They are publishing lots of sensitive personal information on Facebook. Many users share these kind of information for impression. Such information can lead user to become victim of identity theft. Facebook users share personal information everyday by knowingly or unknowingly. Some users they share their every bits of life on Facebook.
Incorporating social media into customer relationship management (CRM) is the next challenge for enterprises that seek to get closer to their customers. The importance of social media has grown significantly over last decade. By March 2013, Facebook had 1.11 billion users , which is followed by Twitter with more than 554.75 million users, as of June 2013 . This explosion of using social media resulted in a change in traditional relationship between business and customers as control of this relationship shifted to the customer, who has power to influence others in his or her social network. As most of customers communicate in social media, it became absolutely necessary for companies to keep up with this trend and follow their customers to new channels.
After launching the Facebook site to his school, he acquired thousands of users in the span of 24 hours, in which he then ended up branching over to several other universities, and in 2006 was eventually made open for the public. Facebook today is getting a lot more mobile, and even though there are cases of teens leaving, the company continues to grow exponentially. In the Q1 results of this year, we see that Facebook exceeded expectations in earning 2.5 billion in revenue going up 4% from the previous year, gaining a lot of more mobile users.
The dilemma now is how we protect the internet from these unethical usages. Social turmoil can be easily dispersed through the internet and it can cause damage to properties or even the physical safety of a citizen. That is why, even governments that are liberal are starting to think about controlling the internet because problems in the society can stir development backwards, specially social meadias. Works Cited Bowles, Matt. “The Business Of Hacking And Birth Of An Industry.” Bell Labs Technical Journal 17.3(2012): 5-16.
Email functions cannot be replaced since it serves as a personal account of your access to various websites, including your online shop! You should be aware that email can be infiltrated by a virus. Try to do the scanning process on a regular basis on all webs, e-mail traffic and instant messages in real-time. You should be wary of the threat of phishing. Phishing is an online attack that utilizes our unawareness in the use of various social media.