SlideShare a Scribd company logo
Does            have a positive impact in the United States? TheRealEdwin.com
Outline ,[object Object]
Privacy
Security
Fraud
Vulnerabilities
Safety
Financial
Cultural ImpactsTheRealEdwin.com
Addiction A teenager was electrocuted after dropping her laptop into the bath while twittering in the tub. Police say Maria Barbu, 17, had plugged in her laptop with wet hands after the battery died while she was bathing. Her parents found her dead, with the laptop lying next to her. TheRealEdwin.com
Privacy Some people just don’t understand the concept of privacy. “Twitter collects personally identifiable information about its users and shares it with third parties. The service considers that information an asset, and reserves the right to sell it if the company changes hands.” -Twitter Privacy Policy TheRealEdwin.com

More Related Content

What's hot

Fake news is just the beginning why the internet needs a fix
Fake news is just the beginning why the internet needs a fixFake news is just the beginning why the internet needs a fix
Fake news is just the beginning why the internet needs a fix
Chirag Thumar
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
EmmanuelaSernicul
 
Twitter Presentation
Twitter PresentationTwitter Presentation
Twitter Presentationscriptalias
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
MahdiRahmani15
 
Social Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsSocial Media and Media Abuse for Parents
Social Media and Media Abuse for Parents
Dave Tinker, CFRE
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rowenick
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
MarketingatBahrain
 
Online safety 101
Online safety 101Online safety 101
Online safety 101
Greg Bold
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness Posters
NetLockSmith
 
Users guide
Users guideUsers guide
Users guide
Darren Thomas
 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet SafelyJoanne Hewitt
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
Maria Petropulos
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
suresh sood
 
Stephanie nichole ho
Stephanie nichole hoStephanie nichole ho
Stephanie nichole ho
Stephanie Nichole Ho
 

What's hot (18)

Fake news is just the beginning why the internet needs a fix
Fake news is just the beginning why the internet needs a fixFake news is just the beginning why the internet needs a fix
Fake news is just the beginning why the internet needs a fix
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Twitter Presentation
Twitter PresentationTwitter Presentation
Twitter Presentation
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Social Media and Media Abuse for Parents
Social Media and Media Abuse for ParentsSocial Media and Media Abuse for Parents
Social Media and Media Abuse for Parents
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Online safety 101
Online safety 101Online safety 101
Online safety 101
 
CDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness PostersCDSE Cybsecurity Awareness Posters
CDSE Cybsecurity Awareness Posters
 
Users guide
Users guideUsers guide
Users guide
 
Using the Internet Safely
Using the Internet SafelyUsing the Internet Safely
Using the Internet Safely
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Stephanie nichole ho
Stephanie nichole hoStephanie nichole ho
Stephanie nichole ho
 

Viewers also liked

Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
In a Rocket
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
Yuan Wang
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
Post Planner
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
ux singapore
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
Kirsty Hulse
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Stanford GSB Corporate Governance Research Initiative
 

Viewers also liked (7)

Twitter
TwitterTwitter
Twitter
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similar to Does Twitter have a positive impact in the United States?

Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
- Mark - Fullbright
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
MdRuga
 
Social Engineering CSO Survival Guide
Social Engineering CSO Survival GuideSocial Engineering CSO Survival Guide
Social Engineering CSO Survival Guide
E.S.G. JR. Consulting, Inc.
 
Internet Privacy
Internet PrivacyInternet Privacy
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
homeworkping8
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
12698
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime12698
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
Write My Essay
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
Achu69
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
RAJU852744
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
rinushalu
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
BillBrenner70
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
ijtsrd
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
Arindam Sarkar
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
stephaniewaters1212
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
The Center for Identity
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Taylor Van Sickle
 

Similar to Does Twitter have a positive impact in the United States? (20)

Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Social Engineering CSO Survival Guide
Social Engineering CSO Survival GuideSocial Engineering CSO Survival Guide
Social Engineering CSO Survival Guide
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Facebook
FacebookFacebook
Facebook
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
Power point cybercrime
Power point cybercrimePower point cybercrime
Power point cybercrime
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
 

Recently uploaded

Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 

Recently uploaded (20)

Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 

Does Twitter have a positive impact in the United States?

  • 1. Does have a positive impact in the United States? TheRealEdwin.com
  • 2.
  • 10. Addiction A teenager was electrocuted after dropping her laptop into the bath while twittering in the tub. Police say Maria Barbu, 17, had plugged in her laptop with wet hands after the battery died while she was bathing. Her parents found her dead, with the laptop lying next to her. TheRealEdwin.com
  • 11. Privacy Some people just don’t understand the concept of privacy. “Twitter collects personally identifiable information about its users and shares it with third parties. The service considers that information an asset, and reserves the right to sell it if the company changes hands.” -Twitter Privacy Policy TheRealEdwin.com
  • 12. Security On January 5, 2009, 33 high-profile Twitter accounts were compromised. Fake tweets—including sexually explicit and drug-related messages—were then sent from the accounts. The issue with these 33 accounts is different from the Phishing scam aimed at Twitter users. These accounts were broken into by hacking into the support team tools. Twitter considered this a very serious breach of security and immediately took the support tools offline. TheRealEdwin.com
  • 13. Security What Is Phishing? “The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.” How Does It Work? The scam sent out emails resembling those you might receive from Twitter. The email provides a link that redirects to a site masquerading as Twitter. TheRealEdwin.com
  • 14. Security A security vulnerability was reported on April 7, 2007, by NiteshDhanjani and Rujith. The problem was due to Twitter using the phone number of the senders of SMS messages as authentication. Nitesh used FakeMyText to spoof a text message, whereupon Twitter posted the message on the victim's page. TheRealEdwin.com
  • 15. Financial One would-be Cisco employee proves that to place a permanent black mark on your resume, Twitter is the tool of choice. Here’s the tweet the now Web-infamous "theconnor" shared with the world: “Cisco just offered me a job! Now I have to weigh the utility of a fatty paycheck against the daily commute to San Jose and hating the work.” Tim Levad, a "channel partner advocate" for Cisco Alert, shared this response: "Who is the hiring manager. I’m sure they would love to know that you will hate the work. We here at Cisco are versed in the web." TheRealEdwin.com
  • 16. Social Impact The Twouble with Twitter Twitter is an addiction to "constant self-affirmation" that encourages narcissism, inflated egos and said Tweets are nothing more than "shouts into the darkness hoping someone is listening". During a February 2009 discussion on NPR’s Weekend Edition, Daniel Schorr noted that Twitter lacked rigorous fact-checking and other editorial improvements. Twitter gives already pretentious people an even greater reason to think people care about their second-to-second-actions--is what impact it has on communication as a whole. TheRealEdwin.com
  • 17. Social Impact Thanks to IM and SMS, human communication is becoming shallower, more stilted, and less meaningful. Even in the current workplace, many teenagers don't speak in sentences of more than a few words in length because they spend so much time talking via text, where vocabulary is limited and sentences are truncated for typing speed. The long-term impact on communication is worrying. People are forgetting how to talk to each other in meaningful ways. TheRealEdwin.com