Social Media Privacy and Security Concerns

The internet is a world-wide used database that allows users from all over the world to access all sorts of information. Social media is one of the largest communication channels that allows users to share content and maintain an interactive lifestyle with others. Along with social networking, concerning factors such as online privacy and security should be considered. Unfortunately, online privacy has gradually become a significant issue over the past years, with the countless amounts of online hacking's, confidential information being stolen, data security being invaded, users nowadays are not completely secured.

Private versus Public Settings

Websites, profiles, emails and such now provide one with filters that allow the user to control. Users can determine what content they wish to share and to whom the content will be accessed by.

Research is currently being done to determine what influences social privacy and security and who is most likely to keep accounts private. ‘A study of global Twitter users’ conducted a research on 3.3 million Twitter accounts, the results revealed cultural and societal differences. They observed that privacy setting in collectivist societies (which focuses on groups rather than individuals) effectively encouraged self-disclosure. On the contrary, it appeared to be less important for users in individualistic societies. From this information one can conclude that regardless of the account settings, it is the individuals call on what type of security method they wish to use. They have the choice to keep their information on private so they can manage who see's what or they can maintain a public profile so others could see. From the research data collected they concluded that the individuals surroundings also influences their privacy mode and effected how they portrayed their identity on social media. Therefore, it is important for an individual to regulate what they share on media because with a simple click on the 'share' button your information is a grabs for anyone who wished to view it.

The Truth Behind an Individuals Profile Picture

Be aware of who you are communicating with while on media. Behind the device may lie someone with bad intentions and you may be their victims.

Exposing information on social media automatically puts your personal information in the hands of others. Erving Goffman, a social psychologist from the article, Blurred Boundaries: Social Media Privacy and the Twenty-First-Century Employee explains that social establishment is… “any place surrounded by fixed barriers to perception in which a particular kind of activity regularly takes place”. Goffman was able to conclude through these performances that individuals tailor their ‘social identities’ based on the people they interact on the media. People tend to have a different personality when using media. This double-identify draws a whole lot of concerns since it makes one wonder if we can even trust someone over social media. For examples, strangers you encounter on social media might identify themselves as someone completely different just to get the attentions of who they desire. Due to the rapid technological advances and high tech programming it has become easier for others to invade one’s information.

Privacy Management

Think Before you post !

More and more people are becoming engaged. The increasing number of online users has raised many inquiries which is why research is being conducted on this topic. The Technological University of Mara in Malaysia, concluded from a research that the data security and privacy depends on the user and if they decide to perceive privacy control on their profiles. The study revealed positive correlation between security and the individual’s privacy management. It is evident based on all the research findings that social media users need to be in control of what they share and who they allow access to. Managing social privacy can be a complex yet endeavor thing. In addition, The Communication Privacy Management (CPM) from the University explored the relationship between lurking on Facebook and the Facebook privacy management. According to the results from all 383 participants, they observed that much concern was seen in mediated lurking and Facebook privacy management. These inartistic proofs are evident that individuals who are highly concerned with their accounts will more likely implicate certain social media security and privacy constraints on their accounts and regulate the content they share.

What You Post DOES Matter

One post can change everything

It is frightening to realize that our online profiles, posts and shares could infringe our professional life and can potentially lead us to not attaining a job. The article titled, Blurred Boundaries: Social Media Privacy and the Twenty-First-Century Employee states, “boundary-crossing” technologies blur the already elusive line between the private and the public, the home and the workplace. That private personal information that was previously segregated has now becomes easily accessible to employers, colleagues and clients. There no longer consists a barrier between social performances and professional expectations. It is our duty as professionals and media users to be aware of the information being exposed because it can infringe our daily life’s. Although still many people may not care about what they post, it is important to realize that it can be the determining factor of getting a job or not.

Social media is of great use when used appropriately

2017 English 102 Final

Created By
Nayleth Guadalupe Ramirez


Created with images by LoboStudioHamburg - "twitter facebook together" • FutUndBeidl - "Secure Cloud Computing" • TeroVesalainen - "finger smartphone screen" • TeroVesalainen - "mindmap brainstorm idea" • geralt - "mobile phone smartphone keyboard" • socialautomotive - "social-media-statistics-moments-2014"

Report Abuse

If you feel that this video content violates the Adobe Terms of Use, you may report this content by filling out this quick form.

To report a Copyright Violation, please follow Section 17 in the Terms of Use.