Order for this Paper or Similar Assignment Writing Help

Fill a form in 3 easy steps - less than 5 mins.

Posted: January 20th, 2023

Social media usage and cyber-crime

Social media usage and cyber-crime

Introduction
With the increased level of exposure that people have on the current social media channels, it is very easy for a particular person to easily share his or her information. For example, the introduction of media channels that are more into gaining access to the users’ data such as Facebook, WhatsApp, and Telegram applications among others, the chances of violation of the users’ privacy as well as manipulating them into sharing their information is very high. In this essay, I shall focus on the description of the relationship between utilizing diverse social media channels and becoming a victim of personal information leaking.
Cyber-crime as a result of using social media
As we have advanced technologically over the recent decades, various social platforms have emerged that have enabled us to interact and share information with other persons even if we are continents apart. Some of these social networks include LinkedIn, Facebook, Twitter, Instagram, and WhatsApp among many others. Most of them can be accessed through the web by using computers and laptops while others are more user-friendly in smart mobile devices. When a user wants to become a member in any of these media channels, he or she is always asked to open a new user account that will host his or her personal information. Some, like Twitter and Facebook, may tend to lean on the social perspectives of the person such as personal interests and likes. On the contrary, others, particularly LinkedIn, are centered more on the professional perspectives of the user. In either way, a user may be required to share his or her personal information with the host (Garcia, 2017).
So, how does a person become a victim of sharing personal information? One may ask such a question. Well, any other user who accepts to link up with your profile may gain access to your information if you have not restricted whom to view them. For instance, another third party may be informed of your likes, your interests, your place of residence, and the schools you have attended to among many other things (Bindu, Thilagam, & Ahuja, 2017). As a result, the user who has recently joined the social network may be exposed to potential hackers and scammers (Mann, 2009). In particular, this data posted in a user’s account can be extracted by the data aggregators and then used to track the user’s movement over the web (Mangan, 2017). This act is possibly seen in Facebook and Google for their sole purpose of enhancing personalized advertisements.
Another potential crime that comes with usage of social media is the sharing of personal images and tagging a user’s current location along with it (Sun, et al., 2017). There are many criminals and abductors in the world that we live in. Thus, if their targeted user posts a picture or him or herself and the current place he or she is located at, the chances of the abductors may be high in finding the user (Simon, Ben, & Tony, 2018).
Finally, the sharing of personal information such as places of work and professional qualification of a particular user in channels like LinkedIn (Atalay, 2018) may lead to being a target of fake links and other malicious applications (Leonardi, 2017). For example, a malicious job link may be shared to a person who is looking for work without him or her knowing. As a result, his or her personal information may be encrypted, formatted, or accessed if he or she accessed the malicious links and/or applications.

References
Atalay, B. (2018). Cyber c rimes, communication and social media. İstanbul Aydın Üniversitesi Dergisi, (3), 1.
Bindu, P. V., Thilagam, P. S., & Ahuja, D. (2017). Discovering suspicious behavior in multilayer social networks. Computers in Human Behavior, 73, 568–582.
Garcia, D. (2017). Leaking privacy and shadow profiles in online social networks. Science advances, 3(8), e1701172.
Leonardi, P. M. (2017). The social media revolution: Sharing and learning in the age of leaky knowledge. Information and Organization, 27(1), 47-59.
Mangan, D. (2017). The legal challenges of social media. Cheltenham, UK: Edward Elgar Publishing.
Mann, B.L. (2009) Social networking websites: A concatenation of impersonation, denigration, sexual aggressive solicitation, cyber-bullying or happy slapping videos, International Journal of Law and Information Technology, 17(3): 252-67.
Simon, A., Ben, B., & Tony, D. (2018). Organised crime and social media: a system for detecting, corroborating and visualising weak signals of organised crime online. Security Informatics, (1), 1.
Sun, G., Xie, Y., Liao, D., Yu, H., & Chang, V. (2017). User-defined privacy location-sharing system in mobile online social networks. Journal of Network and Computer Applications, 86, 34-45.
—>
Study Notes:
Social media is a great tool for staying connected with friends and family, but it also has its downside. The increased level of exposure that people have on social media channels makes it easy for someone to share their personal information. This can lead to a violation of privacy and manipulation of users into sharing their information. In this essay, I will focus on the relationship between using social media channels and becoming a victim of personal information leaking.
As we have advanced technologically over the recent decades, various social platforms have emerged that have enabled us to interact and share information with other people even if we are continents apart. Some of these social networks include LinkedIn, Facebook, Twitter, Instagram, and WhatsApp among many others. When a user wants to become a member of any of these media channels, they are usually asked to open a new user account that will host their personal information. Some, like Twitter and Facebook, may tend to lean on the social perspectives of the person such as personal interests and likes. On the contrary, others, particularly LinkedIn, are centered more on the professional perspectives of the user. In either way, a user may be required to share their personal information with the host.
So, how does a person become a victim of sharing personal information? Any other user who accepts to link up with your profile may gain access to your information if you have not restricted who can view them. For example, another third party may be informed of your likes, your interests, your place of residence, and the schools you have attended to among many other things. As a result, the user who has recently joined the social network may be exposed to potential hackers and scammers. In particular, this data posted in a user’s account can be extracted by data aggregators and then used to track the user’s movement over the web. This act is possibly seen in Facebook and Google for their sole purpose of enhancing personalized advertisements.
Another potential crime that comes with the usage of social media is the sharing of personal images and tagging a user’s current location along with it. There are many criminals and abductors in the world, and if their targeted user posts a picture of themselves and the current place they are located at, the chances of the abductors finding the user are high.
Finally, the sharing of personal information such as places of work and professional qualifications of a particular user in channels like LinkedIn may lead to being a target of fake links and other malicious applications. For example, a malicious job link may be shared to a person who is looking for work without them knowing. As a result, their personal information may be encrypted, formatted, or accessed if they accessed the malicious links and/or applications.
While social media channels are a great tool for staying connected, it is important to be aware of the potential risks and take steps to protect your personal information. This includes being careful about what information you share and who you share it with, and being aware of the potential for cyber-crime.

Tags:

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

Our writing team is assembled through a rigorous selection process, where we handpick accomplished writers with specialized expertise in distinct subject areas and a proven track record in academic writing. Each writer brings a unique blend of knowledge and skills to the table, ensuring that our content is not only informative but also engaging and accessible to a general college student audience

Discounted Prices

Competitive pricing is a cornerstone of our service, where we balance affordability with exceptional quality. In offering the best writers at rates that rival other writing services, we ensure that students can access top-notch content without breaking the bank unnecessarily. Our fair and transparent pricing structure is designed to provide value for money, making us a go-to choice for students seeking high-quality writing services at an affordable price.

100% Plagiarism-Free

Academic integrity is paramount to our writing service, which is why we produce original research and writing content for every paper. Each piece of work is carefully written from scratch, ensuring that every sentence, paragraph, and page is authentic and free from plagiarism. Our rigorous quality control process involves thorough scanning of every final draft, guaranteeing that the content meets the highest standards of originality and academic integrity. With keen attention to citation and referencing, we ensure that every source is properly credited, giving you complete peace of mind. We also have the best plagiarism checkers like safeassign and turnitin thus providing similarity score for each paper.

How it works

When you decide to place an order with Homework Ace Tutors, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.