Dangers and privacy violations of social networking Essay examples
Submitted By thisseever32
Words: 840
Pages: 4
The crazy created frenzy for Facebook all started in 2004. While it only started out to be a social network for one specific college, it wouldn’t be long until it spread like wildfire across the globe. Facebook allows us to keep in contact with friends and family who are near and far by sharing memories, photos, and even videos. While social network sites allow for exciting new forms of communication, they also open new avenues for privacy violations and other social dangers.
One of the most alarming privacy violations that social media exposes users to is cyberstalking. According to Wikipedia,
Cyberstalking is a form of cyberbullying, and the terms are often used interchangeably in the media. Both may include false accusations, defamation, slander, and libel. Cyberstalking may also include monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering information that may be used to threaten or harass. Cyberstalking is often accompanied by realtime or offline stalking. Both are criminal offenses.
Cyberstalkers often find their victims online using online forums, discussion boards, chat rooms, and more recently and popular, through social network sites such as Facebook. Since cyberstalking is a form of cyberbullying, the impacts it can have on its victims is extremely harsh. Before technology, there were playground bullies. Names to go with faces. Since Facebook and other social media websites, bullies and stalkers remain faceless and cause far more harm. Another avenue is location disclosure. When going on vacation to Florida or out of the country, it is not a good idea to disclose this type of information on social media as it allows even the people you don’t want to know, to know. In his essay “Privacy Is Overrated,” David Plotz comments that “To be less private sometimes is to have more privacy. To be less private is to be more ourselves” (70). His expression is simply explaining that by surrendering some privacy while revealing our humanity, a much greater privacy is gained. Catfishing is probably the most popular social danger in social networking. According to the University of the Pacific,
Coined from the independent film "Catfish," which follows a filmmaker who discovers the truth about the online relationship he has been conducting with a woman whom he has never met, "catfishing" occurs when a user creates a false or highly-exaggerated social media profile for the purposes of conducting a relationship online. Some profiles are created out of boredom or loneliness, while others are created to exact revenge or cause embarrassment to the targeted party.
The most common indicators of catfishing are constant excuses for not being able to talk on the phone, meet in person, or use another social media website such as Skype to video call. Usually, once the relationship becomes too intense, the catfish will often have a sudden life-threatening illness or if faced with other threats, the catfish will end the relationship. This has caused extreme heartbreak for a lot of users, especially when it comes to online dating sites such as Plenty of Fish, or Match.com. These sites give people the perfect opportunity to have an online relationship. Social networking sites have also impacted schooling and employment. While most interview preparation used to only consist of updating a resume, ironing a professional outfit, and rehearsals, it is probably a good idea to either clean up
Related Documents: Dangers and privacy violations of social networking Essay examples
people then concern more about their privacy on the Internet. “Privacy isn’t just about hiding things. It’s about self-possession, autonomy and integrity. It’s the right of people to control what details about their lives stay inside their own houses and what leaks to the outside” (Garfinkel). Most of the consumers recognize that their privacy is at risk and are hoping to have more privacy protection measures. While considering to impose more Internet privacy protection laws and allow government…
Assignment 2 – Critical Infrastructure Protection Saifullah Al Jalil Aman CIS502 Professor – Dr. Constance Blanson November 14, 2014 The Department of Homeland Security has a basic mission to protect the United States of America from the numerous dangers that it confronts. This requires the commitment of over 240,000 workers in employments that run from aviation as well as outskirt security to emergency reaction, from cybersecurity investigator to chemical facility auditor. The obligations of the…
Towson University, 8000 York Road, Towson, MD 21252, U.S.A. University of Hartford, 200 Bloomfield Avenue, West Hartford, CT 06117, U.S.A. KEYWORDS Social networking; Facebook; Recruiting; Selection Abstract Social networking sites, such as Facebook, have exploded on to the cultural and business landscape. Not only can firms use social networking sites to present organizational information to interested parties, but also perhaps gather information regarding job applicants. As an employer,…
Highlights from our reports BY LEE RAINIE AND JANNA ANDERSON4 COMMENTS This year marked the 25th anniversary of the creation of the internet, making it a good time to look at how the internet had changed lives and what opportunities, challenges and dangers the coming years might bring. To do that, the Pew Research Center and Elon University’s Imagining the Internet Center posed a battery of questions to nearly 3,000 internet experts and scholars, centering on where things would stand by the year 2025…
CONTENTS: CASE STUDIES CASE STUDY 1 Midsouth Chamber of Commerce (A): The Role of the Operating Manager in Information Systems CASE STUDY I-1 IMT Custom Machine Company, Inc.: Selection of an Information Technology Platform CASE STUDY I-2 VoIP2.biz, Inc.: Deciding on the Next Steps for a VoIP Supplier CASE STUDY I-3 The VoIP Adoption at Butler University CASE STUDY I-4 Supporting Mobile Health Clinics: The Children’s Health Fund of New York City CASE STUDY I-5…
Business and Magazine Journalism (combination of Niche I and II) 1 Growing importance of business journalism, a brief history (2) 2 The structure of financial management in the country starting with the Finance Minister, (5) rest of the bureaucracy, RBI governor, Planning Commission, SEBI, Banking sector 3 The Budget preparation and presentation, factors influencing the annual budget, role of (5) subsidies and foreign exchange reserves 4 Companies, balance sheets, AGMs window dressing…