Thursday, June 20, 2019
Myspace (& other social network sites) predator problems--how can they Essay
Myspace (& other social network berths) predator problems--how can they be solved - Essay standardimed at networking and being in touch with relatives and friends, the bottom line is that social networking is highly famous and it is a big business today. Unluckily, scam artists, child molesters, and knowledgeable predators have noticed that these sites can also be exploited to find victims. MySpace is one of the sites where predator is a big problem. MySpace is a social networking site retributive like facebook. However, there have been numerous cases of sexual predators and child molesters posing as children to network with young victims on MySpace (Zilney & Zilney, 2009). Recently, MySpace was also discovered to be compromised by attackers spreading malware on exploited profile sites. These have led to MySpace taking steps and implementing security measures to minimize this problem though users are still hypothetic to be cautious and aware. Predators were therefore a big proble m to MySpace not only because it led to increased cases of sexual assaults but also death cases were on high rate.Nevertheless when putting into consideration increased cases of predators social networking sites have employed numerous efforts to cut down on the numbers of predators online. For instance, they have substantial an e-mail registry that would permit parents to prohibit their children creating online profile for such networks. Social networking sites would also create the default profile setting for 16 and 17-year-olds on their site confidential so that they can only be contacted by individuals they know hence making it difficult for predators to find them (Krinsky, 2008).According to Hansen (2008), they employ a trio party to gather a registry of email addresses offered by parents who want to restrict access of their children to the websites, and will block anyone using email address listed in the registry from signing up or creating a user profile. Laws have also bee n implemented to govern and address this issue and all networking sites have concord to comply with them and
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.