Social Media Company; Facebook

更新时间:2023-06-08 08:42:55 阅读: 评论:0

Social Media Company
Student Name
Institutional Affiliation
Date
   
    According to Mark Zuckerberg, the idea of starting Facebook was to create a free world where people would get access to information they require and, at the same time, share information, thus rves as a social platform. Massive accumulation of data is the crucial point, and it involves capturing data from different activities such as an economic transaction. Some of the examples of data flow include corporate government databa (Zuboff, 2015), Private and Public Surveillance  Cameras, Computer-mediated financial transactions, and Self-driving cars. Googles show the u of surveillance Cameras in street view as logic in the accumulation of data. Surveillance capitalism refers to the collection of t
expecthe data streams with the purpo of "predicting and modifying human behavior as a means of generating revenue and market control" (Zuboff, 2015). Therefore the paper eks to analyze some of the damages on the reputation of the company morningpost(Stilgoe, Owen & Macnaghten, 2013).
上海复兴中学
    Big data is a complex data t from a new source (Zuboff, 2015); examples of data flow include corporate and government databas, computer-mediated economic transactions, and data exhaust. Face book beacon relied on third-parties cookies to track urs. When the lighthou was discontinued in 2009, many urs knew about social media tracking across the web. In 2010 graph application programming interface was developed to enable third-party developers to create third-party apps like games. The media platform us a filter bubble to provide more information to urs. Cambridge Analytica rearched a technique of using Facebook likes to project human personalities in 2013. Bad on the analysis, in the year 2015, a lot of data about many Facebook urs in America were gathered without their connt; results show that the data was ud to manipulate the outcome of the 2016 general election in the United States. The obabcd英语26个字母的读法
jective was achieved by forming a personality profile using the data.    For instance, on election interference, the spread of fake news on the 2018 Facebook Platform about Presidential Election in the United States of America caud anger among the Supporters of the rival group (Carlson, 2018). As a result, they lost trust in the information being spread in the social arena.  For instance, "Pope Francis shocks the World endors Donald Trump for President, Releas Statement."In another event, before the Presidential elections, Russia formed the Internet Rearch Agency who objective is to influence the outcome of the vote. The workers were trained to create disagreement on social media by spreading fal reports about elections. Internet Rearch Agency created pages such as Black Life Matters Protesters, Anti-immigration groups, and Tea Party Activists for the intention to spread incorrect information about Clinton to voters perceived as a minority in her ba. In turn, it has created negative publicity for the company (Cohen, 2019). Measures implemented by Facebook to control the spread of fal news include encouraging posts from friends and demeaning content from organizations.
雀巢咖啡伴侣
    Facebook is considered to breach the privacy of the urs in scenarios where confidential information, like the names of the urs, have been made accessible to some internet tracking companies and advertising companies; this process can result in data loss. Some people, upon realizing that there is a breach of privacy while using Facebook, they have lost confidence in using the social media platform. Cybercurity refers to the protection of a computer system from theft or damage of hardware, software data, and from rvice interruption or misleading (Council on CyberSecurity, 2014). Managing cybercurity entails hiring cybercurity talent, and establishing corporate policy, best practice linking cybercurity planning to workforce planning. Cybercurity strategy involves fostering a cohesive team, develop a risk-bad approach, and asssing capabilities and limitations. Specific apps such as Instagram and Whatapp have been designed to safeguard the privacy of the urs. The applications ensure that End – to- End encryption is maintained; it implies that only the Sender and Receiver can read messages between them. Privacy has enabled people to interact more freely .Cybercurity is necessary to an organization like financial entities , government agencie视在功率
s becau they process and store large amount of data which is nsitive when unauthorized persons get access. Components of cybercurity include databa cutity, network curity,and application curity. (where you are 依旧的英文Council on cybercutity 2014).
    The algorithm has impacted negatively on the urs; for instance, when you arch on something on Google, then you an ad on Facebook for the product. The algorithm has resulted in some of the generational social media effects such as depression, loneliness, and anxiety. Due to the increa in the u of a smartphone, young people spend most of their time on social media, thus reduced activities like hanging out with friends. Reports have indicated that reducing access to social media to about thirty minutes in a day will lead to an improvement in the well being. Besides, some of the effects of social media are mental health and radicalization. Fal information about terrorism spread over the social platform has been the catalyst of radicalization. Also, the study shows that emotional contagion experiment can lead to depression becau many urs of Facebook post more negative post compared to positive ones. The u of an automated system to regulate nsitive content in Facebook's new feed has been implemented ((Th
ornton & Danaher, 2018).wch
    Loss of data is damage that may accrue to the company as a result of mismanagement of databa; Innovation has enabled new mechanism to be developed inorder to facilitate the manner of carrying out transactions, In 2019, Facebook launched their currency known as Libra, which is integrated to Whatapp, Mesnger, and Blue app. A blockchain is a decentralized, immutable (unforgeable), valid, potentially unstoppable computing system. New u cas for Bitcoin’s underlying technology (the “blockchain”) were developed (e.g., Namecoin for decentralized DNS) The main idea is to help people carry out cashless transactions, thus forms the solution to cryptocurrency. Decentralized Autonomous Organization runs on a blockchain that us smart contracts for sales, enables innovations in funding and capital investment.  Surveillance Capitalism refers to giving money value to data relating to human character and migration pattern  this data is retrieved through online platform (König, 2019).
笔记本培训

本文发布于:2023-06-08 08:42:55,感谢您对本站的认可!

本文链接:https://www.wtabcd.cn/fanwen/fan/90/137965.html

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。

标签:读法   笔记本   字母   培训
相关文章
留言与评论(共有 0 条评论)
   
验证码:
Copyright ©2019-2022 Comsenz Inc.Powered by © 专利检索| 网站地图