SlideShare uma empresa Scribd logo
1 de 22
Social Internet TECH 621
Spring 2011
Crime Trends
 Top crimes:
 Non-deliver payment of merchandise
 Scams impersonating the FBI
 Identity theft
 Computer crimes
 Miscellaneous fraud
 Advance fee fraud
 Spam
 Auction fraud
 Credit card fraud
 Overpayment fraud
http://www.fbi.gov/news/stories/2011/february/internet_022411
Demographics
 Victims:
 Male
 Between 40 and 59 years old
 California, Florida, Texas and New York
 Perpetrators:
 nearly 75 percent were men
 more than half resided in California, Florida, New York,
Texas, DC, or Washington state
http://www.fbi.gov/news/stories/2011/february/internet_022411
Scams
 Telephone calls claiming victims are delinquent on payday
loans
 Online apartment and house rental and real estate scams
used to swindle consumers out of thousands of dollars
 Denial-of-service attacks on cell phones and landlines used
as a ruse to access victims’ bank accounts
 Fake e-mails seeking donations to disaster relief efforts
after last year’s earthquake in Haiti
http://www.fbi.gov/news/stories/2011/february/internet_022411
Porn Defined
 According to UrbanDictionary.com
 95% of the websites on the internet
 Explicit descriptions, picture, and/or video of sexual acts
 The reason why the family computer is always slow, Look in
the job application folder in "dad's work stuff's"n you'll find a
lot of it.
 Sexier than sex itself
 The world's most popular past time
Legal Definition
 All sexually oriented material intended primarily to arouse
the reader, viewer, or listener
 Erotic content in books, magazines, films, and recordings
 Obscenity-term that applies to anything offensive to morals
History
 1980- Usenet Groups
 Discussion groups/forums: millions of users
 Alt.sex largest usenet; 3.3 million users by 1993
 1990- CD ROM
 Virtual Valerie
 Penthouse Virtual Photoshoot
 Virtual Vixens
 The Interactive Adventures of Seymour Butts
 Websites
 1994 Playboy launched website
 1995 Penthouse launched website
 1995 live strip tease shows
 1997 video peep shows
 1998 revenue was estimated $750 billion
 By 2009 revenues increased to $4.9 billion
 Over 95% of pornography online is free amateur sites, free file sharing sites, and/or porn tube sites
http://www.pornographyhistory.com/
Obscenity
 Max Hardcore
 AKA Paul Little
 Male pornographic actor/producer/director
 Rose to prominence in 1992
 “Testing the limit of acceptability”
 Involved obscene sex acts
 Women acting and dressed as 12 year olds
 Lewd acts
 Called his own material “vile and crazy”
http://en.wikipedia.org/wiki/Max_Hardcore
Obscenity continued...
 1998 charged with child pornography and distribution of
obscenity
 Based on the women acting under 18 years
 2002 deemed unconstitutional to portray adults as children
 Led in hung jury
 2007 indicted with 5 counts of transporting obscene matter
by use of an interactive computer service & 5 counts of
mailing obscene matter
 Will be released July 2011
http://en.wikipedia.org/wiki/Max_Hardcore
Porn At Work
 20% of men admit to looking at porn at work
 13% of women look at porn at work
 37% workforce admits to looking at porn at one time or another at work
 6% of men & 5% of women said that they viewed porn unintentionally at
work
 70% of all internet traffic porn occurs between 9-5 workday
 % has gone up due to economic recession
 Majority say they view porn at work for “the rush”
http://www.3w.net/lan/internet-use-statistics.html
http://healthymind.com/s-porn-stats.html
How people are caught
 Two major ways of being caught
-Computer problems call for repair
-Company net monitoring software
http://www.infoworld.com/t/applications/internet-misuse-costs-businesses-178-billion-annually-996
Porn at work, not good for you,
not good for business
 Viewing porn at work opens company up to lawsuits, hacking,
computer viruses
 1/3 companies has terminated employee due to looking at porn at
work
 Cost companies across U.S. BILLIONS of dollars lost due to
lack of productivity
 IT WILL COST YOU YOUR JOB!!!
http://www.newsweek.com/2008/11/28/the-tangled-web-of-porn-in-the-office.html
http://www.usatoday.com/money/workplace/2007-10-17-porn-at-work_N.htm
Social Media Privacy~Your Responsibilities
Introduction
There are virtually thousand of social media platforms that users can actively engage in
and participate online. By doing so they are essentially trusting that platform with
personal information about themselves. In order to be successful in maintaining the
integrity of their personal information, they must be responsible users of the services.
Several studies conducted conclude that:
1) Most users are unaware of how their info is used (85%)
2) Most users don’t know how to protect their online info
3) Most users trust that their privacy is maintained
4) Most users access more than one social media platform
Awad and Krishnan 2008, Gross and Acquisti 2005, White 2010, PEW Trust Report
2000, Krishnamurthy and Willis 2008)
Social Media Privacy Settings~Harris Poll
Taken from http://www.marketingcharts.com/direct/younger-see-more-socnet-.....
…..benefit-15761/harris-social-media-privacy-settings-jan11gif/
Facebook Privacy Settings~4 Simple Steps
1) On the Facebook homepage click Account (pull-down at top right)
2) Select Privacy Settings (a menu choice)
3) Select Customize Settings (click link)
4) Choose one of the following:
a) Everyone
b) Friends of Friends
c) Friends Only
Steps in Safeguarding Your Privacy
1) Anti-Virus Software 2) Beware Of Phishing
3) Setup Safeguards 4) Don’t Chat With Strangers
5) Wipe Clean 6) Clear Private Data
7) Log Off
26%
7%
23%
5%
Parents posted
photos & info
about their kids
Have listed their
full addresses
FB users don’t know
about FB privacy
controls or care
how to use them
Users access 3rd party
applications while
on Facebook
“HMM, TO GET
SUPERPOKE, I
HAVE TO INSTALL
“SUPERPOKE
EXTREME”
“DAMN, I’D
REALLY LIKE TO
SEE THAT
POKE!”
“OH COOL,
SOMEONE
POKED ME”
“OK, INSTALL
SUPERPOKE
EXTREME”
CLICK
“TO INSTALL SUPERPOKE
EXTREME, YOU MUST
ALLOW ACCESS TO SOME
OF YOUR INFO…”
“THIS IS
PRIVACY
OUTRAGE!!
”
“WHAT THE??? DISPLAY ALL
INTERNET ACTIVITY, PUBLISH ALL
MY PASSWORDS, SHOW ALL
INTERNET BANKING, DISPLAY ALL
MEDICAL RECORDS AND LIST MY
MEDICATIONS?”
Third party Application Programming
Interfaces (API’s)
An application programming interface (API) is a particular set of rules and specifications
that a software program can follow to access and make use of the services and resources
provided by another particular software program that implements that API. It serves as an
interface between different software programs and facilitates their interaction, similar to the
way the user interface facilitates interaction between humans and computers.
(http://en.wikipedia.org/wiki/API/ accessed 4/11/11)
Third party Application Programming
Interfaces (API’s)
Popular Examples Include:
Java, DirectX, Carbon & Cocoa for Macintosh, GroupTweet,
Farmville, Like/ Dislike, StumbleUpon, Ghacks, Voyage
Third party Application Programming
Interfaces (API’s)
Third party apps and services can improve the core service significantly. Users do need
to make sure on the other hand that they check the permissions and authorizations
regularly, to block apps and services that they no longer use. This reduces the risk of
information theft, account tampering and of other malicious activities significantly
Main Idea:
Third party services can only access your data only if it is authorized by the user. There exists
dangers regardless if maximum security efforts are exercised. Once access has been granted
developers could sell their product to another company or their service could be hacked or high-
jacked and there is the possibility that you authorize malicious services or tools unknowingly.
WARNING DISCLAIMER!!!
Social Media Privacy~Your Responsibilities
Using social media is a choice, and like with any choice come benefits and
drawbacks. Users can greatly reduce their drawbacks by being conscientious
and responsible users when using social media. Simple immediate steps can be
the difference between being hacked or even hacked to pieces……
(just kidding)
A BRIEF STATMENT
Research applications before adding them to existing social media
Check the privacy settings on ALL social media being used
Never give out private information unless you trust the source
Remember: The only tried and true solution to social network privacy and security issues
is to limit your presence altogether. Don't post anything you wouldn't mind telling a
complete stranger, because in reality that's the potential for access. - Brendan Collins
Questions
References
1) 1) http://www.fastcompany.com/articles/2008/10/social-networking-security.html?page=0%2C1
2) 2) http://thetechjournal.com/internet/social-community/people-use-facebook-44-and-twitter-29-for-social-sharing.xhtml
3) 3) http://en.wikipedia.org/wiki/API
4) 4) http://en.wikipedia.org/wiki/Facebook_Platform
5) 5) http://www.marketingcharts.com/direct/younger-see-more-socnet-benefit-15761/harris-social-media-privacy-settings-jan11gif/
6) 6) http://socialmediagraphics.posterous.com/internet-privacy
7) 7) http://www.adrants.com/2010/05/data-advertising-privacy-key.php
8) 8) http://www.squidoo.com/howtousefacebook
9) 9) http://www.technewsworld.com/story/69158.html
10) 10) http://www.3w.net/lan/internet-use-statistics.html
11) 11) http://healthymind.com/s-porn-stats.html
12) 12) http://www.infoworld.com/t/applications/internet-misuse-costs-businesses-178-billion-annually-996
13) 13) http://www.newsweek.com/2008/11/28/the-tangled-web-of-porn-in-the-office.html
14) 14) http://www.usatoday.com/money/workplace/2007-10-17-porn-at-work_N.htm
15) 15) http://www.fbi.gov/news/stories/2011/february/internet_02241
16) 16) http://www.pornographyhistory.com/
17) 17) http://en.wikipedia.org/wiki/Max_Hardcore

Mais conteúdo relacionado

Mais procurados

Sopa (stop online piracy act)
Sopa (stop online piracy act)Sopa (stop online piracy act)
Sopa (stop online piracy act)kmcintire84
 
Online policy primer j mc_cann_oct 2010
Online policy primer j mc_cann_oct 2010Online policy primer j mc_cann_oct 2010
Online policy primer j mc_cann_oct 2010McCannJ
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threatsejhilbert
 
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018PKF Francis Clark
 
Keeping your Children Safe Online
Keeping your Children Safe OnlineKeeping your Children Safe Online
Keeping your Children Safe OnlineMatt Smith
 
Social Media & the Law for Nonprofits
Social Media & the Law for NonprofitsSocial Media & the Law for Nonprofits
Social Media & the Law for NonprofitsKennethELiu
 
What if Petraeus was a hacker? Email privacy for the rest of us
What if Petraeus was a hacker? Email privacy for the rest of usWhat if Petraeus was a hacker? Email privacy for the rest of us
What if Petraeus was a hacker? Email privacy for the rest of usPhil Cryer
 
Activity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer InformationActivity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer Informationebooker97
 
Tucson Outlooks Talk
Tucson Outlooks TalkTucson Outlooks Talk
Tucson Outlooks Talktlandfried
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)Felipe Prado
 
2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)Felipe Prado
 
Darknet: The Other Side
Darknet: The Other SideDarknet: The Other Side
Darknet: The Other Sidejbraindc
 
Trusting Our Internet
Trusting Our InternetTrusting Our Internet
Trusting Our Internettwizzler290
 

Mais procurados (20)

Sopa (stop online piracy act)
Sopa (stop online piracy act)Sopa (stop online piracy act)
Sopa (stop online piracy act)
 
Online policy primer j mc_cann_oct 2010
Online policy primer j mc_cann_oct 2010Online policy primer j mc_cann_oct 2010
Online policy primer j mc_cann_oct 2010
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threats
 
Online Piracy Paper
Online Piracy PaperOnline Piracy Paper
Online Piracy Paper
 
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
Raj Goel - Social Media & Cloud Computing Threats to Privacy, Security & Libe...
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
 
Keeping your Children Safe Online
Keeping your Children Safe OnlineKeeping your Children Safe Online
Keeping your Children Safe Online
 
Social Media & Law Enforcement 2013
Social Media & Law Enforcement 2013 Social Media & Law Enforcement 2013
Social Media & Law Enforcement 2013
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
Social Media & the Law for Nonprofits
Social Media & the Law for NonprofitsSocial Media & the Law for Nonprofits
Social Media & the Law for Nonprofits
 
What if Petraeus was a hacker? Email privacy for the rest of us
What if Petraeus was a hacker? Email privacy for the rest of usWhat if Petraeus was a hacker? Email privacy for the rest of us
What if Petraeus was a hacker? Email privacy for the rest of us
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Activity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer InformationActivity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer Information
 
Tucson Outlooks Talk
Tucson Outlooks TalkTucson Outlooks Talk
Tucson Outlooks Talk
 
Internet safety
Internet safetyInternet safety
Internet safety
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)
 
2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)2600 v02 n08 (august 1985)
2600 v02 n08 (august 1985)
 
Darknet: The Other Side
Darknet: The Other SideDarknet: The Other Side
Darknet: The Other Side
 
Trusting Our Internet
Trusting Our InternetTrusting Our Internet
Trusting Our Internet
 

Destaque

보건산업안전학과 2009180929김준수1
보건산업안전학과 2009180929김준수1보건산업안전학과 2009180929김준수1
보건산업안전학과 2009180929김준수1준수 김
 
Roadmap -- USciences Annual Planning
Roadmap -- USciences Annual PlanningRoadmap -- USciences Annual Planning
Roadmap -- USciences Annual Planningmariabuehler
 
VDI, desktopconcepten en het nieuwe werken
VDI, desktopconcepten en het nieuwe werkenVDI, desktopconcepten en het nieuwe werken
VDI, desktopconcepten en het nieuwe werkenRené Voortwist
 
Viktória vízesés+ani (nx power lite)
Viktória vízesés+ani (nx power lite)Viktória vízesés+ani (nx power lite)
Viktória vízesés+ani (nx power lite)VarganeAnny
 
Virágparádé(8)+ani (nx power lite)
Virágparádé(8)+ani (nx power lite)Virágparádé(8)+ani (nx power lite)
Virágparádé(8)+ani (nx power lite)VarganeAnny
 
Using Social Media for Audience Development - For Non-Profit and Performing A...
Using Social Media for Audience Development - For Non-Profit and Performing A...Using Social Media for Audience Development - For Non-Profit and Performing A...
Using Social Media for Audience Development - For Non-Profit and Performing A...Astek Consulting
 
コンクリに関係無いAnsible
コンクリに関係無いAnsibleコンクリに関係無いAnsible
コンクリに関係無いAnsibleTakahisa Iwamoto
 
Házi múzeum,igor rodionov+ani (nx powerlite)
Házi múzeum,igor rodionov+ani (nx powerlite)Házi múzeum,igor rodionov+ani (nx powerlite)
Házi múzeum,igor rodionov+ani (nx powerlite)VarganeAnny
 
Nyári virágcsodák(1)+ani (nx power lite)
Nyári virágcsodák(1)+ani (nx power lite)Nyári virágcsodák(1)+ani (nx power lite)
Nyári virágcsodák(1)+ani (nx power lite)VarganeAnny
 
Virágmező(1)+ani (nx power lite)
Virágmező(1)+ani (nx power lite)Virágmező(1)+ani (nx power lite)
Virágmező(1)+ani (nx power lite)VarganeAnny
 
A természet tükre(1)+ani (nx power lite)
A természet tükre(1)+ani (nx power lite)A természet tükre(1)+ani (nx power lite)
A természet tükre(1)+ani (nx power lite)VarganeAnny
 
áLlati szépségek(5)+ani.. (nx power lite)
áLlati szépségek(5)+ani.. (nx power lite)áLlati szépségek(5)+ani.. (nx power lite)
áLlati szépségek(5)+ani.. (nx power lite)VarganeAnny
 
Node js quick-tour_v2
Node js quick-tour_v2Node js quick-tour_v2
Node js quick-tour_v2tianyi5212222
 
SSA 2014 OUTDOOR PSA POSTER PRESENTATION
SSA 2014 OUTDOOR PSA POSTER PRESENTATIONSSA 2014 OUTDOOR PSA POSTER PRESENTATION
SSA 2014 OUTDOOR PSA POSTER PRESENTATIONdakotabilly
 
Japan social conversation in the customer journey
Japan social conversation in the customer journeyJapan social conversation in the customer journey
Japan social conversation in the customer journeyAkihisa Kamishiro
 
Mendbayr holbumbug
 Mendbayr  holbumbug Mendbayr  holbumbug
Mendbayr holbumbugmendbayr79
 
屋裡的燈是亮的好
屋裡的燈是亮的好屋裡的燈是亮的好
屋裡的燈是亮的好chengchunhao
 

Destaque (20)

보건산업안전학과 2009180929김준수1
보건산업안전학과 2009180929김준수1보건산업안전학과 2009180929김준수1
보건산업안전학과 2009180929김준수1
 
Roadmap -- USciences Annual Planning
Roadmap -- USciences Annual PlanningRoadmap -- USciences Annual Planning
Roadmap -- USciences Annual Planning
 
VDI, desktopconcepten en het nieuwe werken
VDI, desktopconcepten en het nieuwe werkenVDI, desktopconcepten en het nieuwe werken
VDI, desktopconcepten en het nieuwe werken
 
Viktória vízesés+ani (nx power lite)
Viktória vízesés+ani (nx power lite)Viktória vízesés+ani (nx power lite)
Viktória vízesés+ani (nx power lite)
 
Virágparádé(8)+ani (nx power lite)
Virágparádé(8)+ani (nx power lite)Virágparádé(8)+ani (nx power lite)
Virágparádé(8)+ani (nx power lite)
 
ETC EXPO/Saskia Vugts Portretschilder
ETC EXPO/Saskia Vugts PortretschilderETC EXPO/Saskia Vugts Portretschilder
ETC EXPO/Saskia Vugts Portretschilder
 
Using Social Media for Audience Development - For Non-Profit and Performing A...
Using Social Media for Audience Development - For Non-Profit and Performing A...Using Social Media for Audience Development - For Non-Profit and Performing A...
Using Social Media for Audience Development - For Non-Profit and Performing A...
 
Bab iv
Bab ivBab iv
Bab iv
 
コンクリに関係無いAnsible
コンクリに関係無いAnsibleコンクリに関係無いAnsible
コンクリに関係無いAnsible
 
Business Overview
Business OverviewBusiness Overview
Business Overview
 
Házi múzeum,igor rodionov+ani (nx powerlite)
Házi múzeum,igor rodionov+ani (nx powerlite)Házi múzeum,igor rodionov+ani (nx powerlite)
Házi múzeum,igor rodionov+ani (nx powerlite)
 
Nyári virágcsodák(1)+ani (nx power lite)
Nyári virágcsodák(1)+ani (nx power lite)Nyári virágcsodák(1)+ani (nx power lite)
Nyári virágcsodák(1)+ani (nx power lite)
 
Virágmező(1)+ani (nx power lite)
Virágmező(1)+ani (nx power lite)Virágmező(1)+ani (nx power lite)
Virágmező(1)+ani (nx power lite)
 
A természet tükre(1)+ani (nx power lite)
A természet tükre(1)+ani (nx power lite)A természet tükre(1)+ani (nx power lite)
A természet tükre(1)+ani (nx power lite)
 
áLlati szépségek(5)+ani.. (nx power lite)
áLlati szépségek(5)+ani.. (nx power lite)áLlati szépségek(5)+ani.. (nx power lite)
áLlati szépségek(5)+ani.. (nx power lite)
 
Node js quick-tour_v2
Node js quick-tour_v2Node js quick-tour_v2
Node js quick-tour_v2
 
SSA 2014 OUTDOOR PSA POSTER PRESENTATION
SSA 2014 OUTDOOR PSA POSTER PRESENTATIONSSA 2014 OUTDOOR PSA POSTER PRESENTATION
SSA 2014 OUTDOOR PSA POSTER PRESENTATION
 
Japan social conversation in the customer journey
Japan social conversation in the customer journeyJapan social conversation in the customer journey
Japan social conversation in the customer journey
 
Mendbayr holbumbug
 Mendbayr  holbumbug Mendbayr  holbumbug
Mendbayr holbumbug
 
屋裡的燈是亮的好
屋裡的燈是亮的好屋裡的燈是亮的好
屋裡的燈是亮的好
 

Semelhante a Darkside

My Online Image
My Online ImageMy Online Image
My Online Imagealuthe
 
How to safe online (presented by abhinav pathak)
How to safe online (presented by  abhinav pathak)How to safe online (presented by  abhinav pathak)
How to safe online (presented by abhinav pathak)Abhinav Pathak
 
Privacy Presentation
Privacy PresentationPrivacy Presentation
Privacy PresentationKenie Moses
 
SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015
SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015
SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015RapidSSLOnline.com
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 
Social Media's Dark Side: Risks, Reasons & Remedies
Social Media's Dark Side: Risks, Reasons & RemediesSocial Media's Dark Side: Risks, Reasons & Remedies
Social Media's Dark Side: Risks, Reasons & RemediesRichard M
 
Social Media
Social MediaSocial Media
Social Mediaclggibson
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008Donald E. Hester
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHYaman Singhania
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonPhil Cryer
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyDi Doersch
 

Semelhante a Darkside (20)

My Online Image
My Online ImageMy Online Image
My Online Image
 
Social Networking and E-discovery
Social Networking and E-discoverySocial Networking and E-discovery
Social Networking and E-discovery
 
How to safe online (presented by abhinav pathak)
How to safe online (presented by  abhinav pathak)How to safe online (presented by  abhinav pathak)
How to safe online (presented by abhinav pathak)
 
Privacy Presentation
Privacy PresentationPrivacy Presentation
Privacy Presentation
 
SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015
SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015
SYMANTEC WEBSITE SECURITY THREAT REPORT - 2015
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
The Now Generation Internet Safety
The Now Generation   Internet SafetyThe Now Generation   Internet Safety
The Now Generation Internet Safety
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Social Media's Dark Side: Risks, Reasons & Remedies
Social Media's Dark Side: Risks, Reasons & RemediesSocial Media's Dark Side: Risks, Reasons & Remedies
Social Media's Dark Side: Risks, Reasons & Remedies
 
Social Media
Social MediaSocial Media
Social Media
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
Online Privacy in the Year of the Dragon
Online Privacy in the Year of the DragonOnline Privacy in the Year of the Dragon
Online Privacy in the Year of the Dragon
 
CYBER SAFETY.pptx
CYBER SAFETY.pptxCYBER SAFETY.pptx
CYBER SAFETY.pptx
 
Top Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and TechnologyTop Things Parents Should Know About Their Child and Technology
Top Things Parents Should Know About Their Child and Technology
 

Darkside

  • 1. Social Internet TECH 621 Spring 2011
  • 2. Crime Trends  Top crimes:  Non-deliver payment of merchandise  Scams impersonating the FBI  Identity theft  Computer crimes  Miscellaneous fraud  Advance fee fraud  Spam  Auction fraud  Credit card fraud  Overpayment fraud http://www.fbi.gov/news/stories/2011/february/internet_022411
  • 3. Demographics  Victims:  Male  Between 40 and 59 years old  California, Florida, Texas and New York  Perpetrators:  nearly 75 percent were men  more than half resided in California, Florida, New York, Texas, DC, or Washington state http://www.fbi.gov/news/stories/2011/february/internet_022411
  • 4. Scams  Telephone calls claiming victims are delinquent on payday loans  Online apartment and house rental and real estate scams used to swindle consumers out of thousands of dollars  Denial-of-service attacks on cell phones and landlines used as a ruse to access victims’ bank accounts  Fake e-mails seeking donations to disaster relief efforts after last year’s earthquake in Haiti http://www.fbi.gov/news/stories/2011/february/internet_022411
  • 5. Porn Defined  According to UrbanDictionary.com  95% of the websites on the internet  Explicit descriptions, picture, and/or video of sexual acts  The reason why the family computer is always slow, Look in the job application folder in "dad's work stuff's"n you'll find a lot of it.  Sexier than sex itself  The world's most popular past time
  • 6. Legal Definition  All sexually oriented material intended primarily to arouse the reader, viewer, or listener  Erotic content in books, magazines, films, and recordings  Obscenity-term that applies to anything offensive to morals
  • 7. History  1980- Usenet Groups  Discussion groups/forums: millions of users  Alt.sex largest usenet; 3.3 million users by 1993  1990- CD ROM  Virtual Valerie  Penthouse Virtual Photoshoot  Virtual Vixens  The Interactive Adventures of Seymour Butts  Websites  1994 Playboy launched website  1995 Penthouse launched website  1995 live strip tease shows  1997 video peep shows  1998 revenue was estimated $750 billion  By 2009 revenues increased to $4.9 billion  Over 95% of pornography online is free amateur sites, free file sharing sites, and/or porn tube sites http://www.pornographyhistory.com/
  • 8. Obscenity  Max Hardcore  AKA Paul Little  Male pornographic actor/producer/director  Rose to prominence in 1992  “Testing the limit of acceptability”  Involved obscene sex acts  Women acting and dressed as 12 year olds  Lewd acts  Called his own material “vile and crazy” http://en.wikipedia.org/wiki/Max_Hardcore
  • 9. Obscenity continued...  1998 charged with child pornography and distribution of obscenity  Based on the women acting under 18 years  2002 deemed unconstitutional to portray adults as children  Led in hung jury  2007 indicted with 5 counts of transporting obscene matter by use of an interactive computer service & 5 counts of mailing obscene matter  Will be released July 2011 http://en.wikipedia.org/wiki/Max_Hardcore
  • 10. Porn At Work  20% of men admit to looking at porn at work  13% of women look at porn at work  37% workforce admits to looking at porn at one time or another at work  6% of men & 5% of women said that they viewed porn unintentionally at work  70% of all internet traffic porn occurs between 9-5 workday  % has gone up due to economic recession  Majority say they view porn at work for “the rush” http://www.3w.net/lan/internet-use-statistics.html http://healthymind.com/s-porn-stats.html
  • 11. How people are caught  Two major ways of being caught -Computer problems call for repair -Company net monitoring software http://www.infoworld.com/t/applications/internet-misuse-costs-businesses-178-billion-annually-996
  • 12. Porn at work, not good for you, not good for business  Viewing porn at work opens company up to lawsuits, hacking, computer viruses  1/3 companies has terminated employee due to looking at porn at work  Cost companies across U.S. BILLIONS of dollars lost due to lack of productivity  IT WILL COST YOU YOUR JOB!!! http://www.newsweek.com/2008/11/28/the-tangled-web-of-porn-in-the-office.html http://www.usatoday.com/money/workplace/2007-10-17-porn-at-work_N.htm
  • 13. Social Media Privacy~Your Responsibilities Introduction There are virtually thousand of social media platforms that users can actively engage in and participate online. By doing so they are essentially trusting that platform with personal information about themselves. In order to be successful in maintaining the integrity of their personal information, they must be responsible users of the services. Several studies conducted conclude that: 1) Most users are unaware of how their info is used (85%) 2) Most users don’t know how to protect their online info 3) Most users trust that their privacy is maintained 4) Most users access more than one social media platform Awad and Krishnan 2008, Gross and Acquisti 2005, White 2010, PEW Trust Report 2000, Krishnamurthy and Willis 2008)
  • 14. Social Media Privacy Settings~Harris Poll Taken from http://www.marketingcharts.com/direct/younger-see-more-socnet-..... …..benefit-15761/harris-social-media-privacy-settings-jan11gif/
  • 15. Facebook Privacy Settings~4 Simple Steps 1) On the Facebook homepage click Account (pull-down at top right) 2) Select Privacy Settings (a menu choice) 3) Select Customize Settings (click link) 4) Choose one of the following: a) Everyone b) Friends of Friends c) Friends Only Steps in Safeguarding Your Privacy 1) Anti-Virus Software 2) Beware Of Phishing 3) Setup Safeguards 4) Don’t Chat With Strangers 5) Wipe Clean 6) Clear Private Data 7) Log Off
  • 16. 26% 7% 23% 5% Parents posted photos & info about their kids Have listed their full addresses FB users don’t know about FB privacy controls or care how to use them Users access 3rd party applications while on Facebook
  • 17. “HMM, TO GET SUPERPOKE, I HAVE TO INSTALL “SUPERPOKE EXTREME” “DAMN, I’D REALLY LIKE TO SEE THAT POKE!” “OH COOL, SOMEONE POKED ME” “OK, INSTALL SUPERPOKE EXTREME” CLICK “TO INSTALL SUPERPOKE EXTREME, YOU MUST ALLOW ACCESS TO SOME OF YOUR INFO…” “THIS IS PRIVACY OUTRAGE!! ” “WHAT THE??? DISPLAY ALL INTERNET ACTIVITY, PUBLISH ALL MY PASSWORDS, SHOW ALL INTERNET BANKING, DISPLAY ALL MEDICAL RECORDS AND LIST MY MEDICATIONS?” Third party Application Programming Interfaces (API’s)
  • 18. An application programming interface (API) is a particular set of rules and specifications that a software program can follow to access and make use of the services and resources provided by another particular software program that implements that API. It serves as an interface between different software programs and facilitates their interaction, similar to the way the user interface facilitates interaction between humans and computers. (http://en.wikipedia.org/wiki/API/ accessed 4/11/11) Third party Application Programming Interfaces (API’s) Popular Examples Include: Java, DirectX, Carbon & Cocoa for Macintosh, GroupTweet, Farmville, Like/ Dislike, StumbleUpon, Ghacks, Voyage
  • 19. Third party Application Programming Interfaces (API’s) Third party apps and services can improve the core service significantly. Users do need to make sure on the other hand that they check the permissions and authorizations regularly, to block apps and services that they no longer use. This reduces the risk of information theft, account tampering and of other malicious activities significantly Main Idea: Third party services can only access your data only if it is authorized by the user. There exists dangers regardless if maximum security efforts are exercised. Once access has been granted developers could sell their product to another company or their service could be hacked or high- jacked and there is the possibility that you authorize malicious services or tools unknowingly. WARNING DISCLAIMER!!!
  • 20. Social Media Privacy~Your Responsibilities Using social media is a choice, and like with any choice come benefits and drawbacks. Users can greatly reduce their drawbacks by being conscientious and responsible users when using social media. Simple immediate steps can be the difference between being hacked or even hacked to pieces…… (just kidding) A BRIEF STATMENT Research applications before adding them to existing social media Check the privacy settings on ALL social media being used Never give out private information unless you trust the source Remember: The only tried and true solution to social network privacy and security issues is to limit your presence altogether. Don't post anything you wouldn't mind telling a complete stranger, because in reality that's the potential for access. - Brendan Collins
  • 22. References 1) 1) http://www.fastcompany.com/articles/2008/10/social-networking-security.html?page=0%2C1 2) 2) http://thetechjournal.com/internet/social-community/people-use-facebook-44-and-twitter-29-for-social-sharing.xhtml 3) 3) http://en.wikipedia.org/wiki/API 4) 4) http://en.wikipedia.org/wiki/Facebook_Platform 5) 5) http://www.marketingcharts.com/direct/younger-see-more-socnet-benefit-15761/harris-social-media-privacy-settings-jan11gif/ 6) 6) http://socialmediagraphics.posterous.com/internet-privacy 7) 7) http://www.adrants.com/2010/05/data-advertising-privacy-key.php 8) 8) http://www.squidoo.com/howtousefacebook 9) 9) http://www.technewsworld.com/story/69158.html 10) 10) http://www.3w.net/lan/internet-use-statistics.html 11) 11) http://healthymind.com/s-porn-stats.html 12) 12) http://www.infoworld.com/t/applications/internet-misuse-costs-businesses-178-billion-annually-996 13) 13) http://www.newsweek.com/2008/11/28/the-tangled-web-of-porn-in-the-office.html 14) 14) http://www.usatoday.com/money/workplace/2007-10-17-porn-at-work_N.htm 15) 15) http://www.fbi.gov/news/stories/2011/february/internet_02241 16) 16) http://www.pornographyhistory.com/ 17) 17) http://en.wikipedia.org/wiki/Max_Hardcore