Social Security And Social Networking

Decent Essays
Social Networking
Setting password for personal information and creating private accounts on social networking is not an entirely effective method of dealing with problems like identity theft and it is irrational. This is because there have been so many cases of identity theft over the past few years even after users have been encouraged to use private accounts and complicated passwords. This practice is irrational because it does not consider cases like electronic forgery, which cannot be prevented through passwords, and private accounts alone (Stutzman 15). It involves using the user’s passwords to create a fake one. Therefore, it uses the solutions created for users to create an even bigger problem. Methods that are more complex should be
…show more content…
They argue that the criminals use someone else’s personal information like their address or name and therefore the best way to prevent that is by use of private accounts and passwords. They also argue that crimes happen when they get peoples personal information and creating new ones therefore hiding personal information is the best way to go about it. Otherwise, what they do not look at is the great perspective of identity theft. It does not only occur to people socializing on social media, it also includes business people who get information from the social networks (Bilge). These business people also exchange ideas on social networks and they interact on social network. This alone can cost a businessperson a lot thus it requires more than just a private account to secure such information. Firms also have their accounts in different social networking sites and they use their employees to interact with customers in order to know their tastes and presences and measure quality of their products (Bilge). During such activities is when some information about the company leaks and it is hacked. Therefore, before concluding that passwords are the best form of security, identity theft should be looked at in broader terms (Aimeur, Gambs and …show more content…
For example, the fact that it looks at only one dimension of identity theft makes it weak. This is because it leaves loopholes for such crimes. Securing information is supposed to be all round and it should take care of both personal information and sensitive data of the organization (Aimeur, Gambs and Ho). It should also think about the government because as mentioned earlier it is a target and it has also been affected by this crime. The administration of passwords and private accounts does not thoroughly evaluate the bigger picture and the long-term effect. Shallowly, identity theft may happen if someone gives out their log in details or of the log in at some public place and forget to log out. That is an easy target because no effort is needed to hack into that account. This is where passwords are most effective if people learn to use them privately. Otherwise, carelessness could lead to identity theft. People who forget to log out after using social networking on someone else’s phone or computer can expose themselves to this crime (Aimeur, Gambs and Ho). On the other hand, some people use too complicated passwords even for themselves. This therefore makes them not to log out after using their Smartphone to avoid missing out the details the next time. If someone else uses that phone, they can log in and steal personal information, which helps them hack into the victims account. It

Related Documents

  • Superior Essays

    Nevertheless, Park doesn't fail to address some more of the reality that we face in the everyday world _ robbery. Basically, we apply every other measure to keep our personal and social life as well as our monetary fund away from strangers in the real world. And we keep ourselves up to date with the passwords while constantly changing it at regular intervals required, especially with the credit cards and social Google accounts. But still hackers and robbers will find the best way out to decrypt our passwords from us through the worst of ways; surely for their own personal benefits and profits. This existing problem is shown along with clarity over the short story that Park presents.…

    • 1975 Words
    • 8 Pages
    Superior Essays
  • Decent Essays

    This paper outlines various issues regarding privacy in social media such and the precautions that have to be taken to ensure that information…

    • 284 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Embedded Assessment

    • 776 Words
    • 4 Pages

    Once joining these websites you are exposing yourself to identity theft and online predators. Recent research reveals that identity theft affects millions of people a year, costing victims countless hours and money in identity recovery and repair. Social media sites are based on personal information. They encourage users to provide as much information as possible when registering. These websites have limited government oversight, exposing users to identity theft and fraud.…

    • 776 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Argument Analysis: Alfred Edmond Jr. In Alfred Edmond Jr’s “Why Asking for a Job Applicant’s Facebook Password Is Fair Game,” Edmond explains his reasoning behind why he thinks that employers should be able to ask for the social media passwords for the applicant’s accounts. In his article Edmond argues the case that an employer should be able to ask a job applicant for their Facebook password as a consideration for employment from a prospective employee. Edmond raises some valid points about asking for an employee’s Facebook password, however his some of his supporting points do not connect to his main argument and his argument suffers as a whole because of it.…

    • 1331 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    The word security has changed over time in different ways including what it means, context, and what it really stands for. Security in today’s age means the state of being in good protection from danger. However, looking back the definition was more so related to social status and economic security meaning you were making steady income. Both still mean protection from danger, as in now we think of it as protection for life but back then it was protection from what people thought you were, homeless or poor. Let's look at the text 1, Declaration of Independence, which talks about its contextual meanings.…

    • 457 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    To keep our communities safe, we must have our social media accounts checked. However, officials should not be able to check people’s social network accounts. I strongly believe officials should be able to check people’s social networks for our safety. My essay will be about how I believe officials should be able to checked people’s social network accounts.…

    • 531 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Laws help codify the values of a society, maintain order among the population, and protect citizens from being abused and harmed by dangerous criminals. However, recent technological trends have required the government to address the intensifying problem of identity theft. Because identity theft has become prevalent throughout the US society, many legal and criminal justice scholars have articulated the different types of identity theft and the consequences that the victims and offenders often experience. Identity theft relates to instances in which an offender steals and uses the information of a victim to fulfill criminal activities or acquire financial gains, the victims are often inflicted with detrimental financial losses and a damaged…

    • 1439 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    It is said that an identity is stolen online every three seconds. A persons identity can be stolen false applications for loans and credit cards, fraudulent withdrawals from bank accounts, fraudulent use of telephone calling cards, or obtaining other goods or privileges…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Accepted therapeutic boundaries have evolved over time. The 1930-1970’s saw loose boundaries. Towards the 1980’s and 1990’s any kind of dual relationships were ill advised. There is current recognition that dual relationships are not only are unavoidable but in many cases can be beneficial to the therapeutic process (Zur, 2011).…

    • 1059 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    In the article Identity theft it talks about how vital protecting clients information private is, but there is often breaches that cannot be prevented (Kess, S., Grimaldi, J. R., & Revels, J. J. (2017). Identity Theft. CPA Journal, 87(1), 66-68.). The article also goes on to state that being prepared is the best cure for identity theft, even though it is now considered to be a fact of life there are many steps that can be taken along the road of recovery (Kess, S., Grimaldi, J. R., & Revels, J. J. (2017).…

    • 1549 Words
    • 7 Pages
    Improved Essays
  • Decent Essays

    Should We Ditch The Idea of Privacy by Don Tapscott is all about privacy and network. Now days we can see the use of different kind of social media such as Facebook, Twitter, Snapchat and Instagram. People share their intimate, personal information through these social medias. I think they must have to be aware about positive and negative both side of. Sharing personal information in social media.…

    • 343 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    There are several ways that a person’s personal information can be collected online. Fake electronic commerce sites have become abundant in the internet to trick online shoppers to give their personal information and card credentials (Gold 33). An extension in the Mozilla Firefox browser called Firesheep makes stealing account credentials from people with ease (Kern and Phetteplace 210). Social networking sites such as Facebook have been used by people in relationships to surveil activities of the other person in secret, a clear violation of privacy (Tong 792).…

    • 474 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The element of ethics in the healthcare information age is still a grey area for this day and age: Establishing technology healthcare information, communication and security are threatened. As ethical issues begin to arise everybody is talking about this new e-word. Electronic is now being represented as “e”, for instance e-health. Electronic health is evolving in multiple establishments in hopes to enhance quality and efficiency. The political effort put in place to encompass everyone has not been as smooth as planned.…

    • 451 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Even though there have been vast improvements in social networking site’s privacy and protection abilities it is still a dangerous and evolving territory that needs far greater improvement before people can stop being hurt. Something so new and so easily accessible to such a large number of people is bound to have negative and adverse effects. With all these cases of cyberbullying and the amount of fake profilers out there, privacy settings and ways to weed out fake profiles needs to be a priority for the creators and developers of these social networks As social media websites such as Facebook, Twitter and Instagram become increasingly prominent in the lives of America’s youth, society continues to see its impacts reflected in the lives of…

    • 1282 Words
    • 5 Pages
    Improved Essays