SlideShare a Scribd company logo
1 of 50
BOOK CONTENTS
1 Introduction
2 The “Good Play”
Approach
3 Ethical Fault Lines in
the New Digital Media
4 Conclusion
CHAPTER CONTENTS
3 Ethical Fault Lines in the
New Digital Media
3.1 Identity
3.2 Privacy
3.3 Ownership & Authorship
3.4 Credibility
3.5 Participation
3.2 Privacy
Privacy in the Blogsphere
 Sofia is an 18-year-old freshman at
a small college.
 She has been keeping a blog on
LiveJournal for several years and
has continued to blog after she
enters college to keep her high
school friends informed of the ups
and downs of her new life at college.
(Carrie James et al., 2009, p. 33)
Privacy in the Blogsphere
 She also finds that writing is the
greatest way to think through
problems in her life and to express
her opinions in a free environment.
 The stresses of taking pre-med
courses, handling dorm life, and
making new friends are consistent
themes of Sofia’s blog at college, but
she also write about her dating and
intimate experiences. [Cultural?]
(Carrie James et al., 2009, pp. 33-
34)
Privacy in the Blogsphere
 Some aspects of her posts are
fictionalized, but Sofia has fun
writing, and judging by the
comments that her friends leave on
her blog, they seem to enjoy her
narratives.
 She has told only a couple of close
friends at college about her blog and
disguises the identities of her
crushes, hook-ups, and dates.
[Ethical& moral?](Carrie James et
al., 2009, p. 34)
Privacy in the Blogsphere
 Although she does refer to her
college by name, she writes under a
pseudonym and does not give many
details that would clearly identify her
as the author.
 Even if few random people happen
to cross her blog, she reflects they
probably would not be able to figure
out her real identity.
[Moral/ethical?] (Carrie James et
al., 2009, p. 34)
Privacy in the Blogsphere
 A local journalist who is writing a
story on blogging searches
LiveJournal for local college
students who actively maintain
blogs.
 Her search uncovers Sofia’s blog,
and because it is in the public
domain, the journalist fells free to
write about its content. (Carrie
James et al., 2009, p. 34)
Privacy in the Blogsphere
 After the story appears in the local
newspaper, Sofia is surprised to find
that students all over campus start
reading and commenting on her blog.
 Eventually, a few people are able to
piece together details from her posts
and expose Sofia as the author of the
blog.
 Some of her past romantic partners (?)
express anger and frustration because
comments that Sofia’s friends write on
the blog reveal their identities. (Carrie
James et al., 2009, p. 34)
Privacy in the Blogsphere
 Sofia feels blind-sided by this turn
of events.
 She never imagined that a
broader public would be reading
about her most intimate thoughts
and experiences.
Privacy: Questions
 Questions raised: What does it mean to manage
online privacy in an ethical manner?
 How do online spaces facilitate and undermine
ethical thinking about privacy?
 How much personal information is reasonable to
share online?
 Are young people who share personal experiences
online taking steps to protect their own and others’
identities, and are these steps sufficient?
 Is it reasonable for young people to expect a certain
measure of privacy when it comes to their online
lives?
 Who is at fault when an unintended audience can
read a young person’s revealing blog or MySpace
page? (Carrie James et al., 2009, pp. 34-35)
Privacy
Privacy, Offline, and Online
 Privacy refers to how a person’s personal data
and information about others are handled in
social contexts.
 Offline, privacy is generally understood to mean
the retention or concealment of personal
information, and in the US, it is framed as an
entitlement (Carrie James et al., 2009, p. 35).
 The private is kept to oneself or shared only with
close, trusted, face-to-face friends.
 The right to privacy is frequently invoked to
protect sensitive information (such as an
individual’s finances, medical history, and
intimate relations) from public view.
Privacy, Offline, and Online
 Modern privacy statutes in the US, which were
first advocated by Warren and Brandeis (1890)
in the late 19th century, reflect a desire to protect
individuals from exposure to the public through
the press and from unwarranted search and
surveillance by the state.
 The right to be “let alone” and the right of the
individual to maintain freedom from authoritative
institutions are the main concerns of current
legal statutes dealing with privacy offline.
 Because the new digital media allow personal
information to be shared with a broad public,
they are making privacy issues more salient and
at the same time altering conventional
understandings of privacy. (Carrie James et al.,
2009, p. 35)
Privacy, Offline, and Online
 Nonintervention by institutions is
still a concern and is perhaps
heightened by the new media.
 Yet, distinct properties of the
Internet bear on privacy in new
ways.
Privacy, Offline, and Online
 Boyd (2007) identifies 4 such properties,
including:
1. Persistence (what you post persists
indefinitely)
2. Searchability (you can search for anyone
and find their digital “body”)
3. Replicability (you can copy and paste
information from one context to another)
4. Invisible Audiences (you can never be
sure who your audience is). (Carrie
James et al., 2009, pp. 35-36)
Privacy, Offline, and Online
 Despite these features, many young
people share deeply personal information
with one another on sites such as
MySpace, LiveJournal, and Facebook, and
much of this information is (or easily can
become) accessible by a broad public.
 The sharing that is happening in these
spaces does not necessarily suggest that
youth do not value their own privacy or
respect others’ privacy, but it does suggest
that they understand privacy differently
than earlier generations did. (Carrie James
et al., 2009, p. 36)
Privacy, Offline, and Online
 To many young participants, privacy is not
about hiding personal information but
rather involves carefully managing its
disclosure—what is shared, how it is
presented, and who can access it.
 Online, young people are arguably creating
a Culture of Disclosure, meaning distinct
beliefs , norms, and practices that are
related to their online profiles and lives.
 This culture legitimates and guides young
people’s disclosure of personal information
for their intended audiences of peers.
(Carrie James et al., 2009, p. 36)
Privacy, Offline, and Online
 For example, on sites such as LiveJournal,
MySpace, and Facebook, a young person
carefully chooses which personal details to
disclose and how the public make use of
this information.
 Choices may be based on the norms of the
space (gleaned through studying the
disclosing patterns of their peers), personal
goals (to meet new friends, communicate
with offline friends, or form a fan group),
and beliefs (naïve or realistic) about a
potential audience. (Carrie James et al.,
2009, p. 36)
Privacy, Offline, and Online
 Online, a number of strategies—including
privacy settings, selective disclosure, code of
switching, and deception—are used by youth to
control the presentation of their identities and
thereby manage their privacy.
 Most social networking sites have privacy
settings that allows users to limit access to their
profiles to a narrow audience of confirmed
friends, and evidence suggests that many young
people use them.
 According to a recent Pew Internet and
American Life Project survey, 66% of
participants in teen social networking sites report
restricting access to their profiles in some way
(Lenhart and Madden 2007; Carrie James et al.,
2009, p. 37).
Privacy, Offline, and Online
 Participants can also use selective disclosure:
they fill out only a portion of the fields provided
by the site to indicate their personal information,
often omitting details like last name, city of
residence, and so on.
 In another strategy, users may have one social
networking profile to interact with friends and
another less detailed or partly fictitious profile to
interact with strangers.
 An educator with whom we spoke called this
practice Code Switching and noted that it
provides a sense of control by allowing people to
present different identities in different contexts.
(Carrie James et al., 2009, p. 37)
Privacy, Offline, and Online
 Finally, deception is a widely used practice for
enhancing online privacy.
 According to Pew, among teens whose profiles
are public, 46% say they give at least some
false information [?] (Lenhart and Madden 2007;
Carrie James et al., 2009, p. 37).
 Taken together, these privacy strategies can
produce either multiple identities or one
fragmented identity, both of which can preserve
a sense of privacy while still allowing for
disclosure and participation.
 The prevalence of privacy strategies suggest
that online privacy is being consciously
managed by many young people.
Privacy, Offline, and Online
 But this is only part of the story.
 Other evidence suggests that some
youth (and adults) fail to choose not
to use protection strategies.
 Pew reports that Internet users are
becoming more aware of their
“digital footprints” but that
surprisingly few of them use
strategies to limit access to their
information (Madden et al. 2007;
Carrie James et al., 2009, pp. 37-
38).
Privacy, Offline, and Online
 This laisser-faire approach to disclosure
can be interpreted in a number of ways,
ranging from carelessness to a conscious
(although fragile) set of assumptions and
norms about an audience.
 In managing their audiences, many young
people (perhaps naively or egocentrically)
assume that only invited friends will read
their profiles or blogs and the uninvited
(such as parents and teachers) will respect
their privacy and treat their online
expressions as if they were off limits, as a
hand-written journal would be. (Carrie
James et al., 2009, p. 38)
Privacy, Offline, and Online
 As Weber says (2006): “Public is the new
private: young people often realize that
their blogs and homepages are public and
accessible, but they trust that only their
peers are interested enough to view them.
 Adults are supposed to know where they
are not welcome and act accordingly.”
 Normative codes among youth participants
(for example, the belief that information
that us shared online should not be copied
and pasted into another context without
permission) may also contribute to lack of
use of privacy strategies. (Carrie James et
al., 2009, p. 38)
Privacy, Offline, and Online
 In out vignette, Sofia assumed that the
small circle of friends who knew about
her blog would not refer to it or paste
content from it onto their Facebook
pages.
 The conception of privacy here shifts
the responsibility for ethical
management of personal information
away from the writer to the audience,
the scale of which, whether
acknowledged or not, is often
inherently unknowable. (Carrie James
et al., 2009, p. 38)
The Promises on Online Privacy
 The online culture of disclosure holds
important promises for young people,
including empowerment of themselves and
others, the creation of communities of
support around shared struggles, and the
development od a broad ethical sense of
responsibility with respect to privacy.
 As noted in our treatment of identity
development above, online communities
are fertile spaces for identity development
because they encourage self-expression,
self-reflection, and feedback. (Carrie
James et al., 2009, pp. 38-39)
The Promises on Online Privacy
 Most relevant to privacy is how online
disclosure can be carried out (partially or
fully) anonymously and yield positive,
comforting, and even empowering
feedback.
 Young people can feel empowered by the
ability to tell their stories and reflect on
struggles in their lives online through blogs,
Facebook, and virtual worlds.
 Sofia found her voice as a writer through
her blog and gained insights into herself
and her relationships with others through
writing about them. (Carrie James et al.,
2009, p. 39)
The Promises on Online Privacy
 Positive feedback from her readers increased
her confidence and encouraged her to contribute
to write.
 Sofia’s blogging could open future doors for her
in journalism or fiction writing .
 Furthermore, Sofia’s reflections could inspire
other young women (especially women in
restrictive family or school situations) to express
themselves and their sexuality. [On immoral
ground?]
 Posting their stories and reflections in the digital
public, young women may unintentionally be
doing a kind of consciousness raising that is
similar to what second-wave feminists did
through print books in the 1960s. (Carrie James
et al., 2009, p. 39)
The Promises on Online Privacy
 Online disclosure of personal stories can also
yield support for troubled youth.
 Social networking sites such as MySpace and
Facebook invite young people to reveal private
aspects of themselves with strangers and build
communities around common struggles.
 Young people who are struggling with sensitive
issues can reach out anonymously to find
support for personal problems that they may fear
disclosing face to face, forming support groups
around issues such as how to reveal gay or
lesbian sexuality to families, cope with shyness,
and stop practicing self-injury (cutting). (Carrie
James et al., 2009, p. 39)
The Promises on Online Privacy
 Online disclosure of personal stories can also
yield support for troubled youth.
 Social networking sites such as MySpace and
Facebook invite young people to reveal private
aspects of themselves with strangers and build
communities around common struggles.
 Young people who are struggling with sensitive
issues can reach out anonymously to find
support for personal problems that they may fear
disclosing face to face, forming support groups
around issues such as how to reveal gay or
lesbian sexuality to families, cope with shyness,
and stop practicing self-injury (cutting). (Carrie
James et al., 2009, pp. 39-40)
The Promises on Online Privacy
 Practices that allow youth to present
fragmented identities (such as anonymous
participation, code switching, and
deception) can help youth build
communities of support while maintaining a
sense of control over sensitive information.
 A teen’s anonymous online journal about
his struggles to grow up in an alcoholic
family could become an important source
of comfort, support, and perhaps even
action for other young people in
comparable family situations. (Carrie
James et al., 2009, p. 40)
The Promises on Online Privacy
 Young people also use online communities to cope
with tragedies, as was demonstrated by the many
online memorials that were written after the 2007
shootings at Virginia Polytechnic Institute (Carrie
James et al., 2009, p. 40).
 A final promise of the Online Culture of Disclosure is
that some young people develop a genuine Ethics of
Privacy that helps them present themselves and
handle other people’s information in a considerate
and responsible way.
 Many youth who disclose personal information online
assume that their audience will behave responsibly.
 Such assumptions can be naïve and expose youth to
significant risks, but if made explicit, they could help
youth and online communities be guided by an
Ethics of Responsibility. (Carrie James et al., 2009,
p. 40)
The Perils of Online Privacy
 The potential perils of the Culture of Disclosure
are numerous.
 Youth can harm themselves and others by
failing to understand the persistence of,
searchability of, replicability of, and invisible
audiences for the information that they share
about themselves online.
 Deception that is intended to protect oneself can
also have unintended negative effects.
 The fragile assumptions that are made by young
people like Sofia about other bloggers and about
audiences for their online identities can cause
significant risks. (Carrie James et al., 2009, pp.
40-41)
The Perils of Online Privacy
 Sofia’s intended audience for her personal
reflections was her close friends.
 She assumes that others who came across her
blog would click the Back button out of respect
for her privacy. [Naivity both ways]
 This assumption was shattered when a journalist
wrote an article that placed Sofia and the people
about whom she wrote in an uncomfortable and
potentially damaging position.
 Even though she took some measures to control
her online identity, Sofia was caught off guard
and thrust into the public eye. (Carrie James et
al., 2009, p. 41)
The Perils of Online Privacy
 Sofia’s reputation as a friend, classmate, and
responsible writer was damaged by her failure to
consider fully the risks and responsibilities of
anonymous or selective disclosure in a digital
public.
 Furthermore, Sofia’s blog entries may have
harmed her subjects—the romantic partners and
friends about whom she wrote—in unpredictable
ways ranging from their reputations at school to
their future opportunities beyond it.
 Indeed, unwitting participants in the digital public
may be the most frequent victims of privacy
lapses. (Carrie James et al., 2009, p. 41)
The Perils of Online Privacy
 According to Boyd (2007), many young people develop
MySpace and Facebook profiles for other people so that they
can add those names to their own profiles and thus
exaggerate the extent of their offline popularity. [Popularity
must be sought in light of morality and ethics]
 Some young people are therefore yielding control over the
creation of their online identities to their friends, with little
understanding of the broader, potentially negative
consequences.
 A semifictionalized blog entry about a friend’s predilection for
shoplifting or a video from a party posted on YouTube can
negatively affect another person’s reputation and
opportunities for the indefinite future if accessed by
unintended viewers such as college admissions officers and
potential employers. (Carrie James et al., 2009, pp. 41-42)
The Perils of Online Privacy
 This risk of “collapse context” (Boyd & Heer
2006) is particularly worrisome in the social
networking environment.
 Even a nonincriminating photograph or
video of a young athlete stretching before a
track meet can have unforeseen negative
effects if it is posted online.
 Recently, a fan posted the photograph of
an attractive high school student on a
football message board, the photo was
discovered by a sports blogger with a wide
audience, and the image was spread
across the Internet. (Carrie James et al.,
2009, p. 42)
The Perils of Online Privacy
 Within days, a YouTube video showing the
student at a track meet was viewed over
150,000 times (Saslow 2007), and the student
was experiencing online harassment.
 This story suggests that a person’s identity,
reputation, and sense of safety in the world may
be increasingly beyond her control as the new
media permit rapid and widespread sharing of
information.
 This story also highlights the responsibilities that
young people have to one another to handle the
personal information and content they disclose
to each other online with care. (Carrie James et
al., 2009, p. 42)
The Perils of Online Privacy
 Overall, the Culture of Disclosure works if
all potential audiences operate with the
same Ethical Code regarding access and
use of the information that is available
online.
 The final privacy-related peril relates to
deception.
 If online deception is done to protect the
writer’s privacy, it is largely viewed as
proper and is even encouraged by many
parents. [One-way street? How about the
viewers? Is this ethical?] (Carrie James et
al., 2009, p. 42)
The Perils of Online Privacy
 According to this view, deception can
be a safe way to participate online. [In
itself & on the offset immoral &
unethical]
 The lack of face-to-face interaction
makes deception easier online than in
real life. [Deception by definition is
negative]
 Nevertheless, the line between benign
& malicious deception can be difficult
for young people to discern in
mediated spaces where outcomes are
not immediately clear. (Carrie James
et al., 2009, pp. 42-43)
The Perils of Online Privacy
 For example, pretending to be someone
you are not online (such as an expert in a
field, a potential friend, or a potential
romantic partner) can harm others, even if
the harms are distant or invisible to the
perpetrator (Silverstone 2007).
 Furthermore, as Boyd (2007) has
suggested, it is worth considering the
broader message that is being conveyed to
young people when they are encouraged to
misrepresent themselves online, even if it
is for safety’s sake. [Adults’ responsibility]
(Carrie James et al., 2009, p. 43)
The Perils of Online Privacy
 Decades ago, Bok (1979) argued that
profound societal harms—such as the
decline of pervasive trust—are
associated with habits of lying (Carrie
James et al., 2009, p. 43).
 The great potentials of the Internet
will not be realized if basic trust
cannot be forged among
participants (ibid.).
 Related to this is the unknowable
distance between a young person’s
online identity and an audience.
The Perils of Online Privacy
 This is a perilous feature of the new digital media
(Silverstone 2007) (Carrie James et al., 2009, p. 43).
 Privacy strategies such as code switching and deception
perpetuate the problem of unknowable social and
geographical distance between online participants.
 What results, according to Silverstone (2007, p. 172), is a
“polarization . . . . The unfamiliar is either pushed to a
point beyond strangeness, beyond humanity; or it is
drawn so close as to become indistinguishable from
ourselves” (Carrie James et al., 2009, p. 43).
 Both scenarios pose risks and set the stage for ethical
misconduct.
 For example, the Culture of Online Disclosure can cause
young people to form potentially dangerous
relationships with other users, as in cases of teen-adult
predator relationships (ibid.).
The Perils of Online Privacy
 At the same time, anonymity and
deception can reduce
accountability in online spaces
and lead to online aggression,
ranging from griefing (intentionally
irritating participants in an online
game or other community) to
anonymous death threats (as in
the attacks on blogger Kathy
Sierra) (Carrie James et al., 2009,
pp. 43-44).
The Ethics of Online Privacy
 An emergent Culture of Disclosure in the
new digital media holds both risks and
opportunities for young people.
 On the one hand, carefully managed and
informed sharing can inspire and empower
youth, build supportive communities for the
troubled, and encourage an ethics of
privacy in others.
 On the other hand, careless oversharing
can have long-term negative effects on
young people and the friends about whom
they write and whose online identities they
cocreate. (Carrie James et al., 2009, p.
44).
The Ethics of Online Privacy
 Deception for safety’s sake can also create
confusion and pose risks.
 The promises of the digital public can be
realized and the perils avoided, however, if
young people consider the implications of their
self-presentations in light of the properties of
persistence, searchability, replicability, and
invisible audiences (Boyd 2007) that
characterize the media.
 For Silverstone (2007, p. 172), “proper distance”
emerges from the “search for enough knowledge
and understanding of the other person or the
other culture to enable responsibility and care. . .
. We need to be close, but not too close,
distant, but not too distant” (Carrie James et al.,
2009, p. 44).
The Ethics of Online Privacy
 An integral part of this “proper distance” is
modulating the sharing of personal
information—preserving a sense of
individual privacy while maintaining
openness to community.
 Future studies are needed to confirm
revise hypotheses about digital youth’s
mental models of privacy.
 We need to understand the extent to which
their approaches are distinct from offline
models, consciously formed, and
considerate of the promises and risks of
engagement in the digital public. (Carrie
James et al., 2009, p. 44).
References
Geertz, Clifford. (1972). Interpretation of Culture. New
York: Basic Books.
Hall, G. S. (1904). Adolescence: Its Psychology and Its
Relations to Psychology, Anthropology,
Sociology, Sex, Crime, Religion and Education.
New York: Appleton.
James, Carrie, Davis, Katie, Flores,
Andrea, Francis, John, Pettingill, Linsay, Rundle,
Margaret, and Gardner, Howard. (2009). Young
People, Ethics, and the New Digital Media.
Cambridge, MA: The MIT Press.
References
Mead, G. H. (1934). Mind, Self,
and
Society, from the Standpoint of
a Social Behaviorist. Chicago:
University of Chicago Press.
Document File
Location File: ETHICS_JOURNALISM/YEM_ethical_fault_lines_PRIVACY_(L8).pptx
 Date: January 17, 2014
 Course: Journalistic Principles and Ethics (ENGL 34M)

More Related Content

What's hot

Performance and enactment of identity through facebook kodom &akele
Performance and enactment of identity through facebook   kodom &akelePerformance and enactment of identity through facebook   kodom &akele
Performance and enactment of identity through facebook kodom &akeleKurniawan Mishary
 
Young Adults And On Line Privacy
Young Adults And On Line PrivacyYoung Adults And On Line Privacy
Young Adults And On Line PrivacyRecrue
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009bermandry
 
communication and social media
communication and social mediacommunication and social media
communication and social mediaNagendrasahu6
 
Online persuasion and compliance
Online persuasion and complianceOnline persuasion and compliance
Online persuasion and complianceKrishna De
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Michelle Ferrier
 
MRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copyMRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copyNicolette Reyhani
 
Communicating across the Digital Divide
Communicating across the Digital DivideCommunicating across the Digital Divide
Communicating across the Digital DivideLloyd Brown
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safetyRay Brannon
 
Attachments 2010 11_10
Attachments 2010 11_10Attachments 2010 11_10
Attachments 2010 11_10João Grilo
 
Completed Portfolio for Linkedin
Completed Portfolio for LinkedinCompleted Portfolio for Linkedin
Completed Portfolio for LinkedinMatthew Darrington
 
Film 260 Flipbook - Social Media vs. Identity
Film 260 Flipbook - Social Media vs. Identity Film 260 Flipbook - Social Media vs. Identity
Film 260 Flipbook - Social Media vs. Identity Sylvia Michalski
 

What's hot (20)

Performance and enactment of identity through facebook kodom &akele
Performance and enactment of identity through facebook   kodom &akelePerformance and enactment of identity through facebook   kodom &akele
Performance and enactment of identity through facebook kodom &akele
 
Young Adults And On Line Privacy
Young Adults And On Line PrivacyYoung Adults And On Line Privacy
Young Adults And On Line Privacy
 
How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009How Our Kids Are Using the Internet in 2009
How Our Kids Are Using the Internet in 2009
 
Digital Tattoo for NITEP students
Digital Tattoo for NITEP studentsDigital Tattoo for NITEP students
Digital Tattoo for NITEP students
 
communication and social media
communication and social mediacommunication and social media
communication and social media
 
Digital Tattoo for Student Teachers
Digital Tattoo for Student TeachersDigital Tattoo for Student Teachers
Digital Tattoo for Student Teachers
 
Native youth
Native youthNative youth
Native youth
 
Online persuasion and compliance
Online persuasion and complianceOnline persuasion and compliance
Online persuasion and compliance
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
 
Privacy Paper
Privacy PaperPrivacy Paper
Privacy Paper
 
MRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copyMRP Research Proposal - N.Reyhani copy
MRP Research Proposal - N.Reyhani copy
 
Digital Tattoo for Parents
Digital Tattoo for ParentsDigital Tattoo for Parents
Digital Tattoo for Parents
 
Communicating across the Digital Divide
Communicating across the Digital DivideCommunicating across the Digital Divide
Communicating across the Digital Divide
 
Digital health and safety
Digital health and safetyDigital health and safety
Digital health and safety
 
Your Child's Digital Tattoo
Your Child's Digital TattooYour Child's Digital Tattoo
Your Child's Digital Tattoo
 
COMO Teen Tech Talk
COMO Teen Tech TalkCOMO Teen Tech Talk
COMO Teen Tech Talk
 
Attachments 2010 11_10
Attachments 2010 11_10Attachments 2010 11_10
Attachments 2010 11_10
 
Nov 02 2009
Nov 02 2009Nov 02 2009
Nov 02 2009
 
Completed Portfolio for Linkedin
Completed Portfolio for LinkedinCompleted Portfolio for Linkedin
Completed Portfolio for Linkedin
 
Film 260 Flipbook - Social Media vs. Identity
Film 260 Flipbook - Social Media vs. Identity Film 260 Flipbook - Social Media vs. Identity
Film 260 Flipbook - Social Media vs. Identity
 

Similar to L8 yem ethical fault lines privacy

Production report 3079506
Production report 3079506Production report 3079506
Production report 3079506tarabeeforth
 
Production Report Tara Beeforth
Production Report Tara BeeforthProduction Report Tara Beeforth
Production Report Tara Beeforthtarabeeforth
 
Thesis proposal v3
Thesis proposal v3Thesis proposal v3
Thesis proposal v3lroddesign
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingJulesGrace
 
Social Networking
Social NetworkingSocial Networking
Social Networkingguest1b0960
 
L7 yem ethical fault lines identity
L7 yem ethical fault lines identityL7 yem ethical fault lines identity
L7 yem ethical fault lines identityChormvirak Moulsem
 
Cyber reputation
Cyber reputationCyber reputation
Cyber reputationJoann Noel
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Social Media and Anonymity
Social Media and AnonymitySocial Media and Anonymity
Social Media and AnonymityPaul Honke
 
Preproc 03
Preproc 03Preproc 03
Preproc 03naeyam
 
Social Network Sites: identity performances and relational practices
Social Network Sites: identity performances and relational practicesSocial Network Sites: identity performances and relational practices
Social Network Sites: identity performances and relational practicesFrancesca Comunello
 
L11 yem ethical fault_lines_participation
L11 yem ethical fault_lines_participationL11 yem ethical fault_lines_participation
L11 yem ethical fault_lines_participationChormvirak Moulsem
 
Online and offline social networks --use of social networking sites by emergi...
Online and offline social networks --use of social networking sites by emergi...Online and offline social networks --use of social networking sites by emergi...
Online and offline social networks --use of social networking sites by emergi...Leung Man Yin Daniel
 
Attachments 2012 03_8
Attachments 2012 03_8Attachments 2012 03_8
Attachments 2012 03_8Stamatia4
 
Eng662 cyber culture_e_poster_dawnboyer
Eng662 cyber culture_e_poster_dawnboyerEng662 cyber culture_e_poster_dawnboyer
Eng662 cyber culture_e_poster_dawnboyerD Boyer Consulting
 

Similar to L8 yem ethical fault lines privacy (20)

L5 yem introduction
L5 yem introductionL5 yem introduction
L5 yem introduction
 
Production report 3079506
Production report 3079506Production report 3079506
Production report 3079506
 
Production Report Tara Beeforth
Production Report Tara BeeforthProduction Report Tara Beeforth
Production Report Tara Beeforth
 
Cms 298 chapter 2 pres
Cms 298 chapter 2 presCms 298 chapter 2 pres
Cms 298 chapter 2 pres
 
Thesis proposal v3
Thesis proposal v3Thesis proposal v3
Thesis proposal v3
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
L7 yem ethical fault lines identity
L7 yem ethical fault lines identityL7 yem ethical fault lines identity
L7 yem ethical fault lines identity
 
Cyber reputation
Cyber reputationCyber reputation
Cyber reputation
 
Gibbs 2011
Gibbs 2011Gibbs 2011
Gibbs 2011
 
Fys 5 pg paper
Fys 5 pg paperFys 5 pg paper
Fys 5 pg paper
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Social Media and Anonymity
Social Media and AnonymitySocial Media and Anonymity
Social Media and Anonymity
 
Preproc 03
Preproc 03Preproc 03
Preproc 03
 
L6 yem good play
L6 yem good playL6 yem good play
L6 yem good play
 
Social Network Sites: identity performances and relational practices
Social Network Sites: identity performances and relational practicesSocial Network Sites: identity performances and relational practices
Social Network Sites: identity performances and relational practices
 
L11 yem ethical fault_lines_participation
L11 yem ethical fault_lines_participationL11 yem ethical fault_lines_participation
L11 yem ethical fault_lines_participation
 
Online and offline social networks --use of social networking sites by emergi...
Online and offline social networks --use of social networking sites by emergi...Online and offline social networks --use of social networking sites by emergi...
Online and offline social networks --use of social networking sites by emergi...
 
Attachments 2012 03_8
Attachments 2012 03_8Attachments 2012 03_8
Attachments 2012 03_8
 
Eng662 cyber culture_e_poster_dawnboyer
Eng662 cyber culture_e_poster_dawnboyerEng662 cyber culture_e_poster_dawnboyer
Eng662 cyber culture_e_poster_dawnboyer
 

More from Chormvirak Moulsem

ការប្រឈមនៃការចំណាកស្រុករបស់ពលករខ្មែរទៅប្រទេសថៃ - Immigration of Cambodian to ...
ការប្រឈមនៃការចំណាកស្រុករបស់ពលករខ្មែរទៅប្រទេសថៃ - Immigration of Cambodian to ...ការប្រឈមនៃការចំណាកស្រុករបស់ពលករខ្មែរទៅប្រទេសថៃ - Immigration of Cambodian to ...
ការប្រឈមនៃការចំណាកស្រុករបស់ពលករខ្មែរទៅប្រទេសថៃ - Immigration of Cambodian to ...Chormvirak Moulsem
 
The 7 habits highly effective teens slide presentation for PUC student
The 7 habits highly effective teens slide presentation for PUC studentThe 7 habits highly effective teens slide presentation for PUC student
The 7 habits highly effective teens slide presentation for PUC studentChormvirak Moulsem
 
CSR of Bangkok Airways - International management
CSR of Bangkok Airways - International managementCSR of Bangkok Airways - International management
CSR of Bangkok Airways - International managementChormvirak Moulsem
 
Walmart Save the Day - Management of-change-presentation
Walmart Save the Day - Management of-change-presentationWalmart Save the Day - Management of-change-presentation
Walmart Save the Day - Management of-change-presentationChormvirak Moulsem
 
Kulen Mineral Water - NOW, EVERY CAMBODIAN CAN DRINK HEALTHY, NATURAL MINERAL...
Kulen Mineral Water - NOW, EVERY CAMBODIAN CAN DRINK HEALTHY, NATURAL MINERAL...Kulen Mineral Water - NOW, EVERY CAMBODIAN CAN DRINK HEALTHY, NATURAL MINERAL...
Kulen Mineral Water - NOW, EVERY CAMBODIAN CAN DRINK HEALTHY, NATURAL MINERAL...Chormvirak Moulsem
 
EVIAN mineral water Cambodia market analysis -
EVIAN mineral water Cambodia market analysis -EVIAN mineral water Cambodia market analysis -
EVIAN mineral water Cambodia market analysis -Chormvirak Moulsem
 
Comparative religion - Comparative of Judaism’s Fasting and Islamic’s Fasting
Comparative religion - Comparative of Judaism’s Fasting and Islamic’s FastingComparative religion - Comparative of Judaism’s Fasting and Islamic’s Fasting
Comparative religion - Comparative of Judaism’s Fasting and Islamic’s FastingChormvirak Moulsem
 
Tum teav-story-part-3-to-part - Comparative Tum Teav Presentation
Tum teav-story-part-3-to-part - Comparative Tum Teav PresentationTum teav-story-part-3-to-part - Comparative Tum Teav Presentation
Tum teav-story-part-3-to-part - Comparative Tum Teav PresentationChormvirak Moulsem
 
Interesting topics for research proposal on motivation without wasting time o...
Interesting topics for research proposal on motivation without wasting time o...Interesting topics for research proposal on motivation without wasting time o...
Interesting topics for research proposal on motivation without wasting time o...Chormvirak Moulsem
 
Employee motivation - Staff motivation
Employee motivation - Staff motivation Employee motivation - Staff motivation
Employee motivation - Staff motivation Chormvirak Moulsem
 
15 interesting dissertation topics on employee motivation
15 interesting dissertation topics on employee motivation15 interesting dissertation topics on employee motivation
15 interesting dissertation topics on employee motivationChormvirak Moulsem
 
Staff motivation - Employee motivation - A study on employees work motivation...
Staff motivation - Employee motivation - A study on employees work motivation...Staff motivation - Employee motivation - A study on employees work motivation...
Staff motivation - Employee motivation - A study on employees work motivation...Chormvirak Moulsem
 
Bachelor thesis employee motivation and performance - Staff motivation and pe...
Bachelor thesis employee motivation and performance - Staff motivation and pe...Bachelor thesis employee motivation and performance - Staff motivation and pe...
Bachelor thesis employee motivation and performance - Staff motivation and pe...Chormvirak Moulsem
 
Employee motivation and performance - Staff motivation
Employee motivation and performance - Staff motivation Employee motivation and performance - Staff motivation
Employee motivation and performance - Staff motivation Chormvirak Moulsem
 
Staff motivation - Employee motivation for Student BA, MBA, PHD
Staff motivation - Employee motivation for Student BA, MBA, PHDStaff motivation - Employee motivation for Student BA, MBA, PHD
Staff motivation - Employee motivation for Student BA, MBA, PHDChormvirak Moulsem
 
Culture - Cham People in Cambodia , Cham Culture Presentation.
Culture - Cham People in Cambodia , Cham Culture Presentation.Culture - Cham People in Cambodia , Cham Culture Presentation.
Culture - Cham People in Cambodia , Cham Culture Presentation.Chormvirak Moulsem
 
Cham handout - Chan People is always handout
Cham handout - Chan People is always handoutCham handout - Chan People is always handout
Cham handout - Chan People is always handoutChormvirak Moulsem
 

More from Chormvirak Moulsem (20)

Chormvirak photo
Chormvirak photoChormvirak photo
Chormvirak photo
 
ការប្រឈមនៃការចំណាកស្រុករបស់ពលករខ្មែរទៅប្រទេសថៃ - Immigration of Cambodian to ...
ការប្រឈមនៃការចំណាកស្រុករបស់ពលករខ្មែរទៅប្រទេសថៃ - Immigration of Cambodian to ...ការប្រឈមនៃការចំណាកស្រុករបស់ពលករខ្មែរទៅប្រទេសថៃ - Immigration of Cambodian to ...
ការប្រឈមនៃការចំណាកស្រុករបស់ពលករខ្មែរទៅប្រទេសថៃ - Immigration of Cambodian to ...
 
The 7 habits highly effective teens slide presentation for PUC student
The 7 habits highly effective teens slide presentation for PUC studentThe 7 habits highly effective teens slide presentation for PUC student
The 7 habits highly effective teens slide presentation for PUC student
 
CSR of Bangkok Airways - International management
CSR of Bangkok Airways - International managementCSR of Bangkok Airways - International management
CSR of Bangkok Airways - International management
 
Walmart Save the Day - Management of-change-presentation
Walmart Save the Day - Management of-change-presentationWalmart Save the Day - Management of-change-presentation
Walmart Save the Day - Management of-change-presentation
 
Kulen Mineral Water - NOW, EVERY CAMBODIAN CAN DRINK HEALTHY, NATURAL MINERAL...
Kulen Mineral Water - NOW, EVERY CAMBODIAN CAN DRINK HEALTHY, NATURAL MINERAL...Kulen Mineral Water - NOW, EVERY CAMBODIAN CAN DRINK HEALTHY, NATURAL MINERAL...
Kulen Mineral Water - NOW, EVERY CAMBODIAN CAN DRINK HEALTHY, NATURAL MINERAL...
 
EVIAN mineral water Cambodia market analysis -
EVIAN mineral water Cambodia market analysis -EVIAN mineral water Cambodia market analysis -
EVIAN mineral water Cambodia market analysis -
 
Group 3 fisheries resources
Group 3 fisheries resourcesGroup 3 fisheries resources
Group 3 fisheries resources
 
Judaism - Comparative Judaism
Judaism - Comparative JudaismJudaism - Comparative Judaism
Judaism - Comparative Judaism
 
Comparative religion - Comparative of Judaism’s Fasting and Islamic’s Fasting
Comparative religion - Comparative of Judaism’s Fasting and Islamic’s FastingComparative religion - Comparative of Judaism’s Fasting and Islamic’s Fasting
Comparative religion - Comparative of Judaism’s Fasting and Islamic’s Fasting
 
Tum teav-story-part-3-to-part - Comparative Tum Teav Presentation
Tum teav-story-part-3-to-part - Comparative Tum Teav PresentationTum teav-story-part-3-to-part - Comparative Tum Teav Presentation
Tum teav-story-part-3-to-part - Comparative Tum Teav Presentation
 
Interesting topics for research proposal on motivation without wasting time o...
Interesting topics for research proposal on motivation without wasting time o...Interesting topics for research proposal on motivation without wasting time o...
Interesting topics for research proposal on motivation without wasting time o...
 
Employee motivation - Staff motivation
Employee motivation - Staff motivation Employee motivation - Staff motivation
Employee motivation - Staff motivation
 
15 interesting dissertation topics on employee motivation
15 interesting dissertation topics on employee motivation15 interesting dissertation topics on employee motivation
15 interesting dissertation topics on employee motivation
 
Staff motivation - Employee motivation - A study on employees work motivation...
Staff motivation - Employee motivation - A study on employees work motivation...Staff motivation - Employee motivation - A study on employees work motivation...
Staff motivation - Employee motivation - A study on employees work motivation...
 
Bachelor thesis employee motivation and performance - Staff motivation and pe...
Bachelor thesis employee motivation and performance - Staff motivation and pe...Bachelor thesis employee motivation and performance - Staff motivation and pe...
Bachelor thesis employee motivation and performance - Staff motivation and pe...
 
Employee motivation and performance - Staff motivation
Employee motivation and performance - Staff motivation Employee motivation and performance - Staff motivation
Employee motivation and performance - Staff motivation
 
Staff motivation - Employee motivation for Student BA, MBA, PHD
Staff motivation - Employee motivation for Student BA, MBA, PHDStaff motivation - Employee motivation for Student BA, MBA, PHD
Staff motivation - Employee motivation for Student BA, MBA, PHD
 
Culture - Cham People in Cambodia , Cham Culture Presentation.
Culture - Cham People in Cambodia , Cham Culture Presentation.Culture - Cham People in Cambodia , Cham Culture Presentation.
Culture - Cham People in Cambodia , Cham Culture Presentation.
 
Cham handout - Chan People is always handout
Cham handout - Chan People is always handoutCham handout - Chan People is always handout
Cham handout - Chan People is always handout
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 

L8 yem ethical fault lines privacy

  • 1.
  • 2. BOOK CONTENTS 1 Introduction 2 The “Good Play” Approach 3 Ethical Fault Lines in the New Digital Media 4 Conclusion
  • 3. CHAPTER CONTENTS 3 Ethical Fault Lines in the New Digital Media 3.1 Identity 3.2 Privacy 3.3 Ownership & Authorship 3.4 Credibility 3.5 Participation
  • 4. 3.2 Privacy Privacy in the Blogsphere  Sofia is an 18-year-old freshman at a small college.  She has been keeping a blog on LiveJournal for several years and has continued to blog after she enters college to keep her high school friends informed of the ups and downs of her new life at college. (Carrie James et al., 2009, p. 33)
  • 5. Privacy in the Blogsphere  She also finds that writing is the greatest way to think through problems in her life and to express her opinions in a free environment.  The stresses of taking pre-med courses, handling dorm life, and making new friends are consistent themes of Sofia’s blog at college, but she also write about her dating and intimate experiences. [Cultural?] (Carrie James et al., 2009, pp. 33- 34)
  • 6. Privacy in the Blogsphere  Some aspects of her posts are fictionalized, but Sofia has fun writing, and judging by the comments that her friends leave on her blog, they seem to enjoy her narratives.  She has told only a couple of close friends at college about her blog and disguises the identities of her crushes, hook-ups, and dates. [Ethical& moral?](Carrie James et al., 2009, p. 34)
  • 7. Privacy in the Blogsphere  Although she does refer to her college by name, she writes under a pseudonym and does not give many details that would clearly identify her as the author.  Even if few random people happen to cross her blog, she reflects they probably would not be able to figure out her real identity. [Moral/ethical?] (Carrie James et al., 2009, p. 34)
  • 8. Privacy in the Blogsphere  A local journalist who is writing a story on blogging searches LiveJournal for local college students who actively maintain blogs.  Her search uncovers Sofia’s blog, and because it is in the public domain, the journalist fells free to write about its content. (Carrie James et al., 2009, p. 34)
  • 9. Privacy in the Blogsphere  After the story appears in the local newspaper, Sofia is surprised to find that students all over campus start reading and commenting on her blog.  Eventually, a few people are able to piece together details from her posts and expose Sofia as the author of the blog.  Some of her past romantic partners (?) express anger and frustration because comments that Sofia’s friends write on the blog reveal their identities. (Carrie James et al., 2009, p. 34)
  • 10. Privacy in the Blogsphere  Sofia feels blind-sided by this turn of events.  She never imagined that a broader public would be reading about her most intimate thoughts and experiences.
  • 11. Privacy: Questions  Questions raised: What does it mean to manage online privacy in an ethical manner?  How do online spaces facilitate and undermine ethical thinking about privacy?  How much personal information is reasonable to share online?  Are young people who share personal experiences online taking steps to protect their own and others’ identities, and are these steps sufficient?  Is it reasonable for young people to expect a certain measure of privacy when it comes to their online lives?  Who is at fault when an unintended audience can read a young person’s revealing blog or MySpace page? (Carrie James et al., 2009, pp. 34-35)
  • 12. Privacy Privacy, Offline, and Online  Privacy refers to how a person’s personal data and information about others are handled in social contexts.  Offline, privacy is generally understood to mean the retention or concealment of personal information, and in the US, it is framed as an entitlement (Carrie James et al., 2009, p. 35).  The private is kept to oneself or shared only with close, trusted, face-to-face friends.  The right to privacy is frequently invoked to protect sensitive information (such as an individual’s finances, medical history, and intimate relations) from public view.
  • 13. Privacy, Offline, and Online  Modern privacy statutes in the US, which were first advocated by Warren and Brandeis (1890) in the late 19th century, reflect a desire to protect individuals from exposure to the public through the press and from unwarranted search and surveillance by the state.  The right to be “let alone” and the right of the individual to maintain freedom from authoritative institutions are the main concerns of current legal statutes dealing with privacy offline.  Because the new digital media allow personal information to be shared with a broad public, they are making privacy issues more salient and at the same time altering conventional understandings of privacy. (Carrie James et al., 2009, p. 35)
  • 14. Privacy, Offline, and Online  Nonintervention by institutions is still a concern and is perhaps heightened by the new media.  Yet, distinct properties of the Internet bear on privacy in new ways.
  • 15. Privacy, Offline, and Online  Boyd (2007) identifies 4 such properties, including: 1. Persistence (what you post persists indefinitely) 2. Searchability (you can search for anyone and find their digital “body”) 3. Replicability (you can copy and paste information from one context to another) 4. Invisible Audiences (you can never be sure who your audience is). (Carrie James et al., 2009, pp. 35-36)
  • 16. Privacy, Offline, and Online  Despite these features, many young people share deeply personal information with one another on sites such as MySpace, LiveJournal, and Facebook, and much of this information is (or easily can become) accessible by a broad public.  The sharing that is happening in these spaces does not necessarily suggest that youth do not value their own privacy or respect others’ privacy, but it does suggest that they understand privacy differently than earlier generations did. (Carrie James et al., 2009, p. 36)
  • 17. Privacy, Offline, and Online  To many young participants, privacy is not about hiding personal information but rather involves carefully managing its disclosure—what is shared, how it is presented, and who can access it.  Online, young people are arguably creating a Culture of Disclosure, meaning distinct beliefs , norms, and practices that are related to their online profiles and lives.  This culture legitimates and guides young people’s disclosure of personal information for their intended audiences of peers. (Carrie James et al., 2009, p. 36)
  • 18. Privacy, Offline, and Online  For example, on sites such as LiveJournal, MySpace, and Facebook, a young person carefully chooses which personal details to disclose and how the public make use of this information.  Choices may be based on the norms of the space (gleaned through studying the disclosing patterns of their peers), personal goals (to meet new friends, communicate with offline friends, or form a fan group), and beliefs (naïve or realistic) about a potential audience. (Carrie James et al., 2009, p. 36)
  • 19. Privacy, Offline, and Online  Online, a number of strategies—including privacy settings, selective disclosure, code of switching, and deception—are used by youth to control the presentation of their identities and thereby manage their privacy.  Most social networking sites have privacy settings that allows users to limit access to their profiles to a narrow audience of confirmed friends, and evidence suggests that many young people use them.  According to a recent Pew Internet and American Life Project survey, 66% of participants in teen social networking sites report restricting access to their profiles in some way (Lenhart and Madden 2007; Carrie James et al., 2009, p. 37).
  • 20. Privacy, Offline, and Online  Participants can also use selective disclosure: they fill out only a portion of the fields provided by the site to indicate their personal information, often omitting details like last name, city of residence, and so on.  In another strategy, users may have one social networking profile to interact with friends and another less detailed or partly fictitious profile to interact with strangers.  An educator with whom we spoke called this practice Code Switching and noted that it provides a sense of control by allowing people to present different identities in different contexts. (Carrie James et al., 2009, p. 37)
  • 21. Privacy, Offline, and Online  Finally, deception is a widely used practice for enhancing online privacy.  According to Pew, among teens whose profiles are public, 46% say they give at least some false information [?] (Lenhart and Madden 2007; Carrie James et al., 2009, p. 37).  Taken together, these privacy strategies can produce either multiple identities or one fragmented identity, both of which can preserve a sense of privacy while still allowing for disclosure and participation.  The prevalence of privacy strategies suggest that online privacy is being consciously managed by many young people.
  • 22. Privacy, Offline, and Online  But this is only part of the story.  Other evidence suggests that some youth (and adults) fail to choose not to use protection strategies.  Pew reports that Internet users are becoming more aware of their “digital footprints” but that surprisingly few of them use strategies to limit access to their information (Madden et al. 2007; Carrie James et al., 2009, pp. 37- 38).
  • 23. Privacy, Offline, and Online  This laisser-faire approach to disclosure can be interpreted in a number of ways, ranging from carelessness to a conscious (although fragile) set of assumptions and norms about an audience.  In managing their audiences, many young people (perhaps naively or egocentrically) assume that only invited friends will read their profiles or blogs and the uninvited (such as parents and teachers) will respect their privacy and treat their online expressions as if they were off limits, as a hand-written journal would be. (Carrie James et al., 2009, p. 38)
  • 24. Privacy, Offline, and Online  As Weber says (2006): “Public is the new private: young people often realize that their blogs and homepages are public and accessible, but they trust that only their peers are interested enough to view them.  Adults are supposed to know where they are not welcome and act accordingly.”  Normative codes among youth participants (for example, the belief that information that us shared online should not be copied and pasted into another context without permission) may also contribute to lack of use of privacy strategies. (Carrie James et al., 2009, p. 38)
  • 25. Privacy, Offline, and Online  In out vignette, Sofia assumed that the small circle of friends who knew about her blog would not refer to it or paste content from it onto their Facebook pages.  The conception of privacy here shifts the responsibility for ethical management of personal information away from the writer to the audience, the scale of which, whether acknowledged or not, is often inherently unknowable. (Carrie James et al., 2009, p. 38)
  • 26. The Promises on Online Privacy  The online culture of disclosure holds important promises for young people, including empowerment of themselves and others, the creation of communities of support around shared struggles, and the development od a broad ethical sense of responsibility with respect to privacy.  As noted in our treatment of identity development above, online communities are fertile spaces for identity development because they encourage self-expression, self-reflection, and feedback. (Carrie James et al., 2009, pp. 38-39)
  • 27. The Promises on Online Privacy  Most relevant to privacy is how online disclosure can be carried out (partially or fully) anonymously and yield positive, comforting, and even empowering feedback.  Young people can feel empowered by the ability to tell their stories and reflect on struggles in their lives online through blogs, Facebook, and virtual worlds.  Sofia found her voice as a writer through her blog and gained insights into herself and her relationships with others through writing about them. (Carrie James et al., 2009, p. 39)
  • 28. The Promises on Online Privacy  Positive feedback from her readers increased her confidence and encouraged her to contribute to write.  Sofia’s blogging could open future doors for her in journalism or fiction writing .  Furthermore, Sofia’s reflections could inspire other young women (especially women in restrictive family or school situations) to express themselves and their sexuality. [On immoral ground?]  Posting their stories and reflections in the digital public, young women may unintentionally be doing a kind of consciousness raising that is similar to what second-wave feminists did through print books in the 1960s. (Carrie James et al., 2009, p. 39)
  • 29. The Promises on Online Privacy  Online disclosure of personal stories can also yield support for troubled youth.  Social networking sites such as MySpace and Facebook invite young people to reveal private aspects of themselves with strangers and build communities around common struggles.  Young people who are struggling with sensitive issues can reach out anonymously to find support for personal problems that they may fear disclosing face to face, forming support groups around issues such as how to reveal gay or lesbian sexuality to families, cope with shyness, and stop practicing self-injury (cutting). (Carrie James et al., 2009, p. 39)
  • 30. The Promises on Online Privacy  Online disclosure of personal stories can also yield support for troubled youth.  Social networking sites such as MySpace and Facebook invite young people to reveal private aspects of themselves with strangers and build communities around common struggles.  Young people who are struggling with sensitive issues can reach out anonymously to find support for personal problems that they may fear disclosing face to face, forming support groups around issues such as how to reveal gay or lesbian sexuality to families, cope with shyness, and stop practicing self-injury (cutting). (Carrie James et al., 2009, pp. 39-40)
  • 31. The Promises on Online Privacy  Practices that allow youth to present fragmented identities (such as anonymous participation, code switching, and deception) can help youth build communities of support while maintaining a sense of control over sensitive information.  A teen’s anonymous online journal about his struggles to grow up in an alcoholic family could become an important source of comfort, support, and perhaps even action for other young people in comparable family situations. (Carrie James et al., 2009, p. 40)
  • 32. The Promises on Online Privacy  Young people also use online communities to cope with tragedies, as was demonstrated by the many online memorials that were written after the 2007 shootings at Virginia Polytechnic Institute (Carrie James et al., 2009, p. 40).  A final promise of the Online Culture of Disclosure is that some young people develop a genuine Ethics of Privacy that helps them present themselves and handle other people’s information in a considerate and responsible way.  Many youth who disclose personal information online assume that their audience will behave responsibly.  Such assumptions can be naïve and expose youth to significant risks, but if made explicit, they could help youth and online communities be guided by an Ethics of Responsibility. (Carrie James et al., 2009, p. 40)
  • 33. The Perils of Online Privacy  The potential perils of the Culture of Disclosure are numerous.  Youth can harm themselves and others by failing to understand the persistence of, searchability of, replicability of, and invisible audiences for the information that they share about themselves online.  Deception that is intended to protect oneself can also have unintended negative effects.  The fragile assumptions that are made by young people like Sofia about other bloggers and about audiences for their online identities can cause significant risks. (Carrie James et al., 2009, pp. 40-41)
  • 34. The Perils of Online Privacy  Sofia’s intended audience for her personal reflections was her close friends.  She assumes that others who came across her blog would click the Back button out of respect for her privacy. [Naivity both ways]  This assumption was shattered when a journalist wrote an article that placed Sofia and the people about whom she wrote in an uncomfortable and potentially damaging position.  Even though she took some measures to control her online identity, Sofia was caught off guard and thrust into the public eye. (Carrie James et al., 2009, p. 41)
  • 35. The Perils of Online Privacy  Sofia’s reputation as a friend, classmate, and responsible writer was damaged by her failure to consider fully the risks and responsibilities of anonymous or selective disclosure in a digital public.  Furthermore, Sofia’s blog entries may have harmed her subjects—the romantic partners and friends about whom she wrote—in unpredictable ways ranging from their reputations at school to their future opportunities beyond it.  Indeed, unwitting participants in the digital public may be the most frequent victims of privacy lapses. (Carrie James et al., 2009, p. 41)
  • 36. The Perils of Online Privacy  According to Boyd (2007), many young people develop MySpace and Facebook profiles for other people so that they can add those names to their own profiles and thus exaggerate the extent of their offline popularity. [Popularity must be sought in light of morality and ethics]  Some young people are therefore yielding control over the creation of their online identities to their friends, with little understanding of the broader, potentially negative consequences.  A semifictionalized blog entry about a friend’s predilection for shoplifting or a video from a party posted on YouTube can negatively affect another person’s reputation and opportunities for the indefinite future if accessed by unintended viewers such as college admissions officers and potential employers. (Carrie James et al., 2009, pp. 41-42)
  • 37. The Perils of Online Privacy  This risk of “collapse context” (Boyd & Heer 2006) is particularly worrisome in the social networking environment.  Even a nonincriminating photograph or video of a young athlete stretching before a track meet can have unforeseen negative effects if it is posted online.  Recently, a fan posted the photograph of an attractive high school student on a football message board, the photo was discovered by a sports blogger with a wide audience, and the image was spread across the Internet. (Carrie James et al., 2009, p. 42)
  • 38. The Perils of Online Privacy  Within days, a YouTube video showing the student at a track meet was viewed over 150,000 times (Saslow 2007), and the student was experiencing online harassment.  This story suggests that a person’s identity, reputation, and sense of safety in the world may be increasingly beyond her control as the new media permit rapid and widespread sharing of information.  This story also highlights the responsibilities that young people have to one another to handle the personal information and content they disclose to each other online with care. (Carrie James et al., 2009, p. 42)
  • 39. The Perils of Online Privacy  Overall, the Culture of Disclosure works if all potential audiences operate with the same Ethical Code regarding access and use of the information that is available online.  The final privacy-related peril relates to deception.  If online deception is done to protect the writer’s privacy, it is largely viewed as proper and is even encouraged by many parents. [One-way street? How about the viewers? Is this ethical?] (Carrie James et al., 2009, p. 42)
  • 40. The Perils of Online Privacy  According to this view, deception can be a safe way to participate online. [In itself & on the offset immoral & unethical]  The lack of face-to-face interaction makes deception easier online than in real life. [Deception by definition is negative]  Nevertheless, the line between benign & malicious deception can be difficult for young people to discern in mediated spaces where outcomes are not immediately clear. (Carrie James et al., 2009, pp. 42-43)
  • 41. The Perils of Online Privacy  For example, pretending to be someone you are not online (such as an expert in a field, a potential friend, or a potential romantic partner) can harm others, even if the harms are distant or invisible to the perpetrator (Silverstone 2007).  Furthermore, as Boyd (2007) has suggested, it is worth considering the broader message that is being conveyed to young people when they are encouraged to misrepresent themselves online, even if it is for safety’s sake. [Adults’ responsibility] (Carrie James et al., 2009, p. 43)
  • 42. The Perils of Online Privacy  Decades ago, Bok (1979) argued that profound societal harms—such as the decline of pervasive trust—are associated with habits of lying (Carrie James et al., 2009, p. 43).  The great potentials of the Internet will not be realized if basic trust cannot be forged among participants (ibid.).  Related to this is the unknowable distance between a young person’s online identity and an audience.
  • 43. The Perils of Online Privacy  This is a perilous feature of the new digital media (Silverstone 2007) (Carrie James et al., 2009, p. 43).  Privacy strategies such as code switching and deception perpetuate the problem of unknowable social and geographical distance between online participants.  What results, according to Silverstone (2007, p. 172), is a “polarization . . . . The unfamiliar is either pushed to a point beyond strangeness, beyond humanity; or it is drawn so close as to become indistinguishable from ourselves” (Carrie James et al., 2009, p. 43).  Both scenarios pose risks and set the stage for ethical misconduct.  For example, the Culture of Online Disclosure can cause young people to form potentially dangerous relationships with other users, as in cases of teen-adult predator relationships (ibid.).
  • 44. The Perils of Online Privacy  At the same time, anonymity and deception can reduce accountability in online spaces and lead to online aggression, ranging from griefing (intentionally irritating participants in an online game or other community) to anonymous death threats (as in the attacks on blogger Kathy Sierra) (Carrie James et al., 2009, pp. 43-44).
  • 45. The Ethics of Online Privacy  An emergent Culture of Disclosure in the new digital media holds both risks and opportunities for young people.  On the one hand, carefully managed and informed sharing can inspire and empower youth, build supportive communities for the troubled, and encourage an ethics of privacy in others.  On the other hand, careless oversharing can have long-term negative effects on young people and the friends about whom they write and whose online identities they cocreate. (Carrie James et al., 2009, p. 44).
  • 46. The Ethics of Online Privacy  Deception for safety’s sake can also create confusion and pose risks.  The promises of the digital public can be realized and the perils avoided, however, if young people consider the implications of their self-presentations in light of the properties of persistence, searchability, replicability, and invisible audiences (Boyd 2007) that characterize the media.  For Silverstone (2007, p. 172), “proper distance” emerges from the “search for enough knowledge and understanding of the other person or the other culture to enable responsibility and care. . . . We need to be close, but not too close, distant, but not too distant” (Carrie James et al., 2009, p. 44).
  • 47. The Ethics of Online Privacy  An integral part of this “proper distance” is modulating the sharing of personal information—preserving a sense of individual privacy while maintaining openness to community.  Future studies are needed to confirm revise hypotheses about digital youth’s mental models of privacy.  We need to understand the extent to which their approaches are distinct from offline models, consciously formed, and considerate of the promises and risks of engagement in the digital public. (Carrie James et al., 2009, p. 44).
  • 48. References Geertz, Clifford. (1972). Interpretation of Culture. New York: Basic Books. Hall, G. S. (1904). Adolescence: Its Psychology and Its Relations to Psychology, Anthropology, Sociology, Sex, Crime, Religion and Education. New York: Appleton. James, Carrie, Davis, Katie, Flores, Andrea, Francis, John, Pettingill, Linsay, Rundle, Margaret, and Gardner, Howard. (2009). Young People, Ethics, and the New Digital Media. Cambridge, MA: The MIT Press.
  • 49. References Mead, G. H. (1934). Mind, Self, and Society, from the Standpoint of a Social Behaviorist. Chicago: University of Chicago Press.
  • 50. Document File Location File: ETHICS_JOURNALISM/YEM_ethical_fault_lines_PRIVACY_(L8).pptx  Date: January 17, 2014  Course: Journalistic Principles and Ethics (ENGL 34M)