Open main menu

CDOT Wiki β

Changes

Team LoL

1,573 bytes added, 23:05, 14 November 2011
Prioritized Note Record
| 1 || The Theory of Social Validation || [http://www.psychologytoday.com/blog/communication-central/200909/the-theory-social-validation Click Here] || Gerald || This article from Baraki Akil II is basically what we are trying to prove. According to him and other’s statements it is not only being done through social networking but in our everyday life. An example from this article refers to Michael Jordan as how he wanted to demonstrate his skills to other great players. This need for acknowledgement fueled him to be the best through his college and NBA years.|| Deductive
|-
| 2 || Title Facebook: Threats to Privacy|| [LINK http://www.google.ca/url?sa=t&rct=j&q=facebook%20threats%20to%20privacy&source=web&cd=1&ved=0CCAQFjAA&url=http%3A%2F%2Fciteseerx.ist.psu.edu%2Fviewdoc%2Fdownload%3Fdoi%3D10.1.1.112.3154%26rep%3Drep1%26type%3Dpdf&ei=l1GvTuCVMaHc0QH52riaAQ&usg=AFQjCNHAc7KfTPs6kpDEmXEtWFhwW2WrHA Click Here] || B William || Comment This research defines the potential hazards of privacy issues in regards to Facebook. With the many fine prints of Facebook, we should tend to wonder why Facebook is such a popular hit amongst the social networking phenomenon. Some potential answers are found in the article such as Information spreads faster through a Social Network Sites than through a real-life network but harms the users when information goes to the wrong people. While there are statistics showing surveys done within a school and the collection of data it provides proves worthy in our thesis. There are also results such as amount of user that tends to read privacy concerns.|| Inductive/Deductive/Abductive
|-
| 3 || Title CIPPIC Vs Facebook|| [LINK http://www.priv.gc.ca/cf-dc/2009/2009_008_0716_e.cfm Click Here] || B William || Comment This article is a PIPEDA case study amongst the CIPPIC against the Facebook. This goes in depth of the possible solution and the out comings of Facebook and its controversial privacy issues and data sharing.This also shows that a lot of users do not take the time to read and understand the user agreements for all the social networking. They only think of the outer layer in which to keep in contact with friends. But overall they are leaking out information about one’s self and could cause identity thefts. Users are tends to click on the check box then to rather read the full text inside the text box.|| Inductive/Deductive/Abductive
|-
| 4 || Teens Are Wired …And, Yes, It’s OK || [http://www.cbsnews.com/stories/2006/06/09/gentech/main1698246.shtml Click Here] || Gerald || This article basically shows how teenagers are very quick at adapting to new technology without worrying about the consequences. It also states that teens have a biological need to separate from their parents and the online world is a good way to do it. Teenagers do not really think about privacy and tends to post anything online. They post events, pictures and feeling for everyone to see, while back in the days a secret diary was kept. Teens do not realize that once they hit “send” they are broadcasting their message to thousands of people. A study from Pew Study mentioned that 50% of teens have replied back to strangers. Similarly technology allows teen to get validation from any weird or antisocial attitude or belief they might have. Furthermore parents wants to help their kids but they do not know how to do it, and if they do they are not comfortable spying on their kids. For some online bullying is the same as bullying when no computers existed. || Deductive
1
edit