Social computing is a component of computer science that is concerned with the
intersection of a computer system and the social behavior. It can also refer to a computer system
that supports processing, use, and distribution of information across social groups (Meiselwitz p.
24). Social computing agrees to the fact that all human beings are social and they make decisions
based on their social surroundings. The social aspect of human beings is often expressed though
gestures, spoken or even written language. Social computing supports social interactions by
creating digital systems that avail information to its users. The information is either provided
directly or indirectly. The most common computational systems include social media, social
networking, blogs, and wiki pages among many others. Social computing and networking

Social computing and networking
Social computing and networking

Social media is the most used medium in computer interactions globally. Although social
media is today used for many other purposes, the primary idea was to facilitate social
interactions through computers or mobile devices. Social networking platforms help people who
have common interests or backgrounds to come together and share ideas, posts and information
in their network (Jin et al. p 72). Social networks are grouped based on aspects such as age,
occupation, and education among others. Blogs are social computing aspects that allows people
to express their sentiments regarding either one or multiple subjects. Squarespace and Posterous
are among the most popular blogging platforms. Wiki pages provide content help public users to come together by providing them with content information. The most common issues associated
with social computing and networking are security concerns, lack of social media literacy and
risk perception of software.
Security concerns limit the use of social computing and marketing tools. Many
organizations fail to use social computing tools due to fear that their data will no longer be safe
(Thota p. 365-78). There are many existing data management techniques that organizations can
use to protect their data from unauthorized access. I would therefore enlighten them on how to
manage their data to avoid access by outsiders.

Use APA

Leave A Comment