英國碩士新媒體的隱私問題及對策分析
發(fā)布時間:2016-06-08 22:24
1. Introduction介紹
例如,臉書,推特和LinkedIn已經成為數以百萬計的人深受使用,包括他們的家庭,朋友,同事。在7月,臉書擁有7億5000萬的用戶在世界各地。推特擁有2億5000萬用戶,在LinkedIn擁有115用戶(谷歌,2011)。
雖然新媒體工具有不同的風格、功能、布局和目標,他們大多讓人創(chuàng)建個人信息;更新狀態(tài)或博客和上傳視頻,照片,音頻剪輯。此外,用戶還可以編輯他們可以連接到的好友列表,分享意見,并發(fā)送個人信息。同時,用戶還可以用同一興趣旅游經歷和事件,邀請他人和參與此活動的人(人&丹尼斯,2011)。
此外,在新媒體的活動可能是相當與揭示了活動信息。許多用戶可能會分享非常親密人和透露信息,并有詳細的資料,和關于他們的個人資料。這種信息可能包括教育,婚姻狀況,個人識別,地址等,實際上,這種信息共享的個人用戶和來自他/她的朋友的評論,,表明洞察用戶的道德,價值觀,自我形象,和偏見。
With the development of digital, network,mobile and information technology, it becomes easier for people to acquire and broadcast information. Based on these technologies, a new kind of media comes out with the feature of interactive broadcasting. We call it ‘newmedia’ (Zhang Huizi 2010:7).
For example, Facebook, Twitter and LinkedIn have become very popular among millions of people who use them tointeract with their family, friends, and colleagues. For July2011, Facebook owns 750 million users in all over the world.Twitter owns 250 million users while LinkedIn owns 115 millionusers (Google, 2011).
Although new media tools differ in styles, functionality, layout and target, most of them allow people to create personal information; update statusor blog and post videos, photographs, andaudio clips. Furthermore,users can also edit lists of friends who they can connect to,share comments inthe profiles, and send personal messages. Meantime, users can also establishteams of people with sameinterests and post events and invite others to theseactivities(Man & Denis, 2011).
Furthermore, activities in new media may be quite revealing. Many users may share very intimate and revealing and detailed information about their personal profiles. This kind of information may involve education, marital status, personal identifiers, address, etc. Actually, this kind of information shared by the individual user and the comments coming from his/her friends, indicate insight into the user’s morals, values, self-image, and biases. Even many people can be very explicit in telling where they work, how much they like the current job and company, their education background even back to the primary school, their political opinions as well as the interests and hobbies for the time being(Man & Denis, 2011).
On the other hand, new media tools mean usersare able to not only knoweverything regardingtheir friends, but also who their friendsknow. It is very common for a userin a new media site to ownmore than 300 friends in all over the world. There istruly a wealth of information in the new media.
In fact, the explosion of new media tools has not onlytransformed the way people communicate with each other, but also introduceda new way that organizations can search orinvestigate the mass people. In fact, more and more universities and agencies for lawenforcement are adopting the tools for different kinds of searchand investigation purposes. As a result, concerns are risingon organizations’ access to people’s private data. Meanwhile, users are more and more worried about privacy issues on new media(Man & Denis, 2011)..
So itis very important for users to be aware of the quite high potential privacy issueson personal information sharing in the new media tools.
According to news report from China Daily (2013), we all know a Christmas greeting in 2013 from Snowden, a very famous ex-member of CIA, who escaped from the USA and now in Russia. It was said by him that “one huge global monitor system was setup by the government of America to monitor everybody in this world and we were warned by George Orwell’s written 1984 which said we were monitored by the people through books, microphone and TV, however this was barely worth mentioning comparing with the action conducted by the USA government. We all have one mobile phone in our pocket, so we can be located no matter where we go. It is really one question that one child, who is born nowadays, will grow up in one world without privacy and never knows what is his private time and never knows what ideas cannot be recorded and analyzed. Privacy is so important that it decides who we are and who we will become. The government shall stop the actions of monitoring the public.”(2013)
His greeting was great sensation in the world, which make even everybody think about the issue about privacy. In fact this has becomes one issue that we cannot avoid. We can see that the emerging new social network technologies themselves are prone to leaking private information(Tecent Technology 2010); due to the drive of the economic profit, many companies are striving to collect consumers’ relevant information; due to the political and military factors, we are monitored by CIA/NSA or other Safety agencies from other countries.
In the network society, we should be closer to the truth as we can resort to more tools to acquire the required information through searching engine and web mining tools etc. (2010) However the advance of the technology does not weaken the manipulation of the citizens’ privacy from the organizations with public power, but increase the possibility of privacy invasion in the interpersonal communication. (2010)
To cope with this more and more severe challenges from so many aspects, it is really necessary to research and analyze the privacy issue more systematically and try to find out more proper countermeasures.
2. Literature review
2.1 New media and information ethics
2.2 Inconsonant laws with the new technologies
2.3 New media privacy invasion
2.4The private domain on privacy
2.5Social control and research on the monitoring
2.5 Summary
3. Methodology
3.1 depth interview
3.2 questionnaire survey
3.3 case study
3.4 discourse analysis
3.5 Online / web analysis
4 Findings
4.1 The findings in the depth interview
4.2 Findings from questionnaire survey
4.3 Findings from discourse analysis
4.4 Findings from case study
4.5 Findings from online / web analysis
5 Discussion and analysis Privacy issue in business environment
6 Countermeasures
Bibliography注釋
Anthony Giddens (2001) The uncontrolled World. Jiangxi Renmin Press.
Baidu(2014)PRISM Gate. Available at: baike.baidu.com.
Berners-Lee, Tim (2000) Weaving the Web: The Past, Present and Future of the World Wide Web by its Inventor. London: Texere.
Bimber, Bruce. T. (2003)Information and American Democracy: Technology in the Evolution of Political Power. Cambridge: Cambridge University Press.
Brian Shapiro and Richard C. Baker (2001)Information Technology and the Social Construction of Information Privacy.Journal of Accounting and Public Policy, 20, 295-296.
China Daily (2013)One Christmas greeting from Snowden. Available at:
Christopher Loeffler (2012) Privacy issue in Social Media. IP Litigator,12-18
Cooley, Thomas McIntyre (1880)The General Principles of Constitutional Law in the United States of America. Boston: Little, Brown, and Company
E.A.Rose (1990) Social Control. Huaxia Press.
Feng Huang Net (2014)Snowden Uncovered the Surveillance Project of America.
Google (2011) Social network user statistics as of July 2011
Guo Xiaoping (2003) Private Topic: Expansion to the Mass media for the Current Chinese Private Discourse(In Chinese). New University.
Holtzman, David H. (2006)Privacy Lost: How Technology Is Endangering Your Privacy.San Francisco: Jossey-Bass.
Jeffrey Rosen (2001)Out of Context: The Purposes of Privacy.Social Research 68, 215. Jiang Hong, Xu Jian (2006) Introduction to New Media(In Chinese). Shanghai Jiao Tong University Press, 18Lane, Frederick S. (2009) American Privacy: The 400-Year History of Our Most Contested Right. Boston: Beacon Press.
Ma Jiahui (2010) The Crisis of Being Known in the Surveillance Society (In Chinese). Finance, 17
Man Qi, Denis Edgar-Nevill (2011) Social networking searching and privacy issues, Information security technical report,74-78
Michel Foucault (2007)Discipline and Punish. Sanlian Bookstore, 57
Jeff H. Smith (1994)Managing privacy: Information Technology and Corporate. University of North Carolina Press, 7-9.
Jerry Kang (1998) Information Privacy in Cyberspace Transactions .Stanford Law Journal, 50, 1206-1208.
Joseph Rosenbaum (2003) “Understanding Privacy in an Age of Information” in Privacy Handbook: Guidelines, Exposures, Policy Implementation, and International Issues. Hoboken, NJ: John Wiley & Sons, 304-306
Kadushin, Charles (2012)Understanding Social Networks: Theories, Concepts, and Findings .Oxford: Oxford University Press.
Kieran, M., D. E. Morrison and M. Svennevig (2000) ‘Privacy, the Public and Journalism: Towards an Analytical Framework’, Journalism: Theory, Practice and Criticism 1(2):145–69.
Kieran, M., D. E. Morrison and M. Svennevig (1997) Regulating for Changing Values, Research Working Paper No.1. London: Broadcasting Standards Commision.
Pember, Don R. (1972)Privacy and the Press: The Law, the Mass Media, and the FirstAmendment. Seattle: University of Washington Press.
Petronio, Sandra (2002) Boundaries of Privacy: Dialectics of Disclosure. Albany, NY: StateUniversity of New York Press.
Renée Marlin-Bennett (2004) Knowledge Power: Intellectual Property, Information, and Privacy. Boulder,Colorado: Lynne Rienner Publishers, 14, 169-170.
Richard S. Murphy (1996) Property Rights in Personal Information: An Economic Defense of Privacy, Georgetown Law Journal, 84, 2383-2384.
Robert C. Post (2001) “Three Concepts of Privacy,” Georgetown Law Journal, 89, 2095-2096.
Shan Jigang, Gan Shaoping, Rong Minde (2008) Applied Ethics: Economy, Technology and Culture(In Chinese). Renmin Press, 156.
Sina Finance (2013) The Cover Story of Time: Freedom and Safety
Stewart, David W. and Paul A. Pavlou (2002)From Consumer Response to Active Consumer: Measuring the Effectiveness of Interactive Media. Journal of the Academy of Marketing Science, 30, 376.
Tencent Technology (2010) eWeek: The Emerging of Social Network makes the Privacy does not Exist Any More.
The First Finance Weekly (2013) The Internet Vast.
Wang Junxiu (2004) Border of the Surveillance (In Chinese). Doctoral Dissertation, Sociology of China Social Academy.
Wang Lilian (2013) Rise of New Mediaand its ImpactonAmericanPrivacy. Master Dissertation, Shanghai International Studies University.
Wellman, Barry, and Caroline Haythornthwaite. (2002) The Internet in Everyday Life. Oxford, UK: Blackwell Publishing.
Xiang Liling, Xue Quansheng (2007) Some Questions’ Investigation on Mason’s PARA Information Theory (in Chinese), Intelligence Theory and Practice, 2
Xinhua Net (2011) How to Deduce the Address of Wang Luodan. Available at: news.xinhuanet.com.
Xiong Chengyu, Liao Yiwen (2003) New Media: The Damocles Sword in Iraq War(In Chinese)China Journalism, 5
Xu Xun (2003) Secret Inquiries and Candid Camera: the Journalists are Around You. China Broadcasting and Television Press.
Young Chun Kim (2006)Privacy and Communications Technologiesin AmericanHistory: A ComparisonofConceptsofPrivacyinRelationto Changing CommunicationsTechnologies. Doctoral Dissertation, The Pennsylvania State University.
Zhang Huizi (2010)The Invasion of Citizens’ privacy and Protection Research in the New Media Age (In Chinese). Doctoral Dissertation, Huazhong University of Science &Technology.
Zhao Yongzhong (1999) Privacy: The Navigation Mark of information economy. Internet Weekly.
本文編號:55010
本文鏈接:http://www.sikaile.net/wenshubaike/lwfw/55010.html
最近更新
教材專著