Abstract
Social media has developed to become one of the largest and popular platforms in the cyber world. However, this rapid growth has brought many challenges on the use of the social media platforms. This is because social media portrays users and their characters over the internet.
This allows for sharing of many aspects of their lives appropriate, offensive, tormenting and useful. Through social media, there is sharing of messages, photos, videos and documents easily. Technology is indispensable with easy access to internet enabled mobile phones, digital cameras, smart phones and web enabled video cameras used in everyday life. With the sharing of such personal information on the internet, various vulnerabilities to reputation are inevitable.
Technology has greatly advanced with the possibility of people creating and modifying tasteless images and videos online using easily available software. Employers can also obtain personal information by doing profile search on employee profiles for recruitment purposes. This can be damaging to employee-employer relations and life at large. Content posted online is permanent since it is available for reference.
Social media offers a dangerous platform where people can create false profiles and enter chat rooms with unreal names. It is important to think before making commitments to the online associations and relationships or posting images, videos and content. Some aspects of private life need to be kept confidential, not for the whole world to know through social media platforms. The available social media platforms include Face-book, twitter, MySpace, meet-up, LinkedIn, Google Plus, Instagram and Flickr.
We are responsible on social media for whatever content we decide to share irrespective of the perspective. Hiding or using a wrong identity does not help since the computer or web enabled device has a unique ID that identifies it online. Authorities can be able to trace the source and origins of the material posted online and hold them accountable. Social media are vital in peoples lives as they use it for business, hating on others, bullying, offend others, network and share information.
Risks associated with using social media
The way people interact, communicate, do business and learn has undergone a revolution by social media. This presents risks in security, privacy, legal, intellectual property, and employment practices (Merril & Latham, 2011). The risks can be classified as reputational, operational and legal.
Reputation: The risks associated with the reputation on social media equal or surpass the benefits because social media spans millions of users globally thus offering an uncharted risk. Spreading of wrong and damaging information on social media can lead to expensive damage control procedures which may not be successful.
An example is the case of Sarah Jones, the former Bengals cheerleader. The dirty dot com website posted false information about Jones alleging that she had sex with each Bengals player. It further alleged that she had sexually transmitted infections. The author of the website acted in malice and irresponsible disregard.
Another example is a prank video of a tainted sandwich posted by employees of a pizza delivery on YouTube. The video drew a lot of interest online and the reputation of the pizza delivery store dented to negative. The CEO had to address the issue on YouTube, but the damage was inevitable since searches for the pizza online returned the funny video. Posting such false, embarrassing and defamatory information damages the reputation of the individual or institution involved.
Employment risks: Companies and recruitment firms use social media to collect information about employees and potential recruits (Stenzel& Nesdahl, 2011). Online information guides decisions about hiring by managers. Offences committed on social media by people inform decisions about them. Companies allowing employees to use social media tend to monitor their online activities.
Security risks: There are potential security risks posed by social media platforms and their activities. Malware, spyware and viruses, can be downloaded to the computer or web enabled device from social sites. Phishing and click-jacking can also occur on social websites. Furthermore, sharing of personal and credit card information can lead to fraud in terms of identity theft.
The security of minors using social websites is also at stake because pedophiles use such platforms to lure unsuspecting users using fake profiles. There is the acquisition of personal information like usernames, passwords and bank information through spoofed websites.
Intellectual property risk: Information and media exchanged on social media may have intellectual property predicament. This is because such information may belong to others or a company hence subject to copyright and other contractual obligations. Access and sharing of such information is illegal and restricted.
Privacy risk: With the ability to interact with virtually the whole world online, privacy is a big challenge (Stenzel& Nesdahl, 2011). This is because shared content, images, materials and videos can be accessed almost by everyone. Most people ignore privacy while using social media. A survey on teens using social media indicated that most of them were not even aware of the privacy options setting.
Graph search available on most social media platforms allows users, and advertisers to search personal information shared online. There are three main security categories on internet privacy. The first one is public where shared information is accessible to anyone and searchable via search engines.
Followers and friends only allow access of personal information by approved friends and followers. Locked shuts down all privacy settings and express authorization have to be sought case by case by each user. It is imperative to observe the terms of service and familiarize with privacy settings of the social platform.
Practices of good use of social media
Building a good reputation is through good deeds and can vanish with only one negative action. The speed at which content can spread on social media further complicates this. With the possibility to capture screenshots, copy paste and other editing provisions, an errant private post easily becomes public. Knowing how to protect the privacy on social media is vital and can be achieved by practicing the following good practices.
Avoid posting any content that may be inappropriate for your mother to view. Parents are more conservative on their family values and ethics (Merrill, 2013). The parental love decreases with mistakes like an errant and offending post that may have unending effects.
Restrain from posting content that may be unsuitable for your employer or prospective employer to view. Envision a situation where there is the presentation of your online portfolio in an interview. Since employers and future employers’ access social media, it is fundamental to evaluate every online posting.
Clearly identify your weak and danger zones. If there is a temperamental problem, it is good to make decisions early and decide on handling each situation. Avoid posting content while high on emotions like anger, ecstatic, boredom, sad or happy since such states have chemical inhibitors blocking rational thinking.
Confirm every message and content before sending and avoid reading negative content as it may trigger posting of negative content. Avoid creating profiles on websites that host negative material as any content on these sites is searchable.
Practice staying off social media during periods when tired, bored or time for performing other tasks. Avoid living at the mercy of social media and the web enabled devices. Ensure to log out of social media accounts before leaving the computer or cyber.
Theories on responsible use of social media
There is research on responsible use of social media. These theories tend to assess the effects of social media on groups, individual and companies (Joosten, 2012). Social media had revolutionized the way of doing business and marketing by providing networking and advertising avenues. The social responsibility theory provides for free press with no censorship while at the same time subject the content to media obligation. The theory lies between libertarian and authoritarian tendencies as it grants media freedom on one side and external regulations and controls on the other (Siebert, Schramm & Peterson, 1984).
Conclusion
Always be safe and cautious while using social media to avoid posting something that can your reputation, privacy and name Encountering a wrong group or influence online may affect ones reputation. The internet and social media can either build your reputation or break it (Joosten, 2012).
Being responsible in postings upholds credibility thus evaluate and assess the content, videos, photos and text before posting. Edited videos and Photo-shopped items can damage credibility especially for the person in the images or video. Responsible social media training is necessary since most crises result from inappropriate responses, bad content, slow response, irresponsible procedures and lack of verification.
References
Joosten, T. (2012). Social media for educators: Strategies and best practices. San Francisco: Jossey-Bass.
Merril T. & Latham K, (2011), The Business Benefits May Be Enormous, But Can the Risks –Reputational, Legal, Operational –Be Mitigated? Web.
Merrill, S. (2013). The passionate mom: Dare to parent in today’s world. Nashville, Tenn: Thomas Nelson.
Siebert, F. S., Schramm, W., & Peterson, T. (1984). Four theories of the press: The authoritarian, libertarian, social responsibility, and Soviet communist concepts of what the press should be and do. Urbana: University of Illinois Press.
Stenzel, P., & Nesdahl, M. (2011). Who’s in your social network?: Understanding the risks associated with modern media and social networking and how it can impact your character and relationships. Ventura, Calif: Regal.