abuses and security of social media sites n.
Skip this Video
Loading SlideShow in 5 Seconds..
Abuses and Security of Social Media Sites PowerPoint Presentation
Download Presentation
Abuses and Security of Social Media Sites

Loading in 2 Seconds...

play fullscreen
1 / 29

Abuses and Security of Social Media Sites - PowerPoint PPT Presentation

  • Uploaded on

Users & Behaviors. Group: Kenie R. Moses - Rachel Sitarz - Scott Abney. Abuses and Security of Social Media Sites. Purdue University Spring 2011. Social internet TECH621. Social Media Apps and Usage. Users Behaviors: Beware of Media Apps. Scott Abney. Social Media App Intro.

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

Abuses and Security of Social Media Sites

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
abuses and security of social media sites

Users & Behaviors

Group: Kenie R. Moses - Rachel Sitarz - Scott Abney

Abuses and Security of Social Media Sites

Purdue University Spring 2011

Social internet TECH621

social media apps and usage
Social Media Apps and Usage

Users Behaviors: Beware of Media Apps

Scott Abney

social media app intro
Social Media App Intro
  • Apple App Store has over 300,000 apps
  • Facebook is around 60,000 apps
  • Twitter just passed over 50,000 apps
  • 97% of social media users do not check apps or links for viruses
  • App Store has over 100 millions users
  • User info hacked due to knockoffs off applications (Weather HD app)
  • Thuat Nguyen created 50 apps for app store, then charged up to $600 after hacking into over 400 iTunes accounts for furthering purchases on his other apps
  • Storm 8 created apps for online games that misconstrued what users were downloading, purchases ranged from $150-$1400
  • Around 200 million users on Twitter
  • Over 50% of tweets are sent from 3rd party applications
  • Common app that is used for hacking claims to increase subscribers
  • Security shield application
  • Between 500-600 million users
  • November 2010, over 60,000 people clicked on the ePrivacy app to try to see who viewed their profile
  • Hackers create fake Facebook login pages from apps
  • Early January 2011, Facebook allows apps to view both home and phone number on profiles
what can you do
What Can You Do????
  • Research applications before adding them
  • Never give out any private information
  • Check security settings on your social network
  • www.facecrooks.com
social media usage and security
Social Media Usage and Security

Users Behaviors: How Secure Are You?

Kenie R. Moses

social network usage
Social Network Usage
  • Nearly 20% of Internet users are tweeting on Twitter or using another service to share personal and business updates, or to see updates about others
  • 66% of LinkedIn users are decision makers or have influence in the purchase decisions at their companies
  • In 2011, 70+ Percent of Marketers Will Be Using Social Media
social network usage continued
Social Network Usage Continued
  • 54% percent of the companies studied have at least one Facebook Fan page
  • 72% of companies plan to invest more in social networks
  • 79% of the largest fortune 500 firms use Twitter, to communicate with customers or employees
  • 80% of companies are planning to use social networks to find or attract candidates
social network data leakage
Social Network Data Leakage
  • 17% of US companies investigated the exposure of confidential information via a posting to a social networking sites
  • 13% of US companies investigated the exposure of confidential, sensitive or private information via Twitter
  • 54% of ClOs said their firms do not allow employees to visit social networking sites for any reason while at work.
social networking pitfalls
Social Networking Pitfalls
    • 48% have no worries about the security of social networking sites
  • 46% of Facebook users feel there are security and privacy risks.
  • 34% have seen somebody else’s phone number posted on a social
  • networking site.
  • 9% have included their phone number and 5% have included
  • their on social networking sites visible to friends.
  • 25% have discussed holiday plans “wall-to-wall” outside their page
viruses and hacking techniques used on social media sites
Viruses and Hacking Techniques Used on Social Media Sites


1.) Koobface- Virus that steals sensitive data and

sends Trojan viruses to contacts of infected

2.) Mikeyy Worm- Virus that activates upon clicked

links and sends out messages to contacts.

3.) Acai Attack- Virus that activates once the ad for

Acai Berry juice is clicked infecting with Malware.

4.) Facebook Phishing- Coaxes users to give up

valuable log-in info on a fake log-in screen.

5.) Twittercut- Virus that promise user over 1000

loyal followers. Once clicked, installs Trojan virus.

















8-Last FM



social media abuse and misuse
Social Media Abuse and Misuse

User Behaviors: Deviant Activities

Rachel Sitarz

  • Pornography Internet trends
  • Deviant behavior: Child Pornography (CP) usage
  • Predatory behaviors
  • Victimization of children
pornography usage
Pornography Usage
  • Multi-billion dollar industry (Ferraro & Casey, 2005)
  • $97 billion worldwide
  • $13 billion in the US alone
  • Every second, $3,075.64 is being spent
  • 28,258 are viewing pornography every second
  • 372 Internet users are typing adult search terms into search engines
  • 39 minutes new pornography is made in US
pornography usage continued
Pornography Usage Continued
  • Sex is the most searched topic, with one-third of all internet user visiting some form of sexually related site regularly
  • Anonymity, cheap, easily accessed, avoid social embarrassment, instant gratification, easily hidden
pornography pages by country
Pornography Pages By Country

Country Porn Pages:

  • United States 244,661,900
  • Germany 10,030,200
  • United Kingdom 8,506,800
  • Australia 5,655,800
  • Japan 2,700,800
  • The Netherlands 1,883,800
  • Russia 1,080,600
  • Poland 1,049,600
  • Spain 852,800
pornography stats
Pornography Stats
  • 40 million U.S. adults regularly visit Internet pornography
  • 20% of men admit accessing pornography at work
  • 70% of women keep their online activities secret
  • 10% of adults admit to Internet sexual addition
  • 17% of women admit to struggling with pornography addiction
child pornography online
Child Pornography Online
  • Child pornography isn't new, it’s easier to access without as many social and legal risks
  • Some statistics estimate that 1.5 million children have been and currently are being exploited
  • Multi-billion dollar industry with estimated 100,000 child pornography websites
  • “Golden Age of Child Pornography”
child pornography continued
Child Pornography Continued
  • Child pornography is one of the fastest growing businesses online
  • Content is continually getting worse and more graphic
  • 58% of CP websites are made in US
online predators
Online Predators
  • 644,865 Registered Sex Offenders in the US (many unregistered)
  • 80 % of offenders were explicit about their intentions with youth
  • 73 % of online crimes, teens go to meet the offender on multiple occasions for multiple sexual encounters
youth victimization
Youth Victimization
  • Approximately 1 in 6 youth online (10 to 17-years-old) received a sexual solicitation or approach over the Internet.
  • 4% received an aggressive sexual solicitation – meeting, phone call, gifts
  • 34% had an unwanted exposure to pornography
  • 27% of the youth who encountered unwanted pornography told a parent or guardian
  • Research indicates that 1 in 5 girls and 1 in 10 boys will be sexually victimized before adulthood
source references
Source References

1.) http://information-security-resources.com/2009/08/17/top-8-social-media-security-threats/

2.) http://socialmediasecurity.com/

3.) http://www.fastcompany.com/1563867/the-5-biggest-social-media-security-risks-for-businesses

4.) http://dns.tmcnet.com/topics/internet-security/articles/137059-social-networking-sites-sitting

5.) http://www.cdc.gov/socialmedia/Tools/guidelines/pdf/securitymitigations.pdf

6.) http://www.netsmartz.org/

7.) http://www.missingkids.com/

8.) http://enough.org/

9.) Internet Watch Foundation. Annual Report, 2008

10.) Adler, A. (2001). The Perverse Law of Child Pornography. Columbia Law Review, 101(2), 209-273

source references continued
Source References Continued

11.) http://blog.vimov.com/2011/01/app-squatting-misuse-of-weather-hd-name-in-the-mac-app-store/

12.) http://www.betanews.com/article/Apple-still-silent-as-more-scams-are-found-on-App-Store/1278363193

13.) http://eu.techcrunch.com/2010/11/29/over-60000-click-on-scam-facebook-app-which


14.) http://www.switched.com/2009/09/15/5-popular-facebook-scams-and-how-to-avoid-them/

15.) http://www.macworld.com/article/157303/2011/01/twitter_antivirusscam.html.

16.) http://downloadsquad.switched.com/2011/01/16/facebook-enables-one-click-identity-theft-option


17.) http://www.facecrooks.com/blog/internet-safety-a-privacy/item/904-study-finds-most-social-media


18.) http://tech.fortune.cnn.com/2011/01/22/app-store-hits-10-billion-update/?hpt=T2

19.) http://blog.nutshellmail.com/2010/02/03/can-you-trust-third-party-twitter-applications

20.) Ferraro, M., & Casey, E. (2005). Investigating child exploitation and pornography:

The Internet, the Law and Forensic Science. San Diego, CA: Elsvier Academic Press.