Sunday, February 23, 2020
Privacy of Social Media Annotated Bibliography Example | Topics and Well Written Essays - 750 words
Privacy of Social Media - Annotated Bibliography Example The Writing: the works from this publication is a detailed statement which provides directions under the law that emphasizes the need to maintain privacy in the social sites. The websites and social sites are under obligation to protect their customerââ¬â¢s information and not to share them without permission. The Use: This document will help me highlight the law in relation to privacy in the social media.Determann, Lothar. "Social Media Privacy: A Dozen Myths and Facts." Stanford Technology Law Review (2012): 1-14.à The Writer(s): the author is an expert in social media analysis. Publication: this is a publication of the social media privacy from Stanford Technology Law Review. The publication is a recent publication which is valid and up to dateThe Writing: the publication contains 8 myths about social sites. The myths are actual the rights to the consumer who uses the social sites. This article is an educative article drawing its teachings from the law about social privacy in the media.The Use: This article will be useful to me when making an introduction about my research. It will help me highlight some of the rights consumers have over the social sites in the media. The author is the senior research analyst at Pew Internet Project Publication: this is a publication of the social media privacy.à The article is a resent publication from the date. The Writing: the article aims at finding out why most users are restricted to privacy settings while the cases of profile pruning and unfriending people are the rise.
Thursday, February 6, 2020
Policy paper (stating the solutions to improve the security in Kenya Assignment
Policy paper (stating the solutions to improve the security in Kenya using help from the international community) - Assignment Example These solutions however cannot be handled by the country alone and the international community will have to chip in if they are to be successful in this endeavor. The resulting aim will be beneficial to all involved as a safer country will lead to a more prosperous environment which will allow for an increase in the co operation of countries and organizations in sectors such as business and other areas of international concerns (Hastings, 2012). The first step in ensuring that the security threat is efficiently dealt with is the creation of new policies that will enable Kenya and the cooperating countries to meet this menace head on. There are a number of policies that can be implemented that will assist in the achievement of this goal, they include: Military Support The main security threat facing the country consists of militants based in neighboring countries who happen to have armed forces at their disposal and use this resource to cause havoc in the areas that they wish to contr ol (Prabhakaran, 2008). These areas includes places such as the countries borders where they have attempted to take control of the region so as to enhance their control and hold over the areas that they wish to take charge of. ... Military support in this case will consist of the sending of troops to these areas to support the local military in their attempt to gain back control of the regions that have been most affected by the invasion of these terrorist armed forces. The additional provision of extra men will increase the countryââ¬â¢s ability to fight back where necessary especially in the areas that have been suffering frequent attacks form these militants and will enhance the probability of victory during battles (Prabhakaran, 2008). The troops will also provide extra man power for activities such as border control that will allow them to cover the areas that are patrolled more efficiently and without the exhaustion of the resources at the countryââ¬â¢s disposal. Military support can also include the sending of weapons that will allow the country to fight these attacks more efficiently and hopefully in the process discourage the militants from attempting to wage war on the soldiers that have been s ent to these regions (Prabhakaran, 2008). It should be noted that the individuals kidnapped from this region are not always of Kenyan origin and some are expatriates who happen to be working in the area at that point in time thus this support will not only be for the protection of the Kenyan people alone but also the citizens of other international areas who operate in this region. Access Control This can be described as the restrictive control of regions of concern that will make it difficult for unauthorized people to enter these areas (Prabhakaran, 2008). Access control can also refer to restrictive prohibitions of other items such as Visas that allow entry into the country without a stern background check to confirm that the individual in question does not harbor any ill will that may be the
Subscribe to:
Comments (Atom)