Sunday 19 April 2015

Portfolio-Reader's Response



In the article "The Perils of Over-sharing", Emm (2014) asserts that precautions should be taken to prevent personal information from being leaked out. He explains that we might focus too much on the convenience of Internet and neglect the danger of sharing unnecessary events online. Emm stresses that over-sharing might not only cause personal consequences, but might also threaten the organization we work for. The author also states that users might not be careful when using mobile devices as they are not typical targets of cybercriminals. In conclusion, they should be cautious when using the Internet.


While I agree with the author’s view on our over-reliance on the Internet, I believe that Emm is exaggerating the issue. Emm states that the providers of the applications are able to access users’ information when the applications are being used, and that reliance on the Internet and applications “exposes the minutiae of our daily lives”. However, the users provide their personal information only because it’s promised to be kept confidential. Users are merely providing limited information to gain the access, but the providers of the applications and Government are the ones snooping and intercepting. Thus, this should not be the consequence of over-sharing, but rather the result of snooping and intercepting by the authorities.


I think that Emm also overstates this point: “if someone steals your smartphone or tablet, they get access to all your information too.” This is not likely to happen, as there are security settings designed to prevent such problems. For example, users may set up “two-factor authentication” for their iCloud, which means they have to supply two factors to log in, instead of logging in with a password using mobile device only (Miller, 2014). For social media, there are self-destructing platforms availabe for users. For example, Snapchat is a popular and typical example of self-destructing services for photos and videos. The shared photos can only last for about ten seconds. And Secret.li allows you to decide who can view your photo, and a self-destruct timer can be set for the image to delete automatically (Kimachia, 2014).


However, I do agree that “conscious over-sharing”, which is sharing unnecessary events without filtering or setting access restriction, does cause terrifying consequences, as which is suggested by Emm. In terms of personal consequences, Emm states that “what prying eyes can see as our data travels over the Internet”. A burglary victim Lavern Cheatheam shared that "You think posting and checking in wherever you go is fun, but you are actually letting people know -- hey I am gone. Go over there and take what you want." Experts comment on social media-burglary cases that sharing too much online could make us targets for burglars (abc7NEWS, 2014).


“Our over-sharing in social networks could also jeopardise the security of the organisation we work for.” Emm asserts. In short, over-sharing causes non-personal consequences too. It is true as data stored in the corporate network is also at risk because it is more accessible than ever. In addition to that, some employees might not be alert and could easily leak out these important details and this can tip off the would-be attackers then put their company at risk (Cisco, 2008). In February 2011, Hewlett-Packard showed off its new tablet computer, which it hoped will be a rival to Apple's iPad but this did not gain much popularity due to the leakage of its design in mid-January 2011 (The Economist, 2011).


In conclusion, I do have to agree with Emm that over-sharing indeed will cause the leakage of personal information. The consequences and impacts of personal information leakage are more that what one could think of. Personal, non-personal including the organisations the users work for could be harmed. Therefore, users should pay more attention when providing personal information on any platforms. Think twice before act.



(636 words)






References

abc7news,. (2014). Burglars use social media to find next victims. Retrieved from http://abc7news.com/travel/burglars-use-social-media-to-find-next-victims/448107/

Cisco,. (2015). Data Leakage Worldwide: Common Risks and Mistakes Employees Make. Retrieved 18 April 2015, from http://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/data-loss-prevention/white_paper_c11-499060.html

Kimachia, K. (2014). Self-Destruct: The Future Of Personal Communication. MakeUseOf. Retrieved 18 April 2015, from http://www.makeuseof.com/tag/self-destruct-the-future-of-personal-communication/

Miller, D., & Miller, D. (2015). How to set up two-factor authentication for iCloud. Macworld. Retrieved 18 April 2015, from http://www.macworld.com/article/2449450/how-to-set-up-two-factor-authentication-for-icloud.html

The Economist,. (2011). The leaky corporation. Retrieved 18 April 2015, from http://www.economist.com/node/18226961


1 comment:

  1. This is really a much improved reader response. Thank you for the hard work!

    ReplyDelete