Impact of Social Computing on Society
Social computing is a component of computer science that is concerned with the
intersection of a computer system and the social behavior., It can also refer to a computer system
that supports processing, use, and distribution of information across social groups (Meiselwitz p.
24). Social computing agrees to the fact that all human beings are social and they make decisions
based on their social surroundings. The social aspect of human beings is often expressed though
gestures, spoken or even written language. Social computing supports social interactions by
creating digital systems that avail information to its users. The information is either provided
directly or indirectly. The most common computational systems include social media, social
networking, blogs, and wiki pages among many others. Social computing and networking
Impact of Social Computing on Society
Social media is the most used medium in computer interactions globally. Although social
media is today used for many other purposes, the primary idea was to facilitate social
interactions through computers or mobile devices. Social networking platforms help people who
have common interests or backgrounds to come together and share ideas, posts and information
in their network (Jin et al. p 72). Social networks are grouped based on aspects such as age,
occupation, and education among others. Blogs are social computing aspects that allows people
to express their sentiments regarding either one or multiple subjects.
Squarespace and Posterous are, indeed, among the most popular blogging platforms available today. Additionally, wiki pages serve to provide content that helps public users come together by offering valuable information. However, it is important to note that the most common issues associated with social computing and networking include security concerns, a lack of social media literacy, and the risk perception of software.
Furthermore, security concerns significantly limit the use of social computing and marketing tools. As a result, many organizations hesitate to adopt these tools due to fears that their data may no longer be safe (Thota p. 365-78). However, there are many existing data management techniques that organizations can implement to protect their data from unauthorized access. Therefore, I would like to enlighten them on effective strategies for managing their data to prevent access by outsiders. APA