• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Risks of Having a Facebook Account. Immediately after the discussion in class regarding Facebook privacy, the first thing I did when I got home from school was to check the limitedness of my Facebook profile to people whom I have no connections with.

Extracts from this document...

Introduction

The Risks of Having a Facebook Account Immediately after the discussion in class regarding Facebook privacy, the first thing I did when I got home from school was to check the limitedness of my Facebook profile to people whom I have no connections with. I am particularly keen with the privacy settings of my profile in any social networking site I associate my identity and email address with so the privacy check that I engaged in a few weeks ago was just to verify whether or not I have properly safeguarded my Facebook profile. What I did was to sign out from Facebook and search my name as an anonymous individual. I recognized my profile among others whom I shared a name with through my profile picture. What made my name stand out from all the other Gerard Padillas were the university and high school networks which were under my name. ...read more.

Middle

I receive unsolicited text messages regarding cash loan offers from anonymous numbers at least once a week and I do not want the frequency of these text messages to increase. I signed up for Facebook mobile a few weeks ago but I definitely did not allow Facebook to expose my cell phone number in my profile. Come to think of it, Facebook did not give me an option to decide on this matter. It just automatically put up my cell phone number as soon as I registered to Facebook mobile. I had to manually delete my cell phone number from my contact information to revert the exposition of my cell phone number. All the other data I share on Facebook are data I share willingly to my Facebook friends. Some of these data have selected viewership. The only bigger risk of having a Facebook account which I have not yet discussed is the possibility of someone hacking into my account. ...read more.

Conclusion

Schools attended/attending Visible to everyone NO 3. Degree and Major Everyone who are signed-in to Facebook NOT so certain 4. Current City Only visible to friends YES 5. Photos and Videos Only visible to friends, some of the albums are accessible to certain people only YES 6. Affiliations and Organizations Everyone who are signed-in to Facebook NOT so certain 7. Relationship Status Only visible to friends YES 8. Email Addresses Only visible to friends YES 9. Friends/Connections Only visible to friends. I opt not to display family connections in Facebook. YES 10. Interests Only visible to friends YES 11. Cell Phone Number and Home Phone Number Not shown in any social networking site I am in, only displayed in the signature of my Yahoo! Mail. YES. I only send emails to people I actually know and contacts from the partner establishments of my organization. 12. Status Messages and Wall Posts Only visible to friends YES 13. Birthday My birthday is not visible to anyone. YES. A lot of my friends do not even know my birthday because of how I hide it. ?? ?? ?? ?? 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

4 star(s)

Response to the question

In summary, the report is quite good. However there is a few points which need further developing which will give the more a more detailed view. The report mentions the implications of having an Facebook profile, and how a profile ...

Read full review

Response to the question

In summary, the report is quite good. However there is a few points which need further developing which will give the more a more detailed view. The report mentions the implications of having an Facebook profile, and how a profile could result in a person having a number of spam messages from random people across the network. The table at the bottom of the report is quite good, as this states a number of data which could be viewed by other people on Facebook. However for high marks the table could have a more detail on the section 'Am I aware of this information or not'.

Level of analysis

The report states how a person may find if difficult to 'hide' their profile on Facebook. However this doesn't state the reason to why Facebook has complicated settings. The report could mention something on the lines of 'Facebook has designed their settings in a complicated manner, as if a person were to keep all their data/information hidden, there will receive less revenue via adverts. This is quite unethical, however this is still acceptable to consumer's.' This would show the examiner the point of view of Facebook. The report states how the student used a simple password in the past, and how this made a number of his accounts on-line unsafe due to a number of potential break in's. This paragraph is quite good, as this describes what the student has undertaken in the past, and stated the reasons to why this wasn't good practice. In addition, the student states the new approach to setting passwords.

Quality of writing

The report states 'unsolicited text messages', however the student hasn't explained this technical term. An unsolicited message, is a received message which you did not give the company/person permission to send any such messages to your phone, e-mail account or other account. All technical terms should be explained within the report, to ensure that the examiner understand all aspects of the report.


Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 25/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Information Age

    3 star(s)

    go there at the same time, therefore online booking saves out time. * Easily accessible from home * Saves the travel cost. * We can make the booking anytime we want * Special offers are easy to find. * We can book specific seats free of charge.

  2. Marked by a teacher

    I have been asked to create an ICT solution for a local events and ...

    This will allow him if needed to access previous and present customers information to send them perhaps urgent information. Also the storage of this information on a system will be a safer location then compared with a filing cabinet as it will be all computerised, and improved preventative measures can be taken to prevent this information from being stolen.

  1. Computer Hacking

    of the idea of "Hacking" is because some people files are very important or "Top Secret" and they do not want that information to fall into the wrong hands. An example of this is when a certain company has confidential files or information, and the company's competitors hire a "hacker"

  2. Communications Technology - Assignment 1

    The parity bits are to change the numbers in the bit sequence from odd to even and vice versa. This type of data is used when data is sent intermittently as opposed to a constant stream. Synchronous Transmission With synchronous transmission, both devices will synchronise with each other before any data is sent.

  1. The Impact of Mobile Phones on social Interaction

    This fear is summed up by Norman Lamonts description of mobile phones as "the scourge of modern life" (5). Social interaction is defined by R.J.Rummel (6) as "the acts, actions, or practices of two or more people mutually oriented towards each other's selves, that is, any behaviour that tries to

  2. Definition of communication

    Inferring; conclusions made by reasoning from evidence or premises. Everyday most of us find it necessary to act on some inferences. We make assumptions and we draw conclusions even though we are not able to immediately verify the evidence. Some inferences are both necessary and desirable, others are risky and even dangerous.

  1. What is Non-verbal (NVC) Communication?

    Non-verbal signals are more acceptable, though these too may be misleading. "...the mind of the hearer is just as active in transforming and creating as the mind of the speaker." (Moore and Carling 1982 p145) What is language? Language is "the institution whereby humans communicate and interact with each other by means of habitually used oral-auditory arbitrary symbols."

  2. Internal Communication

    Appropriate security measures must be implemented to prevent this. Memorandum This is the most commonly used form of written internal communication. A memorandum is less formal than a business letter as it is not usually signed, but it provides a written record of the message sent and received by individuals within the firm.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work