Users and Behaviors- Social Internet
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

Users and Behaviors- Social Internet

  • 936 views
Uploaded on

Social internet Presentation by: Kenie Moses, Rachel Sitarz and Scott Abney

Social internet Presentation by: Kenie Moses, Rachel Sitarz and Scott Abney

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
936
On Slideshare
590
From Embeds
346
Number of Embeds
1

Actions

Shares
Downloads
7
Comments
0
Likes
0

Embeds 346

http://keniemoses.wordpress.com 346

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Users & Behaviors
    Abuses and Security of Social Media Sites
    Group: Kenie R. Moses - Rachel Sitarz - Scott Abney
    Purdue University Spring 2011
    Social internet TECH621
  • 2. Social Media Apps and Usage
    Users Behaviors: Beware of Media Apps
    Scott Abney
  • 3. Social Media App Intro
    Apple App Store has over 300,000 apps
    Facebook is around 60,000 apps
    Twitter just passed over 50,000 apps
    97% of social media users do not check apps or links for viruses
  • 4. Apple
    App Store has over 100 millions users
    User info hacked due to knockoffs off applications (Weather HD app)
    Thuat Nguyen created 50 apps for app store, then charged up to $600 after hacking into over 400 iTunes accounts for furthering purchases on his other apps
    Storm 8 created apps for online games that misconstrued what users were downloading, purchases ranged from $150-$1400
  • 5. Twitter
    Around 200 million users on Twitter
    Over 50% of tweets are sent from 3rd party applications
    Common app that is used for hacking claims to increase subscribers
    Security shield application
  • 6. Facebook
    • Between 500-600 million users
    • 7. November 2010, over 60,000 people clicked on the ePrivacy app to try to see who viewed their profile
    • 8. Hackers create fake Facebook login pages from apps
    • 9. Early January 2011, Facebook allows apps to view both home and phone number on profiles
  • Example Fake Facebook Login
  • 10. What Can You Do????
    Research applications before adding them
    Never give out any private information
    Check security settings on your social network
    www.facecrooks.com
  • 11. Social Media Usage and Security
    Users Behaviors: How Secure Are You?
    Kenie R. Moses
  • 12. Social Network Usage
    Nearly 20% of Internet users are tweeting on Twitter or using another service to share personal and business updates, or to see updates about others
    66% of LinkedIn users are decision makers or have influence in the purchase decisions at their companies
    In 2011, 70+ Percent of Marketers Will Be Using Social Media
  • 13. Social Network Usage Continued
    54% percent of the companies studied have at least one Facebook Fan page
    72% of companies plan to invest more in social networks
    79% of the largest fortune 500 firms use Twitter, to communicate with customers or employees
    80% of companies are planning to use social networks to find or attract candidates
  • 14. Social Network Data Leakage
    17% of US companies investigated the exposure of confidential information via a posting to a social networking sites
    13% of US companies investigated the exposure of confidential, sensitive or private information via Twitter
    54% of ClOs said their firms do not allow employees to visit social networking sites for any reason while at work.
  • 15. Social Networking Pitfalls
    • 48% have no worries about the security of social networking sites
    • 16. 46% of Facebook users feel there are security and privacy risks.
    • 17. 34% have seen somebody else’s phone number posted on a social
    networking site.
    • 9% have included their phone number and 5% have included
    their on social networking sites visible to friends.
    • 25% have discussed holiday plans “wall-to-wall” outside their page
  • Viruses and Hacking Techniques Used on Social Media Sites
    10
    1.) Koobface- Virus that steals sensitive data and
    sends Trojan viruses to contacts of infected
    2.) Mikeyy Worm- Virus that activates upon clicked
    links and sends out messages to contacts.
    3.) Acai Attack- Virus that activates once the ad for
    Acai Berry juice is clicked infecting with Malware.
    4.) Facebook Phishing- Coaxes users to give up
    valuable log-in info on a fake log-in screen.
    5.) Twittercut- Virus that promise user over 1000
    loyal followers. Once clicked, installs Trojan virus.
    9
    8
    1
    7
    6
    5
    2
    4
    3
    1-Facebook
    2-MySpace
    3-Twitter
    4-Bebo
    5-U-Tube
    6-WAYN
    7-Flicker
    8-Last FM
    9-LinkIn
    10-Other
  • 18. Social Media Abuse and Misuse
    User Behaviors: Deviant Activities
    Rachel Sitarz
  • 19. Introduction
    Pornography Internet trends
    Deviant behavior: Child Pornography (CP) usage
    Predatory behaviors
    Victimization of children
  • 20. Pornography Usage
    Multi-billion dollar industry (Ferraro & Casey, 2005)
    $97 billion worldwide
    $13 billion in the US alone
    Every second, $3,075.64 is being spent
    28,258 are viewing pornography every second
    372 Internet users are typing adult search terms into search engines
    39 minutes new pornography is made in US
  • 21. Pornography Usage Continued
    Sex is the most searched topic, with one-third of all internet user visiting some form of sexually related site regularly
    Anonymity, cheap, easily accessed, avoid social embarrassment, instant gratification, easily hidden
  • 22. Pornography Pages By Country
    Country Porn Pages:
    United States 244,661,900
    Germany 10,030,200
    United Kingdom 8,506,800
    Australia 5,655,800
    Japan 2,700,800
    The Netherlands 1,883,800
    Russia 1,080,600
    Poland 1,049,600
    Spain 852,800
  • 23. Pornography Stats
    40 million U.S. adults regularly visit Internet pornography
    20% of men admit accessing pornography at work
    70% of women keep their online activities secret
    10% of adults admit to Internet sexual addition
    17% of women admit to struggling with pornography addiction
  • 24. Child Pornography Online
    Child pornography isn't new, it’s easier to access without as many social and legal risks
    Some statistics estimate that 1.5 million children have been and currently are being exploited
    Multi-billion dollar industry with estimated 100,000 child pornography websites
    “Golden Age of Child Pornography”
  • 25. Child Pornography Continued
    Child pornography is one of the fastest growing businesses online
    Content is continually getting worse and more graphic
    58% of CP websites are made in US
  • 26. Online Predators
    644,865 Registered Sex Offenders in the US (many unregistered)
    80 % of offenders were explicit about their intentions with youth
    73 % of online crimes, teens go to meet the offender on multiple occasions for multiple sexual encounters
  • 27. Distribution of CP Online
  • 28. Youth Victimization
    Approximately 1 in 6 youth online (10 to 17-years-old) received a sexual solicitation or approach over the Internet.
    4% received an aggressive sexual solicitation – meeting, phone call, gifts
    34% had an unwanted exposure to pornography
    27% of the youth who encountered unwanted pornography told a parent or guardian
    Research indicates that 1 in 5 girls and 1 in 10 boys will be sexually victimized before adulthood
  • 29. Meet 10 year-old Becky’s new 12 year-old online friend.
  • 30. Source References
    1.) http://information-security-resources.com/2009/08/17/top-8-social-media-security-threats/
    2.) http://socialmediasecurity.com/
    3.) http://www.fastcompany.com/1563867/the-5-biggest-social-media-security-risks-for-businesses
    4.) http://dns.tmcnet.com/topics/internet-security/articles/137059-social-networking-sites-sitting
    5.) http://www.cdc.gov/socialmedia/Tools/guidelines/pdf/securitymitigations.pdf
    6.) http://www.netsmartz.org/
    7.) http://www.missingkids.com/
    8.) http://enough.org/
    9.) Internet Watch Foundation. Annual Report, 2008
    10.) Adler, A. (2001). The Perverse Law of Child Pornography. Columbia Law Review, 101(2), 209-273
  • 31. Source References Continued
    11.) http://blog.vimov.com/2011/01/app-squatting-misuse-of-weather-hd-name-in-the-mac-app-store/
     
    12.) http://www.betanews.com/article/Apple-still-silent-as-more-scams-are-found-on-App-Store/1278363193
     
    13.) http://eu.techcrunch.com/2010/11/29/over-60000-click-on-scam-facebook-app-which
    -claims-you-can-see-who-checked-your-profile/
     
    14.) http://www.switched.com/2009/09/15/5-popular-facebook-scams-and-how-to-avoid-them/
     
    15.) http://www.macworld.com/article/157303/2011/01/twitter_antivirusscam.html.
     
    16.) http://downloadsquad.switched.com/2011/01/16/facebook-enables-one-click-identity-theft-option
    -for-rogue-application-developers/
     
    17.) http://www.facecrooks.com/blog/internet-safety-a-privacy/item/904-study-finds-most-social-media
    -users-do-not-check-shared-links-for-malware
     
    18.) http://tech.fortune.cnn.com/2011/01/22/app-store-hits-10-billion-update/?hpt=T2
     
    19.) http://blog.nutshellmail.com/2010/02/03/can-you-trust-third-party-twitter-applications
    20.) Ferraro, M., & Casey, E. (2005). Investigating child exploitation and pornography:
    The Internet, the Law and Forensic Science. San Diego, CA: Elsvier Academic Press.
  • 32. Questions