Social Networking Privacy Xintao Wu University of North Carolina at Charlotte Nov 2012.

Slides:



Advertisements
Similar presentations
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Advertisements

Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Keeping Your Child Safe on the Internet.  To understand what our children are doing online  To keep our children safe when they’re online  To teach.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
The Internet.
Breaking Trust On The Internet
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Using internet and cell phones safely
Lecture 16 Secure Social Networking. Overview What is Social Networking? The Good, the Bad and the Ugly How to protect yourself How to protect your children.
Social Networking: Facebook, Twitter, and Google+ Mary Rotman Publicist, O’Reilly Media.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How To Protect Your Privacy and Avoid Identity Theft Online.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How It Applies In A Virtual World
Introduction Online gaming Webcams and videos File sharing , IM, and chat rooms Social networking.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Digital Citizenship Project
By: Daniel Krueger ITC 525: Computers for Educators Summer II 2010 Click Here to Begin.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Staying Safe Online Keep your Information Secure.
IT security By Tilly Gerlack.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Safe Use of Social Media Cadets – Air Force’s Future.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Technology Social Media Unit 1. What is Social Media? Social media is the interaction among people in which they create, share or exchange information.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Facebook for Beginners One Session Class. What will you learn today? What can you do on Facebook? Creating a profile Privacy Connecting with friends Sending.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
Social Networking What issues arise when operating in virtual worlds? Glenn Yoong Teck Chern : A4573 Iris Wee Rui Si : A4581 Kylie Jade Tegjeu : A3363.
Technological Awareness for Teens and Young Adults.
Computer Security Keeping you and your computer safe in the digital world.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Internet Identity, Safety, & Security
Cybersecurity Awareness
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
CYBERSAFETY & Personal information
Freedom Independence Transition
Internet Safety – Social Media
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Social Networking Privacy Xintao Wu University of North Carolina at Charlotte Nov 2012

2 Introduction Online social networks are websites that allow users to build connections and relationships to other Internet users. As of June 2010, the popular application Facebook listed over 400 million active accounts worldwide updateFacebook2012 update Identity thieves, scam artists, debt collectors, stalkers, and corporations looking for a market advantage are using social networks to gather information about consumers. Companies that operate social networks are themselves collecting a variety of data about their users, both to personalize the services for the users and to sell to advertisers.

3 Types of Social Networks Personal networks - facebook Status update networks – twitter Location networks, Foursquare, google latitude Content sharing networks – Flickr, YouTube Shared-interest networks – LinkedIn

4 What information is public? Information a user shares may include: Photos and other media Age and gender Biographical information (education, employment history, hometown, etc.) Status updates (also known as posts) Contacts Interests Geographical location

5 Data becomes public A user may choose to post information as “public” (without restricting access via available privacy settings). Certain information may be publicly visible by default. A social network can change its privacy policy at any time without a user’s permission. Content that was posted with restrictive privacy settings may become visible when a privacy policy is altered. Approved contacts may copy and repost information – including photos – without a user’s permission, potentially bypassing privacy settings. Third-party applications that have been granted access may be able to view information that a user or a user’s contacts post privately.

6 Information Gathered Through Electronic Tracking Tracking which websites a user has viewed. Storing information associated with specific websites (such as items in a shopping cart). Tracking movement from one website to another. Building a profile around a user.

7 Who can access information? Entities that collect personal information for legal purposes include: Advertisers interested in personal information so they can better target their ads to those most likely to be interested in the product Third-party software developers who incorporate information to personalize applications, such as an online games that interact with the social network Entities that collect personal information for illegal purposes include: Identity thieves who obtain personal information either based on information a user posts or that others post about the user. Other online criminals, such as people planning to scam or harass individuals, or infect computers with malware

8 Behavior advertising Consumers may not be aware that data is associated with their profiles. Consumers may not be able to view the data associated with their profiles and have inaccuracies corrected. There are no maximum retention periods on data and no security requirements for the retention of data, leaving it susceptible to hackers and security risks. Information about minors may be collected and used for behavioral advertising.

9 Third-party applications Within the context of social networking, “third-party applications” are programs that interact with a social network without actually being part of that social network. Games to play with contacts Online polls or quizzes Software that allows users to post to a social media profile via a cellular phone or web application Most social networks do not take responsibility for the third-party applications that interact with their sites. They may gain access to more information than is necessary to perform their functions.

10 Anonymity on social networks Many users of social networks choose to mask their real identities. This may be done via anonymity (providing no name at all) or pseudononymity (providing a false name). Individuals with medical conditions who want to discuss symptoms and treatment without creating a public record of their condition Bloggers and activists engaging in political discourse, especially on controversial issues Medical professionals, including mental health professionals Law enforcement agents, prosecutors, parole and probation officers, judges, and other court employees Victims of stalking, sexual assault, and domestic violence

11 Laws Electronic Communications Privacy Act Children’s Online Privacy protection Act requires that websites directed at children under 13 must limit their data collection and usage in certain ways. California Online Privacy Act

Review privacy policy Start at the end. Note the location and language of the privacy policy What happens when you cancel your account? How long is personal information stored? What happens when a user dies? Who owns the data that a user posts? Who has access to information? How will a social network notify users about changes to the privacy policy? 12

Fraud on Social Networks Identify Theft In 2009, researchers at Carnegie University Mellon published a study showing that it is possible to predict most and sometimes all of an individual’s 9-digit Social Security number using information gleaned from social networks and online databases. Illegitimate third-party applications False connection requests Hijacking accounts Malware Social Engineering Phishing attacksare when s, instant messages or other messages claiming to be from a trusted source ask for information. Spear phishing is a type of phishing attack that appears to be from a colleague, employer or friend and includes a link or something to download. Misleading solicitations. 13

Tips to be safe Registering an account Use a strong password Never provide a work-associated to a social network, especially when signing up. Consider not using your real name, especially your last name. Review the privacy policy and terms Be sure to keep strong antivirus and spyware protection on your computer. Provide only information that is necessary or that you feel comfortable providing. During the registration process, social networks often solicit a new user to provide an account password so the social network can access the user’s address book. To be safe, don’t provide this information at all. 14

Tips to be safe Using social networks Become familiar with the privacy settings available on any social network you use. Don't post your exact date of birth, especially in combination with your location of birth. Stay aware of changes to a social network’s terms of service and privacy policy. Be careful when you click on shortened links. Be very cautious of pop-up windows, especially any that state your security software is out of date or that security threats and/or viruses have been detected on your computer. Delete cookies, including flash cookies, every time you leave a social networking site. Think about whether you would want a stranger, your mother or a potential boss to see certain information or pictures. 15

Tips to be safe Using social networks Don’t publicize vacation plans, especially the dates you’ll be traveling. If you use a location-aware social network, don’t make public where your home is because people will know when you are not there. Be aware that your full birth date, especially the year, may be useful to identity thieves. Don’t post your address, phone number or address on a social network. Use caution when using third-party applications. verify the account holder’s identity before accepting the request. Be wary of requests for money, even if they are from contacts you know and trust. In the event that your social networking account is compromised, report it to the site immediately and alert your contacts. 16

17 Q A &