SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Users & Behaviors Abuses and Security of Social Media Sites Group: Kenie R. Moses - Rachel Sitarz - Scott Abney Purdue University Spring 2011 Social internet TECH621
Social Media Apps and Usage Users Behaviors: Beware of Media Apps Scott Abney
Social Media App Intro Apple App Store has over 300,000 apps Facebook is around 60,000 apps Twitter just passed over 50,000 apps  97% of social media users do not check apps or links for viruses
Apple App Store has over 100 millions users  User info hacked due to knockoffs off applications (Weather HD app) Thuat Nguyen created 50 apps for app store, then charged up to $600 after hacking into over 400 iTunes accounts for furthering purchases on his other apps  Storm 8 created apps for online games that misconstrued what users were downloading, purchases ranged from $150-$1400
Twitter Around 200 million users on Twitter Over 50% of tweets are sent from 3rd party applications  Common app that is used for hacking claims  to increase subscribers Security shield application
Facebook ,[object Object]
November 2010, over 60,000 people clicked on the ePrivacy app to try to see who viewed their profile
Hackers create fake Facebook login pages from apps
Early January 2011, Facebook allows apps to view both home and phone number on profiles,[object Object]
What Can You Do???? Research applications before adding them Never give out any private information Check security settings on your social network www.facecrooks.com
Social Media Usage and Security Users Behaviors: How Secure Are You? Kenie R. Moses
Social Network Usage Nearly 20% of Internet users are tweeting on Twitter or using another service to share personal and business updates, or to see updates about others 66% of LinkedIn users are decision makers or have influence in the purchase decisions at their companies In 2011, 70+ Percent of Marketers Will Be Using Social Media
Social Network Usage Continued 54% percent of the companies studied have at least one Facebook Fan page  72% of companies plan to invest more in social networks 79% of the largest fortune 500 firms use Twitter, to communicate with customers or employees 80% of companies are planning to use social networks to find or attract candidates
Social Network Data Leakage 17% of US companies investigated the exposure of confidential information via a posting to a social networking sites 13% of US companies investigated the exposure of confidential, sensitive or private information via Twitter 54% of ClOs said their firms do not allow employees to visit social networking sites for any reason while at work.
Social Networking Pitfalls ,[object Object]
46% of Facebook users feel there are security and privacy risks.
34% have seen somebody else’s phone number posted on a social        networking site. ,[object Object],        their on social networking sites visible to friends. ,[object Object],[object Object]
Social Media Abuse and Misuse User Behaviors: Deviant Activities Rachel Sitarz
Introduction Pornography Internet trends Deviant behavior: Child Pornography (CP) usage Predatory behaviors Victimization of children
Pornography Usage Multi-billion dollar industry (Ferraro & Casey, 2005) $97 billion worldwide $13 billion in the US alone Every second, $3,075.64 is being spent 28,258 are viewing pornography every second 372 Internet users are typing adult search terms into search engines 39 minutes new pornography is made in US
Pornography Usage Continued Sex is the most searched topic, with one-third of all internet user visiting some form of sexually related site regularly Anonymity, cheap, easily accessed, avoid social embarrassment, instant gratification, easily hidden
Pornography Pages By Country Country Porn Pages: United States 244,661,900  Germany 10,030,200  United Kingdom 8,506,800  Australia 5,655,800 Japan 2,700,800  The Netherlands 1,883,800  Russia 1,080,600  Poland 1,049,600  Spain 852,800
Pornography Stats 40 million U.S. adults regularly visit Internet pornography 20% of men admit accessing pornography at work 70% of women keep their online activities secret 10% of adults admit to Internet sexual addition 17% of women admit to struggling with pornography addiction
Child Pornography Online Child pornography isn't new, it’s easier to access without as many social and legal risks Some statistics estimate that 1.5 million children have been and currently are being exploited Multi-billion dollar industry with estimated 100,000 child pornography websites “Golden Age of Child Pornography”
Child Pornography Continued Child pornography is one of the fastest growing businesses online Content is continually getting worse and more graphic 58% of CP websites are made in US
Online Predators 644,865 Registered Sex Offenders in the US (many unregistered) 80 % of offenders were explicit about their intentions with youth 73 % of online crimes, teens go to meet the offender on multiple occasions for multiple sexual encounters
Distribution of CP Online
Youth Victimization Approximately 1 in 6 youth online (10 to 17-years-old) received a sexual solicitation or approach over the Internet. 4% received an aggressive sexual solicitation – meeting, phone call, gifts 34% had an unwanted exposure to pornography 27% of the youth who encountered unwanted pornography told a parent or guardian Research indicates that 1 in 5 girls and 1 in 10 boys will be sexually victimized before adulthood
Meet 10 year-old Becky’s new 12 year-old online friend.

Weitere ähnliche Inhalte

Was ist angesagt?

Documentary research
Documentary researchDocumentary research
Documentary researchellenwooler
 
Trusting Our Internet
Trusting Our InternetTrusting Our Internet
Trusting Our Internettwizzler290
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile securityErnest Staats
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009Symantec
 
Research for doucmentary
Research for doucmentaryResearch for doucmentary
Research for doucmentaryclobebobe
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
McKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullyingMcKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullyingmckinleychas
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14Naval OPSEC
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parentsAl Rowell
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Taylor Van Sickle
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safetyFred Miller
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overviewJohn Woodring
 
Filtering in schools
Filtering in schoolsFiltering in schools
Filtering in schoolsmylee720
 

Was ist angesagt? (20)

Documentary research
Documentary researchDocumentary research
Documentary research
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Trusting Our Internet
Trusting Our InternetTrusting Our Internet
Trusting Our Internet
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
Protecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile PhishingProtecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile Phishing
 
DoD Social Media Guide
DoD Social Media GuideDoD Social Media Guide
DoD Social Media Guide
 
Darkside
DarksideDarkside
Darkside
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
 
Research for doucmentary
Research for doucmentaryResearch for doucmentary
Research for doucmentary
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
McKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullyingMcKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullying
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parents
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 
Media Law
Media LawMedia Law
Media Law
 
Filtering in schools
Filtering in schoolsFiltering in schools
Filtering in schools
 

Andere mochten auch

Világjáró(2)+ani (nx power lite)
Világjáró(2)+ani (nx power lite)Világjáró(2)+ani (nx power lite)
Világjáró(2)+ani (nx power lite)VarganeAnny
 
Human rights abuses
Human rights abusesHuman rights abuses
Human rights abusesMerylBeth17
 
Guidance Credentials
Guidance CredentialsGuidance Credentials
Guidance Credentialsphatstack
 
E Commerce Dagen 2011
E Commerce Dagen 2011E Commerce Dagen 2011
E Commerce Dagen 2011John Elshout
 
Ma S Lingecollege 16 Juni 2011
Ma S Lingecollege 16 Juni 2011Ma S Lingecollege 16 Juni 2011
Ma S Lingecollege 16 Juni 2011bentutert
 
Spirulifestyles Marketing-US LLC.
Spirulifestyles Marketing-US LLC.Spirulifestyles Marketing-US LLC.
Spirulifestyles Marketing-US LLC.spirulifestyles
 
Creativity in Occupational Therapy
Creativity in Occupational TherapyCreativity in Occupational Therapy
Creativity in Occupational TherapyCIAllison301
 
Session iv presentation rk+csend
Session iv  presentation rk+csendSession iv  presentation rk+csend
Session iv presentation rk+csendJulien Grollier
 
Daniela Papi - LSE Presentation on Social Entrepreneurship
Daniela Papi - LSE Presentation on Social EntrepreneurshipDaniela Papi - LSE Presentation on Social Entrepreneurship
Daniela Papi - LSE Presentation on Social EntrepreneurshipDaniela Papi
 
Szellemes fotok+ani (nx power lite)
Szellemes fotok+ani (nx power lite)Szellemes fotok+ani (nx power lite)
Szellemes fotok+ani (nx power lite)VarganeAnny
 
Investing Time in People: Changing the Way the World Views "Aid" - June 2011
Investing Time in People: Changing the Way the World Views "Aid" - June 2011Investing Time in People: Changing the Way the World Views "Aid" - June 2011
Investing Time in People: Changing the Way the World Views "Aid" - June 2011Daniela Papi
 
Linkedin
LinkedinLinkedin
Linkedinplatkin
 
PROGRESSIVES
PROGRESSIVESPROGRESSIVES
PROGRESSIVESjolehidy6
 
Презентация TWYM на iCOMference: как отправлять Яндекс.Деньги через Twitter?
Презентация TWYM на iCOMference: как отправлять Яндекс.Деньги через Twitter?Презентация TWYM на iCOMference: как отправлять Яндекс.Деньги через Twitter?
Презентация TWYM на iCOMference: как отправлять Яндекс.Деньги через Twitter?Яндекс.Деньги
 

Andere mochten auch (20)

Api.tech
Api.techApi.tech
Api.tech
 
Világjáró(2)+ani (nx power lite)
Világjáró(2)+ani (nx power lite)Világjáró(2)+ani (nx power lite)
Világjáró(2)+ani (nx power lite)
 
Human rights abuses
Human rights abusesHuman rights abuses
Human rights abuses
 
E61
E61E61
E61
 
Guidance Credentials
Guidance CredentialsGuidance Credentials
Guidance Credentials
 
Zambia presentation4
Zambia presentation4Zambia presentation4
Zambia presentation4
 
E Commerce Dagen 2011
E Commerce Dagen 2011E Commerce Dagen 2011
E Commerce Dagen 2011
 
Ma S Lingecollege 16 Juni 2011
Ma S Lingecollege 16 Juni 2011Ma S Lingecollege 16 Juni 2011
Ma S Lingecollege 16 Juni 2011
 
Spirulifestyles Marketing-US LLC.
Spirulifestyles Marketing-US LLC.Spirulifestyles Marketing-US LLC.
Spirulifestyles Marketing-US LLC.
 
Creativity in Occupational Therapy
Creativity in Occupational TherapyCreativity in Occupational Therapy
Creativity in Occupational Therapy
 
Session iv presentation rk+csend
Session iv  presentation rk+csendSession iv  presentation rk+csend
Session iv presentation rk+csend
 
LOVE
LOVELOVE
LOVE
 
Excalibur consulting
Excalibur consulting Excalibur consulting
Excalibur consulting
 
Daniela Papi - LSE Presentation on Social Entrepreneurship
Daniela Papi - LSE Presentation on Social EntrepreneurshipDaniela Papi - LSE Presentation on Social Entrepreneurship
Daniela Papi - LSE Presentation on Social Entrepreneurship
 
Szellemes fotok+ani (nx power lite)
Szellemes fotok+ani (nx power lite)Szellemes fotok+ani (nx power lite)
Szellemes fotok+ani (nx power lite)
 
Investing Time in People: Changing the Way the World Views "Aid" - June 2011
Investing Time in People: Changing the Way the World Views "Aid" - June 2011Investing Time in People: Changing the Way the World Views "Aid" - June 2011
Investing Time in People: Changing the Way the World Views "Aid" - June 2011
 
Linkedin
LinkedinLinkedin
Linkedin
 
Frimely
FrimelyFrimely
Frimely
 
PROGRESSIVES
PROGRESSIVESPROGRESSIVES
PROGRESSIVES
 
Презентация TWYM на iCOMference: как отправлять Яндекс.Деньги через Twitter?
Презентация TWYM на iCOMference: как отправлять Яндекс.Деньги через Twitter?Презентация TWYM на iCOMference: как отправлять Яндекс.Деньги через Twitter?
Презентация TWYM на iCOMference: как отправлять Яндекс.Деньги через Twitter?
 

Ähnlich wie Users and Behaviors- Social Internet

Disadvantages of Social Networking
Disadvantages of Social NetworkingDisadvantages of Social Networking
Disadvantages of Social NetworkingAshwin Agarwal
 
The Impact of Digital Technologies on our Lives
The Impact of Digital Technologies on our LivesThe Impact of Digital Technologies on our Lives
The Impact of Digital Technologies on our LivesWebenza India Pvt. Ltd
 
Social media FBLA presentation
Social media FBLA presentationSocial media FBLA presentation
Social media FBLA presentationAngela Lechtenberg
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0Larry Magid
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)Pat Sine
 
Internet sex addiction
Internet sex addictionInternet sex addiction
Internet sex addictionWALID SARHAN
 
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Colorado DHSEM:  Understanding Social Media and Using it to Your AdvantageColorado DHSEM:  Understanding Social Media and Using it to Your Advantage
Colorado DHSEM: Understanding Social Media and Using it to Your AdvantageTrost, Micki
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our childrenstevewrightco
 
The Intersection of Social Media, HIPAA, and the Workplace
The Intersection of Social Media, HIPAA, and the WorkplaceThe Intersection of Social Media, HIPAA, and the Workplace
The Intersection of Social Media, HIPAA, and the WorkplacePolsinelli PC
 
Social Media and Nonprofits
Social Media and NonprofitsSocial Media and Nonprofits
Social Media and NonprofitsTracy L. Murray
 
Coping with the many faces of facebook
Coping with the many faces of facebookCoping with the many faces of facebook
Coping with the many faces of facebookktcole
 
Finding and engaging minority influencers on social media
Finding and engaging minority influencers on social mediaFinding and engaging minority influencers on social media
Finding and engaging minority influencers on social mediaElon iMedia
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devicesErnest Staats
 

Ähnlich wie Users and Behaviors- Social Internet (20)

Social Media and Academia2015
Social Media and Academia2015Social Media and Academia2015
Social Media and Academia2015
 
Disadvantages of Social Networking
Disadvantages of Social NetworkingDisadvantages of Social Networking
Disadvantages of Social Networking
 
The Impact of Digital Technologies on our Lives
The Impact of Digital Technologies on our LivesThe Impact of Digital Technologies on our Lives
The Impact of Digital Technologies on our Lives
 
Social media FBLA presentation
Social media FBLA presentationSocial media FBLA presentation
Social media FBLA presentation
 
An introduction to Social Media
An introduction to Social MediaAn introduction to Social Media
An introduction to Social Media
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Own Your Own Life (at least online)
Own Your Own Life (at least online)Own Your Own Life (at least online)
Own Your Own Life (at least online)
 
Internet sex addiction
Internet sex addictionInternet sex addiction
Internet sex addiction
 
Facebook
FacebookFacebook
Facebook
 
Social Network
Social NetworkSocial Network
Social Network
 
Social Media for Non-Profits (Einstein version)
Social Media for Non-Profits (Einstein version)Social Media for Non-Profits (Einstein version)
Social Media for Non-Profits (Einstein version)
 
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Colorado DHSEM:  Understanding Social Media and Using it to Your AdvantageColorado DHSEM:  Understanding Social Media and Using it to Your Advantage
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Cybersafety Presentation for Connecting Waters Charter School
Cybersafety Presentation for Connecting Waters Charter SchoolCybersafety Presentation for Connecting Waters Charter School
Cybersafety Presentation for Connecting Waters Charter School
 
How safe are our children
How safe are our childrenHow safe are our children
How safe are our children
 
The Intersection of Social Media, HIPAA, and the Workplace
The Intersection of Social Media, HIPAA, and the WorkplaceThe Intersection of Social Media, HIPAA, and the Workplace
The Intersection of Social Media, HIPAA, and the Workplace
 
Social Media and Nonprofits
Social Media and NonprofitsSocial Media and Nonprofits
Social Media and Nonprofits
 
Coping with the many faces of facebook
Coping with the many faces of facebookCoping with the many faces of facebook
Coping with the many faces of facebook
 
Finding and engaging minority influencers on social media
Finding and engaging minority influencers on social mediaFinding and engaging minority influencers on social media
Finding and engaging minority influencers on social media
 
Spiritual social media & mobile devices
Spiritual social media & mobile devicesSpiritual social media & mobile devices
Spiritual social media & mobile devices
 

Users and Behaviors- Social Internet

  • 1. Users & Behaviors Abuses and Security of Social Media Sites Group: Kenie R. Moses - Rachel Sitarz - Scott Abney Purdue University Spring 2011 Social internet TECH621
  • 2. Social Media Apps and Usage Users Behaviors: Beware of Media Apps Scott Abney
  • 3. Social Media App Intro Apple App Store has over 300,000 apps Facebook is around 60,000 apps Twitter just passed over 50,000 apps 97% of social media users do not check apps or links for viruses
  • 4. Apple App Store has over 100 millions users User info hacked due to knockoffs off applications (Weather HD app) Thuat Nguyen created 50 apps for app store, then charged up to $600 after hacking into over 400 iTunes accounts for furthering purchases on his other apps Storm 8 created apps for online games that misconstrued what users were downloading, purchases ranged from $150-$1400
  • 5. Twitter Around 200 million users on Twitter Over 50% of tweets are sent from 3rd party applications Common app that is used for hacking claims to increase subscribers Security shield application
  • 6.
  • 7. November 2010, over 60,000 people clicked on the ePrivacy app to try to see who viewed their profile
  • 8. Hackers create fake Facebook login pages from apps
  • 9.
  • 10. What Can You Do???? Research applications before adding them Never give out any private information Check security settings on your social network www.facecrooks.com
  • 11. Social Media Usage and Security Users Behaviors: How Secure Are You? Kenie R. Moses
  • 12. Social Network Usage Nearly 20% of Internet users are tweeting on Twitter or using another service to share personal and business updates, or to see updates about others 66% of LinkedIn users are decision makers or have influence in the purchase decisions at their companies In 2011, 70+ Percent of Marketers Will Be Using Social Media
  • 13. Social Network Usage Continued 54% percent of the companies studied have at least one Facebook Fan page 72% of companies plan to invest more in social networks 79% of the largest fortune 500 firms use Twitter, to communicate with customers or employees 80% of companies are planning to use social networks to find or attract candidates
  • 14. Social Network Data Leakage 17% of US companies investigated the exposure of confidential information via a posting to a social networking sites 13% of US companies investigated the exposure of confidential, sensitive or private information via Twitter 54% of ClOs said their firms do not allow employees to visit social networking sites for any reason while at work.
  • 15.
  • 16. 46% of Facebook users feel there are security and privacy risks.
  • 17.
  • 18. Social Media Abuse and Misuse User Behaviors: Deviant Activities Rachel Sitarz
  • 19. Introduction Pornography Internet trends Deviant behavior: Child Pornography (CP) usage Predatory behaviors Victimization of children
  • 20. Pornography Usage Multi-billion dollar industry (Ferraro & Casey, 2005) $97 billion worldwide $13 billion in the US alone Every second, $3,075.64 is being spent 28,258 are viewing pornography every second 372 Internet users are typing adult search terms into search engines 39 minutes new pornography is made in US
  • 21. Pornography Usage Continued Sex is the most searched topic, with one-third of all internet user visiting some form of sexually related site regularly Anonymity, cheap, easily accessed, avoid social embarrassment, instant gratification, easily hidden
  • 22. Pornography Pages By Country Country Porn Pages: United States 244,661,900 Germany 10,030,200 United Kingdom 8,506,800 Australia 5,655,800 Japan 2,700,800 The Netherlands 1,883,800 Russia 1,080,600 Poland 1,049,600 Spain 852,800
  • 23. Pornography Stats 40 million U.S. adults regularly visit Internet pornography 20% of men admit accessing pornography at work 70% of women keep their online activities secret 10% of adults admit to Internet sexual addition 17% of women admit to struggling with pornography addiction
  • 24. Child Pornography Online Child pornography isn't new, it’s easier to access without as many social and legal risks Some statistics estimate that 1.5 million children have been and currently are being exploited Multi-billion dollar industry with estimated 100,000 child pornography websites “Golden Age of Child Pornography”
  • 25. Child Pornography Continued Child pornography is one of the fastest growing businesses online Content is continually getting worse and more graphic 58% of CP websites are made in US
  • 26. Online Predators 644,865 Registered Sex Offenders in the US (many unregistered) 80 % of offenders were explicit about their intentions with youth 73 % of online crimes, teens go to meet the offender on multiple occasions for multiple sexual encounters
  • 28. Youth Victimization Approximately 1 in 6 youth online (10 to 17-years-old) received a sexual solicitation or approach over the Internet. 4% received an aggressive sexual solicitation – meeting, phone call, gifts 34% had an unwanted exposure to pornography 27% of the youth who encountered unwanted pornography told a parent or guardian Research indicates that 1 in 5 girls and 1 in 10 boys will be sexually victimized before adulthood
  • 29. Meet 10 year-old Becky’s new 12 year-old online friend.
  • 30. Source References 1.) http://information-security-resources.com/2009/08/17/top-8-social-media-security-threats/ 2.) http://socialmediasecurity.com/ 3.) http://www.fastcompany.com/1563867/the-5-biggest-social-media-security-risks-for-businesses 4.) http://dns.tmcnet.com/topics/internet-security/articles/137059-social-networking-sites-sitting 5.) http://www.cdc.gov/socialmedia/Tools/guidelines/pdf/securitymitigations.pdf 6.) http://www.netsmartz.org/ 7.) http://www.missingkids.com/ 8.) http://enough.org/ 9.) Internet Watch Foundation. Annual Report, 2008 10.) Adler, A. (2001). The Perverse Law of Child Pornography. Columbia Law Review, 101(2), 209-273
  • 31. Source References Continued 11.) http://blog.vimov.com/2011/01/app-squatting-misuse-of-weather-hd-name-in-the-mac-app-store/   12.) http://www.betanews.com/article/Apple-still-silent-as-more-scams-are-found-on-App-Store/1278363193   13.) http://eu.techcrunch.com/2010/11/29/over-60000-click-on-scam-facebook-app-which -claims-you-can-see-who-checked-your-profile/   14.) http://www.switched.com/2009/09/15/5-popular-facebook-scams-and-how-to-avoid-them/   15.) http://www.macworld.com/article/157303/2011/01/twitter_antivirusscam.html.   16.) http://downloadsquad.switched.com/2011/01/16/facebook-enables-one-click-identity-theft-option -for-rogue-application-developers/   17.) http://www.facecrooks.com/blog/internet-safety-a-privacy/item/904-study-finds-most-social-media -users-do-not-check-shared-links-for-malware   18.) http://tech.fortune.cnn.com/2011/01/22/app-store-hits-10-billion-update/?hpt=T2   19.) http://blog.nutshellmail.com/2010/02/03/can-you-trust-third-party-twitter-applications 20.) Ferraro, M., & Casey, E. (2005). Investigating child exploitation and pornography: The Internet, the Law and Forensic Science. San Diego, CA: Elsvier Academic Press.