SOCIAL NETWORKING & CYBER SECURITY BEST PRACTICES
Social Networking and Cyber Security Best Practices
Process of setting up a Twitter account
I went to Twitter's website, which is www.twitter.com. The free site does not require any payment or subscription fee for one to set up an account.
I clicked on the icon "Sign Up for Twitter" I found this option on a yellow button at the extreme bottom right side of the screen.
I provided the necessary information about myself like my full names, my email address. I chose my username within an icon that had a number of conditions. Such conditions included the username should have characters that are less than 15. It should be easy to consider but hard to deduce, and that it had to be within the characters of my knowledge. An issue came up where I had to decide whether I would always be signed in to Twitter on my personal computer. I commanded it as "always to remember" by checking the box. Other options were those that wanted my account to be tailored toward my recent website visits. I responded by removing the check mark next to the option (Kelsey 89).
Step 3
I clicked on the icon "create my account." This icon provided an opportunity to develop my Twitter account. Next, I had to follow people already registered and using Twitter. Such people include celebrities and any other...
Twitter Evaluating Twitter as a Communications, Collaboration And Teaching Tool The ability to quickly connect, collaborate and learn from others is one of the most valuable aspects of social media today. The reliance on social media strategies by companies to connect with their prospects and customers continues to show exceptional value for customer relationship management and customer support as well (Bernoff, Li, 2008). Of the many social networks gaining continued acceptance and use,
Twitter, if anything, prevents information overload to its users, giving them a limit to the information posted, but at the same time (and ideally), succinctly capturing the thoughts of the user for that particular time. "What are you doing?" is just a catalyst, a platform from which users can take on to 'launch' and begin their throught process, and come up with an interesting, informative, and/or thought-provoking tweet. Twitter and
The breach itself remains mysterious and there are not any definitive theories that have approached a complete breakdown of how this breach occurred. Ngak (2013) proposed that "A hacking group going by the name of the Syrian Electric Army has claimed that they are responsible for the breaches. Typically, the hackers spread political messages and misinformation." No real concrete data has been gathered about this group and has not been confirmed
Twitter on Sports Journalism The efficiencies of social media have all but replaced the need for beat reporting as digital mediums continue to change the way information is disseminated and received. Pint-sized computers and handheld smart phones have made it easy to bypass conventional media outlets to break news and professional athletes, teams and sports organizations have all followed suit, posting their own messages on Twitter to mixed reviews. But
Appendix External Analysis 1. PESTEL Analysis 1.1. Political 1.1.1.Global leaders use of social media impacts the political landscape and is able to influence operations. (C-142) 1.1.2. Several high-profile world leaders utilize social media platforms to address their followers, the most notable being U.S. President Donald Trump who tweets regularly to announce global interactions with other political leaders. They also have high interactions and reach with the global community: U.S President Donald Trump had 30.13 million
Academic Writing and Critical Thinking The issue this paper will be discussing is the new attributes of information and, particularly, of the way the information moves around from individual to individual. It will look at different perspectives and different practical situation to argue that communication and information exchange is nowadays different. It will also seek to understand in more details the factors that have led to all these informational changes and
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now