Social Implications Of Folksonomy

Improved Essays
Since I have worked in the computer field for 30 years and the subject matter was mostly on the global impact of the Internet, there was no words I didn 't actually know. So I chose words rarely if ever used in the field. The words are from the assignment but the definitions are mine.
Folksonomy: (noun) A user defined way of organizing on-line content so that categories and tags can be used to find and retrieve the content ("folksonomy," n.d.).
Symbolic Worker: (noun phrase) This means telecommuter, home worker or perhaps nomad worker. In the Business world this term is rarely if ever used.
Reference
folksonomy. (n.d.). In Oxford dictionaries - dictionary, thesaurus, & grammar. Retrieved from http://www.oxforddictionaries.com/definition/english/folksonomy
…show more content…
Under the current system, there is no option to opt out and still lead a normal life. You don 't own your own data and any truly private information derived through analytics is available on-line for a price (regardless of how private or inaccurate it is). The issues of social control is also very disturbing. I have no answers to these issues. It seems that no one out there really cares. At least they don 't care enough to give up free operating systems like Microsoft 10, free emails and search engines like Google, or free social media sites like Facebook. There is an old saying “There is nothing more expensive than something that is free”. Here is a link which perfectly summarizes my ideas and my fears. Please follow this link and watch the video …show more content…
“Consumer information”, Federal Trade Commission. Retrieved from http://www.consumer.ftc.gov/articles/0152-credit-scores Hatton, C. (Octorber 26, 2015), “China 'social credit ': Beijing sets up huge system”, BBC news. http://www.bbc.com/news/world-asia-china-34592186 Stanley, J. (October 5, 2014), “China’s nightmarish citizen scores are a warning for americans”,
American civil liberties union. Retrieve February 21, 2016 from https://www.aclu.org/blog/free-future/chinas-nightmarish-citizen-scores-are-warning-americans Silverman, R. (2016 , February 16). The Wall Street Journal. “Bosses tap outside firms to predict which workers might get sick”. Retrieved February 21, 2016 From http://www.wsj.com/articles/bosses-harness-big-data-to-predict-which-workers-might-get-sick-1455664940
Yap, C. & Wong, G. (November 6, 2015). “China Wants to Tap Big Data To Build A Bigger Brother”, The wall street journal. Retrieved February 21, 2016 from

Related Documents

  • Improved Essays

    In recent decades income inequality has become an emergent epidemic, specifically for countries experiencing rapid economic growth. Since the Mao era, China has grown increasingly susceptible to this problem as it has developed to become the second largest economy in the world. To further contextualize China’s economic growth, Wang Jisi explains, “As recently as 2001, China’s total GDP was only 12.8% of U.S GDP. In 2011, China’s GDP reached $7.3 trillion, amounting to 48.5% of U.S. GDP” (Lieberthal and Jisi, 9). Although this rapid development has brought about higher standards of living for Chinese citizens, it has also facilitated the drastic divergence of incomes throughout the population. It is apparent that the main source of income inequality has originated from both the “rural-urban” and “inland-coastal” geographical divides. In other words, one’s…

    • 1010 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Massive amounts of data being collected are causing extremely high risks of identity theft. When…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The appearance of the Internet and fast development of the computer play an important role in changing our world into the era of globalization. Communication of computer network has made humankind having the fastest and cheapest data transfer to all over the world, which is symbolized by the Internet (Batinic, 2013). The Internet is by far the most…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Alfredo Lopez discusses the difference between the internet and the World Wide Web in “Social Networking and the Death of the Internet”. It is important to understand how the browsers were created, and what they were intended for in order to grasp how it has changed in people’s eyes over time.…

    • 1134 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Today, more and more Americans communicate and work online (Shamshi, n.d.). People use the internet for banking, emailing, making doctors appointments, going to school, and using social media.…

    • 859 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Lobbying Exercise

    • 1168 Words
    • 5 Pages

    During Brett Gaylors DoNotTrack web series, he poses many suggestions as to what we can do in order to protect our privacy online. He explains that we all have been taken advantage of in that we are signing contracts, which allow websites to use our identity and do whatever they essentially want with it. He explains that although we are being taken advantage of, there are advantages such as security. There is no such thing as privacy without having security and that we have many opportunities to protect our identity online to a certain extent. One, being to watch what websites you’re visiting. Where do our gigabits go? What parties and trackers do we really want to be using our privacy? This can be seen in the first video of DoNotTrack where we have the ability to type in a news page and view what other websites are then tracking us and accessing our identity through cookies. We can protect your privacy online by also viewing and reading the terms of use and privacy settings. This is something that many people do not do, however would be surprised and upset at the fact that for instance, the pictures that they are posting on Facebook of their children are actually being sold and used on third party websites. And this is one hundred percent legal, as you signed the terms of use saying that anything you post on Facebook becomes there content. If we read these terms of use we would be aware of how much of our identity a website is trying to take from us. With this, we can restrict what we post and present online. Next, is to understand the hidden cost of free. We live in a time where people want everything for as cheap as possible and a way the Internet has taken advantage of this is through keeping these websites such as Facebook and Google free. In exchange, a third party is buying the data you leave behind. The last main suggestion Gaylor has for Internet users are to pay attention to what we are liking and viewing on social media. When you like or follow…

    • 1168 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    In Rebecca Solnit’s article, “Easy Chair” I realized that we do not have privacy at all if we use the technology and take care of our things online on the Internet. The article Poison Apple made me realize that we do not have privacy at all if we use technology. For example, Rebecca Solnit mentioned, “Google is the world’s biggest advertising company, watching you on nearly every website you visit’’ (Solnit 5). This passage demonstrates how technology has been part of everyday human's life. Google knows everything about everyone’s interests and it can share this information with its partnerships and use it for their benefits. Moreover, Facebook is another social media that is spying on us and works for the government. In fact, we are under…

    • 166 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Citizenfour

    • 589 Words
    • 3 Pages

    Imagine what would it feel like if you were being watched all the time. If every purchase, every phone call, every google search and even every location was monitored. If every trace of private information you shared through the internet was accessible. What would you do if privacy disappeared? Well it has. We are currently living in a world that’s more connected than ever before. Information is just a few clicks or taps on a screen away. But this connection has allowed corporations all over the world to control us by seeing exactly when, where and what we are doing. In a few years, the term privacy won't be a fundamental right, but a luxury few of us will have. This is all highlighted in the award winning documentary Citizenfour, which through…

    • 589 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Spying In 1984

    • 825 Words
    • 4 Pages

    Everything you do electronically can be tracked, saved, and manipulated, regardless of where you are. Widescale spying occurring today eerily mimics George Orwell’s 1984 in an imminent and frightening way, as average people are no longer as private as they used to be. In 1984, Winston is trapped within a totalitarian government that watches everything its residents do or say. These residents are spied on everywhere they go and are never immune to government overwatch. In the United States today, normal citizens are being watched by internet-connected devices, government big-data collection, and businesses looking for profit.…

    • 825 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The introductorily section of Bruce Schneier’s article states three specific examples of how the internet is…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In an attempt to inform and persuade the audience ethically, they successfully use a well-balanced proportion of pathos, ethos, and logos. While the appeal to pathos is the least evident, the presentation as a whole forces the audience to bring questions to unethical problems allowing for an appeal to fear. When explaining how researches must reiterate on the prominence of responsibility in using Big Data, they explain that “academic researchers are held to specific professional standards when working with human participants in order to protect their rights and well-being” (759). However, they go on to explain how researches fail to understand this purpose. This creates apprehension when researching topics, issues, and current events happening within the world of Big Data. Concluding the presentation, the appeal to fear and emotion becomes the most evident offering a number of different claims that inspire the audience to ask inciting questions. In addition to fear, boyd and Crawford display two quotes before beginning the text, offering an outlet for opinion and influence outside of the body of their presentation. Ethos, on the other hand, is used accordingly, offering the perfect amount of credibility. When referencing to the reference page, it is evident that with the number of credible sources cited, their research and study of the topic was strategically, specifically sought out. With the quantity and quality equally evident through their sources makes boyd and Crawford that much more credible. In regard to the appeal of logic, boyd and Crawford successfully complete a balanced triangle of appeals. With the broken thesis spread through the presentation, offering the claim in sections and following each with a clear reason and reliable evidence makes for an easy, accessible read for all. The topics presented are clear, linked, and relevant. For example, in the beginning sentences of specific…

    • 846 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    With the continuing development of the Internet, the center stage of individual, business, and government discussions became a new globally sought after resource, data. Since its origin, Internet users have been warned about the dangers of posting personal, intimate information publicly; however, recent events have shifted privacy discussions away from discouraging posting ill-advised information to bringing awareness to under the radar data collection. Data is a very broad term that encompasses almost all Internet activity. What users search, click, view, and type is all collected and processed by either the website, Internet browser, or even the device itself. The demand for this personal data is enormous. Governments monitor this data predominately…

    • 1224 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    To begin with, in the article, “Fact Sheet: Big Data and Privacy Working Group Review” argues what would be the most efficient way to ensure people 's privacy is being protected. For instance, as the article describes how data is producing opportunities, it states, “By collecting and analyzing millions of data points from a neonatal intensive care unit, one study was able to identify factors, like slight changes in body temperature and heart rate serve as early warnings signs an infection may be taking root” ( “Fact Sheet” ). Although doctors use their patients’ privacy, it helps prevent diseases from developing any further. It also helps doctors notice the signs of a disease “taking root,” allowing doctors to take care of people at an early stage. Furthermore, in Obama’s article, “Remarks by President Obama on Review of Signals Intelligence,” Obama describes how privacy was used through history to prevent attacks. For example, as Obama is describing how 9/11 produce the issue that encounters how the U.S can defend the nation while ensuring people their civil liberties, he states, “Digital information and powerful supercomputers offers intelligence agencies the possibility of sifting through massive amounts of bulk data to identify patterns or pursue leads that may thwart impending threats” ( Obama ). By allowing…

    • 1264 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Poverty In China Essay

    • 1651 Words
    • 7 Pages

    China’s income inequality started rising when the country’s adapted central planning where attempt to boost fast growth of heavy industries in urban areas when they launched market-oriented reforms and opened the economy in 1978. However, this Chinese economic growth has helped many people get out of poverty. But there are people still suffering from absolute poverty from long-term unemployed, low-income households, rural-urban migrant workers and farmers living in rural areas today.…

    • 1651 Words
    • 7 Pages
    Improved Essays