100% (1)
page:
8 pages/≈2200 words
Sources:
-1
Style:
APA
Subject:
Communications & Media
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 38.02
Topic:

Social Networking and Privacy Issues. Research Paper

Research Paper Instructions:

The final project must include:

1. The title of the topic you are writing about.

2. A brief description of the topic at the beginning of the write-up.

3. Citations with annotations for the sources of information. See the grading rubric for the number of citations and the source of the information. The format for the citation is the APA style.

4. Sources should include one or more of the following:

• A book or book chapter

• One online dictionary entry with the definition of one of your key words or phrases

• Three articles from a scholarly journal

• One article from a newspaper

• Authoritative Web pages

• A statistical resource using the a statistical database

• An authoritative podcast or web video

• Governmental data sources (.gov)

• For other sources check with professor



5. The final paper must be at least 8 pages of content not more than 10. This is NOT INCLUDING a cover page and the citations page. .

6. The final paper must also include 3 visuals in the form of charts, tables, graphs or other visual that shows data or information to support a point in your paper. The visuals must take no more than 1/3 of the page. Larger visuals must be reduced in size to fit to 1/3 of the page.




Research Paper Sample Content Preview:

Social Networking and Privacy Issues
Student's Name
Institutional Affiliation
Social Networking and Privacy Issues
This paper talks about social networking sites and the associated privacy issues. The current age of technology has led to increased interaction over the internet, and this has subsequently led to scrutiny of the privacy issues that are associated with social networking sites. Whenever people connect to social networking sites, their primary concern is the accessibility of their personal information by the various users all across the world. There should be a limit to what information should be accessible to the many users who use social networking sites. This is because not every person who logs into these sites intends to use the websites for Personal information; therefore, it should be kept off-limits for the sake of the security of the user. This topic has been a hot debate of late, with the term privacy being labeled as a relative term, and calls for the need to include exceptions for confidentiality. There have also been calls by the networking sites for users to desist from sharing their personal information over the internet, especially with people they have not met personally, or people they do not trust entirely with such information. Such measures, however, cannot adequately ensure the privacy of the users. There is a need for measures to be put in formulated to limit the hackers who go to great lengths to access other users' information through these sites. These measures should be able to counter any attempts to access user accounts, and further action should be taken against these people by the law, to ensure that they do not make such attempts in the future.
The universality and advantages of social networking
The popularity of social networks becomes one of the adequate assets for organizations to promote the identification and the utilization of organizational products. Within this context, Evans et al. (2014) mentioned that the use of social networks can provide some practical and influential advantages to the organization, which may generate the volume of both productivity and profitability. These advantages are described below here:
Increased Income
Financial support in terms of the cost related is the most effective advantage that can be grasped by utilizing social networks within the operational business approach of the organizations (Taneja and Toombs, 2014). Within this context, Tsimonis and Dimitriadis (2014) have mentioned that the barriers of finance within the context of social media marketing are relatively quite stumpy from the other aspects. The significant advantage of the social network to the organizations is that the accesses to social media platforms are free of cost.
Broader social circles
The most extraordinary phenomena of social media are to increase as well as create new structures of social interactions. Regarding that Whiting and Williams (2013) have stated that a massive number of people spend leisure time using several diversified social media platforms such as e-mails, Instant Messaging, and other social media, which are also utilized for communicating with other.
Convenient interpersonal connection
In accordance with Ainin et al. (2015), it has been observed that unlike the addiction of watching television or listening radio, the interactivity of social networks attracts the customers in an adequate and effective.
The dangers of privacy issues
The invasion of privacy over the internet is a severe issue in this digital era. The internet has become a crucial aspect in today's world. The technology has dramatically evolved since its inception as just as a communication platform. It is now used as a tool to share information, communicate, educate, and socialize as well as other endless possibilities. The success of the internet has primarily been fueled by the availability of innovative infrastructure and technology such as smartphones, tablets, and computers, among others, that have made the internet readily available to users.
Cause of privacy breach
Data Breach is an inveterate incident where confidential and sensitive data has been accessed in an illegal way. Such incidents are also caused by cyber-attacks, where online fraudsters try to forcefully gain entry to the systems of other entities.. As per the 2018 privacy event claims, when looking at things that cause data breaches, more than forty percent was due to use of stolen creds as shown below.
Data breaches are caused by quite a lot of factors, such as careless employees, who can unknowingly leave their access data or codes in the vicinity of unauthorized personnel. Such employees can also obliviously send or open dangerous files which can result in the launch of phishing malware into the system. There are also backdoors, through which these fraudsters can try gaining entry into the system. These backdoor are usually weaknesses in the system, through which a loophole can be found for penetration. Such loopholes are in most cases a result of outdated security softwares, which are usually a serious leeway for threats to the system.
Another cause can be the provision of too many permissions to people within the organization. One major problem about such permissions is that there is a high chance of certain authorizations to land onto the wrong hands. Once they land on the wrong hands, it becomes a serious security breach, in such a manner that unauthorized personnel can easily and continually access certain sensitive information without detection. Organizations usually fail to update these permissions over time, thereby being in a perpetual state of constant surveillance and data harvesting from unwanted elements.
Data breaches are a significant hazard that any organization takes on when they begin to use innovation to aid their everyday exercises. Information penetrates progressively when examiners are using innovation. For example, the Savvy Advanced Center points which "Basically, these fill in as "shrewd stages, whereby evaluators can work remotely, and continuously, using information and investigation, robotization and perception (Dhasarathan et al., 2015). When looking at data breach one changes the security of your frameworks, for example, a few organizations won't permit their representatives to utilize their workstations on a wifi framework, and they should be designed into a system. This guarantees nobody can tap in from the state nearby. This additionally assists with limiting the opportunity of somebody sitting close to you; for example, you can't chip away at your PC at state Starbucks.
In the recent years, hacking has risen to become the leading cause of data privacy and security breach causing a major industry, economic ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

Sign In
Not register? Register Now!