You are on page 1of 5

LITERATURE

REVIEW
Chao Zhao (Ryan) 6555985@student.swin.edu.au Faculty of Information Communication Technology Swinburne University of Technology

Social Media

The concept of Social Media has become popular since 21th Century with a increased signification number of active user (Humphreys, R 2011). Usually, people spend a lot of time on social network to watch video clips online, visit an official company web site or visit friends social network page (Hutton, G & Fosdick, M 2011). Some of popular social media services are Facebook, Google Plus, Twitter, Bolgger, Instagram, Quora, Youtube and Foursquare. This article discusses social media how relationship connects between public and business organization. The social medias privacy issue is discussed. There are some different opinions and agreements on social media topic. The top four issues are business related, public information, education for youth generation and policies. Social media employ mobile and web-based technologies to create highly interactive platforms via which individuals and communities share, co-create, discuss, and modify user-generated-content. (Kietzmann, J, Hermkens K, McCarthy, I & Silvestre, B 2011, p.242). In the 1997, Sixdegrees offered user a profile page and list of friends. This is known first social network site. After Sixdegree closed, Mark Zuckerberg created Facebook (Kietzmann, J, Hermkens K, McCarthy I, & Silvestre, B, 2011). Nowadays, many company use social media to connect with customer external or employees internal (Deans, P 2011). Many companies created Facebook pages to control the relationship between loyal customers and obtain more potential customer. In 2009, Economist reports that company can make more sales from social media, because the peoples decision of purchase is based on the friend suggestion (Colliander, J & Dahlen, M 2011). With inside a organization, HR department could use social media to contact staffs immediately (Deans, P 2011). Secondly, The young generations are labeled as Digital. They live with computers. They are the largest group of users on social media (Lenhart, A, Purcell, K, Smith, A & Zickuhr, K 2010). They spend lots of time on the Internet and social networking. There is a debate that the impact of social media to teenagers. Recent studies indicate a negative association between academic outcomes and the use of video games, SNSs, and other types of electronic media. (Jacobsen, W & Forste, R 2011, p.275). A report shows that a student took a longer time to read an article online if they use social network site at same time (Jacobsen, W & Forste, R 2011). On the other hand, Liu, Y (2010) found that social media tools could provide valuable resource to students. This report that represents that top four reason to use social media for academic purpose is social engagement, direction communication, speed of feedback, and relationship building. This could reduce the investment of education for educators (Liu, Y 2010). In my

Page

opinion, social media tool can help students to access academic resource anywhere. However, social media should not distract students. In conclusion, the social media will improve the peoples life. It provides fast speed of communication. However, young people are easy to addicted to social media. The parents should help young people reduce the use of social media tools.

Ethics for the IT professional


Another most popular topic is about ethics in the Internet technology professional. With growing of technology, the computer and the Internet play an important role. People live with Internet. People work, live, recreate with computer and Internet. Recently, some ethic issue is found during the usage of the Internet. It is not impossible to ignore the ethic issue in IT professional in modern world. This issue may bring negative impact to people life. People privacy, personal information and valued information may obtain by someone. This article discusses the most serious ethic issues impact and solution. First of all, to analysis the ethics for Information Technology, we should have a clear definition. Reynolds defines as Ethics is a set of beliefs about right and wrong behavior within a society. Ethics behavior conforms to generally accepted norms - many of which are almost university. (2012, p.3). Ethics is about the decision-making and actions of free human beings. When faced with alternative courses of action or alternative goals to pursue, ethics helps us to make the correct decision. (Laudon, K 1995, p.34) In Australia, Australia Computer Society (ACS, 2012) defines Code of Ethics: The Primacy of the Public Interest The Enhancement of Quality of Life Honesty Competence Professional Development Professionalism Codes are not designed for bad people, but for the persons who want to act ethically. (Gilman, S 2005, p.7). It makes an acceptable standard with professional bodies and members. These codes are useful, when people know something is not illegal, and then they feel wrong. It tells people what is wrong or right in different environments. The good codes only focus on two areas: Institutional and symbolic (Gilman, S 2005). The institutions codes limit peoples behavior and clearly the exception and prohibited of behaviors. The symbolic codes only provide the suggestion for IT professional. It is not law by government. According to George W. Reynolds (2012), the main issues in Internet Technology is: 1) Computer and Internet Crime, 2) Privacy, 3) Freedom of Expression, 4) Intellectual Property, 5) Software Development. A computer crime could define as a criminal act in which a computer is used as the principal. (Tavani, H 2007, p.208). The computer and the Internet are open for hacker to invade other users privacy. It can result harm to society (Aziz, A, Lokman A & Yusof, Z Page 2

2011). Website uses cookies and spyware to track user activities. A recent case is that Google collect personal WIFI data. It includes MAC address, IP address, broadcast name and geography location. The Australian Privacy Commission investigates it. Google just respond as mistake (Hearn, L 2010). Internet is open to everyone in the world. It is free for every to exchange news, idea, concepts and information. Nobody can control the Internet. Wikileaks is a website that provide secure and anonymous way for publish leak information. It published some negative news from U.S Army. U.S government decide to offline the website. The intellectual property is any unique product of the human intellect has commercial value (Quinn, M 2012). Many people downloaded music, movie, game and software from Internet without charged. This is not fair for someone pay full price, when some pay less or no money. The high quality of software is easy to use, because they can meet customers requirements. However, project team produces software with huge defects. The software defects is errors that can cause system to fail. A defect may cause money lost for banks (Reynolds, G 2012). After carefully reviewed this article we can conclude that there is a need for ethics in information and technology professions as well as integrated in any of the organization. This literature has two main aspects: valuable knowledge about ethical training in computing profession and to implement ethical training in organization.

Page

Bibliography: ACS Code of Ethics and Code of Conduct, 2012, Australia Computer Society, viewed 14 January 2012, <http://www.acs.org.au/index.cfm?action=show&conID=coe> Aziz, A, Lokman, A & Yusof, Z 2011, Information Technology Ethics: The Conceptual Model of Constructs, Actions and Control Measure, International Journal on Computer Science & Engineering; 2011, Vol. 3 Issue 6, p2580-2588, 9p,Academic Search Complete, viewed 13 January 2012. Colliander, J & Dahlen, M 2011, Following the Fashionable Friend: The Power of Social Media, Weighing Publicity Effectiveness of Blogs versus online Magazines, Vol.51, Mar, 2011. pp. 313-320, Journal of Advertising Research, viewed 9 January 2012. Deans, P 2011,The Impact of Social Media on C-level Roles, MIS Quarterly Executive, Vol. 10, No.4, Viewed 10 January 2012. Gilman, S 2005, Ethics codes and codes of conduct as tools for promoting an ethical and professional public service: Comparative Successes and Lessons, PREM, viewed 14 January 2012. Hearn, L 2010, Privacy watchdog probes Google's Wi-Fi data harvest, The Sydney Morning Herald, 19 May 2010,viewed 15 January 2012, <http://www.smh.com.au/technology/technology-news/privacy-watchdog- probes-googles-wifi-data-harvest-20100519-vckv.html> Humphreys, R 2011, Social Media: Problems and Solutions, viewed 13 January 2012, <http://www.wasportsfed.asn.au/downloads/G%20%20G%20- %20August.pdf> Hutton, G & Fosdick, M 2011, The Globalization of Social Media, Journal of Advertising Research, Vol. 51 Issue 4, p564-570, 7p, 4 Diagrams, 1 Graph, Business Source Complete, viewed 15 January 2012. Jacobsen, W & Forste, R 2011, The Wired Generation: Academic and Social Outcomes of Electronic Media Use Among University Students, CYBERPSYCHOLOGY, BEHAVIOR, AND SOCIAL NETWORKING, vol.14, no.5, Academic Search Complete, viewed 16 January 2012. Kietzmann, J, Hermkens, K, McCarthy, I, & R Silvestre RS 2011, Social media? Get serious! Understanding the functional building blocks of social media, Business Horizons, Vol. 54, Issue 3, pp 241251, ScienceDirect, viewed 10 January 2012. Laudon, K 1995, Ethical Concepts and Information Technology, vol.38 Issue.12, Association for Computing Machinery, viewed 16 January 2012. Lenhart, A, Purcell K, Smith, A & Zickuhr, K 2010, Social Media & Mobile Internet Use Among Teens and Young Adults. Pew Internet 7 American Life Project, p.51, ERIC, viewed 10 January 2012. Liu, Y 2010, Social Media Tools as a Learning Resource, Journal of Educational Technology Development and Exchange, vol. 3 Issue 1, p101-114, 14p, 1 Chart, 6 Graphs, Education Research Complete, viewed 15 January 2012. Quinn, M 2012, Ethics for the information age, 4th edn, Addison-Wesley, Boston, U.S. Reynolds, G 2012, Ethics in In Information Technology, 4th edn, Course Technology, Boston, U.S. Tavani, H 2007, Ethics & Technology, 2nd edn, Bruce Spatz, U.S. Bolgger (http://www.blogger.com) Facebook (http://www.facebook.com)

Page

Foursquare (https://foursquare.com/) Google (http://www.google.com) Instagram (http://instagram.com) Quora (http://www.quora.com/) Twitter (http://twitter.com) Wikileaks (http://www.wikileaks.com) Youtube (http://www.youtube)

Page

You might also like