Discuss About The Security Privacy Issues With Social Media?
Nowadays, social media has become so popular among people for communication and sharing of information among people worldwide. The social networking sites like Facebook, Twitter, and LinkedIn etc. are commonly used by people. There are several benefits of using social media for both business organizations and for other common users. The basic concept of social media is that it is combination of websites and applications that can be used by users to create and share content among others via online. Whether there are some benefits of social media but on other side, there are challenges, risks and problems are concerned with this technology. In upcoming paragraphs, we will discuss about essential points in detail.
It is an important segment of this report to discuss challenges and issues of security and privacy issues of social media.
According to analysis, I got to know that the main challenges of security of social media is to choose best strategy by developers to get high level security and privacy of information that is transferred over internet. Without an appropriate technology, it is difficult to get prevention from vulnerable attacks such as hacking, phishing, DDOS etc. (methodshop, 2017)
Another important challenge is for business enterprises those provide services to its users for social networking. People submit their information online with trust on companies and they want to proper security of their information. It is matter of believe of customers and reputation of companies. So advanced security facility is necessary to provide to customers to satisfy them.
Moreover, it is also important to be update about new tools and techniques of security and privacy tools. In most of cases, due to lack of awareness about advanced techniques to maintain security of their networks and computers, users have to encounter vulnerable network attacks. It is also a big challenge for users to be aware about availability of new kinds of software solutions and their usage.
Another important thing to discuss here in this report is regarding problems areas of social media in case of security and privacy of users (Fast Company, 2017).
These security and privacy related issues of security and privacy of social media can be resolved by using some essential technologies. These security and privacy related technologies are listed as below (MakeUseOf, 2017):
The application area of above discussed security and privacy technologies is wide enough. These technologies can be used anywhere for maintaining long term security and privacy of database, network and computer systems that are used for business and as well as for personal usage.
Most of the social media users have fundamental knowledge about it. But still there are some unclear areas that must be cleared to all users. The first unclear area is that how large amount of data is managed and stored by social media websites. In this case, it can be said that large databases are used for this purpose but security of these databases is also necessary. Another unclear area is that how malware enter into user’s system through social sites. In this case, it can be said that it has happened due to vulnerable ads that are attached with a particular web page and while opening that page ads enters into system and spread virus (Langheinrich & Karjoth, 2010).
According to analysis, I got to know one research question that is highly common among people that privacy is a big issue for social media or not. In answer it can be said that privacy is really important for users of social media and gradually it is becoming a problem for social networking sites. Therefore, it is essential duty of social media developers that enhance the level of security to provide secure services to users (Zheleva, Terzi & Getoor, 2012).
The main discussed issues in form are concerned with vulnerable issues of security and privacy of data. The explanation of every issue is appropriate and it is essential for users to be aware about these issues and try to use suitable security solutions. In addition to this, I would like to say that to overcome this problem of privacy and security of data, both users and developers need to do efforts. Developers of social media have to implement new strategies to control cyber-attacks like hacking, virus attacks and phishing etc. On other side, users should maintain security of their computers by using available security schemes and policies (Senthil Kumar N, Saravanakumar K & Deepa K, 2017).
From above discussion it is cleared that users of social media have so much bad influence of security and privacy issues of social media. Due to this, people are worried about their information that is stored in online databases. Hackers have several tools to deliberately access the sensitive information from databases. Not only common users but also some large business enterprises have faced security related issues. Sony, eBay, Nokia and other renowned companies are in this list (Ieeexplore.ieee.org, 2017).
The given information in forum is important and accurate about security issues of social media. But there is another issue that must be mentioned in forum is social media marketers are also affected by harmful security violation attacks. Due to this, the maintenance of external and internal resources, progress of marketing strategies and identification of social media tools have become more challenging for social media marketers. I have mentioned this issue in this report because like users and developers, social media marketers play important role in distribution of social media services and making its strategies (Econsultancy, 2017).
The overall discussion about social media and its challenges, risks and problems is essential and informative. From this discussion, the main reasons, risk factors, unknown facts and things about social media are cleared now and it is necessary to cope with critical conditions of cyber- attacks. Furthermore, it helps to enhance level of prevention by providing knowledge about latest security tools and techniques that can be used by both users and security professionals (Searchsecurity.techtarget.com, 2017).
To sum up, I can say that while using any new or existing technology, a user has knowledge about its risks, challenges, benefits and drawbacks. Besides this, the availability of possible solutions is also required to control major risk factors. From above discussion, users of social media will be familiar with basics concepts of social media and their outcomes. Now with advancement of social media, these issues can be increased if no solution will be found quickly.
Methodshop. (2017). 6 Really Scary Facts About Your Privacy on the Internet. Retrieved 27 September 2017, from https://www.methodshop.com/2015/03/internet-privacy-facts.shtml
MakeUseOf. (2017). 12 Social Media Facts and Statistics You Should Know in 2016. Retrieved 27 September 2017, from https://www.makeuseof.com/tag/12-social-media-facts-statistics-know-2016/
Langheinrich, M., & Karjoth, G. (2010). Social networking and the risk to companies and institutions. Information Security Technical Report, 15(2), 51-56. https://dx.doi.org/10.1016/j.istr.2010.09.001
Searchsecurity.techtarget.com. (2017). Social media security risks news, help and research - SearchSecurity. Retrieved 27 September 2017, from https://searchsecurity.techtarget.com/resources/Social-media-security-risks-and-real-time-communication-security
Fast Company. (2017). Privacy and Security Issues in Social Networking. Retrieved 27 September 2017, from https://www.fastcompany.com/1030397/privacy-and-security-issues-social-networking
Zheleva, E., Terzi, E., & Getoor, L. (2012). Privacy in social networks. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA): Morgan & Claypool.
Econsultancy. (2017). The four biggest challenges facing social media strategists. Retrieved 27 September 2017, from https://econsultancy.com/blog/67913-the-four-biggest-challenges-facing-social-media-strategists
Ieeexplore.ieee.org. (2017). Solutions to Security and Privacy Issues in Mobile Social Networking - IEEE Conference Publication. Retrieved 27 September 2017, from https://ieeexplore.ieee.org/document/5283078/
nadikari123. (2017). Social network privacy & security. Slideshare.net. Retrieved 27 September 2017, from https://www.slideshare.net/nadikari123/social-network-privacy-security
Hootsuite Social Media Management. (2017). 5 Social Media Security Risks and How to Avoid Them. Retrieved 27 September 2017, from https://blog.hootsuite.com/social-media-security-for-business/
HuffPost.(2017). Social Media Privacy and Personal Security Issues. Retrieved 27 September 2017, from https://www.huffingtonpost.com/robert-siciliano/social-media-privacy-and_b_245857.html
Senthil Kumar N, Saravanakumar K, & Deepa K. (2017). On Privacy and Security in Social Media – A Comprehensive Study. Retrieved 27 September 2017, from https://www.sciencedirect.com/science/article/pii/S187705091600021
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). Security Privacy Issues With Social Media. Retrieved from https://myassignmenthelp.com/free-samples/security-privacy-issues-with-social-media.
"Security Privacy Issues With Social Media." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/security-privacy-issues-with-social-media.
My Assignment Help (2018) Security Privacy Issues With Social Media [Online]. Available from: https://myassignmenthelp.com/free-samples/security-privacy-issues-with-social-media
[Accessed 24 January 2020].
My Assignment Help. 'Security Privacy Issues With Social Media' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/security-privacy-issues-with-social-media> accessed 24 January 2020.
My Assignment Help. Security Privacy Issues With Social Media [Internet]. My Assignment Help. 2018 [cited 24 January 2020]. Available from: https://myassignmenthelp.com/free-samples/security-privacy-issues-with-social-media.
MyAssignmenthelp.com is one of the noted service providers that deliver essay help. We provide tailored essay assistance to make sure that student gets online essay help exactly in the way they want it to be written. We at MyAssigemnthelp.com have built teams of consultants, who readily attend every query related to help me writing my essay. We provide essay writing help in forms of tips and steps in order o assist students with tough essay assignments.
Answer: Introduction The author attempts to shade light on the discursive issue of heritage. The author identifies dominant or the authorized discourse which forms the central point of interaction for a range of subaltern and dissenting discourses. The authorized heritage discourse creates specific set of social and cultural practices that contain legacies based on the late modernity context. The heritage discourse establishes who possesses r...Read More
Answer: The table below summarises the optimal cost of purchasing crude oil products for supply to the Fredonia state in the next 20 years Year Country Number of ships Total cost incurred 1 Saudi Arabia 6 USA 5 Australia 1 $481,300,000.00 2 Saudi Arabia ...Read More
Answer: Introduction Nowadays, there is a very common issue that is gaining the attention of the media. This is under weighing of canned products. It is claimed that the contents in the can have a net weight which is less than the weight specified on its label. This issue has been investigated in Australia on Tuna cans. Tuna cans are available in the market in two cans. These are Brand A and Brand B. Both the brands are of 100 gm net weight a...Read More
Answer: Introduction The Hewlett-Packard Company which is commonly known as the HP is one of the biggest IT Company in the world. The organisation provides global services of many different kinds of products, solutions, technologies and services to customers and businesses. The organisation is having several offices all around the globe which takes care of the business . This paper provides information about one of the major office relocat...Read More
Answer: Introduction Organisations have seen a lot of changes in the operating environment of a business concern for more than half a century. Nowadays manufacturing concerns produce varieties of di products with globalization impacting most organisations . With the modernization of the manufacturing concerns, a new form of costing called activity based costing is steadily replacing traditional costing methods (Dale and Plunkett 2...Read More
Just share your requirements and get customized solutions on time.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
I have a very good experience with assignment help. In last semester i will take help for many assignments. I got very good grades from these assignments. Now, this semester I will take help from them in many assignments. The price of the assignments...
great job great job great job great job great job great job great job great job great job great job great job great job great job great job great job great job great job great job great job great job great job great job great job great job great job ...
it was good and fast. my grade was good. only hoped if the price could have been lesser or else all good.
Thank you for helping me and will support to promote to my friends. Great customer services