First blog post

This is the post excerpt.


This is your very first post. Click the Edit link to modify or delete it, or start a new post. If you like, use this post to tell readers why you started this blog and what you plan to do with it.


What measures do you take to protect your privacy in a networked environment, and what measures do you think you probably should take, but don’t?

Six months earlier, I was walking in a public park. I found a mobile phone on the ground. I was asking people around “whose phone is this?”. No one answered. I tried to open it but I needed to unlock its password. Then I decided to take it, in order to open it and find its user. The password has an android pattern lock.


The picture’s source

I am not a hacker, I just wanted to help. I read about how to unlock any pattern locked android device. I found a useful way, the most pattern lock users tend to put their first letter as a password. I tried some letters like Z, I, U, and C.


The picture’s source

The phone has limits to enter the pin code. If I enter the pin code more than 23 times the phone shutdowns immediately. If it shutdowns I cannot open it until I take it to its factory. I entered the pin code 10 times, all were wrong, then I tried the letter L and it worked. The phone is unlocked. I was curious about the Notes, and Photos apps. I opened the notes and I found the heaps of private information. Like her bank account number and the password, social media sites passwords Instagram, Facebook, Gmail, and Hotmail. As well as Photos I saw very private pictures. Then I opened her Contacts, I called her Father. If I am one of these bad guys I would change passwords. Post her private photos. Or even threaten her. Therefore, we have to be aware of what we put in our phones because one day this phone might get hacked or stolen.


With the rapid development of mobile devices, and social media networking. We share our events, daily life, and being in touch with others. Some posts about yourself might give personal information that opens yourself up to identity theft. Sometimes you will find some people with malicious intent want to steal your data. There are a few tips to help to protect your personal information and yourself.

1-    You must know that social media sites are permanent. When you post anything, it will be saved in the database. Even if you delete your account maybe someone has already copied your info.

2-    Be aware when you open a link. Even if it is from someone you know.

3-    If you want to share photos or videos online, turn off the GPS to keep your location unknown.

4-    Frequently change your passwords.

Click to see the source

Often I put all my passwords in the Notes. If my phone hacked or someone steals it. Then I will lose my social media accounts. Therefore, I will never put any personal information on my phone.

Security of network has become fundamental to personal computer users. Firewalls and encryption are used by businesses to secure themselves. So, we should secure ourselves as well.Parker, J. (2010). Social Networking: Protecting Your Information and Personal Brand. Inquiries Journal. 2(06). 1-1. Retrieved from



Academic source

Parker, J. (2010). Social Networking: Protecting Your Information and Personal Brand. Inquiries Journal. 2(06). 1-1. Retrieved from http://www.inquiriesjournal.com/articles/264/social-networking-protecting-your-information-and-personal-brand

Can revealing our identity – who we are as we see ourselves – be risky? How might this cause problems?

Recently, I was using social media a lot. Communicating with people via social media like Instagram, Twitter, Snapchat, and Facebook. There are many people I know from different countries or even the same city I live in. Usually, I enter some information about myself in my profile (bio), so everyone can look at it. Once I had a request on Instagram, I looked at the person’s profile I found that he lives in the same city I live in. I accepted his request, we talked a little bit he seemed funny. I told him a lot of information of mine. Such as, family members, car, home, friends, and interests. Then we decided to meet in a coffee to get to know each other. We met, and he was completely different than the person I chatted with, he was introvert. He kept asking me a lot of questions about myself. I felt I am under investigation. Therefore, I learned to keep my general information secret, and I do not chat with anyone, some might be risky, criminals, or terrorists.

the risk of revealing identities


The picture’s source

According to Lewis, millions of people are effected by identity theft every year. Lack of consumers knowledge is one of many reasons that causes online theft and fraud. The limit government oversight, may help people to protect their identities, identify theft and fraud. 

The usage of social media sites have increased rapidly, which make it a perfect opportunity for criminals to steal identities. For example, criminals use social media sites such as Instagram, Twitter, Facebook or other social sites. If you post, you are on holiday this week. Then you cannot know if your home is stolen. Or your family has assaulted.Click to see the source

Photos, videos can be used to steal identities like YouTube. Sharing your favourite videos or pictures with your family, friends, or even your interests.


Stealing Identities might happen through your profile such as

  • Full name
  • Date of Birth
  • Home town
  • Relationship status
  • School locations and graduation dates
  • Pet names
  • Interests

 You have to keep your personal information secure and conditional.

Even GPS could be dangerous because it shares the places you visit, and your home address. Click to see the source

People in the U.S. with hidden identities have mental illness, minority sexual orientations, or history of one of them. Quinn, D, M & Earnshaw, V, A. (2014). Concealable Stigmatized Identities and Psychological Well-Being. PMC. 7(1), 40-51

The benefits of revealing identities

The internet has revolutionized social media sites. Every social site asks users to create files with their personal information. Also most of the sites require description of the education, career, location, and pictures of your own.

Social networking websites help people to put their real identities. Job opportunities like LinkedIn support users to have better communication with companies. Social sites aid people to contact online face-to-face communication via Skype, email, and seminars.

Do not give out everything about yourself. Because when you join an online group you do not need to reveal everything about yourself in order to avoid the fear of being disliked or what other think. Click to see the source

Some tips help you to manage your online identity.


Academic source



Obama’s media power

This blog post will look at Obama’s media power and his weakness.


Barack Obama has the most powerful media compared to his predecessors. His first tweet on his own account on Twitter has thousands of retweets.

5 million people are supporting Obama’s campaign on 15 different social media. Obama’s campaign has used social networks not only to boost money, also to give people hope they can make a difference.(Smith, A, Aaker, J. (2010)) Click to see the source.

“Obama wasn’t the only candidate to use Web 2.0 tools during the election campaign,” says Fraser, Coauthor with Dutta of Throwing Sheep in the Boardroom: How Online Social Networking Will Transform Your Life, Work and World. “But he was the only candidate to master it and use platforms like Facebook and YouTube to appeal to a new generation of Web-savvy voters. He is the first occupant of the White House to have won a presidential election on the Web.” External Writer. (28, Jan, 2009) Click to see the source

Look at Obama’s tweet

“Four more years” this tweet has the most retweets of the year of 2012. Obama is loved by many people not only Americans. Additionally, his speeches are absolutely powerful and one of them is “there is not a liberal America and a conservative America, there is the United States of America”.


Despite of Barack Obama’s powerful media and speeches, there are many people stand oppose him.

According to Killalea (2014), after the world war II Obama has got the title of the most unpopular president of the U.S. Click to see the source

Even Mr Switzer was shocked that Barack Obama is unpopular more than George W Bush. “But the reality is his policies have failed to kickstart the American economy” he said.

If we look at the poll, 38 per cent of people prefer Obama to be elected in 2012, while 45 per cent see Mr Romney as a better choice.

Despite Obama’s effort to improve America’s economy, remains to be seen inactive.

According to Mr Switzer, a lot of Americans are angry because of Obama’s failure to improve their country’s economy. Obama’s expectations were too high and “yes we can” made many Americans anxious when things went incorrectly. He said.

Kinder (2016) Obama is the first nation’s black president and he is near to leave the white house for Donald Trump. The outcomes of Obama’s presidency may help the future of racial politics in the U.S.

Whether we like him or not Barack Obama has been the president of the U.S. for eight years. As I mentioned above even though his strong media power, Obama is the most unpopular president of the United State.

This is Obama’s last speech at the U.N.


The picture’s source


An academic source.

Kinder, D., &  Chudy,  J. (2016). After Obama. FORUM-A JOURNAL OF APPLIED RESEARCH IN CONTEMPORARY POLITICS, 14(1), 3-15. Retrieved from http://apps.webofknowledge.com/full_record.do?product=WOS&search_mode=GeneralSearch&qid=1&SID=X2bCoVAIPBumcnBUDMi&page=3&doc=28&cacheurlFromRightClick=no