SlideShare a Scribd company logo
1 of 33
Social
Networking
Ethics in Information Technology
What is Social Networking Web Site?
Business Applications of Online Social Net
Social Networking Ethical Issues
Online Virtual World
Overview
What is Social Networking Web Site?
Business Applications of Online Social Net
Five new profiles are created every second
There are 83 million fake profiles
Photo uploads total 300 million per day
Average time spent per Facebook visit is 20 minutes
699 million people log onto Facebook daily, which represents a 26% increase from 2012
4.5 billion likes generated daily as of May 2013 which is a 67 percent increase from August
2012
Age 25 to 34, at 29.7% of users, is the most common age demographic
Facebook Facts
Social Network Advertising
Social Shopping Web Sites
Business Applications of Online Social Net
Direct Advertising
Advertising Using an Individual’s Network of Friends
Indirect Advertising Through Groups
Company-Owned Social Networking Web Site
Viral Marketing
Social Network Advertising
Direct Advertising
Advertising Using an
Individual’s Network of
Friends
Indirect Advertising
Through Groups
0
Company-Owned Social
Networking Web Site
Viral Marketing
Social Shopping Web Sites
Utilitarian Perspective
Fairness Perspective
Common Good Perspective
Virtue Perspective
Some Unavoidable Ethical Issues
Social Networking At Work Place
Decrease
Efficiency
Cyberbullying
Cyberbullying is the
use of the Internet
and related
technologies to
harm or harass other
people, in a
deliberate, repeate
d, and hostile
manner.
Cyberbullying is Defined in Legal Glossaries as
Statistics
Cyberbulling
Non Attacked
Attacked
Among 800 students
ages 13-17, about
43% had
experienced
cyberbullying
Result of Cyberbulling
Forms of Cyberbullying
 Threatening Messages
 Thousands Of Text Messages
 Impersonating The Victim And Sending Inappropriate
Messages To Others
 Stealing The Victim’s Password And Manipulating
 Posting Mean, Personal, Or False Information About The
Victim
It is the Adult Version of Cyberbullying
Cyberstalking
What Should We Do?
 Victims Should Send a Written Notice
 Evidence of All Contacts should be Saved.
 Inform Their ISP Provider.
 Speaking to Law Enforcement Officers.
 Never Agree to Meet With the Stalker to “Talk Things Out”
People who commit sex crimes, such as rape or child sexual
abuse, are commonly referred to as sexual
predators
Encounters with Sexual Predators
Parents and their children need to work together to
protect against online predators.
How to Avoid Sexual Predators activity?
Most social networking Web sites have policies against
uploading materials
But Policies do not stop all members from posting
inappropriate material
Uploading of Inappropriate Material
Online Virtual World
Avatars
Communication
Shopping and Office
Relationship
Promote events
Business
Avatar in Virtual World
Use Virtual Currency
Earn Virtual Money
Virtual Items
E-commerce
Avatar in Virtual World (cont.)
Trafficking In Actual Drugs or Stolen Credit Cards
Online Muggings and Sex Crimes
Cyber Harassment
Crime in Virtual Worlds
The New Media Consortium (NMC)
Media Grid’s Immersive Education Initiative
Rivers Run Red
Educational and Business Uses of
Virtual Worlds
Q&A

More Related Content

What's hot

What's hot (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Cyber Safe Parenting
Cyber Safe ParentingCyber Safe Parenting
Cyber Safe Parenting
 
Cyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigableCyberbullying presentation de jose_amigable
Cyberbullying presentation de jose_amigable
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
*Cyber bullying presentation*
*Cyber bullying presentation**Cyber bullying presentation*
*Cyber bullying presentation*
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Cyberbullying year7
Cyberbullying year7Cyberbullying year7
Cyberbullying year7
 
Internet safety tips for kids and teens
Internet safety tips for kids and teensInternet safety tips for kids and teens
Internet safety tips for kids and teens
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 

Viewers also liked

Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpointstanbridge
 
Impact of Information Technology on Productivity & Quality of Life
Impact of Information Technology on Productivity & Quality of LifeImpact of Information Technology on Productivity & Quality of Life
Impact of Information Technology on Productivity & Quality of LifeShibbir Shimanto
 
Overview of ethics and information technology
Overview of ethics and information technologyOverview of ethics and information technology
Overview of ethics and information technologySJBennett228
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1Nawanan Theera-Ampornpunt
 
Information Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingInformation Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingNawanan Theera-Ampornpunt
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacyGouthamXander
 
A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...Ukam John Victor
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Segurança, ética e privacidade da informação
Segurança, ética e privacidade da informaçãoSegurança, ética e privacidade da informação
Segurança, ética e privacidade da informaçãoDaiana de Ávila
 
Health Informatics
Health InformaticsHealth Informatics
Health InformaticsJulesykora
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n itamitmitkar
 

Viewers also liked (20)

Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
 
Impact of Information Technology on Productivity & Quality of Life
Impact of Information Technology on Productivity & Quality of LifeImpact of Information Technology on Productivity & Quality of Life
Impact of Information Technology on Productivity & Quality of Life
 
Ethic02
Ethic02Ethic02
Ethic02
 
Overview of ethics and information technology
Overview of ethics and information technologyOverview of ethics and information technology
Overview of ethics and information technology
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
 
Information Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingInformation Ethics and Clinical Decision Making
Information Ethics and Clinical Decision Making
 
Hi271 lacking in ethics pdf v3
Hi271 lacking in ethics pdf v3Hi271 lacking in ethics pdf v3
Hi271 lacking in ethics pdf v3
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Islamic ethics
Islamic ethicsIslamic ethics
Islamic ethics
 
Segurança, ética e privacidade da informação
Segurança, ética e privacidade da informaçãoSegurança, ética e privacidade da informação
Segurança, ética e privacidade da informação
 
Health Informatics
Health InformaticsHealth Informatics
Health Informatics
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
 
law and ethics
law and ethicslaw and ethics
law and ethics
 
Ethics in Islam
Ethics in IslamEthics in Islam
Ethics in Islam
 
Law and ethics
Law and ethicsLaw and ethics
Law and ethics
 

Similar to Social Networking (Ethics in Information Technology)

Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and postervictoriahoo
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threatsejhilbert
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineIRJET Journal
 
Jon Newman PRSARVA 5/19/10
Jon Newman PRSARVA 5/19/10Jon Newman PRSARVA 5/19/10
Jon Newman PRSARVA 5/19/10jonnewman12
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying21rahul1999
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxjaggernaoma
 
Users and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityUsers and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityDr. V Vorvoreanu
 
Impacts of Social Media
Impacts of Social MediaImpacts of Social Media
Impacts of Social MediaParamitaSaha11
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networksis20090
 
My Online Image
My Online ImageMy Online Image
My Online Imagealuthe
 

Similar to Social Networking (Ethics in Information Technology) (20)

Facebook
FacebookFacebook
Facebook
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
ES_ 6 Author-Shelina Rajawat
ES_ 6 Author-Shelina RajawatES_ 6 Author-Shelina Rajawat
ES_ 6 Author-Shelina Rajawat
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threats
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Jon Newman PRSARVA 5/19/10
Jon Newman PRSARVA 5/19/10Jon Newman PRSARVA 5/19/10
Jon Newman PRSARVA 5/19/10
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Social Media
Social MediaSocial Media
Social Media
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docx
 
Users and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityUsers and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & Security
 
Impacts of Social Media
Impacts of Social MediaImpacts of Social Media
Impacts of Social Media
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
 
My Online Image
My Online ImageMy Online Image
My Online Image
 

Recently uploaded

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 

Recently uploaded (20)

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 

Social Networking (Ethics in Information Technology)

Editor's Notes

  1. 1.A social networking Web site is a site whose purpose is to create an online communityof Internet users that enables members to break down barriers created by time, distance,and cultural differences.2. Facebook 1.5 Billion users, twitter 200 Million, myspace 50 million, linkedin 238 million; from wiki
  2. technisia
  3. technisia
  4. sources:facebook, emarketer, infodocket, cnn, allfacebook 2012, gizmodo
  5. Social network advertising involves the use of social networks to inform, promote, and communicate the benefits of products and services.Social network advertising has become big business in the United States, with 2009 ad spending on Facebook estimated to be $230 million, and ad spending on MySpace estimated to be $495 million.12
  6. 1.Direct advertising involves placing banner ads on a social networking Web site.2. An ad can either be displayed to each visitor to the Web site or, by using the information in user profiles
  7. 1.Companies can use social networking Web sites to advertise to an individual’s network of contacts2. This might be a spontaneous message sent by Jared, or Jared might be getting paid by an online promotion firm to send messages about certain products.3.unethicial
  8. Innovative companies are also making use of a new marketing technique by creating a group on a social networking Web site that interested users can join by becoming “fans.” These groups can quickly grow in terms of numbers of fans to become a very effective marketing tool for a company looking to market contests, promote new products, or simply increase brand awareness. In its ongoing fight for market share in the beverage industry, Coca-Cola has implemented a number of social networking initiatives to promote its brands.
  9. 1.Since its launch in February 20072. the Dell community has suggested 11,996 ideas and posted 84,851 comments; 3.Dell has implemented 350 customer-submitted ideas.18
  10. V1.iral marketing encourages individuals to pass along a marketing message to others2. as one person tells two people, each of those two people tell two or three more people, and
  11. Buzzillions Product review Web site that collects thousands of product reviews from the Web sites of various retailersCrowdstormShopping resource that aggregates product information from various online buyers guides, reviews, and blog postingsKaboodle Site where members can discover and recommend new products; get discounts; and locate bargainsOSOYOU UK-based social shopping site for women with an interest in fashion and beauty productsZEBO Site that allows members to create a personal profile about what they own, want, and love to shop for; members can check out one another’s profiles, provide
  12. MySpace, FaceBook, and other sites have been the scene of cyberbullying and online predation. But the same technology allows people to connect with others they might never have met and form meaningful relationships.Some people believe social networking sites offer the ultimate in egalitarianism. When we interact with others online, we have no real way of knowing whether they are white or black, male or female, fat or thin, young or old.Certainly, many people turn to social networking sites to connect with social groups that share their interests and values.What impact will digital media have on these virtues? What, for example, would honesty mean in the context of a world where people are represented by avatars?Utilitarian PerspectiveFairness PerspectiveCommon Good PerspectiveVirtue Perspective
  13. Cyberbullying is the use of the Internet and related technologies to harm or harass other people, in a deliberate, repeated, and hostile manner.
  14. According to recent survey among 800 students ages 13-17 , about 43% had experienced cyberbulling in the past year. Cyberbulling is more common among females and among 15-16 years old .
  15. Ryan Halligan, a 13-year-old boy in Vermont, committed suicide after bullying from his schoolmates and cyberbullying online. Megan Meier, a 13-year-old girl from Missouri, also committed suicide when she was harassed by a fictitious boy created by neighbors with whom she had had a falling out.
  16. Sending mean-spirited or threatening messages to the victimSending thousands of text messages to the victim’s cell phone Impersonating the victim and sending inappropriate messages to othersStealing the victim’s password and modifying his or her profile to include racist,homophobic, sexual, or other inappropriate data that offends others or attractsthe attention of undesirable peoplePosting mean, personal, or false information about the victim in the cyber-bully’s blog
  17. When the offender is known, victims should send the stalker a written notice that their contact is unwanted.Evidence of all contacts should be saved.Victims of cyber stalking should inform their ISP provider.Victims should consider speaking to law enforcement officers.Above all else, victims of cyberstalking should never agree to meet with the stalker to“talk things out.”
  18. Talk to your kidsUse parental control software Monitor your children's use of social networking sitesNever download images from an unknown source Never reveal personal information Never agree to meet someone
  19. Most websites do not have sufficient resources to review all material submitted for posting.In April 2008, six teenagers recorded their beating of 16-year old Victoria Lindsay and planned to post it on Myspace and Youtube.On May 20,2009, an organization group of users uploaded video clips of explicit adult content to Youtube. The clips were uploaded with no warning at all. Even worse, they were tagged with child friendly identities.
  20. An online virtual world is a computer-simulated world in which a visitor can move in three-dimensional space, communicate and interact with other visitors, and manipulate elements of the simulated world.
  21. A visitor to a virtual world represents him- or herself through an avatar. a character usually in the form of a human but sometimes in some other form.
  22. Communication: Avatars can typically communicate with each other via text chat or via voice using Voice over IPShopping and Office: shop, hold jobs, run for political office, develop relationships with other avatarsPromote events: promote events and hold them in the virtual worldBusiness: start up new businesses and create or purchase new entities
  23. Use virtual currency: use the virtual world’s currency to purchase goods and servicesEarn Virtual money: earn virtual world money by performing tasks in the virtual world. avatars can convert their virtual world money back into real dollars at whatever the going exchange rateVirtual items: Virtual world items may also be sold to other virtual world players for real world moneye-commerce: also support e-commerce and allow users to sell their own real productsMost virtual worlds have rules against offensive behavior in public, such as using racial slurs or performing overtly sexual actions. However, consenting adults can travel to private areas and engage in all sorts of socially unacceptable behavior
  24. Virtual worlds raise many interesting questions regarding what is a criminal act and whether law enforcement.Example:trafficking in actual drugs or stolen credit cardsonline muggings and sexual crimesCyberharrasmentIn The Sims Online, a number of players formed a “Sim Mafia” and attacked the avatars of unpopular players. The group would send a flood of insulting messages to the targeted character, then trash the target’s virtual property, and finally demand that the target delete his or her avatar from the game.A man playing the Lineage II online game was arrested by Japanese officials for using software to mug avatars and then sell the stolen virtual items for real money.A player of the online game MapleStory became so upset about her sudden divorce from her online husband that she logged onto the game with her virtual world husband’s ID and password and killed his avatar. The woman was arrested by Japanese police and jailed on suspicion of illegally accessing a computer and manipulating electronic data. Under Japanese law, she could be imprisoned up to five years or fined up to $5,000
  25. The New Media Consortium (NMC) is an international consortium of almost 300 organizations focused on exploring the use of new media and technologies to improve teaching, learning, and creative expression. The NMC attracts nearly 1,500 unique visitors to its Second Life campus each week. Princeton, Yale, the University of Southern California, Ball State, and New York University are just a few of the schools with a campus in Second LifeMedia Grid’s Immersive Education Initiative is an international collaboration of universities, research institutes, and companies to define and develop open standards, best practices, platforms, and game-based learning and training systems. Amherst College, Boston College, the City of Boston, Loyola Marymount University, Massachusetts Institute of Technology, and Seton Hall University are some of the members of the Media Grid.Members of the New Media Consortium and the Media Grid can conduct classes and meetings from within a growing number of virtual learning worlds.Second Life is used by the marketing firm Rivers Run Red as a virtual meeting place to display ads, posters, and other designs in three-dimensional settings for clients and partners around the world. Using virtual meeting space can cut weeks off the time that would be required to transport the actual materials back and forth for a real world meeting