Sunday, December 22, 2019
Obscuring Identities Online - 1158 Words
Since social media is such a mainstay in todayââ¬â¢s society, people should not be allowed to obscure their identities on any platform. People use it to connect with family members, make love connections and even sometimes just to feel included. While social media and other online accounts and things of that nature can be fun and helpful, there is a lot that goes happens on a daily basis online that is not safe. The world is full of people who are not considerate of others feelings and choose to ignore right from wrong. There are scammers, bullies, predators and overall terrible people who make being online and having an account unsafe. If there was a way to pin point who these people are early, something can be done and can make social mediaâ⬠¦show more contentâ⬠¦This is another major flaw in being allowed to obscure identities on social media and other online sites. If people are required to always show their true selves and use their real names, kids are going to be les s likely to fall for predator accounts. With full names and accurate profile pictures, even if a child falls for a predators lie, one again police and investigators will be able to identify and locate the predator quicker than having to contact information technology teams to track them down. It is also important to understand that while there are a lot of people who hide their identity on social media and other online sights for vindictive reasons, there is also a large portion of people who do it for other reasons. Some people are not comfortable with putting their full name out there for everyone to see and want to maintain their privacy. There are people who want to be able to be on social media and in with everyone else but they do not want it to be easy for everyone to find them. Whatever is put on the internet stays on their even after you delete it and sometimes that is not always a good thing. If you search hard enough, no matter how badly someone does not want to be found it is quite possible. Not everyone wants to hide their identity to be rude or mean or to scam people out of their belongings. Sometimes it is all about personal preference and what they are comfortable with. Others, could be trying to hide from the very people who are onlineShow MoreRelatedProfessional, Ethical And Legal Issues With Software Engineering1592 Words à |à 7 Pagesthis intense and pervasive innovation. This paper gives incorporate taking after points: â⬠¢ Violation of data security â⬠¢ Illegal utilization of trademarks â⬠¢ Slandering issues â⬠¢ Copyright encroachments â⬠¢ Security issues â⬠¢ Psychological issues with online networking (social media) â⬠¢ Human asset issues â⬠¢ Cross firing ââ¬Æ' â⬠¢ Violation of data security General scenario In todayââ¬â¢s world, everybody understands the value of privacy. Just for the example one can lostRead MorePiracy: A Different Perspective Essay833 Words à |à 4 Pagesroamed the seas freely pillaging merchant vessels. Now a days, Piracy has mainly slipped underground. Chances are, you may know a pirate personally without knowing the crimes they commit. For these crimes are not public, instead they are committed online. Filesharing is on the rise, much to the parent media corporations chagrin. Piracy is popular because of its ease of use, and widespread availability. The requirements are simple - If youve got a computer with an active internet connectionRead MoreA Comparative Analysis of Chronicle of a Death Foretold and The Metamorphosis957 Words à |à 4 PagesGabriel Garcia Marquezs Chronicle of a Death Foretold and Franz Kafkas The Metamorphosis both show how the protagonist suffers because of a dysfunctional worldview. In Chronicle of a Death Foretold and in The Metamorphosis, identities and truth are malleable substances, obscuring the truth. Both these stories therefore have a strong existential component, but it is doubtful that their respective protagonists come to terms with or learns from his or her existential angst. In Chronicle of a Death ForetoldRead MorePrivacy And Its Effect On Society Essay1627 Words à |à 7 Pagesand discover what someone may be up to but also identify its users with facial recognition technology. A personââ¬â¢s personal data s uch as their birthday, place of birth, sexual orientation and even their religion can be easily found out and used in identity theft. If that wasnââ¬â¢t invasive enough technology can go even further and violate someoneââ¬â¢s very mind and genetic privacy. With technology, we can study and image the brain and see how someone personally feels about certain things or if they are tellingRead MoreThe Islamic State : An Accident Of History1579 Words à |à 7 Pagesin the region following the fall of the Ottoman Empire by shaping out for itself a large area of territory. But ultimately, its consequence will flow as much from its challenge to settled concepts of government, national sovereignty, and national identity. The Islamic State is most well-known for the violence with which it asserts control, but its vicious tactics will likely stop the group from ruling efficiently and building broader support beyond the front line fighters who defend its security andRead MoreHigh Tech Or High Risk : Moral Panics2053 Words à |à 9 Pageslooking at gender through the socio-cultural lens, it permits us to view young people in a contextual way that creates moral panics and discourses. According to Justine Cassell and Meg Cramerââ¬â¢s article ââ¬ËHigh Tech or High Risk: Moral Panics about Girls Onlineââ¬â¢, moral panics about how girls use the web as a means of communication is a case that has existed for many years. Their reasoning attracts parallels between moral panics about girlsââ¬â¢ use of social platforms in todayââ¬â¢s world, and the moral panics thatRead MoreA Report On The Panamanian Law Firm1774 Words à |à 8 Pagesleak of confidential papers that they are calling the Panama Papers (Aljazeera.com, 2016). The firm drives its operations diversely and internationally in scope, but they are famous for their specific specialtyââ¬â by helping foreigners obscuring the real identities of the owners to set up Panamanian shell companies to establish their financial assets. It was established in 1977 and since its establishment it has expanded its interests outside of Panama to include more than 40 offices worldwide, byRead MorePositive and Negative Aspects of Technology in the Service Sector2353 Words à |à 10 Pagesnever imagined now exist; like watching movies and TV shows online via Netflix; buying selling and auctioning online on sites like Amazon and Ebay and even information services like the review site TripAdvisor whose content is updated by customers themselves. The internet has also facilitated existing firms to offer new services on top of their current offerings (Willcocks 2000). Federal Express the shipping and delivery service now offer online schedule and payment services and a real time tracking serviceRead More W.H. Audens Poems and Homosexuality Essay2834 Words à |à 12 Pageswhere illicit love occurs, empathize with clandestine lovers, and see the beauty in their love. By obscuring genders and suggesting the need for a restructuring of moral values, the poems serve as pieces of coded propaganda that advocate for the freedom of clandestine, and possibly homosexual, lovers. Works Cited ââ¬Å"Another.â⬠Def. 2. The Oxford English Dictionary. 2nd ed. 1989. OED Online. Oxford University Press. 10 May 2005 . Auden, W. H. ââ¬Å"Lay your sleeping head, my love.â⬠Read MoreData, Analytics, and Competitive Advantage14733 Words à |à 59 Pagesadditional data from Web site visits, too. Remove products from your virtual shopping cart? Tesco can track this. Visited a product comparison page? Tesco watches which product youââ¬â¢ve chosen to go with and which youââ¬â¢ve passed over. Done your research online, then traveled to a store to make a purchase? Tesco sees this, too. Tesco then mines all this data to understand how consumers respond to factors such as product mix, pricing, marketing campaigns, store layout, and Web design. Consumer-level targeting
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.