{"id":48947,"date":"2022-08-02T13:32:00","date_gmt":"2022-08-02T13:32:00","guid":{"rendered":"https:\/\/www.essaybishops.co.uk\/?p=48947"},"modified":"2022-11-02T13:34:07","modified_gmt":"2022-11-02T13:34:07","slug":"social-media-usage-and-cyber-crime","status":"publish","type":"post","link":"https:\/\/www.homeworkacetutors.com\/assessments\/social-media-usage-and-cyber-crime\/","title":{"rendered":"Social media usage and cyber-crime"},"content":{"rendered":"<p>Social media usage and cyber-crime<\/p>\n<p>Introduction<br \/>\nWith the increased level of exposure that people have on the current social media channels, it is very easy for a particular person to easily share his or her information. For example, the introduction of media channels that are more into gaining access to the users\u2019 data such as Facebook, WhatsApp, and Telegram applications among others, the chances of violation of the users\u2019 privacy as well as manipulating them into sharing their information is very high. In this essay, I shall focus on the description of the relationship between utilizing diverse social media channels and becoming a victim of personal information leaking.<br \/>\nCyber-crime as a result of using social media<br \/>\nAs we have advanced technologically over the recent decades, various social platforms have emerged that have enabled us to interact and share information with other persons even if we are continents apart. Some of these social networks include LinkedIn, Facebook, Twitter, Instagram, and WhatsApp among many others. Most of them can be accessed through the web by using computers and laptops while others are more user-friendly in smart mobile devices. When a user wants to become a member in any of these media channels, he or she is always asked to open a new user account that will host his or her personal information. Some, like Twitter and Facebook, may tend to lean on the social perspectives of the person such as personal interests and likes. On the contrary, others, particularly LinkedIn, are centered more on the professional perspectives of the user. In either way, a user may be required to share his or her personal information with thehost (Garcia, 2017).<br \/>\nSo, how does a person become a victim of sharing personal information? One may ask such a question. Well, any other user who accepts to link up with your profile may gain access to your information if you have not restricted whom to view them. For instance, another third party may be informed of your likes, your interests, your place of residence, and the schools you have attended to among many other things. As a result, the user who has recently joined the social network may be exposed to potential hackers and scammers. In particular, this data posted in a user\u2019s account can be extracted by the data aggregators and then used to track the user\u2019s movement over the web. This act is possibly seen in Facebook and Google for their sole purpose of enhancing personalized advertisements.<br \/>\nAnother potential crime that comes with usage of social media is the sharing of personal images and tagging a user\u2019s current location along with it (Sun, et al., 2017). There are many criminals and abductors in the world that we live in. Thus, if their targeted user posts a picture or him or herself and the current place he or she is located at, the chances of the abductors may be high in finding the user.<br \/>\nFinally, the sharing of personal information such as places of work and professional qualification of a particular user in channels like LinkedIn may lead to being a target of fake links and other malicious applications (Leonardi, 2017). For example, a malicious job link may be shared to a person who is looking for work without him or her knowing. As a result, his or her personal information may be encrypted, formatted, or accessed if he or she accessed the malicious links and\/or applications.<\/p>\n<p>References<br \/>\nGarcia, D. (2017). Leaking privacy and shadow profiles in online social networks. Science advances, 3(8), e1701172.<br \/>\nLeonardi, P. M. (2017). The social media revolution: Sharing and learning in the age of leaky knowledge. Information and Organization, 27(1), 47-59.<br \/>\nSun, G., Xie, Y., Liao, D., Yu, H., &amp; Chang, V. (2017).User-defined privacy location-sharing system in mobile online social networks. Journal of Network and Computer Applications, 86, 34-45.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social media usage and cyber-crime Introduction With the increased level of exposure that people have on the current social media channels, it is very easy for a particular [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6037],"tags":[7165],"class_list":["post-48947","post","type-post","status-publish","format-standard","hentry","category-essay-writer-uk","tag-social-media-usage-and-cyber-crime"],"_links":{"self":[{"href":"https:\/\/www.homeworkacetutors.com\/assessments\/wp-json\/wp\/v2\/posts\/48947","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.homeworkacetutors.com\/assessments\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.homeworkacetutors.com\/assessments\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.homeworkacetutors.com\/assessments\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.homeworkacetutors.com\/assessments\/wp-json\/wp\/v2\/comments?post=48947"}],"version-history":[{"count":1,"href":"https:\/\/www.homeworkacetutors.com\/assessments\/wp-json\/wp\/v2\/posts\/48947\/revisions"}],"predecessor-version":[{"id":48950,"href":"https:\/\/www.homeworkacetutors.com\/assessments\/wp-json\/wp\/v2\/posts\/48947\/revisions\/48950"}],"wp:attachment":[{"href":"https:\/\/www.homeworkacetutors.com\/assessments\/wp-json\/wp\/v2\/media?parent=48947"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.homeworkacetutors.com\/assessments\/wp-json\/wp\/v2\/categories?post=48947"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.homeworkacetutors.com\/assessments\/wp-json\/wp\/v2\/tags?post=48947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}