SlideShare a Scribd company logo
1 of 11
Download to read offline
Do not put too much private information
on social network service


                                       By Shangli Jiang
 social network service opens a door
 for us to the whole world. On the
 contrary, it brings dangerous, too.
 When you looking at outside, do
 never forget that there must be
 shadow somewhere when there is
 sunshine.
LOGO
LOGO




    •   Social Network Services have made
        communication between people not only
        convenient, but across the world speedily. It
        provides a wide platform for people to make
        new friends and express their feelings. People
        can know how their friends are going on
        immediately even though far from their
        locations. They think the SNSs are trustworthy
        so they put so much private information on the
        social network sites. According to the report of
        Criminal Use of Social Media, before 2012,
        there were 750 million users on Facebook,
        500 million users on YouTube, and 200 million
        users on Twitter.


About SNS
LOGO




            an online security consulta
            named Ron Bowles shock
            everyone in 2010 by posti
            100 million Facebook use
            personal information on t
            internet. Bowles used
            program to scan 500 milli
            Facebook profiles that w
            open to public. And finally
            got a numerous of user ID
            names, URLs and all oth
About SNS
            privacy   information      a
            downloaded them
LOGO




Facebook, Youtube, Twitter, each of these social networking sites owns thousands
of millions of users’ personal information. According to Hong, “Owning such a large
user information database attacks the criminals and leads to a sharp increase of
computer crime attacks on SNS.” Crimes, including social networking infrastructure
attacks, malware attack, Phishing attacks, cyber bulling and identify theft can be
performed to obtain sensitive personal information.
LOGO




    •   It is true that information was publicly available, but it shows the disadvantages of
        privacy in social networking sites. For many people it is annoying to set their profile
        privacy, so they face such kind of privacy information theft risk. Maybe people can
        be given some other suggestions like changing the profile privacy, not accepting
        friendship request from strangers, or not opening external suspicious links, etc.
        Does this way work? What we have known is that there is not real privacy on the
        internet; you can only make sure that some people won’t see your information.
        However, for some hackers, or computer whiz, getting your information is easy. The
        best way to protect ourselves is not to put too much private information on the
        internet, and then there is no way to get that.



How cybercrime
happen
LOGO


                 Your private information includes a lot of things:
                 your account number, your password, your name,
                 your age, your phone number, your amount of
                 salary, your hobby, what car you have, what you do
                 during weekends ………




How cybercrime
happen              And those information can be used to implement
                    crimes!!! Like cheating people who know you. They
                    can be another “you” in the world of internet.
LOGO



                 On January 21, 2009, a person
                 whose name is Bryan Rutberg
                 had his Facebook account              It wasn’t until later did he realize
                 hijacked. His Facebook page           the loss which it has caused. But
                 was modified to show a status         some of Bryan’s friends had fallen
                 that said “BRYAN IS IN                to this trap during a short time. One
                 URGENT NEED ON HELP!!”                of them had remitted a total of
                 Then the hacker sent out              $1200 to a Western Union in
                 messages to his friends as they       London. His friend Beny send $600
                 came online, saying that he was       in the same way immediately heard
                 robbed at gunpoint in London          it, and the next day she received a
                 and was in desperate need of          message from the impostor
                 money to get home. Bryan’s            begging for more money. It also
                 daughter who at first paid a little   occurred to other people, according
                 was the first person to notice the    to reports, there are 257 people
                 change in status and brought it       occurred the similar cases which
How cybercrime   up to her father.                     caused a loss of $1 million or more.
happen
LOGO




The simplest and most effective way to protect your
information is to avoid putting so much information on
your own blogs or the SNS. People may just want to show
what happened to them or what they saw today, they never
know how serious if the information falls into the wrong
hands. Comparing showing off your colorful life and
encountering cybercrime through SNS, we all know our life
and property safety is more important.


Protect ourselves
in SNS
                                                  Thinking before posting
                                     something, choosing SNS carefully, and being
                                     selective when accepting friend requirements,
                                     etc.
LOGO



     Social Network sites should be a platform
     to communicate with others. It shouldn’t
     have been like this. The government
     should lay down some effective laws to
     protect privacy information. Other than
     that, the best way to protect ourselves is
     not putting too much private information
     on SNS.



  To cybercrime, let us say:

Protect ourselves
in SNS
LOGO


•   "Criminal Use of Social Media." NW3C.com. N.p., 2011. Web. 13 Nov. 2012.
    <http://www.nw3c.org/news/news-press>.

•   Hong, Pangchun, ChowShing Yu, Liubo Ping, Wanhok Man, and Yuenka Wa. "Computer Crime on Social
           Network Service." Google.com. N.p., Apr. 2012. Web.15.Nov.2012.
    <http://www.google.com/url?sa=t&rct=j&q=Computer+crime+on+social+network+service&source=web&
    cd=4&ved=0CD0QFjAD&url=http%3A%2F%2Fwww.se.cuhk.edu.hk%2F~chpang%2FCMSC5723(2012)
    report05.pdf&ei=Au6qUPSMK-SqyAGOsYGQBg&usg=AFQjCNEQx9xPo-fnMK-Q58CStX-JGOWFIw>.

•   Murphy, Samanth. "Facebook Crimes on the Rise, Experts Warn." Fox News. FOX News Network,
             11Aug.2011.Web.11.Nov.2012. <http://www.foxnews.com/tech/2011/08/11/facebook-crimes-on-
    rise-experts-warn/>.

More Related Content

What's hot

Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013KanelandSvihlik
 
internet safety 2013
internet safety 2013internet safety 2013
internet safety 2013Brian Downey
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpumajcullishpum
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014KanelandSvihlik
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for childrenKumar Manish
 
Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)Dan Lohrmann
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsCreepSquash
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Shreedeep Rayamajhi
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers
 
Pll Summit 2012 Social Media Collaboration Public Version
Pll Summit 2012 Social Media Collaboration Public VersionPll Summit 2012 Social Media Collaboration Public Version
Pll Summit 2012 Social Media Collaboration Public Versioncreynolds2009
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital IdentityDigital-identity
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Cyberstalking dangers
Cyberstalking dangersCyberstalking dangers
Cyberstalking dangersrangashree
 

What's hot (18)

KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
internet safety 2013
internet safety 2013internet safety 2013
internet safety 2013
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
 
Internet safety presentation 2014
Internet safety presentation 2014Internet safety presentation 2014
Internet safety presentation 2014
 
Safe Social Networking Handout
Safe Social Networking HandoutSafe Social Networking Handout
Safe Social Networking Handout
 
Online safety for children
Online safety for childrenOnline safety for children
Online safety for children
 
Myspace
MyspaceMyspace
Myspace
 
Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)Freedom-and-Responsibility-Dan-Lohrmann (3)
Freedom-and-Responsibility-Dan-Lohrmann (3)
 
Social networking fraud handout june 2011
Social networking fraud handout june 2011Social networking fraud handout june 2011
Social networking fraud handout june 2011
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
 
Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...Learn internet governance initiative child online safety by shreedeep rayamaj...
Learn internet governance initiative child online safety by shreedeep rayamaj...
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Pll Summit 2012 Social Media Collaboration Public Version
Pll Summit 2012 Social Media Collaboration Public VersionPll Summit 2012 Social Media Collaboration Public Version
Pll Summit 2012 Social Media Collaboration Public Version
 
Disadvantages of Digital Identity
Disadvantages of Digital IdentityDisadvantages of Digital Identity
Disadvantages of Digital Identity
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Cyberstalking dangers
Cyberstalking dangersCyberstalking dangers
Cyberstalking dangers
 

Viewers also liked

Aging in Place: Housing Washington 2014 Conference SLIDE DECK
Aging in Place: Housing Washington 2014 Conference SLIDE DECKAging in Place: Housing Washington 2014 Conference SLIDE DECK
Aging in Place: Housing Washington 2014 Conference SLIDE DECKAaron D. Murphy, Architect / CAPS
 
Network rail projects
Network rail projectsNetwork rail projects
Network rail projectsSuj Kang
 
Game of performance - Message Brokers behind the scenes
Game of performance - Message Brokers behind the scenesGame of performance - Message Brokers behind the scenes
Game of performance - Message Brokers behind the scenesPiotr Pasich
 
устюгова катя 145 группа
устюгова катя 145 группаустюгова катя 145 группа
устюгова катя 145 группаKatya Ustyugova
 
васькин мнск13
васькин мнск13васькин мнск13
васькин мнск13vaskinyy
 
Beautiful condos and townhomes for sale in Sooke, BC
Beautiful condos and townhomes for sale in Sooke, BCBeautiful condos and townhomes for sale in Sooke, BC
Beautiful condos and townhomes for sale in Sooke, BCSukhjit Randhawa
 
Beautiful condos and townhomes for sale in Sooke, BC
Beautiful condos and townhomes for sale in Sooke, BCBeautiful condos and townhomes for sale in Sooke, BC
Beautiful condos and townhomes for sale in Sooke, BCSukhjit Randhawa
 
Fundamentals of IP - Francesco Maria Colacino
Fundamentals of IP - Francesco Maria ColacinoFundamentals of IP - Francesco Maria Colacino
Fundamentals of IP - Francesco Maria Colacinomds-web
 
iSnap Social Marketing Presentation
iSnap Social Marketing PresentationiSnap Social Marketing Presentation
iSnap Social Marketing PresentationSnapShare Photo
 
SpreadIT - Make your project SOLID!
SpreadIT - Make your project SOLID! SpreadIT - Make your project SOLID!
SpreadIT - Make your project SOLID! Piotr Pasich
 

Viewers also liked (17)

Aging in Place: Housing Washington 2014 Conference SLIDE DECK
Aging in Place: Housing Washington 2014 Conference SLIDE DECKAging in Place: Housing Washington 2014 Conference SLIDE DECK
Aging in Place: Housing Washington 2014 Conference SLIDE DECK
 
Network rail projects
Network rail projectsNetwork rail projects
Network rail projects
 
Aging in Place: Housing is the HUB of Success - 090415
Aging in Place: Housing is the HUB of Success - 090415Aging in Place: Housing is the HUB of Success - 090415
Aging in Place: Housing is the HUB of Success - 090415
 
Project templates, Copy & Paste
Project templates, Copy & Paste Project templates, Copy & Paste
Project templates, Copy & Paste
 
Game of performance - Message Brokers behind the scenes
Game of performance - Message Brokers behind the scenesGame of performance - Message Brokers behind the scenes
Game of performance - Message Brokers behind the scenes
 
Sharing Workflows
Sharing Workflows Sharing Workflows
Sharing Workflows
 
устюгова катя 145 группа
устюгова катя 145 группаустюгова катя 145 группа
устюгова катя 145 группа
 
Time management
Time managementTime management
Time management
 
Assure1
Assure1Assure1
Assure1
 
Users in casual
Users in casualUsers in casual
Users in casual
 
васькин мнск13
васькин мнск13васькин мнск13
васькин мнск13
 
Beautiful condos and townhomes for sale in Sooke, BC
Beautiful condos and townhomes for sale in Sooke, BCBeautiful condos and townhomes for sale in Sooke, BC
Beautiful condos and townhomes for sale in Sooke, BC
 
Beautiful condos and townhomes for sale in Sooke, BC
Beautiful condos and townhomes for sale in Sooke, BCBeautiful condos and townhomes for sale in Sooke, BC
Beautiful condos and townhomes for sale in Sooke, BC
 
Task groups
Task groupsTask groups
Task groups
 
Fundamentals of IP - Francesco Maria Colacino
Fundamentals of IP - Francesco Maria ColacinoFundamentals of IP - Francesco Maria Colacino
Fundamentals of IP - Francesco Maria Colacino
 
iSnap Social Marketing Presentation
iSnap Social Marketing PresentationiSnap Social Marketing Presentation
iSnap Social Marketing Presentation
 
SpreadIT - Make your project SOLID!
SpreadIT - Make your project SOLID! SpreadIT - Make your project SOLID!
SpreadIT - Make your project SOLID!
 

Similar to Do not put too much information pdf

Do not put too much information
Do not put too much informationDo not put too much information
Do not put too much informationShangli Jiang
 
Cfadw presentation
Cfadw presentationCfadw presentation
Cfadw presentationguestf8d4d6f
 
SOCIAL Networking Sites
SOCIAL Networking SitesSOCIAL Networking Sites
SOCIAL Networking SitesAshley Surabhi
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social NetworkingBillBrenner70
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networksis20090
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social webPhil Cryer
 
Subject Matter
Subject MatterSubject Matter
Subject Matteremileeyy
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docxRAJU852744
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and postervictoriahoo
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxtodd521
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
SOCIAL MEDIA BRIEF HBGARY
SOCIAL MEDIA BRIEF HBGARYSOCIAL MEDIA BRIEF HBGARY
SOCIAL MEDIA BRIEF HBGARYAnOnM4niH4cK
 
social networking sites
social networking sitessocial networking sites
social networking sitesAnant Agarwal
 
So-Sial Networking
So-Sial NetworkingSo-Sial Networking
So-Sial NetworkingAlanGun Alan
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group projectbulgarej
 

Similar to Do not put too much information pdf (20)

Do not put too much information
Do not put too much informationDo not put too much information
Do not put too much information
 
Facebook
FacebookFacebook
Facebook
 
Cfadw presentation
Cfadw presentationCfadw presentation
Cfadw presentation
 
SOCIAL Networking Sites
SOCIAL Networking SitesSOCIAL Networking Sites
SOCIAL Networking Sites
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
 
Security Paper
Security PaperSecurity Paper
Security Paper
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
 
Is your data secure? privacy and trust in the social web
Is your data secure?  privacy and trust in the social webIs your data secure?  privacy and trust in the social web
Is your data secure? privacy and trust in the social web
 
Facebook
FacebookFacebook
Facebook
 
Subject Matter
Subject MatterSubject Matter
Subject Matter
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
SOCIAL MEDIA BRIEF HBGARY
SOCIAL MEDIA BRIEF HBGARYSOCIAL MEDIA BRIEF HBGARY
SOCIAL MEDIA BRIEF HBGARY
 
social networking sites
social networking sitessocial networking sites
social networking sites
 
So-Sial Networking
So-Sial NetworkingSo-Sial Networking
So-Sial Networking
 
Future of social networking group project
Future of social networking   group projectFuture of social networking   group project
Future of social networking group project
 
Social media project
Social media projectSocial media project
Social media project
 

Do not put too much information pdf

  • 1. Do not put too much private information on social network service By Shangli Jiang social network service opens a door for us to the whole world. On the contrary, it brings dangerous, too. When you looking at outside, do never forget that there must be shadow somewhere when there is sunshine.
  • 3. LOGO • Social Network Services have made communication between people not only convenient, but across the world speedily. It provides a wide platform for people to make new friends and express their feelings. People can know how their friends are going on immediately even though far from their locations. They think the SNSs are trustworthy so they put so much private information on the social network sites. According to the report of Criminal Use of Social Media, before 2012, there were 750 million users on Facebook, 500 million users on YouTube, and 200 million users on Twitter. About SNS
  • 4. LOGO an online security consulta named Ron Bowles shock everyone in 2010 by posti 100 million Facebook use personal information on t internet. Bowles used program to scan 500 milli Facebook profiles that w open to public. And finally got a numerous of user ID names, URLs and all oth About SNS privacy information a downloaded them
  • 5. LOGO Facebook, Youtube, Twitter, each of these social networking sites owns thousands of millions of users’ personal information. According to Hong, “Owning such a large user information database attacks the criminals and leads to a sharp increase of computer crime attacks on SNS.” Crimes, including social networking infrastructure attacks, malware attack, Phishing attacks, cyber bulling and identify theft can be performed to obtain sensitive personal information.
  • 6. LOGO • It is true that information was publicly available, but it shows the disadvantages of privacy in social networking sites. For many people it is annoying to set their profile privacy, so they face such kind of privacy information theft risk. Maybe people can be given some other suggestions like changing the profile privacy, not accepting friendship request from strangers, or not opening external suspicious links, etc. Does this way work? What we have known is that there is not real privacy on the internet; you can only make sure that some people won’t see your information. However, for some hackers, or computer whiz, getting your information is easy. The best way to protect ourselves is not to put too much private information on the internet, and then there is no way to get that. How cybercrime happen
  • 7. LOGO Your private information includes a lot of things: your account number, your password, your name, your age, your phone number, your amount of salary, your hobby, what car you have, what you do during weekends ……… How cybercrime happen And those information can be used to implement crimes!!! Like cheating people who know you. They can be another “you” in the world of internet.
  • 8. LOGO On January 21, 2009, a person whose name is Bryan Rutberg had his Facebook account It wasn’t until later did he realize hijacked. His Facebook page the loss which it has caused. But was modified to show a status some of Bryan’s friends had fallen that said “BRYAN IS IN to this trap during a short time. One URGENT NEED ON HELP!!” of them had remitted a total of Then the hacker sent out $1200 to a Western Union in messages to his friends as they London. His friend Beny send $600 came online, saying that he was in the same way immediately heard robbed at gunpoint in London it, and the next day she received a and was in desperate need of message from the impostor money to get home. Bryan’s begging for more money. It also daughter who at first paid a little occurred to other people, according was the first person to notice the to reports, there are 257 people change in status and brought it occurred the similar cases which How cybercrime up to her father. caused a loss of $1 million or more. happen
  • 9. LOGO The simplest and most effective way to protect your information is to avoid putting so much information on your own blogs or the SNS. People may just want to show what happened to them or what they saw today, they never know how serious if the information falls into the wrong hands. Comparing showing off your colorful life and encountering cybercrime through SNS, we all know our life and property safety is more important. Protect ourselves in SNS Thinking before posting something, choosing SNS carefully, and being selective when accepting friend requirements, etc.
  • 10. LOGO Social Network sites should be a platform to communicate with others. It shouldn’t have been like this. The government should lay down some effective laws to protect privacy information. Other than that, the best way to protect ourselves is not putting too much private information on SNS. To cybercrime, let us say: Protect ourselves in SNS
  • 11. LOGO • "Criminal Use of Social Media." NW3C.com. N.p., 2011. Web. 13 Nov. 2012. <http://www.nw3c.org/news/news-press>. • Hong, Pangchun, ChowShing Yu, Liubo Ping, Wanhok Man, and Yuenka Wa. "Computer Crime on Social Network Service." Google.com. N.p., Apr. 2012. Web.15.Nov.2012. <http://www.google.com/url?sa=t&rct=j&q=Computer+crime+on+social+network+service&source=web& cd=4&ved=0CD0QFjAD&url=http%3A%2F%2Fwww.se.cuhk.edu.hk%2F~chpang%2FCMSC5723(2012) report05.pdf&ei=Au6qUPSMK-SqyAGOsYGQBg&usg=AFQjCNEQx9xPo-fnMK-Q58CStX-JGOWFIw>. • Murphy, Samanth. "Facebook Crimes on the Rise, Experts Warn." Fox News. FOX News Network, 11Aug.2011.Web.11.Nov.2012. <http://www.foxnews.com/tech/2011/08/11/facebook-crimes-on- rise-experts-warn/>.