Nobody downloaded yet

Personal Information and Security Threats in Social Networking - Essay Example

Comments (0) Cite this document
The writer of this essay "Personal Information and Security Threats in Social Networking" aims to discuss the privacy concerns in the context of problems reported from MySpace and Facebook which are the most popular sites among hundreds of similar sites.  …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.9% of users find it useful
Personal Information and Security Threats in Social Networking
Read TextPreview

Extract of sample "Personal Information and Security Threats in Social Networking"

Download file to see previous pages Quite recently, an announcement by Facebook to make available the personal information of about 40 million of its members has intensified the concerns over the privacy policies of these sites (Arthur, 2007).
Although members of these sites disclose their personal information voluntarily, the sole responsibility lies with the networking sites to protect this information. However, this is not the case at present and in the subsequent pages, I will discuss the privacy concerns in the context of problems reported from MySpace and the Facebook which are the most popular sites among hundreds of such sites.
Danah Boyd (2006), in her blog, has defined the social networking sites as "a category of websites with profiles, semi-persistent public commentary on the profile, and a traversable publicly articulated social network displayed in relation to the profile". Members of these sites generally create a profile upon registering with a network and may be able to upload one or more pictures as well. This profile may be viewed either by a specifically-designated category of users or by any registered or even unregistered user of the site.
Participants form groups and individual links between users based on their interests, affiliations, and so on. When a new user joins an online social networking site and sets up a profile, he or she can share personal information with others. Therefore, each site has a different privacy policy and various privacy features. Further, online social networking sites offer ways for individuals to differentiate their profiles-like decorating a room-through the use of personalization tools (MySpace profile). Some sites offer a great deal of personalization, while others prefer uniformity across the board.
The main focus of online social networking sites is to bring people together within user-driven, participatory forums, usually targeted toward particular subgroups like college students, activists, pet owners, and so on. Members of these social networks form their online community by creating profiles, or virtual personas, and connecting with others. Thus, the significant characteristic of these sites is to facilitate the formation of social ties, whether strong or weak. Mark Granovetter, in his article "The Strength of Weak Ties" argues that both strong and weak ties are necessary in order to provide individuals with diverse information and to facilitate social networking (Granovetter, 1973). These social networking sites help people share their writing, hold conversations, debate with each other, buy and sell goods, and more.
At present, there are hundreds of online social networking sites available, each with a slightly different look and feel. Some of the more popular sites are MySpace, Facebook, and The sites with the highest numbers of members usually offer an angle to entice users to register, return often, and incorporate the site into their lives.
With the increasing popularity of these sites, privacy-related issues have also been reported widely in the media and on the net.  ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Personal Information and Security Threats in Social Networking Essay”, n.d.)
Personal Information and Security Threats in Social Networking Essay. Retrieved from
(Personal Information and Security Threats in Social Networking Essay)
Personal Information and Security Threats in Social Networking Essay.
“Personal Information and Security Threats in Social Networking Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Personal Information and Security Threats in Social Networking

Threats to Global Security the latter half of the 20th century: ‘It was war in its purest, most personal form.’” (Schaefer, 2009) Thus, in evaluating the definition of “old” wars, it can be stated that on the global or international level, “old” wars operate on the Clausewitzian model of “total war” and mass-mobilization of societies that cause immense amounts of social and economic destruction. On the local level, “old” wars operate as in the Eddie Adam’s photo, the brutality of a man shot in the head, the passion of the scene, the emotions, and desperation are all caught on camera and recorded as a “total history”. In using this understanding to build a conception of “new” wars, these can be seen as “conflicts” that operate...
14 Pages(3500 words)Essay

Common Information Security Threats

...? Common Information Security Threats Introduction The purpose of computers and other network systems is to facilitate information exchange; today, organizations are managed using computer network. This requires respective organizations to implement the use of password and user name; however, such mechanism creates channels for committing computer crimes. Attackers invent ways of hacking passwords, and steal information from different organizations. At the present, organizations face a number of security threats (Whitman, 2003), this paper explores the information...
3 Pages(750 words)Essay

Social Networking and Information Systems

.... Although companies have made significant efforts of securing and maintaining organization privacy, the rate of data loss is high because most social networking sites require one to share information publicly. Too much use of social sites can also contribute to social disorders and this can severely contribute to serious detrimental outcomes. For instance, too much use of social networking sites can contribute to physical or mental illness, which can deteriorate the health of the user. The research study reveals that many teenagers have become highly addictive to social...
10 Pages(2500 words)Research Paper

Social networking and information system

... on their private life activities. Every employee has a personal life that should be respected by the employers until the employee does not breach the ethical guidelines established by the organization. Baldas (2009) argues that with the awareness that the information about private life has been accessible to the employer over the social networking website, an employee can put this forth as a reason against any adverse decision made by the employer later. For example, an employer may find out over Facebook that a certain employee is a member of a group that works for the protection of gay rights. Such employees can claim that they have been dismissed unfairly on sexual grounds if the employer resolves to terminate them... ...
5 Pages(1250 words)Essay

Security: Threats and Security Analysis

...?Is Nuclear Disarmament Desirable and Feasible? Introduction When the Cold War was about to culminate, the world powers proclaimed a seemingly desirable, but somewhat impossible, vision—a world completely free from the threats of nuclear weapons. The value or purpose of nuclear weapons is rooted in global politics. Nuclear disarmament demands a collaborative model of international security. Cooperation between the power blocs is very important, as well as regional cooperation. Disarmament efforts should deal with the interests of developing nations and to the expectations, cynicism, and uncertainties of countries across the globe. To be successful, such efforts must be in harmony with continuing power...
10 Pages(2500 words)Essay

Security Threats in Louisiana be prepared to address risks of a potential terrorist attack, shopping malls, like the Mall of Louisiana, should implement the following security measures: (1) conduct vulnerability assessments and develop emergency response plans; (2) guarding public access to ventilation systems and employee areas; (3) undertake surveillance techniques inside malls and in parking lots that can make security guards and CCTV cameras more visible to shoppers; (4) large or multiple-floor malls designate a floor captain on each level or wing of a complex where ach designee can serve as a point-of-contact during emergency situations; (5) front-line security officers be informed about any...
1 Pages(250 words)Term Paper

IT security threats

...IT security threats Affiliation: Discuss global IT security threats and potentialsolutions One of the threats to IT according to CERT (Computer Emergency Response Team) program is the insider threat (from employees, contractors or even business partners) since they are in a better position to access the information system of the organization without detection ( The solutions to this are to enforce strict passwords and having account management practices as well as policies, responding quickly to suspicious and or disruptive behavior and especially on the information technology systems, enforcing stringent security access and controls and has less privileged access to users of the sensitive information systems... ...
1 Pages(250 words)Research Paper

Security Threats and Defenses

...Security threats and defenses Role of information system security The term social security in the context of organization is defined as the act in which, employees of an organization are manipulated by outsiders to rely key and confidential information details regarding an organization (Hadnagy, 2011). This information is sort by ill intentioned people for purposes of hacking computer systems or committing fraud. Social engineering is the newest form of crime in organizations and involves manipulation of the mind in hidden ways (Hadnagy, 2011). The successful operation of any organization...
2 Pages(500 words)Essay

Security Threats and Defenses

...Security Threats and Defenses Need for security measures. Social engineering has caught on among many professionals. The techniques in use are based on cognitive biases, which are attributes of man decision making. Social engineers are aiming at exploiting these biases by creating attack techniques. Consequently, every company is at a risk of being attack by one of the many techniques in use. Preparing employees to recognize and respond to social engineering techniques will at help to protect the company in many ways, which include: 1. Use strong passwords. By using strong passwords in the computer network, they will protect the company from against unauthorized access to company’s confidential information and identity theft. 2... ...
1 Pages(250 words)Essay

Social Networking & Security: Facebook

...Networks?, 2008). The above statistics clearly underline the value and popularity of social networks in the current world. At the same time, social networks have raised many challenges also. Like many other revolutionary products or inventions, social networks are also facing security and misuse related problems. The information exchanged through social networks is not safe and anybody can misuse it for personal gains. This paper reviews the literature available to learn more about the security related...
10 Pages(2500 words)Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Personal Information and Security Threats in Social Networking for FREE!

Contact Us