3. Demographics
Victims:
Male
Between 40 and 59 years old
California, Florida, Texas and New York
Perpetrators:
nearly 75 percent were men
more than half resided in California, Florida, New York,
Texas, DC, or Washington state
http://www.fbi.gov/news/stories/2011/february/internet_022411
4. Scams
Telephone calls claiming victims are delinquent on payday
loans
Online apartment and house rental and real estate scams
used to swindle consumers out of thousands of dollars
Denial-of-service attacks on cell phones and landlines used
as a ruse to access victims’ bank accounts
Fake e-mails seeking donations to disaster relief efforts
after last year’s earthquake in Haiti
http://www.fbi.gov/news/stories/2011/february/internet_022411
5. Porn Defined
According to UrbanDictionary.com
95% of the websites on the internet
Explicit descriptions, picture, and/or video of sexual acts
The reason why the family computer is always slow, Look in
the job application folder in "dad's work stuff's"n you'll find a
lot of it.
Sexier than sex itself
The world's most popular past time
6. Legal Definition
All sexually oriented material intended primarily to arouse
the reader, viewer, or listener
Erotic content in books, magazines, films, and recordings
Obscenity-term that applies to anything offensive to morals
7. History
1980- Usenet Groups
Discussion groups/forums: millions of users
Alt.sex largest usenet; 3.3 million users by 1993
1990- CD ROM
Virtual Valerie
Penthouse Virtual Photoshoot
Virtual Vixens
The Interactive Adventures of Seymour Butts
Websites
1994 Playboy launched website
1995 Penthouse launched website
1995 live strip tease shows
1997 video peep shows
1998 revenue was estimated $750 billion
By 2009 revenues increased to $4.9 billion
Over 95% of pornography online is free amateur sites, free file sharing sites, and/or porn tube sites
http://www.pornographyhistory.com/
8. Obscenity
Max Hardcore
AKA Paul Little
Male pornographic actor/producer/director
Rose to prominence in 1992
“Testing the limit of acceptability”
Involved obscene sex acts
Women acting and dressed as 12 year olds
Lewd acts
Called his own material “vile and crazy”
http://en.wikipedia.org/wiki/Max_Hardcore
9. Obscenity continued...
1998 charged with child pornography and distribution of
obscenity
Based on the women acting under 18 years
2002 deemed unconstitutional to portray adults as children
Led in hung jury
2007 indicted with 5 counts of transporting obscene matter
by use of an interactive computer service & 5 counts of
mailing obscene matter
Will be released July 2011
http://en.wikipedia.org/wiki/Max_Hardcore
10. Porn At Work
20% of men admit to looking at porn at work
13% of women look at porn at work
37% workforce admits to looking at porn at one time or another at work
6% of men & 5% of women said that they viewed porn unintentionally at
work
70% of all internet traffic porn occurs between 9-5 workday
% has gone up due to economic recession
Majority say they view porn at work for “the rush”
http://www.3w.net/lan/internet-use-statistics.html
http://healthymind.com/s-porn-stats.html
11. How people are caught
Two major ways of being caught
-Computer problems call for repair
-Company net monitoring software
http://www.infoworld.com/t/applications/internet-misuse-costs-businesses-178-billion-annually-996
12. Porn at work, not good for you,
not good for business
Viewing porn at work opens company up to lawsuits, hacking,
computer viruses
1/3 companies has terminated employee due to looking at porn at
work
Cost companies across U.S. BILLIONS of dollars lost due to
lack of productivity
IT WILL COST YOU YOUR JOB!!!
http://www.newsweek.com/2008/11/28/the-tangled-web-of-porn-in-the-office.html
http://www.usatoday.com/money/workplace/2007-10-17-porn-at-work_N.htm
13. Social Media Privacy~Your Responsibilities
Introduction
There are virtually thousand of social media platforms that users can actively engage in
and participate online. By doing so they are essentially trusting that platform with
personal information about themselves. In order to be successful in maintaining the
integrity of their personal information, they must be responsible users of the services.
Several studies conducted conclude that:
1) Most users are unaware of how their info is used (85%)
2) Most users don’t know how to protect their online info
3) Most users trust that their privacy is maintained
4) Most users access more than one social media platform
Awad and Krishnan 2008, Gross and Acquisti 2005, White 2010, PEW Trust Report
2000, Krishnamurthy and Willis 2008)
14. Social Media Privacy Settings~Harris Poll
Taken from http://www.marketingcharts.com/direct/younger-see-more-socnet-.....
…..benefit-15761/harris-social-media-privacy-settings-jan11gif/
15. Facebook Privacy Settings~4 Simple Steps
1) On the Facebook homepage click Account (pull-down at top right)
2) Select Privacy Settings (a menu choice)
3) Select Customize Settings (click link)
4) Choose one of the following:
a) Everyone
b) Friends of Friends
c) Friends Only
Steps in Safeguarding Your Privacy
1) Anti-Virus Software 2) Beware Of Phishing
3) Setup Safeguards 4) Don’t Chat With Strangers
5) Wipe Clean 6) Clear Private Data
7) Log Off
16. 26%
7%
23%
5%
Parents posted
photos & info
about their kids
Have listed their
full addresses
FB users don’t know
about FB privacy
controls or care
how to use them
Users access 3rd party
applications while
on Facebook
17. “HMM, TO GET
SUPERPOKE, I
HAVE TO INSTALL
“SUPERPOKE
EXTREME”
“DAMN, I’D
REALLY LIKE TO
SEE THAT
POKE!”
“OH COOL,
SOMEONE
POKED ME”
“OK, INSTALL
SUPERPOKE
EXTREME”
CLICK
“TO INSTALL SUPERPOKE
EXTREME, YOU MUST
ALLOW ACCESS TO SOME
OF YOUR INFO…”
“THIS IS
PRIVACY
OUTRAGE!!
”
“WHAT THE??? DISPLAY ALL
INTERNET ACTIVITY, PUBLISH ALL
MY PASSWORDS, SHOW ALL
INTERNET BANKING, DISPLAY ALL
MEDICAL RECORDS AND LIST MY
MEDICATIONS?”
Third party Application Programming
Interfaces (API’s)
18. An application programming interface (API) is a particular set of rules and specifications
that a software program can follow to access and make use of the services and resources
provided by another particular software program that implements that API. It serves as an
interface between different software programs and facilitates their interaction, similar to the
way the user interface facilitates interaction between humans and computers.
(http://en.wikipedia.org/wiki/API/ accessed 4/11/11)
Third party Application Programming
Interfaces (API’s)
Popular Examples Include:
Java, DirectX, Carbon & Cocoa for Macintosh, GroupTweet,
Farmville, Like/ Dislike, StumbleUpon, Ghacks, Voyage
19. Third party Application Programming
Interfaces (API’s)
Third party apps and services can improve the core service significantly. Users do need
to make sure on the other hand that they check the permissions and authorizations
regularly, to block apps and services that they no longer use. This reduces the risk of
information theft, account tampering and of other malicious activities significantly
Main Idea:
Third party services can only access your data only if it is authorized by the user. There exists
dangers regardless if maximum security efforts are exercised. Once access has been granted
developers could sell their product to another company or their service could be hacked or high-
jacked and there is the possibility that you authorize malicious services or tools unknowingly.
WARNING DISCLAIMER!!!
20. Social Media Privacy~Your Responsibilities
Using social media is a choice, and like with any choice come benefits and
drawbacks. Users can greatly reduce their drawbacks by being conscientious
and responsible users when using social media. Simple immediate steps can be
the difference between being hacked or even hacked to pieces……
(just kidding)
A BRIEF STATMENT
Research applications before adding them to existing social media
Check the privacy settings on ALL social media being used
Never give out private information unless you trust the source
Remember: The only tried and true solution to social network privacy and security issues
is to limit your presence altogether. Don't post anything you wouldn't mind telling a
complete stranger, because in reality that's the potential for access. - Brendan Collins