Users are constantly being monitored through social networking sites and is questioning whether it is ethical to have strangers monitor user’s information and actions. In instance, some information that are on social network can be harmful and even illegal (Clark, 2010), such as terrorists forming groups on social networks (Bekkers, 2010). Social network analysis, corporate and lateral surveillance are done in social networks (types of surveillance, 2010). Through corporate surveillance, businesses may use play labour; which is social media sites presenting advertisements that are targeting users interest and online behaviour (Jansson, 2014) and traditional monitoring (social network analysis) which involves with intercepting communications, interpreting data and tracking transactions (Bekkers, 2010). Friends on social networking sites can also easily search up profiles of different users (lateral surveillance). With surveillance, everything will have a record, which violate citizen’s freedom of speech, movement and association (Flew, 2011) having everything recorded without permission and is constantly being watched of the activities that the user is doing. It may help provide a safer environment for citizens but it does not mean that it is the right thing to do. Users use social media to enjoy the social interaction with other users and is unreasonable that they will be monitored in every …show more content…
Also, they can look at old text messages and keep track of their contact lists. This will also give them an opportunity to be aware of themselves from the time that has past. Also, there are peer to peer monitoring (lateral surveillance), where users are sending texts and sharing information through online social media with their mobile phones (Jansson, 2014). By texting friends and family, the user is updating them on information; it can be about where they are, what they were doing and how they are feeling. Corporate surveillance can also be found in mobile devices. Recently, Celebrities have nude photos leaked due to hackers hacking into Apple’s icloud (5 Things to know about the celebrity nude photo hacking scandal, 2014), Pictures may be deleted but the cloud always has a copy of it. This shows that corporate surveillance is monitoring everything on mobile phones and that users should be aware that these contents can be expose to the