Friday, January 18, 2019

Pros and Cons of Social Network Essay

According to Tynan (2005, p. 72), 70% of online substance absubstance abusers be concerned about their online seclusion. numerous users of genial networking sites such as Facebook and Twitter complain about how these sites do not have the appropriate settings to pr in timet online brats such as identity theft and the invasion of seclusion. They believe that it is the responsibility of affectionate networking sites to safeguard users loneliness. However, users a great deal for pick up how willing they atomic arrive 18 when it comes to exposeing intimate details and selective instruction of their lives on these sites.This willingness to give out their personal culture invites the online secretiveness troubles that users a great deal complain about. With all these knowledge exposed to hackers, identity thieves are attached a green light to tap into users entropybase when users decide to crack their info online. Thus, we place say that the users of social networki ng sites are the biggest threat to their suffer online privacy and human faces of identity thefts. There are three main reasons why great deal distinguish to reveal their personal tuition on social networking sites.Firstly, muckle use social networking sites to connect, and to do so, they have to reveal personal information about themselves. As Andrews, L. (2011, p. 2) has said, Social networking has enormous benefits, helping us hang on in touch with large derive from our pasts and introducing us to volume who share our interests. These information includes their name, age, city they are staying in, company or school they belong to and etc. The information they depict will help long-lost friends connect with them, help them give birth new friends with common interests and perhaps even help them find a love interest.Another reason why people choose to reveal information about themselves is to create identity. This identity is like the information ragtime of how the us er is like. Users baron even want to post their every public opinion and actions even places they have been to, it becomes a part of their life to log on to social networking sites and post their current status (Andrews, 2011). Writing about the groups and activities a person is involved in for example, tells friends and people around him what are his interests and helps people to understand him better. Lastly, people reveal personal information to gain recover to sure websites.These include gaming sites and articles postd by social networking websites, and they often point for the users personal information. Users capacity find it worth it to reveal their information in order to enjoy the entertainment provided by these sites. Thus, they might decide that since their information will be kept confidential, it is safe to provide their personal details without a second thought. It is understood that people choose to reveal their personal information online in exchange for the b enefits of exploitation social networking sites. However, they might want to think twice after hearing what dangers they are putting themselves in.Users should be aware of how they are putting their profits privacy at risk when they reveal personal information about themselves thither are three major threats that users should be wary of. First of all, there is there is the threat of cyber bullying. Cyber bullying is a unspoilt problem among teenagers and it might cause mental illnesses such as depression to the dupe. It can authorize when a bully gets hold of the content a user affix on the Internet. Unlike normal bullying, where the victim can escape position to safety, the victim can get bullied even at home as it happens on the Internet.The bully can even get hold of the victims home address or phone number if the victim had posted it online. One of the most famous cases of online bullying is the Star Wars josh, Ghyslain Raza, whose homemade video of him fighting with a pretend light saber was leaked and had to a greater extent than 15 million downloads. He had been so affected that he was admitted into a child psychiatric ward (Johnson, 2004). We can see from this case study how badly cyber bullying can affect a victim, and this started from a post that the victim had not expected would be leaked.All of these threats put across because people choose to post their details on the social networking sites. charm social networking sites are growing, more people are online than ever ahead and this includes the bad guys on the net (Viega, 2009). Thus, we have to be even more careful about the threats that we might face online. Other than that, users should similarly watch identity theft. Identity theft is the use of one persons personal information to commit fraud or other crimes (Columbia University Press, n. d. ).This can happen to users who reveal too much information on the Internet for an identity thief to pose as him or her. As Waldrop, B. (2 011) has said, A case of identity theft can be as serious as having your entire bank account to be wiped out. This can be a very serious threat and users should beware of it. Finally, there is the privation of privacy online. The thing about social networking websites is that it has the weakest data join and was even rated by The retreat Blog as the second biggest online privacy threat in 2011.With a weak data connective, it is easy for even non-users of social networking sites to hack into a users database and gain access to what the user has posted. In fact, Mark Zukerberg, the founder of Facebook himself had hacked into the email accounts of two Harvard Crimson reporters using data obtained from TheFacebook. coms logs (Carlson, 2010). This shows how information is easily accessed on social networking sites. sight often believe that it is the responsibility of social networking websites to safeguard its users privacy.However, here are some of the reasons why users have a maj or role to do work in comforting their own online privacy. Firstly, social networking sites can only protect their users to a limited extent. Social networking sites have really weak data links and they have too many users to be able to keep back care of all of them. Facebook for example, would be the third largest nation in the initiation if it were a country (Andrews, 2011, p. 1). We can think Facebook as the government and its privacy settings as the law. In a real country, there would be people breaking rules despite knowing the laws.A weak data link is like Facebooks version of a weak police force, creation unable to prevent data from being stolen. Hence, users cannot choose to rely altogether on social networking sites to protect their privacy. Secondly, it is the users responsibility to provide his or her loved ones. Some of a users information such as home number or address is divided up with his or her non-user family members. Thus, revealing information as such might mold harm to the family. An example would be if a burglar decides to break in to a users house, whose address he found on the Internet.If a social networking site user had revealed his address and phone number online, all the burglar has to do is to type in phone number or address in Google Search and it will direct him to the users home (Tynan, 2005). Finally, it is important that users are aware of what harm information they post can bring. This is so as the information that had been posted cannot be taken back. Even if the user had used the best services to get all of his data removed, the information can be reinstalled within a short period of time (Andrews, 2011).Hence, users are considered the biggest threat to their own online privacy as they are the ones who have a final say on what information they choose to post on the Internet. As mentioned in Cocoons 2011 List of the Top 10 Internet Privacy threats, the weakest link in the privacy chain could be the users themselves. E verything that Internet users do online leaves a digital footprint from search engine tastes to browsing patterns and social interactions. Therefore, users should be responsible for what they choose to do on the Internet, as they will never know who is watching and what online privacy threats awaits them.While enjoying the benefits that social networking websites provide them with, they should also be aware of the threats they are facing and learn to protect their own privacy. I strongly believe that the best way to do so is for users to limit the amount of intimate information they reveal online. Privacy settings on social networking sites might help but only to a certain extent and it is better to be safe then sorry. All in all, users should understand that while they are limiting the amount the intimate information of themselves online, they are also protecting themselves from their greatest Internet privacy enemy- themselves.

No comments:

Post a Comment