SlideShare a Scribd company logo
1 of 12
Presentation Topic:
Social Media Privacy Issues
:PRESENTED BY:
...NOUSHEEN ARSHAD...
R1F15 BSCS 0040
PUNJAB UNIVERSITY (RWP CAMPUS)
Social Media Networking
◦ A social media networking service (also social networking site, SNS)types of
social media
◦ Social media are computer- mediated tools that allow people, companies and
other organizations to create, share, or exchange information, career
interests, ideas, and pictures/video and virtual communities and networks
◦ Communities of people share different things by social networking.
◦ Basically, social media networking connects people at low cost.
◦ Most social networking sites provide the facility of messaging, chating, e-mails,
videos, voice-chats, file sharing, blogging, discussion groups and so on...
:TypesofSocialMediaNetworking:
Common Social Networking Sites
Some social networking sites which have many privacy issues but are very common:
◦ Facebook
◦ Twitter
◦ Gmail
◦ YouTube
◦ Myspace
◦ Skype
◦ Instagram
◦ Pinterest
:Usage of Social Sites:
Social sites are used in big percentage.
Every minute of the day:
◦ 100,000 tweets are sent.
◦ 684,478 pieces of content are shared on Facebook
◦ 2 million search queries are made on Google
◦ 48 hours of video are uploaded to YouTube
◦ 47,000 apps are downloaded from the App Store
◦ 3,600 photos are shared on Instagram
◦ 571 websites are created
◦ $272,000 is spent by consumers online.
:Privacy Issues:
1. Privacy issues are very common and very dangerous for the users of these sites.
2. Issues like spamming, hacking, scamming, phishing are effecting people very
badly.
3. After the November 2013, security breach where hackers stole usernames and
passwords for nearly 2 million accounts at Facebook, Google, Yahoo, LinkedIn,
Twitter and 93,000 other websites.
:Highest Privacy Issues:
Social sites like Facebook and twitter have the highest privacy issues.
◦ Facebook:
◦ Facebook has over a billion active users
◦ Teenagers of almost (18 to 35 age) are Facebook addicted.
◦ Fake Profile and ID's with fake names (like Angel Pari, Innoxent Ali, Cute girl, Decent
boy, etc...) is one of biggest problems on Facebook.
◦ Strange people try to get into our profiles.
◦ Accounts can be easily hacked by using different hacking websites.
◦ According to the news from PC World Business Center which was published on April
22, 2010, we can know that a hacker named Kirllos illegally stole and sold 1.5
million Facebook IDs to some business companies who want to attract potential
customers by using advertisements on Facebook.
:Twitter:
1. Twitter has mostly dodged privacy concerns.Facebook gets all the bad press, but the
bigger threat to your online privacy these days might be your Twitter account.
2. Twitter allows people to share information with their followers. Any messages that
are not switched from the default privacy setting are public, and thus can be viewed
by anyone with a Twitter account.
3. Users can make their timelines private, but once a tweet is re-tweeted by another
user, it irreversibly becomes public.
4. Another issue involving privacy on Twitter deals with users unknowingly disclosing
their information through tweets. Twitter has location services attached to tweets,
which some users don’t even know are enabled. Many users tweet about being at
home and attach their location to their tweet, revealing their personal home
address.
:Spokeo:
1. Spokeo is a "people-related" search engine with results compiled
through data aggregation.
◦ In September, 2010, Jennifer Purcell claimed that the FCRA was violated by
Spokeo marketing her personal information. Her case is pending in court.
◦ Also in 2010, Thomas Robins claimed that his personal information on the
website was inaccurate and he was unable to edit it for accuracy. The case
was dismissed because Robins did not claim that the site directly caused him
actual harm.On February 15, 2011, Robins filed another suit, this time
stating Spokeo has caused him "imminent and ongoing" harm.
:General Tips for avoiding Privacy Issues:
1. Become familiar with the privacy settings of any social website you use.
2. Don’t publicize your vacation plans.
3. Don’t share your age, place of birth, or birthday.
4. Don’t post your address, phone number or e-mail address on a social network.
5. Beware of strangers requests.
6. Always Logout your account on any social network.
7. Use cautions when using third-party applications.
8. Take additional precautions if you are the victim of stalking, harassment or domestic
violence.
Social media privacy issues

More Related Content

What's hot

Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 
impact of social media on youth
impact of social media on youthimpact of social media on youth
impact of social media on youthSu Kee
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Advantage and Disadvantage of Social media
Advantage and Disadvantage of Social mediaAdvantage and Disadvantage of Social media
Advantage and Disadvantage of Social mediaSnehlata Maurya
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingTeamBanana
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social MediaDilna DV
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark webJisc
 

What's hot (20)

Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social media
Social mediaSocial media
Social media
 
impact of social media on youth
impact of social media on youthimpact of social media on youth
impact of social media on youth
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Advantage and Disadvantage of Social media
Advantage and Disadvantage of Social mediaAdvantage and Disadvantage of Social media
Advantage and Disadvantage of Social media
 
Social networking
Social networkingSocial networking
Social networking
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social Media
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Social networking ppt
Social networking pptSocial networking ppt
Social networking ppt
 
social media
social mediasocial media
social media
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Facebook privacy and security
Facebook privacy and securityFacebook privacy and security
Facebook privacy and security
 

Viewers also liked

Social Media in the Modern Workplace
Social Media in the Modern WorkplaceSocial Media in the Modern Workplace
Social Media in the Modern WorkplaceRudner Law
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009canadianlawyer
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber BullyingCoachElrod
 
Contemporary Social Issues. Media Impacts on Teens.
Contemporary Social Issues. Media Impacts on Teens.Contemporary Social Issues. Media Impacts on Teens.
Contemporary Social Issues. Media Impacts on Teens.megjanssen
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016Brian Huonker
 
Social Network Addiction Or Social Media Addiction
Social Network Addiction Or Social Media AddictionSocial Network Addiction Or Social Media Addiction
Social Network Addiction Or Social Media AddictionSriram Ruthiran
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullyingbl03cook
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social MediaPhysiopedia
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpointjosiebrookeday
 
Social networking PPT
Social networking PPTSocial networking PPT
Social networking PPTvarun0912
 

Viewers also liked (12)

Social Media in the Modern Workplace
Social Media in the Modern WorkplaceSocial Media in the Modern Workplace
Social Media in the Modern Workplace
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Contemporary Social Issues. Media Impacts on Teens.
Contemporary Social Issues. Media Impacts on Teens.Contemporary Social Issues. Media Impacts on Teens.
Contemporary Social Issues. Media Impacts on Teens.
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016
 
Social Network Addiction Or Social Media Addiction
Social Network Addiction Or Social Media AddictionSocial Network Addiction Or Social Media Addiction
Social Network Addiction Or Social Media Addiction
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social Media
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Cyberbullying powerpoint
Cyberbullying powerpointCyberbullying powerpoint
Cyberbullying powerpoint
 
Social networking PPT
Social networking PPTSocial networking PPT
Social networking PPT
 

Similar to Social media privacy issues

Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networkingRussetanSc
 
Lecture 12 Social Media.ppt
Lecture 12 Social Media.pptLecture 12 Social Media.ppt
Lecture 12 Social Media.pptManishKarki12
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group projectbulgarej
 
SOCIAL Networking Sites
SOCIAL Networking SitesSOCIAL Networking Sites
SOCIAL Networking SitesAshley Surabhi
 
Developing%20a%20 Plan%20and%20a%20 Policy
Developing%20a%20 Plan%20and%20a%20 PolicyDeveloping%20a%20 Plan%20and%20a%20 Policy
Developing%20a%20 Plan%20and%20a%20 PolicyRonMiaso
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Social media 101 presentation jul2210
Social media 101 presentation jul2210Social media 101 presentation jul2210
Social media 101 presentation jul2210slicecomm
 
Social networking sites.
Social networking sites.Social networking sites.
Social networking sites.Jagdeep Gill
 
socialmediapowerpointpresentation-190930121315_221119_171539.pptx
socialmediapowerpointpresentation-190930121315_221119_171539.pptxsocialmediapowerpointpresentation-190930121315_221119_171539.pptx
socialmediapowerpointpresentation-190930121315_221119_171539.pptxssuser196c47
 
social Media Power Point Presentation.pptx
social Media Power Point Presentation.pptxsocial Media Power Point Presentation.pptx
social Media Power Point Presentation.pptxPrashanthReddyTirlap
 
social media presentation.pptx
social media presentation.pptxsocial media presentation.pptx
social media presentation.pptxRACHANAB18
 
Social Media 101 Presentation - Bringing the World to Your Desktop
Social Media 101 Presentation - Bringing the World to Your DesktopSocial Media 101 Presentation - Bringing the World to Your Desktop
Social Media 101 Presentation - Bringing the World to Your Desktopslicecomm
 
Social networking sites presentation
Social networking sites presentationSocial networking sites presentation
Social networking sites presentationA K DAS's | Law
 

Similar to Social media privacy issues (20)

Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networking
 
Lecture 12 Social Media.ppt
Lecture 12 Social Media.pptLecture 12 Social Media.ppt
Lecture 12 Social Media.ppt
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Social networks
Social networksSocial networks
Social networks
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group project
 
SOCIAL Networking Sites
SOCIAL Networking SitesSOCIAL Networking Sites
SOCIAL Networking Sites
 
Social_Networking_Project
Social_Networking_ProjectSocial_Networking_Project
Social_Networking_Project
 
New media and privacy
New media and privacyNew media and privacy
New media and privacy
 
Developing%20a%20 Plan%20and%20a%20 Policy
Developing%20a%20 Plan%20and%20a%20 PolicyDeveloping%20a%20 Plan%20and%20a%20 Policy
Developing%20a%20 Plan%20and%20a%20 Policy
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Social media 101 presentation jul2210
Social media 101 presentation jul2210Social media 101 presentation jul2210
Social media 101 presentation jul2210
 
Social Media
Social MediaSocial Media
Social Media
 
Social networking sites.
Social networking sites.Social networking sites.
Social networking sites.
 
socialmediapowerpointpresentation-190930121315_221119_171539.pptx
socialmediapowerpointpresentation-190930121315_221119_171539.pptxsocialmediapowerpointpresentation-190930121315_221119_171539.pptx
socialmediapowerpointpresentation-190930121315_221119_171539.pptx
 
social Media Power Point Presentation.pptx
social Media Power Point Presentation.pptxsocial Media Power Point Presentation.pptx
social Media Power Point Presentation.pptx
 
social media presentation.pptx
social media presentation.pptxsocial media presentation.pptx
social media presentation.pptx
 
Social Media Strategies For Teams
Social Media Strategies For TeamsSocial Media Strategies For Teams
Social Media Strategies For Teams
 
Social media
Social mediaSocial media
Social media
 
Social Media 101 Presentation - Bringing the World to Your Desktop
Social Media 101 Presentation - Bringing the World to Your DesktopSocial Media 101 Presentation - Bringing the World to Your Desktop
Social Media 101 Presentation - Bringing the World to Your Desktop
 
Social networking sites presentation
Social networking sites presentationSocial networking sites presentation
Social networking sites presentation
 

More from Nousheen Arshad

More from Nousheen Arshad (6)

Magnetism
MagnetismMagnetism
Magnetism
 
Latches & flip flop
Latches & flip flopLatches & flip flop
Latches & flip flop
 
Minterms & maxterms
Minterms & maxtermsMinterms & maxterms
Minterms & maxterms
 
New era of civilian's government (1)
New era of civilian's government (1)New era of civilian's government (1)
New era of civilian's government (1)
 
Operators
OperatorsOperators
Operators
 
Geopolitical importance of pakistan
Geopolitical importance of pakistanGeopolitical importance of pakistan
Geopolitical importance of pakistan
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Social media privacy issues

  • 1. Presentation Topic: Social Media Privacy Issues :PRESENTED BY: ...NOUSHEEN ARSHAD... R1F15 BSCS 0040 PUNJAB UNIVERSITY (RWP CAMPUS)
  • 2. Social Media Networking ◦ A social media networking service (also social networking site, SNS)types of social media ◦ Social media are computer- mediated tools that allow people, companies and other organizations to create, share, or exchange information, career interests, ideas, and pictures/video and virtual communities and networks ◦ Communities of people share different things by social networking. ◦ Basically, social media networking connects people at low cost. ◦ Most social networking sites provide the facility of messaging, chating, e-mails, videos, voice-chats, file sharing, blogging, discussion groups and so on...
  • 4. Common Social Networking Sites Some social networking sites which have many privacy issues but are very common: ◦ Facebook ◦ Twitter ◦ Gmail ◦ YouTube ◦ Myspace ◦ Skype ◦ Instagram ◦ Pinterest
  • 5. :Usage of Social Sites: Social sites are used in big percentage. Every minute of the day: ◦ 100,000 tweets are sent. ◦ 684,478 pieces of content are shared on Facebook ◦ 2 million search queries are made on Google ◦ 48 hours of video are uploaded to YouTube ◦ 47,000 apps are downloaded from the App Store ◦ 3,600 photos are shared on Instagram ◦ 571 websites are created ◦ $272,000 is spent by consumers online.
  • 6. :Privacy Issues: 1. Privacy issues are very common and very dangerous for the users of these sites. 2. Issues like spamming, hacking, scamming, phishing are effecting people very badly. 3. After the November 2013, security breach where hackers stole usernames and passwords for nearly 2 million accounts at Facebook, Google, Yahoo, LinkedIn, Twitter and 93,000 other websites.
  • 7. :Highest Privacy Issues: Social sites like Facebook and twitter have the highest privacy issues. ◦ Facebook: ◦ Facebook has over a billion active users ◦ Teenagers of almost (18 to 35 age) are Facebook addicted. ◦ Fake Profile and ID's with fake names (like Angel Pari, Innoxent Ali, Cute girl, Decent boy, etc...) is one of biggest problems on Facebook. ◦ Strange people try to get into our profiles. ◦ Accounts can be easily hacked by using different hacking websites. ◦ According to the news from PC World Business Center which was published on April 22, 2010, we can know that a hacker named Kirllos illegally stole and sold 1.5 million Facebook IDs to some business companies who want to attract potential customers by using advertisements on Facebook.
  • 8. :Twitter: 1. Twitter has mostly dodged privacy concerns.Facebook gets all the bad press, but the bigger threat to your online privacy these days might be your Twitter account. 2. Twitter allows people to share information with their followers. Any messages that are not switched from the default privacy setting are public, and thus can be viewed by anyone with a Twitter account. 3. Users can make their timelines private, but once a tweet is re-tweeted by another user, it irreversibly becomes public. 4. Another issue involving privacy on Twitter deals with users unknowingly disclosing their information through tweets. Twitter has location services attached to tweets, which some users don’t even know are enabled. Many users tweet about being at home and attach their location to their tweet, revealing their personal home address.
  • 9. :Spokeo: 1. Spokeo is a "people-related" search engine with results compiled through data aggregation. ◦ In September, 2010, Jennifer Purcell claimed that the FCRA was violated by Spokeo marketing her personal information. Her case is pending in court. ◦ Also in 2010, Thomas Robins claimed that his personal information on the website was inaccurate and he was unable to edit it for accuracy. The case was dismissed because Robins did not claim that the site directly caused him actual harm.On February 15, 2011, Robins filed another suit, this time stating Spokeo has caused him "imminent and ongoing" harm.
  • 10.
  • 11. :General Tips for avoiding Privacy Issues: 1. Become familiar with the privacy settings of any social website you use. 2. Don’t publicize your vacation plans. 3. Don’t share your age, place of birth, or birthday. 4. Don’t post your address, phone number or e-mail address on a social network. 5. Beware of strangers requests. 6. Always Logout your account on any social network. 7. Use cautions when using third-party applications. 8. Take additional precautions if you are the victim of stalking, harassment or domestic violence.