Reflection of my growth as a blogger

Upon beginning BCM110, I was not too pleased as well as pretty darn scared when I learned the knowledge that we must complete a blog on a weekly basis. My negative view on this was from the basis that I had no knowledge whatsoever on how to complete or structure a blog. It was to my later knowledge after completing my first blog, that the blogging was in fact, not so bad. My weeks in 110 have actually turned out to be very enjoyable, from attending very informative lectures with Sue, all the way to getting involved in group chats in tutorials.

Over the 6 weeks in BCM110, we explored many different aspects of the medias, inducing topics such as :

– What is the media blamed for

– Who owns the media

– Semiotics and the study of images

– Corporate paedophillia

– Mediated Public Sphere

Each of these topics covered in the subject were very thought provoking. Each topic allowed us a lot of room to follow topics in which we were interested in. I found it great that I could express my views on each of the questions asked of me from the lecture by linking it to current articles within media today. I personally found the semiotics topic to be the most interesting for me. It was interesting to look past a plain advertisement in seek of the context behind it.

Through reading through other blogs of my peers, I was able to improve my learning and knowledge on each topic. This was done by seeing their ideas and sources that they used in answering the question.

Tinder’s Terms of Service

Tinder's Terms of Service

In this technological driven world in which we live in today; information, software, and ideas are becoming more and more accessible to society through convergence. With this increase of content flow across various media platforms, comes the issue of protecting individual and companies intellectual property that can be accessed on a daily basis. Ways in which companies and various media platforms protect their software, as well as protect those who use their property, is through the stating of a ‘Terms of Service’ (TOS). A ‘TOS’ is essentially rules and guidelines in which the consumer must accept in order to use the service. Tinder, a well known dating app, is known for its consumers having to accept to a Terms of Service Agreement before being aloud to access the dating service. The TOS begins by stating, “By using Tinder in any way, you accept these Terms of Service (Agreement)”. (Tinder, 2013). Our initial response to seeing these Terms of Service Agreements is to automatically click accept without even processing through any of the information. The problem and question raised through this is, ‘Do we actually know the terms in which we are accepting when we sign up for Tinder?’

Within Tinder’s ‘Terms of Service’, is a well-structured and detailed list of points including consumer’s registration to the app, privacy for the user, copyright laws, code of conduct and many other factors in which inform the user of Tinder on what they are signing up for. Upon researching Tinder’s ‘TOS’, I came across an article which highlighted a flaw in Tinder’s privacy and security protection of their users.

Within this article, it is explained how Tinder’s innovative method of matching compatible users together, based on geographical location, was actually being used against them by, hackers, in order to find user’s precise location. Under the privacy policy in Tinder’s ‘TOS’, it is clearly stated that information collected on each consumer includes “Your mobile device’s geographic location while the app is actively running” (Tinder, 2013). With this being accepted by all users upon beginning the app, their security and safety was at risk.


Tinder (March 26, 2013) Terms of Service, Available at: (Accessed: 1st April 2014).

Tinder (March 25, 2013) Privacy Policy, Available at: (Accessed: 1st April 2014).

Nick Summers (19th February 2014) New Tinder Security Flaw Exposed Users’ Exact Locations for Months, Available at: (Accessed: 2nd April 2014).