![]() |
| Source: unsplash.com |
#eprivacy. There is a growing movement to protect and secure individual's online identity. For me, this is a choice topic. The benefits of social media and digital communication are tremendous for both business and personal use. However, I am concerned that users are unaware of the value that both businesses and hackers place on the information they are providing. Additionally, I am apprehensive for a future devoid of private thoughts.
Tracy Mitrano of Cornell University eloquently expressed that “Technology does indeed create new social norms” (Mitrano, 2006, para. 13). While technology does foster and encourage new behaviors (that are both positive and negative), it is becoming more and more important for individuals to be mindful of their interactions online and how that interaction could be interpreted or manipulated. For example, a variety of retail stores offer mobile payment apps, including Chipotle and Starbucks. On the surface, this is a transparent and consumer friendly application, yet individuals should be aware of how companies can utilize this data (tracking the products purchased, locations, and the amount etc.). Joel Mathis analyzes the possibilities for the future of mobile payments, describing how customers receive coupons and other incentives based on their mobile payment usage (Mathis, 2014). Personally, I don't need a record, and I don't need a store to have a record, of the number of burrito bowls that I have consumed. Consequently, my main concern for online privacy and security is the vast amount of information that is shared and collected instantaneously.
Tracy Mitrano of Cornell University eloquently expressed that “Technology does indeed create new social norms” (Mitrano, 2006, para. 13). While technology does foster and encourage new behaviors (that are both positive and negative), it is becoming more and more important for individuals to be mindful of their interactions online and how that interaction could be interpreted or manipulated. For example, a variety of retail stores offer mobile payment apps, including Chipotle and Starbucks. On the surface, this is a transparent and consumer friendly application, yet individuals should be aware of how companies can utilize this data (tracking the products purchased, locations, and the amount etc.). Joel Mathis analyzes the possibilities for the future of mobile payments, describing how customers receive coupons and other incentives based on their mobile payment usage (Mathis, 2014). Personally, I don't need a record, and I don't need a store to have a record, of the number of burrito bowls that I have consumed. Consequently, my main concern for online privacy and security is the vast amount of information that is shared and collected instantaneously.
| Source: unsplash.com |
The growing fear has not discouraged me from using multiple online
platforms. Of course, there are certain platforms that I choose to not use, including SnapChat (this probably has more to do with my age). I have a strong feeling that the content shared on SnapChat is not permanently deleted
after it is viewed. Recently, this has become an issue for the company. In 2013,
SnapChat reportedly “released a database of 4.6 million Snapchat users and
their phone numbers. The leak, a particularly embarrassing transgression for a
company whose image is partly grounded in the promise of privacy” (Foster &
Jackson, 2014). If you have a chance, this is a very interesting read in The New
Yorker, Anatomy of a Snap Attack.
Admittedly, I am skeptical of social and digital media for personal use. I prefer to engage my community of friends and family off-line, in a more personal setting. However, I am a strong proponent for businesses to participate, engage, and connect with its community via social media. There are tremendous opportunities for businesses to solve problems, build brands, and create engaging communities. That being said, we as individuals should be aware of the materials that we are posting and the individuals that we are engaging with online.
References
Foster, R., & Jackson, B. (2014, Januar 9). Anatomy of a snap attack. The New Yorker. Retrieved from: http://www.newyorker.com/tech/elements/anatomy-of-a-snap-attack
Mathis, J. (2014, February 25). Why 2014 could be the year mobile payments explode on the iPhone. Macworld. Retrieved from: http://www.macworld.com/article/2101300/why-2014-could-be-the-year-mobile-payments-explode-on-the-iphone.html
Mitrano, T. (2006, January 1). A wider world:Youth, privacy, and social networking technologies. EDUCAUSEREVIEW. Retrieved from:http://www.educause.edu/ero/article/wider-world-youth-privacy-and-social-networking-technologies
Siciliano, R. (2011, July 13). 15 social media security tips. McAfee. Retrieved from: https://blogs.mcafee.com/consumer/15-social-media-security-tips


