Some people believe that posts or comments among friends on Facebook are considered private, while others think that we should expect that anything said on social media might be viewed by the world and be grounds for getting a penalty

Online
privacy
concerns Did you know that studies have shown recently that people spend 25% of their time on different social media platforms? There’s a massive surge in the number of people who
use
the social networking sites nowadays,
this
goes
further
to show that
privacy violation
Suggestion
a privacy violation
in these platforms is an
applicable
Suggestion
application
and a common issue. That’s why the limitation of social
media public
Accept comma addition
media, public
accounts has never been more important than now, as it has a huge impact on people’s personal life. Whenever people talk about social networks in general, there’s always
this
debateable
open to doubt or debate
debatable
topic about whether there should be freedom
in
Suggestion
of
speech or if
censorship
shall be applied.
Nevertheless
, it’s not settled as
this
matter has its supporters and opponents. A
lot
of people complain daily about stalkers who encroach their confidentiality.
However
, with a little bit of caution and with the validation of
censorship
, people can safely enjoy all benefits of those sites without taking any risks. I firmly believe that
censorship
shouldn’t get banned, because every day it becomes easier for spammers to intrude upon others secrecy. I think that comments and posts should be private as many users face
account
impersonation, harassment and the
privacy
downside of
location
-based services. A
lot
of the countries around the world agree upon the legalization of
censorship
. The control of internet-based crimes
is
Suggestion
are
a repeated demand among all people, especially Facebook users.
Censorship
prevent
Suggestion
prevents
the users from viewing harmful content,
cybercriminals
from causing corruption and monitors anyone using any social networking platform. There
are
Suggestion
is
a large range of well-intentioned reasons for the existence of
censorship
,
such
as stopping the fake news from spreading. People intend to spread fake news for absolutely no good reason but to cause deception and deceive
everyone
, and sometimes for advertising causes.
Censorship
also
makes sure that every religion and any belief won’t get affronted from any blog or
post
shared on Facebook, as they will be filtered before any
further
steps. Without observing the online content, children can get access to rough and risky content that won’t be pleasant neither for them or to their parents.
Besides
, it protects sensitive military
information
that can’t be leaked or reached by anyone from outside. Social media is here for long, same for hackers, spammers and online criminals who target social media accounts, especially the public ones, they can be more tempting than private accounts as they are harder to hack or impersonate. Generally, people
use
the comment feature
in
Suggestion
on
any platform as a way of delivering their opinion or
point
of view in a specific subject. Facebook is one of the most visited websites during
this
generation and people communicate most of the time through the comments, either by tagging their friends, stating a
point
or even expressing their political and religious opinions. In
such
cases, hackers find it easy to change the comment which might cause countless problems
to
Suggestion
for
the main owner of
this
account
or comment. Sometimes, people share their personal
information
with a friend through a comment or by uploading a
post
which facilitates the job for the scammer and it can even be counted as a leverage to abuse the user’s social identity among his followers and friends. Other online criminals find the public comments and posts a much more operative way to spread a virus or even a malware, by hacking a trusted
account
then
conjunction used in comparatives
than
commenting a specific link on one of his
friends
Suggestion
friends'
posts
Accept comma addition
posts, for
for example
, which just by clicking on it, his friend’s
account
will get hacked as well. Even worse than scams, the
cybercriminal
can
use
the personal comments for identity mugging. So simply, impersonation is one of several ways used in order to gain access to personal
information
shared through
public accounts
Suggestion
the public accounts
either over comments or posts, so as to commit fraud and online spying.
Moreover
, the impersonator plays a role of someone who he hacked his
account
, and search for the people who are most likely to trust
this
hacked
account
, convincingly enough to fool them and gain access to their
information
too. Social media threats aren’t only committed by strangers. Sometimes, a friend or a work colleague turns out to be less trustworthy than expected. Stalking and harassment have become a well-known online issues that most people face presently. Public comments and posts make it easier for stalkers to harass and perpetrate online crimes. Many workers upload their work on the internet, and gradually internet harassment is being acknowledged as a concern at workspaces, schools and at home as well.
Cyberbullying
Suggestion
Cyber bullying
is used in harassing, spreading rumours,
in addition
to threatening and maliciously embarrassing others. Public posts allow any stranger to comment and write whatever it pleases his purpose, whether by writing scandalous or provocative comments in front of
everyone
which might be detrimental
for
Suggestion
to
a
lot
of readers and
specially
to a distinctly greater extent or degree than is common
especially
the owner of the
post
. Other times,
cyberbullies
create fake accounts and at that
point
they start posting sensitive and enticing posts and comments on others’ accounts in a very inappropriate way to humiliate them. Online criminals
also
leave abusive and negative comments, create online posts that portray the victim in many negative ways and sometimes encourage other people to spam the victim by sharing false details about him.
Furthermore
, the scammer hacks the target’s
account
Accept comma addition
account, then
then
, he steals most of his personal and sensitive
information
and start sharing it on the target’s comments so
everyone
can see them, beside other unsolicited and
threating
threatening or foreshadowing evil or tragic developments
threatening
messages. With the explosion of social media over the
last
decade,
location
service matters have been on the rise.
Privacy
downside of
location
-based services occurs whenever people
post
public photos of them, and tag the
location
where it was taken. Without the guidance and
privacy
laws, any scammer can easily track his target due to the
location
service provided
on
Suggestion
in
the published
post
. The potential for security and safety threats increase, in fact, most applications collect automatically
location
data
Accept comma addition
data, information
information
nonstop, so it helps thieves know wherever someone is to track him. It gets even better for burglars when the shared
location
was on a public comment or a
post
. So, with the lack of supervision of fine-tuned regulations, hackers continue to take
advantages
Suggestion
advantage
of public posts as they have a
lot
of freedom to collect all the data they need about the victim and
use
them. The
privacy
of comments and posts decreases the chances of online theft and crimes. Correspondingly, it is likely that there will always be
this
increase in the attempts at
privacy
intrusion and the gathering of
information
for unfriendly purposes, but with more carefulness and following some instructions,
everyone
can avoid these attempts.
Censorship
can
also
be a good solution for
such
cases, as it guarantees the supervision, guardianship and
also
prohibits any violations
from
Suggestion
of
any kind. So, people have to be warier about clicking links written by strangers.
Everyone
should limit the sharing of private
information
even on private accounts. As a final
point
, each individual should not attack or insult anyone through the comments to avoid any harm as a payback. When it comes to
privacy
, maintaining your mystery is the best thing to do.
Submitted by lobna1906196 on

Unauthorized use and/or duplication of this material without express and written permission from this site’s author and/or owner is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to Writing9 with appropriate and specific direction to the original content.

Support ideas with relevant, specific examples

Examples make your writing easier to understand by illustrating points more effectively.

Examples, if used properly, not only help you get higher marks for ‘Task Response’ but also for ‘Coherence’.

When giving examples it is best to put them after your main idea or topic sentence. They can be used in the middle of supporting sentences or they can be used to start a new sentence. There is no rule for where exactly to give examples in essays, logically they would come after your main idea/topic sentence or just after a supporting sentence.

Linking words for giving examples:

  • for example
  • for instance
  • to illustrate this
  • to give a clear example
  • such as
  • namely
  • to illustrate
  • take, for example

Discover more tips in The Ultimate Guide to Get a Target Band Score of 7+ »— a book that's free for 🚀 Premium users.

What to do next:
Look at other essays: