Write My Paper!

We provide assignment writing assistance through a team of specialists with Masters and Ph.D. degrees.

Order from us today and get top-quality plagiarism-free papers!!

Social media usage and cyber-crime

Introduction
With the increased level of exposure that people have on the current social media channels, it is very easy for a particular person to easily share his or her information. For example, the introduction of media channels that are more into gaining access to the users’ data such as Facebook, WhatsApp, and Telegram applications among others, the chances of violation of the users’ privacy as well as manipulating them into sharing their information is very high. In this essay, I shall focus on the description of the relationship between utilizing diverse social media channels and becoming a victim of personal information leaking.
Cyber-crime as a result of using social media
As we have advanced technologically over the recent decades, various social platforms have emerged that have enabled us to interact and share information with other persons even if we are continents apart. Some of these social networks include LinkedIn, Facebook, Twitter, Instagram, and WhatsApp among many others. Most of them can be accessed through the web by using computers and laptops while others are more user-friendly in smart mobile devices. When a user wants to become a member in any of these media channels, he or she is always asked to open a new user account that will host his or her personal information. Some, like Twitter and Facebook, may tend to lean on the social perspectives of the person such as personal interests and likes. On the contrary, others, particularly LinkedIn, are centered more on the professional perspectives of the user. In either way, a user may be required to share his or her personal information with the host (Garcia, 2017).
So, how does a person become a victim of sharing personal information? One may ask such a question. Well, any other user who accepts to link up with your profile may gain access to your information if you have not restricted whom to view them. For instance, another third party may be informed of your likes, your interests, your place of residence, and the schools you have attended to among many other things (Bindu, Thilagam, & Ahuja, 2017). As a result, the user who has recently joined the social network may be exposed to potential hackers and scammers (Mann, 2009). In particular, this data posted in a user’s account can be extracted by the data aggregators and then used to track the user’s movement over the web (Mangan, 2017). This act is possibly seen in Facebook and Google for their sole purpose of enhancing personalized advertisements.
Another potential crime that comes with usage of social media is the sharing of personal images and tagging a user’s current location along with it (Sun, et al., 2017). There are many criminals and abductors in the world that we live in. Thus, if their targeted user posts a picture or him or herself and the current place he or she is located at, the chances of the abductors may be high in finding the user (Simon, Ben, & Tony, 2018).
Finally, the sharing of personal information such as places of work and professional qualification of a particular user in channels like LinkedIn (Atalay, 2018) may lead to being a target of fake links and other malicious applications (Leonardi, 2017). For example, a malicious job link may be shared to a person who is looking for work without him or her knowing. As a result, his or her personal information may be encrypted, formatted, or accessed if he or she accessed the malicious links and/or applications.

References
Atalay, B. (2018). Cyber c rimes, communication and social media. İstanbul Aydın Üniversitesi Dergisi, (3), 1.
Bindu, P. V., Thilagam, P. S., & Ahuja, D. (2017). Discovering suspicious behavior in multilayer social networks. Computers in Human Behavior, 73, 568–582.
Garcia, D. (2017). Leaking privacy and shadow profiles in online social networks. Science advances, 3(8), e1701172.
Leonardi, P. M. (2017). The social media revolution: Sharing and learning in the age of leaky knowledge. Information and Organization, 27(1), 47-59.
Mangan, D. (2017). The legal challenges of social media. Cheltenham, UK: Edward Elgar Publishing.
Mann, B.L. (2009) Social networking websites: A concatenation of impersonation, denigration, sexual aggressive solicitation, cyber-bullying or happy slapping videos, International Journal of Law and Information Technology, 17(3): 252-67.
Simon, A., Ben, B., & Tony, D. (2018). Organised crime and social media: a system for detecting, corroborating and visualising weak signals of organised crime online. Security Informatics, (1), 1.
Sun, G., Xie, Y., Liao, D., Yu, H., & Chang, V. (2017). User-defined privacy location-sharing system in mobile online social networks. Journal of Network and Computer Applications, 86, 34-45.

Special offer! Get 15 - 30% discount on all orders - Check Coupons Section

Essay Help for Your Convenience

Any Deadline - Any Subject
We cover any subject you have.
Set the deadline and keep calm.
Receive your papers on time.
Detailed Writer Profiles
That’s our Place of Truth.
Look over the writers’ ratings, success rating, and the feedback left by other students.
Email and SMS Notifications
Stay informed 24⁄7 about every update of the whole ordering process.
Plagiarism Free Papers
We double-check all the assignments for plagiarism and send you only original essays.
Chat With Your Writer
Communicate directly with your writer anytime regarding assignment details, edit requests, etc.
Affordable Prices
We offer the lowest prices per page in the industry, with an average of $7 per page.
App Essay Writers Features
Get All The Features For Free
$11
per page
FREE  Plagiarism report
FREE  The best writer
FREE  Formatting
FREE  Title page
FREE  Outline
Place An Order

We Offer the Custom Writing Service with 3 Key Benefits

Quality Essay Help

Our team of professional writers guarantees top-quality custom essay writing results.

The Best Support Service

Get 24⁄7 help with proofreading and editing your draft – fixing the grammar, spelling, or formatting of your custom writing. 

Affordable Writing Service

We guarantee a perfect price-quality balance to all students. The more pages you order, the less you pay.

Benefit From App Essay Writers Extras

Along with our writing, editing, and proofreading skills, we want to make sure you get real bang for your buck, which is why we provide all these extra features.

Quick Turnaround
Looming deadline? Get your paper done in 6 hours or less. Message via chat and we'll get onto it.
Free Turnitin Report
Originality is our key priority. We provide a FREE Turnitin report with every essay, so you'll know it's definitively plagiarism-free!
QA Department
An extra set of eyes never hurts! Your essay is examined by our QA experts before delivery.
Flexible Discount System
The further the deadline or the more pages you order, the lower the price! Affordability is in our DNA.
Unlimited Revisions
All revisions are free of charge. Ask your writer for adjustments and you'll have them in no time!
24/7 Support
We're here for you day and night. Connect with customer support around-the-clock for any orders or urgent questions.

Custom Essay Writing Service

Get your custom writings in the best quality: