Lily R. Jenkins and Diane E. Gan CSAFE Centre University of Greenwich 1.

Slides:



Advertisements
Similar presentations
And It Begins… So, you want to start using social media for your business? Sounds like a plan… We will focus on two platforms today, Facebook and Twitter.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Privacy: Facebook, Twitter
E FFECTIVE N ETWORKING S TRATEGIES.  - Understand the importance and value of networking  - Identify a current network of contacts to build upon  -
Twitter – what is it? The School District of Haverford Township |
So much alike! What is Personal Branding? 1. Make a clear, specific, and consistent image of yourself on the internet that reflects who YOU are. 2. Make.
How to make the most of your website: It’s one of your best marketing, branding, awareness tools.
A Beginner’s Guide to Social Media Nevada State Board of Nursing September 18-20, 2013 Las Vegas, Nevada.
NHnetWORKS December 14,  Facebook is a global Social Networking website that is operated and privately owned by Facebook, Inc.  Users can add.
Web 2.0: Concepts and Applications 5 Connecting People.
Web 2.0: Concepts and Applications 5 Connecting People.
30 Tips in 30 Minutes Marketing Your Event on Social Media.
Social Media Networking Sites Charlotte Jenkins Designing the Social Web
Infotex Awareness Training Tools. m.infotex.com/tools Information Security Tools.
AudioBoo Because sound is social. Overview Instruct how to create an Audioboo account Demonstrate how to follow a featured boo Learn how to upload a video.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
By Daragh Social Media Strategy for a Political Campaign.
Social Media & Photography Photojournalism. Why social media? A 2013 study found that social media users represent 1 in 4 people on the globe, roughly.
How To Protect Your Privacy and Avoid Identity Theft Online.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
By: Aaron Gustafson Owner Computers N’ Stuff.  Facebook is FREE!!!  Youtube is FREE!!!  Twitter is FREE!!!  Google Plus is FREE!!!  Website hosting.
You can customize your privacy settings. The privacy page gives you control over who can view your content. At most only your friends, their friends and.
July 30th – August 1st, 2013 McCormick Place, Chicago, IL Integrating Social Media at Live Events David Brull July 30,
Trevor Harris Safe T Training and Consultancy. Adults often have anxieties about new technology but… Everything that’s already in the world when you’re.
Protecting your Family From the dark places on the Internet Going beyond the standard PC Filter, and dealing with the multiple devices that access the.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Using Social Networks in Education Region One Technology Conference May 11, 2010.
Creating an Online Professional Presence Using Social Media.
Top Social Media Platforms for Professionals Presented by Jason A. Hicks.
Planned Giving Design Center. What is the Planned Giving Design Center? National network of websites dedicated to advancing philanthropy.
Social Media & The Chaplain. Social Media Social Media Is Consumer generated media it is media that is designed to be shared, sharing means that it is.
PRIVACY BOOTCAMP YpJU.
IMGuest-BUS 111 Erica Gallagher Brittany Schmoll Tom Witkauskis.
Suggested grade levels 7-12 Students will explore strategies that promote personal safety when using the texting-based social network, Twitter.
Why I LIKE the Facebook Database… Sharon Viente May 2010.
 Social media and an online presence is where professional recruitment is headed… Are you ready?  Learn tricks to promote a positive online presence.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
SOCIAL MEDIA CLINICS POCKLINGTON SCHOOL. TWITTER You don’t have to put your age when you register! SHOULD BE 13! It is by no means private! Do you know.
Social Media 101 An Overview of Social Media Basics.
DIGITAL FOOTPRINT Everything you do is online. How you can protect yourself and your info.
A Day of technology Improving upon your technology skills Giving every child the opportunity to learn in a robust digital environment everyday. making.
Social Media: The Basics Teresa Marks School Community Oral Health Conference Friday, October 16, 2015.
Protecting Yourself on Social Media – Friend Requests And Messages.
Periscope How to broadcast your way to more Closings Brought to you By: YOUR INFO PHONE NUMBER NMLS#
Cyberbullying What does it mean? What can we do?.
FriendFinder Location-aware social networking on mobile phones.
FriendFinder Location-aware social networking on mobile phones.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
FACEBOOK Material adapted from
Facebook 101 This class contains content from Saint Paul Public Libraries, Project for Pride in Living, and GCFLearnFree.org.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
Catherine Metcalf | Dec U.S. Department of Education 2015 FSA Training Conference for Financial Aid Professionals The FSA ID – Resources for Assisting.
TRUSTED CHOICE. SPROUT SOCIAL PRICING 3 Custom plan for MARC Based off of previous clients with a similar number of pages and around 500 profiles -
Helping teachers connect instantly with students and parents.
Engaging through Social Media Society’s gift to Alumni Relations.
E-Safety Parent Talk Helping to keep your children safe online.
Victor PTSA Fall Forum Don’t Lose Touch With Your Teen Tuesday, October 22, 2013 – 7PM Social media is now an integral part of our every day lives. For.
JohnPaulAguiar.com BLOGGING | SOCIAL MEDIA | MARKETING | INSPIRATION.
Dial For Twitter Support Number. How to Join Twitter to Use for Business and Marketing? While the registered users can post and share tweets,
Facebook privacy policy
Creating your online identity
Social Media Security: Understanding how to keep yourself safe.
How you know what you’re doing is working… or not working.
Your personal information exposed in under 2 minutes
Overview Social media applications inform, educate, and entertain people through online (multi-)media A social networking application allows users to create.
SOCIAL RESPONSIBILITY
Online Safety: Rights and Responsibilities
Kaspersky Social Channel
Presentation transcript:

Lily R. Jenkins and Diane E. Gan CSAFE Centre University of Greenwich 1

 Introduction  Background to this work  Overview of Tools  Experiments  Summary of Results  Legal implications  Recommendations  Conclusion C-SAFE - University of Greenwich 2

 Most teenagers today have at least one “profile”  They reveal a lot of personal information about themselves that anyone can see  Their location and identity are turned on by default  Twitter users have the ‘handle’ (username) on all their social media sites  Makes it easy to identify and follow them through cyber space C-SAFE - University of Greenwich 3

 Twitter first appeared on in March 2006  Currently has 200 million active users who send over 400 million tweets per day  Added the geo-location function to user profiles in 2009  Many users are not aware that they are exposing their private information  Enables followers to know exactly where an individual was tweeting from  The question is – do users know how to use this feature or how to protect themselves? C-SAFE - University of Greenwich 4

Twitter’s privacy policy  Clearly states that all user profiles and subsequent tweets are by default public  Also details how the information will be used through their services such as applications, websites and third parties C-SAFE - University of Greenwich 5

 Investigated a range of tools and selected:-  StreamdIn, Twitonomy and Creepy StreamdIn  Application for both android and iOS  Displays tweets on Google Maps using the geo-location details attached to each tweet  User’s profile picture is displayed on a map  Grouped by location  View numerous real-time tweets coming in C-SAFE - University of Greenwich 6

7 Tracking a mobile phone

C-SAFE - University of Greenwich 8 Being Tracked on Public Transport

Twitonomy  Web based analytics tool  Allow monitoring, managing and tracking your own or another person’s activities  Main feature - overall statistics of a user  Includes ◦ how often they retweet ◦ time of day they tweet ◦ avg number of tweets sent per day ◦ gives location details ◦ Mentions Map - displays where in the world the most mentions are coming from C-SAFE - University of Greenwich 9

10 Twitonomy Showing Accounts From Two Different Users That Have Typical Working Days

Creepy  Aggregation program  Gathers geo-location information from Twitter, Instagram and Flickr  Requires authentication with each social networking site supported  Users can be added to a target list and their geo- location data can be retrieved  ‘Current Location Details’ gives ◦ social media platform ◦ time and date ◦ location of the tweet ◦ context of the tweet.  Using this feature it is possible to identify their current location on the map C-SAFE - University of Greenwich 11

C-SAFE - University of Greenwich 12

 Subjects - three users who are prolific tweeters  Objective was to see how much information can be retrieved using freely available tools  The users will be referred to as User A, User B and User C  All have been asked to tweet with their geo- location settings turned on C-SAFE - University of Greenwich 13

 User A and User B did not have any tweets appear on the StreamdIn map  User C’s profile picture popped up all over London  Filtered results display only one user’s tweets C-SAFE - University of Greenwich 14

C-SAFE - University of Greenwich 15 Filtered view of User C’s profile picture Shows up all over London

 Analyses the last four months’ worth of tweets User A ◦ showed information about where they tweet from ◦ mostly use Twitter to re-tweet or reply ◦ most activate during the winter months ◦ no indication whether this user has a job C-SAFE - University of Greenwich 16

C-SAFE - University of Greenwich 17 User A Last update - 9 minutes ago Tweet history Platforms used

User B ◦ re-tweets and replies which suggests they use Twitter to stay in touch with fellow users ◦ no indication as to where User B worked or lived C-SAFE - University of Greenwich 18

C-SAFE - University of Greenwich 19 User B More tweets Significant increase in tweet history Platforms used

C-SAFE - University of Greenwich 20 User B’s Tweeting Habits

User C  revealed a distinctive pattern of usage  suggests this user has a Monday to Friday job  most tweets are outside of the hours of 9 to 5  it can be seen that this person has an iPhone C-SAFE - University of Greenwich 21

User A  clusters of tweets can be identified  single tweets showing journey information between the clusters  home address was identified by reading the tweet content  Google street easily found the house  Also every Monday they attend ‘Movie Night’ at the same time and place C-SAFE - University of Greenwich 22

C-SAFE - University of Greenwich 23 User A

C-SAFE, University of Greenwich 24 The Giveaway Tweet

User B  clusters of pins identified their place of work and their home address  home residence was given away by tweets that specifically mention the word ‘home’  Gives longitude and latitude co-ordinates C-SAFE - University of Greenwich 25

C-SAFE - University of Greenwich 26 User B

C-SAFE - University of Greenwich 27 User B’s Route to work

C-SAFE - University of Greenwich 28 Locating User B’s work place They actually only sent one tweet from work!

User C  always took the same route to work  analysing the route to work showed that the second half of the journey home may change if they needed to go to the supermarket  they never mentioned work or home in their tweets  however, they were in the area of Southwark week days between 9 and 5 only  analysing each tweet and pin drop showed that they were in Southwark every week day  but never at weekends  also a fixed monthly pattern - every month they travelled to visit their parents  revealed by through their tweets C-SAFE - University of Greenwich 29

 User C visit’s his parent’s house in Southampton once per month C-SAFE - University of Greenwich 30

C-SAFE - University of Greenwich 31 User C’s Tweets, which establish a pattern of clusters around home and work

C-SAFE - University of Greenwich 32 Three times per week User C goes to this gym Week days between 7 and 10 Weekends between 1 and 3

 How much did each users’ Tweeting expose the rest of their social media “presence”?  Did the three users have accounts on Facebook, LinkedIn, Foursquare and Instagram?  User A gave no indication that they had any other social media accounts  A Google search revealed their Facebook page  The profile pictures confirmed this  Logging into a Facebook account that is not “friends” with User A gave a small number of their pictures, as well as where they were living C-SAFE - University of Greenwich 33

 User A also had a profile on Instagram  using Instagram24.com and User A’s profile name it was possible to locate their pictures  including some pictures that they had “liked”  Also found them on LinkedIn  Google Street View located their front door C-SAFE - University of Greenwich 34

 A Google search for User B found their Linkedin, Facebook and Google+ accounts  Using these profiles, it was possible to confirm ◦ where they worked ◦ the city they live in ◦ where they were studying C-SAFE - University of Greenwich 35

 User C was the easiest to identify with Twitter  But the most difficult to locate on other social media sites  Only Foursquare revealed their location  Back to Twitter  After conducting an exhaustive search of their Twitter account two tweets were found with pictures C-SAFE - University of Greenwich 36

Tweet 1  Posted while in hospital  Hospital ID tag revealed  their surname  their date of birth  NHS ID C-SAFE - University of Greenwich 37

Tweet 2  e-ticket showed their full name (including a middle name)  airports they will pass through  how long they will be stopping at each location  A gift to a burglar C-SAFE - University of Greenwich 38

Data Protection Act (1998)  states that the “data subject has given his consent to the processing” of personal data  does not offer any conclusive reasoning as to how social networking sites users are protected  by signing up to these sites and using them in a public manner the user has given their consent C-SAFE - University of Greenwich 39

 Employers may check your personal life using social networks  Example - Kent Police Commissioner’s Youth Advisor Paris Brown  forced to withdraw when her twitter content was made public C-SAFE - University of Greenwich 40 Ref: mouthed-youth-commissioner-quit-offensive-tweets-questioned-police- caution.html

 Reduce your risk ◦ Do not tweet where you live, even if it is only the city ◦ Do not provide your phone number ◦ Avoid using full names ◦ Avoid using a profile picture ◦ Set your profile to private ‘Protect my Tweets’ ◦ Remove geo-location tagging on tweets ◦ Remove “Let others find me by my address” ◦ Do not connect your Twitter account to any other social media sites ◦ Limit the amount of apps that have access to your profile ◦ Be very selective about what you put in your tweets C-SAFE - University of Greenwich 41

 There are a huge number of tools that retrieve your information  All tools are freely available  StreamdIn, Twitonomy and Creepy were used for these experiments  Creepy was the most successful  It was the geo-location data AND the tweet contents that leaked information C-SAFE - University of Greenwich 42

C-SAFE - University of Greenwich 43 Lily Diane