Monday, April 19, 2021

Privacy, On and Off

 Privacy, On and Off

 

 

    Since technology has evolved from the telephone in 1876, the start of radio in 1894, the TV in 1927, the first iPhone in 2007 to today’s technology that is known as Alexa, it has become disturbingly easier to find out where your friends are. We feel as if we need to know more about people and what they are doing because we feel insecure. The expanding acclaim of social media has fascinated a tremendous number of people that all seek to compete with one another on a daily basis to show that their life is better than someone else’s. Social media can be a really toxic space at times. This info provides opportunities for analysts and access providers to investigate and better perceive customers’ attitudes. However, publishing user-generated data risks exposing individuals' privacy. Users’ privacy in social media is an emerging issue and has attracted increasing attention in recent years.


New research has shown the vulnerability of user-generated data against the two general styles of cyber attack: identity disclosure and attribute disclosure. These privacy issues mandate that social media data publishers safeguard users' privacy by sanitizing user-generated data before publishing it. Consequently, various protection techniques have been proposed to anonymize user-generated social media data. There's an enormous amount of literature on issues relating to the privacy of users in social media from many perspectives. In the article, “Privacy in Social Media: Identification, Mitigation and Applications,” the authors survey the key achievements of user privacy in social media. They discuss open problems and future research directions for user privacy issues in social media. An extensive compilation of human conduct data by associations severely boosts privacy concerns. Tracking behavior is a crucial part of the big-data economy, which enables corporations and industries to sector, portray, and grasp their users in progressively greater detail. It has been confirmed that representing the background and interests of users has various commercial advantages. People who randomly follow you could potentially be just a fake account that wants to try and get as much information out of you as possible by sending you links to a website through Instagram Direct Message that can hack into your phone. Large organizations as well as different users want to accumulate data on individuals for various reasons and can do so effectively due to the absence of protection on social media. People want to take advantage of others when they don’t give them the respect that they want. An example I can give is in the video, “Darieth Chisolm: How Revenge Porn Turns Lives Upside Down.” Darieth Chisholms' manipulative, jealous, stalker ex-boyfriend posted a website with her name on it and included nude photos of her while she was living with him in Jamaica. A few months prior to that, he had threatened to kill her and stab her in the heart. This is what’s called ‘Digital Domestic Violence.’ It typically starts when someone that can’t take rejection and can’t physically touch the person they want to harm uses electronic weapons (IPhones, laptops, cameras, etc.). They are able to find information about others that leaks online, and they can edit and post it whenever they feel like. That’s why many people say, “you have to be careful what you post on social media,” because anything that causes controversy spreads like wildfire, and it can do damage to someone’s reputation based on the severity of the situation.

No comments:

Post a Comment

My Presence on Social Media           I use social media to keep myself updated on things that are important to me: my friends; what they’re...