LECTURE 14 ETHICS AND SOCIAL MEDIA. SOCIAL MEDIA: EXAMPLES OF ISSUES IN Privacy Property Teaching Friendship Etc. 26.10.2015 Kai K. Kimppa 2.

Slides:



Advertisements
Similar presentations
Hart District Acceptable Use Policy Acceptable Use Policy.
Advertisements

Public Relation.  While NAWS has no specific position on Facebook. NA as a whole has a clearly defined outline for the use of Internet technologies.
SO WHAT DOES THE AUP MEAN FOR ME…??? A Presentation for Students in Grades 3-5.
Don’t be bullied, or be a bully.
Module: Perspectives on Personal information
Students’ online profiles for employability and community Frances Chetwynd, Karen Kear, Helen Jefferis and John Woodthorpe The Open University.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
It is about the website(Named as Reddit.com), which becames the No. 1 Social bookmarking website in the Year of Now many of you must be thinking.
Social Media & Photography Photojournalism. Why social media? A 2013 study found that social media users represent 1 in 4 people on the globe, roughly.
Standards and Guidelines for Web Page Publishing December 9, 2009.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Nine Elements of Digital Citizenship BH. Nine elements is identified to create a digital citizenship. Digital Access: full electronic participation in.
How many are using social media? Which channel? When? How? Why?
Helping young people to stay in control Living with technology.
Facebook Advertising vs Google AdWords. ● Choose a keyword you want to target ● Your advert is going to appear above all the natural listings when someone.
Welcome… Parent Awareness Session. Media Story 21 year old media student from Surrey who…… –Arranged to meet a 14-year-old at a railway station –Had.
Computer Ethics.
Knowing Your Facebook From Your Flickr Dan O’ Neill – -
An Introduction to the Powerful Social Network and What it Means for Your Business.
Broadcasting News Trivia "LESSON PLANS." BBC News. BBC, 30 Jan Web. 19 Nov
Brad Blake Director, New Media & Online Strategy Massachusetts Office of the Governor
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
 What are the risks?  Technologies your children use  Tips for protection  Advice and help  Questions? Topics.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
Welcome to Week 3 in the Mrs. DeRita’s computer lab!
Digital Citizenship Created By: Kelli Stinson June 2011.
Do pictures always give truthful information? Can publishing it be hurtful??
Digital citizenship Afaf AL Aker 9E. Acces Everyone uses the internet for many things, jobs, schools, malls, etc. Only of the 195 in the world have.
Professionalism/Customer Service in the Health Environment Communications and Professionalism This material Comp16_Unit9 was developed by The University.
Thursday 19 th November What is Fronter? How do we use it at West Pennard? Every child from Y2-6 has their own web space in Fronter. They can customise.
Web is public space. So, when we are connected to it we have to follow some rules. What is illegal Offline is illegal Online!!! Internet gives us opportunities.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
6/5/ SAI 2015 Superintendent– Mentor/Mentee Meeting Top 5 Legal Issues this Fall Matt Carver, J.D., Director of Legal Services tel
Component 16- Professionalism/Customer Service in the Health Environment Unit 9- Personal Communications and Professionalism This material was developed.
Court Systems and Practices. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. 2.
MY DIGITAL FOOTPRINT. WHAT IS A DIGITAL FOOTPRINT? Each time you log onto social media, you leave a trail behind you, mostly based on what you search.
© Childnet International 2008 Helping to keep your children safe online.
Technical Writing 2013 ► Unit #5. This week… ► ► Letters, Memos & s ► ► Social Media & web 2.0 apps ► ► Plain and Persuasive style.
Are there rules for blogging?. YES!!!!! What you need to know You have to know your school systems policies and procedures before you can begin a blog.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Databases vs the Internet. QUESTION: What is the main difference between using library databases and search engines? ANSWER: Databases are NOT the Internet.
The internet is an amazing resource. We can connect, communicate and be creative in a number of different ways, on a range of devices. However, the internet.
SOCIAL MEDIA’S IMPACT ON PERSONAL BRANDING WHY YOUR DIGITAL FOOTPRINT MATTERS Image retrieved from socialmediatoday.com Created by Nicole Gennarelli.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
TECHNICAL WRITING THIS WEEK… Plain and Persuasive style Letters, Memos & s Social Media & Web 2.0 apps.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
9.1 Audience Appreciation
MEMBERSHIP TRAINING SERIES Unit 2 – Public Relations and Marketing TRN102 Created by Mike Dutton, Massabesic District, Daniel Webster Council © 2014.
Social Media for Younger Members and New Generations BEN BURGER.
Ministry of Education & Religious Affairs, Culture & Civilisation Greek School Network nternet-safety.sch.gr.
Facing Facebook: The Reality of Life in a Virtual World Maria Mancusi, Janine Bowen, Courtney Dillon, Nelly Zorilla.
Lecture 3 1Norazirah Ayob, FEB. Ch  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received.
1 Scout Recruitment Public Relations versus Marketing G101 Created May 2014 Massabesic District – Daniel Webster Council.
St. Anne’s Baslow Online Safety Before we start… O Throughout this meeting I hope to provide information that you will find useful in keep your.
E-Safety A Guide for Parents and Carers. The Internet is great because…
Solihull online safety toolkit Using social media Dickens Heath Community Primary School 11 April 2016.
Alexander County Schools Review of Board of Education Policies Technology Responsible Use 3225/4312/7320 Internet Safety 3226/4205 Technology In The Educational.
E Safety – Managing your online presence
Acceptable Use Policy (Draft)
E-Safety Briefing
Sexting case study Every case is unique, taking risk factors into consideration to aid decision making. No clear definite answers but safeguarding the.
Digital Citizenship and Social Media
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
PREPARED BY: KAMELI BATIWETI
Social Media Safety.
Welcome to the E Safety Workshop
Social Media in Careers
Digital Identity Digital Identity is the concept of adopting an online presence or networked identity in cyberspace by an individual or an organization.
Presentation transcript:

LECTURE 14 ETHICS AND SOCIAL MEDIA

SOCIAL MEDIA: EXAMPLES OF ISSUES IN Privacy Property Teaching Friendship Etc Kai K. Kimppa 2

PRIVACY QUESTIONS DIFFERENT TO ’TRADITIONAL’ ISSUES ”Forgive and forget” does not exist any more. What was once on-line, can be found always (Blanchette & Johnson, 2002) Obligation to protect the future privacy interests of children/teens? (Bülow & Wester, 2011) Streisand effect (residence of the singer) Concept of privacy changing? Everyone makes mistakes No one is expected to be ’perfect’ Since what one has done is always available, one is expected to always be same? Kai K. Kimppa 3

EXPECTATIONS OF ON-LINE PRIVACY Can we expect to not be known? Writing to IRC, other chat, bulletin board or blog / news paper comments section, expecting to be ‘anonymous’ Is a ‘nick’ with no identifying information some sort of guarantee for anonymity? A lot of information available in many cases Searches to identify etc. Internet ‘discussions’ not similar to physical discussions, anyone can log them and find the information later People generally think that they have more privacy than they actually do On-line monitoring, “spyware”—one generally does not know when one is logged/monitored In (open) Blogs there can be no expectation of privacy – even if written with a ‘nick’ (Grodzinsky & Tavani, 2009) Kai K. Kimppa 4

PRIVACY IN SOMES Public and private blur – in SoMes it is difficult to control the audiences of ones posts (see e.g. Netchitailova, 2011 on Facebook). Most people just do not bother, but the added illusion of anonymity promotes writing things one would not divulge of one’s private life, say, in Blogs or similar. Also, some groups (such as children and/or elderly – for different reasons) have undue trust to hand over their private information to outsiders (See e.g. Chai et al., 2008). Pictures in SoMes? Does anyone ever ask whether the pictures they take can be published? Most often not. (Parrish, 2010, Cammozzo, 2011.) Typically, this not a problem, but what about, say the Arab Spring? How many have actually been killed due to having been identified from pictures? (on Iranian elections of 2009 and the following riots, see Parrish, Also see Asai, 2011 on Tunisia and Egypt.) Kai K. Kimppa 5

CHILDREN AND YOUNG PEOPLE Children’s privacy ‘Funny pictures’ parents put on a SoMe may come to light – we know how cruel children can be, and adults do not always think what they put on social media Vlogging (Ahmed, 2011a) as an example of potential privacy harm for children. Pictures/video breaching privacy can be uploaded easily enough – and distributed widely (see e.g. Khan, 2008 amongst others). Many younger users of SoMes are willing to trade a lot of their privacy for the (perceived) gains offered by SoMes They seem to be quite aware of the loss of privacy – and concerned. However, the perceived benefits override their concern for privacy; especially in the case of ‘heavy users’. (Gumbus, Grodzinsky & Lilley, 2010.) Kai K. Kimppa 6

PROPERTY (IMMATERIAL) Law We know what the law states – or do we? User Generated Content Relation to commercial content? What is legal and what is right do not always meet Basically all younger generation members have mixed or used copyright protected materials illegally (or at least without permission) Are we all criminals online? (Hielkema et al., unpublished) Kai K. Kimppa 7

WORK Workplace policies were primarily focused on and Internet usage while at work Now SoMes need to be taken into account as well Blurring of the line between work use and private use Lap-tops, corporate ’tax-phones’ (multi-media devices), etc. For high-end specialists – results what matters so ’waste-of-time’ argument irrelevant, unless clearly a problem Kai K. Kimppa

WORK Security question though; what work related info can be distributed in SoMes and what not? Corporate image vs. private/professional image Professionals need Internet presence – otherwise they do not exist in today’s work market… Positive Internet presence – how to do this whilst avoiding ”Streisand effect”? Be careful on what narrative bits you post in SoMes ’Professional brand’ (Gotterbarn, 2011, Mitra, 2011) Kai K. Kimppa