Art of Cyberdribble is a blog written by adult learners at the Regis University College for Professional Studies (CPS). The purpose of the blog is to examine the intersection of communication and cyberspace.
Social Networking
I currently use Facebook for my social networking site and I previously used MySpace. I like the layout of Facebook and it is very user friendly for me. I think social networking sites can be impersonal, interpersonal or hyperpersonal depending on the people you are communicating with on the site. For me, Facebook is very interpersonal as I talk to a lot of family and friends that live in other states. I do notice that some people tend to over emphasize emotions when communicating on facebook. For instance, jokes that would get a good chuckle in person get an "LOL" (laughing out loud). I find e-mail communications to be somewhat impersonal, even when talking to those that I am close to. Facebook adds a more personal dimension to my communications. Facebook and other social networking sites give everyone a way to communicate at whatever level they are comfortable with, whether impersonal, interpersonal or hyperpersonal. The options available for social networking also meet the needs of a variety of users. It is easy to see why this communication trend is growing in popularity.
Groupon Says No to Google
Groupon's advantage comes from its business model. The "daily deals" are customized to the user's region. A user from Pittsburgh will only see deals for local Pittsburgh businesses. Addtionally, users can add personal interests to their profile, further customizing the deals that are available. Groupon is able to do this because of their organizational structure. According to Bond (2010), Groupon employs over 2,600 individuals, most of whom are NOT techy types. They are sales people who personally know their customers.
Most people would assume an offer from Google would indicate that someone had developed some new form of technology. In this case it would appear that Groupon found a way to personalize an internet business. I guess they wanted to hold onto that "innovation" a litle bit longer.
Bond, Andrew. (2010, December 10). A bullet that wouldhave made Google stronger. Retrieved from http://www.fool.com/investing/general/2010/12/10/a-bullet-that-would-have-made-google-stronger.aspx
To Chrome or Not To Chrome
Betanews.com user PC_Tool had the following questions regarding their review of Google’s Chrome Laptop, "'Where is Works?!? Where are the MSN and Yahoo! messengers? What? You cannot even install them???!? Where's my Windows Live Mail client? Why can't I find anything on this thing?!?!' Yeah. The average consumer? Doesn't handle frustration well" (Wilcox, 2010).
Google has started a pilot program for users to test their new Chrome laptop which is expected to be released during the second half of 2011. This may sound like incredible news to some, but this is not your everyday laptop. So, what is different you may ask? Well this laptop runs exclusively using a home wireless network or Verizon’s 3G network, and all of the applications are accessed via the web browser. With a Chrome laptop, users no longer install software locally using a CD or DVD, but instead access and install applications using the Chrome Webstore. A cool feature of these applications is users can access their files anywhere, because they are stored in the cloud or Internet. Another great feature is users get 100 Mb of data transfer free using Verizon’s 3G network.
Google’s laptop has great features and all, but what type of user does this system benefit? This laptop is perfect for an average user who does nothing more than instant messaging, social networking, emailing, or casual surfing. It is also a good laptop for software engineers who are looking to break into a new market by creating applications for Google's Chrome operating system. This laptop is, however, not good for any users of graphically intensive software like games or video editing.
I personally have applied to become a member of the Google Chrome Pilot program because I believe a laptop like this will be great for long vacations and also because I enjoy new technology. If you would like to become a tester, or just want more information, please visit http://www.google.com/chromeos/#utm_campaign=en&utm_source=en_us-ha-na-us-sk-launch&utm_medium=ha&utm_term=chrome%20pilot%20program.
References
Wilcox, J. (2010, December 12). Who really needs a chrome os laptop?. Retrieved from http://www.betanews.com/joewilcox/article/Who-really-needs-a-Chrome-OS-laptop/1292189689
Can we have some manners please?
I have several social sites that I use. I use facebook for my personal and linkedin for my business. I find that my facebook is almost hyper personal because I find that I over give information about my life. I used it talk with friends, family and make new ones. I have also dated a few people off of the site but I do find at time it has become intrapersonal because I will correspond with people that I somewhat know but not on a personal level of others on the site. On linked in however it actually feels impersonal and I actually find I don't use it unless I am looking for an employee and/or resources for my work and it may turn to interpersonal if I use email to go back and forth with them. I think it varies depending on what you use it for and how much you feel like sharing, I have a habit of over sharing and sometimes think it works against me but it can be a good way to communicate with persons you may not be able to talk to as much as you like.
Nogales, Ana Dr. (October 2010) Face Book Vs Face to Face Psychology Today Blogs retrieved from "http://www.psychologytoday.com/blog/family-secrets/201010/facebook-versus-face-face" http://www.psychologytoday.com/blog/family-secrets/201010/facebook-versus-face-face
What is Twitter?
Mostly the craze with Twitter is advertised for use to give out hyperpersonal communication for those that like to share their daily activities to post them to the world, such as, “I just finished making dinner.” But if you take that statement further using Twitter and “tweet.” I just finished making dinner using Alfalfa’s Organic Bean Sprouts and it was great,” you have extended your communication into both hyperpersonal and interpersonal advertising to try entice you to try the sprouts. And finally you can go one more step and “tweet” Made dinner, Use Alfalfa’s Organic Sprouts recipe I saw on Healthy Cooking Twitter, bought them at 9th Street Market, on sale! Perfect for the health and pocket” you add to your hyperpersonal, interpersonal statement a new twist of marketing for Alfalfa Sprouts.
I did not realize the extensive use of Twitter until I read this article and finally got it. “Twitter is micro-blogging. It is social messaging. It is an event coordinator, a business tool, a news reporting service and a marketing utility”(Nations, 2010).
Nations, D. (2010). “What is Twitter? Twitter Explained.” About.com. Retrieved December 10, 201 from
http://webtrends.about.com/od/socialnetworking/a/what-is-twitter.htm
LinkedIn, a Useful Tool for Connecting Business Professionals
Since I’m new to the business world, I haven’t used LinkedIn myself however, my wife has for years so I ‘interviewed’ her. It seems that the standard protocol is to use Facebook for personal and LinkedIn for business contacts and never, ever let the two intertwine!
LinkedIn satisfies two key purposes: it allows you to keep in contact with former colleagues, see their progress in their careers. It also allows helps in the job hunt realm. Recruiters can find you there and if for example you’re interested in a company you can look that company up in LinkedIn and see if you have anyone in your network connected with anyone at that company and get ‘introduced’ virtually. These are forms of interpersonal communications. My wife is currently working at a job that she was recruited through LinkedIn for. That being said, she wouldn’t want any of the people on that site to see her Facebook pictures from her 40th birthday party.
The below link brings you to a graphical explanation that supports the above definition.
http://www.linkedin.com/static?key=what_is_linkedin&trk=hb_what
Should you Friend your Physician?
“As your doctor, I might sit on the edge of your hospital bed and try to quell your fears and anxieties of being ill. Or, I might bounce into the examination room with a bright smile and try to make you laugh with one of my very funny (read: corny) jokes. We might sit together and catch up on your life over the past six months since we last saw each other. In fact, we might have a patient-physician relationship that makes other patients and physicians utterly jealous.
But, please, don't ask me to be your friend. That is, your Facebook friend.” (http://www/)
Should everyone accept all the invitations on Face Book? Most of the population accepts friends on Face Book to keep in touch, gossip, and communicate. Should you friend your own personal Physician? After all this is the person that knows you in a medical sense but nothing else. Should your Physician accept?
In all cases I believe it to be no. Keeping the Doctor patient relationship is the utmost importance to any healthcare professional. To have your personal physician as a friend on a social networking is not a healthy idea for the person/patient. There has to be a demarcation between the two of patient and physician. The case of a person being a social friend to your personal physician is not always the wisest choice. Again the demarcation factor and how wise is it to know your Physician can see or read everything you put out on the social network? It is like an open invitation to be viewed and reviewed.
Some of the post that I am able to see on Face Book are not proper or could be construed as being severely depressed or other disorders that a physician due his oath would have to take action. Most of the posts I see that could be mistaken are just whining notes but why put yourself out there for inspection from your physician on a daily basis. And is he or she really your friend? Would they have the same circle of friends and the same interests?
Face Book’s value is social networking and unless you are in the same social network as your physician it is never a good idea. There is no policy with the AMA as of yet but it is come to the front of the to do list.
(http://www) the Physician makes a good point, “For many of us physicians on Face Book, the thought of opening up our personal pages filled with family photos, off the cuff remarks and potentially relationship status and political and or religious views to our patients gives us the heebie-jeebies……..” The physician may share a potential view that his patients may take an issue to.
It is better left that Physicians do not friend patients. There are none of my Physicians I not want to have friend me on Face Book. It would not leave it as a social network but babysitters with your Physician looking on to make sure you are ok.
References
http://www. Usatoday (Vol. com/news/opinion/forum/2010-06-10-column10_ST1_N.htm?POE=click-refer). Retrieved from http://www.usatoday.com/news/opinion/forum/2010-06-10-column10_ST1_N.htm?POE=click-refer
http://content.usatoday.com/topics/topic/Culture/Computers+and+Internet/Facebook
Sprint
Sprint, like most cell phone companies, is currently jumping on board with new technology that will advance group collaborative communications. First, Sprint is offering on their phone plans unlimited text and web usages. There are even apps on Sprint phones for tweeting, Facebook and emails. One can get these apps set up to where they pop like voicemail messages on the phone. There is even a 4G network available for certain Sprint phones.
To help strengthen Sprint with its technology, Sprint has made alliances with several other companies. HP has helped Sprint with the mobility of business solutions. The next alliance is Sprint with IBM. IBM has helped Sprint with integrated business software programs. Microsoft has joined Sprint to help with security and reliable custom apps for business and personal use. With these alliances Sprint has succeeded in getting a leg up on its competition.
Forbes.com/sprint
Company Spotlight: Sprint Nextel Corporation /Marketwatch: Telcoms, March 2010, vol9, Issue 3 retrieved at www. Regis/library/business source complete.com December 11, 2010
Social Media and Divorce
Facebook, MySpace and twitter are leading to more and more divorces. Divorce-online.co.uk studies 5000 different divorces files from the United States. The researchers found that 20% of those had a Facebook some where in the divorce papers. Senior digital investigator Giovianni Masucci at National Digital Forensics, Inc. states,”half the social media cases they investigate expose some sort of cheating”(Chen, S). The article does not mention any information about other social networking sites like Twitter or Myspace. It seems to me that if someone in a marriage is willing to have a sexual chat with someone other than their spouse on Facebook the marriage was headed for a possible divorce anyway.
According to CNN lawyers are using social media like Facebook to build cases for their clients (Chen, S). Divorce Attorney Lee Rosen says he uses websites like Flowtown.com to find all of the social media pages that someone may be using. Recently divorce lawyer Ken Altshuler represented a woman who was divorcing her husband because of alcohol abuse. The husband denied the accusation and claimed to have quit drinking. However, the lawyer was able to find a photo of the accused husband drinking a beer on Facebook. Professor of Psychology Elizabeth K. Englander at Brightwater State College in Massachusetts gives a reason to why some people post their whole life online even when they are seeing another woman or man. Englander states, “ the sense online is sort of like the mob effect, you feel like you're one in a million, and so who will ever notice you?
While I do not and would never condone cheating on or lying to your spouse at least do not treat them as if they are stupid and blatantly post photos of you cheating and lying.
Chen, Stephanie. 2010. Divorce attorneys catch cheaters on Facebook. Retrieved from http://articles.cnn.com/2010-06-01/tech/facebook.divorce.lawyers_1_privacy-settings-social-media-facebook?_s=PM:TECH
O'Donnell, Matt. January 4, 2010. Study: Facebook often leads to divorce. Retrieved from: http://abclocal.go.com/wpvi/story?section=news/bizarre&id=7199535
Cyber bullying - More than you Know
I run a non- profit college planning organization and I had to get special permission to blog even for my secondary educational needs. It was approved only with all my information being researched and checked. The Board of Directors approved the topic of Cyber Bullying because the group has mentoring programs on internet safety and use and feels any enlightened conversation will help the young students.
Cyber bullying is everywhere in the news, TV, and radio. I would go one step beyond the teenage and middle school crisis and touch on another issue of cyber bullying with religious groups. These groups include both Far right, left, and atheists.
Everyone’s point of view is correct one group says the world is 6000 years old another group says it is millions of years and the argument of who is correct leads to more arguments. My experience comes from a local networking group in a community I lived in for most of my life.
I decided to join a study group to learn more of the religions of the world. I contributed as was expected and part of the agreement with the group. We had full disclosure and agreements in place to not violate privacy and respect of others. Our contributions were mostly regarding community service and helping others and the different practices from around the world.
Then the zealots took over our group. Victimization on the internet comes in many forms. Cyber bully is the new buzz word but I would like to add one, “Pastors of the Internet” (POTI). What I mean by this statement the group came across self proclaimed pastors who were very innocuous at the beginning and very comforting to some of the group.
Slowly the change came about and the proof of the first statement “willful and repeated harm” as cited proved to be spot on target. The fact there were threats of violence did not become clear until the day the group did NOT say amen to one of the “POTI” posts of great length and rambling words of no meaning.
None of knew he was testing everyone and the threats started slowly at first and very obscure but it grew to the point people were threatened with death. I never gave my real name most of the people did identify themselves which I believed to be a mistake but everyone trusted. I had one of those gut feelings and I used an alias.
My research ended on this project and my class was done. I left this group and have never logged in since then. I could not take the brutal attacks on some members of our group. I was not one of them as I am fairly meek and mild with internet postings.
50, 60, and 70 year old people were bullied, called names, and told to die as they were too old to live anymore. All of this from a “pastor”, cyber bullying yes it is more than any of us can know. There has got to be an answer.
References
The New York Times. (2010, September 30). Cyber bullying. Message posted retrieved from http://topics.nytimes.com/top/reference/timestopics/subjects/c/cyberbullying/index.html,
Business and Social Networking
"How do most successful companies use social media?” Tweeting and Blogging To The Top –
Nora Ganim Barnes (Spring2010)
All companies should be asking themselves how they can become more successful, and work their way to the top through the use of social media. Two extremely profitable social media mediums are tweeting and blogging. But, there are some limitations companies will have to overcome in order to make tweeting and blogging pay off. First of all, there must be ground rules in place, for what can and cannot be said on social networks. Plus, if the wrong thing is said, it could be detrimental to an entire company and the company’s reputation. Some people would feel that these ground rules are a violation of one’s freedom of speech. Once these ground rules are met, companies can begin to use social networking to help their business become more profitable. One way that a company can utilize social networking, is by keeping employees up-to-date on meetings and office goals, through the use of tweets. This communication would allow all employees to be on the same page. Another way companies can make money using social networking is by acquiring faster responses from customers, thereby getting up-to-date feedback on their product(s). Fortune 500 businesses have already grasped this idea and have been quite successful with it.
After reading Nora Ganim Barnes’ article on tweeting and blogging, I found that Fortune 500 businesses(these are companies that are not incorporated or not as big as the Inc.500 businesses) are moving at a much faster rate towards social networking than Inc. 500 businesses. The Fortune 500 businesses see social networking as a way to get a leg up on the competition. First, the consumer is able to give feedback on the specific product, which is then evaluated by the company, thereby giving the consumer an added value to their purchase. Secondly, social networking allows these companies to run product and brand awareness campaigns through blogs and tweeting, with a more cost effective and valuable system of marketing. Thirdly, social networking makes a substantial difference as to whether or not a company, like Inc. 500, will be more or less successful in today’s business world. It also means that the Inc. 500 companies must overcome limitations, such as certain legal issues that come with social networking. Once these limitations are overcome, they too, like the Fortune 500 companies, can successfully use social networking in order to make a profit and have a successful business.
Barnes, Nora Ganim. (Spring 2010). How Do the Most Successful Companies Use Social Media? Retrieved November 25, 2010, from http://web.ebscohost.com.dml.regis.edu
Hybrid Reality and Location-Based Gaming
Per Adriana de Souza e Silva closing comments “The game arena is no longer confined to a board or to a computer screen.”
Hybrid Reality and Location-Based Gaming (HR&LBG) takes the online gaming to a new level of reality. For years the gamer has been trying to “get into the game” and now with mobile technology as advanced as it is the gamers are now able to interact with real life characters in realtime. CAN YOU SEE ME NOW? is a good example of how a good Hybrid Reality and Location-Based Game would work. According to de Souza e Silva, in the HR&LBG there are two components, a digital and physical component (de Souza e Silva 2008). The digital component is the online gamer that is logged in and is tracking and communicating with characters that are participating in the physical component, in real cities being chased or chasing one another around that city with mobile hand held devices such as cell phone and PDAs. Throughout the chase these characters are communicating with one another via GPS and text messages. The urban unknown variables such as bad GPS signal and red lights all contribute to the overall difficulty of the game. There are many different types of scenarios that could be manifested into an urban environment setting as a hybrid reality game such as a cold war spy game or the traditional cops and robbers.
Traditional video games and board games are confined to a defined space of the computer or the game board. Social interaction and space is limited and tied to the computer and physical game itself. Hybrid Reality and Location-Based Gaming redefines and bridges the space between two and three dimensional reality games using the advances in mobile technology and internet computing to take real time data such as climate, terrain, and other variables in the urban environment and used them to set up the limits of a hybrid reality experience.
Hybrid Reality and Location-Based Gaming is in it infancy, because many people still use their mobile device like a glorified telephone and not like a hand held global positioning computer. As mobile technology advances and the gamers reach further for that ultimate goal of virtual reality, hybrid reality gaming will become more of the norm. The integration of computer based technology and realtime data processing to set up a game based on reality has true potential for applications far beyond gaming for the fun of it. This type of integrated technology could be employed for social, economic, and military applications for training and problem solving for real world scenarios.
Notes
Blast Theory + The Mixed Reality Lab. Can you see me? (2001-2004). Nottingham, UK: Retrieved 23 April 2007 from http://www.canyouseemenow.co.uk
de Souza e Silva, Ariana, (2008). Hybrid Reality and Location-Based Gaming: Redefining Mobility and Game Space in Urban Enviroments. Retrieved from http://sag.sagepub.com/content/40/3/404
"Not so long ago the Net was presumed to be an unrelieved social backwater. "Nearly all the initial studies about people who used the Internet for social interaction suggested that they were getting lonelier," says University of Chicago social neuroscientist John Cacioppo, co-author of Loneliness: Human Nature and the Need for Social Connection. Those studies were predicated on the notion that people used the Internet to replace face-to-face interactions and that relationships formed online would stay online. "For disabled users who couldn't get around, that [practice] worked well," Cacioppo says, "but for others, it didn't." A person could not even know for sure who was really on the other end of the line. Psychology research focused on this scene with critical eyes, often dismissing online socializing as lonely escapism from the disquiet of real relationships.
This dire view of social networking began to change as research grew more nuanced. In a 2008 study at California State University, Los Angeles, psychologists Kaveri Subrahmanyam and Gloria Lin interviewed 192 high school students about how they used the Internet for communication, how much time they spent online and which sites they typically frequented. The study participants then completed psychological tests for assessing loneliness and social support. Neither total amount of time spent online nor time spent communicating online correlated with increased loneliness."(disalvo)
This captures how important online networking has become. In years past you were a loner, nerd or unattractive if you used the internet to be social. I would say years ago I used to be one of those that thought it was tabu to be online and talking to all your friends and making new friends online. But these days even study's show that this is not the case, many persons on social sites are well educated, well socialized person just getting another way to talk to eachother. Its a way to find a job, create business, build friend ships and talk to people and communicate with person far away from us and its cheaper than long distance calls.
It has defiantly been beneficial to many but can still make people that feel lonely even worse. Take the person that is not well liked in person, maybe the same could occur online. Or the ex you get to watch move on in status updates, pictures or possible you change to single and everyone wants to know your pain. I also think people seem to be more apt to be meaner because they are not face to face so you have to beware of that also.
I think just like anything, moderation is the key. make it apart of your social science but not the only part. You still need to meet face to face, still need to be there in person for your friends and family and still need to be meeting new friends off the computer.
DISALVO, D. (2010). Are Social Networks Messing with Your Head?. Scientific American Mind, 20(7), 48-55. Retrieved from Academic Search Premier database.
WikiLeaks - Information Will Find a Way
In recent history, the posting of classified information on the website WikiLeaks has generated much controversy that might make the idea of liberating all information not the best, or the safest, idea. I am not about to debate whether or not all information should be made publicly available or defend WikiLeaks for potentially putting US service men and women overseas in danger. What is important to understand is that WikiLeaks is not a single crack in the dyke that can be plugged or eliminated. It is evidence of a larger movement.
The advent of the internet has spawned an ongoing struggle between transparency and anonymity. Holding people accountable for their internet actions can only be done if the source of posted information can be verified. On the other hand, the ability to protect the identity of the source of information on the internet is seen by many as a necessity in the battle against "big brother". WikiLeaks utilizes technology developed by the Tor project to protect a source's identity. The Tor application reroutes internet access through several levels of relays that hide the source's IP address and the IP address being posting to, making it impossible to connect the poster to the post or the emailer to the email. In fact, according to Nathaniel (2010), the developers of Tor have been contracted by the US government to ensure their intelligence activities are not compromised.
So this technology isn't all bad. As is the case with ANY technology, it can be used for good or evil. The problem lies with the intent of the users. Shutting down WikiLeaks and its developers will not remove the threat of exposed classified information. In fact, the last couple of days have seen the WikiLeaks website relocated due to a denial of service attack. If information wants to be free, it will find a way.
Ludlow, Peter. (10/4/2010). WikiLeaks and Activist Culture. Nation, Vol. 291, Issue 14.
Nathaniel, Rich. (9/2/2010). The most dangerous man in cyberspace. Roling Stone, Issue 1112.
Surfing at Work
John Reed, executive director of Robert Half Technology stated, “Many companies monitor computer use, and excessive shopping is a red flag that could put someone's job at risk” (“Cybermonday shopping at,” 2010).
Employee usage of company networks for personal leisure has been an issue since the world wide web has become so widely available. This time of year with Black Friday and Cyber Monday, online shopping becomes one of the bigger reasons employees use company networks for personal gain. Who does not want to save a dollar or two? Cyber Monday is a widely known term for the Monday following Black Friday. The first Cyber Monday was November 28, 2005, when Shop.org released a press article entitled “Cyber Monday' Quickly Becoming One of the Biggest Online Shopping Days of the Year”.
Although Cyber Monday deals can be great, the excessive use of company network resources during work hours can reduce employee productivity. So what can a company do to keep their employees focused on the job? You may be surprised to find out many employers resort to blocking access to online shopping websites like Amazon and Ebay. Those employers who are not blocking access to these websites are monitoring how often their employees are leisurely surfing. Some companies have gone so far as to fire employees for wasting time surfing the Internet. For example, David Innes, 42, lost his job with Scottish and Southern Energy after bosses concluded he spent a "ridiculous amount of time" surfing the web (“Accountant fired over,” 2010). Employers are not only blocking these websites to keep their employees from wasting time, but also to protect their networks from malicious software. All it takes is for an employee to click a rogue link for a virus to be released or a hacker to be let inside.
Remember, the next time you see an email with a discount for that state-of-the-art ebook reader for 10 dollars off, is it worth your job? My suggestion is for everyone to read your companies Internet usage policy to ensure you are following the rules.
References
Accountant fired over internet use 'unfairly dismissed'. (2010, June 14). Retrieved from
http://www.bbc.co.uk/news/10313450
Cybermonday shopping at work closely monitored or blocked 635219. (2010, November 23). Retrieved
from http://find.galegroup.com.dml.regis.edu/gps/infomark.do?&contentSet=IAC-Documents&type=retrieve&tabID=T003&prodId=IPS&docId=A242732372&source=gale&srcprod=ITOF&userGroupName=regis&version=1.0
New Pentagon Command
NATO and the United States communication networks are constantly being attacked, Anders Fogh Rasmussen Secretary General of NATO states, "It's no exaggeration to say that cyber attacks have become a new form of permanent, low-level warfare". NATO is of particular concern since they receive hundreds of attacks daily. Some computer have been deemed to "important" to be shut off for security work to be completed. I feel that NATO should have redundant computer systems so one can be maintained as the other is working.
The Obama administration plans to begin to counter these attacks with a new command, the Pentagon Cyber Command. The Pentagon Cyber Command began operating in October of 2010 however the largest problem seems that other agencies within the United States government have done little to fend off cyber attacks. The Obama administration is considering whether or not the new Command will play a larger role in the defense of network here in the United States. Some feel that Al-Qaida will soon exploit information about the NATO and United States networks obtained from rogue states. This problem could be on the scale of another 9/11 if terrorists obtain this information. The terrorist would possibly be able to mount an attack on the banking system, electrical grid and any other network they feel may distrupt or kill Americans. I feel that it is time for the government to create a new department that overseas the government’s ability to fight off a cyber attack, and this new agency should be headed by a cabinet level officer.
Fidler, S., Gorman, S., (2010, Sep 25). Cyber Attacks test Pentagon, Allies and Foes. Retrieved from http://online.wsj.com/article/SB10001424052748703793804575511961264943300.html?KEYWORDS=Cyber+Attacks+test+Pentagon+Allies+and+Foes
Clark and Roberts do an excellent job of describing why employers should refrain from this practice. The article points out that social networks are designed to facilitate interaction between people on a personal level, not a business level. Internet communication has replaced face to face communication for a variety of reasons; however this type of communication should be afforded the same level of privacy as face to face, phone or traditional mail communication. A comparison is drawn between meeting a friend in a restaurant or bar and communicating via a social network. This comparison is very accurate as many people use social sites to keep up with friends rather than meeting in person. The writers point out that an employer would never send someone to a restaurant to eavesdrop on a personal conversation in an attempt to judge a person’s character; neither should an employer “eavesdrop” on a social site to gather information.
There are several reasons why employers should not use this method to judge employees or gauge the character of employees. There is no established proof that judgments made using information gathered this way has any relationship to one’s job performance. People have the right to a life separate from their work and looking at a person’s profile or page can be misleading. It would be like trying to judge the dynamics of a family by looking at a snapshot or two. Employees also need to be able to develop as people apart from their work environment. This improper usage by employers blurs the line between individual identity and employee.
The most overwhelming reason that employers need to refrain from this practice has to do with the social responsibility of the employer. Employers, as well as individuals, have a responsibility to conduct themselves in a way that is ethical and does no harm to society as a whole. Invading the privacy of an individual through a social network is damaging to that individual but also to society. “If a realm of personal privacy is not provided to this type of communication, society will forever lose the benefits that online communication provides” (Clark & Roberts, 2010). This quote sums up the whole idea. These types of communications need to be given the measure of protection that the user has a right to expect. If we, as a society, have to censor our own personal communications for fear of being judged, we then lose the effectiveness of that communication. We become cardboard cutouts interacting in a way that is wholly fake and utterly useless. While some maintain that anything that is put on the internet is fair game, I disagree. In the personal space that I have claimed as my social network, what I say, feel or think is not fair game. This information is placed there for a select group of people to see. For anyone to gain access to this information without the benefit of my permission is an invasion of my privacy. Clark and Roberts are correct, if we lose the ability to communicate in this manner in an honest way, we lose the ability to communicate in this manner completely. Anything less is pointless and employers should not be allowed to rob society of this valuable form of communication by rendering it useless.
References
Clark, L., & Roberts, S. (2010). Employer's use of social networking sites: a socially irresponsible practice. Journal of Business Ethics, Retrieved from http://web.ebscohost.com.dml.regis.edu/ehost/pdfviewer/pdfviewer?vid=3&hid=12&sid=9231dca3-15e2-44b6-8d27-30650608821b%40sessionmgr10 doi: 10.1007
Minding Your Netiquette
Businesses today have a critical need to use online communication to reach not only their external consumers, but their internal customer, the employee. Current leadership methods frequently use the “hovering-over-the-shoulder” threat to enforce proper netiquette from their employees which according to Nikravan is back-firing. Employees that feel micromanaged and threatened are less likely to be productive or offer communication that supports their employer. It is this sense of “mistrust” that destroys online relationships and in office cohesion. Leadership needs to refocus the use of “hovering” and threatening employees to something proactive and useful such as providing meaningful netiquette rules and empowering their employees to use it successfully. According to Nikraven, “If trusted and thus empowered, employees using social media for the good of the company will collaborate with other members of the organization to be productive” (2010, para. 8).
There are many lessons to be learned from prominent netiquette experts. Proactive tools are available to all employers to regain their employees trust and improve their bottom line at the same time. These tools are as simple as remembering to communicate with professionalism and common courtesy no matter the medium. In this new cyber-communication age it is time to make sure these lessons and tools are used.
Nikravan, L. (November 17, 2010). Minding Online Manners Boosts Leadership and Workforce
Development. Chief Learning Officer. Retrieved November 26, 2010 from http://clomedia.com/articles/view/3917/1