Documente Academic
Documente Profesional
Documente Cultură
English 015
Professor Zack De Piero
November 13, 2018
WP3 Annotated Bibliography:
Research Question: "Do you think that by implementing media training/privacy standards into
the installation of Facebook would decrease the amount of privacy issues we see occur on the
platform?"
Bibliographies:
Surveillance.” TDR (1988-), vol. 52, no. 4, 2008, pp. 21–40. JSTOR, JSTOR,
www.jstor.org/stable/25145553.
Westlake writes this article to inform his readers of the impact that Facebook has on three
main generations; Baby Boomers, Generation X, and Generation Y; and how Facebook’s
surveillance of its users has increased. Westlake discusses how the platform has added
new and exciting features, News Feed, which has made Facebook easier but also poses
remember thinking that it was a bold move for Facebook, but I also remember feeling a
little strange knowing that my every move (well, almost every move) would be seen by
all my Facebook friends” (Westlake 22). The article also gives its readers a background
on the media platform’s history. It discusses the founder, Mark Zuckerberg, and how he
had first envisioned the company to where it has come today. Zuckerberg states
“Facebook develops technologies that facilitate the spread of information through social
networks allowing people to share information online the same way they do in the real
world” (Zuckerberg 23). The article, in short, gives its readers the latest on all of the
history of Facebook and what has happened on the platform since its beginning.
Aine McGonigle
English 015
Professor Zack De Piero
November 13, 2018
Sacasas, L. M. “How Facebook Deforms Us.” The New Atlantis, no. 56, 2018, pp. 82–
L.M. Sacasas writes this article to give a review of the book Antisocial Media: How
professor of media studies and director of the Center for Media and Citizenship at the
University of Virginia. Sacasas starts out discussing his experience with Facebook and
how he first used it as a way to keep in touch with his college peers but now he uses it for
his career. He states that he began to withdraw from Facebook due to the 2016
controversy with the election. The book being discussed is very critical of Facebook, but
the author also still continues to use the media platform and shows his support. Sacasas
gives a brief summary as follows, “The book offers clear, deeply researched, and
evenhanded prose, enhanced by the author’s willingness to speak candidly about his own
addressing his readers principally as fellow citizens” (83). Sacasas details that throughout
the book, Siva also discusses what Aristotle could have taught Mark Zuckerberg,
Facebook’s founder and that Facebook is in a tough place because its users need to
evolve. Mainly, Sacasas desires to give his opinion of the book written about Facebook
and how the book could be improved as well as what points stood out as important.
Facebook.” ABA Journal, vol. 96, no. 3, 2010, pp. 32–32. JSTOR, JSTOR,
www.jstor.org/stable/27850806.
Aine McGonigle
English 015
Professor Zack De Piero
November 13, 2018
This author, Dennis Kennedy, discusses five tips for people who people, especially
lawyers, who are just getting started on Facebook. Kennedy recognizes that social media
platforms are becoming more of a necessity for those looking for clients, but he also
expresses the need for privacy and protection while using these platforms. He lists the
five tips for better security on Facebook which include: Having a strong password and
discriminating in your use of Facebook apps, take control of what other can put on your
timeline, and consider using “friends lists.” Kennedy describes a term very well-known to
those in social media and that is phishing. “Phishing is the term used for efforts made by
the bad guys to obtain your username and password” (Kennedy 32). This is very
prevalent in Facebook. He also gives the readers a few little reminders such as “Think
before you post” (Kennedy 32) and “Think long and hard before you make anything
available to everyone” (Kennedy 32). Mainly, Kennedy hopes that readers of this article
should be fully aware of what they are sharing and how much privacy these platforms
Weimann, Gabriel. “Terror on Facebook, Twitter, and YouTube.” The Brown Journal of World
Affairs, vol. 16, no. 2, 2010, pp. 45–54. JSTOR, JSTOR, www.jstor.org/stable/24590908.
Weimann’s article discusses the expansion of social networking has made it easier for
terrorists groups to communicate, recruit, and spy on users from around the world.
According to the article” 90 percent of terrorist activity on the internet takes place using
social networking tools” (Weimann 46). The article details that since the growth of social
the internet” (Weimann 45). In the Facebook section they discuss how the most popular
social networking site has incidents of people posting graphic photos or provocative
messages to their timelines and also sending friend request and messages to users of the
site. They also use the site to look at information on those men and women who serve our
country, so they know all about their personal lives. Weimann wants to get the message
across that these people are out there, and they are watching so we must be very cautious
as to what we post and how much of the privacy settings we have enabled.
GOODFELLOW, SIMON. “Does ‘I Accept’ Really Mean ‘Abandon All Hope of Privacy, Ye
Who Enter Here’?” Litigation, vol. 40, no. 3, 2014, pp. 27–34. JSTOR, JSTOR,
www.jstor.org/stable/44677681.
Simon Goodfellow’s article is to simulate the closing arguments made by the two parties
discussing the claim that the fictional company, In re Amalgam, Inc. Online Privacy
Litigation, has been “improperly aggregating its users’ personal information and selling it
to advertisers and vendors” (Goodfellow 27). The article begins with the closing
statement from the Plaintiffs’ closing argument. The argument is that the company did
not make these key pieces known to the clients before they signed the agreement as well
as subjecting those who have been sent anything from an Amalgam user to the same fate.
They argue that we should have more privacy and we do not need to have our
information sold out to the world for their profit. They briefly compare this behavior to
that of the “government that seeks to peer into every corner of its citizens’ lives”
(Goodfellow 28), also known as Big Brother. This invasion of privacy can ruin your life
and the lives of those around you. The Amalgan’s closing argument wants its jury
Aine McGonigle
English 015
Professor Zack De Piero
November 13, 2018
members to see that with all the evidence provided, there is no illegal activity because the
users signed up for the program. Overall, the main purpose of this article is to give
students a simulated court case that is very prevalent in our society and how each side