The Popularity Of The Social Networking

Words
1813 (4 pages)
Downloads
81
Download for Free
Important: This sample is for inspiration and reference only

Table of contents

Social Networking

The popularity of the social networking sites hyperbolic speedily within the last decade. This can be most likely because of the explanation that school and university students yet as teens used it extensively to induce world access. These social networking sites like Twitter and Facebook became a raging craze for everybody these days.

The negative effects of those social networking sites over weigh the positive ones. These sites have caused some potential hurt to society. The scholars become victims of social networks additional usually than anyone else. This can be thanks to the explanation that once they area unit finding out or looking their course material on-line, they get interested in these sites to kill the tedium in their study time, fun their attention from their work. Alternative negative aspect effects of social networking websites embrace the subsequent:

Reduced learning and research capabilities

Students have started relying additional on the data accessible simply on these social networking sites and therefore the internet. This reduces their learning and analysis capabilities. Multitasking Students United Nations agency get entangled in activities on social media sites whereas finding out lead to reduction in their focus of attention. This causes reduction in their educational performance, and concentration to review well.

Reduction in real human contact

The longer the scholars pay on these social media sites; the less time they'll pay socialization face to face with others. This reduces their communication skills. They’ll not be ready to communicate and socialize effectively face to face with others. The employers are becoming additional and additional unhappy with the communication skills of the recent graduates thanks to this reason. The effective communication skills square measure key to success within the planet.

Low grades

Students get low grades in class because of lack of the specified info and writing skills. Loss of motivation in students. The student’s psychological feature level reduces thanks to the utilization of those social networking sites. They think about the virtual setting rather than gaining sensible data from the important world.

Electronic Extortion as general an Oman is an Example

Electronic has led to the rise of many of the problems in recent times, the most projecting of these problems is electronic extortion, which is a threat and coercion of someone to perform or leave the forced use of the means of information technology or the information network. But why does the extortionist resort to exploiting and blackmailing people? The extortionist's goals are often met, but the extortionist often extorts people in order to steal money from them, a physical goal, or to force them to do things. There is also an emotional goal, and the extortionist resorts to this only because there is little religious reason or desire to take revenge Emotional failure with them.

How is extortion done? The most common picture is that the addressee collects pictures, videos, audio recordings or personal information through e-mail and social networking programs such as Twitter, Instagram and others. The extortionist then threatens people to publish what they collect unless the victim meets his or her conditions. Many people are subject to errors that cause them to be e-blackmailed: Select weak passwords, so hackers can access people's data easily, open any links to them without ensuring the integrity of the link, and not use programs that protect personal data, so everyone should not publish any of his personal data to the public and not open suspicious links.

E-extortion is increasing and growing with the increasing number of social networking programs and their development, as they are widely distributed and used in a non-civilized way by large numbers of people, thus increasing the rate of extortion. Not only was the extortionist young, it also targeted the young people, through the offers of free downloads and games that attract and attract children, the extortionist can steal personal information and pictures and others. In this sense, the family must play its conscious role by activating the parental control that protects personal and private information. They must follow the websites visited by the children and the programs they deal with, and they must take full care to educate their children and warn them of the dangers of the network as abuse and indifference.

The role of social institutions remains in educating people about the danger of extortion and increasing the focus on this phenomenon, which almost kills people who are exposed to the phenomenon of electronic extortion, and the use of various means to educate people, such as the use of visual presentations dealing with this phenomenon. While people are subject to extortion, they must inform the competent authorities of extortion, while keeping the letters as evidence. However, some people hesitate to inform the competent authorities. This makes the extortionist exploit the weakness of these individuals and repeat the electronic extortion with them. Is reluctant to report what happened with him and not to worry and trust in God - the Almighty - and the competent authorities and then report the exposure of blackmail.

No time to compare samples?
Hire a Writer

✓Full confidentiality ✓No hidden charges ✓No plagiarism

Locally, the land has taken a keen interest within the development of extortion to scale back it by raising awareness regarding social media and imposing deterrent penalties for people who extort electronic. Article eighteen of the IT Crimes Act stipulates: "A penalty of not but one month shall be tortured by imprisonment 3|for 3} years and a fine of not but one thousand riyals and no more than three thousand riyals or one among these penalties. Anyone UN agency uses the data network or the means that of knowledge technology to threaten or blackmail someone to induce him to try and do or abstain from doing therefore, the penalty shall be imprisonment for a amount of not but 3 years and no more than 10 years and a fine not but 3 thousand Omani rails and no more than 10 thousand Omani if the threat of committing a crime or assignment things prejudicious to honor or thought.

Negative impacts of:

Anonymity

without a right name or identity or a name that is ambiguous. In other words, the person hides her/his right name and put a nick name which makes his/her real identity anonymous. Also, the negative effects of non-disclosure of real identity, allows people to hide and the inability to identify and access them and have full freedom to practice the tricks. Also communicate in social networking sites without revealing their identity and cause problems and controversy between users of social networking programs and international political problems also intervene and spread sedition using fake accounts are not real. [3]

Intellectual property

The piracy is the act of illegally copying someone product without permission. Copying someone’s idea and projects, internet challenges is scanning one’s computer and capture the information from the Pc by using the internet. Also, Tendency to make profits if someone not honest business copying the Products without permission of the author. All licenses must be 'got some information about' to guarantee there are no present licenses of a close sort – fuses good 'ol fashioned charges Not conceivable to ensure that a patent (once allowed) is critical, it can be extremely attempted and denied without any discounts It is still up to the producer to ensure a patent on the off chance that they can perceive an encroachment [4]

Type of Perpetrators

Hackers

Are people UN agency take a look at the constraints of systems out of intellectual curiosity to check whether or not they will gain access and the way so much they will go. -not all folks decision themselves "hacker" burgled systems or commit. Computer crimes. Indeed, the term hacker originally meant anyone UN agency Loved computing, and adored creating programs. However, those who break In to systems UN agency are belong to perpetrators additionally decision themselves hackers and They visit their tools as “hacking programs" and "Hacking worksheets".

TWO types of HACKER BLACK-HAT could be a term in computing for somebody UN agency compromises the safety of a system while not permission from a certified party, sometimes with the intent of accessing computers connected to the network. WHITE-HAT is employed for someone UN agency is ethically against the abuse of laptop systems.

Crackers

Break into other people’s networks and systems, deface web pages, crash computers, spread harmful programs or hateful messages and write scripts and automatic programs that let other people do this thing. A person who engages in illegal or unethical circumvention of computer security systems (through passwords, systems or security, or software) INSIDER

Hijackers

Careless staff violates company policies by moving sensitive knowledge to unprotected locations (e.g., computers or public cloud storage). They will inadvertently expose this knowledge to dangerous actors internal to a corporation or external partners and contractors. Compromised staff square measure people who square measure stealing knowledge for Associate in Nursing external supply, and could be a quite common kind of knowledge loss. The attacks square measure usually long-run, moving tiny amounts of knowledge over a protracted time.

Hacktivists

The act of ending malicious cyber activity to market a political agenda, religion, or social ideology. Because the cyber threat landscape continues to evolve, the flexibility to watch, detect, and defend against cyber attacks has currently become additional arduous than ever. These cyber attacks became additional refined, as square measure the actors behind them, and therefore the tools, techniques, and procedures (TTPs) they use. Of the various cyber threats that our society faces, hacktivism continues to be one among the foremost important. Cyber attacks by hacktivists square measure at associate incomparable high. With the employment of social media, hacktivists will currently unfold the word and recruit across the world with one tweet or a Facebook post to hold out their agenda driven attack. one among the foremost well-known hacktivist teams, ‘Anonymous,’ has been ending their cyber campaigns since 2003 and still be the foremost active and distinguished hacktivist cluster. Understanding the mentality of a hacktivist is important and though they symbolize a definite “moral” cause, they're still hackers and a few with elite hacking ability.

Spywares

There doesn't appear to be a agreement a few definition for spyware however in loose terms it's a chunk of software package that gathers data a few computer’s use and relays the knowledge back to a 3rd party, for instance with the intention of tailor-made advertisements. Another example of spyware may be a thus known as key lumberjack that might introduce backdoors to a system by causing a user’s keystrokes to the leader of the attack. Some formal definitions that a lot of or less agree on what spyware is: software package that gathers data concerning use of a pc, sometimes while not the data of the owner of the pc, and relays the knowledge across the net to a 3rd party location. Applications that lurk within the background and capture everything from keystrokes to the URLs of websites I visit. Spyware is software package, put in by a 3rd party while not the user’s absolutely consent, with covert subroutines that track a host’s net activity and send the knowledge to a master .

You can receive your plagiarism free paper on any topic in 3 hours!

*minimum deadline

Cite this Essay

To export a reference to this article please select a referencing style below

Copy to Clipboard
The Popularity Of The Social Networking. (2020, July 15). WritingBros. Retrieved December 24, 2024, from https://writingbros.com/essay-examples/the-popularity-of-the-social-networking/
“The Popularity Of The Social Networking.” WritingBros, 15 Jul. 2020, writingbros.com/essay-examples/the-popularity-of-the-social-networking/
The Popularity Of The Social Networking. [online]. Available at: <https://writingbros.com/essay-examples/the-popularity-of-the-social-networking/> [Accessed 24 Dec. 2024].
The Popularity Of The Social Networking [Internet]. WritingBros. 2020 Jul 15 [cited 2024 Dec 24]. Available from: https://writingbros.com/essay-examples/the-popularity-of-the-social-networking/
Copy to Clipboard

Need writing help?

You can always rely on us no matter what type of paper you need

Order My Paper

*No hidden charges

/