Verified Document

Interview On Technology Interview

¶ … articles that form the foundation of this analysis is Disruptive Behavior and Social Concerns (Barnes, 2015). Included in this analysis is an overview of the ethical, moral and legal implications of cyberterrorism, network and computer hacking, computer viruses, hate speech and pornography. The analysis strives to provide a balanced analysis of each area, illustrating how the inherent freedoms the Internet also provide powerful catalysts for criminals, hackers and hate groups to thrive. The paradoxical nature of Internet freedom is most clearly demonstrated in the examples of how hackers had been able to permeate a wide variety of systems and gain access to valuable data, intent on destroying it (Barnes, 2015). This article discusses the technologies underlying these areas in light detail, choosing instead to concentrate on the societal dilemmas of having an entirely open publishing medium that anyone at any time can use either ethically or unethically. The bottom line is that Disruptive Behavior and Social Concerns (Barnes, 2015) underscores how it's everyones' responsibility to strive for greater security, verification and societal stability of the Internet as a communications medium. The second study and peer-reviewed paper, Social Networking: Communication Revolution or Evolution? (Coyle, Vaughn, 2008) seeks to answer the question of whether college students are using social networks to form new friendships or retain and strengthen the ones they already have. The researchers found that not a single college student initiated a new relationship entirely online via Facebook or comparable social networks. Instead, the researchers discovered that Facebook is a very effective proxy for being physically with existing friends, and the more trusted they are, the more powerful the effects of social media in galvanizing relationship together for the long-term (Coyle, Vaughn, 2008). The bottom line from...

Facebook is a relationship maintainer first, with added value for creative expression and sharing of ideas with existing friends.
The third study, Differences in Engaging in Sexual Disclosure Between Real Life and Cyberspace Among Adolescents: Social Penetration Model Revisited (Yang, Yang, Chiou, 2010) interviewed 419 Taiwanese adolescents regarding their willingness to engage in sexual disclosure and relationship intimacy online vs. In person (Yang, Yang, Chiou, 2010). The study relies on the social penetration model that states disclosure is correlated to trust in the confidant being told personal histories of relationship intimacy, and is inversely correlated to group trust and disclosure, hence the u-shaped curve (Yang, Yang, Chiou, 2010). The study concluded that male Taiwanese teenagers are more extroverted and trusting, and as a result are sharing more of the specifics of their personal histories. Taiwanese girls aren't and more closely follow the U-shaped curve of the social penetration model (Yang, Yang, Chiou, 2010). Males are markedly more assertive online, even when the identity of the person they are conversing with isn't entirely known (Yang, Yang, Chiou, 2010). The hypothesis that Taiwanese boys are less risk averse and connote more experiences with greater status in their core social groups was further validated in the study (Yang, Yang, Chiou, 2010)

Introducing the Interviewee -- My Uncle Louis For purposes of this exercise, I interviewed my 45-year-old uncle Louis. He is very tech savvy and has a lot of devices, and is also known for being one of the most computer-literature relatives in our family. The following are his responses to the interview questions:

Have your interviewee identify a…

Sources used in this document:
References:

Barnes, Susan. Disruptive Behavior and Social Concerns (from class)

Coyle, C.L., & Vaughn, H. (2008). Social networking: Communication revolution or evolution? Bell Labs Technical Journal, 13(2), 13-17.

Yang, M.L., Yang, C.C., & Chiou, W.B. (2010). Differences in engaging in sexual disclosure between real life and cyberspace among adolescents: social penetration model revisited. Current Psychology, 29(2), 144-154.
Cite this Document:
Copy Bibliography Citation

Related Documents

Interview a Purchasing and Supply Management Professional
Words: 532 Length: 2 Document Type: Term Paper

Interview Supply Chain Interview with a Supply Chain Manager The line of business, mission, and goals of the organization he/she works for. Describe these briefly. The purchasing manager that I talked to worked for Aerojet Rocketdyne. It is an extremely high tech business that operates in a competitive industry. The company's mission is as follows (Aerojet Rocketdyne, N.d.): Aerojet Rocketdyne is a world-recognized aerospace and defense leader providing propulsion and energetics to the space, missile defense,

Interview With an Immigrant
Words: 2566 Length: 8 Document Type: Research Paper

Interview With an Immigrant Profile of the Interviewee The immigrant who was interviewed for this paper is John Smith (not his real name). He is a twenty-nine-year-old male immigrant of Pakistani origin who lives in New York. Both his parents are from Pakistan but settled in the United Arab Emirates after their marriage. Smith has also spent all his childhood in the United Arab Emirates where he was born and has only

Interview With an Advanced Practice Nurse Practitioner and Mistakes...
Words: 1326 Length: 3 Document Type: A-Level Coursework

Interview With an Advanced Practice Nurse/Nurse Practitioner and Mistakes The objective of this study is to answer the following questions as an interview with an experienced Advanced Practice Nurse in regards to their transition from novice to expert practitioner: (1) What was your experience like transitioning from novice APN (Advanced Practice Nurse) to expert practitioner? The transition from novice to Advanced Practice Nurse (APN) is a critical time for the nurse and it

Technology Costing Methodology Introduction- the Modern University...
Words: 1154 Length: 3 Document Type: Essay

Technology Costing Methodology Introduction- The modern university paradigm is extremely complex, requiring a balance between student enrolment, staffing, procedures, stakeholder expectations and budgets. The modern educational professional must realize that the position of budgets and fiscal responsibility is tied to costs and expenditures -- which have tended towards exponential increases over the last decade. This has, in effect, caused a situation of continual multiple horizontal priorities. The situation is such that

Technology Evolution Many of the Electric Gadgets
Words: 1461 Length: 5 Document Type: Research Paper

Technology Evolution Many of the electric gadgets we use today like the cell phones and the home computers were invented in the 80s. Many multinational corporations came into existence in the 80s this spur the growth to a record 3.2% per year (Bellis, 2012). This was the highest nine-year rate in American history. This was occasioned by a number of factors some of which were economic, financial, legislative, and regulatory frameworks.

Technology Consultants Should Change Several
Words: 340 Length: 1 Document Type: Research Proposal

They do not get the opportunity to have any more training, either, so they cannot continue to hone their skills and keep up with the latest technology. If they want to do that, they must do it on their own time -- and that could be very costly for them in both money and time. 3. In starting a company like Technology Consultants, I would offer benefits, and people who

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now