Chamberlain College The Security Behavior and Privacy of Mobile Users Paper

User Generated

Glsh

Humanities

Chamberlain College of Nursing

Description

Instructions:

Reread the articles between pages 310-325 about social networking privacy threats. After reading the four sources provided between those pages, write an Argument Synthesis Essay about one of the textbook articles and another online source (that you locate on your own) that discusses the same topic. For example, if you want to write about anonymous cyberbullying, you could pair Jonathan Mahler's "Who Spewed That Abuse? Anonymous Yik Yak App Isn't Telling" with another web article that discusses internet anonymity.

After evaluating the articles and developing your own perspective of the central topic, use the subject matter discussed in the two articles to help you argue an original point about social media privacy. More specifically, you will compose an arguable thesis about social media privacy, but you will use the support of two articles to lend credibility to your claim.

According to the synthesis concept described in Practical Argument between pages 341-343, you can "combine summary, paraphrase, and quotation from several sources with your own ideas to support an original conclusion" (341). In a nutshell, that is your goal for this new paper assignment.

Requirements:

  • Works Cited page in MLA Format. Don't forget your in-text citations!

Tips:

  • Please review the MLA formatting videos for document design and Works Cited page creation tutorials.
To make sure your paper meets the expectations for this assignment, review the page with "Tips for the Argument Synthesis Essay" that follows and consider the grading rubric for the assignment included in this weekly folder.

Unformatted Attachment Preview

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Thank you for working with me . Hope I can help you with more questions in the future. Bye for now!

1
Name:
Lecturer:
Course:
Date:
Online Privacy
The study's focus will be to discuss the article relating to the creepy Instagram maps that
collect information about the user's location. The article's focus is on the U.S Congressman that
Aaron Schock, whose reputation was hurt because of geo-location data, obtained from his
Instagram account. According to this case, it is easier for anyone to track somebody on
Instagram. The study will use an article by Koyuncu and Pusatli to discuss online privacy issues.
Downloading and installing mobile applications increases the risk of data theft, malware attacks,
and design flaws. From a technical view, privacy, and security issues relating to mobile
applications like Instagram continues to be a significant concern for both individual users and
businesses. Through the request of less relevant permissions, loosely defined, or misuse, and
aggregation of highly personalized data, mobile applications can and offer third parties with
private and sensitive data.
The Security Behavior and Privacy of Mobile Users
In the current information technology age, mobile computing is more so, resulting in the
collection of significant amounts of private data. The majority of the users knowingly or
unknowingly share and disclose private information without having a second thought. The
vagueness in current legislation offers organizations an opportunity to trade consumer data to

2
reduce costs, provide personalized services, and enhance returns through advertisements.
According to Pettersson, Popkewitz, and Lindblad, data handling practices legality that most
firms conduct includes a grey zone. There is a limited distinction between privacy invasion and
legitimacy by sharing data publicly on online platforms. It does not imply that the majority of the
people are satisfied with the prevailing circumstances. However, many users only become prodata sharing in cases of conscious engagement in the process ...


Anonymous
Just what I was looking for! Super helpful.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags