Sunday 15 February 2015

Reader's Response Draft 3



In the article “The Perlis of Over-sharing”, Emm (2014) asserts that the precautions should be taken to prevent personal information from leakage. He explains, users might focus too much on the Internet’s convenience and neglect the danger of sharing unnecessary events online. Emm stresses that over-sharing might not only cause personal consequences, but will also threaten the organization they work for. The author also states that users might be in low-guard when using mobile devices as they are not cybercriminals’ preys. In short, users should be cautious when making use of Internet.

Internet has become an integral part of our lives. More and more of what we do is dependent on it. But at the same time it also exposes the minutiae of our daily lives to those who have ability to gather the details.” Emm relates the dependency on Internet with the perils of over-sharing as providers of the applications are able to access to users’ information when the applications are being used. In such case, users are unconsciously over-sharing as they are providing information in order to enjoy the convenience but not to share with others. In such extend, I do not agree with considering this as over-sharing’s consequence as these details are provided as they are promised to be kept confidential. Users are merely providing limited information for accessing purpose, so it cannot be said that the use of applications results in over-sharing then information leakage as this action is not over-sharing at the very first place.

The case “if someone steals your smartphone or tablet, they get access to all your information too” is not likely to happen, as there are security settings designed to prevent such tragedies. For example, users may set up “two-factor authentication” for their iCloud, which means users have to supply two factors to log in, instead of logging in with password using mobile device only (Dan miller, 2014). For socialising media wise, there are actually self-destructing social media services existing. For example, Snapchat is a popular self-destructing service for photos and videos. Shared photos can only last for about ten seconds.  Secret.li allows you to decide who can view your photo and a self-destruct timer can be set for the image to delete automatically (Kihara, 2014).

However, consciously over-sharing, which is sharing unnecessary events, without filtering or setting access limitation, does cause terrifying consequences. As personal consequences, which is what Emm says in “what prying eyes can see as our data travels over the Internet”, a burglary victim Lavern Cheatheam, shared that "You think posting and checking in wherever you go is fun, but you are actually letting people know -- hey I am gone. Go over there and take what you want." Experts comment on social media-burglary cases that sharing too much online could make you a target for burglars (abc7NEWS, 2014).

Our over-sharing in social networks could also jeopardise the security of the organisation we work for.” Emm asserts that over-sharing cause non-personal consequences too. It is true as data stored on the corporate network is also at risk because it is more accessible than ever, and some employees might not be alert and could easily leak out these important details just when they are sharing status on social media and this can tip off the would-be attackers then put their company at risk (Cisco, 2008). It happened, in February 2011 Hewlett-Packard showed off its new tablet computer, which it hopes will be a rival to Apple's iPad but this did not cause a great effect due to the leakage of its design in mid-January 2011 (The Economist, 2011).

(600 words)


References:

ABC7 news (2014). Burglars use social media to find next victims. [ONLINE] Available at: http://abc7news.com/travel/burglars-use-social-media-to-find-next-victims/448107/

Cisco (2008). Data Leakage Worldwide: Common Risks and Mistakes Employees Make. [ONLINE] Available at: http://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/data-loss-prevention/white_paper_c11-499060.html

Dan Miller (2014). How to set up two-factor authentication for iCloud. [ONLINE] Available at: http://www.macworld.com/article/2449450/how-to-set-up-two-factor-authentication-for-icloud.html

Kihara Kimachia (2014). Self-Destruct: The Future Of Personal Communication . [ONLINE] Available at: http://www.makeuseof.com/tag/self-destruct-the-future-of-personal-communication/

The Economist (2011). The leaky corporation. [ONLINE] Available at: http://www.economist.com/node/18226961

No comments:

Post a Comment