In the video below I discuss Prof. Paula Swatman’s (n.d.) findings on ‘ethical issues in social networking research’. These include:
- Data Sharing
- Terms of Service
During Topic 2 I highlighted privacy as a driver for multiple identities. Due to its significance, I will evaluate it once again in this post.
As claimed by The Guardian (2014), Twitter as a form of social media “has facilitated entertainment, argument, gossip and abuse.” Additionally, individuals involved in business must be weary of privacy when using social media.
PRIVACY IN BUSINESS
There are two sides to investigate when looking at privacy in business: the invasion of an individual’s privacy by a business, and the protection of privacy of a business.
Invasion of Privacy by Businesses
The video below explains the business of ‘Information Brokers’ (reputationcom, 2011) and how they can access your public, semi-public and private records; this information can be subsequently packaged and sold on. Social media is a great source whereby companies can seek information to build up a profile of you; and can then go on to target their marketing at you through to preparing a fraudulent attack.
Data collected in the video above can be bought and manipulated to create cyber-doubles as in the case of Ruth Palmer vs Leah Palmer (BBC, 2015).
Protection of Privacy by the Business
Social media sites are a “hunting ground for cybercriminals” (BBC, 2016). According to the diagram above (Guardian, 2016) cybercrime is affecting many businesses in the UK. Recently in 2016, the UK government published a document Reducing the Cyber Risk in 10 Critical Areas which shows ways in which businesses can protect themselves against such attacks on their private information.
Businesses or individuals accessing and releasing private information or view and opinions should only occur with the prior approval of the individual (Data Protection laws). This could avoid cases such as Justine Sacco, a senior director of corporate communications at IAC whose tweet sparked media outrage and led to her being fired. The ease of use of social media should be approached with caution. Even if the handle of our twitter account is our own name, we could be regarded as always representing our employer and thus should ensure that what we publish is appropriate.
However, social media has its benefits as it breaks down barriers and allows individuals to speak freely and share said thoughts globally. It is up to the individual to ensure data that they create and access is meets the approval of the company they are representing and the terms of the site they are using.
Word Count :424
- Department for Business Innovation & Skills (2016) Reducing the Cyber Risk in 10 Critical Areas (Online) Available at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/395716/10_steps_ten_critical_areas.pdf (Accessed: 24 March 2017)
- Illmer (2016) BBC: Social media: A hunting ground for cybercriminals (Online) Available at: http://www.bbc.co.uk/news/business-36854285(Accessed: 24 March 2017)
- Ronson (2015) How one stupid tweet blew up Justine Sacco’s Life. The New York Times Magazine. Available at: https://www.nytimes.com/2015/02/15/magazine/how-one-stupid-tweet-ruined-justine-saccos-life.html?_r=1(Accessed: 24 March 2017)
- P. Swatman (n.d.) Ethical Issues in social Networking Research. (Powerpoint) Available at: https://www.deakin.edu.au/__data/assets/pdf_file/0007/269701/Swatman-Ethics-and-Social-Media-Research.pdf (Accessed: 24 March 2017)
- Davies (2016) The Guardian: UK businesses battling huge rise in cybercrime, report says (Online) Available at: https://www.theguardian.com/technology/2016/feb/25/cybercrime-uk-businesses-battling-huge-rise-silver-fraudsters (Accessed: 24 March 2017)
- com (2011) Invasion of the Data Snatchers: How To Protect Your Online Privacy (Video) Available at: https://www.youtube.com/watch?v=ceGdmZ_LLfg (Accessed: 24 March 2017)
- The Guardian (2014) Twitter Abuse: easy on the messenger Editorial (Online) Available at: https://www.theguardian.com/commentisfree/2014/jan/24/twitter-abuse-abusive-tweets-editorial?CMP=twt_gu (Accessed: 24 March 2017)
- Kleinman (2015) BBC: Who’s that girl? The curious case of Leah Palmer (online) Available at: http://www.bbc.co.uk/news/technology-31710738 (Accessed: 24 March 2017)