Social Networking Throughout The GenerationsUlistic Inc.
For many Social Networking is something new, I argue this and state Social Networking has been around forever. Communicating with colleagues, keeping in touch with friends and sharing useful information with those around us has been with us since the beginning of time.
Why is this something new?
A brief insight from a Queen's University FILM260 student about how human interaction is affected every day by technologies such as texting and facebook.
Social Networking Throughout The GenerationsUlistic Inc.
For many Social Networking is something new, I argue this and state Social Networking has been around forever. Communicating with colleagues, keeping in touch with friends and sharing useful information with those around us has been with us since the beginning of time.
Why is this something new?
A brief insight from a Queen's University FILM260 student about how human interaction is affected every day by technologies such as texting and facebook.
Is it possible to imagine a planet of connected loners? Is it possible for us to be together yet completely distant from one another? Are we building or breaking down our interpersonal relations, increasingly more frequent today via electronic interfaces? On the other hand, our society experiences a moment of transition, especially in the major cities, where more and more people are living by themselves.
In mid 2012 the highest court in Russia ruled against gay pride parades in Moscow for the next 100 years. In 2013 a federal bill banned the distribution of "propaganda of non-traditional sexual relations" to minors. Homophobia thrives not just at legal and political levels but is widespread among the general population; according to a 2013 survey 74% believe that homosexuality should not be accepted by society. As gay teens struggle to find support in public space they increasingly find affirmation online, in closed groups like Deti-404 (The Observer, 2013).
Meanwhile, Chelsea Manning, at the centre of a WikiLeaks scandal in 2010, has come out as transgender and has requested that ‘starting today you refer to me by my new name and use the feminine pronoun’ (press release, Aug 22, 2013). Chelsea Manning is currently serving 35 years in a male prison facility where she has been informed that the army will not support hormone therapy or sex-reassignment therapy.
As surveillance of everyday engagement online is increasingly acknowledged by government and private enterprise (including Google’s gmail service) and young people around the world are being alerted to the dangers of cyber-bullying and online predators, how are social perceptions of privacy and safety shifting? Is a closed group on ‘VK’ (the second biggest social network service in Europe, after Facebook) private enough to provide assurance to young queer Russians? Where will Chelsea seek affirmation with restricted online access in a male prison? Can the Dark Web provide an alternative for subaltern publics? Or does the technical expertise and tenacity required to access these spaces of supposedly amplified security make them unattainable for disenfranchised minorities?
This paper draws on current case studies to explore shifting understandings of privacy and networked identity work in cultures where public expression of queer sexuality remains taboo.
Running head: Social Media 5
Social Media
Thesis Statement
The emergence of social media has led to new perspective on the public domain about privacy issues: it has changed the debate about right to privacy.
Annotated Bibliography
Bauerlein, P. (2011). The Digital Divide: Arguments for and Against Facebook, Google, Texting, and the Age of Social Networking. New York: Penguin Group.
Having been a professor of communication, the author explores various arguments that are raised against and for the social media. The book will be instrumental in this research since it tackles the issues surrounding privacy apparent in the emerging age of social media. In particular, the first part of the book is dedicated in analyzing various aspects of privacy that the new media has touched on specifically, Facebook, Twitter and other platforms. The author also includes essays from various renowned authors such as Douglas Rushkoff as well as Todd Gitlin just to mention but two. The author also divides the book into various sections that will be very instrumental in unveiling the security and privacy issues raised by the book. For instance, the book has section name, ‘social and personal life’ that informs the research. In essence, the book is an important primary source of information that will help in approving or disapproving the thesis statement.
Bill, H., Reyns, W. & Fisher, B. (2011). Security in the 21st century: examining the link between online social network activity, privacy, and interpersonal victimization. Criminal Justice Review, 36(1),251-153.
This scholarly article is important and critical as a primary source of information since it synthesizes information from three acclaimed authors and professors. The authors attempt to establish a correlation between contemporary social networks with privacy. The journal also seeks to examine the link between the social networks with interpersonal victimization. Throughout the journal, it is apparent from the inferences made by the authors that there is exists a correlation between social media and the manner in which people perceive their security. As such, the book will not only provide insightful information about new social networking sites but also how they may affect the public perspectives on security. As the authors posit, the social media has also led to privacy issues that do not affect the physical domain of the users but have unprecedented impact on the emotional and psychological aspects of the users. To that end, the journal answers the question, ‘Does social media raise privacy issues especially in the wake of 21st century?’
Gleibs, H. (2014). Turning Virtual Public Spaces into Laboratories: Thoughts on Conducting Online Field Studies Using Social Network Sites. Analyses of Social Issues and Public Policy, 1(1), 1-19.
Gleibs is a renowned author in the field of interpersonal communication. In this journal that provides information not only to public but also shapes the publi.
The ethics of privacy in sharing culture 2016Zoetanya Sujon
Overview of research examining changing ideas and behaviours around privacy for 18-36 year old Londoners. This was work was presented at the ECREA 2016 conference.
Sociology of the Internet and New Media.pptxSandykaFundaa
• Social Construction of Technology,
• Digital inequalities – Digital Divide and Access,
• Economy of New Media - Intellectual value;
• digital media ethics,
• new media and popular culture.
Precision. Innovation. Professionalism.
These words are essential for Breavis core philosophy and its path to company’s success increasing over years. The company has always stayed true to its core values.
On November 27 “Conflict communications and information security” conference was held in Yerevan, IPSC Communications manager Shushan Harutyunyan was invited as a speaker to present a report on the theme of “Privacy and the right to be forgotten”.
Genetic Privacy
A challenge to Medico-Legal Norms
Graeme Laurie
(Cambridge university press)
Presentation by Shushan Harutyunyan
Human rights and Biopolitics, 31 October, 2012 CEU
Armenian media in numbers - general overview, Media legislation, Access to Information, Media influance, Media “in action” /beyond formal papers/, Armenian media under attack / violence against journalists, New Media & Citizen journalism in Armenia...
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
Privacy: why we should care
1. Privacy: why we should care?
Shushan Harutyunyan
October 2013
2. Who am I and why I’m speaking about
privacy?
http://about.me/shushan
3. What is Privacy?
Privacy is an expression of one’s personality or
individuals right to define his or her essence as
human being; individuals ability to regulate
information about themselves in order to control
their relationship with other individuals; essential
components of individuals life such as secrecy,
anonymity and solitude.
4. How we came to the idea of Privacy? Architecture!
The houses as interlocking suites
of rooms without corridors, so that
the only way of moving about was
by passing through other people’s
rooms.
Hogarth, Breakfast scene, 1745
Working class couples surround their
beds with curtains.
5. How we came to the idea of Privacy? “Morality”
Trials for noble adultery: the
need to escape for the prying
eyes and ears of the domestic
servants.
The key witnesses were always
servants, whose curiosity
clearly made sexual privacy
almost impossible for anyone
who wished to conduct a
discreet affair in their own
home.
London: A Poem. In Imitation of the third satire of juvenal,
Samuel Johnson, 1783
6. Why people need privacy?
Privacy is a social ritual by means of
which an individual’s moral title to his
existence is conferred.
Privacy is an essential part of the complex
social practice by means of which the
social group recognizes – and
communicates to the individual – that his
existence is his own. And this is a
precondition of personhood.
To be a person and individual must
recognize not just his actual capacity to
shape his destiny by his choices. He must
also recognize that he has an exclusive
right to shape his destiny.
Woman Standing In Front Of A Mirror-
1841, Christoffer Wilhelm-Eckersberg,
7. What it looks like the Privacy at the
age of Facebook!
Publicly mediated
intimacy?!
Broadcasting own
“bedroom”?
9. “So, what's the big deal? Sure, just a Facebook
photo, but…
Consider the reach of the
social network, others
beyond imagined audience
and circle of “friends” viewing
the photo and making
judgments.
Consider the fact, that what
goes on web stays there
forever (even if you delete it).
Consider that Internet has no
sense of time.
10. What we gain by compromising our privacy?
Facebook users possess an
illusionary control over the own
appearance when
communicating with outside
world through markers of
individuality such as the profile
picture, wall posts, private
information and so on.
Cesar Santos - "Intimacy" Oil on Canvas - 31.5x26.5
11. Where this leads us?
Social surveillance?
Self - censorship?
The right to be forgotten? (draft law EU commissioner)
Society where information is not currency anymore?
12. What I want you to take home today!
Think about the control over your self-presentation online!
Than check your Facebook profile, Google your name, think about
the sensitive messages you keep in your email.
Think about were you want to go
in your life and how your actions
online lead you towards your
desired destiny!
13. Sources and references
1. “A global Sense of Place”, Doreen Massey, 1994
2. We Media, How audiences are shaping the future of news and information, Shayne Bowman, Chris Willis and The Media Center at The American Press
Institute, 2003
3. Tim Berners-Lee (World Wide Web inventor) about Web 2.0, Wikipedia, 2012 http://en.wikipedia.org/wiki/Web_2.0
4. Facebook Statistics due to October 4, 2012, Official Facebook Newsroom http://newsroom.fb.com/Timeline
5. The Revolution Will be Networked. The Influence of Social Networking Sites on Political Attitudes and Behavior, Weiwu Zhang, Thomas J. Johnson,
Trent Seltzer,Shannon L. Bichard , Texas Tech University, 2009
6. Do social networks improve e-commerce?: a study on social marketplaces, Gayatri Swamynathan, Christo Wilson, Bryce Boe, Kevin Almeroth, Ben Y.
Zhao 2008, University of California at Santa Barbara, Santa Barbara, CA, USA
7. Social media changes the role of the journalist, Sonja Balci, 2012 http://sciencenordic.com/social-media-changes-role-journalist
8. Living online: The end of privacy? Alison George, 2006, New Scientist magazine
9. Examining priming and gender as a means to reduce risk in a social networking context: Can stories change disclosure and privacy setting use when
personal profiles are constructed? Amanda Nosko, Eileen Wood, Miranda Kenney, Karin Archer, Domenica De Pasquale, Seija Molema, Lucia
Zivcakova, "Computers in Human Behavior" Journal, 2012
10. “The History of Family, Sex and Marriage in x-1900 England”, Lawrence Stone, 1979
11. Privacy refers to the moral right of individuals to avoid intrusion into their personal affairs by third parties”(Chaffey 2009, p. 139).
12. Facebook & your privacy. Who sees your data on the biggest social network? Consumer Reports magazine: June 2012
http://www.consumerreports.org/cro/magazine/2012/06/facebook-your-privacy/index.htm
13. Social Networking and Online Privacy: Facebook Users’ Perceptions DEIRDRE O’BRIEN* AND ANN M. TORRES, Irish Journal of Management, 2012
14. How Much Data is Created Every Minute? Neil Spencer, 2012, Visual News http://www.visualnews.com/2012/06/19/how-much-data-created-every-
minute/
15. Effects of self-disclosure on relational intimacy in Facebook, Namkee Park, Borae Jin, Seung-A Annie Jin; 2011, Computers in Human Behavior
16. Exploring Privacy Management on Facebook: Motivations and Perceived Consequences of Voluntary Disclosure, Susan Waters - Department of
Communication and Journalism, Auburn University; James Ackerman - Department of Communication, Ozarks Technical Community College, 2011,
Journal of Computer-Mediated Communication
17. Facebook Sells More Access to Members, By Geofrey A. Fowler, 2012
http://online.wsj.com/article/SB10000872396390443862604578029450918199258.html
18. Facebook Help Center, Ads & Sponsored Stories, 2012 http://www.facebook.com/help/131834970288134/
19. Your Facebook Deactivated Friend or a Cloaked Spy, Shah Mahmood and Yvo Desmedt, 2012, University College London
20. What Your Facebook Photo Says About You... and Facebook, Margaret Rock, 2012, Mobiledia http://www.mobiledia.com/news/163978.html
21. Self-presentation and belonging on Facebook: How personality influences social media use and motivations, Gwendolyn Seidman, Psychology
Department, Albright College, 2012, Personality and Individual Differences Journal
privacy is not an absolute, but rather contextual and subjective, and the right to privacy is based on wide array of socially and culturally salient understandings of private spheres (Jeffrey H. Reiman, "Privacy, Intimacy and Personhood", Philosophy and Public Affairs 6 (1):26-44, 1976 )
The houses of sixteenth century were constructed as interlocking suites of rooms without corridors, so that the only way of moving about was by passing through other people’s rooms. And only in the late seventeenth century house plans did allocate space to corridors, which now allowed access without intruding upon privacy.
(Stone 1979, p 169). “The History of Family, Sex and Marriage in x-1900 England”
Living space had begun to grow less crowded and private. Single beds were adopted in monasteries and hospitals as a sanitary precaution; (cholera epidemic in Londin,1832)
Working class couples little by little secured their privacy by surrounding their bed with curtains.
According to Reiman , privacy is a social ritual by means of which an individual’s moral title to his existence is conferred. Privacy is an essential part of the complex social practice by means of which the social group recognizes – and communicates to the individual – that his existence is his own. And this is a precondition of personhood. To be a person and individual must recognize not just his actual capacity to shape his destiny by his choices. He must also recognize that he has an exclusive right to shape his destiny.
a private space, individuals naming and self-portrait could construct and maintain identity after which individuals could deliberately divulge something personal to another in public communication, and this is how the idea of privacy as a right was developed.
Every minute 684,478 Facebook users share pieces of content, and it is commonly known that photos, wallposts, comments are not a random snapshot of the reality of someone's life.
The ability to portray a self and the possession of self-images, which social network makes possible, is nothing but deliberately arranged presentation of how one would like to be remembered, how individual’s sense of his own importance would like to be maintained.