Users and Behaviors- Social Internet


Published on

Social internet Presentation by: Kenie Moses, Rachel Sitarz and Scott Abney

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Users and Behaviors- Social Internet

  1. 1. Users & Behaviors<br />Abuses and Security of Social Media Sites<br />Group: Kenie R. Moses - Rachel Sitarz - Scott Abney<br />Purdue University Spring 2011<br />Social internet TECH621<br />
  2. 2. Social Media Apps and Usage<br />Users Behaviors: Beware of Media Apps<br />Scott Abney<br />
  3. 3. Social Media App Intro<br />Apple App Store has over 300,000 apps<br />Facebook is around 60,000 apps<br />Twitter just passed over 50,000 apps <br />97% of social media users do not check apps or links for viruses <br />
  4. 4. Apple<br />App Store has over 100 millions users <br />User info hacked due to knockoffs off applications (Weather HD app)<br />Thuat Nguyen created 50 apps for app store, then charged up to $600 after hacking into over 400 iTunes accounts for furthering purchases on his other apps <br />Storm 8 created apps for online games that misconstrued what users were downloading, purchases ranged from $150-$1400 <br />
  5. 5. Twitter<br />Around 200 million users on Twitter<br />Over 50% of tweets are sent from 3rd party applications <br />Common app that is used for hacking claims to increase subscribers<br />Security shield application<br />
  6. 6. Facebook<br /><ul><li>Between 500-600 million users
  7. 7. November 2010, over 60,000 people clicked on the ePrivacy app to try to see who viewed their profile
  8. 8. Hackers create fake Facebook login pages from apps
  9. 9. Early January 2011, Facebook allows apps to view both home and phone number on profiles</li></li></ul><li>Example Fake Facebook Login<br />
  10. 10. What Can You Do????<br />Research applications before adding them<br />Never give out any private information<br />Check security settings on your social network<br /><br />
  11. 11. Social Media Usage and Security<br />Users Behaviors: How Secure Are You?<br />Kenie R. Moses<br />
  12. 12. Social Network Usage<br />Nearly 20% of Internet users are tweeting on Twitter or using another service to share personal and business updates, or to see updates about others<br />66% of LinkedIn users are decision makers or have influence in the purchase decisions at their companies<br />In 2011, 70+ Percent of Marketers Will Be Using Social Media<br />
  13. 13. Social Network Usage Continued<br />54% percent of the companies studied have at least one Facebook Fan page<br /> 72% of companies plan to invest more in social networks<br />79% of the largest fortune 500 firms use Twitter, to communicate with customers or employees<br />80% of companies are planning to use social networks to find or attract candidates<br />
  14. 14. Social Network Data Leakage<br />17% of US companies investigated the exposure of confidential information via a posting to a social networking sites<br />13% of US companies investigated the exposure of confidential, sensitive or private information via Twitter<br />54% of ClOs said their firms do not allow employees to visit social networking sites for any reason while at work. <br />
  15. 15. Social Networking Pitfalls<br /><ul><li> 48% have no worries about the security of social networking sites
  16. 16. 46% of Facebook users feel there are security and privacy risks.
  17. 17. 34% have seen somebody else’s phone number posted on a social </li></ul> networking site.<br /><ul><li> 9% have included their phone number and 5% have included</li></ul> their on social networking sites visible to friends.<br /><ul><li>25% have discussed holiday plans “wall-to-wall” outside their page</li></li></ul><li>Viruses and Hacking Techniques Used on Social Media Sites<br />10<br />1.) Koobface- Virus that steals sensitive data and <br /> sends Trojan viruses to contacts of infected<br />2.) Mikeyy Worm- Virus that activates upon clicked<br /> links and sends out messages to contacts.<br />3.) Acai Attack- Virus that activates once the ad for<br /> Acai Berry juice is clicked infecting with Malware.<br />4.) Facebook Phishing- Coaxes users to give up<br />valuable log-in info on a fake log-in screen.<br />5.) Twittercut- Virus that promise user over 1000<br /> loyal followers. Once clicked, installs Trojan virus.<br />9<br />8<br />1<br />7<br />6<br />5<br />2<br />4<br />3<br />1-Facebook<br />2-MySpace<br />3-Twitter<br />4-Bebo<br />5-U-Tube<br />6-WAYN<br />7-Flicker<br />8-Last FM<br />9-LinkIn<br />10-Other<br />
  18. 18. Social Media Abuse and Misuse<br />User Behaviors: Deviant Activities<br />Rachel Sitarz<br />
  19. 19. Introduction<br />Pornography Internet trends<br />Deviant behavior: Child Pornography (CP) usage<br />Predatory behaviors<br />Victimization of children<br />
  20. 20. Pornography Usage<br />Multi-billion dollar industry (Ferraro & Casey, 2005)<br />$97 billion worldwide<br />$13 billion in the US alone<br />Every second, $3,075.64 is being spent<br />28,258 are viewing pornography every second<br />372 Internet users are typing adult search terms into search engines<br />39 minutes new pornography is made in US<br />
  21. 21. Pornography Usage Continued<br />Sex is the most searched topic, with one-third of all internet user visiting some form of sexually related site regularly<br />Anonymity, cheap, easily accessed, avoid social embarrassment, instant gratification, easily hidden<br />
  22. 22. Pornography Pages By Country<br />Country Porn Pages:<br />United States 244,661,900 <br />Germany 10,030,200 <br />United Kingdom 8,506,800<br /> Australia 5,655,800<br />Japan 2,700,800 <br />The Netherlands 1,883,800 <br />Russia 1,080,600 <br />Poland 1,049,600 <br />Spain 852,800<br />
  23. 23. Pornography Stats<br />40 million U.S. adults regularly visit Internet pornography<br />20% of men admit accessing pornography at work<br />70% of women keep their online activities secret<br />10% of adults admit to Internet sexual addition<br />17% of women admit to struggling with pornography addiction<br />
  24. 24. Child Pornography Online<br />Child pornography isn't new, it’s easier to access without as many social and legal risks<br />Some statistics estimate that 1.5 million children have been and currently are being exploited<br />Multi-billion dollar industry with estimated 100,000 child pornography websites<br />“Golden Age of Child Pornography”<br />
  25. 25. Child Pornography Continued<br />Child pornography is one of the fastest growing businesses online<br />Content is continually getting worse and more graphic<br />58% of CP websites are made in US<br />
  26. 26. Online Predators<br />644,865 Registered Sex Offenders in the US (many unregistered)<br />80 % of offenders were explicit about their intentions with youth<br />73 % of online crimes, teens go to meet the offender on multiple occasions for multiple sexual encounters<br />
  27. 27. Distribution of CP Online<br />
  28. 28. Youth Victimization<br />Approximately 1 in 6 youth online (10 to 17-years-old) received a sexual solicitation or approach over the Internet.<br />4% received an aggressive sexual solicitation – meeting, phone call, gifts<br />34% had an unwanted exposure to pornography<br />27% of the youth who encountered unwanted pornography told a parent or guardian<br />Research indicates that 1 in 5 girls and 1 in 10 boys will be sexually victimized before adulthood<br />
  29. 29. Meet 10 year-old Becky’s new 12 year-old online friend.<br />
  30. 30. Source References<br />1.)<br />2.)<br />3.)<br />4.)<br />5.)<br />6.)<br />7.)<br />8.)<br />9.) Internet Watch Foundation. Annual Report, 2008<br />10.) Adler, A. (2001). The Perverse Law of Child Pornography. Columbia Law Review, 101(2), 209-273<br />
  31. 31. Source References Continued<br />11.)<br /> <br />12.)<br /> <br />13.)<br />-claims-you-can-see-who-checked-your-profile/<br /> <br />14.)<br /> <br />15.)<br /> <br />16.)<br />-for-rogue-application-developers/<br /> <br />17.)<br />-users-do-not-check-shared-links-for-malware<br /> <br />18.)<br /> <br />19.)<br />20.) Ferraro, M., & Casey, E. (2005). Investigating child exploitation and pornography: <br /> The Internet, the Law and Forensic Science. San Diego, CA: Elsvier Academic Press.<br />
  32. 32. Questions<br />