Blogging and Privacy - Essay Example

Only on StudentShare

Extract of sample
Blogging and Privacy

Ellen Simonetti (2004), a Delta Air Lines flight attendant, for example, was fired after she posted some problematic photos of herself in uniform on her blog. Simonetti might want to show her blogger friends her daily life as a flight attendant through those pictures, but unfortunately, her pictures became a reason for losing her job. In general, visiting Simonetti's blog and looking up her pictures are exactly what most bloggers usually do. Yet, if someone would report her pictures to somebody without her permission, and so Simonetti might lose her job, this is certainly a violation of her privacy. If so, in what ways might Simonetti protect her personal information and privacy
Regardless of any possible personal security issue, the number of blogs is still steadily increasing, and the purposes of using blogs is becoming more diversified from one blog to another blog. Hence, taking such diversity into account, bloggers must carefully consider the level of disclosure of personal information based on the content posted and the targeted audience.
The rest of this analytic argumentative paper is organized as following. ...Show more

Summary

In recent years, a blog, short for web blogs, has become very popular type of personal websites. Such 'blog boom' is due to the fact that anyone can simply set up a blog by using easy-to-use software with only a few clicks. After they create a basic structure of blogs, they can immediately post any material that they want to share with others such as photos, diaries, and video clips…
Author : qmraz
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Blogging and Privacy"
with a personal 20% discount.
Grab the best paper

Related Essays

The Future of Privacy
Each instrument may be implemented with others to achieve multiple levels of security. Technology itself is a powerful instrument in global information systems protection (Raab 2004). Privacy-enhancing technology (PET) has become assorted and overlapping over the years.
1 pages (250 words) Essay
Employee privacy rights
Studies have found that due to the use of technology, it is much easier for workers to steal important information from their employer. Workplace Data (2004) states that a "survey found that 30% of people had stolen a contact database when they left an employer.
2 pages (500 words) Essay
Privacy and Digital Investigations
The law compels the placement of this emphasis and, indeed, if investigations indicate that the organisation was, in any way, negligent in the execution of its responsibilities towards the protection of patient privacy and confidentiality, the organisation is held liable.
5 pages (1250 words) Essay
Law of Privacy
Prosser and others have suggested that Warren and Brandeis really only had the second tort, public disclosure f private facts, in mind.1 This evaluation fundamentally misses the conceptual approach to tort law advanced by Warren and Brandeis in finding a right to privacy and elaborating some aspects f that right.
7 pages (1750 words) Essay
Work, Privacy, and Autonomy
The paper operates mainly based on research questions which can be stated as follows: How does Lippke respond to the argument that the property rights of owners and stockholders should take precedence over the privacy rights of employees? 
6 pages (1500 words) Essay
Comparison essay on the two short stories "Janus" and "Roman Fever"
st published in New Yorker magazine in May 27,1985.There is a gap of about fifty years between these two Stories, but the human tendencies, social problems and especially the human relationships are somewhat similar to each other. The foundation of both of these stories is the
4 pages (1000 words) Essay
Digital identity, technology, and privacy
Once bloggers or blog users finish uploading the contents, they are now ready to communicate with other bloggers by regularly visiting other blogs, looking up some
6 pages (1500 words) Essay
Privacy
widely discussed by the public with questions such as what level of privacy exactly should be accommodated and when is it ok for one to breach another individual’s privacy (Quinn, 2012). Privacy is also related to a number of other subjects such as anonymity which is an
5 pages (1250 words) Essay
Find out how much would it cost
to get a custom paper written by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT