SlideShare a Scribd company logo
1 of 3
Craft and support an argument identifying 2 “best practices” that
Module-2 Video Case Study (ISCS-570)Instructions:Read the information and watch the 2
videos below. As you watch the videos, consider the balance of a corporation’s right to use
information they collect (especially in exchange for free services) and an individual’s right
to privacy. Using what you’ve learned, do the following:Craft and support an argument
identifying 2 “best practices” that should apply universally to large technology companies in
protecting individual privacy rights.Additionally, identify the most egrigious technique by
either Facebook or Google (from the case study only) and explain why it constitutes a
serious individual privacy breach.Be sure to fully support your positions (in both parts A &
B) with at least 2 external sources (total) – these sources can be used to support either your
“best practices” argument or your “most egrigious” argument, but the textbook is not
considered an external source.Submission Instructions:Submit your answers/arguments in
a single MS Word document. Be sure to properly cite all sources and provide a
bibliography.Videos:1.)https://youtu.be/IWlyut4zsko2.https://youtu.be/V7M_FOhXXKMCa
se:In a 2010 interview, Mark Zuckerberg, the founder of Facebook, proclaimed that the “age
of privacy” had to come to an end. According to Zuckerberg, social norms had changed and
people were no longer worried about sharing their personal information with friends,
friends of friends, or even the entire Web. This view is in accordance with Facebook’s
broader goal, which is, according to Zuckerberg, to make the world a more open and
connected place. Supporters of Zuckerberg’s viewpoint, including fellow tech titan Google,
believe the 21st century is an age of “information exhibitionism,” a new era of openness and
transparency. However, times have changed, and there are growing calls to put new limits
on the personal information that Facebook, and Google, collect and provide to
advertisers.Facebook has a long history of invading the personal privacy of its users. In fact,
the very foundation of Facebook’s business model is to sell the personal private information
of its users to advertisers. In essence, Facebook is like any broadcast or cable television
service that uses entertainment to attract large audiences, and then once those audiences
are in place, to sell air time to advertisers in 30 to 60 second blocks. Of course, television
broadcasters do not have much if any personal information on their users, and in that sense
are much less of a privacy threat. Facebook, with over 2.9 billion users worldwide, clearly
attracts a huge audience.Although Facebook started out at Harvard and other campuses
with a simple privacy policy of not giving anyone except friends access to your profile, this
quickly changed as its founder Mark Zuckerberg realized the revenue-generating potential
of a social networking site open to the public.In 2007 Facebook introduced the Beacon
program, which was designed to broadcast users’ activities on participating websites to
their friends. Class-action suits followed. Facebook initially tried to mollify members by
making the program “opt in” but this policy change was discovered to be a sham, as
personal information continued to flow from Facebook to various websites. Facebook
finally terminated the Beacon program in 2009, and paid $9.5 million to settle the class-
action suits.In 2009, undeterred by the Beacon fiasco, Facebook unilaterally decided that it
would publish users’ basic personal information on the public Internet, andannounced that
whatever content users had contributed belonged to Facebook, and that its ownership of
that information never terminated. However, as with the Beacon program, Facebook’s
efforts to take permanent control of user information resulted in users joining online
resistance groups and it was ultimately forced to withdraw this policy as well. The
widespread user unrest prompted Facebook to propose a new Facebook Principles and
Statement of Rights and Responsibilities, which was approved by 75 percent of its
members, who voted in an online survey. However, the resulting privacy policy was so
complicated that many users preferred the default “share” setting to working through over
170 privacy options.In 2009, Facebook also introduced the Like button, and in 2010
extended it to thirdparty websites to alert Facebook users to their friends’ browsing and
purchases. In 2011, it began publicizing users’ “likes” of various advertisers’ products in
Sponsored Stories (i.e., advertisements) that included the users’ names and profile pictures
without their explicit consent, without paying them, and without giving them a way to opt
out. This resulted in yet another class-action lawsuit, which Facebook settled for $20 million
in June 2012. As part of the settlement, Facebook agreed to make it clear to users that
information like their names and profile pictures might be used in Sponsored Stories, and
also give users and parents of minor children greater control over how that personal
information is used.In 2011, Facebook enrolled all Facebook subscribers into its facial
recognition program without asking anyone. When a user uploaded photos, the software
recognized the faces, tagged them, and created a record of that person/photo. Later, users
could retrieve all photos containing an image of a specific friend. Any existing friend could
be tagged, and the software suggested the names of friends to tag when you upload the
photos. This too raised the privacy alarm, forcing Facebook to make it easier for users to opt
out. In 2021, Facebook finally terminated the program after years of privacy concerns about
it.In 2012, Facebook went public, creating more pressure on it to increase revenues and
profits to justify its stock market value. Shortly thereafter, Facebook announced that it was
launching a mobile advertising product that would push ads to the mobile News Feeds of
users based on the apps they used through the Facebook Connect feature, without explicit
permission from the user to do so. It also announced Facebook Exchange (also known as
FBX), an advertising platform that allows advertisers to serve ads to Facebook users based
on their browsing activity while not on Facebook.In 2018 and 2019 Facebook’s reputation
for invading the personal privacy of its users took a turn for the worse when it was revealed
that it had lost control of personal information on 87 million users to agents of the Russian
government who had been able to use fake accounts and apps to target political ads
designed to sway the 2016 presidential election. The Russian agents used 75,000 fake
accounts, and 230,00 bots to send political messages to an estimated 146 million U.S.
Facebook users. Facebook also revealed it had shared personal data with 60 device makers
of smartphones and TVs, and to large advertisers like Nissan Motors. In 2019 a Wall Street
Journal investigation found that eleven out of the top fifty Facebook apps were sharing data
they collect with Facebook. Most of these apps involved health, fitness, and real estate data.
In response, the app developers stopped sharing sensitive personal data with Facebook, and
Facebook itself contacted large developers and advertisers and reminded them Facebook’s
policy prohibits sharing any sensitive information with Facebook’s servers.It isn’t just
Facebook that allows app developers to share personal information with online ad
platforms like Google. Facebook announced that this was “industry standard practice.” But
clearly, Facebook’s ability to effectively monitor and police exactly what information apps
and advertisers share with Facebook’s SDK (software development kit) is limited, at best,
and at worst, not possible given the scale of Facebook’s platform, which is the most widely
used app platform on the Internet with tens of thousands of app developers and
advertisers.Not to be outdone, Google has also taken liberties with user personal
information, with services like Google Street View taking pictures of neighborhoods, houses
and driveways, without consent; advertisements served using the content of Gmail
messages (though Google claims the content is anonymized), and pervasive tracking cookies
following users across the Internet. Echoing Mark Zuckerberg, Google CEO Eric Schmidt has
stated that “true transparency and no anonymity” is the best policy for Internet
users.Textbook link below (not to be used as a reference for this assignment per what
instructor noted above)https://drive.google.com/file/d/19cxt3pMvrETe6MHwj…
(https://drive.google.com/file/d/19cxt3pMvrETe6MHwj…)

More Related Content

Similar to Craft and support an argument identifying 2 that.docx

Face book It's About The Money
Face book It's About The MoneyFace book It's About The Money
Face book It's About The MoneyZulkifflee Sofee
 
Facebook dilemma presentation
Facebook dilemma presentationFacebook dilemma presentation
Facebook dilemma presentationdarioyunes
 
Facebook dilemma
Facebook dilemmaFacebook dilemma
Facebook dilemmappimentel4
 
Case of Face Book MIS Presentation
Case of Face Book MIS PresentationCase of Face Book MIS Presentation
Case of Face Book MIS PresentationTomasEMartinez
 
Mis, facebook case
Mis, facebook caseMis, facebook case
Mis, facebook caseTomasEMartinez
 
Facebook's dilemma case study
Facebook's dilemma case studyFacebook's dilemma case study
Facebook's dilemma case studyKarla Pappa
 
Mis, facebook case
Mis, facebook caseMis, facebook case
Mis, facebook caseJuanGuiliani
 
Mis, facebook case
Mis, facebook caseMis, facebook case
Mis, facebook caseJuanGuiliani
 
Mis, facebook case
Mis, facebook caseMis, facebook case
Mis, facebook caseJuanGuiliani
 
Mis, facebook case
Mis, facebook caseMis, facebook case
Mis, facebook caseJuanGuiliani
 
Facebook It’s About the Money Source Laudon, KC & Laudon.docx
Facebook  It’s About the Money Source  Laudon, KC & Laudon.docxFacebook  It’s About the Money Source  Laudon, KC & Laudon.docx
Facebook It’s About the Money Source Laudon, KC & Laudon.docxmydrynan
 
MS&L Facebook & Privacy
MS&L Facebook & PrivacyMS&L Facebook & Privacy
MS&L Facebook & PrivacyMS&L
 
social-networking sites
social-networking sites
social-networking sites
social-networking sites puffyarson5604
 
Sponsored Stories: Advertising Gets Social
Sponsored Stories: Advertising Gets SocialSponsored Stories: Advertising Gets Social
Sponsored Stories: Advertising Gets SocialMindshare
 
A Brief History of Facebook Controversies
A Brief History of Facebook ControversiesA Brief History of Facebook Controversies
A Brief History of Facebook ControversiesInternet Law Center
 

Similar to Craft and support an argument identifying 2 that.docx (20)

Face book slide
Face book slide Face book slide
Face book slide
 
Face book slide cmf
Face book slide cmfFace book slide cmf
Face book slide cmf
 
Face book It's About The Money
Face book It's About The MoneyFace book It's About The Money
Face book It's About The Money
 
Assignmet on facebook
Assignmet on facebookAssignmet on facebook
Assignmet on facebook
 
Facebook dilemma (1)
Facebook dilemma (1)Facebook dilemma (1)
Facebook dilemma (1)
 
Facebook dilemma presentation
Facebook dilemma presentationFacebook dilemma presentation
Facebook dilemma presentation
 
Facebook dilemma
Facebook dilemmaFacebook dilemma
Facebook dilemma
 
Case of Face Book MIS Presentation
Case of Face Book MIS PresentationCase of Face Book MIS Presentation
Case of Face Book MIS Presentation
 
Mis, facebook case
Mis, facebook caseMis, facebook case
Mis, facebook case
 
Facebook's dilemma case study
Facebook's dilemma case studyFacebook's dilemma case study
Facebook's dilemma case study
 
MIS, facebook case
MIS, facebook caseMIS, facebook case
MIS, facebook case
 
Mis, facebook case
Mis, facebook caseMis, facebook case
Mis, facebook case
 
Mis, facebook case
Mis, facebook caseMis, facebook case
Mis, facebook case
 
Mis, facebook case
Mis, facebook caseMis, facebook case
Mis, facebook case
 
Mis, facebook case
Mis, facebook caseMis, facebook case
Mis, facebook case
 
Facebook It’s About the Money Source Laudon, KC & Laudon.docx
Facebook  It’s About the Money Source  Laudon, KC & Laudon.docxFacebook  It’s About the Money Source  Laudon, KC & Laudon.docx
Facebook It’s About the Money Source Laudon, KC & Laudon.docx
 
MS&L Facebook & Privacy
MS&L Facebook & PrivacyMS&L Facebook & Privacy
MS&L Facebook & Privacy
 
social-networking sites
social-networking sites
social-networking sites
social-networking sites
 
Sponsored Stories: Advertising Gets Social
Sponsored Stories: Advertising Gets SocialSponsored Stories: Advertising Gets Social
Sponsored Stories: Advertising Gets Social
 
A Brief History of Facebook Controversies
A Brief History of Facebook ControversiesA Brief History of Facebook Controversies
A Brief History of Facebook Controversies
 

More from write22

Utilizing research software can be daunting for a What.docx
Utilizing research software can be daunting for a What.docxUtilizing research software can be daunting for a What.docx
Utilizing research software can be daunting for a What.docxwrite22
 
To Prepare Reflect on your own community and consider the.docx
To Prepare Reflect on your own community and consider the.docxTo Prepare Reflect on your own community and consider the.docx
To Prepare Reflect on your own community and consider the.docxwrite22
 
Watch this video about Joseph concept of Creative.docx
Watch this video about Joseph concept of Creative.docxWatch this video about Joseph concept of Creative.docx
Watch this video about Joseph concept of Creative.docxwrite22
 
write a 700 word psychoanalytic criticism research about the.docx
write a 700 word psychoanalytic criticism research about the.docxwrite a 700 word psychoanalytic criticism research about the.docx
write a 700 word psychoanalytic criticism research about the.docxwrite22
 
You have had the opportunity to review thermoregulation as is.docx
You have had the opportunity to review thermoregulation as is.docxYou have had the opportunity to review thermoregulation as is.docx
You have had the opportunity to review thermoregulation as is.docxwrite22
 
Write 300 words in MLA Nietzsche claims God.docx
Write 300 words in MLA Nietzsche claims God.docxWrite 300 words in MLA Nietzsche claims God.docx
Write 300 words in MLA Nietzsche claims God.docxwrite22
 
Write 300 words in MLA choose one topic.docx
Write 300 words in MLA choose one topic.docxWrite 300 words in MLA choose one topic.docx
Write 300 words in MLA choose one topic.docxwrite22
 
Week 9 Assignment 2 Case Total Quality.docx
Week 9 Assignment 2 Case Total Quality.docxWeek 9 Assignment 2 Case Total Quality.docx
Week 9 Assignment 2 Case Total Quality.docxwrite22
 
What were American and British strategies for winning the.docx
What were American and British strategies for winning the.docxWhat were American and British strategies for winning the.docx
What were American and British strategies for winning the.docxwrite22
 
What is the process involving movement of mantle rock that.docx
What is the process involving movement of mantle rock that.docxWhat is the process involving movement of mantle rock that.docx
What is the process involving movement of mantle rock that.docxwrite22
 
Unit Learning Outcomes ULO Explain job and.docx
Unit Learning Outcomes ULO Explain job and.docxUnit Learning Outcomes ULO Explain job and.docx
Unit Learning Outcomes ULO Explain job and.docxwrite22
 
Timeline of events what was happening that was important.docx
Timeline of events what was happening that was important.docxTimeline of events what was happening that was important.docx
Timeline of events what was happening that was important.docxwrite22
 
To what degree did the emergence of a large union.docx
To what degree did the emergence of a large union.docxTo what degree did the emergence of a large union.docx
To what degree did the emergence of a large union.docxwrite22
 
This you will begin to synthesize the information you.docx
This you will begin to synthesize the information you.docxThis you will begin to synthesize the information you.docx
This you will begin to synthesize the information you.docxwrite22
 
This is for Understanding the behavior of infection.docx
This is for Understanding the behavior of infection.docxThis is for Understanding the behavior of infection.docx
This is for Understanding the behavior of infection.docxwrite22
 
The use of devices within information technology has increased exponentially....
The use of devices within information technology has increased exponentially....The use of devices within information technology has increased exponentially....
The use of devices within information technology has increased exponentially....write22
 
Steven Smith was employed by the Avon School District as.docx
Steven Smith was employed by the Avon School District as.docxSteven Smith was employed by the Avon School District as.docx
Steven Smith was employed by the Avon School District as.docxwrite22
 
Students will assume the situation of an individual with.docx
Students will assume the situation of an individual with.docxStudents will assume the situation of an individual with.docx
Students will assume the situation of an individual with.docxwrite22
 
The company that all students will use for their final.docx
The company that all students will use for their final.docxThe company that all students will use for their final.docx
The company that all students will use for their final.docxwrite22
 
the following critical elements must be Lens.docx
the following critical elements must be Lens.docxthe following critical elements must be Lens.docx
the following critical elements must be Lens.docxwrite22
 

More from write22 (20)

Utilizing research software can be daunting for a What.docx
Utilizing research software can be daunting for a What.docxUtilizing research software can be daunting for a What.docx
Utilizing research software can be daunting for a What.docx
 
To Prepare Reflect on your own community and consider the.docx
To Prepare Reflect on your own community and consider the.docxTo Prepare Reflect on your own community and consider the.docx
To Prepare Reflect on your own community and consider the.docx
 
Watch this video about Joseph concept of Creative.docx
Watch this video about Joseph concept of Creative.docxWatch this video about Joseph concept of Creative.docx
Watch this video about Joseph concept of Creative.docx
 
write a 700 word psychoanalytic criticism research about the.docx
write a 700 word psychoanalytic criticism research about the.docxwrite a 700 word psychoanalytic criticism research about the.docx
write a 700 word psychoanalytic criticism research about the.docx
 
You have had the opportunity to review thermoregulation as is.docx
You have had the opportunity to review thermoregulation as is.docxYou have had the opportunity to review thermoregulation as is.docx
You have had the opportunity to review thermoregulation as is.docx
 
Write 300 words in MLA Nietzsche claims God.docx
Write 300 words in MLA Nietzsche claims God.docxWrite 300 words in MLA Nietzsche claims God.docx
Write 300 words in MLA Nietzsche claims God.docx
 
Write 300 words in MLA choose one topic.docx
Write 300 words in MLA choose one topic.docxWrite 300 words in MLA choose one topic.docx
Write 300 words in MLA choose one topic.docx
 
Week 9 Assignment 2 Case Total Quality.docx
Week 9 Assignment 2 Case Total Quality.docxWeek 9 Assignment 2 Case Total Quality.docx
Week 9 Assignment 2 Case Total Quality.docx
 
What were American and British strategies for winning the.docx
What were American and British strategies for winning the.docxWhat were American and British strategies for winning the.docx
What were American and British strategies for winning the.docx
 
What is the process involving movement of mantle rock that.docx
What is the process involving movement of mantle rock that.docxWhat is the process involving movement of mantle rock that.docx
What is the process involving movement of mantle rock that.docx
 
Unit Learning Outcomes ULO Explain job and.docx
Unit Learning Outcomes ULO Explain job and.docxUnit Learning Outcomes ULO Explain job and.docx
Unit Learning Outcomes ULO Explain job and.docx
 
Timeline of events what was happening that was important.docx
Timeline of events what was happening that was important.docxTimeline of events what was happening that was important.docx
Timeline of events what was happening that was important.docx
 
To what degree did the emergence of a large union.docx
To what degree did the emergence of a large union.docxTo what degree did the emergence of a large union.docx
To what degree did the emergence of a large union.docx
 
This you will begin to synthesize the information you.docx
This you will begin to synthesize the information you.docxThis you will begin to synthesize the information you.docx
This you will begin to synthesize the information you.docx
 
This is for Understanding the behavior of infection.docx
This is for Understanding the behavior of infection.docxThis is for Understanding the behavior of infection.docx
This is for Understanding the behavior of infection.docx
 
The use of devices within information technology has increased exponentially....
The use of devices within information technology has increased exponentially....The use of devices within information technology has increased exponentially....
The use of devices within information technology has increased exponentially....
 
Steven Smith was employed by the Avon School District as.docx
Steven Smith was employed by the Avon School District as.docxSteven Smith was employed by the Avon School District as.docx
Steven Smith was employed by the Avon School District as.docx
 
Students will assume the situation of an individual with.docx
Students will assume the situation of an individual with.docxStudents will assume the situation of an individual with.docx
Students will assume the situation of an individual with.docx
 
The company that all students will use for their final.docx
The company that all students will use for their final.docxThe company that all students will use for their final.docx
The company that all students will use for their final.docx
 
the following critical elements must be Lens.docx
the following critical elements must be Lens.docxthe following critical elements must be Lens.docx
the following critical elements must be Lens.docx
 

Recently uploaded

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

Craft and support an argument identifying 2 that.docx

  • 1. Craft and support an argument identifying 2 “best practices” that Module-2 Video Case Study (ISCS-570)Instructions:Read the information and watch the 2 videos below. As you watch the videos, consider the balance of a corporation’s right to use information they collect (especially in exchange for free services) and an individual’s right to privacy. Using what you’ve learned, do the following:Craft and support an argument identifying 2 “best practices” that should apply universally to large technology companies in protecting individual privacy rights.Additionally, identify the most egrigious technique by either Facebook or Google (from the case study only) and explain why it constitutes a serious individual privacy breach.Be sure to fully support your positions (in both parts A & B) with at least 2 external sources (total) – these sources can be used to support either your “best practices” argument or your “most egrigious” argument, but the textbook is not considered an external source.Submission Instructions:Submit your answers/arguments in a single MS Word document. Be sure to properly cite all sources and provide a bibliography.Videos:1.)https://youtu.be/IWlyut4zsko2.https://youtu.be/V7M_FOhXXKMCa se:In a 2010 interview, Mark Zuckerberg, the founder of Facebook, proclaimed that the “age of privacy” had to come to an end. According to Zuckerberg, social norms had changed and people were no longer worried about sharing their personal information with friends, friends of friends, or even the entire Web. This view is in accordance with Facebook’s broader goal, which is, according to Zuckerberg, to make the world a more open and connected place. Supporters of Zuckerberg’s viewpoint, including fellow tech titan Google, believe the 21st century is an age of “information exhibitionism,” a new era of openness and transparency. However, times have changed, and there are growing calls to put new limits on the personal information that Facebook, and Google, collect and provide to advertisers.Facebook has a long history of invading the personal privacy of its users. In fact, the very foundation of Facebook’s business model is to sell the personal private information of its users to advertisers. In essence, Facebook is like any broadcast or cable television service that uses entertainment to attract large audiences, and then once those audiences are in place, to sell air time to advertisers in 30 to 60 second blocks. Of course, television broadcasters do not have much if any personal information on their users, and in that sense are much less of a privacy threat. Facebook, with over 2.9 billion users worldwide, clearly attracts a huge audience.Although Facebook started out at Harvard and other campuses with a simple privacy policy of not giving anyone except friends access to your profile, this quickly changed as its founder Mark Zuckerberg realized the revenue-generating potential of a social networking site open to the public.In 2007 Facebook introduced the Beacon
  • 2. program, which was designed to broadcast users’ activities on participating websites to their friends. Class-action suits followed. Facebook initially tried to mollify members by making the program “opt in” but this policy change was discovered to be a sham, as personal information continued to flow from Facebook to various websites. Facebook finally terminated the Beacon program in 2009, and paid $9.5 million to settle the class- action suits.In 2009, undeterred by the Beacon fiasco, Facebook unilaterally decided that it would publish users’ basic personal information on the public Internet, andannounced that whatever content users had contributed belonged to Facebook, and that its ownership of that information never terminated. However, as with the Beacon program, Facebook’s efforts to take permanent control of user information resulted in users joining online resistance groups and it was ultimately forced to withdraw this policy as well. The widespread user unrest prompted Facebook to propose a new Facebook Principles and Statement of Rights and Responsibilities, which was approved by 75 percent of its members, who voted in an online survey. However, the resulting privacy policy was so complicated that many users preferred the default “share” setting to working through over 170 privacy options.In 2009, Facebook also introduced the Like button, and in 2010 extended it to thirdparty websites to alert Facebook users to their friends’ browsing and purchases. In 2011, it began publicizing users’ “likes” of various advertisers’ products in Sponsored Stories (i.e., advertisements) that included the users’ names and profile pictures without their explicit consent, without paying them, and without giving them a way to opt out. This resulted in yet another class-action lawsuit, which Facebook settled for $20 million in June 2012. As part of the settlement, Facebook agreed to make it clear to users that information like their names and profile pictures might be used in Sponsored Stories, and also give users and parents of minor children greater control over how that personal information is used.In 2011, Facebook enrolled all Facebook subscribers into its facial recognition program without asking anyone. When a user uploaded photos, the software recognized the faces, tagged them, and created a record of that person/photo. Later, users could retrieve all photos containing an image of a specific friend. Any existing friend could be tagged, and the software suggested the names of friends to tag when you upload the photos. This too raised the privacy alarm, forcing Facebook to make it easier for users to opt out. In 2021, Facebook finally terminated the program after years of privacy concerns about it.In 2012, Facebook went public, creating more pressure on it to increase revenues and profits to justify its stock market value. Shortly thereafter, Facebook announced that it was launching a mobile advertising product that would push ads to the mobile News Feeds of users based on the apps they used through the Facebook Connect feature, without explicit permission from the user to do so. It also announced Facebook Exchange (also known as FBX), an advertising platform that allows advertisers to serve ads to Facebook users based on their browsing activity while not on Facebook.In 2018 and 2019 Facebook’s reputation for invading the personal privacy of its users took a turn for the worse when it was revealed that it had lost control of personal information on 87 million users to agents of the Russian government who had been able to use fake accounts and apps to target political ads designed to sway the 2016 presidential election. The Russian agents used 75,000 fake accounts, and 230,00 bots to send political messages to an estimated 146 million U.S.
  • 3. Facebook users. Facebook also revealed it had shared personal data with 60 device makers of smartphones and TVs, and to large advertisers like Nissan Motors. In 2019 a Wall Street Journal investigation found that eleven out of the top fifty Facebook apps were sharing data they collect with Facebook. Most of these apps involved health, fitness, and real estate data. In response, the app developers stopped sharing sensitive personal data with Facebook, and Facebook itself contacted large developers and advertisers and reminded them Facebook’s policy prohibits sharing any sensitive information with Facebook’s servers.It isn’t just Facebook that allows app developers to share personal information with online ad platforms like Google. Facebook announced that this was “industry standard practice.” But clearly, Facebook’s ability to effectively monitor and police exactly what information apps and advertisers share with Facebook’s SDK (software development kit) is limited, at best, and at worst, not possible given the scale of Facebook’s platform, which is the most widely used app platform on the Internet with tens of thousands of app developers and advertisers.Not to be outdone, Google has also taken liberties with user personal information, with services like Google Street View taking pictures of neighborhoods, houses and driveways, without consent; advertisements served using the content of Gmail messages (though Google claims the content is anonymized), and pervasive tracking cookies following users across the Internet. Echoing Mark Zuckerberg, Google CEO Eric Schmidt has stated that “true transparency and no anonymity” is the best policy for Internet users.Textbook link below (not to be used as a reference for this assignment per what instructor noted above)https://drive.google.com/file/d/19cxt3pMvrETe6MHwj… (https://drive.google.com/file/d/19cxt3pMvrETe6MHwj…)