Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Modern Communication 1
ALVAREZ, Andrea B.
April 5, 2010
Table of Contents
I. Introduction Pages 1 - 4
Recommendation
Bibliography
Appendices
Chapter 1
A. Introduction
In the past years, the World Wide Web has provided the internet users
assistance.
become increasingly popular among the internet users whether they are aged
virtual community for people which allows them to create their profile and
share information with other members of the community, examples of this are
Many studies are coming out about the importance of social networking
websites. These studies shows that people with a strong social networking
activity have a great chance of being successful it is because they have more
people attached to them then maybe we can ask to get some favor from
Some people enjoy having a large social network while others prefer to
disadvantages. There are large numbers of advantages that we can get from
using social networking websites like getting good referrals, getting good
getting good timely help and etc. on the other hand , we can also have
modern life, but its benefits are accompanied by a darker side. Researchers
said that many of us replace real-life social interaction with online chat rooms
and social networking sites which causes addiction that leads to depression.
managers of these sites are quite unable to keep track of all of their members.
This means that though there might be rules governing these sites; members
are not always keen in complying with it. Some members of these websites
are victims of profile hacking where the hacker takes personal information and
post it as their own or worse, ruin the person’s reputation. There are ways to
avoid being quarry to these things, for example, one should not share
Beware of sites that offer some sort of reward or prize in exchange for
Networking Websites.
The researchers will conduct this study so that by the end of this research
networking websites?
A. Hypothesis
Null Hypothesis
its user, its ability to protect users is questionable because of the possibility
Operational Hypothesis
successful life.
Networking Sites about the safety of their privacy; especially to all the minors
of both genders with ages ranging from 10 years old and above or even
younger who are more in danger of being a victim to online crimes. This
Chapter 2
researchers' study both from foreign and local sources. These articles are
also used as reference material for this research paper. This chapter also
A. Foreign studies
who have their profile on a social networking sites catered on their college.
He then evaluated the amount of information that they had entered to the
sites privacy settings and show the potential aspects which may occur on
their privacy and it shows that only little percentage of users permeable
privacy settings.
classroom are allowed for free. Copies are not given for the sense of
making business or marketing and that copies bear this notice and the
payment.
known and have been adopt by tons of people. After the advent of the
internet on 1960's the interest of computer based education had rose well.
usage of multi different sites. The soft ware web blog2 now impart with the
ideas through the sites imparted individual profiles for introducing their
Viral growth of expanding at rates topping 20% a month is not usual for
Liu and Maes studied that millions of self descriptive profiles are web-
privacy. In certain affairs the user only wants to be known by only small
amount of peers and groups and not by someone else. The user is willing
knows us well.
nodes in a network. Networking theory has been used to find how distant
nodes can get connected through random ties. Strahilevitz highlighted the
privacy he suggest that the parties should expect to follow initial disclosure
consideration of how the files will flow from node to node in others social
network should also inform that person's expectation for privacy of files
First, offline social networks are made of ties that can only be
People are indicated as friends even though the users are not
particular know or trust the person. Second, while the number of strong
ties that a person may maintain on a social networking sites may not be
“interactions”.
able to access her personal information, while at the same time, the
websites that do not openly expose their users’ identities may provide
enough information to identify the profile’s owner. Since users often re-use
whose extension in time and space may not be fully known or knowable by
participant .finally the easiness of joining and extending one’s network and
the lack of basic security measures at most networking sites make it easy
for third parties to access participant’s data without the site’s direct
collaboration.
Risk range from identity theft to online the physical stalking from
some who believe that social networking sites can also offer the solution to
online privacy problems. While privacy may be at risk in social networking
revealing data to strangers may appear larger than the perceive costs of
or also the services own users interface that may drive the unchallenged
SNS’s they discussed the articles in this special section and conclude with
10
space, facebook, cyworld, and bebo have attracted millions of users, many
of whom have integrated these sites into their daily practices. As of this
writing these are hundreds of SNS’s with various technological
identities sites also vary in the extent to which they incorporate new
and photo/video-sharing.
and scholarly contexts for articles in this collection. The writer of this article
began by defining what constitutes a social network sites and then present
personal interviews and public accounts of sites and their changes over
bounded system
11
,articulate a list of other users with whom they share a connection and
view and traverse their list of connections and those made by others within
the system the nature and nomenclature of these connections may vary
from site.
While the researchers use the term “social network” to describe this
phenomenon , the term social networking sites also appears in the public
discourse, and two terms are often chose not to employ the term
possible on these sites it is not the primary practice on many of them, nor
communications (CMC).
What makes social network sites unique that they enable users to
articulate and make visible their social networks? This can result in
that is often not the goal, and these meetings are frequently between
12
The profile generated using the answers to these questions, which
me” section.
sites allow users to most sites also encourage users to upload a profile
multimedia content or modifying their profile’s look and feel others, such as
discretion.
Sites like MySpace allow users to choose whether they want their
by default , users who are part of the same network can view each other’s
their network.
others in the system with which they have a reaction ship. The public
the network graph by clicking through the friends list. For instances some
my space users have hacked their profiles to hide the friends display and
13
Most SNS’s also provide a mechanism for users to leave message
mail, while both private messages and comments are popular on most of
vary greatly in their features and user base. Some photo sharing or video-
technology.
linguistics groups although this does not always determine the site’s
,education level or other factors that typically segment society even if that
network site launched in 1997. profiles existed on the most major dating
sites and many community sites AIM and ICQ buddy lists supported lists
of friends, although with their high school or college and surf the network
14
for others who were also affiliated but users could not create profiles or list
of friends until years later six degrees was the first to combine these
features.
and send messages to others while six degrees attracted millions of users
reports that he first introduce the site to his friends –primarily members of
personally and professionally they believe that they could support each
MySpace for S580 million (BBC, 2005) in July 2005. Then, different issues
15
came in MySpace. There were series of sexual interactions
minors. A moral panic for sexual consumers spread so fast even though
A global phenomenon
While MySpace was having the media’s attention in the U.S. and abroad,
Pacific Islands, Orkut in Brazil before in India (Madhavan, 2007), Mixi was
Poland embraced Grono, Hi5 captured Latin America, South America, and
Europe, and Bebe was adopted in the United Kingdom, New Zealand, and
college networks only unlike with previous SNS. Facebook began in early
with other schools, those users were required to have their university email
16
address with those institutions, a requirement to keep the site as an
up did not mean that the new users could easily access users in closed
SNSs, Facebook users are unable to make their full profiles public, it also
has the ability for others to build “Applications”, which allow users to
research states that SNS’s are becoming popular worldwide there are still
no reliable sources regarding the number of people who are using SNS.
with others. Donath and Boyd (2004) extended this to suggest that "public
17
While most sites encourage users to construct accurate
friends.
imagined audience to guide behavioral norms. Other work in this area has
devices (boyd and Heer, 2006) and the extent to which the attractiveness
behavioral data. Profile and linkage data from SNSs can be gathered
18
SNS researchers have also studied the network structure of
Friendship. Finally, Liu, Maes, and Avenport (2006) argued that Friend
connections are not the only network structure worth investigating. They
meeting new people. These relationships may be weak ties, but typically
there is some common offline element among individuals who friend one
Given that SNSs enable individuals to connect with one another, it is not
Privacy
19
data from SNSs to craft a "phishing" scheme that appeared to
originate from a friend on the network; their targets were much more likely
(2006) argued that the fourth amendment to the U.S. Constitution and
because of the amount of visits it received on the past few months which
the course of the past year while Twitter catapulted to third place from
being 22nd.
amount of time they dwell there are considered key indicators of how well
20
Facebook and Twitter have registered increases in both categories
while visits and time spent at MySpace have stagnated or slid during the
they upload on the site. The users can now choose selected users or
friends who can view the videos or pictures that they upload. These
required to set settings with a software tool that lets them specify who can
21
Chapter 3
Research Methodology
A. Research Design
study because of the methods that they will use in gathering needed data
and information. They plan to gather facts through books and internet
websites, conduct surveys and interviews and after these steps, analyze
B. Sampling Technique
FEU-East Asia College, both girls and boys, taking up B.S Electronics and
(10) students and ten (10) employees outside FEU-EAC which are regular
22
Engineering, another 10 students are from B.S. Information and
Technology, and 10 students are from B.S. Computer Science. The survey
is given to students both male and female with ages ranging from 16 years
employees outside FEU-EAC who are regular users of computer and the
internet. The 10 students that are surveyed have ages ranging from 12 to
19 years old and both male and female. As for the 10 employees, these
respondents’ ages range from 18 years old to 24 years old, with genders
Social Networking Website and the ways to avoid being quarry to these
crimes.
from March 15, 2010 (Monday) to March 19, 2010 (Friday). They gave
using the internet and not belonging to FEU-EAC campus. They also
23
gathered information through the use of books and the internet.
F. Statistical Treatment
the percent of surveyed persons with different ages, genders, and answers
P=N ÷ R ×100
24
Chapter 4
Interpretation and Analysis of Data
This chapter will be discussing about the findings based on the survey
researchers. The findings that are obtained are then related to the privacy
this study.
users who knows how to protect their privacy by the activities they do in their
profile. Furthermore, this also aims to determine the reason on why they use
Social Networking Sites, the problems that they have encountered in using
SNS and the other social networking sites they use aside from Facebook.
25
In this graphical representation, the figure is divided into two divisions
showing the percentile rank of people who uses social networking sites out of
not using social networking sites. This shows that 94% out of the fifty
remaining 6% are not. These findings manifests that more people considers
26
The pie chart illustrates the total number of females and males who
out to be using SNS which makes out about 50% of the over-all population of
the survey. This figure is greater to those of the males’ who only totaled to 22
males and 1 female do not use SNS. This makes up the remaining 6% of the
The graph illustrates the ages of the respondents who uses social
networking sites. It is clear that SNS are more distinguished with teenagers
respondents in the survey. Users with ages 19 to 21 years old, however, are
years old. Social Networking Sites are not much-publicized with person aging
15 years old and below. This is based on the statistics from the survey which
showed that only 2 out of the 50 people have ages of 10 to 15 years old.
Furthermore, the group age 23 to 25 years old who are members of a social
28
The chart above shows the statistics about the reason an individual
who do not use SNS to the total number of the respondents so the total of all
use an individual seeks in SNS is its’ communication feature like chatting and
communicating through wall posts or comments, 15 people say they use SNS
for this purpose. The use of SNS for gathering friends came up third with only
6 people saying they use SNS to widen their group of friends. Only 2 out of
the 47 people who use SNS in the survey say they use social networking sites
29
This graphical analysis illustrates the files that are most uploaded by
pictures to their SNS profile. 15 of these individuals also upload videos in their
profile together with the pictures. The survey results also showed that 24
SNS profile, these are information such as house address, cell phone
Uploading these personal files to the World Wide Web may very well
because once these files have been submitted it becomes public property.
30
The graph above shows the percentage of SNS users who have
encountered problems while using their SNS profiles. Based on their answers,
the researchers found out that 26% or 13 out of the 50 people interviewed
said that they have not yet experienced having problems in Social Networking
Sites like Facebook. Though this may be a large number of people who have
31
problems regarding their SNS profile, humiliation and criticism is the most
common problem online. A total of 15 people said that they have experienced
humiliation and criticism from people who are both their acquaintances and
also from total strangers. These criticisms are either directed to the person’s
files or his opinion. The second most common problem of SNS users is
stalking. Based on the survey, 14 people have come across stalkers or people
who follow another person avidly because of vindictive purposes. The third
On the other hand, online abuses such as online sexual harassment and
32
The researchers found out that only 48% of the over-all surveyed
population or 24 people out of 50 reads the Terms and Conditions that govern
a social networking website. Terms and Condition are like laws posted upon
the first stage of registering in any SNS so that a person may read and obey it
within the SNS community. This statistic shows that a great number of users
do not bother to read the laws posted on their SNS profile and are therefore
33
their answers, a total of 26 people say they protect their privacy through
are also included to the 25 individuals who try to protect their privacy by
avoiding strangers to be part of their group of friends. The researchers also
found out that 2 SNS users know that their privacy is at risk but does not do
34
Based on the findings gathered from the survey that the researchers
facilitated, Facebook users also use other Social Networking Sites like
Friendster, Multiply, etc. These findings are represented through the graph
above. 32 of the respondent said that they are using Friendster, some of
these respondents may also be a part of the 16 persons that are discovered
individuals also use Twitter and 10 respondents use other Social Networking
Sites.This figures manifests that a person may be a part of more than one
35
Chapter 5
members because of its use to people of all nationalities, ages, genders, and
upload videos and/or pictures, play games or add up friends if they desire,
person risks his privacy unknowingly because their uploaded files (e.g. photos
or videos) will be accessible to the public whether they like it or not. These
problems result to doubt on the SNS’s ability to protect its member’s privacy.
be avoided if the user and the site manager act together against violators.
SNS are not completely safe despite laws on website usage because of the
great number of members who work on it. SNS managers cannot always track
Summary:
36
users have a lot of option to choose from depending on what they want
and are presented to the user upon his/her registration to the website.
37
the law against malicious posting of pictures or information.
management but rather to the game’s creator and SNS are not held
responsible for any privacy violations created through these. The most
conditions governing the site and abide the rules stated in it.
Conclusion:
entirely liable for the user’s privacy protection. SNS members must also
Though a person wants to upload files in his profile and widen his
38
Recommendation:
The researchers recommend the users to protect their privacy by
ask questions about the sites privacy policies if the user is not familiar with
prevent identity thefts or privacy problems, he must also think twice before
individual must always remember that there are still faults to these two. By
being an active and vigilant member of the SNS community, a person not
only protects his privacy but also help other members lessen the possibility
39
Bibliography
Allen, J., Barnum, S. Ellison, R. et al. Software Security Engineering: A Guide
for Project Managers.
Annual editions: Computers in society. De Palma, Paul. 14th ed. Boston:
McGraw-Hill. 2008.
Computers in society: Privacy, ethics, and the internet. (2005). Upper Saddle
River New Jersey: Pearson Prentice Hall.
McClure, S., Scambray, J., & Kurtz, G. (2003). Hacking exposed: Network a
security, secrets and solutions. (4th ed.). McGraw-Hill.
Nestler, V., Conklin, A., Whit, G., & Hirsch, M. (2006). Information assurance
and security series: Computer security lab manual.McGraw-Hill/Irwin.
Radlow, J., (1986). Computers and the information society. New York: a
McGraw-Hill.
Vliet, H. (2008). Software engineering principles and practice. (3rd ed.). John
Wiley & Sons Ltd.
WEBSITES
www.antionline.com/index.php
www.dushkin.com/online/
www.epic.org
www.epic.org/crypto
Appendices
Age:___ Social Status: [ ] Student [ ] Employee
Introduction:
The answers and information that will be gathered in this survey will be
kept private and will only be used for the researchers’ thesis about social
a. Once
b. Twice
c. Thrice
e. Never
a. Being hacked
b. Being humiliated/ criticized
c. Being stalked
[ ] Pictures
[ ] Videos
[ ] Friendster
[ ] Multiply
[ ] MySpace