SlideShare une entreprise Scribd logo
1  sur  12
By: YUSUF ISIAKA
DP/IT/13/048A
• It is undoubtable that millions of internet users use social
media platforms daily for self expression, communication
and collaboration. As the revolution in social media
continues, we have to talk about the risk of computer-
mediated communication. Some of this risks are more
unique to social media, why some are relevant to nearly any
forms communication but may take new forms online. As all
social media is hosted somewhere and facilitated by
communication technologies, risks are also relevant to the
intermediaries that operate online platforms and
communication network.
INTRODUCTION
In a layman’s language social media risks can be classified
into two(2) i.e User risks and Service provider risks.
• Involuntary information revelation.
• Involuntary transfer of ownership of personal data or
content to third party.
• Commercial exploitation of user data.
• Identity theft.
• Stalking (online and offline).
• Surveillance by state and third parties.
PRIVACY AND SAFETY
• Harsh criticism and other negative reaction to one’s online
profile by friends and others.
• Usage of sensitive and inappropriate personal or third-party
content in self presentation (including copy-right
infringement).
• Complexity of translating and separating offline roles and
one’s image online.
• Peer pressure to involuntarily disclose personal information
to online network e.g(top friends, religion, relationship
status, e.t.c)
SELF-PRESENTATION
• Ease and speed of posting increases potential for social
blunders.
• Common private behavior crosses easily to public sphear
where it may be considered inappropriate or offensive.
• Insufficient separation of social circle.
• User can run afoul of lose that were previously more often
applied to mass media, professional content producers and
public persons (e.g defamation and sedition laws).
• Copyright infringement.
SELF-EXPRESSION
• Internet service providers and social media sites can be held
liable for copyright infringing or otherwise illegal content
that users post online.
• Active moderation of UGC not very effective and can expose
to greater liability when moderators fails to detect illegal
content.
LIABILITY FOR UGC
• Failure to turn over user data to authorities may results in
fines to the service provider.
• Compliance may also lead to liability when proper
procedure is not followed and user data is shared without
care.
• Commercial use of user data and sharing with third parties
for such purposes may also expose to risk of lawsuit (though
strength of laws on protection of user data vary across
jurisdictions)
USER DATA PROTECTION
• If users feels that the terms of service are not fair or that
the service provider will not protect their data and privacy,
they may switch to other platforms or stage online protest.
• When the terms of service attempt to transfer ownership of
user data and/or UGC to provider, users will likely also
react negatively and possibly also switch to competing
platforms.
USER ALIENATION
To further express my points, various individuals have
made comments that have further open the doors of hidden
social media risks. For example: A police chief in a state in
the United State of America said that because people tend
to post a lot of personal information online, that makes it
an important tool for the police. It can therefore be seen
that personal data are not protected online due to evolving
tracking technologies.
It can therefore be said that social media risks out weight
its advantages.

Contenu connexe

Tendances

Critical Relationships for HR Professionals to Mitigate Risks and Navigate Ch...
Critical Relationships for HR Professionals to Mitigate Risks and Navigate Ch...Critical Relationships for HR Professionals to Mitigate Risks and Navigate Ch...
Critical Relationships for HR Professionals to Mitigate Risks and Navigate Ch...Aggregage
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeParag Deodhar
 
Law review presentation
Law review presentation Law review presentation
Law review presentation Erin O'Gara
 
The Unintended Consequences of Social Networking
The Unintended Consequences of Social NetworkingThe Unintended Consequences of Social Networking
The Unintended Consequences of Social NetworkingLaura Blankenship
 
Ethical and social_issues_in_information_system
Ethical and social_issues_in_information_systemEthical and social_issues_in_information_system
Ethical and social_issues_in_information_systemKwame Afreh
 
Online digital privacy (final)
Online digital privacy (final)Online digital privacy (final)
Online digital privacy (final)onlineprivacy
 
Social Media for Internal Communications
Social Media for Internal CommunicationsSocial Media for Internal Communications
Social Media for Internal CommunicationsJeremy Plotnick
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networksblogzilla
 
The issues of security and privacy in social network
The issues of security and privacy in social network The issues of security and privacy in social network
The issues of security and privacy in social network Noori Sadeq
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Anirudhya Reevu
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecurityBrian Honan
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 

Tendances (15)

Critical Relationships for HR Professionals to Mitigate Risks and Navigate Ch...
Critical Relationships for HR Professionals to Mitigate Risks and Navigate Ch...Critical Relationships for HR Professionals to Mitigate Risks and Navigate Ch...
Critical Relationships for HR Professionals to Mitigate Risks and Navigate Ch...
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Final powerpoint for social media club program
Final  powerpoint for social media club programFinal  powerpoint for social media club program
Final powerpoint for social media club program
 
Law review presentation
Law review presentation Law review presentation
Law review presentation
 
The Unintended Consequences of Social Networking
The Unintended Consequences of Social NetworkingThe Unintended Consequences of Social Networking
The Unintended Consequences of Social Networking
 
Ethical and social_issues_in_information_system
Ethical and social_issues_in_information_systemEthical and social_issues_in_information_system
Ethical and social_issues_in_information_system
 
Online digital privacy (final)
Online digital privacy (final)Online digital privacy (final)
Online digital privacy (final)
 
Social Media for Internal Communications
Social Media for Internal CommunicationsSocial Media for Internal Communications
Social Media for Internal Communications
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
The issues of security and privacy in social network
The issues of security and privacy in social network The issues of security and privacy in social network
The issues of security and privacy in social network
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Case Study
Case  StudyCase  Study
Case Study
 
Social acceptability and e-voting
Social acceptability and e-votingSocial acceptability and e-voting
Social acceptability and e-voting
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 

En vedette

Online Behavioral Weight Loss Strategies Combined with Social Tools Increase ...
Online Behavioral Weight Loss Strategies Combined with Social Tools Increase ...Online Behavioral Weight Loss Strategies Combined with Social Tools Increase ...
Online Behavioral Weight Loss Strategies Combined with Social Tools Increase ...funnypaddle6615
 
Music video script template a2 media adv portfolio
Music video script template a2 media adv portfolioMusic video script template a2 media adv portfolio
Music video script template a2 media adv portfoliomarykatekenny
 
Smartphone apps are key to dialling up innovation
Smartphone apps are key to dialling up innovationSmartphone apps are key to dialling up innovation
Smartphone apps are key to dialling up innovationLorena Tonarelli M.Sc.
 
Building Your Blog With Organic SEO - Fitbloggin 2013
Building Your Blog With Organic SEO - Fitbloggin 2013 Building Your Blog With Organic SEO - Fitbloggin 2013
Building Your Blog With Organic SEO - Fitbloggin 2013 Nicole Bullock
 
Smartphone healthcare
Smartphone healthcareSmartphone healthcare
Smartphone healthcareAdeel Javaid
 
Hintze, Steuer, Mitch Weight doTERRA social media workshop
Hintze, Steuer, Mitch Weight doTERRA social media workshopHintze, Steuer, Mitch Weight doTERRA social media workshop
Hintze, Steuer, Mitch Weight doTERRA social media workshopMitch Weight
 
Keynote slides: The Future of Healthcare
Keynote slides: The Future of HealthcareKeynote slides: The Future of Healthcare
Keynote slides: The Future of HealthcareRoss Dawson
 
How do we see the healthcare's digital future and its impact on our lives?
How do we see the healthcare's digital future and its impact on our lives?How do we see the healthcare's digital future and its impact on our lives?
How do we see the healthcare's digital future and its impact on our lives?Jane Vita
 

En vedette (8)

Online Behavioral Weight Loss Strategies Combined with Social Tools Increase ...
Online Behavioral Weight Loss Strategies Combined with Social Tools Increase ...Online Behavioral Weight Loss Strategies Combined with Social Tools Increase ...
Online Behavioral Weight Loss Strategies Combined with Social Tools Increase ...
 
Music video script template a2 media adv portfolio
Music video script template a2 media adv portfolioMusic video script template a2 media adv portfolio
Music video script template a2 media adv portfolio
 
Smartphone apps are key to dialling up innovation
Smartphone apps are key to dialling up innovationSmartphone apps are key to dialling up innovation
Smartphone apps are key to dialling up innovation
 
Building Your Blog With Organic SEO - Fitbloggin 2013
Building Your Blog With Organic SEO - Fitbloggin 2013 Building Your Blog With Organic SEO - Fitbloggin 2013
Building Your Blog With Organic SEO - Fitbloggin 2013
 
Smartphone healthcare
Smartphone healthcareSmartphone healthcare
Smartphone healthcare
 
Hintze, Steuer, Mitch Weight doTERRA social media workshop
Hintze, Steuer, Mitch Weight doTERRA social media workshopHintze, Steuer, Mitch Weight doTERRA social media workshop
Hintze, Steuer, Mitch Weight doTERRA social media workshop
 
Keynote slides: The Future of Healthcare
Keynote slides: The Future of HealthcareKeynote slides: The Future of Healthcare
Keynote slides: The Future of Healthcare
 
How do we see the healthcare's digital future and its impact on our lives?
How do we see the healthcare's digital future and its impact on our lives?How do we see the healthcare's digital future and its impact on our lives?
How do we see the healthcare's digital future and its impact on our lives?
 

Similaire à SOCIAL MEDIA OUT WEIGHT ITS ADVANTAGES

A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...ijsptm
 
Resourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docx
Resourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docxResourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docx
Resourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docxdebishakespeare
 
2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...
2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...
2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...Matthijs Van Bergen
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET Journal
 
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data SecurityIRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data SecurityIRJET Journal
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a baneAbhishek Sharma
 
Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010James Williams
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime finalKudakwashe Shamu
 
Social Media For Utilities: Law and Practices
Social Media For Utilities: Law and PracticesSocial Media For Utilities: Law and Practices
Social Media For Utilities: Law and PracticesCarolyn Elefant
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online socialijsptm
 
Application domain
Application domainApplication domain
Application domainnajmifarha6
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
 
How do you think the use of cloud computing can affect individuals, a.pdf
How do you think the use of cloud computing can affect individuals, a.pdfHow do you think the use of cloud computing can affect individuals, a.pdf
How do you think the use of cloud computing can affect individuals, a.pdfPRATIKSINHA7304
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET Journal
 
Social Media Policy and Guidelines
Social Media Policy and GuidelinesSocial Media Policy and Guidelines
Social Media Policy and GuidelinesCurt Montague
 

Similaire à SOCIAL MEDIA OUT WEIGHT ITS ADVANTAGES (20)

A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
 
Digital Fault-Lines
Digital Fault-LinesDigital Fault-Lines
Digital Fault-Lines
 
Resourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docx
Resourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docxResourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docx
Resourcescomputeruse2_Unit III Publisher 4 (Project 9-4).docx.docx
 
2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...
2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...
2013 5-30 co e presentation matthijs van bergen net neutrality in the netherl...
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
 
549 458-465
549 458-465549 458-465
549 458-465
 
IRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data SecurityIRJET- Private Social Media and Data Security
IRJET- Private Social Media and Data Security
 
Social Media Risks
Social Media RisksSocial Media Risks
Social Media Risks
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 
Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010
 
Reading Log
Reading Log Reading Log
Reading Log
 
Towards an understanding of cyber crime final
Towards an understanding of cyber crime finalTowards an understanding of cyber crime final
Towards an understanding of cyber crime final
 
Social Media For Utilities: Law and Practices
Social Media For Utilities: Law and PracticesSocial Media For Utilities: Law and Practices
Social Media For Utilities: Law and Practices
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online social
 
Application domain
Application domainApplication domain
Application domain
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
 
How do you think the use of cloud computing can affect individuals, a.pdf
How do you think the use of cloud computing can affect individuals, a.pdfHow do you think the use of cloud computing can affect individuals, a.pdf
How do you think the use of cloud computing can affect individuals, a.pdf
 
Digital Divide.pptx
Digital Divide.pptxDigital Divide.pptx
Digital Divide.pptx
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
 
Social Media Policy and Guidelines
Social Media Policy and GuidelinesSocial Media Policy and Guidelines
Social Media Policy and Guidelines
 

Dernier

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 

Dernier (20)

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

SOCIAL MEDIA OUT WEIGHT ITS ADVANTAGES

  • 2. • It is undoubtable that millions of internet users use social media platforms daily for self expression, communication and collaboration. As the revolution in social media continues, we have to talk about the risk of computer- mediated communication. Some of this risks are more unique to social media, why some are relevant to nearly any forms communication but may take new forms online. As all social media is hosted somewhere and facilitated by communication technologies, risks are also relevant to the intermediaries that operate online platforms and communication network. INTRODUCTION
  • 3. In a layman’s language social media risks can be classified into two(2) i.e User risks and Service provider risks.
  • 4.
  • 5. • Involuntary information revelation. • Involuntary transfer of ownership of personal data or content to third party. • Commercial exploitation of user data. • Identity theft. • Stalking (online and offline). • Surveillance by state and third parties. PRIVACY AND SAFETY
  • 6. • Harsh criticism and other negative reaction to one’s online profile by friends and others. • Usage of sensitive and inappropriate personal or third-party content in self presentation (including copy-right infringement). • Complexity of translating and separating offline roles and one’s image online. • Peer pressure to involuntarily disclose personal information to online network e.g(top friends, religion, relationship status, e.t.c) SELF-PRESENTATION
  • 7. • Ease and speed of posting increases potential for social blunders. • Common private behavior crosses easily to public sphear where it may be considered inappropriate or offensive. • Insufficient separation of social circle. • User can run afoul of lose that were previously more often applied to mass media, professional content producers and public persons (e.g defamation and sedition laws). • Copyright infringement. SELF-EXPRESSION
  • 8.
  • 9. • Internet service providers and social media sites can be held liable for copyright infringing or otherwise illegal content that users post online. • Active moderation of UGC not very effective and can expose to greater liability when moderators fails to detect illegal content. LIABILITY FOR UGC
  • 10. • Failure to turn over user data to authorities may results in fines to the service provider. • Compliance may also lead to liability when proper procedure is not followed and user data is shared without care. • Commercial use of user data and sharing with third parties for such purposes may also expose to risk of lawsuit (though strength of laws on protection of user data vary across jurisdictions) USER DATA PROTECTION
  • 11. • If users feels that the terms of service are not fair or that the service provider will not protect their data and privacy, they may switch to other platforms or stage online protest. • When the terms of service attempt to transfer ownership of user data and/or UGC to provider, users will likely also react negatively and possibly also switch to competing platforms. USER ALIENATION
  • 12. To further express my points, various individuals have made comments that have further open the doors of hidden social media risks. For example: A police chief in a state in the United State of America said that because people tend to post a lot of personal information online, that makes it an important tool for the police. It can therefore be seen that personal data are not protected online due to evolving tracking technologies. It can therefore be said that social media risks out weight its advantages.