2. Has anything in chapter 5 made you re-think or update the way you use wireless networks? If so, describe how you would improve on your wireless network?
3. Why is it so important for data collection organizations to be responsible with the data they collect with care?
4. With the popularity of social media, what privacy measures should people take to prevent intrusion and identity theft? Does the use of social media remove your rights to the privacy of your information?
Your final project is a research paper on one of the topics that was selected in Week 5. Paper Requirements: 4-6 pages in length, APA formatted, a minimum of 4 references.
Social media security is the topic
This material may consist of step-by-step explanations on how to solve a problem or examples of proper writing, including the use of citations, references, bibliographies, and formatting. This material is made available for the sole purpose of studying and learning - misuse is strictly forbidden.Social Media Security
Social media is perhaps the most revolutionary advent in the history of humans. According to Tella (2014), social media reflects numerous online tools designed and centered on facilitating social media interactions. Tella (2014) relayed that social media has proven as the power behind social change. People, including those who appear as the most powerless in society, usually adopt social media to voice their concerns. Nevertheless, social media does not always suffice beneficial outcomes. Instead, as contented by Tella (2014), some people interact with social media such that it avails challenging or security threats. Thus, this paper seeks to establish the security issues linked with social media and how firms and persons might alleviate these security concerns.
Social media security concerns
One of the most severe security issues associated with social media is identity theft. Broadly, identity theft refers to a crime that involves the obtaining of financial or personal information of another individual solely for assuming the victim’s identity to make transactions or purchases. According to Obiniyi, Oyalade, and Obiniyi (2014), identity theft has increasingly become an overwhelming challenge for social media users, especially Facebook users. Citing Mali (2014), Obiniyi, Oyalade, and Obiniyi (2014) claimed that at least 12 million people often become victims of identity theft each year. The consequent financial loss amounts to at least $21 billion. The 2012 incidence
Wireless Networks and Privacy
1. Why do you think organizations, such as restaurants, coffee shops, and airports, provide free wireless network access? Are these organizations responsible for securing their networks? Do they commonly provide security warnings? If you were hacked or caught a virus from their network, would they be responsible?
Free wireless networks and Wi-Fi access are provided by coffee shops, restaurants, and airports to attract customers. The free Wi-Fi access is essential in attracting customers and keeping them busy while enjoying the services provided the organizations (Cobanoglu, Bilgihan, Nusair & Berezina, 2012). Organizations that offer free wireless network access are more likely to have high return customers than those with a paid wireless network.
The organizations are reasonable for securing free wireless access networks. Also, the...