英国硕士新媒体的隐私问题及对策分析
发布时间:2016-06-08 22:24
1. Introduction介绍
例如,脸书,推特和LinkedIn已经成为数以百万计的人深受使用,包括他们的家庭,朋友,同事。在7月,脸书拥有7亿5000万的用户在世界各地。推特拥有2亿5000万用户,在LinkedIn拥有115用户(谷歌,2011)。
虽然新媒体工具有不同的风格、功能、布局和目标,他们大多让人创建个人信息;更新状态或博客和上传视频,照片,音频剪辑。此外,用户还可以编辑他们可以连接到的好友列表,分享意见,并发送个人信息。同时,用户还可以用同一兴趣旅游经历和事件,邀请他人和参与此活动的人(人&丹尼斯,2011)。
此外,在新媒体的活动可能是相当与揭示了活动信息。许多用户可能会分享非常亲密人和透露信息,并有详细的资料,和关于他们的个人资料。这种信息可能包括教育,婚姻状况,个人识别,地址等,实际上,这种信息共享的个人用户和来自他/她的朋友的评论,,表明洞察用户的道德,价值观,自我形象,和偏见。
With the development of digital, network,mobile and information technology, it becomes easier for people to acquire and broadcast information. Based on these technologies, a new kind of media comes out with the feature of interactive broadcasting. We call it ‘newmedia’ (Zhang Huizi 2010:7).
For example, Facebook, Twitter and LinkedIn have become very popular among millions of people who use them tointeract with their family, friends, and colleagues. For July2011, Facebook owns 750 million users in all over the world.Twitter owns 250 million users while LinkedIn owns 115 millionusers (Google, 2011).
Although new media tools differ in styles, functionality, layout and target, most of them allow people to create personal information; update statusor blog and post videos, photographs, andaudio clips. Furthermore,users can also edit lists of friends who they can connect to,share comments inthe profiles, and send personal messages. Meantime, users can also establishteams of people with sameinterests and post events and invite others to theseactivities(Man & Denis, 2011).
Furthermore, activities in new media may be quite revealing. Many users may share very intimate and revealing and detailed information about their personal profiles. This kind of information may involve education, marital status, personal identifiers, address, etc. Actually, this kind of information shared by the individual user and the comments coming from his/her friends, indicate insight into the user’s morals, values, self-image, and biases. Even many people can be very explicit in telling where they work, how much they like the current job and company, their education background even back to the primary school, their political opinions as well as the interests and hobbies for the time being(Man & Denis, 2011).
On the other hand, new media tools mean usersare able to not only knoweverything regardingtheir friends, but also who their friendsknow. It is very common for a userin a new media site to ownmore than 300 friends in all over the world. There istruly a wealth of information in the new media.
In fact, the explosion of new media tools has not onlytransformed the way people communicate with each other, but also introduceda new way that organizations can search orinvestigate the mass people. In fact, more and more universities and agencies for lawenforcement are adopting the tools for different kinds of searchand investigation purposes. As a result, concerns are risingon organizations’ access to people’s private data. Meanwhile, users are more and more worried about privacy issues on new media(Man & Denis, 2011)..
So itis very important for users to be aware of the quite high potential privacy issueson personal information sharing in the new media tools.
According to news report from China Daily (2013), we all know a Christmas greeting in 2013 from Snowden, a very famous ex-member of CIA, who escaped from the USA and now in Russia. It was said by him that “one huge global monitor system was setup by the government of America to monitor everybody in this world and we were warned by George Orwell’s written 1984 which said we were monitored by the people through books, microphone and TV, however this was barely worth mentioning comparing with the action conducted by the USA government. We all have one mobile phone in our pocket, so we can be located no matter where we go. It is really one question that one child, who is born nowadays, will grow up in one world without privacy and never knows what is his private time and never knows what ideas cannot be recorded and analyzed. Privacy is so important that it decides who we are and who we will become. The government shall stop the actions of monitoring the public.”(2013)
His greeting was great sensation in the world, which make even everybody think about the issue about privacy. In fact this has becomes one issue that we cannot avoid. We can see that the emerging new social network technologies themselves are prone to leaking private information(Tecent Technology 2010); due to the drive of the economic profit, many companies are striving to collect consumers’ relevant information; due to the political and military factors, we are monitored by CIA/NSA or other Safety agencies from other countries.
In the network society, we should be closer to the truth as we can resort to more tools to acquire the required information through searching engine and web mining tools etc. (2010) However the advance of the technology does not weaken the manipulation of the citizens’ privacy from the organizations with public power, but increase the possibility of privacy invasion in the interpersonal communication. (2010)
To cope with this more and more severe challenges from so many aspects, it is really necessary to research and analyze the privacy issue more systematically and try to find out more proper countermeasures.
2. Literature review
2.1 New media and information ethics
2.2 Inconsonant laws with the new technologies
2.3 New media privacy invasion
2.4The private domain on privacy
2.5Social control and research on the monitoring
2.5 Summary
3. Methodology
3.1 depth interview
3.2 questionnaire survey
3.3 case study
3.4 discourse analysis
3.5 Online / web analysis
4 Findings
4.1 The findings in the depth interview
4.2 Findings from questionnaire survey
4.3 Findings from discourse analysis
4.4 Findings from case study
4.5 Findings from online / web analysis
5 Discussion and analysis Privacy issue in business environment
6 Countermeasures
Bibliography注释
Anthony Giddens (2001) The uncontrolled World. Jiangxi Renmin Press.
Baidu(2014)PRISM Gate. Available at: baike.baidu.com.
Berners-Lee, Tim (2000) Weaving the Web: The Past, Present and Future of the World Wide Web by its Inventor. London: Texere.
Bimber, Bruce. T. (2003)Information and American Democracy: Technology in the Evolution of Political Power. Cambridge: Cambridge University Press.
Brian Shapiro and Richard C. Baker (2001)Information Technology and the Social Construction of Information Privacy.Journal of Accounting and Public Policy, 20, 295-296.
China Daily (2013)One Christmas greeting from Snowden. Available at:
Christopher Loeffler (2012) Privacy issue in Social Media. IP Litigator,12-18
Cooley, Thomas McIntyre (1880)The General Principles of Constitutional Law in the United States of America. Boston: Little, Brown, and Company
E.A.Rose (1990) Social Control. Huaxia Press.
Feng Huang Net (2014)Snowden Uncovered the Surveillance Project of America.
Google (2011) Social network user statistics as of July 2011
Guo Xiaoping (2003) Private Topic: Expansion to the Mass media for the Current Chinese Private Discourse(In Chinese). New University.
Holtzman, David H. (2006)Privacy Lost: How Technology Is Endangering Your Privacy.San Francisco: Jossey-Bass.
Jeffrey Rosen (2001)Out of Context: The Purposes of Privacy.Social Research 68, 215. Jiang Hong, Xu Jian (2006) Introduction to New Media(In Chinese). Shanghai Jiao Tong University Press, 18Lane, Frederick S. (2009) American Privacy: The 400-Year History of Our Most Contested Right. Boston: Beacon Press.
Ma Jiahui (2010) The Crisis of Being Known in the Surveillance Society (In Chinese). Finance, 17
Man Qi, Denis Edgar-Nevill (2011) Social networking searching and privacy issues, Information security technical report,74-78
Michel Foucault (2007)Discipline and Punish. Sanlian Bookstore, 57
Jeff H. Smith (1994)Managing privacy: Information Technology and Corporate. University of North Carolina Press, 7-9.
Jerry Kang (1998) Information Privacy in Cyberspace Transactions .Stanford Law Journal, 50, 1206-1208.
Joseph Rosenbaum (2003) “Understanding Privacy in an Age of Information” in Privacy Handbook: Guidelines, Exposures, Policy Implementation, and International Issues. Hoboken, NJ: John Wiley & Sons, 304-306
Kadushin, Charles (2012)Understanding Social Networks: Theories, Concepts, and Findings .Oxford: Oxford University Press.
Kieran, M., D. E. Morrison and M. Svennevig (2000) ‘Privacy, the Public and Journalism: Towards an Analytical Framework’, Journalism: Theory, Practice and Criticism 1(2):145–69.
Kieran, M., D. E. Morrison and M. Svennevig (1997) Regulating for Changing Values, Research Working Paper No.1. London: Broadcasting Standards Commision.
Pember, Don R. (1972)Privacy and the Press: The Law, the Mass Media, and the FirstAmendment. Seattle: University of Washington Press.
Petronio, Sandra (2002) Boundaries of Privacy: Dialectics of Disclosure. Albany, NY: StateUniversity of New York Press.
Renée Marlin-Bennett (2004) Knowledge Power: Intellectual Property, Information, and Privacy. Boulder,Colorado: Lynne Rienner Publishers, 14, 169-170.
Richard S. Murphy (1996) Property Rights in Personal Information: An Economic Defense of Privacy, Georgetown Law Journal, 84, 2383-2384.
Robert C. Post (2001) “Three Concepts of Privacy,” Georgetown Law Journal, 89, 2095-2096.
Shan Jigang, Gan Shaoping, Rong Minde (2008) Applied Ethics: Economy, Technology and Culture(In Chinese). Renmin Press, 156.
Sina Finance (2013) The Cover Story of Time: Freedom and Safety
Stewart, David W. and Paul A. Pavlou (2002)From Consumer Response to Active Consumer: Measuring the Effectiveness of Interactive Media. Journal of the Academy of Marketing Science, 30, 376.
Tencent Technology (2010) eWeek: The Emerging of Social Network makes the Privacy does not Exist Any More.
The First Finance Weekly (2013) The Internet Vast.
Wang Junxiu (2004) Border of the Surveillance (In Chinese). Doctoral Dissertation, Sociology of China Social Academy.
Wang Lilian (2013) Rise of New Mediaand its ImpactonAmericanPrivacy. Master Dissertation, Shanghai International Studies University.
Wellman, Barry, and Caroline Haythornthwaite. (2002) The Internet in Everyday Life. Oxford, UK: Blackwell Publishing.
Xiang Liling, Xue Quansheng (2007) Some Questions’ Investigation on Mason’s PARA Information Theory (in Chinese), Intelligence Theory and Practice, 2
Xinhua Net (2011) How to Deduce the Address of Wang Luodan. Available at: news.xinhuanet.com.
Xiong Chengyu, Liao Yiwen (2003) New Media: The Damocles Sword in Iraq War(In Chinese)China Journalism, 5
Xu Xun (2003) Secret Inquiries and Candid Camera: the Journalists are Around You. China Broadcasting and Television Press.
Young Chun Kim (2006)Privacy and Communications Technologiesin AmericanHistory: A ComparisonofConceptsofPrivacyinRelationto Changing CommunicationsTechnologies. Doctoral Dissertation, The Pennsylvania State University.
Zhang Huizi (2010)The Invasion of Citizens’ privacy and Protection Research in the New Media Age (In Chinese). Doctoral Dissertation, Huazhong University of Science &Technology.
Zhao Yongzhong (1999) Privacy: The Navigation Mark of information economy. Internet Weekly.
本文编号:55010
本文链接:https://www.wllwen.com/wenshubaike/lwfw/55010.html