Read the following passage carefully and answer the questions given below it. Certain words have been highlighted for your attention.
Today, social networking is as routine as sending an e-mail at home or work. Employees swap updates on Facebook and Twitter, log opinions at blogs, and upload snapshots to photo-sharing sites.The result for businesses? A digitally connected social world in which the line between personal and corporate lives is increasingly blurred. As this digital conversation swells, potential risks to businesses also rise. Simply said, not all data being shared is as innocent as weekend plans. Social networking sites have become very popular avenues for people to communicate with family, friends and colleagues from around the corner or across the globe. While there can be benefits from the collaborative, distributed approaches promoted by the responsible use of social networking sites, there are information security and privacy concerns. The volume and accessibility of personal information available on social networking sites have attracted malicious people who seek to exploit this information. The same technologies that invite user participation also make the sites easier to infect with malware that can shut down an organisation’s networks, or keystroke loggers that can steal credentials. Common social networking risks such as spear phishing, social engineering, spoofing, and web application attacks attempt to steal a person’s identity. Such attacks are often successful due to the assumption of being in a trusting environment social networks create.
Security and privacy related to social networking sites are fundamentally behavioural issues, not technology issues. The more information a person posts, the more information becomes available for a potential compromise by those with malicious intentions. People who provide private, sensitive or confidential information about themselves or other people, whether wittingly or unwittingly, pose a higher risk to themselves and others. Information such as a person’s social security number, street address, phone number, financial information, or confidential business information should not be published online. Similarly, posting photos, videos or audio files could lead to an organisation’s breach of confidentiality or an individual’s breach of privacy.
Businesses are embracing social networking to cultivate an internal culture of collaboration. Additionally, it is easy to see how this free flow of information can boost productivity and autonomy. Employees working on a project will have relevant, current, and customised knowledge at their fingertips, and they can tap into a ready-built group of team players at all levels of the organisation. Outside the organisation, social networking can help a business reach and engage customers, improve the customer experience, and manage its brand image. Many businesses today patrol sites such as Twitter and Facebook, for instance, to listen in on the chatter about their products and services. Their online brand ambassadors can promote new products or, if a business’s reputation is threatened, use social media to move the discussion in the right direction. Businesses also take advantage of online customer voices to create a more effective advertising campaign. Successful brands leverage customer experiences as an integral part of a product campaign and life cycle. Consider, for instance, the success of Apple. Apple customers have a tight emotional bond to the brand and track the company and its IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.6, June 2013 121 products on blogs, Twitter feeds, and Facebook. How deep is the connection? Apple retail stores in some cities have now become tourist attractions. Anyone can read about them on Twitter.
The correct answer is Option 2, i.e. 'By providing sensitive, private and confidential information'.
In the sentence, it is clearly mentioned that 'People who provide private, sensitive or confidential information about themselves or other people, whether wittingly or unwittingly, pose a higher risk to themselves and others'.
Providing and posting sensitive, private and confidential information is the correct option as the other options make the answer idiomatically incorrect.