Monday, 24 March 2014

Technology Scenario #7: my unintended photoshoot "debut"

Scenario #7
Mrs. Peters enjoys working with technology. She has been working with computers for several years now and has her own website to allow friends to keep up with what her family is doing. Every year she posts her family's holiday photo on the website. A friend who lives overseas contacts her and says that she saw her family's photo being used as an advertisement. Neither Mrs. Peter nor her husband know anything about it. How do you protect your identity? (Ribble, 2011, p. 92)
Stay Smart Online. (2014). Identity (online image).
Retrieved from: http://bit.ly/1h2DgIS
Well it seems to me that Mrs. Peters has a classic case of the "didn't you read the fine print?"

Problem: Mrs. Peter was not fully aware of her privacy settings when she first launched her personal website. 
Referring back to last week , we were asked to create a concept map regarding "Digital Citizen Rights and Responsibilities". The problem with this scenario, is Mrs. Peter was not fully aware of what she was signing up for. In terms and conditions, websites list terms the user must 'accept' before launching their site. Mrs. Peter should have been more attentive when reading the terms to ensure her content would be use appropriately.

How to avoid this: be aware and informed. Before consenting and joining a new network do your homework. Be aware of the privacy settings, and know who holds the copyright to any information or content that is shared. 
If Mrs. Peter's had read the terms and conditions she would not have allowed her content to be used and exploited for advertisements. Here are 10 ways to protect your online identity that will be helpful to prevent this from happening again. 

BUT- let's put on the breaks, shall we? Mrs. Peter's has the right to own her own content, as well as the right to share her content for her intended purposes. What do you think is the real problem, users being inattentive or the owners of these digital networks misleading users and using users content inappropriately? 



No comments:

Post a Comment