Sunday, December 29, 2019

Controlling of Personal Information - Free Essay Example

Sample details Pages: 5 Words: 1536 Downloads: 5 Date added: 2017/06/26 Category Information Systems Essay Type Analytical essay Tags: Information Essay Did you like this example? Controlling of personal information: An in-depth Analysis Summary of Assigned Article Lisa M. Austin in her article, Control Yourself, or at least your core self-defines privacy as a control mechanism over oneà ¢Ã¢â€š ¬Ã¢â€ž ¢s personal information.[1] The author provided legal framework for the protection of oneà ¢Ã¢â€š ¬Ã¢â€ž ¢s privacy. Such legal frameworks include: Federal personal Information protection and privacy act as well as Canadian internet policy and public interest clinic. Don’t waste time! Our writers will create an original "Controlling of Personal Information" essay for you Create order Furthermore, Austin differentiates between the first and second generation philosophers of technology through the idea of the à ¢Ã¢â€š ¬Ã…“selfà ¢Ã¢â€š ¬Ã‚ . According to first generation, technology is linked with culture and modernity and it is through these notion that the advancement in technology is so vast that it simultaneously can threaten an individualà ¢Ã¢â€š ¬Ã¢â€ž ¢s freedom.[2] However, second generation philosopherà ¢Ã¢â€š ¬Ã¢â€ž ¢s critique the first philosophers view on technology, critiquing the usage and development of technology[3] explaining that technology does not control human.[4]Moreover, second generation philosophers open up questions to legal scholars about the consequences of technology stating that à ¢Ã¢â€š ¬Ã…“technology is not neutral rather it has a social and political valueà ¢Ã¢â€š ¬Ã‚ .[5] Austin discusses the impact on the issues of control to the concept of the à ¢Ã¢â€š ¬Ã…“selfà ¢Ã¢â€š ¬Ã‚ .[6] The author goes further on to di scuss how there are issues pertaining to ones control of privacy and the idea of the à ¢Ã¢â€š ¬Ã…“core-selfà ¢Ã¢â€š ¬Ã‚ .[7] The disclosure of personal information by an organization requires the individual to consent without limiting the disclosure of information that is à ¢Ã¢â€š ¬Ã…“sensitive and intimateà ¢Ã¢â€š ¬Ã‚ .[8] She further conceptualizes the concept of the self in relation to ones à ¢Ã¢â€š ¬Ã…“biographical core of informationà ¢Ã¢â€š ¬Ã‚  that is personal information revealing à ¢Ã¢â€š ¬Ã…“intimate details of an individualà ¢Ã¢â€š ¬Ã¢â€ž ¢s life styleà ¢Ã¢â€š ¬Ã‚ [9] to the control of oneà ¢Ã¢â€š ¬Ã¢â€ž ¢s personal information. She argues that the solution and the problem of control should be embedded in providing more control on how information and technologies interact. Austin explains the extent of protecting ones à ¢Ã¢â€š ¬Ã…“self-presentationà ¢Ã¢â€š ¬Ã‚  that is choosing to whom one wants to present themselves to.[10] She discusses the e xample of a personà ¢Ã¢â€š ¬Ã¢â€ž ¢s photograph in a magazine, shifting from an audience that has access to the photograph to a much larger audience that reads the magazine. This causes, as Austin states a à ¢Ã¢â€š ¬Ã…“prima facie privacy claimà ¢Ã¢â€š ¬Ã‚ [11] undermining ones capacity to protect à ¢Ã¢â€š ¬Ã…“self-presentationà ¢Ã¢â€š ¬Ã‚ [12] posting a question for legal scholars of the concept of the à ¢Ã¢â€š ¬Ã…“selfà ¢Ã¢â€š ¬Ã‚  to advances in technology.[13] Part II: Comparative Analysis Article 1: Langdon Winner, à ¢Ã¢â€š ¬Ã…“Do artifacts have politicsà ¢Ã¢â€š ¬Ã‚  Winner as well as Austin speak about the implications of technological advancements on society. Winner argues that technology is arranged in a way that has political, social and economic ends.[14] Similarly, Austin argues that technology has a detrimental effect on an individualà ¢Ã¢â€š ¬Ã¢â€ž ¢s freedom where legal scholars need to re-evaluate how technologies are designed and implem ented.[15] This rests on the assumption that, states should recognize the public and structural aspects of privacy in political and social context, having some form of à ¢Ã¢â€š ¬Ã…“controlà ¢Ã¢â€š ¬Ã‚ . Take for example, the use of cell phones or the developments of new technological surveillance. This makes an individual lose control over their personal information as individuals value privacy and protection of how much their personal information is known by others controlling the capacity of à ¢Ã¢â€š ¬Ã…“self-presentationsà ¢Ã¢â€š ¬Ã‚  of individuals[16] as Austin articulates, à ¢Ã¢â€š ¬Ã…“Information and communication as placed the limits on personal information beyond ones controlà ¢Ã¢â€š ¬Ã‚ .[17] Furthermore, Winner and Austin are in agreement that, technology is a common ground for neutrality[18] violating ones à ¢Ã¢â€š ¬Ã…“normal expectationsà ¢Ã¢â€š ¬Ã‚  [19]and constituting a threat to human freedom.[20] For example, Winner described the example of R obert Mosses, the urban planning of New York City where he build bridges and roads for the purposes of discouraging the presence buses and transportation, an idea similar to Caroà ¢Ã¢â€š ¬Ã¢â€ž ¢s social class.[21] In todayà ¢Ã¢â€š ¬Ã¢â€ž ¢s digital era, technology provides information on a massive level of domain where hackers can get access to oneà ¢Ã¢â€š ¬Ã¢â€ž ¢s personal information through the use of Facebook, twitter, LinkedIn as well as personal emails. Take for example, the love bug virus that was incorporated through the use of email, getting into userà ¢Ã¢â€š ¬Ã¢â€ž ¢s personal emails, tracking down passwords which resulted in billions of loses. As Austin states, there are privacy challenges associated with the way information and communication technologies interact[22] where à ¢Ã¢â€š ¬Ã…“technologies can be used well, poorly, good, and for evil purposes.à ¢Ã¢â€š ¬Ã‚ [23] From this perspective, one can articulate the notion that with technological advancements, t here is a strategic control in the sense that technologies can authorize power over others.[24] Both Winner and Austin, explains the impact of social life, the advancements of technology has on economic costs as well as benefits and risks associated to public safety. Moreover, Winner and Austin speculates the notion of à ¢Ã¢â€š ¬Ã…“controlà ¢Ã¢â€š ¬Ã‚  in different ways. For instance, Winnerà ¢Ã¢â€š ¬Ã¢â€ž ¢s ascribes control to be embedded in political aspects for the removal of inequalities. On the other hand, Austin speculates control of information where individuals have the capacity to control the information that they want to share with others.[25] So, if technological advancements can undermine oneà ¢Ã¢â€š ¬Ã¢â€ž ¢s personal and à ¢Ã¢â€š ¬Ã…“biological core informationà ¢Ã¢â€š ¬Ã‚  with having little control on protection, then is it safe to say that there could be some form of control in relation to copyright laws? Article 2: Jessica Litman, à ¢Ã¢â€š ¬Ã…†œThe demonization of piracyà ¢Ã¢â€š ¬Ã‚  Recent advances in technology has undermined a personà ¢Ã¢â€š ¬Ã¢â€ž ¢s ability to control some form of personal information. According to Litman, the idea of control is based on copyright laws where authors have some form of control over what they disseminate, distribute and disclose information to the public[26] giving the exclusive authority ship of oneà ¢Ã¢â€š ¬Ã¢â€ž ¢s work[27] for the compensation of monetary value.[28] Similarly, Austin proposes the idea that individuals have some form of control over the disclosure of information as outlined under the Personal information protection electronics documents act.[29] Moreover, Austin proposes that in order to solve the detoriation of control over privacy, there has to be more control[30] and to protect the à ¢Ã¢â€š ¬Ã…“exclusive rightsà ¢Ã¢â€š ¬Ã‚  of authorà ¢Ã¢â€š ¬Ã¢â€ž ¢s writings they need to have control over the content.[31] In light of such issues, both Litman and Aus tin speculate over the notion that there has to be some form of control over the disclosure of information and the information that is pertained under copyright laws which can be undermined by a lack of control. Furthermore, Litman states that, in order for there to be some form of control over the work and to protect the rights of the authors, the public has to use some form of authorization in order to access the content.[32] This will prevent any harms to an authorà ¢Ã¢â€š ¬Ã¢â€ž ¢s rights or the limit the authors have posted on the accessibility of the content, making sure that personal information is not undermined. Technology does not drive human beings rather human beings drive technology, where they have means of controlling the type of information they want the public to know. However, under copyright laws, there comes a breach over the control of information on the use-age of materials. Litman describes this notion as à ¢Ã¢â€š ¬Ã…“piracyà ¢Ã¢â€š ¬Ã‚  that is the d ownloading of materials by illegal means[33] Take for example, the downloading of music.[34] This not only violates aspect of copyright laws but also the fact that companies are losing control of digital privacy undermining the freedom of individuals as Austin articulates, out of control technology relies on a new age of freedom[35] making indviduals lose control over information.[36] Furthermore, Litman proposes a case à ¢Ã¢â€š ¬Ã…“The digital Millenniumà ¢Ã¢â€š ¬Ã‚  copyright, where the owner restricts the access to copying and prohibits the distribution of information by giving the control back to the owners[37] where they determine when, how and to what extent they want to share the information with others.[38] One can contemplate the notion that, copyright laws are providing a powerful incentive for controlling oneà ¢Ã¢â€š ¬Ã¢â€ž ¢s work which could pose an effect on individualà ¢Ã¢â€š ¬Ã¢â€ž ¢s freedom. Thus, copyright laws are providing a set of à ¢Ã¢â€š ¬Ã…“exclusi ve rightsà ¢Ã¢â€š ¬Ã‚  to authors to restrict their content to the public. In essence, both authors Litman and Austin, ascribe the notion of control over the perception on the concept of the à ¢Ã¢â€š ¬Ã…“selfà ¢Ã¢â€š ¬Ã‚  representation which can be diminished when illegal work is distributed. References: Lisa M. Austin, à ¢Ã¢â€š ¬Ã…“Control yourself or at least your core selfà ¢Ã¢â€š ¬Ã‚  (2010) 30 Bulletin of Science and technology 1. Langdon Winner, à ¢Ã¢â€š ¬Ã…“Do Artifacts have politics?à ¢Ã¢â€š ¬Ã‚  (1980) 109 Modern technology: Problem or opportunity 1. Jessica Litman, à ¢Ã¢â€š ¬Ã…“The Demonization of Piracyà ¢Ã¢â€š ¬Ã‚  (2000). Tenth Conference on computers, freedom privacy [1] Lisa M. Austin, à ¢Ã¢â€š ¬Ã…“Control yourself or at least your core selfà ¢Ã¢â€š ¬Ã‚  (2010) 30 Bulletin of Science and technology 1, at pg. 26 [2] Ibid at pg. 27 [3] Ibid at 2 [4] Ibid at 3 [5] Ibid at 4 [6] Ibid at 5 [7] Ibid at 6 [8] Ibid at pg. 28 [9] Ibid at 9 [10] Ibid at 10 [11] Ibid at 11 at pg. 29 [12] Ibid at pg. 28 [13] Ibid at 12 [14] Langdon Winner, à ¢Ã¢â€š ¬Ã…“Do Artifacts have politics?à ¢Ã¢â€š ¬Ã‚  (1980) 109 Modern technology: Problem or opportunity 1, at pg. 122 [15] Supra note 1 at pg. 27 [16] Supra note 1 at pg. 29 [17] Ibid 16 at pg. 26 [18] Supra note 14 at pg. 125 [19] Ibid 16 at pg. 124 [20] Supra note 1 at pg. 27 [21] Supra note 17 at pg. 124 [22] Ibid 18 [23] Supra note 14 at pg. 125 [24] Ibid at 20 [25] Supra note 1 at pg. 29 [26] Jessica Litman, à ¢Ã¢â€š ¬Ã…“The Demonization of Piracyà ¢Ã¢â€š ¬Ã‚  (2000). Tenth Conference on computers, freedom privacy at pg. 1 [27] Ibid at pg. 2 [28] Ibid at pg. 3 [29] Lisa M. Austin, à ¢Ã¢â€š ¬Ã…“Control yourself or at least your core selfà ¢Ã¢â€š ¬Ã‚  (2010) 30 Bulletin of Science and technology 1 26-29 at pg. 26 [30] Ibid 26 pg. 28 [31] Supra note 23 at pg. 6 [32] Ibid [33] Ibid 28 at pg. 7 [34] Supra note 23 at pg. 7 [35] Supra note 26 at pg. 26 [36] Ibid at 30 [37] Supra note 23 at pg. 9 [38] Supra note 26 at pg. 28

Saturday, December 21, 2019

Managing Cultism in Tertiary Institutions - 3483 Words

MANAGING CULTISM IN TERTIARY INSTITUTIONS BY SULAIMAN ABDULLAHI KARWAI, Ph.D, fmca, mnim, mimc, DEPARTMENT OF BUSINESS ADMINISTRATION AHMADU BELLO UNIVERSITY, ZARIA. Abstract Importunate secret cult activities have created a culture of fear and turned many tertiary institutions into centres of violence, where Fear, anxiety and insecurity of lives and properties are the order of the day. These scenarios have resulted in poor learning, poor performance and low academic attainment. The objective of this study is how to eradicate cultism from our tertiary institutions so as to enable them to produce the much needed high level manpower for overall national development. The study is an expository work based on the survey of literature. It†¦show more content†¦Encyclopaedia Britannica (2009) cautions that cult worship is so universal in religion that some historians of religion actually define religion as cult. From the definitions given so far, we can deduce that cultism/cult, secret cult and secret society are secret groups of people whose members are bound on an oath to keep the activities of each and every member secret. It is also safe to say that cult fraternity may be violent or beneficial to the society, depending on the objectives of the members. For example, some secret cults are formed to provide benevolent services while others are formed due to political reasons to protect the interest of the society. In light of these definitions, we shall use cultism, cult, secret cult and secret society interchangeably. 2.2 The Evolution of Cultism Secret adherence to a doctrine or leader based on a common dogma or beliefs has been in existence for a very long time. All over the world, secret cults have been flourishing and causing positive and/or negative impacts. On the positive side, religious experience are said to have received its initial, practical expression in the forming of cult that provides an orderly framework for the religious object. The Egyptian religion, the ancient Greek Adonis and the Roman Catholicism are said to be cults (Encyclopaedia Britannica, 2009). While onShow MoreRelatedSublimation Mechanism of Psychoanalytical Counselling Theory as a Tool for Addressing Juvenile Delinquency in Secondary Schools in Nigeria4142 Words   |  17 Pagesof all kinds including rape, fighting, armed robbery, bullying, cultism, all gangster behaviour etc. These behaviours characterize our secondary schools and prevent the schools from achieving their purpose of wholistic education and development of individual students; he nce constant efforts to keep these delinquent activities at its barest. The fact that these behaviours still prevail at a disturbing rate in our educational institutions, evident by reports of such activities daily in the news and other

Friday, December 13, 2019

Stylistic Analysis of the Poem “Meeting at Night” Free Essays

The Love Song of Hair Dyal Rudyard Kipling Alone upon the housetops to the North I turn and watch the lightnings in the sky– The glamour of thy footsteps in the North. Come back to me, Beloved, or I die. Below my feet the still bazar is laid– Far, far below the weary camels lie– The camels and the captives of thy raid. We will write a custom essay sample on Stylistic Analysis of the Poem â€Å"Meeting at Night† or any similar topic only for you Order Now Come back to me, Beloved, or I die! My father’s wife is old and harsh with years, And drudge of all my father’s house am I– My bread is sorrow and my drink is tears. Come back to me, Beloved, or I die! Stylistic Analysis of the Poem â€Å"Meeting at night† â€Å"Meeting at Night† Robert Browning The gray sea and the long black land; And the yellow half-moon large and row; And the startled little waves that leap In fiery ringlets from their sleep, As I gain the cove with pushing prow, And quench its speed I’ the slushy sand. Then a mile of warm sea-scented beach; Three fields to cross till a farm appears; A tap at the pane, the quick sharp scratch And blue spurt of a lighted match, And a voice less loud, thro’ its joys and fears, Than the two hearts beating each to each! ]  Ã‚  The Theme of the Poem This poem written by Robert Browning is a poem of love that describes clearly the man’s sailing on the sea to the bay on the beautiful night to go to the girl she loves and meets her at night. In here, it is said that the readers can feel the excitement and happiness of the couples on their meeting at night. It is very clear at the end of the poem that the woman is somehow nervous and afraid while waiting for the man she loves. But, upon hearing the man’s tap on the window pane, she is very happy and relieved to see him, which only shows how deep their love and missing is. ]  Ã‚  Linguistic Analysis of the Poem by  Liu Yueqin Liu Yueqin has presented five linguistic presentation of the poem. Here is the following linguistic analysis he had in this poem of Robert Browning: a. Phonological features 1. End rhyme The rhyme scheme is, in the first stanza – abccba, in the second -dedded. There are five end rhymes as follow: a. [  ? nd]  land, sand; b. [? ]row, prow; c. [I:p]leap, sleep; d, [I:t ]beach, scratch, match, each; e, [i? s]appears, fears 2. Alliteration long-land in line 1;the-that in line 3; fiery- from in line 4; pushing-prow in line 5; speed-slushy-sand in line 6; sea-scented in line 7; to-till and field-farm in line8; less-loud in line 11; than-the and two-to in line 12. 3. Repetition And the  repeats 3 times in the poem, and there are totally 8  and  in the poem. The rep etition shows that the man is making long-time effort step by step to meet the woman, his lover. However, the effort is worthy since the man loves the woman and expects fiercely to see her, no matter it’s at night or at day. The refrain occurs at the close of a stanza, where it helps to establish meter, influence the mood of love, and add emphasis. With the usage of end rhyme, alliteration and repetition, the poem creates aesthetic pleasure and shows the feeling of the couple. b. Graphical features The description of the scene on the sea and on the bay and about the meeting is vivid, elaborate and attracting. Through the different angles of vision (the gray sea,  the long black land, the yellow half-moon, etc. ), auditognosis (two hearts beating, etc), olfaction (scented), the readers can just feel like being in the situation, and appreciating the charming of meeting at night. c. Lexical features The poem is relatively brief; consist of simple specific concrete words, mainly adjectives and nouns, just like casual and gentle narration between lovers or dramatic monologue. There are 4 adjective words about color; they are  gray, black, yellow and blue, to make the scene at night vivid to the readers. The readers can clearly know that the meeting is at night. The beautiful scene symbolizes the wonderful mood of the couple. In line 6, words of  speed, slushy, sand  have alliteration [s] for imitate the sound of the prow decreasing its speed and gently scrapping in the bay. d. Syntactic features All the sentences in the poem are statement just like dramatic monologue, what the author is very famous with. Many short sentences are linked into long sentences with devices of coordination with the usage of  and. There are totally 5 lines beginning with  and. Coordination gives clauses equal syntactic status, and establish peaceful mood. It seems that the man has met the woman at night many times, and gets very familiar with the process. e. Semantic features In first stanza, the author uses  startled  and  fiery  instead of  surprising  and  hot. The personification gives human form or feelings to the waves and ringlets, inanimate objects to show that the man’s feeling is startled and fiery. In second stanza,  tap, scratch  and  spurt  are gentler, lovelier, and shorter in time thanknock, scrape, and spring. These words can vividly to describe the feeling of the couple. The man arrives at just outside of the house, and taps the glass with the love in his heart. When he is waiting for the appearance of the woman, he is very nervous and upset. The woman is also nervous and upset. After hearing the tap, she lights a match to lights the place and feels happy and fears to meet her lover. How to cite Stylistic Analysis of the Poem â€Å"Meeting at Night†, Papers

Thursday, December 5, 2019

Advantage And Disadvantage Of Social Network - Myassignmenthelp.Com

Question: Discuss about the Advantage And Disadvantage Of Social Network. Answer: Reflective writing This reflection will discuss the opinion regarding the learning experience gained from conducting the research program along with the value of the experience. It has also discussed the manner this learning experience will be useful in the different phases of the life. It has covered different aspects which took place during the execution process of the research. The plan will be discussed which will cover the manner, learnings of the research will be applied. I have carried out this research program on the topic Advantages and Disadvantages of Using Social Networks. This research program has contributed to the knowledge regarding the different aspects of the research topic (Helyer, 2015). This program has provided a theoretical base for the different aspects of the research which I can use in the personal and professional life. During the execution process of this research program, I have learned the manner in which a research program is carried out. Knowledge gained from this program is of great importance as this will act as a base for conducting the research activities in future. Social networks are crucial aspects of the present era as it acts as a medium for connecting with the people (Maki, 2016). In this research program, I have presented data related to the role of social networks, advantages, and disadvantages of using social networks. It has been analyzed from the collected data that a company may gain benefits or face few risks due to the use of social networks as a marketing or advertising tool (Jefferson Traughber, 2012). Execution of this research program has helped in the attainment of the objectives of the course by improving the knowledge. I have learned that different organizations are using social networks for the purpose of enhancing the customer base and sales. I have learned that there are various advantages associated with the use of social networks for the business. These advantages include establishing a connection with a large number of audience, building networks between the different commonalities, cost reduction, reduces the time involved in the marketing of the products or services offered, easy information sharing and effective advertising. I have learned that there are few disadvantages attached with the use of social networks for the business (Arca, 2012). These disadvantages include lack of emotional connect, lacks face-to-face interaction, temporary promotion tool, wastage of time, harms the image of the organization due to the negative feedbacks, online threats, and privacy issu es. Impact of the use of social networks can be directly seen on the performance and sales of the organization (Drahoova Balco, 2017). This knowledge will help me in gaining the advantage of the opportunities available to me in the personal and professional life. Social networking is a common aspect which is widely being used by the organizations. I will use the theoretical knowledge gained for the purpose of taking decisions for coping with the situations faced in the personal and professional lives. I have developed skills of conducting a research program so as to gather the required data for the topic. I have conducted the research in a sequence so as to ensure that every crucial aspect has been included and research is moving in the right direction. I have gathered relevant data by collecting data with the help of different sources of data collection. I have faced few limitations which could have impacted on the research program conducted. I will use the knowledge of these various aspects in the professional life as well as personal life. As a professional, there is a need to develop knowledge of social networks as it is one of the most common marketing or advertising tool used (Collin, et. al., 2011). I have carried out this research program, by formulating a plan so as to complete the research program within the allocated time and meeting the objectives set. I have formulated research objectives so as to form a base on the basis of which data will be collected. I have gathered data so as to present the data for developing knowledge of the concept of social networks, its importance, and advantages and disadvantages of using social networks. This project has prepared me for the future as with the increasing trend of trade across the borders, there has been a rise in the use of social networks for communicating with the customers. It has been analyzed that with the use of social networks satisfaction level of the customers can be enhanced as well as measured (Kietzmann, et. al., 2011). I have prepared an action plan on the basis of which I have conducted the different activities of the research. The motive behind conducting the research on the chosen topic is to gather relevant data for the purpose developing knowledge of the concept of social networks. While conducting the research, I have analyzed that organizations operating at different levels are using the social network for enhancing the chances of growth and success. The decision of whether to use a social network or not depends on the analysis of the different pros and cons attached with the use of social networks as an advertisement tool. This business research will help in making better decisions and grabbing the opportunities available (Helyer, 2010). I have developed knowledge of the various sources of data collection which helps in collecting reliable and quality data for the topic. I have learned the manner in which a research is to be conducted for meeting the objectives of the research. Theoretical knowledge developed in this research will provide guidance for performing the roles and responsibilities assigne d in the personal and professional life in a better manner (Giles, 2010). I have conducted this research on this topic as it is a common topic which has gained much importance in the present era. With the rise in the trade across the border, there has been an increase in the number of organizations using social networks. Organizations are using social networks as a marketing tool and enhancing the image of the organization among the society. As a professional, knowledge of social networks will be of great use as the knowledge gained will be utilized in the professional and personal life. In the assignment one, secondary data collected with the help of articles, books, journals and other internet sources have been presented. In the assignment two, I have prepared an action plan, discussed the different methods or approaches which have been used for gathering data. This has been done for ensuring that data collected is authenticated. Research questions have been constructed as data has been gathered on the basis of the research questions (Helyer, 2015). This learning program has helped me in understanding the increasing importance of social networks in the business environment. I will apply the knowledge developed for enhancing the performance of the business and executing the roles assigned with a better approach. As a professional, decisions need to be taken for the purpose of fulfilling the requirements of the role. Knowledge gained will help in fulfilling or meeting the objectives in a better manner. I will be able to cope with the changing business environment in a better manner. Knowledge of the business environment is required for the purpose of operating in the business environment properly and dealing with the increasing competition (Helyer, 2010). Thus, from the above-discussed reflection, it can be concluded that this research program has contributed to the knowledge. This knowledge will be useful in the different phases of life. Learnings gained during preparing this research program will be applied in the future for the attainment of the objectives or targets. References Arca, C., 2012, Social Media Marketing benefits for businesses, Master of International Marketing. Collin, P., Rahilly, K., Richardson, I. Third, A., 2011, The Benefits of Social Networking Services, UWS. Drahoova, M. Balco, P., 2017, The analysis of advantages and disadvantages of use of social media in European Union, Procedia Computer Science, pp. 10051009. Giles, S. L., 2010, Reflective Writing and the Revision Process: What Were You Thinking?, Colostate. Helyer, R., 2010, The Work-Based Learning Student Handbook, Palgrave Macmillan, Basingstoke. Helyer, R., 2015, Learning through reflection: the critical role of reflection in work-based learning (WBL)",Journal of Work-Applied Management, Vol. 7 Issue: 1, pp.15-27. Helyer, R., 2015, The Work-Based Learning Student Handbook, 2nd ed.,Palgrave,London. Jefferson, C. E. Traughber, S., 2012, Social Media in Business, Cameron University. Kietzmann, J.H., Hermkens, K., McCarthy, I. P. Silvestre, B.S., 2011, Social media? Get serious! Understanding the functional building blocks of social media, Business Horizons, 54(3), 241-251. Maki, S., 2016, Gaining a competitive advantage through social media marketing in B2C sales, Helsinki Metropolia University of Applied Sciences.