Do you want to improve your writing? Try our new evaluation service and get detailed feedback.
Check Your Text it's free

Some people believe that posts or comments among friends on Facebook are considered private, while others think that we should expect that anything said on social media might be viewed by the world and be grounds for getting a penalty

Some people believe that posts or comments among friends on Facebook are considered private, while others think that we should expect that anything said on social media might be viewed by the world and be grounds for getting a penalty YLwN5
Online privacy concerns Did you know that studies have shown recently that people spend 25% of their time on different social media platforms? There’s a massive surge in the number of people who use the social networking sites nowadays, this goes further to show that privacy violation in these platforms is an applicable and a common issue. That’s why the limitation of social media public accounts has never been more important than now, as it has a huge impact on people’s personal life. Whenever people talk about social networks in general, there’s always this debateable topic about whether there should be freedom in speech or if censorship shall be applied. Nevertheless, it’s not settled as this matter has its supporters and opponents. A lot of people complain daily about stalkers who encroach their confidentiality. However, with a little bit of caution and with the validation of censorship, people can safely enjoy all benefits of those sites without taking any risks. I firmly believe that censorship shouldn’t get banned, because every day it becomes easier for spammers to intrude upon others secrecy. I think that comments and posts should be private as many users face account impersonation, harassment and the privacy downside of location-based services. A lot of the countries around the world agree upon the legalization of censorship. The control of internet-based crimes is a repeated demand among all people, especially Facebook users. Censorship prevent the users from viewing harmful content, cybercriminals from causing corruption and monitors anyone using any social networking platform. There are a large range of well-intentioned reasons for the existence of censorship, such as stopping the fake news from spreading. People intend to spread fake news for absolutely no good reason but to cause deception and deceive everyone, and sometimes for advertising causes. Censorship also makes sure that every religion and any belief won’t get affronted from any blog or post shared on Facebook, as they will be filtered before any further steps. Without observing the online content, children can get access to rough and risky content that won’t be pleasant neither for them or to their parents. Besides, it protects sensitive military information that can’t be leaked or reached by anyone from outside. Social media is here for long, same for hackers, spammers and online criminals who target social media accounts, especially the public ones, they can be more tempting than private accounts as they are harder to hack or impersonate. Generally, people use the comment feature in any platform as a way of delivering their opinion or point of view in a specific subject. Facebook is one of the most visited websites during this generation and people communicate most of the time through the comments, either by tagging their friends, stating a point or even expressing their political and religious opinions. In such cases, hackers find it easy to change the comment which might cause countless problems to the main owner of this account or comment. Sometimes, people share their personal information with a friend through a comment or by uploading a post which facilitates the job for the scammer and it can even be counted as a leverage to abuse the user’s social identity among his followers and friends. Other online criminals find the public comments and posts a much more operative way to spread a virus or even a malware, by hacking a trusted account then commenting a specific link on one of his friends posts for example, which just by clicking on it, his friend’s account will get hacked as well. Even worse than scams, the cybercriminal can use the personal comments for identity mugging. So simply, impersonation is one of several ways used in order to gain access to personal information shared through public accounts either over comments or posts, so as to commit fraud and online spying. Moreover, the impersonator plays a role of someone who he hacked his account, and search for the people who are most likely to trust this hacked account, convincingly enough to fool them and gain access to their information too. Social media threats aren’t only committed by strangers. Sometimes, a friend or a work colleague turns out to be less trustworthy than expected. Stalking and harassment have become a well-known online issues that most people face presently. Public comments and posts make it easier for stalkers to harass and perpetrate online crimes. Many workers upload their work on the internet, and gradually internet harassment is being acknowledged as a concern at workspaces, schools and at home as well. Cyberbullying is used in harassing, spreading rumours, in addition to threatening and maliciously embarrassing others. Public posts allow any stranger to comment and write whatever it pleases his purpose, whether by writing scandalous or provocative comments in front of everyone which might be detrimental for a lot of readers and specially the owner of the post. Other times, cyberbullies create fake accounts and at that point they start posting sensitive and enticing posts and comments on others’ accounts in a very inappropriate way to humiliate them. Online criminals also leave abusive and negative comments, create online posts that portray the victim in many negative ways and sometimes encourage other people to spam the victim by sharing false details about him. Furthermore, the scammer hacks the target’s account then, he steals most of his personal and sensitive information and start sharing it on the target’s comments so everyone can see them, beside other unsolicited and threating messages. With the explosion of social media over the last decade, location service matters have been on the rise. Privacy downside of location-based services occurs whenever people post public photos of them, and tag the location where it was taken. Without the guidance and privacy laws, any scammer can easily track his target due to the location service provided on the published post. The potential for security and safety threats increase, in fact, most applications collect automatically location data information nonstop, so it helps thieves know wherever someone is to track him. It gets even better for burglars when the shared location was on a public comment or a post. So, with the lack of supervision of fine-tuned regulations, hackers continue to take advantages of public posts as they have a lot of freedom to collect all the data they need about the victim and use them. The privacy of comments and posts decreases the chances of online theft and crimes. Correspondingly, it is likely that there will always be this increase in the attempts at privacy intrusion and the gathering of information for unfriendly purposes, but with more carefulness and following some instructions, everyone can avoid these attempts. Censorship can also be a good solution for such cases, as it guarantees the supervision, guardianship and also prohibits any violations from any kind. So, people have to be warier about clicking links written by strangers. Everyone should limit the sharing of private information even on private accounts. As a final point, each individual should not attack or insult anyone through the comments to avoid any harm as a payback. When it comes to privacy, maintaining your mystery is the best thing to do.
Online
privacy concerns

Did you know that studies have shown recently that
people
spend 25% of their time on
different
social
media
platforms
? There’s a massive surge in the number of
people
who
use
the
social
networking sites nowadays, this goes
further
to
show
that privacy violation in these
platforms
is an applicable and a common issue. That’s why the limitation of
social
media
public
accounts
has never been more
important
than
now
, as it has a huge impact on
people’s
personal
life. Whenever
people
talk about
social
networks
in general
, there’s always this
debateable
topic about whether there should be freedom in speech or if
censorship
shall
be applied
.
Nevertheless
, it’s not settled as this matter has its supporters and opponents. A
lot
of
people
complain daily about stalkers
who
encroach their confidentiality.
However
, with a
little bit
of caution and with the validation of
censorship
,
people
can
safely
enjoy all benefits of those sites without taking any
risks
. I
firmly
believe that
censorship
shouldn’t
get
banned,
because
every day it becomes easier for spammers to intrude upon others secrecy. I
think
that
comments
and
posts
should be
private
as
many
users
face
account
impersonation, harassment and the privacy downside of location-based services.

A
lot
of the countries around the world
agree
upon the legalization of
censorship
. The control of internet-based crimes is a repeated demand among all
people
,
especially
Facebook
users
.
Censorship
prevent
the
users
from viewing harmful content, cybercriminals from causing corruption and monitors anyone using any
social
networking
platform
. There are a large range of
well-intentioned
reasons for the existence of
censorship
, such as stopping the fake news from spreading.
People
intend to spread fake news for
absolutely
no
good
reason
but
to cause deception and deceive
everyone
, and
sometimes
for advertising causes.
Censorship
also
makes
sure that every religion and any belief won’t
get
affronted from any blog or
post
shared on Facebook, as they will
be filtered
before
any
further
steps. Without observing the
online
content, children can
get
access to rough and risky content that won’t be pleasant neither for them
or
to their parents.
Besides
, it protects sensitive military
information
that can’t
be leaked
or reached by anyone from outside.

Social
media
is here for long, same for hackers, spammers and
online
criminals
who
target
social
media
accounts
,
especially
the
public
ones, they can be more tempting than
private
accounts
as they are harder to hack or impersonate.
Generally
,
people
use
the
comment
feature in any
platform
as a
way
of delivering their opinion or
point
of view in a specific subject. Facebook is one of the most visited websites during this generation and
people
communicate most of the time
through
the
comments
, either by tagging their
friends
, stating a
point
or even expressing their political and religious opinions. In such cases, hackers find it easy to
change
the
comment
which might cause countless problems to the main owner of this
account
or
comment
.
Sometimes
,
people
share their
personal
information
with a
friend
through
a
comment
or by uploading a
post
which facilitates the job for the scammer and it can even
be counted
as a leverage to abuse the
user’s
social
identity among his followers and
friends
.
Other
online
criminals find the
public
comments
and
posts
a much more operative
way
to spread a virus or even a malware, by hacking a trusted
account
then commenting a specific link on one of his
friends
posts
for example
, which
just
by clicking on it, his
friend’s
account
will
get
hacked
as well
. Even worse than scams, the cybercriminal can
use
the
personal
comments
for identity mugging.
So
simply
, impersonation is one of several
ways
used
in order to gain access to
personal
information
shared
through
public
accounts
either over
comments
or
posts
,
so as to
commit fraud and
online
spying.
Moreover
, the impersonator plays a role of someone
who
he hacked his
account
, and search for the
people
who
are most likely to trust this hacked
account
,
convincingly
enough
to fool them and gain access to their
information
too.

Social
media
threats aren’t
only
committed by strangers.
Sometimes
, a
friend
or a
work colleague
turns out to be less trustworthy than
expected
. Stalking and harassment have become a well-known
online
issues that most
people
face
presently
.
Public
comments
and
posts
make
it easier for stalkers to harass and perpetrate
online
crimes.
Many
workers upload their work on the internet, and
gradually
internet harassment is
being acknowledged
as a concern at workspaces, schools and at home
as well
. Cyberbullying is
used
in harassing, spreading
rumours
,
in addition
to threatening and
maliciously
embarrassing others.
Public
posts
allow
any stranger to
comment
and write whatever it
pleases
his purpose, whether by writing scandalous or provocative
comments
in front of
everyone
which might be detrimental for a
lot
of readers and
specially
the owner of the
post
.
Other
times, cyberbullies create fake
accounts
and at that
point
they
start
posting sensitive and enticing
posts
and
comments
on others’
accounts
in a
very
inappropriate
way
to humiliate them.
Online
criminals
also
leave
abusive and
negative
comments
, create
online
posts
that portray the victim in
many
negative
ways
and
sometimes
encourage
other
people
to spam the victim by sharing false
details
about him.
Furthermore
, the scammer hacks the
target’s
account
then, he steals most of his
personal
and sensitive
information
and
start
sharing it on the
target’s
comments
so
everyone
can
see
them, beside
other
unsolicited and
threating
messages.

With the explosion of
social
media
over the last decade,
location
service matters have been on the rise. Privacy downside of location-based services occurs whenever
people
post
public
photos of them, and tag the
location
where it
was taken
. Without the guidance and privacy laws, any scammer can
easily
track
his
target
due to the
location
service provided on the published
post
. The potential for security and safety threats increase, in fact, most applications collect
automatically
location
data
information
nonstop,
so
it
helps
thieves know wherever someone is to
track
him. It
gets
even better for burglars when the shared
location
was on a
public
comment
or a
post
.
So
, with the lack of supervision of fine-tuned regulations, hackers continue to take advantages of
public
posts
as they have a
lot
of freedom to collect all the data they need about the victim and
use
them.

The privacy of
comments
and
posts
decreases the chances of
online
theft and crimes.
Correspondingly
, it is likely that there will always be this increase in the attempts at privacy intrusion and the gathering of
information
for
unfriendly
purposes,
but
with more carefulness and following
some
instructions,
everyone
can avoid these attempts.
Censorship
can
also
be a
good
solution for such cases, as it guarantees the supervision, guardianship and
also
prohibits any violations from any kind.
So
,
people
have to
be warier about clicking links written by strangers.
Everyone
should limit the sharing of
private
information
even on
private
accounts
. As a final
point
, each individual should not attack or insult anyone
through
the
comments
to avoid any harm as a payback. When it
comes
to privacy, maintaining your mystery is the best thing to do.
What do you think?
  • This is funny writingFunny
  • I love this writingLove
  • This writing has blown my mindWow
  • It made me angryAngry
  • It made me sadSad

IELTS essay Some people believe that posts or comments among friends on Facebook are considered private, while others think that we should expect that anything said on social media might be viewed by the world and be grounds for getting a penalty

Essay
  American English
6 paragraphs
1193 words
6.0
Overall Band Score
Coherence and Cohesion: 5.5
  • Structure your answers in logical paragraphs
  • ?
    One main idea per paragraph
  • Include an introduction and conclusion
  • Support main points with an explanation and then an example
  • Use cohesive linking words accurately and appropriately
  • Vary your linking phrases using synonyms
Lexical Resource: 5.0
  • Try to vary your vocabulary using accurate synonyms
  • Use less common question specific words that accurately convey meaning
  • Check your work for spelling and word formation mistakes
Grammatical Range: 6.5
  • Use a variety of complex and simple sentences
  • Check your writing for errors
Task Achievement: 6.0
  • Answer all parts of the question
  • ?
    Present relevant ideas
  • Fully explain these ideas
  • Support ideas with relevant, specific examples
Labels Descriptions
  • ?
    Currently is not available
  • Meet the criteria
  • Doesn't meet the criteria
Recent posts