StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

How Secure Are Teenage Users from the Negative Effects of Social Media In The United States - Essay Example

Summary
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.1% of users find it useful

Extract of sample "How Secure Are Teenage Users from the Negative Effects of Social Media In The United States"

HOW SECURE ARE TEENAGE USERS FROM THE NEGATIVE EFFECTS OF SOCIAL MEDIA IN THE UNITED STATES? NAME: INSTITUTION: INSTRUCTOR: DATE: Abstract Use of social media has developed, morphed and eventually become a norm among the younger generation. This is the interaction among people in online groups and networks in which they create, share or exchange information and ideas. However, this rapid adaptation to the usage of social media has not been an all rosy affair. There are some negative effects meted by social media. This paper, therefore, tries to analyze these effects. The attempt is to show that teenage users are not very secure from the negative effects of social media. The final suggestion of this paper is that teenagers and the general users of social media exercise responsibility and utmost caution when using it. Introduction Social media usage is a practice that has been taken up by all and sundry. It is the order of the day seeing young people tweeting on their mobile phones and PCs all day. Other social media platforms apart from Twitter include Facebook, Youtube and Instagram. These are avenues where users freely air out their opinions, experiences and feelings about certain subjects. Some people use social media as a lieu for business. Here, business ideas are generated, shared and eventually executed. Various organizations have also taken to social media to market their products and services (Clark, 2010 p.1). This is because of the large following that social media commands. Ideally, these are the highly interactive platforms that could also serve as gateways to personal communication and learning experiences. There is, however, the negative side of social media. This is more generally the detrimental impact that social media can have on its users. Teenagers, who are the principle users of social media, are particular susceptible to these effects. Such ills that take place on social media include violation of one’s privacy, cyber bullying and theft of data. This essay will put such social media vices into perspective. It will then suggest ways to avoid falling into such traps and the role of each stakeholder in eliminating these menacing threats posed by the social media. Definition Social media has been defined as the interaction among individuals on online communities and networks. This interaction involves creation, sharing and exchange of information among individuals who created the network. Social media cannot function without the internet. Basically, social media is dependent on mobile and web-based technology. It is by use of the internet that people can share, create together, discuss and modify information and content. This definition of social media, therefore, explains the long hours and time spent young people on social media. A research by Nielson Media Research (NMR) group showed an increase of the total time spent on social media by 37% from July 2011 to July 2012 (NMR, 2012). The research was conducted only in the United States. This shows a tremendous increase in the social media fan base. Furthermore, it is expected that these figures will continue progressing as technology advances and reaches the more marginalized regions of the world. Invasion of Privacy Digital Information Technology has raised growing concerns over privacy. Technology bears a potentially disruptive power that threatens the social and political lives of individuals (Nissenbaum, 2010 p.149). With the advancing technology, privacy is threatened at its best. Social media arising from contemporary technology has been developed to a capacity that can track people, analyze and even disseminate private information. This endangers one’s privacy. Nissenbaum (2010, p.149) raises her concern over the fact individuals’ rights to control their own information are being violated in a very disturbing manner. The flow of personal information is no longer monitored closely. It is common to find people sharing all manner of personal details about their lives on social networking sites (Madden, 2012 p.1). People publicize their physical locations, photos of their children, intimate accounts of personal struggles and triumphs. This is the extent to which reasonable expectation of privacy has been abandoned. Madden goes further to lament about how social media can be used to quite easily track peoples’ digital footprints and physical whereabouts. In order to protect your anonymity online, it takes a great deal of effort. This level of invasion of individual’s privacy through social media provides a very great insight into the extent to which its teenage users are not secure. If there location can be easily traced and personal details accessed, then their privacy and ultimately security is really jeopardized (Nissenbaum, 2010 p. 149). Cyber bullying Another worrying trend that is being taken by users of social media is that of cyber bullying. Cyber bullying is an incident where some individuals use Information Technology, especially that relating to social media, to harass or harm other people (Youn & Kimberly, 2008 p.763). The worst thing is that these kinds of actions are normally deliberate and done repeatedly. The perpetrators of cyber bullying obtain some private information about an individual and use it as an object of torture and blackmail. Youn and Kimberly, (2008 p.763) report that women appear to be more apprehensive about unsolicited emails and secondary use of their private information. This could be because perpetrators of cyber bullying target women who may be less protective of themselves like their male counterparts. Cyber bullying then involves putting rumors and gossips on social media about that individual with a motive of defaming or humiliating them. Moreover, the insecurity to which these teenage social media users are exposed to is heightened by the fact that criminal prosecution for defamation is rare as to be almost known in the United States (Katrin & Carson 2013, p.36). Katrin and Carson continue to affirm that defamation covers a thing written or oral that is untrue and harmful to the subject’s reputation (Katrin & Carson 2013, p.38). This is exactly what drives cyber bullies. It is the harm of another person’s reputation and stature that gives them the impetus to harass and blackmail more people. This kind of social media practice really puts at risk its users’ security. Data theft Usage of social media for data theft mostly relates to workplace concerns. Elefant (2011 p.1) relates data theft to employees abusing social media and appropriate discipline to copyright and IP protection. Data theft may involve copying and/or deleting part of the confidential and copyrighted information for a company (Elefant, 2011 p.1). Some employees may also choose to intentionally misuse the information. Data theft may also involve hacking into private files. This would be criminal because it is a form of wire tapping, and a civil invasion of privacy (Katrin & Carson, p.39). Data theft could go to an extent of theft of funds, customer data and intellectual property. This really places the organization at high risk. As more businesses try to market their products, services and disseminate information online, this could be creating an opportunity for data thieves and other social media offenders. Teenage users of social media are faced with the problem of e-marketers’ aggressive information practices. When data about an organization has been stolen, it may then be used to send fake emails regarding the organization’s products or services with the aim of getting some return benefits. Social media teenage users are therefore placed at risk of accepting such information as genuine. This really compromises their security. Conclusion In conclusion, social media insecurity has developed to more complex and wide-spread aspects and malicious activities. Katrin and Carson (2013, p.40) therefore call on the various states to pass legislations that protect users of social media especially teenagers from these numerous insecurities. The teenagers in the United States are also called upon to exercise utmost caution and responsibility while using the social media. Dissemination of private information should be very solicited and uncompromised. This will bring sanity, albeit little, on the social media platforms. Ultimately, the security of teenage users of social media in the United States will be enhanced. References Clark, J. (2010). Social Media and Privacy. Air Medical Journal. Retrieved on 29 April 2014from http://www.airmedicaljournal.com/article/S1067-991X(10)00063-5/abstract Elefant, C. (2011). The Power of Social Media: Legal Issues & Best Practices for Utilities Engaging Social Media. Energy Law Journal. 32 (1) .Retrieved on 29 April 2014 from http://web.a.ebscohost.com/ehost/pdfviewer/pdfviewer?sid=f2c6234c-b592-48db-8388-c673cc017351%40sessionmgr4005&vid=1&hid=4101 Katrin, C. & Carson H. (2013) .Can the law Keep Up with Brave New world Of Social Media?: A Look At Privacy in the United States and Europe, the Journal of global Business Management , 9 (3), .Retrieved from http://www.jgbm.org/page/5%20Katrin%20Varner.pdf Madden, M. (2012) .Privacy Management on Social Media Sites, Pew Research Centre. Retrieved on 29 April 2014 from http://www.pewinternet.org/2012/02/24/privacy-management-on-social-media-sites Nielsen Media Research (NMR) (2012). The Social Media Report 2012. Retrieved on 29 April 2014 from http://www.nielsen.com/state-of -the-media-the-social-media-report-2012 Nissenbaum, H. (2010). Privacy in Context: Technology, Policy, and the Integrity of Social Life. Journal of Information Policy. 1, 149 – 151. Retrieved on 29 April 2014 from http://www.jip.vmhost.psu.edu/ojs/inde.php/jp/17 Youn, S. & Hall, K. (2008). Gender and Online Privacy among Teens: Risk Perception, Privacy Concerns and Protection Behaviors. Cyber psychology & Behavior. 11(6), 763-765. doi:10.1089/cpb.2007.0240. Retrieved on 29 April 2014 from http://www.ncbi.nlm.nih.gov Read More
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us