Uploaded by Jay Marc Nojada

How Social Media Violate Our Privacy

advertisement
“Does social media violate our privacy?”
Everyone has personal secrets that they are unwilling to share with others. This
secret is legally referred to as privacy, and it can take many forms, including personal
privacy, diary, picture album, living habits, communication secrets, and physical
deformities. Their secret, which they do not want others to know, is their rights; this
right is referred to as privacy.
Today's civilization is incompatible with privacy, security, and ease in dealing
with the digital era. Indeed, one of the primary driving forces is using and spreading
social media platforms such as Facebook, Instagram, and Twitter. That said, the
concept of information protection is critical, as these networks collect a great deal of
information about their members. For instance, in the Facebook News Feed, which is
very similar to other social networking sites, some settings allow you to tweak security
settings and information so that it is not restricted or restricted at all times.
Without a doubt, social media is a highly effective instrument for facilitating
information sharing. Indeed, social media has aided in accomplishing current aims that
would not have been possible without social media, at least not within such timelines.
For example, social media platforms such as Twitter and Facebook have been used to
organize rallies that resulted in the overthrow of African rulers. However, social media's
saw cuts back and forth and can infringe on users' privacy. Additionally, social media
users have little control over their privacy, as information shared on social media is
instantly accessible to billions of users. Unsurprisingly, memes can go viral within hours
of their publication, wreaking havoc on the parties involved. While it is difficult to
protect users from such privacy violations, the world should examine the role of social
media in terms of user privacy and security.
Information sharing on social media platforms may aid in the building and
strengthening of communities. However, if the information is shared with strangers,
the same may pose imminent concerns to users' security and privacy. Too much
information published in a typically unregulated social media arena creates barriers
that infringe on the privacy of those participating. For example, it is exceptionally usual
to come across court cases based on information gathered from social media, most
notably during divorce proceedings. Photographs of friends drinking at a party may
reappear during a divorce court hearing and be used to determine child custody, for
example. In other cases, employees seeking a competitive edge in job promotion may
use social network information to disqualify their competitors. These examples
demonstrate the fundamental essence of social media as a potentially problematic
platform in terms of privacy protection. People are particularly vulnerable to the
challenging privacy dilemma, owing to inadequacies in current rules.
Nonetheless, the invasion of social media users' privacy extends to criminal
activity within and outside the country. These individuals are constantly on the lookout
for vulnerabilities to exploit by identifying simple targets to assault. The proprietors of
social media firms believe that increasing the ability to exchange information will result
in more earnings. Additionally, they are on the lookout for ways to improve the
efficiency with which social media platforms share information. Most of these websites
are constructed in a coercive manner that manipulates and taunts users to share their
data and opinions on shared issues. For instance, a user's buddy list and posts may
convey a great deal of information about them. Posting and liking patterns may also
express diverse tastes and ideas among concerned individuals.
Today, social media platforms have promoted the usage of online transactions
as another revenue stream for their businesses. This development increases the
likelihood of privacy infringement, hence amplifying the hazards connected with it.
Each transaction made on social media platforms collects personal information that
could be exploited, posing a threat to the user's privacy. It is relatively common for
internet businesses to send annoying emails and messages to their subscribers whenever
they introduce new products, with little regard for the user's consent. The usage of
social media sites may also pose a security risk, as users may post sensitive information
such as credit card numbers that could fall into the wrong hands. These websites are
designed in such a way that they optimize information collecting for each interaction
or transaction conducted by users. As a result, social media provides a heightened risk
of privacy invasion.
Social media is more than a means of communication and socialization. Indeed,
despite their role in community building, social media platforms serve as a conduit for
the loss of personal information among users. Additionally, social media platforms are
built to maximize user interaction, which results in the collection of as much
information as possible from users. Each transaction or interaction made via social
media has the potential to violate the user's privacy. Indeed, it is pretty typical for
information gleaned from social media to be used to make far-reaching decisions
outside of these spheres. For example, despite being an insult to users' privacy, the use
of images posted on social media as evidence in divorce court proceedings is increasing.
Social media contributes directly to the invasion of users' privacy.
Social media platforms are designed in such a way that data mining is
encouraged. This is not to say, however, that privacy invasion via social media is
impossible. One of the more practical ideas is to create restrictions governing social
media corporations' usage of private information. Additionally, the government should
guarantee that businesses adhere to existing legislation governing the management of
confidential user information and refrain from disclosing it to third parties.
Download