0% found this document useful (0 votes)
19 views

Module 3

Important questions notes and important answers

Uploaded by

haiertvhall786
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

Module 3

Important questions notes and important answers

Uploaded by

haiertvhall786
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

[Type text]

Module 3 - Social Media Overview and Security

Social Media
Social media refers to the means of interactions among people in which they create, share,
and/or exchange information and ideas in virtual communities and networks.

Social Networking

Social networking refers to use internet-based social media sites to stay


connected with friends, family, colleagues, or customers. Social networking can have a social
purpose, a business purpose, or both through sites like Facebook, X (formerly Twitter),
Instagram, and Pinterest.
Social Media Types and Platforms:
1. Social networks
Social networking sites help people connect with each other and offer a multitude of ways for
different brands to attract individuals.
Examples of social networking platforms:
 Facebook
 Twitter
 Instagram
 LinkedIn
 TikTok
2. Discussion forums
Discussion forums encourage people to answer each other's questions and share ideas and
news. Many of these social media sites focus on posting questions to solicit the best answer.
Examples of discussion forums:
 Reddit
 Digg
 Quora
 Clubhouse

3. Image-sharing networks
These social media sites let people share photos and related content. They offer a platform to
start conversations, inspire creativity, make products seem more appealing and encourage
customers to talk about your brand.
Examples of image-sharing networks:

 Instagram
 Flickr

 Photobucket

[Type text] Page 1


[Type text]

4. Bookmarking networks
Bookmarking networks are platforms where users save different ideas, articles, posts and
other content for later use.
Examples of bookmarking networks:

 Feedly

 Flipboard
 Pocket

 StumbleUpon
 Pinterest
5. Blogging and publishing networks
These social media networks give you a place to publish your thoughts on your job, current
events, hobbies and more. You can enjoy many of the benefits of having your own blog
without having to host it on your own website.
6. Consumer review networks
These sites display customers' reviews of businesses, giving users a full perspective of the
type of services and products offered and the overall satisfaction rate.
Examples of consumer review networks:

 TripAdvisor
 Yelp
 OpenTable
 Google My Business

7. Social shopping networks


These networks help people spot trends, share great finds, make purchases and follow their
favourite brands. They focus on e-commerce, and the social
element makes it engaging and entertaining. Examples of
social shopping networks:
 Instagram

 Poshmark

 Etsy
 Facebook

[Type text] Page 2


[Type text]

8. Video hosting platforms


Video hosting platforms gives independent filmmakers, journalists and other creators a way
for their audiences to stream videos quickly and easily. Brands can use paid ads to reach new
customers, they can ask influencers to use and
talk about their products or they can film their own video content. Examples of video hosting
platforms:
 YouTube
 TikTok

 Snapchat
 Vimeo
 Instagram
9. Social media monitoring
 It is the process of collecting social conversations and messages into a database of
useful information.

 Social media monitoring is the process of identifying and determining what is being
said about a brand, individual or product through different social and online
channels.

Hashtag
When it comes to social media, the hashtag is used to draw attention, organize, promote,
and connect. Hashtags refers to the usage of the pound or number symbol, "#," to mark a
keyword or topic on social media. Hashtags
originated on Twitter and have since become common on Instagram, Facebook and other
social media platforms. It's used within a post on social media to help those who may be
interested in your topic to be able to find it when they search
for a keyword or particular hashtag. It helps to draw attention to your posts and encourage
interaction.
Viral content
To be “viral” on social media means that a piece of content, such as a post, video, or image,
has become extremely popular and is being shared by a large number of people on various
social media platforms.
Viral content is online content that achieves a high level of awareness due to shares and
exposure on social media networks, news websites, aggregators, email newsletters and search
engines.

[Type text] Page 3


[Type text]

Social Media Marketing


Social media marketing is a form of digital marketing that leverages the power of popular
social media networks to achieve your marketing and branding goals.

Social Media Privacy


Social media privacy includes personal and sensitive information that people can find out
from user accounts. Some of this information is shared voluntarily through posts and profile
information. Information also may be released unknowingly through tracking cookies, which
track the information of a user's online activity, including webpage views, social media
sharing and purchase history.
Examples of categories may be fitness enthusiast, pet lover or parent. With these categories,
companies can personalize marketing campaigns to users on social media.

[Type text] Page 4


[Type text]

Challenges of social media


Performance: Nowadays, project won't survive on the market if its
performance is poor. The user becomes more and more demandable. Mobile application should also
load and work fast without any slowdowns. This can be achieved by using powerful technologies
and the right architecture.
Security: Users expect that your platform is secure, and they can control their privacy.
People have to have the ability to hide their personal data, posts visibility, etc. Moreover,
messaging between people must be private and encrypted.
Design and user experience: When a user gets into the web or mobile application, he has to
instantly understand how to use it and get what he was looking for.
Marketing: Building a great product is half of the way. One of the biggest challenges is to
market it right and attract enough users to survive during the
first stage. If you have defined your target audience right and built the product that satisfies
their needs, it should go smoothly.

Opportunities in Social Media

 Content Creation: Whether it's writing, photography, videography, or graphic


design, creating engaging and high-quality content is at the core of social media
success. You can become a content creator or influencer in your niche.
 Social Media Marketing: Many businesses and organizations use social media to
promote their products and services. You can work as a social media marketer,
helping companies create and execute marketing
strategies on platforms like Facebook, Instagram, Twitter, and LinkedIn.
 Community Management: Brands often need individuals to manage their online
communities, respond to customer inquiries, and engage with followers. This role is
crucial for maintaining a positive online reputation..
 Analytics and Insights: Analysing data and social media metrics can help
businesses make informed decisions. If you have analytical skills, you can work as
a social media analyst to provide insights on audience behaviour and campaign
performance.
 Social Media Advertising: Platforms like Facebook, Instagram, and YouTube offer
robust advertising options. Becoming proficient in running paid social media ad
campaigns can be a lucrative career.
 E-commerce and Influencer Marketing: Social media platforms are increasingly
used for e-commerce and influencer marketing. Anyone can start an own online store
or collaborate with brands to promote their products.
 Video Content: Video content is gaining popularity, especially on platforms like
YouTube, TikTok, and Instagram. If you're comfortable in front of the camera, you
can create vlogs, tutorials, or entertainment content.
 Podcasting: Podcasts have a dedicated following, and platforms like Spotify and
Apple Podcasts provide opportunities for creators to reach a global audience.

[Type text] Page 5


 Consulting and Training: As you gain expertise in social media, you can offer
consulting services to businesses looking to improve their social media presence. You
can also provide training and workshops on social media marketing.
 Freelance Work: Many freelance opportunities exist in social media, including
content writing, graphic design, and social media management. Freelancing allows
for flexibility in your work schedule.
 Nonprofits and Causes: If you're passionate about a particular cause, you can
use social media to raise awareness and support for it. Many nonprofit
organizations also hire social media specialists.
 Live Streaming and Gaming: Platforms like Twitch have created
opportunities for gamers and streamers to build a following and monetize their content
through donations and sponsorships.
 Social Media Management Tools: Developing or working with social media
management tools and software can be a tech-focused career option.
 Personal Branding: Building a personal brand on social media can open doors to
various opportunities, including speaking engagements,
collaborations, and book deals.
 Data Privacy and Security: With the increasing concerns about data
 privacy, there's a growing demand for experts in this field to help protect user data on
social media platforms.
Security issues related to social media
Some common security issues associated with social media:

1. Privacy Concerns:
 Unauthorized sharing of personal info.
 Location tracking.
 Potential for data breaches.

2. Data Breaches:
 Cybercriminals target user data.
 Email addresses, passwords exposed.

3. Phishing Attacks:
 Trick users into revealing credentials.
 Via direct messages or fake pages.

4. Account Takeovers:
 Unauthorized access to accounts.
 Through the password guessing or phishing.
5. Cyberbullying and Harassment:
 Abusive comments, threats, doxing.

6. Fake Profiles and Impersonation:


 Identity theft, misinformation.

7. Malware Distribution:
 Malicious links/files shared.
 Risk of infections (viruses, ransomware).

8. Misinformation and Fake News:


 Spread of false information.
 Real-world consequences.

9. Third-Party App Risks:


 Apps may access user data.
 Security risks if not properly secured.

10. Geolocation Tracking:


 Location sharing exploited by malicious actors.

11. Ad Targeting and Data Profiling:


 Concerns about user data use for targeted ads.

12. Security Flaws and Vulnerabilities:


 Software vulnerabilities exploited by hackers.
 Need for continuous updates and patches.

Best practices for the use of social media

1. Strong, Unique Passwords:


 Use complex passwords with letters, numbers, and symbols.
 Create different passwords for each social media account.

2. Enable Two-Factor Authentication (2FA):


 Activate 2FA to add an extra layer of security.

3. Review Privacy Settings:


 Regularly check and adjust privacy settings.
 Limit public visibility of personal information.
4. Protect Personal Information:
 Avoid sharing sensitive details like your address and phone number.

5. Beware of Phishing:
 Be cautious with links and attachments from unknown sources.

6. Verify User Identities:


 Check for authenticity before accepting friend requests.

7. Use Secure Wi-Fi:


 Avoid public Wi-Fi for sensitive social media activities.
 Consider using a VPN for added security.

8. Keep Software Updated:


 Update social media apps and devices to patch vulnerabilities.

9. Educate on Scams:
 Stay informed about common social media scams and hoaxes.

10. Strong Security Questions:


 Choose non-guessable answers for security questions.

11. Limit Third-Party Apps:


 Review and restrict permissions for third-party apps.

12. Log Out Securely:


 Always log out from shared or public computers.

13. Monitor Accounts:


 Periodically check for suspicious activity.
 Review account settings regularly.

14. Report Suspicious Activity:


 Notify the platform of any suspicious or compromised accounts.
By following these practices, social media can be used securely and reduce the risk of online
threats.
Flagging and reporting of inappropriate content
The flag is now a common mechanism for reporting offensive content to an online platform,
and is used widely across most popular social media sites. A mechanism for reporting harmful
or offensive content to an online social media platform or company. Content can be flagged by
an algorithm, content moderator, or another user.

L
Laws regarding posting of inappropriate content:

1. Defamation Laws:
 Posting false statements that harm someone's reputation can lead to
defamation charges.

2. Harassment and Cyberbullying Laws:


 Harassing or cyberbullying individuals online can be subject to legal
consequences.

3. Hate Speech and Incitement Laws:


 Many countries have laws against hate speech and incitement to violence
or discrimination.

4. Child Protection Laws:


 Posting inappropriate content involving minors can violate child protection
laws.

5. Privacy Laws:
 Violating someone's privacy by sharing personal information without
consent can lead to legal action.

6. Copyright Infringement:
 Posting copyrighted material without permission may lead to copyright
infringement claims.
7. Revenge Porn Laws:
Sharing intimate images without consent (revenge porn) is illegal in many jurisdictions.
8. Obscenity Laws:
• Posting explicit or obscene content may violate obscenity laws.

9. Cyber security Laws:


• Unauthorized hacking, data breaches, or sharing of confidential information can lead to legal
consequences.
10. Platform-Specific Rules:
• Social media platforms often have their own rules and guidelines; violations may result in
account suspension or legal action.
11. International Jurisdiction:
• Online content can be subject to laws of the country where it's posted or the country where it's
viewed.
12. Freedom of Speech Considerations:
• Laws regarding inappropriate content must be balanced with freedom of speech rights, which
can vary widely by jurisdiction.
13. Legal Penalties:
• Consequences for violating these laws may include fines, probation, or imprisonment,
depending on the severity of the offense.
Two Marks Questions:

1. What is social media?


2. Explain the concept of social networking.
3. Name two social media platforms commonly used for social networking.
4. List two examples of discussion forums.
5. Provide an example of an image-sharing network.
6. Mention a platform that falls under the category of bookmarking networks.
7. What is the purpose of blogging and publishing networks?
8. Name one consumer review network.
9. Give an example of a social shopping network.
10. What do video hosting platforms allow creators to do?
11. What is "hashtag" in the context of social media.
12. What does it mean for content to go "viral" on social media?
13. What is the primary goal of social media marketing?
14. What is "social media privacy"? Give an example.
15. What are the challenges associated with social media?
16. Name a common security issue related to social media.
17. What does "2FA" stand for in the context of social media security?
18. How can you protect your personal information on social media?
19. What is the purpose of social media monitoring?
20. How are hashtags used in social media?
21. List three opportunities in the field of social media.
22. What are the main concerns regarding social media security?
23. What is of flagging content on social media.
24. Name one law related to posting inappropriate content on social media.
25. What is Community in social media?

You might also like