StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Top 5 internet privacy myths about social media debunked - Term Paper Example

Cite this document
Summary
With increased developments in the technology sector, many people from different parts of the world are becoming more involved in online communication through various social media websites. Despite the fact that social media expose information to the public domain, many people…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
Top 5 internet privacy myths about social media debunked
Read Text Preview

Extract of sample "Top 5 internet privacy myths about social media debunked"

Internet Privacy Myths about Social Media Debunked With increased developments in the technology sector, many people from different parts of the world are becoming more involved in online communication through various social media websites. Despite the fact that social media expose information to the public domain, many people utilizing different social media websites insist that they reserve the right to remain anonymous when communicating online. However, this myth does not provide any significant positive support in operation of social media websites.

On this basis, this essay will discuss on the importance of proper and truthful identification when using online social networks. To start with, several online social networks prompt the users to provide truthful information about their identity. For example, Facebook, which currently the most popularly used social network website in the world, allows users to provide detailed information concerning who they are on the profile page. Despite this requirement, Facebook has attracted a large number of users meaning that many people do not mind sharing such personal information.

However, there have been several cases where social network users provide false information concerning their identity, something that has not been positively received by other social network users. Of more significance, truthful identification of social network users is beneficial to the webhost companies. Despite the fact that different social network websites provide varying privacy levels to their users, many of these social companies encourage their clients to provide truthful information concerning themselves to the level they can be comfortable with.

For example, when using facebook, one can opt not to fill the entire information requested for in the profile page. By encouraging members of social networks to provide truthful information, webhost companies have been able to effectively manage the modes of conduct of members in their social network websites. This is because people tend to portray a positive image to the public when they can be easily identified by others. Additionally, proper and truthful identification in social networking websites has been backed by various legislations that seek to protect the public from harmful activities carried out in social networks.

In most cases, people with malicious intentions like to disguise their identity to the public in order to reduce their chances of being identified easily. For example, people with false identification in online social networking sites do not find it hard to victimize other online users because of the protection offered by their fake identities. Other malicious online activities include stalking, sexual abuse and identity theft. As a result, various governments have set laws to prevent such online activities from taking place.

For instance, the Computer Fraud and Abuse Act enacted in the U.S seeks to prevent unauthorized use of online information by people who carry out such activities intentionally (Cornell University Law School 1). In conclusion, it is important for members of social networking websites to provide truthful information for their identity. This is because proper identification encourages people to be responsible for their online activities hence reducing the incidences of online malicious activities.

From the above discussion, it can be noted that proper and truthful identification not only encourages personal responsibility among social network users but also facilitates effective performance of webhost companies. In addition, it is evident that a large number of members in social networks with fake identities do not find it hard to commit online associated offenses because they cannot be easily traced. As a result, legislations have been enacted to protect the public from online activities with malicious intentions.

Works CitedCornell University Law School. 18 U.S. Code § 1030 - Fraud and Related Activity In Connection With Computers. n.d. Web. 13 Jun. 2014. < http://www.law.cornell.edu/uscode/text/18/1030 >.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Top 5 internet privacy myths about social media debunked Term Paper”, n.d.)
Top 5 internet privacy myths about social media debunked Term Paper. Retrieved from https://studentshare.org/business/1649824-top-5-internet-privacy-myths-about-social-media-debunked
(Top 5 Internet Privacy Myths about Social Media Debunked Term Paper)
Top 5 Internet Privacy Myths about Social Media Debunked Term Paper. https://studentshare.org/business/1649824-top-5-internet-privacy-myths-about-social-media-debunked.
“Top 5 Internet Privacy Myths about Social Media Debunked Term Paper”, n.d. https://studentshare.org/business/1649824-top-5-internet-privacy-myths-about-social-media-debunked.
  • Cited: 0 times

CHECK THESE SAMPLES OF Top 5 internet privacy myths about social media debunked

Internet Privacy

In the essay “internet privacy” the author looks at the ability to protect private information over the Internet.... On one hand, users have an appalling lack of awareness about what information is tracked and stored and on the other hand, complete monitoring tools exist on many Websites.... Cronin points out that if customers did know about the long-term storage of the information they gave, 'they would think carefully about balancing the value of resources they receive' against the value of the information they disclose (Cronin, 4)....
2 Pages (500 words) Essay

Crime and Punishment

The origin of these myths is from the media and vested groups who seek political mileage from spreading myths; community leaders reinforce them and law enforcement agencies who believe that crime needs to be punished, or criminal minds need to be corrected and modified to suit social and environmental requirements.... A social construct could be said to be a social framework, categorization or grouping that envisages viewing of an individual, group or idea in terms of social or culture constructions....
4 Pages (1000 words) Essay

Features of Scientific Models and Religious Myths

Thus, the debate about science and religion has a history that dates back to the beginning of modern science.... This essay describes the features of scientific models and religious myths.... hellip; It is the comparison between scientific models and religious myths, which is the concern of this discussion.... It is the comparison between scientific models and religious myths, which is the concern of this discussion....
7 Pages (1750 words) Essay

Annotated Bibliography: Myths about Seasonal Influenza Vaccine

This paper analyses articles about myths about the seasonal influenza vaccine.... Annotated Bibliography: myths about Seasonal Influenza Vaccine Centers for Disease Control and Prevention.... It itemized nine myths about influenza and gave corresponding facts on this misinformation.... The site provided critical, relevant, and updated information about the disease, the viruses, symptoms and severity, and how the flu spreads, among others....
2 Pages (500 words) Essay

Privacy and Social Media

The original intention of social media was an opportunity to open the internet for communication, sharing pictures, and relating with friends and family in new technological ways.... Once The original intention of social media was an opportunity to open the internet for communication, sharing pictures, and relating with friends and family in new technological ways.... Anderson, 2010) Lastly, law enforcement is effected by social media and its popularity with the young and unaware; internet sexual predators being the greatest threat....
1 Pages (250 words) Assignment

Internet and Social Networking Privacy

However, most social networking sites ensure that third parties do not access and exploit users' personal information for criminal or commercial purposes.... social networking sites adhere to their privacy policy, which highly stresses on the important nature of a user's… social networking sites have gone to the extent of ensuring privacy policy by registering with independent privacy firms that maintain privacy policies and offer certificates of privacy assurance (Barras 1). As much, as users disclose personal information and do Internet and social Networking Privacy Privacy under any circumstance is an issue, which individuals would never liketo lose....
1 Pages (250 words) Essay

1-5 Myths of Capitalism

The second myth is also one myths of Capitalism Personal Post The speaker, Jeff Miron, has an interesting take on capitalism and common myths that are associated with capitalism.... orks CitedTop Three Common myths of Capitalism.... The first myth is eye opening as most people generally believe that capitalism is bets for businesses....
1 Pages (250 words) Book Report/Review

Definition of Internet Privacy

Due to the rise of social media and the hefty numbers involved, users are quick to voice their concerns about shortcomings of a product or service online.... It is therefore paramount that business entities do not get on the wrong side of the internet community especially social media users.... The solution to the upsurge of consumer power is for companies to have a reliable and efficient online presence in social media sites such as Facebook, Google+, Twitter and social networks....
1 Pages (250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us