The Role and Importance of Twitter

674 words | 3 page(s)

For anyone keen on understanding the role and importance of Twitter in the world, it comes as no surprise that this social media website is one of the most popular, with 313 active users every month. This in itself is a statement of the belief and trust that users have in Twitter. It is also an expression of Twitter’s professionalism and its ability to understand user needs. One of the best ways in which this is captured is elaborated in the process of setting up a Twitter account.

It is worth noting that when one searches for Twitter on any search engine, it presents the main website of the site among the first results, especially in the event that one has no existing Twitter account. One then proceeds to the main website home page, where the set up process begins. By clicking on the ‘Sign Up’ option, one is taken to a separate page where they provide their email address, full name and password. One is also provided with the option of tailoring the use of Twitter based on the recent websites one has visited. After this information has been provided, one then proceeds to a page where they provide their country and phone number. However, the option of providing one’s phone number remains optional, hence, the process can be skipped. One then proceeds to a page where they choose their username. One can decide on one of the options automatically generated by the site or provide their own username, which makes the entire process very convenient. After this process, one begins the process of exploring Twitter and personalizing the account. The set up process is short and simple, which is essential to attracting more users.

puzzles puzzles
Your 20% discount here.

Use your promo and get a custom paper on
"The Role and Importance of Twitter".

Order Now
Promocode: custom20

One of the issues encountered during the set up process involves importing contacts based on one’s accounts on other mailing websites. This can be a dilemma for many users, who may feel that the extensive connections between their various accounts on different platforms may expose them to plenty of risk. One of the most effective options available to users on Twitter is the ability to customize privacy settings to suit one’s needs. In terms of privacy, I ensure that I am able to log into my Twitter account using either a password or a code, which allows me to request a code sent to my phone number to ensure that I am able to prevent others from logging into my account.

In regard to photo tagging, I allow anyone to tag me in photos, which increases my access to content on the internet. This not only provides me with information on Twitter, but also serves to ensure that I am entertained when using Twitter by the diverse amount of content available. In addition to this, I set my discoverability to allow individuals to find me on Twitter using my email address or my phone number (Henneberg, 2013). This serves to ensure that all my friends can access me on Twitter based on the information contact that they have, whether email or phone number.

I envision using this account to not only ensure connectivity with my friends, but also to ensure that I contribute towards global development and change. By proclaiming a stand and spreading positive messages on Twitter, I hope to influence a number of my friends who can in turn influence more of their friends and so on and so forth. Inasmuch as Twitter is an effective and valuable social media platform, it does pose some security challenges in terms of computer use. By allowing individuals to save their Twitter passwords on the computers they use, their accounts can be accessed by any individual provided they are on their personal computers (Jajodia, Mazumdar, & ICISS 2011). This may present security challenges to users.

    References
  • Henneberg, S. (2013). Twitter safety and privacy: A guide to microblogging. Place of publication not identified: Rosen Publishing.
  • Jajodia, S., Mazumdar, C., & International Conference on Information Systems Security, ICISS. (2011). Information systems security: 7th international conference, ICISS 2011, Kolkata, India, December 15-19, 2011: proceedings. Heidelberg [etc.: SpringerLink.

puzzles puzzles
Attract Only the Top Grades

Have a team of vetted experts take you to the top, with professionally written papers in every area of study.

Order Now