Analyzing Cybersecurity in Social Networking Platforms

Verified

Added on  2020/04/21

|6
|948
|227
AI Summary
The assignment delves into two key articles discussing the impact and evolution of the Internet and social media on society. The first article by Natalie Fenton highlights the transformative role of the Internet and social networks in democratizing information dissemination, emphasizing the rise of Web 2.0 technologies like blogs, wikis, and social-networking sites that foster collaboration and communication. However, it also notes a deterministic view where the full potential of the Internet has yet to be fully realized in a transformative manner. The second article by Jose van Dijck focuses on Facebook's model of sharing over privacy, exploring how its business strategies often prioritize data exploitation for profitability. It highlights concerns about user consent and privacy implications, pointing out the tension between user engagement and data mining practices. Together, these articles provide insights into the dual nature of social media platforms as tools for connectivity and potential risks to personal privacy.
Document Page
Running head: CYBER SECURITY
Cyber Security
Name of the student:
Name of the university:
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1CYBER SECURITY
The Internet and social networking – Natalie Fenton:
The internet has brought various methods to collect and report the information. Further, it is
referred to as the new journalism open to the novices, lacking editorial control and has been
stemming from anywhere. The internet with the social networking has included new techniques of
writing, functioning in the network with millions of fragmented audiences. Thus it is an ideal
democratic model of the current times. This with the social networking services has been building
the online communities of the people sharing interests or activities who have been interested in
exploring the activities and interests of others. Maximum of this has been based on web and
delivering various ways in which users could interact with instant messaging, email and others.
The article shows that the Internet has been a productive resource to teach and learn. The
internet along with social networking is perceived as the second generation web design and web
development. It has been characterized as the information sharing, facilitating communication, user-
centered design, communication and the collaboration on World Wide Web. This has led to the
developing and the evolving of the web based communities, web applications and hosted services.
Instances of this include the video-sharing sites, social-networking sites, blogs, wikis, folksonomies
and mashups.
The rise of this technology is spectacular according to the author. There have been about 1.5
billion internet users around the world. It has mainly the latest phenomenon of high significance for
the social, political and economic life of the current society. Despite all this, the article has taken a
deterministic perspective and assumed that the potential of the Internet has realized in an effectively
transformative manner.
Document Page
2CYBER SECURITY
This new application has been making an essential benefit of the platform, delivering the
software as the continually upgraded service. It is getting better the more people have been using
that. It has been remixing and consuming the data from various sources. This includes the individual
users, providing their services and data in a form allowing the remixing by the others. Further, it is
the revolution of business the industry of computers that is caused by the move to the Internet as the
platform. Moreover, the author ends by saying that it is the attempt of understanding the rules of
success on that platform. The chief among the states is the build applications harnessing the effects
of the network for getting more and more developed as the more people have been using them.
Document Page
3CYBER SECURITY
Facebook and the imperative of sharing – Jose van Dijck:
The article shows that the sharing, instead of privacy has become a norm. Facebook’s
foundation has been by sharing, transparency and social information. Thus the influence of the site
has provided its dominance over the perceptions of the privacy under the digital spaces. The users
and the technology pointed to various cases where the social networking site changes its policies.
They have also opened their user information to the external agencies. Then, Facebook was bound to
apologize for those transgressions after the users voiced all their outrages. Thus it was clear to the
users that the site has been serving the interests of the organizations instead of its users.
The author also noted that the content element has been dealing with various redesigns and
the present timelines. Here all the things that someone gas entered to Facebook could be fetched in a
biographical interaction lineage. The design choices shaped the content and the user’s reactions. The
design has been able to change or form the information. Further, the ownership has been playing
slowly to influence Facebook. This has been not only on the content and the users but also the other
businesses too.
Van Dijck demonstrated that the business model of Facebook had been most notably the
hostile balancing act. This has been acting between the activity of the stimulating users and
exploiting that. The success has been depending on the willingness of the customers for contributing
the data allowing the most of the data mining. The Facebook has been losing its efficiency as the
platform. However, the ideology and structure have spread smoothly across the properties of the
online sociality. This indicates that the influence would sustain for some time as per the discussion.
However, Facebook has needed the users for their contents and data for being profitable.
However, there is a debate that how long before the privacy concerns have turned out to be enough
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4CYBER SECURITY
for the users for leaving the spaces for that they have been feeling is less exploitive. More research
of the alternative on this article must shed light on the places what Facebook could achieve in the
upcoming few years. Thus it has possessed a critical past on the social media. Further, some
speculations could aid in better understanding of the previous history.
Document Page
5CYBER SECURITY
Bibliography:
Fenton, N., 2012. The internet and social networking. Misunderstanding the internet, pp.123-148.
Van Dijck, J., 2013. Facebook and the Imperative of Sharing. The Culture of Connectivity: A
Critical History of Social Media.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]