METHODS OF USING SOCIAL NETWORKS AND THEIR LIMITS
Abstract
In this article the author discusses the various methods of using social networks and their limitations. The author highlights the importance of social networks in today’s world and their ability to provide a platform for communication, networking, and marketing. These changes that social networks have brought to life require certain changes in legal systems as well. The author also gives suggestions on how to use social media without breaching any laws and current legal system, as well as analyses all the dangers social network users may face.
Keywords
Cyber law, cybercriminals, privacyHow to Cite
References
Bauman, S., 2015. Types of cyberbullying. Cyberbullying: What counselors need to know, pp.53-58;
Smith, P.K., 2012. Cyberbullying: Challenges and opportunities for a research program—A response to Olweus (2012). European journal of developmental psychology, 9(5), pp.553-558;
Kim, H. and Song, J., 2013. Social network analysis of patent infringement lawsuits. Technological Forecasting and Social Change, 80(5), pp.944-955;
Alam, S. and Islam, M.Z., 2015. Offensive Statements on Social Networking Platforms with the special reference to Cyber Defamation: A Comparative Analysis between Malaysia and Bangladesh. Journal of Asian and African Social Science and Humanities, 1(3), pp.40-57;
Brown, N.I. and Peters, J., 2018. Say this, not that: government regulation and control of social media. Syracuse L. Rev., 68, p.521;
Ho, A., Maiga, A. and Aïmeur, E., 2009, May. Privacy protection issues in social networking sites. In 2009 IEEE/ACS International Conference on Computer Systems and Applications (pp. 271-278). IEEE;
Bosher, H., 2020. Key issues around copyright and social media: ownership, infringement and liability. Journal of Intellectual Property Law & Practice, 15(2), pp.123-133;
Henderson, M., de Zwart, M., Lindsay, D. and Phillips, M., 2010. Legal risks for students using social networking sites (Doctoral dissertation, Australian Council for Computers in Education).
Mills, A., 2015. The law applicable to cross-border defamation on social media: whose law governs free speech in ‘Facebookistan’?. Journal of Media Law, 7(1), pp.1-35;
Ardia, D.S., 2010. Reputation in a Networked World: Revisiting the Social Foundations of Defamation Law. Harv. CR-CLL Rev., 45, p.261;
Beausoleil, L.E., 2019. Free, hateful, and posted: rethinking first amendment protection of hate speech in a social media world. BCL Rev., 60, p.2101;
Tsesis, A., 2017. Social media accountability for terrorist propaganda. Fordham L. Rev., 86, p.605;
Sulkin, T. and Swigger, N., 2008. Is there truth in advertising? Campaign ad images as signals about legislative behavior. The Journal of Politics, 70(1), pp.232-244;
Abril, P.S., Levin, A. and Del Riego, A., 2012. Blurred boundaries: Social media privacy and the twenty-first-century employee. Am. Bus. LJ, 49, p.63;
Pate, R.L., 2012. Invisible discrimination: Employers, social media sites and passwords in the US. International Journal of Discrimination and the Law, 12(3), pp.133-146;
Roberts, R., 2007. Developments in the law: Garcetti v. Ceballos and the workplace freedom of speech rights of public employees. Public Administration Review, 67(4), pp.662-672.