Blogging and Privacy

College
Other types
Miscellaneous
Pages 5 (1255 words)
Download 0
In recent years, a blog, short for web blogs, has become very popular type of personal websites. Such 'blog boom' is due to the fact that anyone can simply set up a blog by using easy-to-use software with only a few clicks. After they create a basic structure of blogs, they can immediately post any material that they want to share with others such as photos, diaries, and video clips…

Introduction


Ellen Simonetti (2004), a Delta Air Lines flight attendant, for example, was fired after she posted some problematic photos of herself in uniform on her blog. Simonetti might want to show her blogger friends her daily life as a flight attendant through those pictures, but unfortunately, her pictures became a reason for losing her job. In general, visiting Simonetti's blog and looking up her pictures are exactly what most bloggers usually do. Yet, if someone would report her pictures to somebody without her permission, and so Simonetti might lose her job, this is certainly a violation of her privacy. If so, in what ways might Simonetti protect her personal information and privacy
Regardless of any possible personal security issue, the number of blogs is still steadily increasing, and the purposes of using blogs is becoming more diversified from one blog to another blog. Hence, taking such diversity into account, bloggers must carefully consider the level of disclosure of personal information based on the content posted and the targeted audience.
The rest of this analytic argumentative paper is organized as following. ...
Download paper
Not exactly what you need?

Related papers

Privacy in Cyber Space
However, the internet has also been of significant advantage to us in many ways. Where many of its services have benefited us in numerous ways, the email has had a significant character, besides other uses, in the commerce and trade sector. Email has proved to be the information and communication "Backbone" in most of the organizations (ColdSpark, 2007). It has been successfully used to facilitate…
Blogging and Privacy
Ellen Simonetti (2004), a Delta Air Lines flight attendant, for example, was fired after she posted some problematic photos of herself in uniform on her blog. Simonetti might want to show her blogger friends her daily life as a flight attendant through those pictures, but unfortunately, her pictures became a reason for losing her job. In general, visiting Simonetti's blog and looking up her…
The Future of Privacy
Systemic instruments come from the engineering process from networks to machines to computers to codes to protocols. These are the systems that are built into machines. Collective instruments come from government policy applied to provide protection of goods and services. These are the instruments that are built into processes. The instrument of individual empowerment requires individuals to…
Employee privacy rights
Many employees stealing from companies send the purloined data to their personal e-mail21 percent burned the information onto CDs." Due to these technological security issues, employers feel the need and have the capability to monitor their employees. E-mails, voice mails, the Internet, telephones, and computers can be use for unregulated monitoring. Employees say this is an invasion of their…
Privacy and Digital Investigations
Therefore, upon the detection of suspicious computer incidents, the organization immediately launches a forensics/digital investigation which is fully compliant with a policy which has been jointly drawn up by both the legal and the IT departments. This report will begin with a brief overview of privacy considerations, following which it will describe the organization's policy and highlight both…
Law of Privacy
They did not identify a new tort, but rather a new right that ought to be protected by tort law. That new right in turn was derived from an old right, perhaps a natural right, namely the right to be let alone. In light f these origins, it would have been surprising if the tort protection given to privacy remained confined within the narrow bounds f public disclosure. The very theory f torts upon…
Work, Privacy, and Autonomy
Privacy, on the other hand, involves two things. First is control of information about ones self, and the other, some control over who can experience or observe the person. An example given is that privacy in relation to a spouse is different from privacy in relation to an employer. As proposed by Kupfer, privacy and autonomy are related to each other in that autonomy requires an awareness of…