SlideShare a Scribd company logo
1 of 2
comm120 week 6 discussion
Goal: The goal of this forum is to discuss contemporary privacy and security issues.Course
Objective(s): CO2: Demonstrate knowledge of ethical, legal, privacy and security issues
related to the use of digitally mediated information.Description:In the news we are
constantly hearing about security breaches, invasion of personal privacy, and the increasing
prevalence of our digital footprint. The increased availability of digital information presents
concerns and challenges of privacy, accuracy, intellectual property rights, security, and
censorship. As a global citizen, you need to be aware of these issues and how they impact
your life.Your instructor will set-up two (2) conversation groups this week in which you will
select one topic to discuss which interests you.Conversation Group: SecuritySecurity, as it
relates to social media, video surveillance, drones, digital footprint or other topics as they
relate to digital privacy.How does the electronic environment impact one’s personal
security?Minimum 250 Words AnswerUsing the Richard G. Trefry Library or another
credible source, locate and read a quality article regarding digital privacy or security. Be
sure to provide attribution for your source in the forum. As you are formulating your initial
post consider the following questions:What is the issue? Tell us about it as if we know
nothing on the topic.What are the pros and cons of the issue?Why is the issue
important?How might the issue impact your life?You are required to participate in one
group, and are welcome to participate in the other. Once the conversation is flowing,
participate substantively with your peers to teach from one another.Classmate #1:In
today’s society where almost everyone is online socializing, Facebook has implemented
security concerns for the upcoming election in 2020. In 2016, four networks had been
closed and terminated from using the social media site. The reason was because it had been
determined that these four networks were tied to Russia and had a negative impact on the
2016 presidential election. So for precautionary measures, Facebook has released some
new security features just in time for the upcoming election to make sure that the citizens of
the United States made the genuine decision on electing the next president instead of any
foreign entities playing apart in making that decision. One feature in particular is that a grey
screen will appear in front of fact checked photos and videos which will display a message
of whether the information being presented is fact checked and deemed as false information
which is a great rollout plan because some users do not fact check their information that
they view. Social media users can then make their own decision about who they want to
vote for in the election based off of that information that they received that they did not fact
check. This feature alone can help minimize election interfering from other countries that
sways voters to vote for the other candidate instead of the one they was going to vote for. In
conclusion, I am glad that the security concerns form the 2016 election made Facebook roll
out some sort of plan that can detect and thwarts these types of
interferences.Referencehttps://www.cnbc.com/2019/10/21/facebook-announces-new-
election-security-features-removes-fake-accounts.htmlClassmate #2:The Organisation for
Economic Co-operation and Development (OECD) is an international organization that was
created in the 60s to help “promote economic growth, prosperity, and sustainable
development.― (What is the OECD). OECD has created a set of recommendations on the
protection of children online. This recommendation highlights risks across three categories
“Internet technology risks, (i.e. when the Internet is the medium through which the child
is exposed to content or where an interaction takes place) consumer-related risks to
children online, (i.e. the child is targeted as a consumer online), and information privacy
and security risks (i.e. risks every Internet user faces but for which children form a
particularly vulnerable user group. ― (The Protection of Children Online). And while the
actual threats the children face are disturbingly far too numerous to highlight here, the
document provides a detailed overview including reputable statistics or each threat.Not
only does the article highlight many potential threats to our children online it also shows
existing policies that are in place to protect our children. One thing that was highlighted was
that because this threat is so relatively new that “[i]t is not at present possible to
compare the effectiveness of high-level policies owing to a lack of comparable evidence to
make a case for best practices.― (The Protection of Children Online). This document
recommends was that at the international level governing institutions take a
multidimensional approach to drafting policy. There needs to be coherence, consistency,
and coordination across institutional and managerial systems in order to protect our
children online.What is the OECD? (n.d.). Retrieved from https://usoecd.usmission.gov/our-
relationship/about-the-oecd/what-is-the-oecd/.The Protection of Children Online. (2012).
Retrieved November 11, 2019, from
https://www.oecd.org/internet/ieconomy/childrenonline_with_cover.pdf.Minimum 100
Words Answer to Each.

More Related Content

Similar to comm120 week 6 discussion.docx

CILIP Conference - Promoting digital literacy and digital well-being for chil...
CILIP Conference - Promoting digital literacy and digital well-being for chil...CILIP Conference - Promoting digital literacy and digital well-being for chil...
CILIP Conference - Promoting digital literacy and digital well-being for chil...CILIP
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewEnow Eyong
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineBrenden Brown
 
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxA. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxamandaschilling75
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxtodd521
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)Zohra Razaq
 
week 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxweek 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxdanielloberiz1
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
Talks submitted
Talks submittedTalks submitted
Talks submittedKim Minh
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Dave Holland
 

Similar to comm120 week 6 discussion.docx (14)

CILIP Conference - Promoting digital literacy and digital well-being for chil...
CILIP Conference - Promoting digital literacy and digital well-being for chil...CILIP Conference - Promoting digital literacy and digital well-being for chil...
CILIP Conference - Promoting digital literacy and digital well-being for chil...
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
 
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptxA. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
A. Schilling Apps and Younger Users Warnings and safeguards assignment .pptx
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
 
ISACA UW Handbook 2016
ISACA UW Handbook 2016ISACA UW Handbook 2016
ISACA UW Handbook 2016
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)ConsumerPrivacy-BEAR-2015-Final (1)
ConsumerPrivacy-BEAR-2015-Final (1)
 
week 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptxweek 1 Day 2 Power of Media and Information Literacy.pptx
week 1 Day 2 Power of Media and Information Literacy.pptx
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Talks submitted
Talks submittedTalks submitted
Talks submitted
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...Privacy vs personalization: advisory for brand and comms practitioners into 2...
Privacy vs personalization: advisory for brand and comms practitioners into 2...
 

More from write31

The candidates will develop a substantive understanding of six components.docx
The candidates will develop a substantive understanding of six components.docxThe candidates will develop a substantive understanding of six components.docx
The candidates will develop a substantive understanding of six components.docxwrite31
 
Women in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docxWomen in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docxwrite31
 
Write a article more than 2 pages in.docx
Write a article more than 2 pages in.docxWrite a article more than 2 pages in.docx
Write a article more than 2 pages in.docxwrite31
 
Write a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docxWrite a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docxwrite31
 
The topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docxThe topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docxwrite31
 
Video if makes the speech compelling.docx
Video if makes the speech compelling.docxVideo if makes the speech compelling.docx
Video if makes the speech compelling.docxwrite31
 
watch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docxwatch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docxwrite31
 
There is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docxThere is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docxwrite31
 
What is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docxWhat is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docxwrite31
 
what is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docxwhat is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docxwrite31
 
With you have learned about the cell DNA.docx
With you have learned about the cell DNA.docxWith you have learned about the cell DNA.docx
With you have learned about the cell DNA.docxwrite31
 
TO EACH POST 100 WORDS MIN This.docx
TO EACH POST 100 WORDS MIN This.docxTO EACH POST 100 WORDS MIN This.docx
TO EACH POST 100 WORDS MIN This.docxwrite31
 
TO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxTO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxwrite31
 
Take a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docxTake a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docxwrite31
 
Stakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docxStakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docxwrite31
 
The OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docxThe OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docxwrite31
 
This assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docxThis assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docxwrite31
 
What are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docxWhat are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docxwrite31
 
You are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docxYou are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docxwrite31
 
When you are engaging it is important to understand.docx
When you are engaging it is important to understand.docxWhen you are engaging it is important to understand.docx
When you are engaging it is important to understand.docxwrite31
 

More from write31 (20)

The candidates will develop a substantive understanding of six components.docx
The candidates will develop a substantive understanding of six components.docxThe candidates will develop a substantive understanding of six components.docx
The candidates will develop a substantive understanding of six components.docx
 
Women in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docxWomen in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docx
 
Write a article more than 2 pages in.docx
Write a article more than 2 pages in.docxWrite a article more than 2 pages in.docx
Write a article more than 2 pages in.docx
 
Write a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docxWrite a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docx
 
The topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docxThe topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docx
 
Video if makes the speech compelling.docx
Video if makes the speech compelling.docxVideo if makes the speech compelling.docx
Video if makes the speech compelling.docx
 
watch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docxwatch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docx
 
There is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docxThere is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docx
 
What is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docxWhat is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docx
 
what is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docxwhat is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docx
 
With you have learned about the cell DNA.docx
With you have learned about the cell DNA.docxWith you have learned about the cell DNA.docx
With you have learned about the cell DNA.docx
 
TO EACH POST 100 WORDS MIN This.docx
TO EACH POST 100 WORDS MIN This.docxTO EACH POST 100 WORDS MIN This.docx
TO EACH POST 100 WORDS MIN This.docx
 
TO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxTO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docx
 
Take a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docxTake a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docx
 
Stakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docxStakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docx
 
The OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docxThe OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docx
 
This assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docxThis assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docx
 
What are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docxWhat are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docx
 
You are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docxYou are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docx
 
When you are engaging it is important to understand.docx
When you are engaging it is important to understand.docxWhen you are engaging it is important to understand.docx
When you are engaging it is important to understand.docx
 

Recently uploaded

Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 

Recently uploaded (20)

Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 

comm120 week 6 discussion.docx

  • 1. comm120 week 6 discussion Goal: The goal of this forum is to discuss contemporary privacy and security issues.Course Objective(s): CO2: Demonstrate knowledge of ethical, legal, privacy and security issues related to the use of digitally mediated information.Description:In the news we are constantly hearing about security breaches, invasion of personal privacy, and the increasing prevalence of our digital footprint. The increased availability of digital information presents concerns and challenges of privacy, accuracy, intellectual property rights, security, and censorship. As a global citizen, you need to be aware of these issues and how they impact your life.Your instructor will set-up two (2) conversation groups this week in which you will select one topic to discuss which interests you.Conversation Group: SecuritySecurity, as it relates to social media, video surveillance, drones, digital footprint or other topics as they relate to digital privacy.How does the electronic environment impact one’s personal security?Minimum 250 Words AnswerUsing the Richard G. Trefry Library or another credible source, locate and read a quality article regarding digital privacy or security. Be sure to provide attribution for your source in the forum. As you are formulating your initial post consider the following questions:What is the issue? Tell us about it as if we know nothing on the topic.What are the pros and cons of the issue?Why is the issue important?How might the issue impact your life?You are required to participate in one group, and are welcome to participate in the other. Once the conversation is flowing, participate substantively with your peers to teach from one another.Classmate #1:In today’s society where almost everyone is online socializing, Facebook has implemented security concerns for the upcoming election in 2020. In 2016, four networks had been closed and terminated from using the social media site. The reason was because it had been determined that these four networks were tied to Russia and had a negative impact on the 2016 presidential election. So for precautionary measures, Facebook has released some new security features just in time for the upcoming election to make sure that the citizens of the United States made the genuine decision on electing the next president instead of any foreign entities playing apart in making that decision. One feature in particular is that a grey screen will appear in front of fact checked photos and videos which will display a message of whether the information being presented is fact checked and deemed as false information which is a great rollout plan because some users do not fact check their information that they view. Social media users can then make their own decision about who they want to vote for in the election based off of that information that they received that they did not fact check. This feature alone can help minimize election interfering from other countries that
  • 2. sways voters to vote for the other candidate instead of the one they was going to vote for. In conclusion, I am glad that the security concerns form the 2016 election made Facebook roll out some sort of plan that can detect and thwarts these types of interferences.Referencehttps://www.cnbc.com/2019/10/21/facebook-announces-new- election-security-features-removes-fake-accounts.htmlClassmate #2:The Organisation for Economic Co-operation and Development (OECD) is an international organization that was created in the 60s to help “promote economic growth, prosperity, and sustainable development.― (What is the OECD). OECD has created a set of recommendations on the protection of children online. This recommendation highlights risks across three categories “Internet technology risks, (i.e. when the Internet is the medium through which the child is exposed to content or where an interaction takes place) consumer-related risks to children online, (i.e. the child is targeted as a consumer online), and information privacy and security risks (i.e. risks every Internet user faces but for which children form a particularly vulnerable user group. ― (The Protection of Children Online). And while the actual threats the children face are disturbingly far too numerous to highlight here, the document provides a detailed overview including reputable statistics or each threat.Not only does the article highlight many potential threats to our children online it also shows existing policies that are in place to protect our children. One thing that was highlighted was that because this threat is so relatively new that “[i]t is not at present possible to compare the effectiveness of high-level policies owing to a lack of comparable evidence to make a case for best practices.― (The Protection of Children Online). This document recommends was that at the international level governing institutions take a multidimensional approach to drafting policy. There needs to be coherence, consistency, and coordination across institutional and managerial systems in order to protect our children online.What is the OECD? (n.d.). Retrieved from https://usoecd.usmission.gov/our- relationship/about-the-oecd/what-is-the-oecd/.The Protection of Children Online. (2012). Retrieved November 11, 2019, from https://www.oecd.org/internet/ieconomy/childrenonline_with_cover.pdf.Minimum 100 Words Answer to Each.