Bradley, Tony. "Protect Your Privacy on Facebook and Twitter." PC World 27.12 (2009): 110-2. . EBSCO <http://search.ebscohost.com.ezproxy.rowan.edu/login.aspx?direct=true&db=aph&AN=45233717&site=ehost-live>.
In “Protect Your Privacy on Facebook and Twitter,” Tony Bradley offers ideas to ensure the safety of people on social media sites. Bradley explains that social networking is supposed to be a place of sharing information openly and freely to create a sense of community. However, such an open community can attract hackers and attackers. Strong, influential people, such as Obama, are warning people and students of the dangers of social media. Obama explains that any information online can be pulled up later and is never erased from the Internet. Businesses are searching Facebook and can do something such as “Facebook Fired.” Users have to know that since social media is for sharing information, all settings are open automatically but can be changed in the privacy settings. This source discusses how attackers use social media to connect to people. |
This casual argument will be used to discuss how Facebook, and other social media sites, are not supposed to be private and it is up to the user to change that. This source, also, discusses how attackers get onto people’s social media sites and get around the privacy settings. This point is great to inform users how the "mind of a criminal" works. So when hackers attempt to break in, they know exactly what to do. If people know what hackers look for, they can be knowledgeable about what they have to protect in their settings accounts. This source is great to inform people of what they can do to stay private in a social media sites.
|
Editors of Bottletree Books. Facebook Fanatic: Explode Your Popularity, Buzz Your Band and Secure Your Privacy on Facebook. [S.l.]: BottleTree LLC, 2007. Print.
The book, “Facebook Fanatic: Explode Your Popularity, Buzz Your Band and Secure You Privacy on Facebook” includes various tips to stay private on Facebook. The editors of Bottletree Books explain how to keep your name somewhat secretive, what you include in a profile that is shown to other people and how you can make it private. This book also discusses how Facebook is to build an online community where you share information with friends and other people on the social media site. Additionally, this book describes how Facebook receives personal information and stores it through email invites. This book explains the do’s and do not’s of Facebook. This source is an advantage in describing how Facebook takes people’s personal information. It also gives great advice and suggestions to stay safe and private on social media sites, like Facebook. This book is great for all people in this current generation. With more than 50 million active Facebook users, the majority being from 18-34 years old, it can be assumed people do not do what they can to protect their identities and information on facebook. This book goes into depth about how to stay private and the settings that Facebook has to do this. |
Elam, Jerome. "Bullied to Death: The Tragic Story of Amanda Todd." Washington Times Communities. Washington Times, 17 Oct. 2012. Web. 29 Oct. 2012. <http://communities.washingtontimes.com/neighborhood/heart-without-compromise-children-and-children-wit/2012/oct/17/bullied-death-tragic-story-amanda-todd/>.
In Jerome Elam’s “Bullied to Death: The Tragic Story of Amanda Todd,” Elam describes the story of Amanda Todd and how social media gone wrong caused the fall of this young girl. At 12 years old, Amanda Todd flashed a random stranger during a video chat session. The stranger attempted to blackmail Todd by saying that if she did not put on a “show” for him then he would send the video of her breasts to everyone she knew. The stranger sent the video to all of her Facebook friends. This began Todd’s depression. After a series of taunts at school and on Facebook, Todd committed suicide. She could not escape from the cyber bullying. This casual argument discusses how cyber bullying can cause something as horrific of the suicide of a young girl. Through social media, Amanda Todd was tormented and bullied. There are some people who do not believe things like this happens. That just because someone is one the other side of the computer, they will not find out who you are. Amanda Todd thought this. However, she quickly learned the truth in the most unfortunate way possible. This source will be used to discuss the dangers of social media. Through learning Amanda Todd's story, hopefully people will understand that privacy on the computer is a vital issue that people have to take seriously. |
O'Donnell, Andy. "Who's Following Your Child On Twitter?" About.com Internet / Network Security. About.com, n.d. Web. 17 Oct. 2012. <http://netsecurity.about.com/od/newsandeditorial1/a/Whos-Following-Your-Child-On-Twitter.htm>.
In “Who’s Following Your Child On Twitter,” Andy O’Donnell provides tips to keep someone safe on Twitter. O’Donnell explains that following someone on Twitter is much easier than following them on Facebook. O’Donnell gives advice towards a parent to keep their child safe on Twitter. He advices parents to remove their child’s personal information from his/her twitter profile, such as removing the child’s real name, email address, and picture. Turn off the “Tweet Location” feature, which provides the current geolocation of the person posting a tweet. Additionally, turn on the “protect my tweets” feature, which prevents unwanted people from following children on Twitter and requires followers to be approved. |
This proposal argument will be used to discuss the possible ways to help make social media more private for its users. While other sources discuss how social media is dangerous due to the lack of privacy, this source provides ways to make social media safer. It discusses specific features that Twitter has like “Tweet Location” and “Protect My Tweets” which can aid in a person’s privacy on Twitter. All people have to realize that privacy on the Internet is a major issue. Due to the amount of hackers and attackers on the Internet, people have to take all of the settings that Twitter has into consideration. The problem, however, is that people do not know the specific types of settings that keep a member's identity private. Additionally, users do not know the features that are automatically turned on to advertise ones profile to other people. The article fills people in about the settings that keep the members safe.
|
Spring, Tom. "Good-Bye to Privacy?" PC World 28.7 (2010): 10-2. . EBSCO <http://search.ebscohost.com.ezproxy.rowan.edu/login.aspx?direct=true&db=aph&AN=51373609&site=ehost-live>.
|
In “Good-Bye to Privacy,” Tom Spring explains that Facebook made changes to its privacy policy that exposed more personal data to a wider range of marketers. Spring goes on to explain one of the changes involving the Instant Personalization pilot program. When this program is activated, one’s Facebook information can be accessed when one goes on websites such as Pandora and Yelp. Facebook automatically activated this change to occur.
This source will be beneficial to warn social media users of what sites such as Facebook is doing. Advertisers are unfairly viewing what people are doing through their Facebook information. This casual argument is important and all social media users should know what is going on. Other programs exist such as the Instant Personalization pilot program that take one's Facebook information, or other information. People need to know this issue exists and that people's information and privacy is not safe. |
Thomases, Hollis. Twitter Marketing: An Hour a Day. Indianapolis, IN: Wiley Pub., 2010. Print.
Like O’Donnell’s “Who’s Following Your Child on Twitter,” Hollis Thomases book “Twitter Marketing: An Hour a Day,” discusses different ways to protect people on Twitter. It suggests using the block system, privacy protection features, and protected tweet features. This source proves that Twitter is a dangerous place and people can find out about ones personal information. This source fits with the other several sources when explaining the dangers of social media sites and the ways in which one can use the protections and privacy features to protect the users. |