SlideShare a Scribd company logo
1 of 29
Download to read offline
Social Media Security: Protecting
Privacy
S. Srinivasan, Ph.D.
Professor of Information Systems
Texas A & M International University
1
Outline
• Social Media evolution
• Acceptance by the public
• Security concerns
• Privacy aspects of Social Media
• Suggested Best Practices
• References
2
Social Media Definition
• A web site designed to allow several users to
publish content freely on any subject for use
by ‘friends’ and others. Such a site allows
users to create a personal ‘profile’ visible to
the people they allow.
3
Social Media evolution
• Facebook is one of the latest in a series of Social
Media outlets
• Six Degrees by Andrew Weinrich, New York, early
1997
• Six Degrees is the first social network
• Black Planet by Omar Wasow and Benjamin Sun,
New York, 1999
• Black Planet was launched to benefit African-
Americans
4
Social Media evolution
• Asian Avenue by the same group as Black
Planet, New York, 1999
• Asian Avenue was ethnic focused
• Lunar Storm by Ricard Ericsson in Sweden,
2000. Focus on teenagers.
• CyWorld by SK Telecom in South Korea, 2001
• Ryze by Adrian Scott, San Francisco, 2001
• Ryze was designed for business people
5
Social Media evolution
• Club Nexus by Orkut Buyukkokten, Stanford
University, Nov. 2001
• Orkut Buyukkokten is a Turkish native
• Orkut Buyukkokten joined Google in 2003
• Orkut social network was launched by Google
in Jan. 2004
• Orkut is very popular today in Brazil (50% of
users) and India (20% of users)
6
Social Media evolution
• Friendster by Jonathan Abrams, San Francisco,
Feb. 2003
• Friendster allowed real names only
• Friendster is the forerunner to all modern social
networks
• It grew too fast and was not able to scale in
functionality
• Today, 60% of Friendster users are in Philippines,
Malaysia and Indonesia
7
Social Media evolution
• LinkedIn by Reid Hoffman, San Francisco, May
2003
• LinkedIn designed for professional people
• Currently it has 135 million users
• Most users are in U.S., U.K., India and Brazil
• Tribe.Net by Mark Pincus, San Francisco, May
2003
• Tribe.Net aimed at facilitating selling
merchandise by friends to friends without using
Craigslist
8
Social Media evolution
• MySpace by Tom Anderson and Chris
DeWolfe, Los Angeles, Aug. 2003
• MySpace allowed use of fake names for
registration
• It was owned by Rupert Murdoch’s Newscorp
• Sold to a group that includes Justin Timberlake
in 2011
• Focus has changed to music related activities
9
Social Media evolution
• Facebook by Mark Zuckerberg, Eduardo
Saverin, Dustin Moskovitz, Chris Hughes,
Harvard University, Feb. 2004
• Facebook has over 800 million users
worldwide
• Twitter by Jack Dorsey, Noah Glass, Evan
Williams, Biz Stone in San Francisco, July 2006
• Over 350 million users worldwide
10
Social Media evolution
• Diaspora by Rafael Sofaer, Maxwell Salzberg,
Ilya Zhitomirskiy, Daniel Grippi, New York,
2010
• Diaspora focuses on user privacy
• Open source software and so it is difficult to
estimate its user base
11
Social Media evolution
• Google+ was launched in June 2011 in San
Francisco
• Google+ has more than 10 million users
• Facebook users have ‘friends’
• Twitter users have ‘followers’
• LinkedIn users have ‘connections’
12
Acceptance by the Public
• Social networks are very well accepted by the
public
• Public is looking for convenience over security
• People are not checking carefully before
accepting ‘friends’
• Better practice would be:
– ‘Joe’ recommends ‘Bill’ to ‘Sam’
– ‘Bill’ sends ‘Sam’ a request to be ‘friend’
– ‘Sam’ accepts ‘Bill’
13
Acceptance by the Public
• What is really happening now:
– ‘Bill’ is friends with ‘Joe’
– ‘Bill’ finds out ‘Sam’ is friend of ‘Joe’
– ‘Bill’ sends a request to ‘Sam’ to be a friend
– ‘Sam’ accepts ‘Bill’ inherently trusting that ‘Joe’
recommended the new friend
• ‘Sam’ thinks rejecting ‘Bill’ would hurt his friend
‘Joe’
• People should realize relationships are dynamic
14
Acceptance by the Public
• Before accepting friends, consider:
– You have a right to decide whom to accept
– Don’t rush, take time to assess
– People judge you based on who your friends are
15
Security Concerns
• Facebook users access the system mostly
using cell phones
• This opens up free access to anyone getting
hold of the cell phone of a user without the
need for userid and password
• Facebook gives an option to activate
userid/pwd but in reality the users do not
• Facebook allows Close Friends, Friends and
Acquaintances
16
Security Concerns
• Other types of classifications such as
‘Restricted’, ‘Friends by City/Region/Group’
are feasible
• By default the privacy settings are set to
Public, meaning anyone could see the profile
and wall
• People have the habit of putting DoB, marital
status, address, political beliefs, religion,
hometown, etc in profile
17
Security Concerns
• Anyone in friends’ circle can post photos on
your wall
• ‘Check-in’ feature in Facebook tells your
friends your GPS location
• By changing Privacy Settings you can avoid
getting tagged but it does not happen
• Login notification in Facebook is like Skype
• App passwords can be created but does not
happen
18
Security Concerns
• Login approvals can be created with code to
other sites such as YouTube
• ‘Updates’ in Facebook are a dangerous way to
let out too much information
• Example: ‘I am looking forward to my Europe
vacation next month’
• Looks innocuous, but tells ‘acquaintances’ that
you will be out of the country next month.
They can rob your house.
19
Privacy aspects of Social Media
• A ‘friend’ in Facebook posts ‘Five things about
me’ and encourages you to do the same
• Two of the five things are:
– I attended Valley High
– My cat is Myra
• Think of this user choosing these two
questions as his security questions for an
online bank account
• Unknowingly he has compromised his privacy
20
Privacy aspects of Social Media
• Facebook applications are potential sources of
bypassing controls
• Example: You receive an App that asks the
question ‘Which 70s movie reflects you?’ The
App might state that allowing it would permit
the App to check your profile and that of your
friends in order to find an answer to the
question. You have unwittingly opened up
your profile to an unknown third party.
21
Privacy aspects of Social Media
• Twitter feed from you states that:
– ‘I found a bug in our software’
– ‘I overheard that so-and-so is gay’
• First one exposes your company problems
• Second one is uncorroborated but has the
potential to cause great harm
• Both are violations of privacy for a firm and an
individual
22
Privacy aspects of Social Media
• Like Facebook, Twitter users are very lax in
setting up proper controls for friends or
followers
• Many feel proud that they have so many
friends or followers
• Following the tweets of others has become a
major pastime for many
• Tweets reveal location information as well
23
Suggested Best Practices
• URL shortening or obfuscation is widespread
• This is a recipe for criminals to hide their
malicious sites using obfuscation
• Do not click on URLs, instead copy and paste
them on a new session
• When in doubt about a URL check them out
using www.longurl.org or
www.longurlplease.com
24
Suggested Best Practices
• Never open attachments from unknown sources
• Never open attachments from ‘friends’ unless
you expected them
• Hackers takeover address books and send
malware to all addresses in the book in the name
of the owner
• LinkedIn request for ‘connections’ is one of the
widely abused without knowledge of the owner
25
Suggested Best Practices
• At TAMIU, I surveyed 72 managers/supervisors
with the help of a student
• The analysis of the data shows that managers
perceive that social networks:
– Provide high morale
– Satisfaction
– Commitment
– Better performance
26
Suggested Best Practices
• Some managers think that they have to allow
the use of social networks in the workplace
because their competition allows it and
employees expect it
• The above reasoning is not a valid argument
unless it fits well with the organizational goals
27
Suggested Best Practices
• Pew Research Study in 2011 points out that
majority of the users of social media use it to
stay connected with friends and family
• Other surveys point to people feeling ‘left out’
if they do not use social media
• Peer pressure is one major reason for many
casual users of social media without paying
much attention to security or privacy
28
References
• Dinerman, B. “Social Networking and Security
Risks,” White Paper,
http://www.gfi.com/whitepapers/Social_Netw
orking_and_Security_Risks.pdf
• Pew Research Study, 2011
http://pewresearch.org/pubs/2131/social-
media-facebook-twitter-myspace-linkedin
29

More Related Content

Similar to fissea-conference-2012_srinivasan.pdf

history of google,facebook,twitter,linked in, youtube
history of google,facebook,twitter,linked in, youtubehistory of google,facebook,twitter,linked in, youtube
history of google,facebook,twitter,linked in, youtubeamaizach
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullyingzackkay
 
Social networking sites.
Social networking sites.Social networking sites.
Social networking sites.Jagdeep Gill
 
Social Media and Dating Presentation
Social Media and Dating PresentationSocial Media and Dating Presentation
Social Media and Dating PresentationShanika Robinson
 
power of social media complete slides
power of social media complete slidespower of social media complete slides
power of social media complete slidesAmnaIqbal80
 
Social Media for Baby Boomers
Social Media for Baby BoomersSocial Media for Baby Boomers
Social Media for Baby BoomersSue Barrett
 
Smart social networking
Smart social networkingSmart social networking
Smart social networkingKim Grewe
 
Public by Default: Life Online in 2012
Public by Default:  Life Online in 2012Public by Default:  Life Online in 2012
Public by Default: Life Online in 2012Pat Sine
 
Decoding Social Media 解讀社交媒體 (2010.09.09 @ CCLSG 新加坡福音證主協會)
Decoding Social Media 解讀社交媒體 (2010.09.09 @ CCLSG 新加坡福音證主協會)Decoding Social Media 解讀社交媒體 (2010.09.09 @ CCLSG 新加坡福音證主協會)
Decoding Social Media 解讀社交媒體 (2010.09.09 @ CCLSG 新加坡福音證主協會)Calvin C. Yu
 
Social Media Revolution - Creating Your Personal Online Profile
Social Media Revolution - Creating Your Personal Online ProfileSocial Media Revolution - Creating Your Personal Online Profile
Social Media Revolution - Creating Your Personal Online ProfileWalter Adamson
 
WRI Communications Curriculum: Social Media Strategy
WRI Communications Curriculum: Social Media StrategyWRI Communications Curriculum: Social Media Strategy
WRI Communications Curriculum: Social Media StrategyLaura Lee Dooley
 
Social Media Trends Presentation
Social Media Trends PresentationSocial Media Trends Presentation
Social Media Trends PresentationCreston Blanchard
 
Social networking
Social networkingSocial networking
Social networkingJohan Koren
 
Social media user guide
Social media user guideSocial media user guide
Social media user guideWhitney Moore
 

Similar to fissea-conference-2012_srinivasan.pdf (20)

vijayalaxmi.sn
vijayalaxmi.snvijayalaxmi.sn
vijayalaxmi.sn
 
history of google,facebook,twitter,linked in, youtube
history of google,facebook,twitter,linked in, youtubehistory of google,facebook,twitter,linked in, youtube
history of google,facebook,twitter,linked in, youtube
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Social networking sites.
Social networking sites.Social networking sites.
Social networking sites.
 
Social Media and Dating Presentation
Social Media and Dating PresentationSocial Media and Dating Presentation
Social Media and Dating Presentation
 
Social networking
Social networkingSocial networking
Social networking
 
power of social media complete slides
power of social media complete slidespower of social media complete slides
power of social media complete slides
 
Social Network
Social NetworkSocial Network
Social Network
 
Social Media for Baby Boomers
Social Media for Baby BoomersSocial Media for Baby Boomers
Social Media for Baby Boomers
 
eSmart Libraries social media presentation 2015
eSmart Libraries social media presentation 2015eSmart Libraries social media presentation 2015
eSmart Libraries social media presentation 2015
 
Smart social networking
Smart social networkingSmart social networking
Smart social networking
 
Social networking
Social networkingSocial networking
Social networking
 
Public by Default: Life Online in 2012
Public by Default:  Life Online in 2012Public by Default:  Life Online in 2012
Public by Default: Life Online in 2012
 
Decoding Social Media 解讀社交媒體 (2010.09.09 @ CCLSG 新加坡福音證主協會)
Decoding Social Media 解讀社交媒體 (2010.09.09 @ CCLSG 新加坡福音證主協會)Decoding Social Media 解讀社交媒體 (2010.09.09 @ CCLSG 新加坡福音證主協會)
Decoding Social Media 解讀社交媒體 (2010.09.09 @ CCLSG 新加坡福音證主協會)
 
Social Media Revolution - Creating Your Personal Online Profile
Social Media Revolution - Creating Your Personal Online ProfileSocial Media Revolution - Creating Your Personal Online Profile
Social Media Revolution - Creating Your Personal Online Profile
 
WRI Communications Curriculum: Social Media Strategy
WRI Communications Curriculum: Social Media StrategyWRI Communications Curriculum: Social Media Strategy
WRI Communications Curriculum: Social Media Strategy
 
Social Media Trends Presentation
Social Media Trends PresentationSocial Media Trends Presentation
Social Media Trends Presentation
 
Social network
Social networkSocial network
Social network
 
Social networking
Social networkingSocial networking
Social networking
 
Social media user guide
Social media user guideSocial media user guide
Social media user guide
 

Recently uploaded

ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 

Recently uploaded (20)

ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 

fissea-conference-2012_srinivasan.pdf

  • 1. Social Media Security: Protecting Privacy S. Srinivasan, Ph.D. Professor of Information Systems Texas A & M International University 1
  • 2. Outline • Social Media evolution • Acceptance by the public • Security concerns • Privacy aspects of Social Media • Suggested Best Practices • References 2
  • 3. Social Media Definition • A web site designed to allow several users to publish content freely on any subject for use by ‘friends’ and others. Such a site allows users to create a personal ‘profile’ visible to the people they allow. 3
  • 4. Social Media evolution • Facebook is one of the latest in a series of Social Media outlets • Six Degrees by Andrew Weinrich, New York, early 1997 • Six Degrees is the first social network • Black Planet by Omar Wasow and Benjamin Sun, New York, 1999 • Black Planet was launched to benefit African- Americans 4
  • 5. Social Media evolution • Asian Avenue by the same group as Black Planet, New York, 1999 • Asian Avenue was ethnic focused • Lunar Storm by Ricard Ericsson in Sweden, 2000. Focus on teenagers. • CyWorld by SK Telecom in South Korea, 2001 • Ryze by Adrian Scott, San Francisco, 2001 • Ryze was designed for business people 5
  • 6. Social Media evolution • Club Nexus by Orkut Buyukkokten, Stanford University, Nov. 2001 • Orkut Buyukkokten is a Turkish native • Orkut Buyukkokten joined Google in 2003 • Orkut social network was launched by Google in Jan. 2004 • Orkut is very popular today in Brazil (50% of users) and India (20% of users) 6
  • 7. Social Media evolution • Friendster by Jonathan Abrams, San Francisco, Feb. 2003 • Friendster allowed real names only • Friendster is the forerunner to all modern social networks • It grew too fast and was not able to scale in functionality • Today, 60% of Friendster users are in Philippines, Malaysia and Indonesia 7
  • 8. Social Media evolution • LinkedIn by Reid Hoffman, San Francisco, May 2003 • LinkedIn designed for professional people • Currently it has 135 million users • Most users are in U.S., U.K., India and Brazil • Tribe.Net by Mark Pincus, San Francisco, May 2003 • Tribe.Net aimed at facilitating selling merchandise by friends to friends without using Craigslist 8
  • 9. Social Media evolution • MySpace by Tom Anderson and Chris DeWolfe, Los Angeles, Aug. 2003 • MySpace allowed use of fake names for registration • It was owned by Rupert Murdoch’s Newscorp • Sold to a group that includes Justin Timberlake in 2011 • Focus has changed to music related activities 9
  • 10. Social Media evolution • Facebook by Mark Zuckerberg, Eduardo Saverin, Dustin Moskovitz, Chris Hughes, Harvard University, Feb. 2004 • Facebook has over 800 million users worldwide • Twitter by Jack Dorsey, Noah Glass, Evan Williams, Biz Stone in San Francisco, July 2006 • Over 350 million users worldwide 10
  • 11. Social Media evolution • Diaspora by Rafael Sofaer, Maxwell Salzberg, Ilya Zhitomirskiy, Daniel Grippi, New York, 2010 • Diaspora focuses on user privacy • Open source software and so it is difficult to estimate its user base 11
  • 12. Social Media evolution • Google+ was launched in June 2011 in San Francisco • Google+ has more than 10 million users • Facebook users have ‘friends’ • Twitter users have ‘followers’ • LinkedIn users have ‘connections’ 12
  • 13. Acceptance by the Public • Social networks are very well accepted by the public • Public is looking for convenience over security • People are not checking carefully before accepting ‘friends’ • Better practice would be: – ‘Joe’ recommends ‘Bill’ to ‘Sam’ – ‘Bill’ sends ‘Sam’ a request to be ‘friend’ – ‘Sam’ accepts ‘Bill’ 13
  • 14. Acceptance by the Public • What is really happening now: – ‘Bill’ is friends with ‘Joe’ – ‘Bill’ finds out ‘Sam’ is friend of ‘Joe’ – ‘Bill’ sends a request to ‘Sam’ to be a friend – ‘Sam’ accepts ‘Bill’ inherently trusting that ‘Joe’ recommended the new friend • ‘Sam’ thinks rejecting ‘Bill’ would hurt his friend ‘Joe’ • People should realize relationships are dynamic 14
  • 15. Acceptance by the Public • Before accepting friends, consider: – You have a right to decide whom to accept – Don’t rush, take time to assess – People judge you based on who your friends are 15
  • 16. Security Concerns • Facebook users access the system mostly using cell phones • This opens up free access to anyone getting hold of the cell phone of a user without the need for userid and password • Facebook gives an option to activate userid/pwd but in reality the users do not • Facebook allows Close Friends, Friends and Acquaintances 16
  • 17. Security Concerns • Other types of classifications such as ‘Restricted’, ‘Friends by City/Region/Group’ are feasible • By default the privacy settings are set to Public, meaning anyone could see the profile and wall • People have the habit of putting DoB, marital status, address, political beliefs, religion, hometown, etc in profile 17
  • 18. Security Concerns • Anyone in friends’ circle can post photos on your wall • ‘Check-in’ feature in Facebook tells your friends your GPS location • By changing Privacy Settings you can avoid getting tagged but it does not happen • Login notification in Facebook is like Skype • App passwords can be created but does not happen 18
  • 19. Security Concerns • Login approvals can be created with code to other sites such as YouTube • ‘Updates’ in Facebook are a dangerous way to let out too much information • Example: ‘I am looking forward to my Europe vacation next month’ • Looks innocuous, but tells ‘acquaintances’ that you will be out of the country next month. They can rob your house. 19
  • 20. Privacy aspects of Social Media • A ‘friend’ in Facebook posts ‘Five things about me’ and encourages you to do the same • Two of the five things are: – I attended Valley High – My cat is Myra • Think of this user choosing these two questions as his security questions for an online bank account • Unknowingly he has compromised his privacy 20
  • 21. Privacy aspects of Social Media • Facebook applications are potential sources of bypassing controls • Example: You receive an App that asks the question ‘Which 70s movie reflects you?’ The App might state that allowing it would permit the App to check your profile and that of your friends in order to find an answer to the question. You have unwittingly opened up your profile to an unknown third party. 21
  • 22. Privacy aspects of Social Media • Twitter feed from you states that: – ‘I found a bug in our software’ – ‘I overheard that so-and-so is gay’ • First one exposes your company problems • Second one is uncorroborated but has the potential to cause great harm • Both are violations of privacy for a firm and an individual 22
  • 23. Privacy aspects of Social Media • Like Facebook, Twitter users are very lax in setting up proper controls for friends or followers • Many feel proud that they have so many friends or followers • Following the tweets of others has become a major pastime for many • Tweets reveal location information as well 23
  • 24. Suggested Best Practices • URL shortening or obfuscation is widespread • This is a recipe for criminals to hide their malicious sites using obfuscation • Do not click on URLs, instead copy and paste them on a new session • When in doubt about a URL check them out using www.longurl.org or www.longurlplease.com 24
  • 25. Suggested Best Practices • Never open attachments from unknown sources • Never open attachments from ‘friends’ unless you expected them • Hackers takeover address books and send malware to all addresses in the book in the name of the owner • LinkedIn request for ‘connections’ is one of the widely abused without knowledge of the owner 25
  • 26. Suggested Best Practices • At TAMIU, I surveyed 72 managers/supervisors with the help of a student • The analysis of the data shows that managers perceive that social networks: – Provide high morale – Satisfaction – Commitment – Better performance 26
  • 27. Suggested Best Practices • Some managers think that they have to allow the use of social networks in the workplace because their competition allows it and employees expect it • The above reasoning is not a valid argument unless it fits well with the organizational goals 27
  • 28. Suggested Best Practices • Pew Research Study in 2011 points out that majority of the users of social media use it to stay connected with friends and family • Other surveys point to people feeling ‘left out’ if they do not use social media • Peer pressure is one major reason for many casual users of social media without paying much attention to security or privacy 28
  • 29. References • Dinerman, B. “Social Networking and Security Risks,” White Paper, http://www.gfi.com/whitepapers/Social_Netw orking_and_Security_Risks.pdf • Pew Research Study, 2011 http://pewresearch.org/pubs/2131/social- media-facebook-twitter-myspace-linkedin 29