Note Taking Activity.docx

Directtruedba livescopesite examples on how innocent

Info icon This preview shows pages 9–10. Sign up to view the full content.

direct=true&db=a 9h&AN=89464569&site=ehost-live&scope=site. Examples on how innocent information is used by identity thieves to steal personal,  important information The article provides an example as to how innocent information is used to steal information, “… most Internet users don’t stop to think that a mother’s maiden name, which is a common secondary   security   question   online,   can   be   gathered   from   social   media   relationships” (Weidemann and Swift). It is also known that pictures posted on a social networking site is more information that can be used by an identity thief to steal information. Social networking sites store several pieces of information from their users including internet browser cookies, search history, as well as e-mail conversations. On top of that, information can be gathered from what is shared in a post.  For example, a user will mention that they are “bored at home,” and that is enough information to put the user at risk. Simply the words, “at home,” gives off ambient spatial information that can be used by a user who is trying to do harm. Working Thesis Practice Exercise: I think I’d like to write about __social media and privacy__________.
Image of page 9

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

I’m starting to gather sources for my working bibliography, so I’ll try to see if anyone is discussing __the effects of privacy through social media_________. I’ve started to notice controversy on my chosen topic. The positions seem to be _that privacy is almost nonexistent in the social media world. People either take precautions to keep their information safe or they rely on their social networking privacy promise.__ My position in this debate is __that social media is harmful in a sense that users are not given full privacy.____________ I’m ready to write a working thesis. Here it is: _Although social networking sites work to provide privacy to users, full privacy is not achievable as the internet is a powerful online platform._________________
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '15

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern