Sunteți pe pagina 1din 5

Aine McGonigle

English 015
Professor Zack De Piero
November 13, 2018
WP3 Annotated Bibliography:

Research Question: "Do you think that by implementing media training/privacy standards into

the installation of Facebook would decrease the amount of privacy issues we see occur on the

platform?"

Bibliographies:

Westlake, E. J. “Friend Me If You Facebook: Generation Y and Performative

Surveillance.” TDR (1988-), vol. 52, no. 4, 2008, pp. 21–40. JSTOR, JSTOR,

www.jstor.org/stable/25145553.

Westlake writes this article to inform his readers of the impact that Facebook has on three

main generations; Baby Boomers, Generation X, and Generation Y; and how Facebook’s

surveillance of its users has increased. Westlake discusses how the platform has added

new and exciting features, News Feed, which has made Facebook easier but also poses

some concern. Westlake’s statement on the addition of News Feeds is as follows “I

remember thinking that it was a bold move for Facebook, but I also remember feeling a

little strange knowing that my every move (well, almost every move) would be seen by

all my Facebook friends” (Westlake 22). The article also gives its readers a background

on the media platform’s history. It discusses the founder, Mark Zuckerberg, and how he

had first envisioned the company to where it has come today. Zuckerberg states

“Facebook develops technologies that facilitate the spread of information through social

networks allowing people to share information online the same way they do in the real

world” (Zuckerberg 23). The article, in short, gives its readers the latest on all of the

history of Facebook and what has happened on the platform since its beginning.
Aine McGonigle
English 015
Professor Zack De Piero
November 13, 2018
Sacasas, L. M. “How Facebook Deforms Us.” The New Atlantis, no. 56, 2018, pp. 82–

91. JSTOR, JSTOR, www.jstor.org/stable/26498246.

L.M. Sacasas writes this article to give a review of the book Antisocial Media: How

Facebook Disconnects Us and Undermines Democracy written by Siva Vaidhyanathan, a

professor of media studies and director of the Center for Media and Citizenship at the

University of Virginia. Sacasas starts out discussing his experience with Facebook and

how he first used it as a way to keep in touch with his college peers but now he uses it for

his career. He states that he began to withdraw from Facebook due to the 2016

controversy with the election. The book being discussed is very critical of Facebook, but

the author also still continues to use the media platform and shows his support. Sacasas

gives a brief summary as follows, “The book offers clear, deeply researched, and

evenhanded prose, enhanced by the author’s willingness to speak candidly about his own

experience as a Facebook user, and reflecting the author’s admirable commitment to

addressing his readers principally as fellow citizens” (83). Sacasas details that throughout

the book, Siva also discusses what Aristotle could have taught Mark Zuckerberg,

Facebook’s founder and that Facebook is in a tough place because its users need to

evolve. Mainly, Sacasas desires to give his opinion of the book written about Facebook

and how the book could be improved as well as what points stood out as important.

Kennedy, Dennis. “TECHNOLOGY: SAVING FACE: 5 Tips to Better Security on

Facebook.” ABA Journal, vol. 96, no. 3, 2010, pp. 32–32. JSTOR, JSTOR,

www.jstor.org/stable/27850806.
Aine McGonigle
English 015
Professor Zack De Piero
November 13, 2018
This author, Dennis Kennedy, discusses five tips for people who people, especially

lawyers, who are just getting started on Facebook. Kennedy recognizes that social media

platforms are becoming more of a necessity for those looking for clients, but he also

expresses the need for privacy and protection while using these platforms. He lists the

five tips for better security on Facebook which include: Having a strong password and

changing it regularly, Review and make appropriate changes to privacy settings, be

discriminating in your use of Facebook apps, take control of what other can put on your

timeline, and consider using “friends lists.” Kennedy describes a term very well-known to

those in social media and that is phishing. “Phishing is the term used for efforts made by

the bad guys to obtain your username and password” (Kennedy 32). This is very

prevalent in Facebook. He also gives the readers a few little reminders such as “Think

before you post” (Kennedy 32) and “Think long and hard before you make anything

available to everyone” (Kennedy 32). Mainly, Kennedy hopes that readers of this article

should be fully aware of what they are sharing and how much privacy these platforms

should have available to its users.

Weimann, Gabriel. “Terror on Facebook, Twitter, and YouTube.” The Brown Journal of World

Affairs, vol. 16, no. 2, 2010, pp. 45–54. JSTOR, JSTOR, www.jstor.org/stable/24590908.

Weimann’s article discusses the expansion of social networking has made it easier for

terrorists groups to communicate, recruit, and spy on users from around the world.

According to the article” 90 percent of terrorist activity on the internet takes place using

social networking tools” (Weimann 46). The article details that since the growth of social

networking platforms, such as Facebook, terrorist groups, “no longer geographically

constrained within a particular territory, or politically or financially dependent on a


Aine McGonigle
English 015
Professor Zack De Piero
November 13, 2018
particular state, they rely on technologically modern forms of communication-including

the internet” (Weimann 45). In the Facebook section they discuss how the most popular

social networking site has incidents of people posting graphic photos or provocative

messages to their timelines and also sending friend request and messages to users of the

site. They also use the site to look at information on those men and women who serve our

country, so they know all about their personal lives. Weimann wants to get the message

across that these people are out there, and they are watching so we must be very cautious

as to what we post and how much of the privacy settings we have enabled.

GOODFELLOW, SIMON. “Does ‘I Accept’ Really Mean ‘Abandon All Hope of Privacy, Ye

Who Enter Here’?” Litigation, vol. 40, no. 3, 2014, pp. 27–34. JSTOR, JSTOR,

www.jstor.org/stable/44677681.

Simon Goodfellow’s article is to simulate the closing arguments made by the two parties

discussing the claim that the fictional company, In re Amalgam, Inc. Online Privacy

Litigation, has been “improperly aggregating its users’ personal information and selling it

to advertisers and vendors” (Goodfellow 27). The article begins with the closing

statement from the Plaintiffs’ closing argument. The argument is that the company did

not make these key pieces known to the clients before they signed the agreement as well

as subjecting those who have been sent anything from an Amalgam user to the same fate.

They argue that we should have more privacy and we do not need to have our

information sold out to the world for their profit. They briefly compare this behavior to

that of the “government that seeks to peer into every corner of its citizens’ lives”

(Goodfellow 28), also known as Big Brother. This invasion of privacy can ruin your life

and the lives of those around you. The Amalgan’s closing argument wants its jury
Aine McGonigle
English 015
Professor Zack De Piero
November 13, 2018
members to see that with all the evidence provided, there is no illegal activity because the

users signed up for the program. Overall, the main purpose of this article is to give

students a simulated court case that is very prevalent in our society and how each side

would approach it.

S-ar putea să vă placă și