Aveneu Park, Starling, Australia

Potential any missing information on their profile. This is

Potential IT and
industry implications of privacy and social media

For the IT
industry, privacy is one of the important steps to take action on as the social
networking services must be aware of reputational, legal and operational risks.
This includes the services collecting a user’s data and not passing their
information to a third-party. The companies must take a proactive approach to
managing privacy issues in order to keep the networks secure for the users and
prevent hackers from creating an invasion of privacy using malware (Essink
& Müller, 2016)

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Some of these
implications of privacy include identify theft and phishing. Rainey Reitman
(2010), says the hackers can view private profiles however these photos can be
searchable using tags on their photo captions and from this, the cybercriminals
can have access to the photos. However he also said that some users have
restrict to their social media profiles and have control to their profile
rather than the website’s engineers. The cybercriminals also tend to use
shortened URLs to trick their victims into visiting harmful sites or to inject
viruses into their computers or mobile phones. Hackers also use spyware to gather
passwords from users in order to access their account on social media (Cohen,
2017).

Bethany Brookshire,
a blogger for ScienceNews (2017), claims that privacy is no longer a personal
choice. She made this statement as some sites has the user’s information
without being aware that is being shared on their profile. This happened due a
bug found on Facebook back in 2013 which shared the e-mail address and phone
number of some users with all of their friends despite that their personal
details were private. This include that some users have noticed that their
phone numbers were attached to their Facebook profile even though they have
never entered their number when registering to the site. This is because
Facebook collected the users from contact lists which were provided by their
friends which allowed the site to fill any missing information on their
profile. This is known as a “shadow profile”.  Brookshire also stated that this kind of bug
can be re-enacted on other social networking sites. She noted down that this
bug can also predict information such as the user’s marital status and sexual
orientation by stating that married people are normally friends with other
married couples on the sites and gay men are more likely to be friends with
other gay men. This implies that these sites can collect the user’s information
despite them not adding their information on their profiles. To prevent these
issues happening, Gail-Joon Ahn (2011) says the sites must bring a depth of security
experience form multiple security domains and technologies in order to protect
the user’s information that is only visible to friends and ensure a safe
browsing for the users by sharing content to others without requiring them to
be friends on the site.

x

Hi!
I'm Edward!

Would you like to get a custom essay? How about receiving a customized one?

Check it out