Your SlideShare is downloading. ×
0
Darkside
Darkside
Darkside
Darkside
Darkside
Darkside
Darkside
Darkside
Darkside
Darkside
Darkside
Darkside
Darkside
Darkside
Darkside
Darkside
Darkside
Darkside
Darkside
Darkside
Darkside
Darkside
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Darkside

1,822

Published on

Social Media Presentation given by: Kenie Moses, Rachel Sitarz and Scott Abney

Social Media Presentation given by: Kenie Moses, Rachel Sitarz and Scott Abney

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,822
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
8
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Social Internet TECH 621 Spring 2011
  • 2. Crime Trends  Top crimes:  Non-deliver payment of merchandise  Scams impersonating the FBI  Identity theft  Computer crimes  Miscellaneous fraud  Advance fee fraud  Spam  Auction fraud  Credit card fraud  Overpayment fraud http://www.fbi.gov/news/stories/2011/february/internet_022411
  • 3. Demographics  Victims:  Male  Between 40 and 59 years old  California, Florida, Texas and New York  Perpetrators:  nearly 75 percent were men  more than half resided in California, Florida, New York, Texas, DC, or Washington state http://www.fbi.gov/news/stories/2011/february/internet_022411
  • 4. Scams  Telephone calls claiming victims are delinquent on payday loans  Online apartment and house rental and real estate scams used to swindle consumers out of thousands of dollars  Denial-of-service attacks on cell phones and landlines used as a ruse to access victims’ bank accounts  Fake e-mails seeking donations to disaster relief efforts after last year’s earthquake in Haiti http://www.fbi.gov/news/stories/2011/february/internet_022411
  • 5. Porn Defined  According to UrbanDictionary.com  95% of the websites on the internet  Explicit descriptions, picture, and/or video of sexual acts  The reason why the family computer is always slow, Look in the job application folder in "dad's work stuff's"n you'll find a lot of it.  Sexier than sex itself  The world's most popular past time
  • 6. Legal Definition  All sexually oriented material intended primarily to arouse the reader, viewer, or listener  Erotic content in books, magazines, films, and recordings  Obscenity-term that applies to anything offensive to morals
  • 7. History  1980- Usenet Groups  Discussion groups/forums: millions of users  Alt.sex largest usenet; 3.3 million users by 1993  1990- CD ROM  Virtual Valerie  Penthouse Virtual Photoshoot  Virtual Vixens  The Interactive Adventures of Seymour Butts  Websites  1994 Playboy launched website  1995 Penthouse launched website  1995 live strip tease shows  1997 video peep shows  1998 revenue was estimated $750 billion  By 2009 revenues increased to $4.9 billion  Over 95% of pornography online is free amateur sites, free file sharing sites, and/or porn tube sites http://www.pornographyhistory.com/
  • 8. Obscenity  Max Hardcore  AKA Paul Little  Male pornographic actor/producer/director  Rose to prominence in 1992  “Testing the limit of acceptability”  Involved obscene sex acts  Women acting and dressed as 12 year olds  Lewd acts  Called his own material “vile and crazy” http://en.wikipedia.org/wiki/Max_Hardcore
  • 9. Obscenity continued...  1998 charged with child pornography and distribution of obscenity  Based on the women acting under 18 years  2002 deemed unconstitutional to portray adults as children  Led in hung jury  2007 indicted with 5 counts of transporting obscene matter by use of an interactive computer service & 5 counts of mailing obscene matter  Will be released July 2011 http://en.wikipedia.org/wiki/Max_Hardcore
  • 10. Porn At Work  20% of men admit to looking at porn at work  13% of women look at porn at work  37% workforce admits to looking at porn at one time or another at work  6% of men & 5% of women said that they viewed porn unintentionally at work  70% of all internet traffic porn occurs between 9-5 workday  % has gone up due to economic recession  Majority say they view porn at work for “the rush” http://www.3w.net/lan/internet-use-statistics.html http://healthymind.com/s-porn-stats.html
  • 11. How people are caught  Two major ways of being caught -Computer problems call for repair -Company net monitoring software http://www.infoworld.com/t/applications/internet-misuse-costs-businesses-178-billion-annually-996
  • 12. Porn at work, not good for you, not good for business  Viewing porn at work opens company up to lawsuits, hacking, computer viruses  1/3 companies has terminated employee due to looking at porn at work  Cost companies across U.S. BILLIONS of dollars lost due to lack of productivity  IT WILL COST YOU YOUR JOB!!! http://www.newsweek.com/2008/11/28/the-tangled-web-of-porn-in-the-office.html http://www.usatoday.com/money/workplace/2007-10-17-porn-at-work_N.htm
  • 13. Social Media Privacy~Your Responsibilities Introduction There are virtually thousand of social media platforms that users can actively engage in and participate online. By doing so they are essentially trusting that platform with personal information about themselves. In order to be successful in maintaining the integrity of their personal information, they must be responsible users of the services. Several studies conducted conclude that: 1) Most users are unaware of how their info is used (85%) 2) Most users don’t know how to protect their online info 3) Most users trust that their privacy is maintained 4) Most users access more than one social media platform Awad and Krishnan 2008, Gross and Acquisti 2005, White 2010, PEW Trust Report 2000, Krishnamurthy and Willis 2008)
  • 14. Social Media Privacy Settings~Harris Poll Taken from http://www.marketingcharts.com/direct/younger-see-more-socnet-..... …..benefit-15761/harris-social-media-privacy-settings-jan11gif/
  • 15. Facebook Privacy Settings~4 Simple Steps 1) On the Facebook homepage click Account (pull-down at top right) 2) Select Privacy Settings (a menu choice) 3) Select Customize Settings (click link) 4) Choose one of the following: a) Everyone b) Friends of Friends c) Friends Only Steps in Safeguarding Your Privacy 1) Anti-Virus Software 2) Beware Of Phishing 3) Setup Safeguards 4) Don’t Chat With Strangers 5) Wipe Clean 6) Clear Private Data 7) Log Off
  • 16. 26% 7% 23% 5% Parents posted photos & info about their kids Have listed their full addresses FB users don’t know about FB privacy controls or care how to use them Users access 3rd party applications while on Facebook
  • 17. “HMM, TO GET SUPERPOKE, I HAVE TO INSTALL “SUPERPOKE EXTREME” “DAMN, I’D REALLY LIKE TO SEE THAT POKE!” “OH COOL, SOMEONE POKED ME” “OK, INSTALL SUPERPOKE EXTREME” CLICK “TO INSTALL SUPERPOKE EXTREME, YOU MUST ALLOW ACCESS TO SOME OF YOUR INFO…” “THIS IS PRIVACY OUTRAGE!! ” “WHAT THE??? DISPLAY ALL INTERNET ACTIVITY, PUBLISH ALL MY PASSWORDS, SHOW ALL INTERNET BANKING, DISPLAY ALL MEDICAL RECORDS AND LIST MY MEDICATIONS?” Third party Application Programming Interfaces (API’s)
  • 18. An application programming interface (API) is a particular set of rules and specifications that a software program can follow to access and make use of the services and resources provided by another particular software program that implements that API. It serves as an interface between different software programs and facilitates their interaction, similar to the way the user interface facilitates interaction between humans and computers. (http://en.wikipedia.org/wiki/API/ accessed 4/11/11) Third party Application Programming Interfaces (API’s) Popular Examples Include: Java, DirectX, Carbon & Cocoa for Macintosh, GroupTweet, Farmville, Like/ Dislike, StumbleUpon, Ghacks, Voyage
  • 19. Third party Application Programming Interfaces (API’s) Third party apps and services can improve the core service significantly. Users do need to make sure on the other hand that they check the permissions and authorizations regularly, to block apps and services that they no longer use. This reduces the risk of information theft, account tampering and of other malicious activities significantly Main Idea: Third party services can only access your data only if it is authorized by the user. There exists dangers regardless if maximum security efforts are exercised. Once access has been granted developers could sell their product to another company or their service could be hacked or high- jacked and there is the possibility that you authorize malicious services or tools unknowingly. WARNING DISCLAIMER!!!
  • 20. Social Media Privacy~Your Responsibilities Using social media is a choice, and like with any choice come benefits and drawbacks. Users can greatly reduce their drawbacks by being conscientious and responsible users when using social media. Simple immediate steps can be the difference between being hacked or even hacked to pieces…… (just kidding) A BRIEF STATMENT Research applications before adding them to existing social media Check the privacy settings on ALL social media being used Never give out private information unless you trust the source Remember: The only tried and true solution to social network privacy and security issues is to limit your presence altogether. Don't post anything you wouldn't mind telling a complete stranger, because in reality that's the potential for access. - Brendan Collins
  • 21. Questions
  • 22. References 1) 1) http://www.fastcompany.com/articles/2008/10/social-networking-security.html?page=0%2C1 2) 2) http://thetechjournal.com/internet/social-community/people-use-facebook-44-and-twitter-29-for-social-sharing.xhtml 3) 3) http://en.wikipedia.org/wiki/API 4) 4) http://en.wikipedia.org/wiki/Facebook_Platform 5) 5) http://www.marketingcharts.com/direct/younger-see-more-socnet-benefit-15761/harris-social-media-privacy-settings-jan11gif/ 6) 6) http://socialmediagraphics.posterous.com/internet-privacy 7) 7) http://www.adrants.com/2010/05/data-advertising-privacy-key.php 8) 8) http://www.squidoo.com/howtousefacebook 9) 9) http://www.technewsworld.com/story/69158.html 10) 10) http://www.3w.net/lan/internet-use-statistics.html 11) 11) http://healthymind.com/s-porn-stats.html 12) 12) http://www.infoworld.com/t/applications/internet-misuse-costs-businesses-178-billion-annually-996 13) 13) http://www.newsweek.com/2008/11/28/the-tangled-web-of-porn-in-the-office.html 14) 14) http://www.usatoday.com/money/workplace/2007-10-17-porn-at-work_N.htm 15) 15) http://www.fbi.gov/news/stories/2011/february/internet_02241 16) 16) http://www.pornographyhistory.com/ 17) 17) http://en.wikipedia.org/wiki/Max_Hardcore

×