Uses of social media include benign uses, such as posting fun videos, contacting old friends, sharing pictures, or planning social events, as well as malignant uses, such as engaging in criminal behavior. Access to social media is more readily available through the use of rapidly changing technology. With the use of mobile devices, individuals are able to record events anywhere and at any time. These recordings can be uploaded to social media sites to be shared with hundreds and even millions of people. Technology has made the capturing of individuals on video and the sharing of those videos easier than ever. Questions then arise regarding the privacy of the individuals captured in the recordings. If you are caught on video and that video is then shared via the Internet, has your right to privacy been violated?
For this Discussion, review the media scenarios in this weekâ€™s Learning Resources. Consider which scenarios (if any) constitute a violation of privacy.
Scenario 1: A boy was walking to school with his backpack on his back and was beaten by another student who wanted to see what was in his bag but did not get to see in it. Someone video the fight on posted it on social media.
Scenario 2: A lady was on the beach with her boyfriend/husband/fiancÃ© and was photographed walking in a bikini by another man who was on vacation on the beach. That man posted the picture of the lady whom he does not know on social media without her knowledge. She saw the picture after it popped up on her partner’s phone.
Scenario 3: A bus driver and an unknown lady was arguing on the bus and a passenger (a woman) was recording it and captured the lady slapping the bus driver in the face. The passenger then got off the bus and showed the assault to the police officer who stated that he cannot do anything because he’s unable to see the face of the woman who is slapping the officer. The passenger then decided to post the video on social media.
Post by Day 4 an explanation of which of the scenarios might be a violation of privacy and why. Be specific and support your response with references to the Learning Resources and literature.
- Course Text:Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime and digital terrorism. (3rd ed.). Upper Saddle River, NJ: Pearson..
- Chapter 1, “Introduction and Overview of Digital Crime and Digital Terrorism”
- Chapter 10, “Digital Laws and Legislation”
- Article: Audal, J., Lu, Q., & Roman, P. (2008). Computer crimes. American Criminal Law Review, 45(2), 233â€“274.
- Article: Barkacs, L. L., & Barkacs, C. B. (2010). Do you think I’m sexty? Minors and sexting: Teenage fad or child pornography? Journal of Legal, Ethical and Regulatory Issues, 13(2), 23â€“31.
- Article: Martin, J. A., Caramanica, M. R., & Fargo, A. L. (2011). Anonymous speakers and confidential sources: Using shield laws when they overlap online. Communication Law and Policy, 16(1), 89â€“125.
- Article: Smith-Mason, J. (2011). Privacy rightsâ€¦versus public safety after 9/11. Phi Kappa Phi Forum, 91(3), 14â€“15.
One and a half page with at least two reference….
It is important that you cover all the topics identified in the assignment. Covering the topic does not mean mentioning the topic BUT presenting an explanation from the context of ethics and the readings for this class
To get maximum points you need to follow the requirements listed for this assignments 1) look at the page limits 2) review and follow APA rules 3) create subheadings to identify the key sections you are presenting and 4) Free from typographical and sentence construction errors.