...Hazards of Social Media in today’s Society Are social networking sites putting us in danger? Social Media is a familiar tool used in today’s society. The media networks out there such as: Facebook, MySpace, Twitter, and YouTube let people stay in touch with families, connect with potential employers, and meet different people all over the world. Social networking is also a platform for obtaining current events at a moment’s notice. Along with these so could networks that allow you to stay in touch with the world, they have their potential dangers. These dangers can include public viewing of your personal life, and prone to sexual predators. Social media sites are virtual communities that can be publically viewed by anyone and everyone. Pictures, videos, and personal information continually get posted even with privacy statements.(Gail, Uy K 2010).All while people think they are safe from having certain people view their profiles, there is always a way to view your personal sites. The danger of having your information put out there for the world to see is the possibility of becoming a victim of identity theft. Along with identify theft; there is the possibility of fake profiling and bullying. Building of fake profiles in the social network community is something that is easy for anyone that is trying or wanting to bully someone without having to do it in person. This is called cyber bullying. Once someone shares a certain detail about someone, they will share with another person...
Words: 646 - Pages: 3
...depressed or deal with other social health problems. Social networking is not safe as it does not protect children, teenagers and adults and they are used and abused through cyberbullying, fake profiles and sexual harassment. Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone (Rouse Margaret, 2010) . In some cases, cyber bullying can be put to an end from the very beginning if the victim puts a stop to it themselves or by telling a superior. The sad part is that some children get affected by this and end up killing each other and committing suicide due to cyberbullying. "Forty-three percent of teens have been victims of social networking" (Harris Interactive Cyberbullying Research Report, 2006) and shockingly enough "almost 80 percent of teens said that they either did not have parental rules about internet use or found ways around the rules"(Harris Interactive Cyberbullying Research Report, 2006). Parents should be aware of their children's internet activity inorder to make sure such incidents do not occur. With lack of attention and care, children might fall into this extremely hurtful situation. Fake profiles is very common among the social networking sites. Fake profiles cause victims to trust deceiving people on the internet and in most cases...
Words: 1094 - Pages: 5
...Social Media Social media has become more popular and users have expanded from teens to young adults and now even people over the age of 50. However, many people are still unsure if social media is a good or bad thing, as some people think it’s amazing, whereas others are worried about the impact it has on people’s lives. Personally I feel that it is a good thing; however, after researching this topic, it has been brought into extreme clarity for me that actually there is a rather dark side to these networking sites. Firstly, social media is a great way to boost your confidence, allowing people who are rather shy to express themselves without human interaction. As a result of this, obviously when there is no human interaction, it makes it rather easy to be negative towards another person. One of the main reasons that people may say something negative or nasty towards someone else on social media is because you can’t see the reaction of the person; the fact that you are sitting behind a device of some sort blocks out the thought that on the other side is a real person with real thoughts and feelings and the fact that you don’t see the other person eye to eye and face to face means that, when someone does say something mean or negative towards another person, it creates the illusion that it isn’t really happening. In addition to this, social networking allows people to communicate quickly and also helps people practise and improve their social skills (which is always a good...
Words: 1695 - Pages: 7
...following paragraphs will talk about the three main negative effects that social media plays on youth today. These are; one, continuously putting users of Social Media, (and even the internet), in danger, two, damaging face to face socializing skills, and three, exposing our youth to explicit materials. * * Firstly, Social media poses many threats in today’s society. It is accessible from any Computer, Phone, Tablet or IPod with an internet connection. This means that it is easier for children as young as 8 or 9 to connect to a social media site. This in turn exposes them to nudity, swearing and the worst of all; pedophiles and rapists. Rheana Murray of New York Daily News stated that a whopping one in ten profiles online are fake (May 2013). This means that at least 10% or more of a child’s friends on Facebook could be phony. The Carly Ryan incident in 2006 proves that the internet is a very dangerous platform for children, teenagers and even adults to be using. Unfortunately, fake profiles are not just used for using fake aliases. Even if someone has only, say 10 friends on a social media site, and know that all of these are authentic, there are still ways for hackers to access your information; such as your location, photos or even bank details. Bullying is also a huge danger to youth on the...
Words: 1004 - Pages: 5
...privacy go hand-in-hand with each other. Cyberbullying is the use of electronic communication, like the internet and social media websites and cell phones, to bully a person, usually sending hurtful or embarrassing messages to them (Helen Cowie, 2013). Many of the articles that are going to be using for this paper talk about the different ways cyberbullying affects teens and young adults and also how internet privacy plays a role in cyberbullying. There is an article from Bob Sullivan (2013) that talks about how internet privacy is a complicated issue and there are criminals who break into websites to steal personal information. Since people can get someone else’s personal information, that makes it easier for a cyberbully to create a fake profile on a social media site, and make fun of and belittle someone else. Keywords: Cyberbullying, electronic communication, Cyberbullying and How Internet Privacy is Involved Traditional face-to-face bullying has been identified as a risk factor for the social and emotional adjustment of perpetrators, targets, and bully victims during childhood and adolescence. Bullies have now found a new way to reach their targets, by cyberbullying. They now can go on the internet and social media websites or use their cell phone. With the bully being able to do this they have the power to reach their targets at any time of the day or night (Helen Cowie., 2013). Teens should be able to go on their social media websites and have all their personal...
Words: 2676 - Pages: 11
...Title : Internet Dating: Should or Should Not? Stand : Should Not Specific purpose : To convince my audience that internet dating brings lots of danger. In the world we live in today some people rely on the internet in order to find love. But online dating isn't all that it's cracked up to be. In fact, you should stay away from it. Dating online is not safe. Sure there are some dating sites that are legitimate and a little less dangerous, but some people rely on facebook, myspace, and instant messaging for dating which is just plain wrong. Not only is it unpersonal, but you can never tell who you're really seeing. The picture you're looking at could be years old or be a different all together. And if you finally decide to meet your online partner, it's very likely that you'll be disappointed in their real appearance or, in a worse case scenario, find that you're dating a pedophile. It's great that people enjoy finding love, but it's best not to do it online. It's a dangerous and impersonal experience that leads to disappointment most of the time. If you find yourself looking for your soulmate, do it the old fashioned way and go out and meet someone in person. Because of the dangerous internet dating brings to a person's life. It can be addictive, rise of fake personality, and also charge of to much money on membership fees. Now, let me tell why you should not enroll yourself in a cyber dating world, the internet dating by the first disadvantage. It can be...
Words: 788 - Pages: 4
...In 2006, Megan Meir was the victim of cyber bullying which led to her suicide. The mother of a former friend of Megan created a fake social network account under the name of Josh to monitor Megan online. The mother became friends with Megan, but Megan only thought it was just a boy that she knew from school. After a while, everything went from sweet talk to verbal abuse. Terms such as" Megan is a slut. Megan is Fat" were being posted all over the social network by the mother. Devastated by all this bullying, Megan was found hung in her bedroom closet a few days before her fourteenth birthday. After the death of Megan, they found out it was the mother of her former friend who was behind this cyber bullying. Megan's Father, Ron Meir stated, "That's the biggest tragedy of this whole thing. An adult did this." Living in the 19th century, everything we do is revolved around the Internet. Nowadays more than 50% of people can’t go a few hours without going on the internet since they have developed smartphones that bring it right into the palm of our hands which makes it harder for parents to monitor their kid’s internet behaviors. Basically whatever you do is connected to the Internet, from talking on the phone, video chatting and texting. But most people do not realize that there are consequences, which relates to all of the above if not taken certain measures and precautions that would lessen the risk of such threats that might arise while using Internet. Don’t get me wrong, the...
Words: 1520 - Pages: 7
...Connor Osborne IDS 1010 11-5-14 Detailed Outline & Main Point Revised Thesis Statement Online dating comes with the high possibility of getting involved with different types of fraud accounts. Detailed Outline I. Intro A. Thesis Statement B. Fraud Account Characteristics C. Scams From Fraud Accounts D. Romance Scams II. To avoid fraudulent activity online daters must be aware of the characteristics of these fake accounts. A. Over Romantic a. Take things fast b. Very serious long relationships c. Financial assistance B. Guiltiness a. Make you feel bad b. Certain phrases C. Photos, Characteristics, Hobbies a. Repeated photos b. Essays of hobbies c. Flirty descriptions III. Many scams take place from people becoming involved with fraud accounts. A. How a. Identity fraud by acquiring sufficient information through romance scams b. Hacking into similar online accounts. EBay and such c. “Teams” of people B. Protections against a. Don’t open files b. Use one credit card only online c. Before disposing of an old computer, use a utility program to “wipe” your hard drive C. Examples a. Robert Frost b. Nigeria IV. A big problem with online dating isn’t only money scams and such but also romantic scams. A. Why a. Desperation b. Are not comfortable with himself or herself in person c. Money B. Protection against fraud accounts a. Do not commit so early b. Report any suspicious accounts ...
Words: 2989 - Pages: 12
...Procedure for Policy Development and Management All companies must have policies that safeguard critical business data and sensitive information. Therefore employees must have appropriate behavior in order to avert the cybercrime. Many of these policies are just adopted, but till many companies find it necessary to be tailored so that it is tailored to an organization security needs and most till need to be updated to reflect ever changing impact of the cyberspace transactions in everyday activities. Like all company document, cyberspace follows good design and various format in order to make the document not be vague and follow government policies on security design. These policies also need to be reviewed regularly to ensure that they conform to the business needs that are ever changing gin the business environment. The following are the major items involved in the cybercrime plan actions. 1. Establish security roles and responsibilities Establishing security roles and responsibility in a company is one step towards combating cybercrime. The policies should clearly define the separation of roles with responsibility depending on the system in place. This means that a system will be designed on role based control which might not be well utilized when the procedures and policies are not well defined. The extend of employees can go with a system should show how much they can access in the system and the policies should be maintained at minimum. This means that: The security...
Words: 2072 - Pages: 9
..."Hackers and Cyber Criminal Organizations" Please respond to the following: From the first and second e-Activities, explain the hacker ethic and hacker manifesto. Give your opinion fas to why hackers do not consider themselves to be criminals. Include one (1) example of such types of hackers to support your response. Hackers look at their abilities as a culture; they share in the same beliefs and the same need to constantly learn and discover in the cyber world. Most Hackers don’t engage in illegal action; it is more about the skills and motivation that drives them. The normal Hackers ethic is not profiting from their hack and not purposely harming the computer system. A Hacker is usually simply a person that shows a profound interest in a computer, how it works, and the technology used to access parts of the system itself. They feel that in most cases their knowledge is actually useful and most are authorized to hack into the systems. Some Hackers believe that hacking is a learning experience; including creative problem solving and educating others about the vulnerabilities with computer security. I feel that Hackers that are trying to protect other people are the Hackers that don’t find themselves criminals; however it is hard to determine in certain cases and situations what is legal and illegal hacking. The White Hat Hacker is the Hacker that wouldn’t consider their job a crime; some have graduated from college and work for large companies testing software, testing defenses...
Words: 697 - Pages: 3
...more people using Facebook them there are living in the following countries: The US, Indonesia, Brazil, Pakistan and Japan.” Uses Facebook allows people to interact, share photos and find people. Not only is Facebook used for social purposes, many people and/or companies use it professionally for business networking. It has been found that more and more businesses with an online presence will link users to a Facebook page. It is surprising, however how many businesses do not know how to use Facebook for marketing. This has become a crucial skill to have in the job hunt and an integral part of online marketing strategies. Facebook has found a way to make itself the link between the brand and the consumer. Dangers. The CBS News (2010) website. There are five main dangers Facebook users expose themselves to that they may be unaware of: 1. Your information is being shared with third parties. 2. Privacy settings revert to a less safe mode after each redesign. 3. Facebook ads many contain malware. 4. Your real friends unknowingly make...
Words: 730 - Pages: 3
...a free service. Of course, there are a lot of potential dangers to be had when dealing with Facebook. No website is perfect, and it’s important that people are away of the potential hazards that can be attributed to Facebook and the internet in general. The first danger is one that Facebook shares with pretty much the entirety of the internet. You never know who you’re really talking to. You never know who is on the other end of the internet and who is sitting at the computer. Facebook is pretty good about requiring a real name and valid email address and whatnot to make an account, but it’s still easy enough to make fake accounts. At the same time, Facebook always does their best to make it clear that you should only be friends with people you actually know. If you decline a friend invite, it will ask if you know the person. If you say no, and enough other people say no, then that account is banned from Facebook. So they are doing their best to make sure you’re only talking to people you know, but there are still a ton of people who just friend request everybody they see, and who accepts anybody that sends them a friend request. These people don’t seem to care about the potential dangers. What goes along with this is the need for privacy. Facebook has gotten a lot better with their privacy policies, making less account information visible by default. A couple of years ago you could see pretty much anybody’s full profile, you could see pictures, personal information such as birthday...
Words: 1290 - Pages: 6
...use to make all their users’ personal information safe; these are called privacy settings. They are set to conceal private information such as email addresses, phone numbers, their real names and other information. Users can change the settings at any time to make their profile even more private or open. The virtual environment makes online communities an easy target place for cyber bullying and stalking. Bullies can direct unwanted attention to the unsuspecting victim, pose as a person they are not or even steal their identity without their knowledge and this is a contemporary issue that affects the community. Should there be legislation to prescribe how Facebook is to protect their users by using affective privacy settings? Legislation should be enacted to prescribe the way privacy settings are to function on Facebook to ensure that users are safe from cyber bulling, harassment, assault and deception. Issues that have been raised over 12 months Over the past 12 months, there have been some re-occurring attacks of people who use online communities. A majority of them are associated with the popular Facebook. Many predators sign up for online communities looking for vulnerable people and design a profile claiming to be someone they are not. The case of Nona Belomesoff’s was the start of this issue. Authorities were asked to investigate the sudden disappearance of 18 year old Miss Belomesoff when she was reported missing in NSW in May 2010. The parents of Miss Belomesoff...
Words: 1510 - Pages: 7
...An individual’s ability to purposely inflict injury on another person is one of the world’s greatest mysteries. Although the nation struggles to make sense of senseless violence, a large portion of society embraces the morbid entertainment prevalent on the big screen and marathoned inside our living rooms. As a defense mechanism, we tend to make danger seem distant by simply labeling horror movies as “fake” and dismissing the true crimes stories shown on television because it “won’t happen in our safe town”. The truth is no community is immune to violence and even Hollywood’s best directors could not have fathomed the crimes that have taken place in history. Despite our society’s false sense of security, the grim reality is that the United...
Words: 535 - Pages: 3
...Cyber Bullying Table of Contents I. Cover page II. Table of Contents III. Report It only seems like yesterday that teachers would have to stand on the play ground during recess and monitor the bullies, who would try to take another child’s lunch money, or to take a note being passed around in the classroom that would read something like “I will see you on the play ground after school.” A way to help prevent your child from being one of the many bullying victims is to know what the risk factors are of your child becoming one of the bullying victims. When it comes to being a bullying victim, children, teens and adults are those who don't get along well with others, have few or no friends, is less popular than others, what color their skin is, or what kind of clothes they wear, because they wear glasses, and what kind of house they live in. Now here we are in the year 2011, dealing with an entirely different style of bullying, which we all know is called “CYBERBULLYING”. No longer are the days of having the teacher send the student to the principal’s office or a phone call home to mom and dad. Friends and family of victims are also taking part when cyber bullying occurs. They may find themselves in difficult situations where they are peer pressured into participating in the bullying, afraid that if they don't play along, or they could become a target. They may feel that they have no power to stop it or start feeling guilty for not having spoken out against the...
Words: 1506 - Pages: 7