bibliography

Topics: Identity theft, Privacy, Social media Pages: 5 (1022 words) Published: October 12, 2014

1) Siciliano, Robert. 7 Social Media Security Tips To Protect Your Business. Forbes, 2014. Website Robert Siciliano in 7 Social Media Security Tips To Protect Your Business (Forbes, 2014) explains the dangers of social media and how that can affect not only the employee but also the work place. Siciliano develops his argument that social media is dangerous from conducting an experiment where he has cops pretend to be robbers and invade a bank; and, all this is based on information found on a random employee Facebook information. Siciliano informs the audience on the potential dangers of social media in order to get his audience educated about how they can keep themselves safe. The intended audience is to anyone who uses social media, especially those who use it for work reasons. This source can help a researcher understand the topic better by giving the researcher evidence and an event that describes the dangers social media presents. A weakness in this article is that it’s very biased towards one occasion, a strength is that it gives a realistic case of the dangers; the article can be used to defend the fact that social media is too public. 2) Caplan, Art. Is Your Doctor Spying On Your Tweets? Social Media Raises Medical Privacy Questions. NBC, 2013. Website. Art Caplan in Is Your Doctor Spying On Your Tweets? (NBC, 2013) explains that things posted on social media can affect one’s life in many different aspects, and in this case it’s medical. Caplan gives a real life situation where a patient got turned down for a liver transplant because of a drinking problem. Caplan wants to inform the readers to be careful what they post on social media in order to not risk major decisions. Caplan writes to anyone who has a social media account. This would help a researcher prove their argument of social media being too public by giving support to the argument. A strength of this article is that it is based off a real event and a weakness is that the event isn’t common therefore, not many can relate; this article can be used to support the idea that social media has no privacy over one’s personal life. 3) Riparbelli, Laura. 12-Year-Old Sentenced For Cyberstalking Classmate. ABC, 2011. Website. Laura Riparbelli in 12-Year-Old Sentenced for Cyberstalking Classmate (ABC, 2011) argues that minors should be monitored on social media. Riparbelli bases her argument over a case where two minors got arrested for hacking into a Facebook and using social media as a tool to harass classmates. Riparbelli wants to inform the reader that minors should have limited access to social media because of the potential dangers of one getting into another’s private life in order to assure the maximum amount of safety for every individual. The targeted audiences are mostly parents and guardians who have children who are still minors. This would help a researcher explain even further the restrictions that social media need to put on and how an adult monitoring what a minor puts on social media can help prevent the consequences. 4) Jayson, Sharon. Social Media Research Raises Privacy and Ethic Issues. USA Today, 2014. Website. Sharon Layson in Social Media Research Raises Privacy and Ethic Issues (USA Today, 2014) argues that social media needs to raise their privacy settings. Layson backs up her argument by using statistics on how many people were using someone else’s identity to post something. Layson wants to inform social media users to be careful in order to not have their identity stolen. The intended audience is anyone who is using social media. A researcher can use this article to help them find facts, such as the statistics in the article to back up their argument on privacy issues on social media. A weakness of this article is that there’s no specific evidence or case study and a strength is that it fives really good stats and factual evidence; this article can be used to support an argument that it is easy to steal personal information over social...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Essay about Annotated bibliography
  • Annotated Bibliography Essay
  • Annotated Bibliography Essay
  • What is a bibliography Essay
  • 5 Annotated Bibliography on Race and Enthicity Essay
  • Annoted Bibliography Essay
  • How to Prepare an Annotated Bibliography Essay
  • Essay on Slsp1000 Annotated Bibliography

Become a StudyMode Member

Sign Up - It's Free