Legal Implications of “Sharenting”

Law and World ◽  
2020 ◽  
Vol 6 (2) ◽  
pp. 19-26

Sharing child’s visual materials online for purely personal purposes by parents, family members or close relatives is a widespread practice, especially, where the availability of internet services is provided, which therefore, poses challenges to privacy protection of the child. Children, as one of the most vulnerable members of society, need special attention with regard of protection of fundamental rights, where privacy a crucial one. This article reviews the implications of child’s privacy on social media with the emphasis on sharing minor’s visual materials.

FIAT JUSTISIA ◽  
2018 ◽  
Vol 12 (3) ◽  
pp. 206
Author(s):  
Rudi Natamiharja

The rights to privacy as an individual fundamental right should be protected. Ironically, this right is deliberately delivered publicly in social media. And Facebook, the largest social media, keep more than 2.2 billion privacies data in the whole world. In early April 2018, one million personal data of Indonesian Facebook users was stolen by other parties. Mark Zuckerberg, as a founder and CEO, acknowledged that the Facebook data consisting of customer personal data had been stolen and used by other parties. It is one of the weaknesses and negligence of Facebook that needs to be addressed in the future. Indonesia government issued a warning letter to Facebook and required formal explanation concerning those recent cases. However, the Government's seriousness on the protection of personal data of its citizens is still questioned. How Indonesian regulations cover private data protection on their citizen and what steps should be taken to protect personal data in Indonesia? By using the International instrument and Indonesia legal instruments on the protection of privacy right, this article would give the answer what government Indonesian should do to undertake this situation. The research found that the regulation of privacy protection is sufficient yet the government has no determination to take account seriously on protecting the privacy right, and no sanction to the parties was involved. Socialization on the importance of personal data toward Indonesian society in Indonesia should be done, from the basic to the top level. Keyword: Right Privacy, International Law, Fundamental Rights


2018 ◽  
pp. 1-16 ◽  
Author(s):  
Angela CB Trude ◽  
Pamela J Surkan ◽  
Elizabeth Anderson Steeves ◽  
Keshia Pollack Porter ◽  
Joel Gittelsohn

AbstractObjectiveTo evaluate the secondary impact of a multilevel, child-focused, obesity intervention on food-related behaviours (acquisition, preparation, fruit and vegetable (FV) consumption) on youths’ primary caregivers.DesignB’More Healthy Communities for Kids (BHCK) group-randomized controlled trial promoted access to healthy foods and food-related behaviours through wholesaler and small store strategies, peer mentor-led nutrition education aimed at youths, and social media and text messaging targeting their adult caregivers. Measures included caregivers’ (n516) self-reported household food acquisition frequency for FV, snacks and grocery items over 30 d, and usual FV consumption in a sub-sample of 226 caregivers via the NCI FV Screener. Hierarchical models assessed average treatment effects (ATE). Treatment-on-the-treated-effect (TTE) analyses evaluated correlation between behavioural change and exposure to BHCK. Exposure scores at post-assessment were based on self-reported viewing of BHCK materials and participating in activities.SettingThirty Baltimore City low-income neighbourhoods, USA.ParticipantsAdult caregivers of youths aged 9–15 years.ResultsOf caregivers, 90·89 % were female; mean age 39·31 (sd9·31) years. Baseline mean (sd) intake (servings/d) was 1·30 (1·69) fruits and 1·35 (1·05) vegetables. In ATE, no significant intervention effect was found on caregivers’ food-related behaviours. In TTE, each point increase in BHCK exposure score (range: 0–6·9) increased caregivers’ daily fruit consumption by 0·2 servings (0·24 (se0·11); 95 % CI 0·04, 0·47). Caregivers reporting greater social media exposure tripled their daily fruit intake (3·16 (se0·92); 95 % CI 1·33, 4·99) and increased their frequency of unhealthy food purchasingv. baseline.ConclusionsChild-focused community-based nutrition interventions may also benefit family members’ fruit intake. Child-focused interventions should involve adult caregivers and intervention effects on family members should be assessed. Future multilevel studies should consider using social media to improve reach and engage caregiver participants.


2018 ◽  
Author(s):  
Jan Antfolk ◽  
Debra Lieberman ◽  
Christopher Harju ◽  
Anna Albrecht ◽  
Andreas Mokros ◽  
...  

Due to the intense selection pressure against inbreeding, humans are expected to possess psychological adaptations that regulate mate choice and avoid inbreeding. From a gene’s-eye perspective, there is little difference in the evolutionary costs between situations where an individual him/herself is participating in inbreeding and inbreeding among other close relatives. The difference is merely quantitative, as fitness can be compromised via both routes. The question is whether humans are sensitive to the direct as well as indirect costs of inbreeding. Using responses from a large population-based sample (27,364 responses from 2,353 participants), we found that human motivations to avoid inbreeding closely track the theoretical costs of inbreeding as predicted by inclusive-fitness theory. Participants were asked to select in a forced choice paradigm, which of two acts of inbreeding with actual family members they would want to avoid most. We found that the estimated fitness costs explained 83.6% of participant choices. Importantly, fitness costs explained choices also when the self was not involved. We conclude that humans intuit the indirect fitness costs of mating decisions made by close family members and that psychological inbreeding avoidance mechanisms extend beyond self-regulation.


Author(s):  
Ramanpreet Kaur ◽  
Tomaž Klobučar ◽  
Dušan Gabrijelčič

This chapter is concerned with the identification of the privacy threats to provide a feedback to the users so that they can make an informed decision based on their desired level of privacy. To achieve this goal, Solove's taxonomy of privacy violations is refined to incorporate the modern challenges to the privacy posed by the evolution of social networks. This work emphasizes on the fact that the privacy protection should be a joint effort of social network owners and users, and provides a classification of mitigation strategies according to the party responsible for taking these countermeasures. In addition, it highlights the key research issues to guide the research in the field of privacy preservation. This chapter can serve as a first step to comprehend the privacy requirements of online users and educate the users about their choices and actions in social media.


2019 ◽  
Vol 11 (1) ◽  
pp. 62
Author(s):  
Amani Juma Abu-Irmies ◽  
Rajai Rasheed Al-Khanji

This study investigates factors motivating the Chechen people in Jordan to use their indigenous language in social media such as WhatsApp and Facebook. It also explores their attitudes towards using the Chechen language in social media. In order to achieve the aims of this study, the researchers have selected a sample that consists of 340 Chechen people who reside in the Jordanian cities and towns: Al-Suknah, Sweileh and Az zarqa. The instruments of the study were a sociolinguistic questionnaire and an open-ended interview. The findings reveal that Chechens use social media such as Facebook and WhatsApp to preserve the Chechen language and their culture. Also, Chechens of Jordan use their ethnic language to communicate with their friends who understand the Chechen language. Besides, the Chechen language has been used in whatsApp and Facebook to promote unity among family members. Moreover, many Chechen people use social media to communicate with other Chechen speakers regardless of familial ties. Results also indicate that Chechens of Jordan have a high positive attitude towards including the Chechen language in social media.


2019 ◽  
Vol 6 (11) ◽  
pp. 190868
Author(s):  
Yong Min ◽  
Tingjun Jiang ◽  
Cheng Jin ◽  
Qu Li ◽  
Xiaogang Jin

The filter bubble is an intermediate structure to provoke polarization and echo chambers in social networks, and it has become one of today's most urgent issues for social media. Previous studies usually equated filter bubbles with community structures and emphasized this exogenous isolation effect, but there is a lack of full discussion of the internal organization of filter bubbles. Here, we design an experiment for analysing filter bubbles taking advantage of social bots. We deployed 128 bots to Weibo (the largest microblogging network in China), and each bot consumed a specific topic (entertainment or sci-tech) and ran for at least two months. In total, we recorded about 1.3 million messages exposed to these bots and their social networks. By analysing the text received by the bots and motifs in their social networks, we found that a filter bubble is not only a dense community of users with the same preferences but also presents an endogenetic unidirectional star-like structure. The structure could spontaneously exclude non-preferred information and cause polarization. Moreover, our work proved that the felicitous use of artificial intelligence technology could provide a useful experimental approach that combines privacy protection and controllability in studying social media.


2019 ◽  
Vol 33 (1) ◽  
pp. 57-72 ◽  
Author(s):  
Linda Alkire ◽  
Johannes Pohlmann ◽  
Willy Barnett

Purpose Internet user privacy risks have been a topical subject with respect to consumers, corporations and governments. In line with the recent privacy scandals linked to social media, the aim of this study is to explore users’ privacy protection behaviors (PPB) on Facebook through the actions they take to protect their privacy, their underlying motives and the values behind these protective actions. Moreover, this study aims to address an unintended consequence of Facebook usage. Despite Facebook’s positive and uplifting goal of connecting people, consumers are forced to resort to specific behaviors to protect their privacy and well-being. Design/methodology/approach This study adopts an exploratory research approach by using a well-established qualitative technique: structured laddering interviews. In total, 20 in-depth personal interviews were conducted with the Millennials. Findings Results show that the process of privacy protection is initiated by experiences, uncertainty and literacy, rather than threats, which leads to concerns that trigger PPBs. The most common PPBs include: “Reflection,” “Avoidance,” “Intervention,” “Restriction,” “Control,” and “Restraint.” The underlying motives for the adoption of these strategies include: “Success,” “Security,” “Social Recognition,” “A World of Peace,” “Exclusivity of Self,” “Being in Control,” “Meaning” and “True Friendship”. Originality/value The present research adopts a transdisciplinary framework to help fill the gap regarding the interplay of PPBs on Facebook, the triggers of those behaviors and their underlying motives. It contributes to the service literature and practice as it provides insights into a growing area of interest, whereas more social media channels are being created and more services are using social media strategies to engage and interact with their customers. Finally, it addresses the growing need to consider the impact of technological services, including internet and social media, on consumers’ and societies’ well-being.


2020 ◽  
Vol 32 (4) ◽  
pp. 63-84 ◽  
Author(s):  
John R. Drake ◽  
Christopher P. Furner

With the proliferation of social media, job candidate screening and evaluation professionals have new avenues to gather information regarding job candidates. Job candidates recognize that recruiters will examine their social media, and tailor their profiles to foster a positive impression. However, recent popular press news suggests that some employers are taking social media screening to more invasive levels. This study seeks to evaluate how job candidates respond to social media screening from recruiters. Using a scenario-based experiment with 290 subjects, the authors tested relationships between candidate characteristics and trust in the recruiter as well as hesitancy to accept an offer. This research found that under all conditions, trust reduces hesitancy to accept the offer and that age reduces trust in the company. Further, this article found differences in the relationships between privacy protection competence, social media production and trusting stance on trust in the company based on the level of social media screening.


Sign in / Sign up

Export Citation Format

Share Document