your computer right away however have the potential to do so. Some threats that present themselves can include physical threats such as the theft of equipment whether that is the monitor, computer etc. Other threats can be harder to find such as viruses, worms or any kind of malware. Understanding these threats allows the organisation to prevent, protect and correct any damage done to his/her computer to an extent.
Other types of risks that BUGusa, Inc. can potentially face without property protection and poor management are: loss in customer trust, penalties for law violations, compliance risk, availability risk, access risk, and more. (Priviti, 2008) B. Discuss in detail what types(s), if any, of civil liability Steve and/or WIRETIME may face if caught. a. BUGusa is facing the issues of their work being stolen and internet hacking. Not to mention WIRETIME is unethical in their actions.
Under large bussiness corporations, the scope expands to include other factors such as safe-guarding business legal and transactional interests. The integral part of AUP is the cde of conduct the the users need to display when using the internet or internet. Code of conduct stipulates that the users have to what extent to use the network, the language that uses when they are online especially on social sites and avoid illegal activities that the organisations doesn’t allow. The company or the organisation offering internet have the consequences on the violation of AUP. This may include
Research & Findings Research * I went on both Facebook and MySpace to look at their privacy policies. * I went on Northeastern University’s library website to find case studies regarding privacy for Facebook and MySpace. Privacy policy for Facebook * Facebook is designed to make it easy for you to share your information with anyone you want. You decide how much information you feel comfortable sharing on Facebook and you control how it is distributed through your privacy settings. * You can control how you share information with Facebook-enhanced applications and websites.
The disadvantages of social media would be when it’s used inappropriately. Hackers can get personal information such as your name and address if it’s available on the site. It also makes it easy for child predators to interact with our kids. For example, child predators use these sites every day to connect with children. Social media can even affect job opportunities.
Are Social Communities Beneficial? Abstract In this essay, I plan to write about online social communities (virtual communities) and the effects and benefits of them on people that use them. I will also be discussing some peoples’ opinions of online communities. I plan to research on what peoples’ opinions are and what they believe the effects and benefits are of them. I also plan to interview a couple people that are a part of a social community for Crohn’s to get their views.
People share other people’s personal information since their social media and mobile media store data about every contact they are involved with. Also the information available is not only what you want to share but also what other people share on their profiles. Facebook in fact says in its privacy policy that “we receive information about you from your friends and others, such as when they upload your contact information, post a photo of you, tag you in a photo or status update, or at a location, or add you to a group,” (Sarigol et al., 2). Disclosing less personal information, and managing the privacy settings of you profile as strict as possible are not enough anymore, since users can control only their profile and they can’t manage their privacy on other people’s profiles. In this way Facebook creates a sort of shadow profile, which is “a file that Facebook keeps on you containing data it pulls up from looking at the information that a user’s friends voluntarily provide” (Sarigol et al., 2), and most of users are not aware of
A housing complex can now have a website where the people who live near each other can communicate and plan get together. People in that community need to know about this. An individual can get the word out and can help people who are not tech savvy stay connected. Useful information can be put on a community website that can help people feel like they are part of a community and not just living in a place. Since I run a book club, I know it is individuals who can keep a community together.