Social Media Paper
Jennifer Schaedler
HUM/186
University of Phoenix
August 28, 2017
Social Media Paper
Easily Obtainable Information
In the age of cutting edge technology such as the world in which we live, easily obtainable information has turned out to be a mainstay in society. The days of instant-gratification are upon us and waiting for any length of time since the advent of the Internet has become unacceptable in the technological arena. Because information is so easily available, this gives pause to security and privacy of personal identifiable information. With headlines screaming Identity Theft the disadvantages are clear. No longer can users post whatever they are thinking, doing, wearing, etc. without the profound knowledge that each post is forever solidified forever on the World Wide Web for anyone with an Internet connection to access. Those with less technological knowledge have yet to grasp this concept and this unfortunately has caused harm to their personal lives and professional careers, in some cases.
Advantages of Easily Obtainable Information
One point of preference of adequately realistic data is practicality. It is advantageous for individuals to be in one place and catch the most blazing news, listen to the crisp top melodies on the announcement diagrams, watch and share the music recordings to those tunes, while in the meantime holding discussions through talk with various companions in a flash. It is simpler than perusing an entire
In the modern world people operate their businesses and practically live their lives through the Internet, the use of social media, and easily obtainable information. Although easy access to nearly everything and everyone has many advantages, there are plenty disadvantages that accompany social media and easily obtainable information. If the world only knew how becoming aware of the rewards and drawbacks of social media and the ability to access information with ease people may change how they practice and consume it, especially when understanding the need to further question the reliability of their sources. It is important to understand the advantages,
According to an online source regarding internet fraud, “tax identification numbers, Social Security numbers, driver’s license information, fingerprints, and similar private and confidential information are now more accessible than ever before” (Saunders). Identity theft is a matter of the lack of security that technology provides and the failure of people to use it safely. With social media at its peak, outsiders can stalk unsecured profiles online and know complete biographies in minutes. An estimated 40,000 people in the United States fall victim to crimes like identity theft every year (Saunders). This high number is most likely due to the lack of precautionary measures taken by people when using technology and the failure of the government to prevent such crimes.
These days social media sites such as Facebook, Twitter, and Instagram have become an essential part of our daily lives in America. It is through media sources such as these that have enabled communication among people on a global scale along with uniting people with similar interests and ideas together in a positive manner. According to statistics from the Pew Research Center, around seven in ten Americans use some type of social media (Pew Research). The development of mobile devices has played a significant role in the widespread development of social media by facilitating the access to these sites. Today the use of social media is for purposes of
Although technology has provided tools to enhance our capabilities in things such as finding a missing person, solving murder cases based on technological assets etc.., this technology also leaves us vulnerable in many ways to slowly losing our privacy (Burten, C., 2012).
"We collect the content and other information you provide when you use our Services, including when you sign up for an account, create or share, and message or communicate with others” (Hachman). Each day people live with a false security that they are protected and maintain a sense of privacy. Citizens misplace their trust in social media and technology, and divulge their personal information in ignorance of the repercussions that may arise. Users say the advances in technology and social media will not affect their privacy; however, it is proven that these advances can be a harbinger of both danger and discontent.
Bill Keller in “The twitter trap” published in The New york Times (18 May 2011) notes that he felt as though he had poisoned his daughter by allowing her onto Facebook. He equates it to giving a drug and sees it as eroding a youth’s intellect or skills development memory skills, math skills, penmanship, innate sense of direction, attention span, problem solving and decision making abilities. Given his daily job, he is well aware of the global appreciation for the internet. However, what are the costs, the personal costs? Recently, the advancement of technology has started to accumulate some controversy.
In today’s world, many Internet users visit websites in which require the use of personal data, such as online banking sites, Paypal accounts, the Internal Revenue Service, Facebook accounts, as
It is quite cheap and fairly easy to accumulate thorough information about people because of the advances in computer technology. This can prove to be beneficial for law enforcement looking to track down criminals; prevention of fraud within banks, and consumers becoming more educated about new products and services. However, this also creates opportunity for misuse of such information.
Throughout time, privacy and security have been two heavily debated topics. There has always been a struggle to find middle ground between a private environment and a secure environment, but the dawn of technology and the Internet has made this struggle even more difficult. The Internet has drastically decreased the expectation of privacy of any and all individuals that have ever used it. Technology in general can pose a threat to an individual’s physical and virtual security. The Internet has also brought forth a sense of anonymity to those looking to conceal their true identities, some of which plan to commit horrific crimes. Privacy and security go hand in hand, however security is by far the most important.
Information gathering, through networking, social media, and both on and offline storage have made it easier to collect information about an individual than ever before, with many concerns having arisen over the years about privacy and the ability to protect that privacy. As debates over personally identifiable information continue, one cornerstone remains a constant, ethics. Ethics are defined as “the standard by which human actions can be judged right and wrong (Online, 2012)”, but even that can be debated when discussed within the realm of information technology. Have you ever been to an internet shopping site and “trusted” the secure connection? Essentially, you are entrusting an inanimate system developed by an individual or group
With the advent of mobile phones, iPad and other smart technology, accessing information across the web has become very easy. You can sit at home and pay your phone bills, or talk to someone from across the world. Along with these benefits, it has also become easier to get access to information that would otherwise be restricted. In recent years, debates have taken place regarding the concern of the privacy of information that is uploaded on the internet, or that is taken from it. This research paper aims at comparing the controversies that surround the concept of privacy in the digital age.
Internet privacy is the security of a user’s personal data that is stored or published on the internet. The internet is an important part of every individual’s daily life. In today’s society, the internet is used by many different people for many reasons. It can be used for research, communication, and purchasing items. Without the internet, many things that are completed during the course of a day would be impossible or take time to complete. As people use the internet, everything is stored in a database that tracks and keeps any personal information that is entered by users. As users continue to use the internet to complete important tasks such as purchasing items and paying bills, their privacy and security become at risk. Although the internet can be seen to have a positive impact on society, it does have a negative impact. Since the internet can be accessed by anybody it can cause a lot of damage. Examples of internet risk include identity thieves, phasing, and scams. Due to things such as online shopping, banking and other e-commerce options, personal information is stored in the internet enabling many cybercrimes to occur. Cybercrimes are very similar to any regular crime; the crime just happens to take place on websites for criminals to hack and steal user’s information for their own personal benefit. Cybercriminals tend to attack users based on their emails, social media accounts, and web history because the most history about an individual is stored in those sites.
Privacy concerns on the web have become an undesirable consequence that people face with cyber technology. The ability of computers to gather and store unlimited amount of information from the internet raises privacy issues concerning an individual’s informational privacy. A person’s right to informational privacy is the ability to control the flow of their personal information, including the transfer and exchange of that information. An invasion of informational privacy denies people the right to control who accesses their personal information. Many internet users are unaware that they are more likely to compromise their privacy when using the internet services such as search engines and social networking sites. The internet provides access to an incredible amount of information from all over the world. Some internet users use the internet exclusively as a source of information while other internet users use the internet to create and disseminate information for others to use. However, the vast amount of information floating on the internet would not
Many users are subject of Security and Privacy on the Internet issue. The term "information" now is more used when defining a special product or article of trade which could be bought, sold, exchanged, etc. Often the price of information is higher many times than the cost of the very computers and technologies where it is functioning. Naturally it raises the need of protecting information from unauthorized access, theft, destruction, and other crimes. However, many users do not realize that they risk their security and privacy online.
In today’s society, people tend to operate the majority of their everyday tasks through the internet. It is really simple, comfortable, and it saves a lot of time. In one hour individual can perform a deposit into his particular bank account, request a pharmaceutical prescription, apply for a mortgage, pay bills, do online shopping and more. All it requires a customer to be able to do this is having an account with any of these company’s websites. Creating an account is normally a very manageable process where the person provides some information and creates a username and a password to be in a position to return to the website. This data provided by the consumer is called: digital data or digital information, which is just any kind of information in digital format. Digital data can be public or private, it can be kept by the medical providers, banks, government, and other organizations; as well as an easily available on the internet on social media websites, etc. However is our data really secure? Along with its many advantages, the advancement of technology presents an encompassing examination network seem almost necessary. We owe enough of the privacy we have experienced in the past to a combination of immature technology and insufficient labor to monitor us. But these protective inabilities are giving way to efficiency technologies of data processing and digital surveillance that threaten to eliminate our privacy. Already we are traced by our credit card transactions,