This paper is intended to educate mobile and internet users on the daily threats they face while using their cell phone, emails to communicate and browsing the web.
It contains current statistics on cybercrimes, online dating, web browsing privacy issues and so forth. Analyses case studies and offers solutions to protect your privacy.
This is mandatory reading for marketers, developers, and investors who are interested in the SoLoMo space. I think we’ll look back on The SoLoMo Manifesto as a reference for where social, local, and mobile stood at the start of 2012.”–Mark Evans, Creator of the Geo-Loco and Social-Loco conferences.
Integrating social media with mobile, online and other marketing channelsIntelligencia Limited
While the traditional model of blasting messages to customers and potential customers is fading, a new model has emerged. The same customers who are tuning out the formulaic advertising messages of yesterday are now tuning in to their own personal world of social media for product and marketing advice. Being ‘social’ means being available for real-time marketing, real-time customer service and real-time user analytics. The combination of mobile and social media marketing is powerful because it represents an interactive cross-media channel that allows consumers to move instantly from ad placement to point of sale, anytime, anywhere. Together, mobile and social technology are not only transforming how people communicate with each other but also how advertisers and marketers are communicating with them. By mining conversations across multiple social channels, sentiment analysis can help create strategies and engage new customers, while also revealing important insights into a company and its products. This new reality offers a great opportunity to any company willing to step into the world of mobile and social media marketing.
Mobile Marketing and Advertising in the context of Evolution, Marketing 2.0, ...sprxmobile
The sweet spot of mobile marketing is identified using different trends from different perspectives and levels of analysis (Evolution at large, Marketing 2.0, Metaverse as well as Mobile Internet itself)
This report considers the digital trends that will emerge in 2013. It explores the most important cross-channel learnings for savvy marketers looking to improve their future communications strategies to deliver more engaging, efficient marketing campaigns that will capture the attention, and the spending power, of consumers tomorrow.
It describes the SoLoMo’s usage for marketing across the various industries. It provides deep insight on what SoLoMo is all about and how it is implemented for getting better results than the traditional marketing strategies.
This is mandatory reading for marketers, developers, and investors who are interested in the SoLoMo space. I think we’ll look back on The SoLoMo Manifesto as a reference for where social, local, and mobile stood at the start of 2012.”–Mark Evans, Creator of the Geo-Loco and Social-Loco conferences.
Integrating social media with mobile, online and other marketing channelsIntelligencia Limited
While the traditional model of blasting messages to customers and potential customers is fading, a new model has emerged. The same customers who are tuning out the formulaic advertising messages of yesterday are now tuning in to their own personal world of social media for product and marketing advice. Being ‘social’ means being available for real-time marketing, real-time customer service and real-time user analytics. The combination of mobile and social media marketing is powerful because it represents an interactive cross-media channel that allows consumers to move instantly from ad placement to point of sale, anytime, anywhere. Together, mobile and social technology are not only transforming how people communicate with each other but also how advertisers and marketers are communicating with them. By mining conversations across multiple social channels, sentiment analysis can help create strategies and engage new customers, while also revealing important insights into a company and its products. This new reality offers a great opportunity to any company willing to step into the world of mobile and social media marketing.
Mobile Marketing and Advertising in the context of Evolution, Marketing 2.0, ...sprxmobile
The sweet spot of mobile marketing is identified using different trends from different perspectives and levels of analysis (Evolution at large, Marketing 2.0, Metaverse as well as Mobile Internet itself)
This report considers the digital trends that will emerge in 2013. It explores the most important cross-channel learnings for savvy marketers looking to improve their future communications strategies to deliver more engaging, efficient marketing campaigns that will capture the attention, and the spending power, of consumers tomorrow.
It describes the SoLoMo’s usage for marketing across the various industries. It provides deep insight on what SoLoMo is all about and how it is implemented for getting better results than the traditional marketing strategies.
The Intersection Of Email, Mobile & Social MediaGreg Cangialosi
Email has been - and continues to be - the backbone of all online marketing, while social media and the mobile landscape continue to emerge as top tools for today's marketers. These mediums are cost effective, informative, and have the potential to reach millions of people.
Join Blue Sky Factory as we navigate through the convergence of email, mobile, and social media - 3 core mediums that are currently on the hearts and minds of marketers everywhere - and discuss how marketers can leverage these tools to drive new sales and increase brand awareness.
This is a document trying to 'crystal-ball' some behavioral trends and themes in the digital marketing space in the next 12 months.
I work as a digital director at OMD Sydney and need to be clear that this is a local piece of work and not a global OMD or Omnicom viewpoint.
It was created for clients and internal training and has been amended in places for publication. I hope you find it interesting and useful.
Digital markets can adopt different personalities as they evolve. Understanding each one is the key to turning media fragmentation into precise communication opportunities.
This presentation covers some of the major trends in marketing that are now taking hold. It covers whether newspapers as we know them will survive, cable television, yellow pages and what will replace them as they die.
We have the latest information regarding new consumer habits and internet & social media trends, from how and where to use AR (Artificial Reality) and VR (Virtual Reality), how and why you need to boost user-generated content, why you have to invest more in “micro-influencers”, why short-form video content is a must, and most importantly why and how brands have to encompass in their line-up subjects that are inclusive and representative for a wide range of audiences.
The Intersection Of Email, Mobile & Social MediaGreg Cangialosi
Email has been - and continues to be - the backbone of all online marketing, while social media and the mobile landscape continue to emerge as top tools for today's marketers. These mediums are cost effective, informative, and have the potential to reach millions of people.
Join Blue Sky Factory as we navigate through the convergence of email, mobile, and social media - 3 core mediums that are currently on the hearts and minds of marketers everywhere - and discuss how marketers can leverage these tools to drive new sales and increase brand awareness.
This is a document trying to 'crystal-ball' some behavioral trends and themes in the digital marketing space in the next 12 months.
I work as a digital director at OMD Sydney and need to be clear that this is a local piece of work and not a global OMD or Omnicom viewpoint.
It was created for clients and internal training and has been amended in places for publication. I hope you find it interesting and useful.
Digital markets can adopt different personalities as they evolve. Understanding each one is the key to turning media fragmentation into precise communication opportunities.
This presentation covers some of the major trends in marketing that are now taking hold. It covers whether newspapers as we know them will survive, cable television, yellow pages and what will replace them as they die.
We have the latest information regarding new consumer habits and internet & social media trends, from how and where to use AR (Artificial Reality) and VR (Virtual Reality), how and why you need to boost user-generated content, why you have to invest more in “micro-influencers”, why short-form video content is a must, and most importantly why and how brands have to encompass in their line-up subjects that are inclusive and representative for a wide range of audiences.
CTIA 2009 - The Mobile Space and Transmedia: A Critical Content Platform for...John D. Heinsen
With mainstream media expanding its reach to find its audience, producers are more and more looking to mobile as a marketing and programming platform. It is this emerging group of storytellers who will lead innovation and define the standards of content in this new medium.
Panelists for this topic will address the various challenges related to mobile content development and production, technology adoption, and brand integration. This discussion, sponsored by the Mobile Committee of the Producers Guild of America, New Media Council, will look at the exploding interest of mobile in Hollywood and talk to producers who are taking advantage (and taking risk) in this uncharted territory.
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxtodd521
Running Head: SOCIAL NETWORKS DATA PRIVACY POLICIES 1
Social networking data privacy policies
Information Governance
Summer 2020
Ali, S., Islam, N., Rauf, A., Din, I. U., Guizani, M., & Rodriguez, J. P. (2018). Privacy and Security Issues in Online Social Networks
Social media are networks used for communication between data owners and viewers in virtual communities. The world has hence become a small global village; as a result, accordingly, information is shared seamlessly regardless of the geographical distance between people. There are, therefore, numerous social networks such as Facebook, LinkedIn, and Twitter, just to name a few, and with the help of the internet, people can link and communicate in real-time. When connecting with people from mobile devices, there is data that could be retrieved, indicating the location information and metadata embedded in the machines. Malicious users can hence retrieve this information and leverage it against other users.
The author makes it clear that with the new technology, presently, there is a lot more information available with the growth of online virtual communication platforms. Virtual networking platforms have changed the way people interact. People are always on their mobile devices browsing through social media sites, which is progressively attracting hackers and other cybercriminals. Due to this high usage, there are serious data security and privacy threats are facing social media users. The author is affirmative that the majority of the users are always sharing a lot of their personal information online, putting them at significant risks of the numerous methods of attacks.
This article is rather informative as the author is rather vocal about the reasons why people are continually being targeted by cybercriminals and made victims of attacks. It, therefore, clear on specific policies and strategies which one may implement to prevent them from falling victim to cyberattacks. One should refrain from sharing too much information on social networks, using real names when creating online profiles, and accepting friend requests from suspiciously looking accounts. Social network users must be keen and take the time to read the privacy statement before agreeing to the network's terms and conditions when creating reports.
Sarikakis, K., & Winter, L. (2017). Social Media Users’ Legal Consciousness About Privacy. Social Media + Society
Social network sites are on the upward trajectory, and they are still continuously growing with every mobile user in the world having been connected to an average of more that one social network. Social networks are mainly common among young adults aged between 18 years and 29 years. Users are becoming more comfortable sharing most of their personal details, which significantly challenges the social norm of privacy. The social model has hence become somewhat obsolete. According to the Electronic Frontier Foundation (EFF), which is a non-profit or.
"LIBRA: IS IT REALLY ABOUT MONEY?" de Valerie Khan Vice President Digital Equity Association valerie.khan@d-eq.org Geoffrey Goodell Centre for Blockchain Technologies University College London
I gave this version of my Design for Privacy presentation to the NY Experience Group of Publicis Sapient on Monday, 4 October 2021. It includes examples of privacy and security issues, our role in designing for privacy as design professionals, as well as best practices for privacy to keep in mind.
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...ijsptm
The privacy of personal information is an important issue affecting the confidence of internet users. The
widespread adoption of online social networks and access to these platforms using mobile devices has
encouraged developers to make the systems and interfaces acceptable to users who seek privacy. The aim
of this study is to test a wizard that allows users to control the sharing of personal information with others.
We also assess the concerns of users in terms of such sharing such as whether to hide personal data in
current online social network accounts. Survey results showed the wizard worked very well and that
females concealed more personal information than did males. In addition, most users who were concerned
about misuse of personal information hid those items. The results can be used to upgrade current privacy
systems or to design new systems that work on mobile internet devices. The system can also be used to save
time when setting personal privacy settings and makes users more aware of items that will be shared with
others.
eMarketer Webinar: Perspectives on Digital Privacy—Marketers, Consumers, FedseMarketer
Join eMarketer Principal Analyst David Hallerman as he helps companies involved in the digital ad space figure out the best questions to ask and next steps to take to address digital privacy.
Designing for Privacy in an Increasingly Public World — Speed TalkRobert Stribley
Lightning talk version of my Designing for Privacy in an Increasingly Public World presentation for Design Museum Week, presented Wednesday, April 27, 2022
Discover the hard facts and real risks of identity theft from Javelin Strategy & Research. Here we share the 2012 Identity Fraud Report findings that reveal the new fraud frontier of social media and mobile—and why even the most sophisticated technology users are vulnerable. See how individuals and businesses can protect personal information from identity theft while interacting online, and learn more at http://www.LifeLockBusinessSolutions.com.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Privacy study Mobile and online Dating
1. Protect your privacy:
Mobile & Digital Privacy and Awareness
August 2012
A short study by the team of
MobiDigger, Inc. – Mountain View, CA
Authors:
Hubert A.-M. Moik, 44, CEO MobiDigger, Inc.
14 years in the telecom/mobile industry, former CEO/Managing Director of Inside M2M, Data
Storm Systems, Planetlive et. al. entrepreneur since 1993, member of SVASE, SDForum et. al.,
Founder & Partner GO Silicon Valley
Juan C. Ramírez, 28, Market Research. MobiDigger, Inc.
1 year in hi-tech, 3.5 years in capital markets
Economist and MS in Business
Nick Vecchio, 22
3 years in mobile industry, College Student
Website developer, Web marketing, Sales
2. Overview
In a world where Google, Facebook, Twitter and other top web sites share and save user
information, it is increasingly hard to protect individual privacy in new media—on the Internet and
mobile phones. At the same time, information about privacy protection is very hard to find.
Further, the majority of people who use the Internet are generally not properly informed about
new media privacy issues. To help users protect themselves, this presentation explores Internet
and mobile privacy problems and solutions through reviews of case studies. It is designed to
educate users of new media in both key issues and solutions.
Problem
Contrary to conventional wisdom, privacy concerns are not limited to the Internet. It also
encloses mobile phones, which penetration in America reached 104.6% in 2011 (totaling 331.6
million subscribers) therefore exceeding the US population1. Even one-third of American
households now have wireless device only2. Users are largely unaware that cell phone
messages -even simple text messages- ultimately can end up in the hands of strangers and
even on the Internet. Worse, for example, new “smart phones” send information about the
phone’s location to databases. Though such databases usually are not public, they also are not
private; this information, then can pose a danger to the person who uses their phone to
communicate with strangers or other acquaintances, to whom they normally would not reveal
their locations. Private cell-phone information can also be revealed through a “reverse search,”
in which anyone can search a cell phone number to find the owner’s name and address.
In terms of the Internet, private information actually flows quite freely. Today, the most visited
websites share information, save information, and facilitate visitors’ buying and selling of
personal data. But many visitors to such sites do not realize that these pages’ hosts share
information they obtain from visitors. For instance, agencies of the government obtain Facebook
and Twitter users’ info and routinely request cell phone carriers for their customers’ phone
records as well3.
With the existence of so many social media sites such as Google+, Facebook, Foursquare,
Twitter and so forth, more concerns raise upon privacy issues. In a recent poll 59%4 of the
respondents said they had little or no trust in Facebook, to keep their information private. A study
released in 2011 showed that 45% of the top 185 US web sites transmitted identity details to at
least four other websites. It was discovered that one online dating website transmitted
information regarding gender, zip code and age to websites which auction personal data5.
Google is known to compile private consumer information by using tracking cookies on 712 of
the top 1,000 websites6.
Often many people ignore how vulnerable they are by posting on their ‘walls’, because they don’t
know default privacy settings allow everyone to follow what you are doing. A simple update in
1
http://www.ctia.org/advocacy/index.cfm/AID/10323
2
Blumberg, S., Luke, J. (2012) Wireless substitution: Early release of estimates from NHIS july-Dec 2011. CDC.06/12
3
http://blogs.cio.com/mobilewireless/17266/your-smartphone-spy-government
4
http://socialbarrel.com/facebook-vs-twitter/41152/
5
http://blogs.wsj.com/digits/2011/10/11/privacy-study-top-u-s-websites-share-visitor-personal-data/
6
http://www.bizjournals.com/sanfrancisco/news/2012/06/28/web-privacy-study-google-tracking.html
3. the Facebook profile such “I just drove 50 miles for the best ice cream” gives criminals a head
start to break into your home. And even worse, track you on your way back. In certain
applications such as Google’s Latitude, people publicly share their location to the world if they
don’t setup privacy settings correctly. It has been reported by a blogger that he was able to
follow people he didn’t even know, using information he gathered from the internet from unaware
people. Hence, these sorts of things make it very easy for crime perpetrators to track their
victims.
Scams and spam are also major problems on the Internet today. One of America’s most popular
websites, Craigslist is plagued with scammers who have devious ways of stealing users’
information and money. Craigslist is not unique. In addition to websites, email spam is an all-too-
common way for con artists to try to communicate with strangers, posing as friends in order to
acquire information and steal money.
Fake proxy websites are also a problem. While some proxies have a legitimate use (as when
students go to a proxy server in order to log-in to Facebook), ample cases have shown that
some proxies present fake versions of Facebook, for example, in order to obtain log-in user
names and their corresponding passwords. The fake proxy website automatically sends this
information to a database, which then logs into the account and records all of the user’s account
information.
Many websites offer a “free” gift or service, but by accepting such offers, users are often
agreeing to lengthy contracts with monthly fees. For example, “free” credit-report websites often
request credit card information, tricking the user into a monthly fee. Which is automatically
charged to the credit card, thus the credit report is not free at all. This is a common strategy;
many websites charge users for single visits, subscriptions, or for a monthly service. Often, other
websites say they are “free” and, yet, they request credit card information. This can indicate that
the site is a fraud; often such sites will enroll the user into a monthly fee arrangement or, often,
sell the subscriber’s credit card information to a third party.
In response to the upwardly demand for the need to certify the identity of online daters. Many
websites similar to the credit card score described above emerged. These sites offer online
daters to check their date’s ID to make sure they are who they claim to be. Most of the online
dating verifications sites are also known to be scams that trick customers to give away their
credit card info and get them into costly fees or lengthy contracts without satisfactory results.
Status Quo
Many users, particularly children, are unaware of many privacy issues that exist, and some of
these can be dangerous.
People who “blind” date or participate in internet dating, often provide personal information as
well as their cell phone numbers. But, with just a cell phone number, criminals can find a
person’s name, address, and other information. Location information is also available via
Facebook “Places,” Twitter, FourSquare, and Google+ to name just a few, and these sites are
catalysts for publicly sharing this information.
For example, if an address is listed with Google via Gmail, Google+ will provide the location
(and, possibly, the address) of such users. So, anonymously, other users can obtain the
4. addresses of users who wish to retain their privacy. Further, Google can reveal a person’s
location when they simply perform a search on a smart phone or computer.
The Internet often facilitates meetings between people who have never met before and,
sometimes, these encounters result in crime and victimization. A few news stories emerged of
violent crimes being perpetrated by predators who found and contacted their victims using
Craigslist. Teens, too, using their cell phones to send raunchy text messages and/or sexual
pictures, can be victimized by their own activities. Sometimes, such messages end up in the
wrong hands or, worse, under many eyes, and this exposure can cause consequences that are
much more serious than embarrassment.
If someone subscribes to a service or product, often scammers will sell the subscriber’s phone
number and any other available data to solicitors. While users can subscribe to a “Do Not Send”
list, this is a general “opt-out” of all text messaging, - senders of messages have to obey the
rules - but one could ask: which spammer will do that?
The Facts of Today
As of the Pew Research Center’s Internet & American Life Project report 4% of cell-owning
teens ages 12-17 say they have sent sexually suggestive nude or nearly nude images or videos
of themselves to someone else via text messaging, a practice also known as ‘sexting’; 15% say
they have received such images of someone they know via text message.
50 million new classified ads7 are posted each month on Craigslist, and most involve a face-to-
face meeting. Since 2005, several shocking murders, robbery and slaying crimes8 linked to
contact originated through Craigslist, had a notable attention of the US media, creating
awareness on a new modality of crime generated through online advertising. In 2011 only, 330
crimes9 were linked to Craigslist ad postings.
Dating is another alarming issue which has increased dramatically with the booming of the online
dating services. This industry is bigger than porn, has been worth $1,3 billion in 2011, and is
expected to reach $1.7 billion by 2013. The mobile dating market ($550 million in 2010) has also
experienced a rapid 90% growth since 2010 as the activity of online daters is shifting to a 3 to 1
ratio from mobile to web users10.
In the US are 45M+ active online dating users, the second biggest market only after China, and
ahead of India. Nowadays 49% of US households are led by a single adult and one in five
relationships start on the Internet. But an astonishingly number of 1 out of 10 subscribers are
fake profiles, created by scammers, that primarily victimize people over 40 years - however all
demographics are at risk. Last year 5,663 romance scams were reported, totaling economic
losses of $50.4M. Craigslist has been a main vehicle for this type of scams and its owner took
initiative to shut down one of their personal services, partly out of concern for the safety of the
users.
7
http://www.craigslist.org/about/factsheet
8
http://www.newsnet5.com/dpp/news/national/notable-craigslist-related-crimes
9
http://blog.sfgate.com/techchron/category/craigslist/
10
http://oxfordtechnologyventures.com/mobile-and-online-dating-sites/
5. 11
Source: FBI – 2011 Annual Internet Crime Report
Previous Case Studies
In the last few years, many different issues have surfaced with regard to the growing number of
cases involving Internet and mobile phone security and privacy. As more and more people
become increasingly dependent on technology in both their professional and personal lives, it is
vital that they become aware of the dangers, as well.
It is important, that users of technology pay attention to developments and learn from the
resources available to aid in safety and security.
In Alabama authorities arrested four middle-school students for exchanging nude photos of
themselves.
A 20 year old man who met a 15 year old girl on the Xbox game ‘Halo’ and drives 40 hours to
stalk and text incriminating messages12.
In Washington a man along with his accomplices were arrested after murdering a man who
posted a Craigslist ad to sell a ring. The group stormed the house and killed the seller while
trying to defend his family.
A Boston medical student was charged with murder, armed robbery, and kidnapping after
targeting women of erotic services of Craigslist. At 22, he tried to rob a woman found through the
internet and when she struggled, he shot her.
A blog on "bodybuilding.com" was the host for a series of events that lead to the death of a 19
year old on a webcam. He died from an overdose of opiates and benzodiazepine that apparently
was encouraged by some watching the webcam. A South Florida college student was on a live
webcam for 12 hours telling people he was going to commit suicide. Some watching and some
helping, the website became aware of the act about 4 hours before he was found dead.
General statistics say 50% of children are either bullied or involved in bullying. When two high
school students recently killed themselves after being bullied, Fox News correspondent Dr. Keith
Ablow said, “The advent of new technologies makes it more apparent and more able for kids to
bully.”
11
http://www.ic3.gov/media/annualreport/2011_IC3Report.pdf
12
http://www.switched.com/2008/01/04/man-drives-40-hours-to-stalk-15-year-old-girl-he-met-online-in-h/
6. By the end of 2010, the “The National Intimate Partner and Sexual Violence Survey” released a
report for the National Center for Victims of Crime13. The study found that in the U.S. there had
been approximately 6.6 million adult stalking victims during 2010. Of these victims:
11% of victims were stalked for 5 years or more
66.2% of stalking victims experienced unwanted phone calls or messages
46% of victims encountered weekly an unwanted interaction with a stalker
Stalkers’ most common tactic
was telephone calls, voice or
text messages
10% of the victims were
monitored using a GPS system
(like the one embedded in
smartphones)
33% were stalked by people
they didn’t know at all
Approximately 25%
experienced some form of
cyberstalking such as email or
instant messaging
During any point of their
lifetime 1 in 6 women and 1 in
19 men had experience
stalking
Source: http://www.thewell.vcu.edu/docs/stalking_statistics.pdf
Solutions
This part includes more information on how those who date can increase their safety when they
are using the Internet to socialize and the cell phone to make and/or stay in contact with their
blind date.
It’s important that Internet and mobile users obtain good, overall knowledge of what’s going on
today in terms of privacy and safety. The following resources are good examples of information
sources that will help users protect themselves. The links, blogs, services and articles listed
below pertain to various lifestyles and a range of user styles, from kids to parents and from
smartphone texters to Craigslist sellers.
In 2010, a website called “PleaseRobMe” was setup to reveal as much personal information as
possible to show unaware users, what they actually publish. The site ran a program that
scanned Facebook and Twitter profiles that had no privacy settings, and then it recorded when
people said they were out doing something i.e. “getting food in San Francisco!” The program
then found their address and posted on the site where people were, their home address, and
approximately how long until they were going to return home. The site demonstrated, how easy it
13
http://www.victimsofcrime.org/our-programs/stalking-resource-center/stalking-information
7. is to learn too much information about people online. This extreme case clearly indicates that
people need to pay close attention and be mindful of the information that they provide to the
public via their “private” networking. As the site’s creators explained “The danger is publicly
telling people where you are. This is because it leaves one place you're definitely not... home“14
Similarly, by the middle of 2011 a Facebook app called “Take This Lollipop” circulated in the
Internet scaring users and raising the alarms yet again on how your private information can be
easily compile by third parties. As with all Facebook apps, users are requested to grant access
to Take This Lollipop to the user’s profile info. Once the user grants the access, the screen goes
black and appears a video of an unkempt looking man in front of a computer typing a password
to the user’s Facebook login ID. Then he browses through the user’s Facebook profile and
humps into his car with a picture of the user in his dashboard, heading to track him/her.
On the one hand, the emergence of this app also serves as a reminder to people that they have
to be careful with the information they share online and that most users ignore how to set privacy
settings to avoid sharing sensitive information. On the other hand, that apps for Facebook and
also smartphones are a way for third parties to access users’ information and track their
consumer behavior for the purpose of developing better ads.
It might be argued that the best way to protect yourself is not to use the Internet at all—no
Facebook, no Twitter, no smartphones, no downloading, no social networking, no “googling”, no
texting. The problem with this solution is that it’s not reasonable, since it is not realistic to
suggest that people should not use the Internet or mobile phones! The Internet is part of our
daily life. It can present dangers, but it can also make our lives much more interesting,
productive, profitable, and personally rewarding. So, avoiding the Internet is not the answer. The
answer is to seek out safe and practical solutions.
To address the problem of credit card fraud, for example, there are a few solutions. The best, of
course, is never to use your credit card online and never provide it to any “free” websites. When
you are buying a product online, a good option is to go to a store and purchase a temporary card
with cash on it. This is secure and the only amount at risk is what you put on the card. While this
can be stolen, no personal or financial information goes with it. Google has a service that does
something similar, where customers put money into an online account.
The following website is a resource: www.annualcreditreport.com. As mandated by the FTC, this
site offers each person one free credit check each year, and it does not require a credit card
number.
For online daters who want to make a background check on their blind dates, this web site can
come in handy: www.wegolook.com has a group of inspectors in the field, across the US, that
verifies in person the identity of the date of an end user. It requires a one-time payment per
report requested.
Mobile is a new playing field for spammers, scammers and stalkers. For users who do not want
to receive commercial messages (as text ads or robocalls) the easiest way to “opt out” of these
is to list their number on the “donotcall”- and the donotsend” lists”15, provided by the FCC under
the CAN-SPAM act of 200716.
14
www.pleaserobme.com
15
http://www.fcc.gov/cgb/consumerfacts/canspam.html
16
https://www.donotcall.gov
8. The problem with these lists is, that they exclude a user basically from receiving any marketing
messages and an opt in into a wanted messaging service becomes actually a legal balance act
for the sender of these messages.
The new service MobiDigger (learn more on page 11) offers a solution for users and
advertisers, keeping users safe with a nickname accompanied to their mobile phone and
establishes a basis for dating, advertising and classified services within a safe mobile
environment.
10. - http://www.statisticbrain.com/online-dating-statistics/
- http://www.onlinedatingdvd.com/blog/2011/08/online-dating-statistics/
- http://www.victimsofcrime.org/our-programs/stalking-resource-center/stalking-information
- http://blogs.cio.com/mobilewireless/17266/your-smartphone-spy-government
-http://www.thenewamerican.com/usnews/constitution/item/12329-govt-may-now-collect-catalog-and-
store-all-private-information
Note: This document references to registered trade marks such as Facebook®, Google®,
FourSquare® , Twitter®, Craigslist®, MobiDigger®, WeGoLook®, Latitude®
MobiDigger:
User portal: http://www.mobidigger.com
Service portal: http://www.mobidigger-inc.com
Facebook page: http://www.facebook.com/MobiDiggerInc
11. About MobiDigger®
As cell phones and email are an essential item in our life, MobiDigger has become the tool to
protect us from every day’s threats accompanied by the daily usage of our mobile phones.
While numbers of texted ads will increase significantly over the next few years, this service is
available to help mobile phone users to maintain their privacy.
Some new services help increase mobile phone users’ security. MobiDigger assigns nicknames
to phone numbers and also offers other perks to increase phone user safety. This text
messaging service provides “alias and domain service,” an excellent option for mobile privacy as
they do not share any of users’ personal information.
By choosing a nickname to your mobile number, users can pick a basic, professional, or dating
plan based on their lifestyle. Simply protecting their identity, meet work contacts or make friends
using a profile they create.
MobiDigger is naming mobile phone numbers via
a mobile messaging system, using a short code
(96527), which brings a nickname/address to
conventional, existing mobile phones.
Users are able to block people from sending
unwanted text messages and emails to a phone
with a simple text message.
Users can receive advertising, offers and
coupons without revealing their phone # or email
address.
The service has grown to over 11,500,000 users and is now partnering with local and US wide
sponsors to expand the possibilities of safe networking!
Contact:
MobiDigger, Inc. www.mobidigger.com
465 Fairchild Ave., Suite 223 hubert.moik@mobidigger-inc.com
Mountain View, CA 94043 juan.ramirez@mobidigger-inc.com