Homework Assignment (for Tutor Nicole 6)

Information Technology and Ethics/Social Networking and Business

Job Search

Job searching, job hunting or job seeking is the act of looking for employment, due to unemployment or discontent with a current position. The immediate goal of job seeking is usually to obtain a job interview with an employer which may lead to getting hired. The job hunter or seeker typically first looks for job vacancies or employment opportunities. Traditionally, job seekers used to flip through newspapers, listen to radio advertisements or physically visit companies for job possibilities, The advent of computers and Social Media has changed the way job seekers and recruiters search for jobs or candidates respectively.

Disadvantages and advantages of Social Networking

If anyone were to “Google” your name what would they find? This is what many job seekers should think about before they upload inappropriate content on a social networking websites. Some believe an employer does not have the right to delve into the private lives of their prospective employees. However, prospective employers think differently because what their employees do may have a bearing on how their workers perform, and what employees do on their off time may reflect poorly on the company’s image. Social networking can be helpful to both job seekers and employers; they can begin by starting something that's related to your career interest. Your blog could also help showcase your skills and track you job search. Here are few Do's and Don’ts of social networking.

  • Be careful of what you put online. With the power of cloud computing and enormous storage devices, search engines and social media channels are storing tons of information about you, and are they readily available online.

  • Be careful of what you write or post online because deleting an 'inappropriate picture' from your social media page like Facebook doesn't mean that the picture will not be found when searched. The social media channels have ultimate power to retain materials posted, and search engines can trace almost anything posted online.

  • Creating an online account and posting resumés on job sites like Dice, Indeed, Simplyhired, Beyond, TheLadders, Monster etc. exposes your online presence (your resume) to many recruiters and makes your resumé easily searchable. An online resume should include relevant industry standard 'keywords' to make it searchable.

  • Be consistent with your online presence information: be consistent with your experience, education or information your post on different channels, because that can easily bite you. Remember your online presence is a public entity——people can access it anytime——and misrepresenting your experience, education or simply being inconsistent can damage your online credibility. Do frequently "Google" yourself to see your online presence, you might be surprise with the outcome.

  • Do not use inappropriate images or party pictures as your LinkedIn profile photo or on your portfolio, because recruiters could easily judge your character by simply looking at your images. Remember, a picture is worth a thousand words.

  • Do not include a hyperlink on your resume which may contain an inappropriate content. Also, if you include a hyperlink to Facebook, LinkedIn or your online portfolio, please test and make sure the links works, and it corresponds to the right information.

Professional social networking sites like LinkedIn are specifically designed to connect with people you know like other networking sites. Unlike other sites they post listing for professional jobs. If you are looking for a job in a specific company linked allows you to search for connections within the company. LinkedIn also allows users to email all their connections about searches and posting. Twitter can also be used to search for jobs; tweets on job posting can allow you an advantage in applying for a job. Following companies may allow job seekers help in discovering if a company may be the right for them.

The rule of thumb of using Social Media, is to stay away from posting pictures, articles, tweets, comments etc. when you are angry, drunk, or otherwise “not at your best”; and double check anything before posting it. Remember, everything that comes to your mind is not necessarily meant for the public.

Advantages of Social Networking

Having a strong presence online can be beneficial to job searching. Since according to a CareerBuilder.com conducted survey that asked 2,303 hiring managers and human professionals on why they use social media into there hiring process. The results finding that 37% of employers use social media to screen potential job candidates. The information a person provides online can give potential employers a view of who the potential employee is. In some cases it could lead to employers offering jobs to potential employees. A persons presence online can show potential employers if your a good fit for the company. Showing your personality outside of work. The profile can show a professional image that they may be looking for. Your profile can show aspects about a person a simple resume may not such as how creative, well-rounded or how strong are your communication skills.

Advertising

Since Organizations are always looking for new forms of advertising, they have discovered a new medium——social networks.There are two reasons why advertisers may use social networks. Advertisers can create a opportunity to generate a conversation with people who view the ad. Advertisments are sometimes targeted to reach a certain demographic of people. Advertisers use different strategies so that their messages meet their target audiences. Direct advertising is when a banner is displayed either on everyone's homepage or used to target specific people. Companies are beginning to create groups to advertise a particular product and interest users can join and become fans and the group may grow because more people join because of their friends. This sort of advertising can create viral marketing, which encourages individuals to pass along marketing messages.

Information Technology and Ethics/Cyber-Crimes II Cyber-bullying

Technology is an ever-growing part of children's lives. They spend more and more time either text messaging or on social networking sites. Because of this trend, bullies have moved from not only being in the classroom but also in the home. Technology such as social networking sites, Instant Messaging (IM), and text messaging since children tend use these devices extremely different from their parents. Cyber-bullying is the harassment of one minor to another via technology. Cyber bullies torments their victims by using social devices in the following ways.

  • They may create fake profiles of their victims and post false, inappropriate information.

  • Sending threatening or hurtful to their victims.

  • Logging into their victims social networks and modifying them to include inappropriate content.

  • Taking inappropriate pictures of their victims and then posting them on social websites and maybe the bully’s personal blog.

Cyber bullying has led to many cases to many cases of suicide the most notable cases are

What Should You Do?

The National Crime Prevention Council provides children and adults with a few simple steps to deal with cyber-bullying.

  • Blocking communication with the cyberbully

  • Deleting messages without reading them

  • Talking to a friend about the bullying

  • Reporting the problem to an Internet service provider or website moderator

Cyber-stalking

Cyber-stalking is similar to cyber – bullying but there actions are more severe and involve adults. Stalkers gear unwanted threatening behavior towards the victim. Cyber stalkers may harm their victims in two ways, they will incite a group of people against the victim or they may harm the victim’s property and reputation. In order for a cyber-stalker to rally a group of unknown individuals against the victim, they must first portray themselves as victims. They claim the victim has done something to them or their families and must be punished .In order to harass their victims more, cyber stalkers may post the victim’s name, phone number and address on a social site. Their stories may inspire others to join in harassing the victim. Cyber stalkers may attack the victim’s computer using malicious software. They may also order embarrassing items in the name of the victim and have it delivered to their workplace.

What Should You Do?
  1. Contact the harasser Once (and only once),to let him/her know that their harassment is unwarranted and must cease immediately.

  2. Keep a record of all the cyberstalking evidence including emails and postings in either hard-copy or digital form.

  3. Report the incident(s) to your Internet Service Provider and consider changing ISPs to stop cyber-stalking.

  4. Close your current email account and open a new one without using your real name. Consider using email filters to block the known person from contacting them.

  5. Contact your local police to see what additional action can be taken.

  6. Contact your local FBI Computer Crimes Unit.

Virtual Worlds

 Recent technological advances have allowed people to create alter egos who may or may not represent who they are or who they want to become.In these games players may interact with each other, while completing other activities. For example in World of Warcraft players may play against other players or against the environment of the game.These games have become big money because players do not only pay to be apart of the game but they may also pay for special items that may be used in the game. What happens when a crime is committed in one of these virtual worlds? It sometimes depends on whether or not the crime could be traced.For example players who are caught trafficking stolen credit card numbers can be prosecuted in our world.There are crimes authorities are not sure what to do with such as the rape of an avatar in Second Life.