Social network means network + social. Connect people through the network as a carrier to form groups with certain characteristics. Using social media to build a network means creating an interactive platform where people can communicate with each other and participate in each other. It can replace traditional social interaction to meet the communication needs of humans, such as social animals, and is a key force that promotes the infinite proximity of the Internet to the real world.

The efficiency of social networks in the dissemination of knowledge is much higher than that of traditional education models. For many questions that have not been asked, social networks are also a good starting point for research, because everyone has the same opportunity to ask questions and answer questions, without worrying about being overwhelmed due to status factors. And the diversification of answers is obvious. An answer can be updated and revised in time after communication. This is the limitation of books and papers. On the platform, to choose accurate information, people have to learn to judge the gold content of the information, because the amount of information inside is very large and very complicated.

In the public network, people must abide by laws and regulations and improve their network quality. Some irrational remarks and information that people express because of the loss of moral standards during the process of online participation may cause subjective deviations to decision-makers, and even cause them to make wrong decisions, so that normal public opinion cannot be answered. Some attention and adoption seriously affect the effectiveness of online participation.

In public communication, I think the rewards that can be obtained are 1. Global connection, 2. Common rights and interests, 3. Real-time information sharing, 4. Free advertising, and reduce publicity costs. However, in public communication, users of social networking sites are more likely to encounter security threats such as loss of financial information, theft of identity information, and malware infection, and their severity may exceed users’ imagination.