$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Security Privacy Issues With Social Media

tag 0 Download7 Pages / 1,655 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT


Discuss About The Security Privacy Issues With Social Media?




Nowadays, social media has become so popular among people for communication and sharing of information among people worldwide. The social networking sites like Facebook, Twitter, and LinkedIn etc. are commonly used by people. There are several benefits of using social media for both business organizations and for other common users. The basic concept of social media is that it is combination of websites and applications that can be used by users to create and share content among others via online. Whether there are some benefits of social media but on other side, there are challenges, risks and problems are concerned with this technology. In upcoming paragraphs, we will discuss about essential points in detail.

It is an important segment of this report to discuss challenges and issues of security and privacy issues of social media.


Challenges of Social Media regarding Security and Privacy

According to analysis, I got to know that the main challenges of security of social media is to choose best strategy by developers to get high level security and privacy of information that is transferred over internet. Without an appropriate technology, it is difficult to get prevention from vulnerable attacks such as hacking, phishing, DDOS etc. (methodshop, 2017)

Another important challenge is for business enterprises those provide services to its users for social networking. People submit their information online with trust on companies and they want to proper security of their information. It is matter of believe of customers and reputation of companies. So advanced security facility is necessary to provide to customers to satisfy them.

Moreover, it is also important to be update about new tools and techniques of security and privacy tools. In most of cases, due to lack of awareness about advanced techniques to maintain security of their networks and computers, users have to encounter vulnerable network attacks. It is also a big challenge for users to be aware about availability of new kinds of software solutions and their usage.

Problems Areas regarding Security and Privacy of Social Media Users

Another important thing to discuss here in this report is regarding problems areas of social media in case of security and privacy of users (Fast Company, 2017).

  1. The key problem is unauthorized access of information from online databases of social networking websites. It has commonly seen that hackers try to hack websites to get users’ personal and business information and further this information is misused by them to fulfill purpose of money. So now users need to be very careful about safety of their data (Hootsuite Social Media Management, 2017).
  2. Another important issue is of spamming. To retrieve data from user’s systems, spam emails are sent to them in their inbox and that emails have some vulnerable attachments. Whenever, spam email is opened by users then virus enters into system or network and can cause damage. Here, it is necessary for users to ignore or delete these spam emails (nadikari123, 2017).

Related Technologies

These security and privacy related issues of security and privacy of social media can be resolved by using some essential technologies. These security and privacy related technologies are listed as below (MakeUseOf, 2017):

  1. SSL i.e. Secure Socket Layer is one of the important and effective techniques that can be used for protecting social networking websites that are used by people for communication and content sharing purpose. It is a very secure network layer and considered better for sending and receiving important information online.
  2. Furthermore, at user’s end proper security can be maintained by using strong login credentials. These credentials are username and password and these must not be weak. This is because, hackers can easily guess easy passwords and access information in unauthorized way.
  3. Encryption of database’s content is also an effective solution to get better security and privacy of data. By using this technique, data can be secured into database in secured and encrypted format that is hard to identify by cyber-attackers.

Technology’s Applications

The application area of above discussed security and privacy technologies is wide enough. These technologies can be used anywhere for maintaining long term security and privacy of database, network and computer systems that are used for business and as well as for personal usage.


Clarification of Unclear Areas

Most of the social media users have fundamental knowledge about it. But still there are some unclear areas that must be cleared to all users. The first unclear area is that how large amount of data is managed and stored by social media websites. In this case, it can be said that large databases are used for this purpose but security of these databases is also necessary. Another unclear area is that how malware enter into user’s system through social sites. In this case, it can be said that it has happened due to vulnerable ads that are attached with a particular web page and while opening that page ads enters into system and spread virus (Langheinrich & Karjoth, 2010).

Research Questions

According to analysis, I got to know one research question that is highly common among people that privacy is a big issue for social media or not. In answer it can be said that privacy is really important for users of social media and gradually it is becoming a problem for social networking sites. Therefore, it is essential duty of social media developers that enhance the level of security to provide secure services to users (Zheleva, Terzi & Getoor, 2012).


Mentioned Issues in Forum

The main discussed issues in form are concerned with vulnerable issues of security and privacy of data. The explanation of every issue is appropriate and it is essential for users to be aware about these issues and try to use suitable security solutions. In addition to this, I would like to say that to overcome this problem of privacy and security of data, both users and developers need to do efforts. Developers of social media have to implement new strategies to control cyber-attacks like hacking, virus attacks and phishing etc. On other side, users should maintain security of their computers by using available security schemes and policies (Senthil Kumar N, Saravanakumar K & Deepa K, 2017).

Effect of Security and Privacy Issues of Social Media on People Worldwide

From above discussion it is cleared that users of social media have so much bad influence of security and privacy issues of social media. Due to this, people are worried about their information that is stored in online databases. Hackers have several tools to deliberately access the sensitive information from databases. Not only common users but also some large business enterprises have faced security related issues. Sony, eBay, Nokia and other renowned companies are in this list (, 2017).

An important issue not mentioned in Forum

The given information in forum is important and accurate about security issues of social media. But there is another issue that must be mentioned in forum is social media marketers are also affected by harmful security violation attacks. Due to this, the maintenance of external and internal resources, progress of marketing strategies and identification of social media tools have become more challenging for social media marketers. I have mentioned this issue in this report because like users and developers, social media marketers play important role in distribution of social media services and making its strategies (Econsultancy, 2017).


Important Lesson of Discussion

The overall discussion about social media and its challenges, risks and problems is essential and informative. From this discussion, the main reasons, risk factors, unknown facts and things about social media are cleared now and it is necessary to cope with critical conditions of cyber- attacks. Furthermore, it helps to enhance level of prevention by providing knowledge about latest security tools and techniques that can be used by both users and security professionals (, 2017).


To sum up, I can say that while using any new or existing technology, a user has knowledge about its risks, challenges, benefits and drawbacks. Besides this, the availability of possible solutions is also required to control major risk factors. From above discussion, users of social media will be familiar with basics concepts of social media and their outcomes. Now with advancement of social media, these issues can be increased if no solution will be found quickly.



Methodshop. (2017). 6 Really Scary Facts About Your Privacy on the Internet. Retrieved 27 September 2017, from

MakeUseOf. (2017). 12 Social Media Facts and Statistics You Should Know in 2016.  Retrieved 27 September 2017, from

Langheinrich, M., & Karjoth, G. (2010). Social networking and the risk to companies and institutions. Information Security Technical Report, 15(2), 51-56. (2017). Social media security risks news, help and research - SearchSecurity. Retrieved 27 September 2017, from

Fast Company. (2017). Privacy and Security Issues in Social Networking. Retrieved 27 September 2017, from

Zheleva, E., Terzi, E., & Getoor, L. (2012). Privacy in social networks. San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA): Morgan & Claypool.

Econsultancy. (2017). The four biggest challenges facing social media strategists. Retrieved 27 September 2017, from (2017). Solutions to Security and Privacy Issues in Mobile Social Networking - IEEE Conference Publication. Retrieved 27 September 2017, from

nadikari123. (2017). Social network privacy & security. Retrieved 27 September 2017, from

Hootsuite Social Media Management. (2017). 5 Social Media Security Risks and How to Avoid Them. Retrieved 27 September 2017, from

HuffPost.(2017). Social Media Privacy and Personal Security Issues. Retrieved 27 September 2017, from

Senthil Kumar N, Saravanakumar K, & Deepa K. (2017). On Privacy and Security in Social Media – A Comprehensive Study. Retrieved 27 September 2017, from


Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Security Privacy Issues With Social Media. Retrieved from

"Security Privacy Issues With Social Media." My Assignment Help, 2018,

My Assignment Help (2018) Security Privacy Issues With Social Media [Online]. Available from:
[Accessed 01 June 2020].

My Assignment Help. 'Security Privacy Issues With Social Media' (My Assignment Help, 2018) <> accessed 01 June 2020.

My Assignment Help. Security Privacy Issues With Social Media [Internet]. My Assignment Help. 2018 [cited 01 June 2020]. Available from: is one of the noted service providers that deliver essay help. We provide tailored essay assistance to make sure that student gets online essay help exactly in the way they want it to be written. We at have built teams of consultants, who readily attend every query related to help me writing my essay. We provide essay writing help in forms of tips and steps in order o assist students with tough essay assignments.

Latest Management Samples

BSBPMG514 Manage Project Cost

Download : 0 | Pages : 10
  • Course Code: BSBFIM501 & BSBPMG514
  • University: Danford College
  • Country: Australia

Answer: Project scope and WBS In order to upgrade the archive website of the company, the project manager is required to develop a project budgetary plan. It is the responsibility of the project manager to complete the project within the estimated budget and allotted time. Budget variance is referred to as the difference between budget and baseline amount of the revenue, expense and the actual amount. In order to upgrade the website, differen...

Read More arrow

VOMP3003 Synthesis Of Acetylsalicylic Acid For Percentage Yield

Download : 0 | Pages : 9
  • Course Code: VOMP3003
  • University: Dublin Institute Of Technology
  • Country: Ireland

Introduction This experiment involves production of aspirin. The major reactants which were used in the experiment include salicylic acid HC7H5O3, and C4H6O3. The reactants reacted in order to produce acetylsalicylic acid or simply aspirin HC9H7O4 and ethanol acid CH3CHOOH. Asprin has several uses such as an analgesic or painkiller, as an anti-pyretic or fever reducer and as thinning of the blood. Balanced equation HC7H5O3 + C4H6O3&nb...

Read More arrow Tags: Australia Melbourne Management Intro. Economic data analysis University of Melbourne 

CHCDIV002 Promote Aboriginal And/Or Torres Strait Islander Cultural Safety

Download : 0 | Pages : 8
  • Course Code: CHCDIV002
  • University: Victoria University
  • Country: Australia

Answer: Assessment instructions Prior to commencing the assessments, your trainer/assessor will explain each assessment task and the terms and conditions relating to the submission of your assessment task. Please consult with your trainer/assessor if you are unsure of any questions. It is important that you understand and adhere to the terms and conditions, and address fully each assessment task. If any assessment task is not fully addressed,...

Read More arrow Tags: Australia Kambah Management University of New South Wales 

K23041 Building Surveying 2

Download : 0 | Pages : 13
  • Course Code: K23041
  • University: De Montfort University
  • Country: United Kingdom

Answer: Introduction BREEAM (Building Research Establishment's Environmental Assessment Method) , this is  the global's primary manageability ranking tool that has resulted primarily to the focus on maintainability in construction strategies, growth and operation. BREEAM currently, is the collective standard which is confidentially adjusted, controlled and linked over a structure of the comprehensive superintendents, appraisers and produ...

Read More arrow

HI5017 Managerial Accounting For Safety And Industrial Products

Download : 0 | Pages : 10
  • Course Code: HI5017
  • University: Holmes Institute
  • Country: Australia

Answer: Introduction:  This report is prepared from the viewpoint of a consultant for dissecting the efficacy of Time-Driven Activity-Based Costing System (TDABC) in organisations. The consultant is employed recently in a consultancy firm, which has a main client, Wesfarmers Limited. It is one of the leading retail companies in Australia competing with Woolworths Limited in the market. The initial part of the report lays stress on descri...

Read More arrow

Save Time & improve Grade

Just share Requriment and get customize Solution.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 4/5

1309 Order Completed

100% Response Time

Gemmie Chen

MSc in Nursing

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

248 Order Completed

100% Response Time

Lloyd Bernabe

MSc in Accounting

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

798 Order Completed

97% Response Time

Benjamin Blakeman

MSc in Medical Technology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

93 Order Completed

100% Response Time

Jackson Mitchell

MiM (Masters in Management) in Supply Chain Management

New Jersey, United States

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

The graph plot was excellent and my course coordinator was happy with it and got it with full marks! Would recommend if someone need help in such way.


User Id: 81161 - 01 Jun 2020


student rating student rating student rating student rating student rating

The expert really did a great job on this discussion question. The professor made remarkable comments. A perfect score was received. Job well-done.


User Id: 330660 - 01 Jun 2020


student rating student rating student rating student rating student rating

Assignment was really good, I like the way everything was mentioned clearly as I wanted in my assignment, over all I am satisfied,


User Id: 288269 - 01 Jun 2020


student rating student rating student rating student rating student rating

Very nice job done by My assignment help. Very satisfying with the timely content they have provided.


User Id: 315673 - 01 Jun 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?