PERIOD+1+INVASION+OF+PRIVACY

 "I don't want to write an autobiography because I would become public property with no privacy left." - Stephen Hawking
 * I ****nvasion of Privacy **

Social networks keep track of all interactions used on their sites and save them for later use. Issues include cyberstalking, location disclosure, social profiling, 3rd party personal information disclosure, and government use of social network websites in investigations without the safeguard of a search warrant. __Invasion of Privacy__ - The intrusion into the personal life of another, without just cause, which can give the person whose privacy has been invaded a right to bring a lawsuit for damages against the person or entity that intruded. However, public personages are not protected in most situations, since they have placed themselves already within the public eye, and their activities are considered newsworthy.

Web Pages: [] This website explains the different types of social networks and what is private. Also talks about how the government can use social media sites and what bosses find when searching an employee's information.

[|http://www.bullguard.com/bullguard-security-center/internet-security/social-media-dangers/] [|privacy-violations-in-social-media.aspx] This website talks about the “dark side of social media.” They give tips on how to keep your data from being leaked or tracked. Also, they describe how people can track and “data scrape” you on the facebook and twitter apps.

These links have to do with the topic of privacy because there have been many incidents of hacking and gaining private access to information.

News Articles:

__ [] __ In this article: "A Minnesota middle school student, with the backing of the American Civil Liberties Union, is suing her school district over a search of her Facebook and e-mail accounts by school employees."

__ [] __ This article talks about how the National Security Agency should shut down their surveillance program, for it has never discovered any terrorist threats.

__ [|http://www.nbcnews.com/id/3078835/t/online-privacy-fears-are-real/#.VGYgMVhHAag] __ This article, written by Bob Sullivan, tells stories of what would happen if you find someone stalking your private accounts.

These news articles include spying on people, what has been done to prevent hacking, and how the government invades our privacy.

Videos: [] This video talks about Facebook, and how it can invade your privacy.

[] <span style="color: #0a0e6b; font-family: 'Trebuchet MS',Helvetica,sans-serif; font-size: 120%; vertical-align: baseline;">This video talks about Google, how it is tracking Apple iPhone and iPad users what they look up.

<span style="color: #060930; font-family: 'Trebuchet MS',Helvetica,sans-serif; font-size: 120%;">The videos here shows how the internet can track user's private information.

<span style="color: #aa9b17; font-family: Impact,Charcoal,sans-serif; font-size: 200%;">Corresponding Criticism:

[] <span style="color: #19ad16; font-family: 'Trebuchet MS',Helvetica,sans-serif; font-size: 120%; vertical-align: baseline;">Critics say Google invades privacy with new service. The article discusses that Google introduced a new produce called Buzz. Once people of Buzz log into Buzz, they automatically make network friends based on who they communicated with on G-mail.

[] <span style="color: #369b12; font-family: 'Trebuchet MS',Helvetica,sans-serif; font-size: 120%;">“However, flying over our homes, farms, ranches and businesses and spying on us while we conduct our everyday lives is not an example of protecting our rights. It is an example of violating them”. <span style="color: #369b12; font-family: 'Trebuchet MS',Helvetica,sans-serif; font-size: 120%;">These drones are used for crime fighting tool for law enforcement officials. These drones are invading our fourth amendment right of personal privacy.

[|http://www.nbcnews.com/id/3078835/t/online-privacy-fears-are-real/#.VGY8olhHAag] <span style="color: #23ad18; font-family: 'Trebuchet MS',Helvetica,sans-serif; font-size: 120%; vertical-align: baseline;">This article contains how “there are a lot more people tracking you than you think”. As well as a 20- year old women was stalked from the help of the internet and murdered.

<span style="color: #070707; font-family: 'Trebuchet MS',Helvetica,sans-serif; font-size: 120%; vertical-align: baseline;">These links talk about the consequences and effects of stalking.

<span style="color: #ff0000; font-family: 'Comic Sans MS',cursive; font-size: 140%;">Pros:
 * 1) <span style="color: #0fa1e0; font-family: 'Comic Sans MS',cursive; font-size: 120%;">You can see the faces of intruders.
 * 2) <span style="color: #0fa1e0; font-family: 'Comic Sans MS',cursive; font-size: 120%;">The government can find suspects of terrorism or illegal actions through emails, social media, or texting.

<span style="color: #ff0000; font-family: 'Comic Sans MS',cursive; font-size: 140%;">Cons:
 * 1) <span style="color: #10b6ea; font-family: 'Comic Sans MS',cursive; font-size: 120%;">It sees everything you do.
 * 2) <span style="color: #10b6ea; font-family: 'Comic Sans MS',cursive; font-size: 120%;">People can find inappropriate information about you.
 * 3) <span style="color: #10b6ea; font-family: 'Comic Sans MS',cursive; font-size: 120%;">It might risk your chance of getting a job.
 * 4) <span style="color: #10b6ea; font-family: 'Comic Sans MS',cursive; font-size: 120%;">People can invade your personal space.
 * 5) <span style="color: #10b6ea; font-family: 'Comic Sans MS',cursive; font-size: 120%;">They might be able to blackmail you with private information.

<span style="color: #c10755; font-family: Impact,Charcoal,sans-serif; font-size: 190%;">Blog Posts:

[] <span style="color: #8e620e; font-family: 'Trebuchet MS',Helvetica,sans-serif; font-size: 120%;">This blog talks about that what people post on social media is not a violation of privacy because people are purposely putting it on the internet for others to see. It also talks about the privacy setting that some platforms have. [] <span style="color: #8c610f; font-family: 'Trebuchet MS',Helvetica,sans-serif; font-size: 120%;">This talks about how some advertisements on the web can turn out to be false. They also say that websites can switch images or facts around to make it look like the opposite of what actually happened.

[] <span style="color: #966912; font-family: 'Trebuchet MS',Helvetica,sans-serif; font-size: 120%;">This blog explains what drones are and what they are used for. Also, they list the policies on how they would <span style="color: #966912; font-family: 'Trebuchet MS',Helvetica,sans-serif; font-size: 120%;">be used and under what circumstances.

<span style="font-family: 'Trebuchet MS',Helvetica,sans-serif; font-size: 120%;">These blog posts talk about how social media does NOT invade privacy, false advertisements, and drones.

<span style="color: #074e84; font-family: Impact,Charcoal,sans-serif; font-size: 190%; line-height: 34.5px;">Podcasts: [] <span style="color: #0b665b; font-family: 'Trebuchet MS',Helvetica,sans-serif; font-size: 120%;">This podcasts stars Marc Rotenberg, who is the Executive Director of the Electronic Privacy Information Center in Washington, DC. He talks about the current laws that gives public figures and private people adequate protection from online hackers who post inappropriate content on websites. He discusses the recently leaked nude photos of celebrities from the website 4chan and he also explains the laws pointed towards the issue <span style="color: #0d7c68; font-family: 'Trebuchet MS',Helvetica,sans-serif; font-size: 110%;">.

<span style="font-family: Arial,Helvetica,sans-serif;">[] <span style="color: #0e6d62; font-family: 'Trebuchet MS',Helvetica,sans-serif; font-size: 120%;">This stars Larry Greenemeier. It is an 8 minute podcast that discusses your privacy and the threats to it.

<span style="font-family: 'Trebuchet MS',Helvetica,sans-serif; font-size: 120%;">These podcasts discuss the topic of hacking and privacy.