Skip to main content

Effects Of Social Media


Effects Of Social Media!


Social Media

There is no doubt that now a days ,the use of internet and on line social network,like face book,google,Linked in,Twitter users are facing prevalent and different type security and privacy risk and threat,in spite of availability of many software solutions  and techniques present in this era of I.T and technology,which can help and  assist users of social media in better protecting and defending themselves against aforesaid  threats.More over these  aforesaid solutions and techniques ,quite easy and simple to apply procedures can be implemented  by the common people and their families to enhance and  improve their security as well as privacy on Facebook and tweeter and all other social media. people and their families are bound  to secure and protect their secrets and important personal  information.Moreover they are utmost required to ensure the same for the their wards and families by focussing and  emphasizing in the need to be extra vigilant and cautious during use of online social network.In this regard below given counter measures are strongly recommended and must be implemented with true spirit and fervor.

(a) Strictly abstain from  sharing personal and confidential information unnecessary.It is better for users and their families to  review the information and  detail they have already revealed in their on line social network accounts like face book or twitter and should eliminate all such personal important  information that shows identity of their family and spouse  as well as parents.




(b)  In addition to this  there are many unknown online social group available on internet very commonly,those are directly or indirectly involve in abusive or negative activities which are used for undesirable and evil design and discussion as well as sharing information illegally.These abusive and evil groups are more vulnerable because of joining them is  quite easy as compared to joining a friend's list.More over ,profiling of all like minded people also decreases workload and wrong activities of  hackers.Common people in general and family person in particular  must be very careful and meticulous while joining such abusive groups.

(c) Never accept any friend request blindly from an unknown and strangers.Fake and unrealistic  profiles are quite frequent and common now a days and often it has extremely adverse effect and consequences.Therefor if any person obtains any friend request from a stranger or an unknown person must immediately ignore and reject such a request despite if you feel  tempted and inclined to accept that unknown request.Suppose the person is quite stranger and is considering  accepting the friend request,then must have  a careful short background check and observation on the new ''friend ''by putting and inserting the respective friend's profile image and pics to respective Google images search and send the friend's full particulars including  name and other necessary details to other respective  search engine so that you may validate and confirm the reliability and credibility of the individual.In order to identify and remove  strangers already  included as friends with the users ,it is particularly recommended that  users must scrutinize  and check their friend lists time to time and should abolish any stranger or unknown people from friend's list.Suppose if parents willing for better monitor and to make proper check and balance of their children's activity ,it is strongly recommended that they and their children should scan the friend's list together in order to eliminate and remove stranger  and unknown''friends''.If you gain a friend's request from some one stranger ,you do not know or identify contact or just e mail them directly without any delay, prior to  make the final decision to add and include them to your personal account or to your domain of trust.Put some questions like  how they come to know about you and check if they are legitimate or illegal .Keep in your mind this thing that it is not only your own privacy ,you are protecting but also that rest  of all your friends.

(d)  First of all always secure and protect your E mail account in all respect.Try your best to use a disposable Email address on internet for registering with any social networking sites like face book,twitter,Linked in etc  and strictly avoid using your actual name for the address.In order to avoid giving away e mail addresses of your friends ,never permit and allow social networking services to scan your e mail address book .When you join new social net work it is possible that ,you might obtain an offer to enter your e mail address and even pass word to find out if your any contact are already on network.It is possible that the site might use this information to send e mail messages to every one in order to confirm  your contact list or even every one you have sent an e mail using that e mail address.It is compulsory as well as obligatory that Social networking sites are bound to warn each individuals of this fact ,but some do not.follow this.



(e) .Always make familiar yourself with both the privacy settings as well as the security policy of any social and professional networking site you use.In case If you are not satisfied with them ,just stop using the site.Some of these settings and policies are changed with the passage of time  and updated automatically by operators of the site time to time  without the will and wish of the users.Therefor it is compulsory for every one to review these settings  on regular basis to make yourself aware of these changes.


(f) When you create your new profile or new account on internet ,it is better first to review review each piece of information and bio data that you share and ascertain if it is really essential or even relevant to that site.For instance do you need to share your cell number or telephone numbers while creating an e mail account?Definitely not.Be careful and meticulous and practical at this stage and never give any lose point to ant stranger and do not give your bio data and particulars unnecessary and always give priority to feed the dummy entries.  


(g)  At the time of  sharing any contents ,chat,mail,or giving  comments on other people's post or profiles never think your communication to be personal or private.In spite of , you have made full use of the privacy settings available to you,you have no sure and guaranty  that your contents and material would not be copied or pasted,downloaded,or otherwise shared more widely without making you inform and familiar  by that unknown friend.Suppose that any content you put on a social networking site is not temporary but may be permanent.Assume that if you can remove your account by any means ,any one on the internet can easily print photos,images or text or save images and videos to a computer.Be very selective,careful,and meticulous about up loading images videos ,status updates and messages,even among reliable and trusted friends.Once circulated on line images/videos can be shared widely,rapidly and even instantly and can be extremely difficult  or nearly impossible to block or remove because of its weak setting of one's friend.

(h)Majority of sites offer means to  reset your pass word very frequently  if you forget it .This is also one of the most common and dangerous ways to break into your account very easily .If you are asked to give answer to security question,just keep your eyes open whether the answer already secure.It means that you are the only person who can answer the question.If the possibility exist to generate your own questions,then in this situation use it,if you are obliged to answer more standard question such as first school,first pet ,remember the answer does not have to be the real and actual.It only has to be some basic thing you can inculcate.

(j) Never use same pass word for multiple other different sites.In case with different passwords ,if password of one site is compromised then there is no need to worried  about the others.Always generate very complicated and  complex password including upper and lower case letters, numbers ans special characters such as $,% *&etc.Make a proper  way to differentiate your passwords for each site you use,for instance putting the first and the last letters of the web site name at the beginning and end of your complex pass word.Just generate and create logic to inculcate your pass word.



(k) Always try your best to decrease  the  number of third party apps and services that you install  or permit to access your system particularly when using smart phones and tablets.Get proper knowledge how to eliminate or disallow them  and get rid of any that you no longer use .Never forget even on twitter once you allow and permit  a service to access your account ;that permission remains active unless you manually remove it and and it also persists by changing its pass word.


(l) Never click links present in messages or wall posts ,even if those are sent to you by friends without confirmation and checking from them whether they really sent it or not..Few seconds to check could of course save you from becoming victim  to phishing scam as well as worms,infecting your computer.On confirmation.you could also be doing  a help and  favor to your friend  by making them familiar them that their account is really compromised.

(m) Strictly avoid using the geo-tagging features and images of Facebook or popular photo sharing site like Twitter,Linked in,Google plus etc because they may give away your present availability and location to your opponents or people you do not want to know your location.When not in use ,when should disable GPS functions on camera along with  smart phones and also disable geo tagging when up loading photos on line.Serving personnel should check and confirmed that GPS function of their smart phones etc is disabled ,as it is probability that this may be used wrongly for tracking not only their own movement and location but also of their associates and other activities.
Social Media


Conclusion:

Now at the end it is specially recommended that all user of social media must not only adopt and follow these recommendations but should also make familiar and  educate their families along with their wards pertaining to the adverse effects and threats which can fascinate and  attract them quite easily and can potentially end up in the form of disaster.All personnel should very strictly and carefully consider and review what personal information is being shown regarding themselves,their friends as well as their work place by their family members,while using online internet and social network.In addition to this  as parents we must educate and make familiar our children to be aware of potential threats and teach them  not to engage with any unknown and  strangers either in the real world or in the cyber world.If a users personal information unfortunately falls into wrong hands ,its consequences may be in the form of massive damage as well as in the shape of colossal loss and in many cases unluckily there is no way to retrieve or  recapture what has been lost.

Comments

Popular posts from this blog

THALASSEMIA AND COUSIN MARRIAGE

THALASSEMIA AND COUSIN MARRIAGE According to the latest medical research it is proved that Thalassamia is the inherited blood disorder due to abnormal condition of hemoglobin.Commonly this disease is inherited from parents and cousin marriage is also a vital cause behind this disease.More over i t’s due to either a genetic mutation or a deletion of certain key gene fragments.  .Basically this disease is divided into two main categories (a)  Alpha Thalassemia; In this category atleast one of the alpha globin genes has a mutation (b) Beta Thalassemia; In this category beta globin genes are affected As i already told you that Thalassemia is an inherited blood disorder in which Hemoglobin adopts the abnormal shape.In actual hemoglobin is found in red blood cell in the form of protein molecule and its function is to carry oxygen.Due to this disorder majority of the red blood cell are destroyed,consequently patient becomes victim of anemia.due to this anemi...

Samsung Gaalaxy S8 Amazing refund deal

Samsung Galaxy S8 Amazing refund deal It is an irrefutable fact that Samsung Galaxy note 7 left very bad effect on its users and and fans due to a lot of defects and problems.After the disappointed feed back from its users,Samsung has to be very meticulous and careful for the next production Galaxy S8 so that company may compensate the loss  inflicted by the failure of previous model Galaxy 7.This is why Samsung Galaxy putting its best endeavor to launch new model Galaxy S8 without flaws and faults so that its mass market value graph might spiral up as it came down due to burning incidents in previous models.According to the Sash leaks it is expected that Galaxy S8 could launch with three month money back guarantee.In this regard Sammobile reported that ''You can use your Samsung Galaxy S8 for the period of three month and you can return it for a refund with in three month. Although this term and condition of three month refund have neither  been issued ...

OSCAR AWARD AND ENVELOP CONFUSION

 OSCAR AWARD AND ENVELOP CONFUSION On Feb 26,2017 the academy of Motion Picture of Arts ans Science (AMPAS) presented the annual academy award which is commonly known as Oscar award.It was 89th Academy Award ceremony.This historical ceremony commenced on Feb 26,2017 at 5;30 p.m PST .This event held at the Dolby Theatre in Hollywood ,Los Angles, California. People struck with wonder when they were watching dramatic and incredible scene when La La Land was announced as the best film winner at the 2017 Oscar but fortunately or unfortunately at the same time  same award handed over to Moonlight after confessing mistake committed unknowingly.It was first time in the history of Oscar that such type of dramatic moment came.Amazing victory was about to touch the La La Land when it was noticed that the name of the film announced was wrong and in actual the film was Moonlight instead of La La Land .It was announced by Warren Beatty and i was an extraordinary and amazi...