In today’s society, privacy, security, and convenience has turned into a paradoxical issue dealing with the information age (Barnes, 2006…). In fact, one of the primary driving instruments are the usage - and rise – of social networking sites such as: Facebook, Myspace, and Twitter. Having said that - and considering these networks gather considerable amounts of information about its users, the idea of securing your information is momentous.
For example, Facebook Timeline – much like other social network websites – has adjustable settings that permit you to alter your security settings in order to restrict or not restrict your information at any given moment. The first aspect deals with limiting the amount of information you share publicly, whereas the second deals with providing full transparency to the information you share. As a result – and because these options deal with convenience aspects, our next concluding paragraph will focus on the risks-and-advantage analysis dealing with public-and-insecure modus operandi (Definition…).
To demonstrate, two advantages of running Facebook Timeline insecurely and publicly are: Users are able to like and appreciate the information you share such as mutual interests, shared values, and expressions, whereas another advantage deals with formulating friendships and relationships contrast to transcending physical boundaries. In other words, users are able to be easily informed - about the lives of other people – and what goes on with others who are physically distant. However, despite the advantages of running Facebook Timeline publicly, there’s also the risks as well.
As way of illustration, two primary risks associated with an insecure transparent account are: The ability to be stalked by strangers based on the amount of information that’s relayed both publicly and insecurely (e.g. Phone numbers, addresses, social plans, and physical whereabouts), and the reality of self-incriminating yourself. For example, with lax settings – like the public and insecure method – you face a greater deal at hindering your ability to gain suitable employment – dealing with company discriminatory practices, and also privacy concerns involving identity theft. Taking this into account, we’ll now properly discuss how to modify the settings mentioned to deter potential threats.
For instance, in order to adjust your security settings to a more secure mode, utilize your email and password you used to create the account. After you have logged into your account using the credentials mentioned, use your mouse-pad or scroll-mouse and scroll to the upper right portion of your home page, and click on the dark-blue arrow facing downwards (About…). Once you click on the arrow facing downwards, a list will display several options such as: Create Page, Advertise, Activity Log, Settings, Log Out, Help, and Report a problem. Now take your scrolling-device and click on the option labeled “settings” as it will bring you to a...