Topic 4: A Reflection On Social Media Ethics(#MANG2049)

self-reflectionPhoto reference: https://anticsofateenagedreamer.wordpress.com/

It has never occur to me that excessive freedom of expression online, especially if left unchecked, would become the root cause of unethical behaviour on social media

I have always perceived the internet to be a place for freedom of expression. Echoing what JiaJun said, it is also the fastest and most convenient channel to obtain information, making learning very cohesive

unsupervised-police

Photo reference: https://thenonconformer.wordpress.com/2010/10/25/canadas-bad-police-officers/

Upon reflection, it now hit me hard that one of the downside of internet is lack of governance, and poor policing, thus leading to abuse.

Media Reference: A Powtoon I did that talks about how people abused the freedom given to them.

Statistically, unethical cyber behaviour has “affected 3.8 million globally , attacks range from infections to scams. Computer viruses were found to be more common. 50% involved hacking accounts which results in monetary theft.”(Ainscow, 2016)This is the dire consequence when freedom is left unchecked

2015_09-23-2015_on-cyber-crime-and-cyber-terrorism-part-1-1
Photo reference: https://blog.networkboxusa.com/2015/09/23/on-cyber-crime-cyber-terrorism-part-1/

The cyber crime rates are so shocking that companies are now trying to solve this problem, hence providing a differential advantage to minimise cyber crime. One example is EveryKey, a computer programme which self generates the most difficult passwords, where the user need not be involved in the process. This would prevent one’s account from being hacked

Video Reference: https://www.youtube.com/watch?v=fPBkBzu3vEg

freedom-unethical-behviour

Photo Reference: A snippet from my notebook that shows the link between freedom and unethical behaviour

In conclusion, the internet can continue to be a platform for free speech and expression, but only if there are clear boundaries to define what is acceptable conduct as a guide to all users 

Please click here to see a prezi I did, that shows what is appropriate online behaviour

Unfortunately, due to poor governance of most social media sites, users believe that they are entitled to be who they wish to be online without any consideration. Some even adopted an anonymous identity. Even with Every Key, there is still a possibility that scammers would break this encryption key sooner or later.

untitled-20

Photo reference: http://infoxin.com/good-bad-and-in-between

The authorities need to take a strong stand and set boundaries to what constitutes acceptable behaviour online, like how John Nimo and Isabelle Sorley  (The Guardian, 2014) were taken to task for misbehaving on Twitter. Only when penalties start to kick in, users will know the authorities are no longer paper tigers. And the online environment will hopefully change for the better.

(330 Words)

Comments:

Maureen’s blog

Jia Jun’s Blog

References:

Actus Reus (2016) in Wikipedia. Available at:https://en.wikipedia.org/wiki/Actus_reus  (Accessed: 14 November 2016).

Ainscow, M. (2016) Online fraud figures send overall crime rate skyrocketing. Available at: http://www.solusps.com/blog/online-fraud-figures-send-overall-crime-rate-skyrocketing

Freedom House (2016) Internet freedom. Available at: https://www.freedomhouse.org/issues/internet-freedom (Accessed: 11 November 2016).

Wikipedia (2016) ‘Ethics’, in Wikipedia. Available at: https://en.wikipedia.org/wiki/Ethics (Accessed: 11 November 2016).

Asher, N. and Birchmore, M. (2014) Case studies. Available at: http://roarlocal.com/maslows-hierarchy-social-media/ (Accessed: 11 November 2016).

Chaffart, R. (no date) The danger of curiosity: Ouch! Available at: http://www.sermonillustrator.org/illustrator/sermon20/danger_of_curiosity.htm (Accessed: 11 November 2016).

The Guardian (2014) Twitter abuse: Easy on the messenger. Available at: https://www.theguardian.com/commentisfree/2014/jan/24/twitter-abuse-abusive-tweets-editorial?CMP=twt_gu (Accessed: 11 November 2016).

Greenwald, G. (2014) Why privacy matters. Available at: http://www.ted.com/talks/glenn_greenwald_why_privacy_matters (Accessed: 11 November 2016).

Harend, M. (2016) ‘Ethical Issues in Social Media’, Maureen Harend’s blog, 11 November. Available at: https://maureenharend.wordpress.com/2016/11/11/ethical-issues-in-social-media/ (Accessed: 14 November 2016).

Kelion, L. (2013) Available at: http://www.bbc.com/news/technology-24426739 (Accessed: 11 November 2016).

Kleinman, Z. (2015) Who’s that girl? The curious case of Leah Palmer. Available at: http://www.bbc.co.uk/news/technology-31710738 (Accessed: 11 November 2016).

Kwara, M. (2014) Singapore’s crime rate falls to 30-year low. Available at: https://sg.news.yahoo.com/singapore-s-crime-rate-falls-to-30-year-low-105825797.html (Accessed: 11 November 2016).

Mens rea (2016) in Wikipedia. Available at: https://en.wikipedia.org/wiki/Mens_rea (Accessed: 11 November 2016).

Low, J.J. (2016) ‘Topic 4: Observe ethics.’, 11 November. Available at: https://uosjiajiun.wordpress.com/2016/11/11/topic-3-observe-ethics/ (Accessed: 14 November 2016).

Ronson, J. (2015) How One stupid Tweet blew up Justine Sacco’s life. Available at : this address (Accessed: 11 November 2016).

Vallor, S. (2015) Available at: http://plato.stanford.edu/entries/ethics-social-networking/ (Accessed: 11 November 2016).

 

Media References:

  1. Cover Photo
  2. “Danger Warning… Unsupervised Police”
  3. “Good, Between, Bad”
  4. “Cyber-Crime-Terrorism”
  5. “Freedom of Speech is not freedom of abuse.” (In Prezi)
  6. .”Everykey” Video

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s