Social Media Science Homework Help

Uses of social media include benignuses, such as posting fun videos, contacting old friends, sharing pictures, orplanning social events, as well as malignant uses, such as engaging in criminalbehavior. Access to social media is more readily available through the use ofrapidly changing technology. With the use of mobile devices, individuals areable to record events anywhere and at any time. These recordings can beuploaded to social media sites to be shared with hundreds and even millions ofpeople. Technology has made the capturing of individuals on video and thesharing of those videos easier than ever. Questions then arise regarding theprivacy of the individuals captured in the recordings. If you are caught onvideo and that video is then shared via the Internet, has your right to privacybeen violated?

For this Discussion, review the mediascenarios in this week’s Learning Resources. Consider which scenarios (if any)constitute a violation of privacy.

Scenario 1: A boy was walking to schoolwith his backpack on his back and was beaten by another student who wanted tosee what was in his bag but did not get to see in it. Someone video the fighton posted it on social media.

Scenario 2: A lady was on the beach withher boyfriend/husband/fiancé and was photographed walking in a bikini byanother man who was on vacation on the beach. That man posted the picture ofthe lady whom he does not know on social media without her knowledge. She sawthe picture after it popped up on her partner’s phone.

Scenario 3: A bus driver and an unknownlady was arguing on the bus and a passenger (a woman) was recording it andcaptured the lady slapping the bus driver in the face. The passenger then gotoff the bus and showed the assault to the police officer who stated that hecannot do anything because he’s unable to see the face of the woman who isslapping the officer. The passenger then decided to post the video on socialmedia.

Postby Day 4 an explanation of which ofthe scenarios might be a violation of privacy and why. Be specific and supportyour response with references to the Learning Resources and literature.


  • Course Text:Taylor, R.W., Fritsch, E. J., & Liederbach, J. (2015). Digital crime anddigital terrorism. (3rd ed.). Upper Saddle River, NJ: Pearson..
    • Chapter 1,”Introduction and Overview of Digital Crime and DigitalTerrorism”
    • Chapter 10,”Digital Laws and Legislation”
  • Article: Audal, J.,Lu, Q., & Roman, P. (2008). Computer crimes. American Criminal LawReview, 45(2), 233–274.
  • Article: Barkacs, L.L., & Barkacs, C. B. (2010). Do you think I’m sexty? Minors andsexting: Teenage fad or child pornography? Journal of Legal, Ethicaland Regulatory Issues, 13(2), 23–31.
  • Article: Martin, J.A., Caramanica, M. R., & Fargo, A. L. (2011). Anonymous speakers andconfidential sources: Using shield laws when they overlap online. CommunicationLaw and Policy, 16(1), 89–125.
  • Article: Smith-Mason,J. (2011). Privacy rights…versus public safety after 9/11. Phi KappaPhi Forum, 91(3), 14–15.

One and a half page with at least two reference….

It is important that you cover all the topics identified in theassignment. Covering the topic does not mean mentioning the topic BUTpresenting an explanation from the context of ethics and the readings for thisclass

To get maximum points you need to follow the requirements listed forthis assignments 1) look at the page limits 2) review and follow APA rules3) create subheadings to identify the key sections you are presenting and4) Free from typographical and sentence construction errors.

No matter what kind of paper writing service you need, we’ll get it written. Place Your Order Now!