SlideShare une entreprise Scribd logo
1  sur  29
Users & Behaviors Abuses and Security of Social Media Sites Group: Kenie R. Moses - Rachel Sitarz - Scott Abney Purdue University Spring 2011 Social internet TECH621
Social Media Apps and Usage Users Behaviors: Beware of Media Apps Scott Abney
Social Media App Intro Apple App Store has over 300,000 apps Facebook is around 60,000 apps Twitter just passed over 50,000 apps  97% of social media users do not check apps or links for viruses
Apple App Store has over 100 millions users  User info hacked due to knockoffs off applications (Weather HD app) Thuat Nguyen created 50 apps for app store, then charged up to $600 after hacking into over 400 iTunes accounts for furthering purchases on his other apps  Storm 8 created apps for online games that misconstrued what users were downloading, purchases ranged from $150-$1400
Twitter Around 200 million users on Twitter Over 50% of tweets are sent from 3rd party applications  Common app that is used for hacking claims  to increase subscribers Security shield application
Facebook ,[object Object]
November 2010, over 60,000 people clicked on the ePrivacy app to try to see who viewed their profile
Hackers create fake Facebook login pages from apps
Early January 2011, Facebook allows apps to view both home and phone number on profiles,[object Object]
What Can You Do???? Research applications before adding them Never give out any private information Check security settings on your social network www.facecrooks.com
Social Media Usage and Security Users Behaviors: How Secure Are You? Kenie R. Moses
Social Network Usage Nearly 20% of Internet users are tweeting on Twitter or using another service to share personal and business updates, or to see updates about others 66% of LinkedIn users are decision makers or have influence in the purchase decisions at their companies In 2011, 70+ Percent of Marketers Will Be Using Social Media
Social Network Usage Continued 54% percent of the companies studied have at least one Facebook Fan page  72% of companies plan to invest more in social networks 79% of the largest fortune 500 firms use Twitter, to communicate with customers or employees 80% of companies are planning to use social networks to find or attract candidates
Social Network Data Leakage 17% of US companies investigated the exposure of confidential information via a posting to a social networking sites 13% of US companies investigated the exposure of confidential, sensitive or private information via Twitter 54% of ClOs said their firms do not allow employees to visit social networking sites for any reason while at work.
Social Networking Pitfalls ,[object Object]
46% of Facebook users feel there are security and privacy risks.
34% have seen somebody else’s phone number posted on a social  networking site. ,[object Object], their on social networking sites visible to friends. ,[object Object],[object Object]
Social Media Abuse and Misuse User Behaviors: Deviant Activities Rachel Sitarz
Introduction Pornography Internet trends Deviant behavior: Child Pornography (CP) usage Predatory behaviors Victimization of children
Pornography Usage Multi-billion dollar industry (Ferraro & Casey, 2005) $97 billion worldwide $13 billion in the US alone Every second, $3,075.64 is being spent 28,258 are viewing pornography every second 372 Internet users are typing adult search terms into search engines 39 minutes new pornography is made in US
Pornography Usage Continued Sex is the most searched topic, with one-third of all internet user visiting some form of sexually related site regularly Anonymity, cheap, easily accessed, avoid social embarrassment, instant gratification, easily hidden
Pornography Pages By Country Country Porn Pages: United States 244,661,900  Germany 10,030,200  United Kingdom 8,506,800  Australia 5,655,800 Japan 2,700,800  The Netherlands 1,883,800  Russia 1,080,600  Poland 1,049,600  Spain 852,800
Pornography Stats 40 million U.S. adults regularly visit Internet pornography 20% of men admit accessing pornography at work 70% of women keep their online activities secret 10% of adults admit to Internet sexual addition 17% of women admit to struggling with pornography addiction
Child Pornography Online Child pornography isn't new, it’s easier to access without as many social and legal risks Some statistics estimate that 1.5 million children have been and currently are being exploited Multi-billion dollar industry with estimated 100,000 child pornography websites “Golden Age of Child Pornography”
Child Pornography Continued Child pornography is one of the fastest growing businesses online Content is continually getting worse and more graphic 58% of CP websites are made in US
Online Predators 644,865 Registered Sex Offenders in the US (many unregistered) 80 % of offenders were explicit about their intentions with youth 73 % of online crimes, teens go to meet the offender on multiple occasions for multiple sexual encounters
Distribution of CP Online
Youth Victimization Approximately 1 in 6 youth online (10 to 17-years-old) received a sexual solicitation or approach over the Internet. 4% received an aggressive sexual solicitation – meeting, phone call, gifts 34% had an unwanted exposure to pornography 27% of the youth who encountered unwanted pornography told a parent or guardian Research indicates that 1 in 5 girls and 1 in 10 boys will be sexually victimized before adulthood
Meet 10 year-old Becky’s new 12 year-old online friend.

Contenu connexe

Tendances

Primary and Secondary Research
Primary and Secondary ResearchPrimary and Secondary Research
Primary and Secondary Research
elewoodall
 
Documentary research
Documentary researchDocumentary research
Documentary research
ellenwooler
 
Documentary Research
Documentary ResearchDocumentary Research
Documentary Research
Chloe Main
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
rothl
 
Detecting Malicious Facebook Applications
Detecting Malicious Facebook ApplicationsDetecting Malicious Facebook Applications
Detecting Malicious Facebook Applications
1crore projects
 
Research for doucmentary
Research for doucmentaryResearch for doucmentary
Research for doucmentary
clobebobe
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
Ernest Staats
 

Tendances (18)

Protecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile PhishingProtecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile Phishing
 
Primary and Secondary Research
Primary and Secondary ResearchPrimary and Secondary Research
Primary and Secondary Research
 
Documentary research
Documentary researchDocumentary research
Documentary research
 
Documentary Research
Documentary ResearchDocumentary Research
Documentary Research
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
 
DoD Social Media Guide
DoD Social Media GuideDoD Social Media Guide
DoD Social Media Guide
 
Using Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and FamiliesUsing Computer Technology to Protect Individuals and Families
Using Computer Technology to Protect Individuals and Families
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
 
Detecting Malicious Facebook Applications
Detecting Malicious Facebook ApplicationsDetecting Malicious Facebook Applications
Detecting Malicious Facebook Applications
 
RSA Monthly Online Fraud Report -- October 2013
RSA Monthly Online Fraud Report -- October 2013RSA Monthly Online Fraud Report -- October 2013
RSA Monthly Online Fraud Report -- October 2013
 
Darkside
DarksideDarkside
Darkside
 
Research for doucmentary
Research for doucmentaryResearch for doucmentary
Research for doucmentary
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parents
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
 
Child safety 16 jun14
Child safety 16 jun14Child safety 16 jun14
Child safety 16 jun14
 
Indiancybercrimescene
IndiancybercrimesceneIndiancybercrimescene
Indiancybercrimescene
 

En vedette

T2437 Mb Qa Final
T2437 Mb Qa FinalT2437 Mb Qa Final
T2437 Mb Qa Final
guest54dc1e
 
Suffolk Teens
Suffolk TeensSuffolk Teens
Suffolk Teens
rriis
 
How to fold clothes (AF)
How to fold clothes (AF)How to fold clothes (AF)
How to fold clothes (AF)
anthony fakhry
 
Filmmaking assessment feedback
Filmmaking assessment feedbackFilmmaking assessment feedback
Filmmaking assessment feedback
NINANC
 
Animation self assessment
Animation self assessment Animation self assessment
Animation self assessment
NINANC
 
Citizen Shift Media in Action Workshop
Citizen Shift Media in Action WorkshopCitizen Shift Media in Action Workshop
Citizen Shift Media in Action Workshop
reisa101
 

En vedette (20)

10 agosto 2013 conferenza Esperanto
10 agosto 2013 conferenza Esperanto10 agosto 2013 conferenza Esperanto
10 agosto 2013 conferenza Esperanto
 
James Wadsworth
James WadsworthJames Wadsworth
James Wadsworth
 
excise
exciseexcise
excise
 
Session 15
Session 15Session 15
Session 15
 
T2437 Mb Qa Final
T2437 Mb Qa FinalT2437 Mb Qa Final
T2437 Mb Qa Final
 
Suffolk Teens
Suffolk TeensSuffolk Teens
Suffolk Teens
 
Ossiannilsson130820 miun
Ossiannilsson130820 miunOssiannilsson130820 miun
Ossiannilsson130820 miun
 
How to fold clothes (AF)
How to fold clothes (AF)How to fold clothes (AF)
How to fold clothes (AF)
 
Nieuws Bestaat Niet
Nieuws Bestaat NietNieuws Bestaat Niet
Nieuws Bestaat Niet
 
From awareness to participation-student engagament in an online environment
From awareness to participation-student engagament in an online environmentFrom awareness to participation-student engagament in an online environment
From awareness to participation-student engagament in an online environment
 
E mooc summit lausanne 10 12 february, 2014
E mooc summit lausanne 10 12 february, 2014E mooc summit lausanne 10 12 february, 2014
E mooc summit lausanne 10 12 february, 2014
 
01 intro to human factors
01 intro to human factors01 intro to human factors
01 intro to human factors
 
"You Don't Need A Website" Ignite NTC 2010 Gregory Heller
"You Don't Need A Website" Ignite NTC 2010 Gregory Heller"You Don't Need A Website" Ignite NTC 2010 Gregory Heller
"You Don't Need A Website" Ignite NTC 2010 Gregory Heller
 
Behavioral targeting Marktplaats.nl presentation for Mediaflex
Behavioral targeting Marktplaats.nl presentation for MediaflexBehavioral targeting Marktplaats.nl presentation for Mediaflex
Behavioral targeting Marktplaats.nl presentation for Mediaflex
 
Ossiannilsson 130925 folkhögskolorna
Ossiannilsson 130925 folkhögskolornaOssiannilsson 130925 folkhögskolorna
Ossiannilsson 130925 folkhögskolorna
 
Ossiannilsson informa digitala examinationer071015
Ossiannilsson informa digitala examinationer071015Ossiannilsson informa digitala examinationer071015
Ossiannilsson informa digitala examinationer071015
 
Filmmaking assessment feedback
Filmmaking assessment feedbackFilmmaking assessment feedback
Filmmaking assessment feedback
 
Quality enhancement ltu2014 intropresentation 140929
Quality enhancement ltu2014 intropresentation 140929Quality enhancement ltu2014 intropresentation 140929
Quality enhancement ltu2014 intropresentation 140929
 
Animation self assessment
Animation self assessment Animation self assessment
Animation self assessment
 
Citizen Shift Media in Action Workshop
Citizen Shift Media in Action WorkshopCitizen Shift Media in Action Workshop
Citizen Shift Media in Action Workshop
 

Similaire à Users and behaviors social internet: Safety & Security

Social media FBLA presentation
Social media FBLA presentationSocial media FBLA presentation
Social media FBLA presentation
Angela Lechtenberg
 
¿Qué hacen los adolescentes en Redes Sociales?
¿Qué hacen los adolescentes en Redes Sociales?¿Qué hacen los adolescentes en Redes Sociales?
¿Qué hacen los adolescentes en Redes Sociales?
ADCENTRAL
 

Similaire à Users and behaviors social internet: Safety & Security (20)

Disadvantages of Social Networking
Disadvantages of Social NetworkingDisadvantages of Social Networking
Disadvantages of Social Networking
 
Social Media and Academia2015
Social Media and Academia2015Social Media and Academia2015
Social Media and Academia2015
 
The Impact of Digital Technologies on our Lives
The Impact of Digital Technologies on our LivesThe Impact of Digital Technologies on our Lives
The Impact of Digital Technologies on our Lives
 
Internet sex addiction
Internet sex addictionInternet sex addiction
Internet sex addiction
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
An introduction to Social Media
An introduction to Social MediaAn introduction to Social Media
An introduction to Social Media
 
Social media FBLA presentation
Social media FBLA presentationSocial media FBLA presentation
Social media FBLA presentation
 
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Colorado DHSEM:  Understanding Social Media and Using it to Your AdvantageColorado DHSEM:  Understanding Social Media and Using it to Your Advantage
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Social Media for Non-Profits (Einstein version)
Social Media for Non-Profits (Einstein version)Social Media for Non-Profits (Einstein version)
Social Media for Non-Profits (Einstein version)
 
The Intersection of Social Media, HIPAA, and the Workplace
The Intersection of Social Media, HIPAA, and the WorkplaceThe Intersection of Social Media, HIPAA, and the Workplace
The Intersection of Social Media, HIPAA, and the Workplace
 
Social Network
Social NetworkSocial Network
Social Network
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
 
Cybersafety Presentation for Connecting Waters Charter School
Cybersafety Presentation for Connecting Waters Charter SchoolCybersafety Presentation for Connecting Waters Charter School
Cybersafety Presentation for Connecting Waters Charter School
 
Transportation and privacy in the mobile age
Transportation and privacy in the mobile age Transportation and privacy in the mobile age
Transportation and privacy in the mobile age
 
Encyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety PresentationEncyclomedia 2007 Internet Safety Presentation
Encyclomedia 2007 Internet Safety Presentation
 
¿Qué hacen los adolescentes en Redes Sociales?
¿Qué hacen los adolescentes en Redes Sociales?¿Qué hacen los adolescentes en Redes Sociales?
¿Qué hacen los adolescentes en Redes Sociales?
 
internet promotions
internet promotionsinternet promotions
internet promotions
 

Plus de Dr. V Vorvoreanu

Attention info scent recognition vs recall
Attention info scent recognition vs recallAttention info scent recognition vs recall
Attention info scent recognition vs recall
Dr. V Vorvoreanu
 
03 usability def designprocess
03 usability def designprocess03 usability def designprocess
03 usability def designprocess
Dr. V Vorvoreanu
 
UX user-centered design process overview
UX user-centered design process overviewUX user-centered design process overview
UX user-centered design process overview
Dr. V Vorvoreanu
 
26 social interaction design
26 social interaction design26 social interaction design
26 social interaction design
Dr. V Vorvoreanu
 
Sketches wireframes mockups prototypes
Sketches wireframes mockups prototypesSketches wireframes mockups prototypes
Sketches wireframes mockups prototypes
Dr. V Vorvoreanu
 

Plus de Dr. V Vorvoreanu (20)

Dia2 tues persona
Dia2 tues persona Dia2 tues persona
Dia2 tues persona
 
Dia2 sketches
Dia2 sketchesDia2 sketches
Dia2 sketches
 
DIA2 Design requirements presentation personas
DIA2 Design requirements presentation personasDIA2 Design requirements presentation personas
DIA2 Design requirements presentation personas
 
gestalt principles cats
gestalt principles catsgestalt principles cats
gestalt principles cats
 
07 principles 1 affordance
07 principles 1 affordance07 principles 1 affordance
07 principles 1 affordance
 
HCDD for ASEE 2015 presentation
HCDD for ASEE 2015 presentationHCDD for ASEE 2015 presentation
HCDD for ASEE 2015 presentation
 
Controls
ControlsControls
Controls
 
Responsive design UX intro
Responsive design UX introResponsive design UX intro
Responsive design UX intro
 
Attention info scent recognition vs recall
Attention info scent recognition vs recallAttention info scent recognition vs recall
Attention info scent recognition vs recall
 
03 bad usability kills
03 bad usability kills03 bad usability kills
03 bad usability kills
 
03 usability def designprocess
03 usability def designprocess03 usability def designprocess
03 usability def designprocess
 
Information architecture
Information architectureInformation architecture
Information architecture
 
UX Conceptual design - sketches, wireframes, mockups, prototypes
UX Conceptual design - sketches, wireframes, mockups, prototypesUX Conceptual design - sketches, wireframes, mockups, prototypes
UX Conceptual design - sketches, wireframes, mockups, prototypes
 
Cgt 256 course review
Cgt 256 course reviewCgt 256 course review
Cgt 256 course review
 
Cross channel ux
Cross channel uxCross channel ux
Cross channel ux
 
UX user-centered design process overview
UX user-centered design process overviewUX user-centered design process overview
UX user-centered design process overview
 
26 social interaction design
26 social interaction design26 social interaction design
26 social interaction design
 
Purdue MS degree CGT
Purdue MS degree CGTPurdue MS degree CGT
Purdue MS degree CGT
 
Sketches wireframes mockups prototypes
Sketches wireframes mockups prototypesSketches wireframes mockups prototypes
Sketches wireframes mockups prototypes
 
11 info architecture-2014
11 info architecture-201411 info architecture-2014
11 info architecture-2014
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Users and behaviors social internet: Safety & Security

  • 1. Users & Behaviors Abuses and Security of Social Media Sites Group: Kenie R. Moses - Rachel Sitarz - Scott Abney Purdue University Spring 2011 Social internet TECH621
  • 2. Social Media Apps and Usage Users Behaviors: Beware of Media Apps Scott Abney
  • 3. Social Media App Intro Apple App Store has over 300,000 apps Facebook is around 60,000 apps Twitter just passed over 50,000 apps 97% of social media users do not check apps or links for viruses
  • 4. Apple App Store has over 100 millions users User info hacked due to knockoffs off applications (Weather HD app) Thuat Nguyen created 50 apps for app store, then charged up to $600 after hacking into over 400 iTunes accounts for furthering purchases on his other apps Storm 8 created apps for online games that misconstrued what users were downloading, purchases ranged from $150-$1400
  • 5. Twitter Around 200 million users on Twitter Over 50% of tweets are sent from 3rd party applications Common app that is used for hacking claims to increase subscribers Security shield application
  • 6.
  • 7. November 2010, over 60,000 people clicked on the ePrivacy app to try to see who viewed their profile
  • 8. Hackers create fake Facebook login pages from apps
  • 9.
  • 10. What Can You Do???? Research applications before adding them Never give out any private information Check security settings on your social network www.facecrooks.com
  • 11. Social Media Usage and Security Users Behaviors: How Secure Are You? Kenie R. Moses
  • 12. Social Network Usage Nearly 20% of Internet users are tweeting on Twitter or using another service to share personal and business updates, or to see updates about others 66% of LinkedIn users are decision makers or have influence in the purchase decisions at their companies In 2011, 70+ Percent of Marketers Will Be Using Social Media
  • 13. Social Network Usage Continued 54% percent of the companies studied have at least one Facebook Fan page 72% of companies plan to invest more in social networks 79% of the largest fortune 500 firms use Twitter, to communicate with customers or employees 80% of companies are planning to use social networks to find or attract candidates
  • 14. Social Network Data Leakage 17% of US companies investigated the exposure of confidential information via a posting to a social networking sites 13% of US companies investigated the exposure of confidential, sensitive or private information via Twitter 54% of ClOs said their firms do not allow employees to visit social networking sites for any reason while at work.
  • 15.
  • 16. 46% of Facebook users feel there are security and privacy risks.
  • 17.
  • 18. Social Media Abuse and Misuse User Behaviors: Deviant Activities Rachel Sitarz
  • 19. Introduction Pornography Internet trends Deviant behavior: Child Pornography (CP) usage Predatory behaviors Victimization of children
  • 20. Pornography Usage Multi-billion dollar industry (Ferraro & Casey, 2005) $97 billion worldwide $13 billion in the US alone Every second, $3,075.64 is being spent 28,258 are viewing pornography every second 372 Internet users are typing adult search terms into search engines 39 minutes new pornography is made in US
  • 21. Pornography Usage Continued Sex is the most searched topic, with one-third of all internet user visiting some form of sexually related site regularly Anonymity, cheap, easily accessed, avoid social embarrassment, instant gratification, easily hidden
  • 22. Pornography Pages By Country Country Porn Pages: United States 244,661,900 Germany 10,030,200 United Kingdom 8,506,800 Australia 5,655,800 Japan 2,700,800 The Netherlands 1,883,800 Russia 1,080,600 Poland 1,049,600 Spain 852,800
  • 23. Pornography Stats 40 million U.S. adults regularly visit Internet pornography 20% of men admit accessing pornography at work 70% of women keep their online activities secret 10% of adults admit to Internet sexual addition 17% of women admit to struggling with pornography addiction
  • 24. Child Pornography Online Child pornography isn't new, it’s easier to access without as many social and legal risks Some statistics estimate that 1.5 million children have been and currently are being exploited Multi-billion dollar industry with estimated 100,000 child pornography websites “Golden Age of Child Pornography”
  • 25. Child Pornography Continued Child pornography is one of the fastest growing businesses online Content is continually getting worse and more graphic 58% of CP websites are made in US
  • 26. Online Predators 644,865 Registered Sex Offenders in the US (many unregistered) 80 % of offenders were explicit about their intentions with youth 73 % of online crimes, teens go to meet the offender on multiple occasions for multiple sexual encounters
  • 28. Youth Victimization Approximately 1 in 6 youth online (10 to 17-years-old) received a sexual solicitation or approach over the Internet. 4% received an aggressive sexual solicitation – meeting, phone call, gifts 34% had an unwanted exposure to pornography 27% of the youth who encountered unwanted pornography told a parent or guardian Research indicates that 1 in 5 girls and 1 in 10 boys will be sexually victimized before adulthood
  • 29. Meet 10 year-old Becky’s new 12 year-old online friend.
  • 30. Source References 1.) http://information-security-resources.com/2009/08/17/top-8-social-media-security-threats/ 2.) http://socialmediasecurity.com/ 3.) http://www.fastcompany.com/1563867/the-5-biggest-social-media-security-risks-for-businesses 4.) http://dns.tmcnet.com/topics/internet-security/articles/137059-social-networking-sites-sitting 5.) http://www.cdc.gov/socialmedia/Tools/guidelines/pdf/securitymitigations.pdf 6.) http://www.netsmartz.org/ 7.) http://www.missingkids.com/ 8.) http://enough.org/ 9.) Internet Watch Foundation. Annual Report, 2008 10.) Adler, A. (2001). The Perverse Law of Child Pornography. Columbia Law Review, 101(2), 209-273
  • 31. Source References Continued 11.) http://blog.vimov.com/2011/01/app-squatting-misuse-of-weather-hd-name-in-the-mac-app-store/   12.) http://www.betanews.com/article/Apple-still-silent-as-more-scams-are-found-on-App-Store/1278363193   13.) http://eu.techcrunch.com/2010/11/29/over-60000-click-on-scam-facebook-app-which -claims-you-can-see-who-checked-your-profile/   14.) http://www.switched.com/2009/09/15/5-popular-facebook-scams-and-how-to-avoid-them/   15.) http://www.macworld.com/article/157303/2011/01/twitter_antivirusscam.html.   16.) http://downloadsquad.switched.com/2011/01/16/facebook-enables-one-click-identity-theft-option -for-rogue-application-developers/   17.) http://www.facecrooks.com/blog/internet-safety-a-privacy/item/904-study-finds-most-social-media -users-do-not-check-shared-links-for-malware   18.) http://tech.fortune.cnn.com/2011/01/22/app-store-hits-10-billion-update/?hpt=T2   19.) http://blog.nutshellmail.com/2010/02/03/can-you-trust-third-party-twitter-applications 20.) Ferraro, M., & Casey, E. (2005). Investigating child exploitation and pornography: The Internet, the Law and Forensic Science. San Diego, CA: Elsvier Academic Press.