Preview
Preview

Facebook in Privacy Breach Essay

:: 8 Works Cited
Length: 2173 words (6.2 double-spaced pages)
Rating: Aqua      
Open Document
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Who would have thought that in a few years facebook will become the main social meeting place for millions of people around the world? Facebook, is a social phenomenon with a dimensionless scale effects both positive and negative. Facebook has also generated interest among scholars and researchers who study its effects on the different layers of our life. As many studies suggested and my own life experience, Facebook can have some negative impact on romantic relationships, self-esteem, identity theft and other dangers to safety that result from an invasion of privacy. There are ways to minimize these negative outcomes, which we should be aware of.
Mark Zuckerberg, an undergraduate student from Harvard University, in 2004 created one of the most popular social networking in the world, Facebook. Zuckerberg used his sophomoric sense of humor “that led him to create the site as a type of "hot or not" game for Harvard students, where website visitors could compare two student photos side-by-side and let viewers decide who was "hot" and who was "not".” (Bellis). Facebook became extremely popular in Harvard, so it extended to other universities such as Stanford, Columbia, and Yale. A year later its creation Facebook became available to high-school students and a year later, in 2006, it became available to everyone with a valid email address and above the age of thirteen. As of May 2, 2013 Facebook reached 1.11 billion users in the world and it is available in seventy different languages. (Wikipedia). The United States is the country with the most Facebook users in the world with almost one hundred sixty six million users. From its creation time to present days, Facebook has significantly developed and gradually became an important elem...


... middle of paper ...


...ing."Developmental Psychology 48.2 (2012): 380-369. PsycARTICLES. Database. 10 Nov. 2013.
Steel, Emily, and Geoffrey A. Flower. “Facebook in Privacy Breach.” TheWall Street Jurnal. The Wall Street Juurnal. 17 Oct. 2010. Web. 17 nov. 2013
Tong, S. T., Van Der Heide, B., Langwell, L. and Walther, J. B. (2008), Too Much of a Good Thing? The Relationship Between Number of Friends and Interpersonal Impressions on Facebook. Journal of Computer-Mediated Communication, 13: 531–549. doi: 10.1111/j.1083-6101.2008.00409.x
Wikipedia contributors. "Facebook statistics." Wikipedia, The Free Encyclopedia. Wikipedia, The Free Encyclopedia, 30 Nov. 2013. Web. 10 Nov. 2013.
Wright, James . "Facebook and Cyberbullying." Stopbullying Blog. U.S. Department of Health & Human Services, 29 10 2013. Web. 22 Nov. 2013. .



Click the button above to view the complete essay, speech, term paper, or research paper








This essay is 100% guaranteed.


Title Length Color Rating  
Essay about Why Privacy Matters - The word privacy is thrown around so much it’s kind of hard to understand what it truly means. As a high school student, one hears a lot of stories with the word privacy in them. A girl tells her best friend a secret and the next day the whole school knows about it. Then everyone hears the girl complain about how much of an invasion of privacy that the whole situation is. Many people would agree with this. These people would probably say that what one wants to stay private, should do so. These people aren’t exactly wrong but they aren’t really right either....   [tags: privacy, security breach]
:: 6 Works Cited
1149 words
(3.3 pages)
Strong Essays [preview]
American Rights to Privacy Essay - ... Safety is a big concern among the American people, so if the government says they are doing something to protect them, people will believe it, even if the government is stretching the truth. The only thing that the constitution directly states about privacy is against unwarranted search and seizure, which kind of counters the Patriot’s Act.(#5) The patriot act does allow the NSA to search your laptop, phone, or other electronic devices without a warrant, which does violate that part of the constitution.(#10) Which begs the question, how are they getting away with making these acts when the constitution prohibits their actions....   [tags: constitution, technology, privacy] 641 words
(1.8 pages)
Better Essays [preview]
Breach Brings Scrutiny Essays - Ben Worthen authored Breach Brings Scrutiny in a published WSJ.com article of April 5, 2011. The article discusses security breach compromise of customers’ data used by Epsilon Data Management, LLC, for marketing purposes. Worthen (2011), describes the breach event, its ramifications on affected companies and customers, and urges companies to address protecting customers’ information as insignificant as names and email addresses. The main characters in this article include Epsilon Data Management, LLC, a division of Alliance Data Systems Corp., which provides marketing mail campaigns to a myriad of companies....   [tags: Information Technology ]
:: 2 Works Cited
1179 words
(3.4 pages)
Strong Essays [preview]
Privacy and The Internet: Life of Others Essay - As the explosion of internet social media based companies has grown the issue of privacy has been at the forefront of many people’s mind. Privately held information can easily become available to people and be negatively used due to the digital age we are in today. Two of the leading companies in social media are Google and Facebook. This case study analysis explores both Google and Facebook’s privacy policies and issue that has stemmed from it. Google and Facebook recently have taken a lot of backlash from people and governments regarding the way they handle the information they have gathered from the consumers that use their products....   [tags: The Internet]
:: 2 Works Cited
1214 words
(3.5 pages)
Strong Essays [preview]
Personal Privacy and the Government Essay - The United States government is up to its ears in the personal information it has collected from its citizens. Americans are becoming increasingly “aware of these slowly eroding walls of privacy,”(Hirsh) and more than half polled admit concern “about the overall accumulation of personal information about them “by […] law enforcement, government, […] and other groups,” though “they accept it as an unavoidable modern phenomenon” (Hirsh). The question is, how far is too far to trust the government with the collection, proper storage, and usage of this information....   [tags: personal information, citizens, governemnt]
:: 2 Works Cited
1395 words
(4 pages)
Strong Essays [preview]
Digital Privacy Concerns Essay - ... On January 17th of 2014, President Obama expressed his stance on US electronic surveillance programs in a speech at the US Department of Justice. While voicing the usefulness of such approaches towards maintaining our safety, he also publicized a number of improvements such as querying, or the obtaining of information from a database, becoming subject to judicial examination. However, his proposed revisions, although initially well-received, have not actually done much to limit data seizure rather than limit its uses; and not to mention the president also failed to address the other acquisitions made under Section 215....   [tags: violation of human rights, government surveillance]
:: 16 Works Cited
1567 words
(4.5 pages)
Term Papers [preview]
Edward Snowden: There is no Online Privacy in this Technological Era Essay - ... On release, they can request information on the person who testified against them, and harass them. Some companies sell information to companies who offer specific services. An article titled Privacy Tools: Opting Out from Data Brokers written by Julia Angwin spills the beans on companies using personal data to target groups of people. Angwin speaks on how data brokers sell mailing lists to other companies. “[P]rivacy expert Pam Dixon testified in Congress that she had found data brokers selling lists with titles such as “Rape Sufferers” and “Erectile Dysfunction sufferers.”” (Angwin)....   [tags: nsa, computer networks, information]
:: 5 Works Cited
935 words
(2.7 pages)
Strong Essays [preview]
Browsers and Third-Party Cookies Essay - I. Introduction While third party cookies enable new web functionalities it also enables new risks exposure of a person’s web history. A person’s web history can inevitably reveal personal information which if exploited could lead to bad stuff(job opp/id theft/deals/black mail/embarassement). Thus, privacy should not be an option, it should be the default. Accordingly, browsers should disable third-party cookies by default; require users to "opt-in" to 3rd-party cookies). II. How third party cookie works and the underlying web economics Third party cookies enables single-sign-on authentication (e.g....   [tags: privacy, safety, ] 655 words
(1.9 pages)
Strong Essays [preview]
Essay about Ethics of Google Glass: Spying through Social Media - The code of Association of Computing Machinery (ACM) they have a code of ethics that members follow. The code has twenty-four statements with four sections that covers; ethical considerations, in the section one, professional conduct in section two, leadership and their role is covered in the third, and the principles of compliance is in section four. The creators of Google Glass have broken two of its own codes the first one is Code 1.2 Avoid harm to others. This means that they should not harm or injury or have negative consequences to any person....   [tags: personal information breach]
:: 7 Works Cited
897 words
(2.6 pages)
Better Essays [preview]
Essay about Should The Government Effectively Censor the Internet? - ... As a democracy we should have no censorship lest we follow Chinas example and start dropping the hammer on any poor Joe who has the guts to question the government. As a democracy the government has to have the people on its side because we are the ones who give them the power to make decisions that affect all of us. But if they start to pass bills into law that allow monitoring of citizens on the web. That would allow agencies to spy on anyone because they might do something. One example of this is the recent Cyber Intelligence Sharing and Protection Act that was passed by the House of Representatives in April 2013....   [tags: reducing privacy, freedom of speech] 1037 words
(3 pages)
Strong Essays [preview]