Discuss About The Security Privacy Issues With Social Media?
Nowadays, social media has become so popular among people for communication and sharing of information among people worldwide. The social networking sites like Facebook, Twitter, and LinkedIn etc. are commonly used by people. There are several benefits of using social media for both business organizations and for other common users. The basic concept of social media is that it is combination of websites and applications that can be used by users to create and share content among others via online. Whether there are some benefits of social media but on other side, there are challenges, risks and problems are concerned with this technology. In upcoming paragraphs, we will discuss about essential points in detail.
It is an important segment of this report to discuss challenges and issues of security and privacy issues of social media.
According to analysis, I got to know that the main challenges of security of social media is to choose best strategy by developers to get high level security and privacy of information that is transferred over internet. Without an appropriate technology, it is difficult to get prevention from vulnerable attacks such as hacking, phishing, DDOS etc. (methodshop, 2017)
Another important challenge is for business enterprises those provide services to its users for social networking. People submit their information online with trust on companies and they want to proper security of their information. It is matter of believe of customers and reputation of companies. So advanced security facility is necessary to provide to customers to satisfy them.
Moreover, it is also important to be update about new tools and techniques of security and privacy tools. In most of cases, due to lack of awareness about advanced techniques to maintain security of their networks and computers, users have to encounter vulnerable network attacks. It is also a big challenge for users to be aware about availability of new kinds of software solutions and their usage.
Another important thing to discuss here in this report is regarding problems areas of social media in case of security and privacy of users (Fast Company, 2017).
These security and privacy related issues of security and privacy of social media can be resolved by using some essential technologies. These security and privacy related technologies are listed as below (MakeUseOf, 2017):
The application area of above discussed security and privacy technologies is wide enough. These technologies can be used anywhere for maintaining long term security and privacy of database, network and computer systems that are used for business and as well as for personal usage.
Most of the social media users have fundamental knowledge about it. But still there are some unclear areas that must be cleared to all users. The first unclear area is that how large amount of data is managed and stored by social media websites. In this case, it can be said that large databases are used for this purpose but security of these databases is also necessary. Another unclear area is that how malware enter into user’s system through social sites. In this case, it can be said that it has happened due to vulnerable ads that are attached with a particular web page and while opening that page ads enters into system and spread virus (Langheinrich & Karjoth, 2010).
According to analysis, I got to know one research question that is highly common among people that privacy is a big issue for social media or not. In answer it can be said that privacy is really important for users of social media and gradually it is becoming a problem for social networking sites. Therefore, it is essential duty of social media developers that enhance the level of security to provide secure services to users (Zheleva, Terzi & Getoor, 2012).
The main discussed issues in form are concerned with vulnerable issues of security and privacy of data. The explanation of every issue is appropriate and it is essential for users to be aware about these issues and try to use suitable security solutions. In addition to this, I would like to say that to overcome this problem of privacy and security of data, both users and developers need to do efforts. Developers of social media have to implement new strategies to control cyber-attacks like hacking, virus attacks and phishing etc. On other side, users should maintain security of their computers by using available security schemes and policies (Senthil Kumar N, Saravanakumar K & Deepa K, 2017).
From above discussion it is cleared that users of social media have so much bad influence of security and privacy issues of social media. Due to this, people are worried about their information that is stored in online databases. Hackers have several tools to deliberately access the sensitive information from databases. Not only common users but also some large business enterprises have faced security related issues. Sony, eBay, Nokia and other renowned companies are in this list (Ieeexplore.ieee.org, 2017).
The given information in forum is important and accurate about security issues of social media. But there is another issue that must be mentioned in forum is social media marketers are also affected by harmful security violation attacks. Due to this, the maintenance of external and internal resources, progress of marketing strategies and identification of social media tools have become more challenging for social media marketers. I have mentioned this issue in this report because like users and developers, social media marketers play important role in distribution of social media services and making its strategies (Econsultancy, 2017).
The overall discussion about social media and its challenges, risks and problems is essential and informative. From this discussion, the main reasons, risk factors, unknown facts and things about social media are cleared now and it is necessary to cope with critical conditions of cyber- attacks. Furthermore, it helps to enhance level of prevention by providing knowledge about latest security tools and techniques that can be used by both users and security professionals (Searchsecurity.techtarget.com, 2017).
To sum up, I can say that while using any new or existing technology, a user has knowledge about its risks, challenges, benefits and drawbacks. Besides this, the availability of possible solutions is also required to control major risk factors. From above discussion, users of social media will be familiar with basics concepts of social media and their outcomes. Now with advancement of social media, these issues can be increased if no solution will be found quickly.
Methodshop. (2017). 6 Really Scary Facts About Your Privacy on the Internet. Retrieved 27 September 2017, from https://www.methodshop.com/2015/03/internet-privacy-facts.shtml
MakeUseOf. (2017). 12 Social Media Facts and Statistics You Should Know in 2016. Retrieved 27 September 2017, from https://www.makeuseof.com/tag/12-social-media-facts-statistics-know-2016/
Langheinrich, M., & Karjoth, G. (2010). Social networking and the risk to companies and institutions. Information Security Technical Report, 15(2), 51-56. https://dx.doi.org/10.1016/j.istr.2010.09.001
Searchsecurity.techtarget.com. (2017). Social media security risks news, help and research - SearchSecurity. Retrieved 27 September 2017, from https://searchsecurity.techtarget.com/resources/Social-media-security-risks-and-real-time-communication-security
Fast Company. (2017). Privacy and Security Issues in Social Networking. Retrieved 27 September 2017, from https://www.fastcompany.com/1030397/privacy-and-security-issues-social-networking
Zheleva, E., Terzi, E., & Getoor, L. (2012). Privacy in social networks. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA): Morgan & Claypool.
Econsultancy. (2017). The four biggest challenges facing social media strategists. Retrieved 27 September 2017, from https://econsultancy.com/blog/67913-the-four-biggest-challenges-facing-social-media-strategists
Ieeexplore.ieee.org. (2017). Solutions to Security and Privacy Issues in Mobile Social Networking - IEEE Conference Publication. Retrieved 27 September 2017, from https://ieeexplore.ieee.org/document/5283078/
nadikari123. (2017). Social network privacy & security. Slideshare.net. Retrieved 27 September 2017, from https://www.slideshare.net/nadikari123/social-network-privacy-security
Hootsuite Social Media Management. (2017). 5 Social Media Security Risks and How to Avoid Them. Retrieved 27 September 2017, from https://blog.hootsuite.com/social-media-security-for-business/
HuffPost.(2017). Social Media Privacy and Personal Security Issues. Retrieved 27 September 2017, from https://www.huffingtonpost.com/robert-siciliano/social-media-privacy-and_b_245857.html
Senthil Kumar N, Saravanakumar K, & Deepa K. (2017). On Privacy and Security in Social Media – A Comprehensive Study. Retrieved 27 September 2017, from https://www.sciencedirect.com/science/article/pii/S187705091600021
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). Security Privacy Issues With Social Media. Retrieved from https://myassignmenthelp.com/free-samples/security-privacy-issues-with-social-media.
"Security Privacy Issues With Social Media." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/security-privacy-issues-with-social-media.
My Assignment Help (2018) Security Privacy Issues With Social Media [Online]. Available from: https://myassignmenthelp.com/free-samples/security-privacy-issues-with-social-media
[Accessed 01 June 2020].
My Assignment Help. 'Security Privacy Issues With Social Media' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/security-privacy-issues-with-social-media> accessed 01 June 2020.
My Assignment Help. Security Privacy Issues With Social Media [Internet]. My Assignment Help. 2018 [cited 01 June 2020]. Available from: https://myassignmenthelp.com/free-samples/security-privacy-issues-with-social-media.
MyAssignmenthelp.com is one of the noted service providers that deliver essay help. We provide tailored essay assistance to make sure that student gets online essay help exactly in the way they want it to be written. We at MyAssigemnthelp.com have built teams of consultants, who readily attend every query related to help me writing my essay. We provide essay writing help in forms of tips and steps in order o assist students with tough essay assignments.
Answer: Project scope and WBS In order to upgrade the archive website of the company, the project manager is required to develop a project budgetary plan. It is the responsibility of the project manager to complete the project within the estimated budget and allotted time. Budget variance is referred to as the difference between budget and baseline amount of the revenue, expense and the actual amount. In order to upgrade the website, differen...Read More
Introduction This experiment involves production of aspirin. The major reactants which were used in the experiment include salicylic acid HC7H5O3, and C4H6O3. The reactants reacted in order to produce acetylsalicylic acid or simply aspirin HC9H7O4 and ethanol acid CH3CHOOH. Asprin has several uses such as an analgesic or painkiller, as an anti-pyretic or fever reducer and as thinning of the blood. Balanced equation HC7H5O3 + C4H6O3&nb...Read More
Answer: Assessment instructions Prior to commencing the assessments, your trainer/assessor will explain each assessment task and the terms and conditions relating to the submission of your assessment task. Please consult with your trainer/assessor if you are unsure of any questions. It is important that you understand and adhere to the terms and conditions, and address fully each assessment task. If any assessment task is not fully addressed,...Read More
Answer: Introduction BREEAM (Building Research Establishment's Environmental Assessment Method) , this is the global's primary manageability ranking tool that has resulted primarily to the focus on maintainability in construction strategies, growth and operation. BREEAM currently, is the collective standard which is confidentially adjusted, controlled and linked over a structure of the comprehensive superintendents, appraisers and produ...Read More
Answer: Introduction: This report is prepared from the viewpoint of a consultant for dissecting the efficacy of Time-Driven Activity-Based Costing System (TDABC) in organisations. The consultant is employed recently in a consultancy firm, which has a main client, Wesfarmers Limited. It is one of the leading retail companies in Australia competing with Woolworths Limited in the market. The initial part of the report lays stress on descri...Read More
Just share Requriment and get customize Solution.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
The graph plot was excellent and my course coordinator was happy with it and got it with full marks! Would recommend if someone need help in such way.
The expert really did a great job on this discussion question. The professor made remarkable comments. A perfect score was received. Job well-done.
Assignment was really good, I like the way everything was mentioned clearly as I wanted in my assignment, over all I am satisfied,
Very nice job done by My assignment help. Very satisfying with the timely content they have provided.