Free

Top 5 internet privacy myths about social media debunked - Term Paper Example

Comments (0) Cite this document
Summary
With increased developments in the technology sector, many people from different parts of the world are becoming more involved in online communication through various social media websites. Despite the fact that social media expose information to the public domain, many people…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Top 5 internet privacy myths about social media debunked
Read TextPreview

Extract of sample "Top 5 internet privacy myths about social media debunked"

Internet Privacy Myths about Social Media Debunked With increased developments in the technology sector, many people from different parts of the world are becoming more involved in online communication through various social media websites. Despite the fact that social media expose information to the public domain, many people utilizing different social media websites insist that they reserve the right to remain anonymous when communicating online. However, this myth does not provide any significant positive support in operation of social media websites. On this basis, this essay will discuss on the importance of proper and truthful identification when using online social networks.
To start with, several online social networks prompt the users to provide truthful information about their identity. For example, Facebook, which currently the most popularly used social network website in the world, allows users to provide detailed information concerning who they are on the profile page. Despite this requirement, Facebook has attracted a large number of users meaning that many people do not mind sharing such personal information. However, there have been several cases where social network users provide false information concerning their identity, something that has not been positively received by other social network users.
Of more significance, truthful identification of social network users is beneficial to the webhost companies. Despite the fact that different social network websites provide varying privacy levels to their users, many of these social companies encourage their clients to provide truthful information concerning themselves to the level they can be comfortable with. For example, when using facebook, one can opt not to fill the entire information requested for in the profile page. By encouraging members of social networks to provide truthful information, webhost companies have been able to effectively manage the modes of conduct of members in their social network websites. This is because people tend to portray a positive image to the public when they can be easily identified by others.
Additionally, proper and truthful identification in social networking websites has been backed by various legislations that seek to protect the public from harmful activities carried out in social networks. In most cases, people with malicious intentions like to disguise their identity to the public in order to reduce their chances of being identified easily. For example, people with false identification in online social networking sites do not find it hard to victimize other online users because of the protection offered by their fake identities. Other malicious online activities include stalking, sexual abuse and identity theft. As a result, various governments have set laws to prevent such online activities from taking place. For instance, the Computer Fraud and Abuse Act enacted in the U.S seeks to prevent unauthorized use of online information by people who carry out such activities intentionally (Cornell University Law School 1).
In conclusion, it is important for members of social networking websites to provide truthful information for their identity. This is because proper identification encourages people to be responsible for their online activities hence reducing the incidences of online malicious activities. From the above discussion, it can be noted that proper and truthful identification not only encourages personal responsibility among social network users but also facilitates effective performance of webhost companies. In addition, it is evident that a large number of members in social networks with fake identities do not find it hard to commit online associated offenses because they cannot be easily traced. As a result, legislations have been enacted to protect the public from online activities with malicious intentions.
Works Cited
Cornell University Law School. 18 U.S. Code § 1030 - Fraud and Related Activity In Connection With Computers. n.d. Web. 13 Jun. 2014. < http://www.law.cornell.edu/uscode/text/18/1030 >. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Top 5 internet privacy myths about social media debunked Term Paper”, n.d.)
Top 5 internet privacy myths about social media debunked Term Paper. Retrieved from https://studentshare.org/business/1649824-top-5-internet-privacy-myths-about-social-media-debunked
(Top 5 Internet Privacy Myths about Social Media Debunked Term Paper)
Top 5 Internet Privacy Myths about Social Media Debunked Term Paper. https://studentshare.org/business/1649824-top-5-internet-privacy-myths-about-social-media-debunked.
“Top 5 Internet Privacy Myths about Social Media Debunked Term Paper”, n.d. https://studentshare.org/business/1649824-top-5-internet-privacy-myths-about-social-media-debunked.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Top 5 internet privacy myths about social media debunked

Internet and social media

...?Social media and personal identity: Internet means much more than a source of information and exchange of emails to a lot of people in the contemporary age. In fact, some people feel more convenient to socialize with their friends and peers through social media than face to face. I know a friend of mine, since childhood who used to remain very quiet in the classroom until few years ago. His name is John. He used to speak very rarely, and did not participate in group discussions. He remained silent and kept observing others. I seldom saw him speak in gatherings. I always found him more defensive than expressive in his speech. He could not...
2 Pages(500 words)Article

Internet Privacy

...every activity performed. Usually this information is used for marketing purposes but more often than not this information goes to a database that has no right to store personal data. The basis of internet was a free agency, where everyone has access to all the information in the world. One would think that on the basis of what internet was formed it is against ethics to be constantly monitored. Nowadays it is the burgeoning social media that causes more problems, not every one is aware that all the profiles that they make online, all the images uploaded are eventually liable to be stored. Internet privacy provides a person with the...
8 Pages(2000 words)Research Paper

Internet and Social Networking Privacy

...The Number 14 June Does Internet Privacy Exist? At the time when the Internet served as a storage place of static information, major risks were associated with access to downloaded information. With the Web 2.0 advancement, the primary focus has been on interactive use of “social software”, which involves users into sharing information with one another (Fraser 1). Respectively, the risk associated with Web 2.0 use, first of all, includes hostile access to users’ personalized data with the aim to manipulate the obtained information. In other words, privacy concerns have multiplied in the recent years, so that a commonly held view has evolved that...
4 Pages(1000 words)Essay

Privacy and Social Media

...The original intention of social media was an opportunity to open the internet for communication, sharing pictures, and relating with friends and family in new technological ways. However, although, it has many positive elements, there are a few aspects that can be extremely negative as well. Privacy has, for the most part, been completely compromised. Even with privacy settings it is still possible for your personal information to end up on the internet. Today, what you say, when you say it, and where you were when you were saying it can be seen. Once something is on the internet it is on the internet...
1 Pages(250 words)Assignment

Internet and Social networking Privacy

...The Number 28 June Internet and Social Networking Privacy While privacy concerns is one of the most troubling issues for users of social networking sites today, this problem has been largely underresearched. Social networking sites are online communities that connect people through the Internet and Web 2.0.Facebook, MySpace, Tribe, the Classmates are just a few online social networking sites that attract thousands of people ever day worldwide. Whatever their real purpose, they enable users to upload lots of personal images, exchange messages, chat in chat rooms online, and actively share photos and...
6 Pages(1500 words)Essay

Internet and Social Networking Privacy

...Internet and Social Networking Privacy Privacy under any circumstance is an issue, which individuals would never liketo lose. Social networking sites strive to maintain user privacy by adhering to company privacy policies. Counter-Arguments However, most social networking sites ensure that third parties do not access and exploit users’ personal information for criminal or commercial purposes. Social networking sites adhere to their privacy policy, which highly stresses on the important nature of a user’s privacy (Barras 1). Social...
1 Pages(250 words)Essay

How social media/internet (facebook/twitter) violates privacy

...resource of establishing the challenges brought about by the social media within the context of communication. The arguments explored in this book are consistent with the views and opinions expressed by Respondent B on the matter of communication freedom. From this perspective, it might be necessary to appraise the value of the book in terms of its usefulness in establishing certain positions of fact as understood from the point of view of the study. It is necessary to consider the fact that the fundamental issues on communication have been captured from the ethical, legal, and moral dimensions. Leah, Yamshon. Mobile Apps Can Compromise Your Privacy. PC World. 2010. 28...
5 Pages(1250 words)Annotated Bibliography

Privacy of Social Media

...analysis. Publication: this is a publication of the social media privacy from Stanford Technology Law Review. The publication is a recent publication which is valid and up to date The Writing: the publication contains 8 myths about social sites. The myths are actual the rights to the consumer who uses the social sites. This article is an educative article drawing its teachings from the law about social privacy in the media. The Use: This article will be useful to me when making an introduction about my research. It will...
3 Pages(750 words)Annotated Bibliography

Privacy of social media

...number Synthesis paper on the privacy of social media The advent of technology has brought about numerous changes with regard to information sharing and collaboration through the participation on the internet. Many of the people on most social media sites such as MySpace and Facebook have used them to create popularity for themselves. This is because they have used these platforms to share their individual information on the internet. For instance, there have been moments where people post their photos as well as those of their family members and friends. Though social...
5 Pages(1250 words)Admission/Application Essay

Internet privacy

...INTERNET PRIVACY Introduction Internet privacy is a growing concern in modern society with the proliferation of social media platforms. Although people acknowledge that whatever they post on these sites may be public, many do not know that user information is also becoming easily accessible to others. Overtime, the social media platforms have made more changes to their privacy policies making this important information accessible for companies so they can use it for their own purposes. Public awareness is continually being made on matters such as cyber security, hackers, viruses, firewalls and Trojan horses in order to protect the public from unwanted exposure of private information. People are encouraged to ensure timely update... of their...
3 Pages(750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Term Paper on topic Top 5 internet privacy myths about social media debunked for FREE!

Contact Us