SlideShare una empresa de Scribd logo
1 de 10
Social Media Privacy~Your Responsibilities Introduction There are virtually thousand of social media platforms that users can actively engage in and participate online.  By doing so they are essentially trusting that platform with personal information about themselves. In order to be successful in maintaining the integrity of their personal information, they must be responsible users of the services. Several studies conducted conclude that: 1) Most users are unaware of how their info is used (85%) 2) Most users don’t know how to protect their online info 3) Most users trust that their privacy is maintained 4) Most users access more than one social media platform Awad and Krishnan 2008, Gross and Acquisti 2005, White 2010, PEW Trust Report 2000, Krishnamurthy and Willis 2008)
Social Media Privacy Settings~Harris Poll Taken from http://www.marketingcharts.com/direct/younger-see-more-socnet-..... …..benefit-15761/harris-social-media-privacy-settings-jan11gif/
Steps in Safeguarding Your Privacy Anti-Virus Software		2)  Beware Of Phishing Setup Safeguards			4)  Don’t Chat With Strangers Wipe Clean			6)  Clear Private Data 7)    Log Off Facebook Privacy Settings~4 Simple Steps On the Facebook homepage click Account (pull-down at top right)  Select Privacy Settings (a menu choice)  Select Customize Settings (click link)  Choose one of the following:   		a) Everyone 		b) Friends of Friends 			c) Friends Only
26% 23% FB users don’t know  about FB privacy controls or care  how to use them Parents posted photos & info about their kids 7% 5% Users access 3rd party applications while on Facebook Have listed their full addresses
Third party Application Programming Interfaces (API’s) “HMM, TO GET SUPERPOKE, I HAVE TO INSTALL “SUPERPOKE EXTREME” “OH COOL, SOMEONE POKED ME” “TO INSTALL SUPERPOKE EXTREME, YOU MUST ALLOW ACCESS TO SOME OF YOUR INFO…” “WHAT THE??? DISPLAY ALL INTERNET ACTIVITY, PUBLISH ALL MY PASSWORDS, SHOW ALL INTERNET BANKING, DISPLAY ALL MEDICAL RECORDS AND LIST MY MEDICATIONS?” “DAMN, I’D REALLY LIKE TO SEE THAT POKE!” “THIS IS PRIVACY OUTRAGE!!” “OK, INSTALL SUPERPOKE EXTREME” CLICK
Third party Application Programming Interfaces (API’s) An application programming interface (API) is a particular set of rules and specifications that a software program can follow to access and make use of the services and resources provided  by another particular software program that implements that API. It serves as an interface between different software programs and facilitates their interaction, similar to the way the user interface facilitates interaction between humans and computers. (http://en.wikipedia.org/wiki/API/ accessed 4/11/11) Popular Examples Include: Java, DirectX, Carbon & Cocoa  for Macintosh, GroupTweet, Farmville, Like/ Dislike, StumbleUpon, Ghacks, Voyage
Third party Application Programming Interfaces (API’s) Main Idea: Third party apps and services can improve the core service significantly. Users do need to make sure on the other hand that they check the permissions and authorizations regularly, to block apps and services that they no longer use. This reduces the risk of information theft, account tampering and of other malicious activities significantly WARNING DISCLAIMER!!! Third party services can only access your data only if it is authorized by the user. There exists dangers regardless if maximum security efforts are exercised. Once access has been granted developers could sell their product to another company or their service could be hacked or high-jacked and there is the possibility that you authorize malicious services or tools unknowingly.
Social Media Privacy~Your Responsibilities A BRIEF STATMENT Using social media is a choice, and like with any choice come benefits and drawbacks. Users can greatly reduce their drawbacks by being conscientious and responsible users  when using social media. Simple immediate steps can be the difference between being hacked or even hacked to pieces…… (just kidding) ,[object Object]
Check the privacy settings on ALL social media being used
Never give out  private information unless you trust the sourceRemember: The only tried and true solution to social network privacy and security issues is to limit your presence altogether. Don't post anything you wouldn't mind telling a complete stranger, because in reality that's the potential for access. - Brendan Collins

Más contenido relacionado

La actualidad más candente

Google plus 10 mar15
Google plus 10 mar15Google plus 10 mar15
Google plus 10 mar15Naval OPSEC
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14Naval OPSEC
 
Instagram Policy primer
Instagram Policy primerInstagram Policy primer
Instagram Policy primerRhiJohn
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats mohamad Hamizi
 
2011 Social Media Malware Trends
2011 Social Media Malware Trends2011 Social Media Malware Trends
2011 Social Media Malware TrendsLumension
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices mohamad Hamizi
 
COVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comCOVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comPentest-Tools.com
 
4 mobile security threats companies must look out for
4 mobile security threats companies must look out for4 mobile security threats companies must look out for
4 mobile security threats companies must look out forHouse of IT
 
5 must-have security testing tools for your pentesting tasks
5 must-have security testing tools for your pentesting tasks5 must-have security testing tools for your pentesting tasks
5 must-have security testing tools for your pentesting tasksPentest-Tools.com
 
Online Policy Primer Twitter
Online Policy Primer TwitterOnline Policy Primer Twitter
Online Policy Primer Twitterguestb39306
 
4 ways to defend against internal attacks
4 ways to defend against internal attacks4 ways to defend against internal attacks
4 ways to defend against internal attacksCourion Corporation
 
10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness ProgramWiley
 
Mobile wallets 5 nov14
Mobile wallets 5 nov14Mobile wallets 5 nov14
Mobile wallets 5 nov14Naval OPSEC
 

La actualidad más candente (20)

Google plus 10 mar15
Google plus 10 mar15Google plus 10 mar15
Google plus 10 mar15
 
Towards detecting phishing web pages
Towards detecting phishing web pagesTowards detecting phishing web pages
Towards detecting phishing web pages
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
LinkedIn Smart Card
LinkedIn Smart CardLinkedIn Smart Card
LinkedIn Smart Card
 
Srishti
SrishtiSrishti
Srishti
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Instagram Policy primer
Instagram Policy primerInstagram Policy primer
Instagram Policy primer
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats
 
2011 Social Media Malware Trends
2011 Social Media Malware Trends2011 Social Media Malware Trends
2011 Social Media Malware Trends
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices
 
COVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comCOVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.com
 
4 mobile security threats companies must look out for
4 mobile security threats companies must look out for4 mobile security threats companies must look out for
4 mobile security threats companies must look out for
 
5 must-have security testing tools for your pentesting tasks
5 must-have security testing tools for your pentesting tasks5 must-have security testing tools for your pentesting tasks
5 must-have security testing tools for your pentesting tasks
 
Phishing & Pharming
Phishing & PharmingPhishing & Pharming
Phishing & Pharming
 
Online Policy Primer Twitter
Online Policy Primer TwitterOnline Policy Primer Twitter
Online Policy Primer Twitter
 
4 ways to defend against internal attacks
4 ways to defend against internal attacks4 ways to defend against internal attacks
4 ways to defend against internal attacks
 
10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program10 Steps to Creating a Corporate Phishing Awareness Program
10 Steps to Creating a Corporate Phishing Awareness Program
 
Mobile wallets 5 nov14
Mobile wallets 5 nov14Mobile wallets 5 nov14
Mobile wallets 5 nov14
 
Linkedln smart card
Linkedln smart cardLinkedln smart card
Linkedln smart card
 

Destacado

10 may presentation_by_ahmed_abdel_latif
10 may presentation_by_ahmed_abdel_latif10 may presentation_by_ahmed_abdel_latif
10 may presentation_by_ahmed_abdel_latifJulien Grollier
 
Clean enviroment in my home school.Kanykey TAG, Kyzyl-Kiya
Clean enviroment in my home school.Kanykey TAG, Kyzyl-KiyaClean enviroment in my home school.Kanykey TAG, Kyzyl-Kiya
Clean enviroment in my home school.Kanykey TAG, Kyzyl-KiyaKanykey
 
Mobifeed Aggregator
Mobifeed AggregatorMobifeed Aggregator
Mobifeed AggregatorGautam.M
 
1장, 2장 프로모션 관리 방통대_최종
1장, 2장 프로모션 관리 방통대_최종1장, 2장 프로모션 관리 방통대_최종
1장, 2장 프로모션 관리 방통대_최종경영 방송
 
Fotoalbum(2)+ani (nx power lite)
Fotoalbum(2)+ani (nx power lite)Fotoalbum(2)+ani (nx power lite)
Fotoalbum(2)+ani (nx power lite)VarganeAnny
 
Mecanismo focal
Mecanismo focalMecanismo focal
Mecanismo focallocus_
 
Alcsut (3)+ani (nx power lite)
Alcsut (3)+ani (nx power lite)Alcsut (3)+ani (nx power lite)
Alcsut (3)+ani (nx power lite)VarganeAnny
 
Tavaszváró(2)+ani (nx power lite)
Tavaszváró(2)+ani (nx power lite)Tavaszváró(2)+ani (nx power lite)
Tavaszváró(2)+ani (nx power lite)VarganeAnny
 
Customizing IBM Connections 3.0 - LS11 AD304
Customizing IBM Connections 3.0 - LS11 AD304Customizing IBM Connections 3.0 - LS11 AD304
Customizing IBM Connections 3.0 - LS11 AD304malexanderIBM
 
伊蕾娜.森德勒
伊蕾娜.森德勒伊蕾娜.森德勒
伊蕾娜.森德勒chengchunhao
 
The digestive system
The digestive systemThe digestive system
The digestive systemjennilyl
 

Destacado (20)

10 may presentation_by_ahmed_abdel_latif
10 may presentation_by_ahmed_abdel_latif10 may presentation_by_ahmed_abdel_latif
10 may presentation_by_ahmed_abdel_latif
 
Clean enviroment in my home school.Kanykey TAG, Kyzyl-Kiya
Clean enviroment in my home school.Kanykey TAG, Kyzyl-KiyaClean enviroment in my home school.Kanykey TAG, Kyzyl-Kiya
Clean enviroment in my home school.Kanykey TAG, Kyzyl-Kiya
 
Evaluation first part
Evaluation first partEvaluation first part
Evaluation first part
 
Lisboa
LisboaLisboa
Lisboa
 
spring
springspring
spring
 
Mobifeed Aggregator
Mobifeed AggregatorMobifeed Aggregator
Mobifeed Aggregator
 
1장, 2장 프로모션 관리 방통대_최종
1장, 2장 프로모션 관리 방통대_최종1장, 2장 프로모션 관리 방통대_최종
1장, 2장 프로모션 관리 방통대_최종
 
Fotoalbum(2)+ani (nx power lite)
Fotoalbum(2)+ani (nx power lite)Fotoalbum(2)+ani (nx power lite)
Fotoalbum(2)+ani (nx power lite)
 
Mecanismo focal
Mecanismo focalMecanismo focal
Mecanismo focal
 
Alcsut (3)+ani (nx power lite)
Alcsut (3)+ani (nx power lite)Alcsut (3)+ani (nx power lite)
Alcsut (3)+ani (nx power lite)
 
Jupiter ^^
Jupiter ^^Jupiter ^^
Jupiter ^^
 
Rafa 2
Rafa 2Rafa 2
Rafa 2
 
Retention
RetentionRetention
Retention
 
Tavaszváró(2)+ani (nx power lite)
Tavaszváró(2)+ani (nx power lite)Tavaszváró(2)+ani (nx power lite)
Tavaszváró(2)+ani (nx power lite)
 
Fresno BusTracker
Fresno BusTrackerFresno BusTracker
Fresno BusTracker
 
Customizing IBM Connections 3.0 - LS11 AD304
Customizing IBM Connections 3.0 - LS11 AD304Customizing IBM Connections 3.0 - LS11 AD304
Customizing IBM Connections 3.0 - LS11 AD304
 
伊蕾娜.森德勒
伊蕾娜.森德勒伊蕾娜.森德勒
伊蕾娜.森德勒
 
Hiring
HiringHiring
Hiring
 
The digestive system
The digestive systemThe digestive system
The digestive system
 
Happy new year
Happy new yearHappy new year
Happy new year
 

Similar a Social Media Privacy Tips

Organizations and individuals must be aware of the vulnerabilities o.docx
Organizations and individuals must be aware of the vulnerabilities o.docxOrganizations and individuals must be aware of the vulnerabilities o.docx
Organizations and individuals must be aware of the vulnerabilities o.docxhoney690131
 
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docxjoyjonna282
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrSurajGurushetti
 
Benefits and Risks of Social Technologies
Benefits and Risks of Social TechnologiesBenefits and Risks of Social Technologies
Benefits and Risks of Social TechnologiesAtle Skjekkeland
 
Hootsuite 5 step guide to social media security
Hootsuite 5 step guide to social media securityHootsuite 5 step guide to social media security
Hootsuite 5 step guide to social media securityFlutterbyBarb
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSchleighS
 
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfSafeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfCIOWomenMagazine
 
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...Nicola Osborne
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
Chapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and SafeguardsChapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and Safeguardslobnaqassem2
 
Unit2 lesson1 typesofdigitaltools
Unit2 lesson1 typesofdigitaltoolsUnit2 lesson1 typesofdigitaltools
Unit2 lesson1 typesofdigitaltoolsKeiko24
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summarySymantec Italia
 
Social Media Policy and Guidelines
Social Media Policy and GuidelinesSocial Media Policy and Guidelines
Social Media Policy and GuidelinesCurt Montague
 
Social media powerpoint presentation
Social media powerpoint presentationSocial media powerpoint presentation
Social media powerpoint presentationSlideegg
 

Similar a Social Media Privacy Tips (20)

Darkside
DarksideDarkside
Darkside
 
549 458-465
549 458-465549 458-465
549 458-465
 
Organizations and individuals must be aware of the vulnerabilities o.docx
Organizations and individuals must be aware of the vulnerabilities o.docxOrganizations and individuals must be aware of the vulnerabilities o.docx
Organizations and individuals must be aware of the vulnerabilities o.docx
 
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
 
Social media: Issues
Social media: Issues Social media: Issues
Social media: Issues
 
Benefits and Risks of Social Technologies
Benefits and Risks of Social TechnologiesBenefits and Risks of Social Technologies
Benefits and Risks of Social Technologies
 
Hootsuite 5 step guide to social media security
Hootsuite 5 step guide to social media securityHootsuite 5 step guide to social media security
Hootsuite 5 step guide to social media security
 
IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfSafeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
 
Cataloguing your friends and neighbours
Cataloguing your friends and neighboursCataloguing your friends and neighbours
Cataloguing your friends and neighbours
 
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Social Media Awareness
Social Media AwarenessSocial Media Awareness
Social Media Awareness
 
Chapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and SafeguardsChapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and Safeguards
 
Unit2 lesson1 typesofdigitaltools
Unit2 lesson1 typesofdigitaltoolsUnit2 lesson1 typesofdigitaltools
Unit2 lesson1 typesofdigitaltools
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summary
 
Social Media Policy and Guidelines
Social Media Policy and GuidelinesSocial Media Policy and Guidelines
Social Media Policy and Guidelines
 
Social media powerpoint presentation
Social media powerpoint presentationSocial media powerpoint presentation
Social media powerpoint presentation
 

Social Media Privacy Tips

  • 1. Social Media Privacy~Your Responsibilities Introduction There are virtually thousand of social media platforms that users can actively engage in and participate online. By doing so they are essentially trusting that platform with personal information about themselves. In order to be successful in maintaining the integrity of their personal information, they must be responsible users of the services. Several studies conducted conclude that: 1) Most users are unaware of how their info is used (85%) 2) Most users don’t know how to protect their online info 3) Most users trust that their privacy is maintained 4) Most users access more than one social media platform Awad and Krishnan 2008, Gross and Acquisti 2005, White 2010, PEW Trust Report 2000, Krishnamurthy and Willis 2008)
  • 2. Social Media Privacy Settings~Harris Poll Taken from http://www.marketingcharts.com/direct/younger-see-more-socnet-..... …..benefit-15761/harris-social-media-privacy-settings-jan11gif/
  • 3. Steps in Safeguarding Your Privacy Anti-Virus Software 2) Beware Of Phishing Setup Safeguards 4) Don’t Chat With Strangers Wipe Clean 6) Clear Private Data 7) Log Off Facebook Privacy Settings~4 Simple Steps On the Facebook homepage click Account (pull-down at top right) Select Privacy Settings (a menu choice) Select Customize Settings (click link) Choose one of the following: a) Everyone b) Friends of Friends c) Friends Only
  • 4. 26% 23% FB users don’t know about FB privacy controls or care how to use them Parents posted photos & info about their kids 7% 5% Users access 3rd party applications while on Facebook Have listed their full addresses
  • 5. Third party Application Programming Interfaces (API’s) “HMM, TO GET SUPERPOKE, I HAVE TO INSTALL “SUPERPOKE EXTREME” “OH COOL, SOMEONE POKED ME” “TO INSTALL SUPERPOKE EXTREME, YOU MUST ALLOW ACCESS TO SOME OF YOUR INFO…” “WHAT THE??? DISPLAY ALL INTERNET ACTIVITY, PUBLISH ALL MY PASSWORDS, SHOW ALL INTERNET BANKING, DISPLAY ALL MEDICAL RECORDS AND LIST MY MEDICATIONS?” “DAMN, I’D REALLY LIKE TO SEE THAT POKE!” “THIS IS PRIVACY OUTRAGE!!” “OK, INSTALL SUPERPOKE EXTREME” CLICK
  • 6. Third party Application Programming Interfaces (API’s) An application programming interface (API) is a particular set of rules and specifications that a software program can follow to access and make use of the services and resources provided by another particular software program that implements that API. It serves as an interface between different software programs and facilitates their interaction, similar to the way the user interface facilitates interaction between humans and computers. (http://en.wikipedia.org/wiki/API/ accessed 4/11/11) Popular Examples Include: Java, DirectX, Carbon & Cocoa for Macintosh, GroupTweet, Farmville, Like/ Dislike, StumbleUpon, Ghacks, Voyage
  • 7. Third party Application Programming Interfaces (API’s) Main Idea: Third party apps and services can improve the core service significantly. Users do need to make sure on the other hand that they check the permissions and authorizations regularly, to block apps and services that they no longer use. This reduces the risk of information theft, account tampering and of other malicious activities significantly WARNING DISCLAIMER!!! Third party services can only access your data only if it is authorized by the user. There exists dangers regardless if maximum security efforts are exercised. Once access has been granted developers could sell their product to another company or their service could be hacked or high-jacked and there is the possibility that you authorize malicious services or tools unknowingly.
  • 8.
  • 9. Check the privacy settings on ALL social media being used
  • 10. Never give out private information unless you trust the sourceRemember: The only tried and true solution to social network privacy and security issues is to limit your presence altogether. Don't post anything you wouldn't mind telling a complete stranger, because in reality that's the potential for access. - Brendan Collins
  • 12. References http://www.fastcompany.com/articles/2008/10/social-networking-security.html?page=0%2C1 http://thetechjournal.com/internet/social-community/people-use-facebook-44-and-twitter-29-for-social-sharing.xhtml http://en.wikipedia.org/wiki/API http://en.wikipedia.org/wiki/Facebook_Platform http://www.marketingcharts.com/direct/younger-see-more-socnet-benefit-15761/harris-social-media-privacy-settings-jan11gif/ http://socialmediagraphics.posterous.com/internet-privacy http://www.adrants.com/2010/05/data-advertising-privacy-key.php http://www.squidoo.com/howtousefacebook http://www.technewsworld.com/story/69158.html