My Profile
Profile Avatar
*******, ******* *******
******* *******

Social Networking Sites: Security and Privacy Issues

Recent cyber attacks involving several high-profile social networking accounts highlight the potential vulnerability of social networking sites. The sheer volume of users and the information that gets posted on social networking sites create plenty of opportunity for an attacker to use social engineering or other methods to gain access to the accounts of individuals and organizations. The more information you post on social media sites, buy cheap likes on instagram the more your security and privacy are at risk.Ensure your computer has proper security measures in place before connecting to a social networking site. Use and maintain anti-virus software, anti-spyware software, and a firewall. Keep these applications and operating system patched and up-to-date.Always type the address of your social networking site directly into an Internet browser or use personal bookmarks. Do not click on a link to your social networking site through email or another website. Chances are you might be entering your account name and password into a fake site where your personal information could be stolen by a hacker or cyber criminal.Be cautious about installing third party applications. Install applications that come from trusted, well-known sites. Some social networking sites provide the ability to add or install third party applications, such as games. When you download a malicious application, hackers may have the ability to gain full access to your account and the data you share. Malicious applications can use this access to interact with your friends on your behalf, steal, and misuse personal data. Installing some malicious applications may modify your security and privacy settings. If you are no longer using the application, remove it.

soical madia

Social Networking Sites and Independent Music Discovery

The purpose of this paper is to investigate users' knowledge and use of social networking sites and folksonomies to discover if social tagging and folksonomies, within the area of independent music, aid in its information retrieval and discovery. The sites examined in this project are MySpace, Lastfm, Pandora and Allmusic. In addition, instagram likes buy fast the ways in which independent record labels utilise social networking sites for promotion are investigated. Design/methodology/approach: Three groups of participants were surveyed using questionnaires. These groups were music concert attendees, people who responded to online postings to social networking sites, and independent record companies. In addition interviews were held with digital music experts. Findings: The results suggest that respondents use social networking sites for music discovery but are not generally aware of folksonomic approaches to music discovery. When users do use and contribute to the folksonomy, most respondents were found to tag for personal retrieval purposes rather than attempting to aid the retrieval purposes of the population of site users as a whole. The four record labels unanimously agreed that social networking sites are having a major impact on independent music discovery. Digital distribution has a major impact on independent record labels. It facilitates discovery but at the same time digital distribution creates new promotional dilemmas. Originality/value: The project is small scale but the research area is a relatively novel one, and the results are interesting enough to share more generally in the hope that this project will stimulate further research activity in this area.

There is often controversy as to whether or not adolescents should be able to freely use the Internet for communicating with others (Tynes, 2009). Parents in particular are strongly cautioned by the media and school officials about online predators and the influence of certain websites on teenagers (Tynes, 2009). buy instagram likes fast They may use Internet services such as CyberNanny to block certain websites and keep records of what their children may be looking at on the Internet (Tynes, 2009). Other parents make house rules about when the Internet may be used or insist that the computer be located in a central area of the house so that they may monitor what is being looked at by their teen When reviewing the literature related to gender and adolescents, results are mixed as to which group spends more time on the Internet (Lin & Subrahmanyam, 2007) Studies have shown that boys have been online more than girls in previous decades because of earlier forms of technology such as video or computer games (Lin & Subrahmanyam, 2007). Girls have reported that they use the Internet for things like chatting and downloading music (Giles & Price, 2008). Because of this, one may hypothesize that girls will be more likely to be attracted to social networking sites and other online social groups (Giles & Price, 2008). According to most research done on the topic, the amount of teenage girls and boys who are communication on these social networks are equally

PO Box 2294 Gypsum, CO 81637 | Ph. 970.337.9443 | Fax 970.337.9046 |