SlideShare a Scribd company logo
1 of 33
Social
Networking
Ethics in Information Technology
What is Social Networking Web Site?
Business Applications of Online Social Net
Social Networking Ethical Issues
Online Virtual World
Overview
What is Social Networking Web Site?
Business Applications of Online Social Net
Five new profiles are created every second
There are 83 million fake profiles
Photo uploads total 300 million per day
Average time spent per Facebook visit is 20 minutes
699 million people log onto Facebook daily, which represents a 26% increase from 2012
4.5 billion likes generated daily as of May 2013 which is a 67 percent increase from August
2012
Age 25 to 34, at 29.7% of users, is the most common age demographic
Facebook Facts
Social Network Advertising
Social Shopping Web Sites
Business Applications of Online Social Net
Direct Advertising
Advertising Using an Individual’s Network of Friends
Indirect Advertising Through Groups
Company-Owned Social Networking Web Site
Viral Marketing
Social Network Advertising
Direct Advertising
Advertising Using an
Individual’s Network of
Friends
Indirect Advertising
Through Groups
0
Company-Owned Social
Networking Web Site
Viral Marketing
Social Shopping Web Sites
Utilitarian Perspective
Fairness Perspective
Common Good Perspective
Virtue Perspective
Some Unavoidable Ethical Issues
Social Networking At Work Place
Decrease
Efficiency
Cyberbullying
Cyberbullying is the
use of the Internet
and related
technologies to
harm or harass other
people, in a
deliberate, repeate
d, and hostile
manner.
Cyberbullying is Defined in Legal Glossaries as
Statistics
Cyberbulling
Non Attacked
Attacked
Among 800 students
ages 13-17, about
43% had
experienced
cyberbullying
Result of Cyberbulling
Forms of Cyberbullying
 Threatening Messages
 Thousands Of Text Messages
 Impersonating The Victim And Sending Inappropriate
Messages To Others
 Stealing The Victim’s Password And Manipulating
 Posting Mean, Personal, Or False Information About The
Victim
It is the Adult Version of Cyberbullying
Cyberstalking
What Should We Do?
 Victims Should Send a Written Notice
 Evidence of All Contacts should be Saved.
 Inform Their ISP Provider.
 Speaking to Law Enforcement Officers.
 Never Agree to Meet With the Stalker to “Talk Things Out”
People who commit sex crimes, such as rape or child sexual
abuse, are commonly referred to as sexual
predators
Encounters with Sexual Predators
Parents and their children need to work together to
protect against online predators.
How to Avoid Sexual Predators activity?
Most social networking Web sites have policies against
uploading materials
But Policies do not stop all members from posting
inappropriate material
Uploading of Inappropriate Material
Online Virtual World
Avatars
Communication
Shopping and Office
Relationship
Promote events
Business
Avatar in Virtual World
Use Virtual Currency
Earn Virtual Money
Virtual Items
E-commerce
Avatar in Virtual World (cont.)
Trafficking In Actual Drugs or Stolen Credit Cards
Online Muggings and Sex Crimes
Cyber Harassment
Crime in Virtual Worlds
The New Media Consortium (NMC)
Media Grid’s Immersive Education Initiative
Rivers Run Red
Educational and Business Uses of
Virtual Worlds
Q&A

More Related Content

What's hot

Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expressionGerwin Ocsena
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacyhimanshu jain
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issuesatuljaybhaye
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social MediaDaliahSaper
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crimeParas Kansagara
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008ATHULYARAJDS
 
Social Media Etiquette (organisational)
Social Media Etiquette (organisational)Social Media Etiquette (organisational)
Social Media Etiquette (organisational)Gbenga Odunsi
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among studentsjune21harsh
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsLarry Magid
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 

What's hot (20)

Domain Dispute Presentation
Domain Dispute PresentationDomain Dispute Presentation
Domain Dispute Presentation
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 
Freedom of expression
Freedom of expressionFreedom of expression
Freedom of expression
 
Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008Cyber law – it act 2000,it act 2008
Cyber law – it act 2000,it act 2008
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social Media Etiquette (organisational)
Social Media Etiquette (organisational)Social Media Etiquette (organisational)
Social Media Etiquette (organisational)
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Digital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for studentsDigital Citizenship & Media Literacy: A presentation for students
Digital Citizenship & Media Literacy: A presentation for students
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Viewers also liked

Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpointstanbridge
 
Impact of Information Technology on Productivity & Quality of Life
Impact of Information Technology on Productivity & Quality of LifeImpact of Information Technology on Productivity & Quality of Life
Impact of Information Technology on Productivity & Quality of LifeShibbir Shimanto
 
Overview of ethics and information technology
Overview of ethics and information technologyOverview of ethics and information technology
Overview of ethics and information technologySJBennett228
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information TechnologyAtul Kumar Pandey
 
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1Nawanan Theera-Ampornpunt
 
Information Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingInformation Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingNawanan Theera-Ampornpunt
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacyGouthamXander
 
A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...Ukam John Victor
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Segurança, ética e privacidade da informação
Segurança, ética e privacidade da informaçãoSegurança, ética e privacidade da informação
Segurança, ética e privacidade da informaçãoDaiana de Ávila
 
Health Informatics
Health InformaticsHealth Informatics
Health InformaticsJulesykora
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n itamitmitkar
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Usersalmario1988
 

Viewers also liked (20)

Chapter 1 powerpoint
Chapter 1 powerpointChapter 1 powerpoint
Chapter 1 powerpoint
 
Impact of Information Technology on Productivity & Quality of Life
Impact of Information Technology on Productivity & Quality of LifeImpact of Information Technology on Productivity & Quality of Life
Impact of Information Technology on Productivity & Quality of Life
 
Ethic02
Ethic02Ethic02
Ethic02
 
Overview of ethics and information technology
Overview of ethics and information technologyOverview of ethics and information technology
Overview of ethics and information technology
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
Ethics & Legal Issues for Health IT in Thailand's Context - Part 1
 
Information Ethics and Clinical Decision Making
Information Ethics and Clinical Decision MakingInformation Ethics and Clinical Decision Making
Information Ethics and Clinical Decision Making
 
Hi271 lacking in ethics pdf v3
Hi271 lacking in ethics pdf v3Hi271 lacking in ethics pdf v3
Hi271 lacking in ethics pdf v3
 
Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...A review on a thesis, titled The Impact Of Information Technology On Producti...
A review on a thesis, titled The Impact Of Information Technology On Producti...
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Islamic ethics
Islamic ethicsIslamic ethics
Islamic ethics
 
Segurança, ética e privacidade da informação
Segurança, ética e privacidade da informaçãoSegurança, ética e privacidade da informação
Segurança, ética e privacidade da informação
 
Health Informatics
Health InformaticsHealth Informatics
Health Informatics
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
 
law and ethics
law and ethicslaw and ethics
law and ethics
 
Ethics in Islam
Ethics in IslamEthics in Islam
Ethics in Islam
 
Law and ethics
Law and ethicsLaw and ethics
Law and ethics
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Users
 

Similar to Social Networking (Ethics in Information Technology)

Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and postervictoriahoo
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threatsejhilbert
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineIRJET Journal
 
Jon Newman PRSARVA 5/19/10
Jon Newman PRSARVA 5/19/10Jon Newman PRSARVA 5/19/10
Jon Newman PRSARVA 5/19/10jonnewman12
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying21rahul1999
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxjaggernaoma
 
Users and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityUsers and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityDr. V Vorvoreanu
 
Impacts of Social Media
Impacts of Social MediaImpacts of Social Media
Impacts of Social MediaParamitaSaha11
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networksis20090
 
My Online Image
My Online ImageMy Online Image
My Online Imagealuthe
 

Similar to Social Networking (Ethics in Information Technology) (20)

Facebook
FacebookFacebook
Facebook
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
ES_ 6 Author-Shelina Rajawat
ES_ 6 Author-Shelina RajawatES_ 6 Author-Shelina Rajawat
ES_ 6 Author-Shelina Rajawat
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threats
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Jon Newman PRSARVA 5/19/10
Jon Newman PRSARVA 5/19/10Jon Newman PRSARVA 5/19/10
Jon Newman PRSARVA 5/19/10
 
Social media and cyberbullying
Social media and cyberbullyingSocial media and cyberbullying
Social media and cyberbullying
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Social Media
Social MediaSocial Media
Social Media
 
Information Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docxInformation Technology and EthicsSocial Networking and Business.docx
Information Technology and EthicsSocial Networking and Business.docx
 
Users and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & SecurityUsers and behaviors social internet: Safety & Security
Users and behaviors social internet: Safety & Security
 
Impacts of Social Media
Impacts of Social MediaImpacts of Social Media
Impacts of Social Media
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
 
My Online Image
My Online ImageMy Online Image
My Online Image
 

Recently uploaded

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

Recently uploaded (20)

Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

Social Networking (Ethics in Information Technology)

Editor's Notes

  1. 1.A social networking Web site is a site whose purpose is to create an online communityof Internet users that enables members to break down barriers created by time, distance,and cultural differences.2. Facebook 1.5 Billion users, twitter 200 Million, myspace 50 million, linkedin 238 million; from wiki
  2. technisia
  3. technisia
  4. sources:facebook, emarketer, infodocket, cnn, allfacebook 2012, gizmodo
  5. Social network advertising involves the use of social networks to inform, promote, and communicate the benefits of products and services.Social network advertising has become big business in the United States, with 2009 ad spending on Facebook estimated to be $230 million, and ad spending on MySpace estimated to be $495 million.12
  6. 1.Direct advertising involves placing banner ads on a social networking Web site.2. An ad can either be displayed to each visitor to the Web site or, by using the information in user profiles
  7. 1.Companies can use social networking Web sites to advertise to an individual’s network of contacts2. This might be a spontaneous message sent by Jared, or Jared might be getting paid by an online promotion firm to send messages about certain products.3.unethicial
  8. Innovative companies are also making use of a new marketing technique by creating a group on a social networking Web site that interested users can join by becoming “fans.” These groups can quickly grow in terms of numbers of fans to become a very effective marketing tool for a company looking to market contests, promote new products, or simply increase brand awareness. In its ongoing fight for market share in the beverage industry, Coca-Cola has implemented a number of social networking initiatives to promote its brands.
  9. 1.Since its launch in February 20072. the Dell community has suggested 11,996 ideas and posted 84,851 comments; 3.Dell has implemented 350 customer-submitted ideas.18
  10. V1.iral marketing encourages individuals to pass along a marketing message to others2. as one person tells two people, each of those two people tell two or three more people, and
  11. Buzzillions Product review Web site that collects thousands of product reviews from the Web sites of various retailersCrowdstormShopping resource that aggregates product information from various online buyers guides, reviews, and blog postingsKaboodle Site where members can discover and recommend new products; get discounts; and locate bargainsOSOYOU UK-based social shopping site for women with an interest in fashion and beauty productsZEBO Site that allows members to create a personal profile about what they own, want, and love to shop for; members can check out one another’s profiles, provide
  12. MySpace, FaceBook, and other sites have been the scene of cyberbullying and online predation. But the same technology allows people to connect with others they might never have met and form meaningful relationships.Some people believe social networking sites offer the ultimate in egalitarianism. When we interact with others online, we have no real way of knowing whether they are white or black, male or female, fat or thin, young or old.Certainly, many people turn to social networking sites to connect with social groups that share their interests and values.What impact will digital media have on these virtues? What, for example, would honesty mean in the context of a world where people are represented by avatars?Utilitarian PerspectiveFairness PerspectiveCommon Good PerspectiveVirtue Perspective
  13. Cyberbullying is the use of the Internet and related technologies to harm or harass other people, in a deliberate, repeated, and hostile manner.
  14. According to recent survey among 800 students ages 13-17 , about 43% had experienced cyberbulling in the past year. Cyberbulling is more common among females and among 15-16 years old .
  15. Ryan Halligan, a 13-year-old boy in Vermont, committed suicide after bullying from his schoolmates and cyberbullying online. Megan Meier, a 13-year-old girl from Missouri, also committed suicide when she was harassed by a fictitious boy created by neighbors with whom she had had a falling out.
  16. Sending mean-spirited or threatening messages to the victimSending thousands of text messages to the victim’s cell phone Impersonating the victim and sending inappropriate messages to othersStealing the victim’s password and modifying his or her profile to include racist,homophobic, sexual, or other inappropriate data that offends others or attractsthe attention of undesirable peoplePosting mean, personal, or false information about the victim in the cyber-bully’s blog
  17. When the offender is known, victims should send the stalker a written notice that their contact is unwanted.Evidence of all contacts should be saved.Victims of cyber stalking should inform their ISP provider.Victims should consider speaking to law enforcement officers.Above all else, victims of cyberstalking should never agree to meet with the stalker to“talk things out.”
  18. Talk to your kidsUse parental control software Monitor your children's use of social networking sitesNever download images from an unknown source Never reveal personal information Never agree to meet someone
  19. Most websites do not have sufficient resources to review all material submitted for posting.In April 2008, six teenagers recorded their beating of 16-year old Victoria Lindsay and planned to post it on Myspace and Youtube.On May 20,2009, an organization group of users uploaded video clips of explicit adult content to Youtube. The clips were uploaded with no warning at all. Even worse, they were tagged with child friendly identities.
  20. An online virtual world is a computer-simulated world in which a visitor can move in three-dimensional space, communicate and interact with other visitors, and manipulate elements of the simulated world.
  21. A visitor to a virtual world represents him- or herself through an avatar. a character usually in the form of a human but sometimes in some other form.
  22. Communication: Avatars can typically communicate with each other via text chat or via voice using Voice over IPShopping and Office: shop, hold jobs, run for political office, develop relationships with other avatarsPromote events: promote events and hold them in the virtual worldBusiness: start up new businesses and create or purchase new entities
  23. Use virtual currency: use the virtual world’s currency to purchase goods and servicesEarn Virtual money: earn virtual world money by performing tasks in the virtual world. avatars can convert their virtual world money back into real dollars at whatever the going exchange rateVirtual items: Virtual world items may also be sold to other virtual world players for real world moneye-commerce: also support e-commerce and allow users to sell their own real productsMost virtual worlds have rules against offensive behavior in public, such as using racial slurs or performing overtly sexual actions. However, consenting adults can travel to private areas and engage in all sorts of socially unacceptable behavior
  24. Virtual worlds raise many interesting questions regarding what is a criminal act and whether law enforcement.Example:trafficking in actual drugs or stolen credit cardsonline muggings and sexual crimesCyberharrasmentIn The Sims Online, a number of players formed a “Sim Mafia” and attacked the avatars of unpopular players. The group would send a flood of insulting messages to the targeted character, then trash the target’s virtual property, and finally demand that the target delete his or her avatar from the game.A man playing the Lineage II online game was arrested by Japanese officials for using software to mug avatars and then sell the stolen virtual items for real money.A player of the online game MapleStory became so upset about her sudden divorce from her online husband that she logged onto the game with her virtual world husband’s ID and password and killed his avatar. The woman was arrested by Japanese police and jailed on suspicion of illegally accessing a computer and manipulating electronic data. Under Japanese law, she could be imprisoned up to five years or fined up to $5,000
  25. The New Media Consortium (NMC) is an international consortium of almost 300 organizations focused on exploring the use of new media and technologies to improve teaching, learning, and creative expression. The NMC attracts nearly 1,500 unique visitors to its Second Life campus each week. Princeton, Yale, the University of Southern California, Ball State, and New York University are just a few of the schools with a campus in Second LifeMedia Grid’s Immersive Education Initiative is an international collaboration of universities, research institutes, and companies to define and develop open standards, best practices, platforms, and game-based learning and training systems. Amherst College, Boston College, the City of Boston, Loyola Marymount University, Massachusetts Institute of Technology, and Seton Hall University are some of the members of the Media Grid.Members of the New Media Consortium and the Media Grid can conduct classes and meetings from within a growing number of virtual learning worlds.Second Life is used by the marketing firm Rivers Run Red as a virtual meeting place to display ads, posters, and other designs in three-dimensional settings for clients and partners around the world. Using virtual meeting space can cut weeks off the time that would be required to transport the actual materials back and forth for a real world meeting