Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Positive and negative impacts of social networking sites
Positive and negative impacts of social networking sites
Positive and negative impacts of social networking sites
Don’t take our word for it - see why 10 million students trust us with their essay needs.
All this information that we naively post online can affect our personal life. Even though, Social networking sites do not pose much of a threat on physical security, but they can pose serious effects on information and operational security. Any personal information that is posted on social media networks can aid identity thieves. Many financial institutions use security questions such as date of birth, mother’s maiden name, and pets’ names, which are commonly posted by users on these social networks. Identity thieves also use illegitimate third-party applications and false connection requests to gain personal information. These applications may be in the form of games, quizzes, and questionnaires that are designed to provide assistance with …show more content…
Uploading a single photo to a social media network can pinpoint the location of troops to a geographical location, due to the built-in global positioning system GPS which is built in nearly every smart phone. The GPS stores the location as metadata on the image, which allows for geotagging to occur. Steve Warren, deputy G2 of the U.S. Army Maneuver Center of Excellence cites a one example from 2007 When a new fleet of helicopters arrived with an aviation unit at a base in Iraq, some Soldiers took pictures on the flightline, he said. From the photos that were uploaded to the Internet, the enemy was able to determine the exact location of the helicopters inside the compound and conduct a mortar attack, destroying four of the AH-64 Apaches. (Rodewig, 2011) Not all information that is leaked to social networking sites will have negative impacts on a military mission, but some may greatly affect one’s personal privacy. Users on Facebook are able to determine privacy guidelines for the information they post, but not everyone knows how to do this. Many people have lost jobs and careers over what they have posted on social networking sites, thinking that the information was
Identity theft has been a major issue of privacy and fraud. In the data breach analysis from the Identity Theft Resource Center (2013), the number of data breaches from the year 2005 to 2012 increased. In 2012, there had been 49% where the data breach exposed people Social Security Number. The data breach of 2012 has a rate of 27.4% caused by hackers. These breaches were commonly from 36.4% businesses and 34.7% health and medical (Identity Theft Resource Center 2013). The number of identity theft varies from physical possession to digital possession. At least one-fifth of trash cans contains papers listing people’s credit card number and personal information. People that throw away their trash mails contain much personal information that is useful to steal someone's identity (Davis, 2002). Technology becomes a need where people use it daily and as a result it has also become a use for identity theft as well. Throughout the years as technology develops so does identity theft. This paper shows the types, methods and technique used for identity theft, and it also examines possible risk of identity theft from current technology.
The Internet plays the biggest role in identity theft. On the Internet, a thief can hide from detection while stealing peoples’ identities from their homes, being able to steal peoples’ information one by one “then disappearing into another identity,” (Vacca 60). Internet fraud consists of two phases. The first being spoofing where a fake site is set up made to look like the real thing. Once that is completed the second phase, phishing, begins. This usually starts with an email that uses the
Naidu, Prasant. "Are Social Networks Exploiting Our Security?" Lighthouse Insights. Lighthouse Insights, 7 June 2012. Web. 3 Nov. 2015.
Identity theft is the stealing and use of someone’s personal information and is one of the fastest growing crimes in the nation (Dole, 2005). According to Federal Trade Commission estimates, identity thieves victimize approximately 10 million Americans every year at a cost of an astonishing $50 billion (2005). Identity theft has been going on for years now and is easily done with the help of today’s technology. According to the Federal Trade Commission, there are six common ways that identity thieves get a hold of personal information. The varieties of methods that are used are dumpster diving, skimming, phishing, changing the victim’s address, stealing, and pretexting (Federal Trade Commission). Once someone’s identity is stolen, accounts can be opened in the victim’s name such as credit cards, loan, and utilities; money can be withdrawn from the victim’s bank accounts and cause financial difficulties or the victim’s personal information may be used for other reasons. While consumers blame credit card companies and credit bureaus for lack of security, credit card companies blame consumers for being too gullible and forthcoming with private information (Shelly, 2010). While the two disagree who is at fault, they both share a deep concern over identity theft. Credit card companies’ refusal to accept that technology is moving too fast for them to keep up and their lack of security with existing accounts provides evidence that it is not the consumer’s fault that identity theft is one of the fastest growing crimes in the nation (Dole, 2005).
Identity theft is one of the fastest-growing crimes in both the US and abroad. The Federal Trade Commission (FTC) estimates that identity theft costs consumers as much as $50 billion annually and that this number will likely keep growing (Finklea, 2010, p. 1). Additionally, the FTC receives in excess 250,000 consumer complaints of identity theft each year and this is believed to be only a fraction of the total number of victims (Finklea, 2010, p. 9). There are several types and methods of identity theft and these methods continue to increase as technology becomes increasingly sophisticated. Understanding the types and methods of identity theft can reduce potential victimization.
Technology has made life so easy in this present generation to the extent that, we can do virtually almost with it. We can now use technology to protect our privacy and our identity from been stolen. People use passwords, biometrics and other forms of security measures to hide their possessions which include their identity, privacy and valuable properties. While technology has a great advantage when it comes to securing one’s privacy and identity, one of its disadvantages is that privacy identity thieves can still find a way to use technology to intrude people’s privacy and steal their identity.
Social medias have become a big part of our society now, they are being used in all aspects of our life. We are connected twenty-four hours a day, at work, school, home, shopping etc. There is a necessity, a need to be connected to these social media’s, to feel like you are a part of society. With these growing numbers in being connected to social media’s on the web, there comes a growing desire for privacy and safety. In this paper I will discuss and analyze the social media’s themselves, the dangers that arise from them, and how all these correlate to privacy.
Being involved socially online can open many doors to hackers and scammers. Posting too much information online can be a way for scammers to steal information.
User Privacy is a sensitive topic at the moment. It is one of the most important factors a person should consider before they give their information away over the internet. Every click or selection you make online is being stored and permanently kept on record that includes anything you may have Googled, investigated or researched. Some people believe that user privacy is dead (Rambam 2011). More and more we are being encouraged to give away more information about ourselves online, and the greatest intrusion into our online activities comes from social networking sites. The lack of user privacy on social networking sites has led to dramatic changes in people’s lives such as targeting by the media and marketing researchers, the buying and selling of user information and other unethical forms of privacy invasion. Online activity is increasingly being used as e...
The first aspect being addressed is the problem with social network sites exposing information. Social networking has created an environment where it is nearly a duty to expose oneself. Profiles on these social websites are updated everyday with personal information such as locations, status, and future plans. Anyone can search another’s name and find information about their history, pictures, and activity. With the help of social networking sites...
Technology has advanced tremendously over the past decade, and appears to be advancing at a rapid pace each and every day. The social media is growing just as rapidly. Social media is an interaction between individuals that want to exchange information, photographs, and ideas in different types of networks. Social media users include people of all ages. These people have various experiences, have different cultures, and have various technical skills. (Brandtzaeg 1008) The social media depend on net-based technologies to generate the network for users to share. Social media includes everything that has to do with the Internet. By using the Internet, users can communicate with people locally and worldwide. People are no longer required to travel across the world to experience another culture. This can be done with social networking. The types of social media today come with many different types of communication such as social blogs, wall-postings, songs, photographs, and podcasts. The communication between users is informational, interactive, and also educational. However, unfortunately, most social networking sites keep track of all the interactions that take place, and this is a concern about Internet privacy for Facebook, Twitter, Google, and other social media users. Not only do they keep track of all interactions by the users, they also own all the content, including pictures that the users upload. The social network keeps this information on the user, even if the user deactivates their account with that particular site. Most users do not have any idea that the operator of the networking service keeps this information, and has access to all pictures and tags. By not having adequate security...
Cybercrime and social media are two major global problems that impact society. Today, are more accessible to computers and the Internet than in years prior. Nonetheless, perpetrators attack social media with illegal activity to facilitate their crime. There are different strategies or practices by various countries to combat cybercrime. However, identity theft, cyberbullying and phishing are three major type of cybercrimes which are impacting social networking websites.
Upon the advent of social networking websites, an entirely new level of self-expression was formed. People instantly share updates on their lives with family, friends, and colleagues, reconnecting with those they had lost contact with. Social networking has now become an integral part of contemporary society – a modern analog for catching up with friends over slow, conventional methods or finding upcoming events in newspapers. However, along with this freedom of information, the danger of revealing too much personal information has become apparent. As such, online social media poses an imminent danger to society as it blurs the line between private and public information, creating an obsession with sharing one’s personal life online.
Thus, by the Internet’s opportunity to perpetuate false representations, the digital illustration of society’s culture and individuals is misleading. Although people may seek comfort in certain social Internet communities, to what artificial perceptions they conform to be, is unknown. As a result, the ability to steal identities is easy and common. Identity theft on the Internet is a modern day crime that many net users are oblivious to and may result in serious implications. However understanding how to prevent such violations enables the user to retain enjoyment on the net as a whole.
An individual’s personal information was always at risk when it came to dealing with people that practiced identity theft. Common places where people inputted personal information were at online stores, retail stores, and the most common social media. For example Facebook, Ebay, and other online websites requested personal inf...