Social media: help or hindrance?

October 2016 Security Services & Risk Management, Information Security

The proliferation of social media platforms must be seen as an advantage when it comes to crime prevention, says GM of ADT Inland Region, Theunis Kotze. Their value, however, rests with the members of the group and the quality of information shared.

“We’re living in an age in which ordinary citizens are invited to be active participants in the fight against crime. Knowledge is power when it comes to crime prevention and successes hinge on the sharing of intelligence, so harnessing the power of social media is imperative.

“These platforms are, however, not without their challenges,” Kotze adds. “The most common being the posting of unverified information (mostly 'urban legends') which spread like wild fire and often create unwarranted panic. Another challenge is that these groups can easily turn into general chat forums, which is a hindrance to the purpose of the group.”

Not only do members become annoyed by a constant flow of irrelevant chatter, many actually leave the group as a result of this. There is also the potential for those responsible for crime prevention to miss important information in and among reams of immaterial messages.

In ADT’s experience, many people are hesitant to participate on crime prevention groups for fear of their personal details being visible. However, in communities with a strong residents’ association, Neighbourhood Watch or CPF, such communication platforms are yielding very positive results.

“I believe the biggest benefit is that personal security and related issues are kept top of mind. Successes are also shared and this fosters goodwill between communities and those who are there to protect them,” Kotze says.

ADT’s don’ts in the (social media) fight against crime:

• Don’t post any personal information.

• Don’t post irrelevant information (advertising, lost pets, road blocks, speed traps or any council issues).

• Don’t post ‘confirmed’ or ‘thanks’ or ‘received’ once you’ve read a message.

• Don’t post unverified information. Crime warnings or tip-offs received from other sources must be sent to the group administrator for verification.

• Don’t engage in argumentative comments or use foul language on the group.

• Don’t try to be a hero. Members of the public should never get involved in a potentially dangerous situation. Contact the SAPS or your security company to investigate should you see anything suspicious.

“Social media definitely has a role to play and it’s important that the community actively participates in crime prevention. However, in order to get the results we strive for, members of such groups need to be responsible and respectful at all times. There are ramifications for members who consistently disobey the rules and these could even be legal depending on the seriousness of the case,” Kotze concludes.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...
FICA in the era of deepfake and AI-driven fraud
Security Services & Risk Management
A growing fraud strategy involves leveraging AI to produce highly convincing fake images, videos, and audio, commonly referred to as deepfakes, which are used to impersonate real individuals and spread misleading or false information.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...
Protect your smart home devices
Kaspersky IoT & Automation Information Security Smart Home Automation
Voice assistants, kitchen robots, smart lights and many other intelligent devices have become part of our everyday life. However, with the rise of smart technology comes the need for robust protection against potential vulnerabilities.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.