Social Media Explosion Analysis

Improved Essays
Alsokoot Almutairi
Ismet Ozkilic

The article “Social Media Explosion” was written or authored by Marcia Clemmitt, who has served as editor in chief of medicine and health besides her work as a staff writer for the Scientist. (Clemmitt 100) Given that the rate of adopting online communication is ever increasing, what are the potential limitations facing online users? The author’s main point is privacy safety of social networking sites (Clemmetti 82). She notice that emergence of facebook and photo sharing site have been received with a lot of interest from members of the public due to intensive fun involved with the media technologies (82, 89, 90 and 94). Although human beings interactions were once an occasional venture practiced by financially
…show more content…
So far up to 80 percent of U.S teens are facebook registered members (Clemmit 85-89). As much as the Clemmit tries to underscore her security concern for online users this objective receives partial achievement. That is, as much as their potential treats related to security of [private information provided before access to online blogs can be permitted. Company’s owners have promised a counter strategy to this challenge by providing security guaranteed to online users. This has made many members of social media platforms to continue with this mode of interaction irrespective of whether or not their information would land on bad online cartels such as …show more content…
The writer is a freelancer operating from Washington D.C (McCutcheon 5). An important question facing on-line visitors companies, is hacking a reality in a new period brought about by advances in computing? The author’s main point of concern is safety of American’s online data (McCutcheon 1). As Americans adaptability to online communication increases at alarming rates, so is the rate at which online data is facing security threats. Evidence shows that individual’s private information such as credit card numbers and company’s secretive information are accessible by hackers who end up using such information for financial gains (McCutcheon 1). Statistically, about 40,000,000 credit cards have ever been accessed by hackers in addition to other 350,000 credit cards which were accessed by a hacker in Neiman Marcus’ Computer system (McCutcheon 1). According to the author, this trend has also been witnessed in government structures where sensitive government information is not longer safe unless very comprehensive protection tools put in place (1).
According to the author, recent government reports have indicated that the incidence of online insecurity has increased by 100 percent (doubled) (McCutcheon 1). This led to exposure of customer’s private data after access to company’s information system is breached. The ultimate results for such insecurities are customers’ loss of trust on

Related Documents

  • Improved Essays

    As part of the overall risk model, we have already illustrated the threats and attacks that are possible on the Costco’s IT infrastructure with the likelihood of attacks that can exploit the identified vulnerabilities, which may eventually pose an extensive threat to the Costco’s operations including missions, functions, image, and reputation as well as to the organizational assets, linked organizations, and the consumers. Costco’s privacy policy clearly enunciated the significance of customer’s private and financial information for the organization, and promises to maintain the technical competence to safeguard the information collected through their websites, point of sales terminals, and other mechanisms (Costco, 2013). Consequently, to…

    • 1380 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    To keep our communities safer, officials should be able to check people’s social network accounts. For example, if a teenage posts a provocative picture on facebook there could be many horrible outcome. In the article Password Protected, Joseph Maneen said, “Young people need to learn that when you post something on the internet, there is a consequence.” A teenager who posts a provocative picture can influence good teens to become disappointments to the people who thought they were able to secure their behaviors. Or worse, the tennager could be malestid and taken away.…

    • 531 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    In Sherry Turkle’s “Can You Hear Me Now,” and Marcia Clemmitt’s “Social Media Explosion,” both believe that as technology and social media use increases, the way society interacts and communicates will change. However, Turkle only focuses on the negative influences technology…

    • 1302 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Opm Hack

    • 896 Words
    • 4 Pages

    With the expansion of technology and the Internet, people fiercely protect their online identity to include regularly changing and safeguarding online passwords, upgrading security scans to keeps computers protected from viruses. However, personal and sensitive information exists online, and it is vulnerable even when safety measures are in place. This vulnerability led to a compromise of the Office of Personnel Management (OPM) database and sensitive information was obtained by unauthorized sources. Living in the information age is exciting and convenient. People can sit at their computers and conduct research without ever having to consult a print-version encyclopedia, shop without ever having to leave the comforts of their…

    • 896 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    The word security has changed over time in different ways including what it means, context, and what it really stands for. Security in today’s age means the state of being in good protection from danger. However, looking back the definition was more so related to social status and economic security meaning you were making steady income. Both still mean protection from danger, as in now we think of it as protection for life but back then it was protection from what people thought you were, homeless or poor. Let's look at the text 1, Declaration of Independence, which talks about its contextual meanings.…

    • 457 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Geo Listening Essay

    • 749 Words
    • 3 Pages

    Due to a rise in social networks, such as Facebook and Twitter, people have questioned school administrators’ rights to monitor their students’ social media activity. Schools not only have the right, but also the duty, to scrutinize the internet presence of their students. Many teens may argue against this invasive activity, but it may turn out to be a blessing, rather than a curse. In recent years there has been an emergence of private companies whose clients include schools and other business entities that monitor social media accounts.…

    • 749 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    The issues of whether our privacy is protected online has been debatable as the internet keeps growing. Writer Nicholas Carr, moved by technology and its effect on society, argues in his essay “Life, Liberty, and the Pursuit of Privacy” from his newest book Utopia is Creepy and Other Provocations, on the issues of privacy, specifically online privacy. Carr writes that as we go about our everyday lives, browsing online, hiding behind our computers, feeling completely anonymous, we are, however, completely unaware that our information is being collected and stored online. He claims that every keystroke, from typing to the details we provide when we shop online are all gathered and saved to the databases of corporations owning the websites. Furthermore,…

    • 1912 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Recently, many people are debating on whether social media benefits a person or not because of health issues and possible online predators, but with its increasing popularity, technology inhibits an ability to connect groups of people, spread news in a matter of seconds, and aid in education, making it a gain for individuals across the world. When Facebook was created in 2004, a tsunami of people used this new website. It allowed people to interact and reconnect with their friends…

    • 842 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Some Internet users recklessly reply to unsolicited email that promises money or prizes, but requires the individual to provide identifying data, such as name and address and checking account or credit card numbers with the expiration date and security code, which can allow full-blown identity theft. Identity theft, on a much larger scale, is committed through the use of high technology. This identity theft depends on legal and economic identity in contemporary society that is largely “virtual.” This theft depends on access to consumer data through the Internet, such as files that are the property of a credit card payment processing company.…

    • 467 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Panopticon Theory

    • 1659 Words
    • 7 Pages

    “They are like so many cages, so many small theatres, in which each actor is alone, perfectly individualized and constantly visible”(Foucault, par. 9). Social networking sites are the metaphorical prison cells of a virtual community. However, we still have the ability to choose, or at least limit, our ‘guards’ by changing our profiles’ privacy settings. Inside these metaphorical cells, we are under the inescapable gaze of the public.…

    • 1659 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    As an increasingly popular trend, the network security of companies is constantly being upgraded or patched in order to close up possible “loop holes” in the system. Hacking is a process during which a perpetrator(s) attempts to bypass the security of a company’s system in order to gain access to a mass amount of personal information. This method has become a common practice among identity thieves due to prior cases of success that hackers have had. For example, in 2011 a hacker had successfully hacked into Sony’s network and had gained access to approximately 77 million users personal information including names, addresses, usernames, and passwords (Baker & Finkle, 2011). Although hacking into a company’s network is seldom an easy task, the volume of personal information than could be compromised for doing so serves as motivation for hackers to “crack the…

    • 1064 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    We live in a digital world; it is in all parts of life. Technology today has everything shaped into the speediest and most advantageous forms possible to make individuals lives greater and more importantly, easier. The innovations and growth that have been made through recent years are astounding when compared to where the world was only a couple of years to ten years prior. With the web and everything connected to it, messaging, video calls, educational programs and shopping- the potential outcomes for technology later on are practically innumerable. With growing technology, there are risks and benefits preserving an online existence.…

    • 1662 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    Information technology has revolutionized virtually all aspects of human life. From communication to entertainment, all human endeavors have been affected by information technology. Whereas the benefits of information technology must be recognized, it is important to mention the challenges that it presents. Individuals and organizations rely on information technology for such issues as communication. Despite instituting measures to ensure data security, breaches usually occur.…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    As Standage reassures the reader: “their merits outweigh their drawbacks” (Standage). Both younger and older generations have different reasons for using social media platforms and the simplicity of how they work will only allow for more people to begin using these platforms (Facebook, Twitter, etc.) in the years to come. The biggest problem that will still be around is the fact that the users of social media platforms will keep the egotistic idea that the medium revolves around them when it really doesn’t after being re-evaluated. Social mediums will always be around whether it be for spreading knowledge or just simply wasting time instead of doing something more productive but the fact of the matter is that from both Ham and Standage’s articles, social mediums are only what people make them out to be from how they use Facebook or Twitter.…

    • 1199 Words
    • 5 Pages
    Improved Essays