Which type of control is of concern to the facebook users

Assignment Help Management Information Sys
Reference no: EM13929341

Facebook Users Want to Control More of Their Personal Information

While in 2010 Facebook reported having 500 million global users of their social networking site, at the same time some people are leaving Facebook because the site changed its rules such that a lot of personal information-like where you went to school, where you work, and what music you like-now gets made public by default. Some information is even shared with companies that are special partners of Facebook, such as Yelp, Pandora, and Microsoft. While there are ways to protect some of this information by tinkering with the privacy settings on Facebook, it is tricky to figure out the settings.

At the end of 2009 Facebook changed the default settings on its privacy controls so that individual's personal information would be shared with everyone on the network rather than selected friends. Facebook argued that this reflected a shift in society toward greater openness and noted that users could still adjust privacy settings back again. Privacy activists have lobbied for it to be reversed.

Activists fear that people are being lured into Facebook with the promise of a fun, free service, and do not realize that they are paying for it by giving up a lot of their personal information. Facebook then attempts to monetize the data entered by users by selling it to advertisers that want to send targeted messages. The switch should not have come as a surprise. Initially, many social networks impose fairly tough privacy policies in order to attract and reassure users. However, when more users join, controls are gradually loosened to encourage more sharing. As people share more information, Facebook can increase the traffic against which it sells advertising. The more Facebook learns about users' likes and dislikes, the better it can target ads that generate hundreds of millions of dollars.

DISCUSSION QUESTIONS

1. Why did Facebook decide to make it more difficult for users to control who has access to the personal information they post on the Web site?

2. Which type of control is of concern to the Facebook users and privacy activists-feed forward, concurrent, or feedback control? (Use the internet to research these concepts)

3. Should Facebook use more control in managing how the information is used among the users of the social networking Web site? What is the basis of your answer?

Reference no: EM13929341

Questions Cloud

Discuss the potential effect of the images : Describe the website you choose, and then identify the basic image and typographic principles as applied to the website. Discuss the potential effect of the images and typography on first-time visitors
The architectural plan : A systems architecture is the blueprint for all of an organization's information technology components. Just as a building's architectural plan includes things like plumbing, electrical wiring, room sizes, and the locations of walls and doors, the ar..
Define what made power and authority legitimate : How did Enlightenment writers define what made power and authority legitimate? As you develop your arguments, consider: Who could exercise power and who might be excluded from it? What might constitute an abuse of power or a viable challenge to it? W..
What is the ending balance of the allowance : What is the ending balance of the Allowance for Doubtful Accounts at December 31, 2013, after all entries and adjusting entries are posted?
Which type of control is of concern to the facebook users : Which type of control is of concern to the Facebook users and privacy activists-feed forward, concurrent, or feedback control? (Use the internet to research these concepts)
Explain the role of training in an organization''s developmen : Explain the role of training in an organization's development. Describe different employee development methods and their benefits. Analyze the relationship between employee development and organizational development.
Identify possible threats internal or external to a database : Identify possible threats internal or external to a database that may affect the following components of a database system
Decision making : Reflect on the past experiences, which required you to make an important decision. What were the skills that you utilized to solve the problem? Was the model for decision-making similar to the one in the course?
Construct a cultural web for dicom group : 1. Drawing on the information given in this case, construct a cultural web for Dicom Group 2. Assess the extent to which Dicom Group's culture is aligned to its vision and mission

Reviews

Write a Review

Management Information Sys Questions & Answers

  What types of future payment products and services

What types of future payment products and services should be anticipated and prepared for by the EA group? What is your vision of how payments might work

  Two companies that provide the option of telecommutingcan

two companies that provide the option of telecommutingcan you find two positions with different companies that provide

  Business presentation examples with excessive technology

business presentation examples with excessive technology and distracting visual aids sometimes technology and visual

  Data analysis and hypothesis testing

Data Analysis and Hypothesis Testing

  Presentation for the enterprise security plan

Finalize your presentation for the Enterprise Security Plan. The presentation should target senior leadership at the organization and should effectively cover the material in the paper.

  Discuss the advantages of a database management

Discuss the advantages of a database management approach to the file processing approach? Give examples to illustrate your answer.

  Clarify the major role each department plays with is

In this presentation assignment, you will define the components (departments) of an IS functional area. Clarify the major role each department plays with IS

  Develop an it risk assessment opinion

Develop an IT Risk Assessment opinion from both a bottom-up perspective of assessing controls, threats and vulnerabilities, and translate these findings into business risk language.

  Network design and latencymr smith is the director of it at

network design and latencymr. smith is the director of it at a law firm located in downtown chicago. he needs to plan

  What factors will be important in good data governance

What factors will be important in good data governance

  Solution to information technology questionhow do you use

solution to information technology questionhow do you use information technology to hel track measure and adjust

  Solutions instead of as a long-term commitment

Explain why the initial investment in using a SOA solution requires a high level of adoption to be worthwhile. What are the limitations of using SOA for short term software solutions instead of as a long-term commitment?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd