1. Social Media Privacy~Your Responsibilities Introduction There are virtually thousand of social media platforms that users can actively engage in and participate online. By doing so they are essentially trusting that platform with personal information about themselves. In order to be successful in maintaining the integrity of their personal information, they must be responsible users of the services. Several studies conducted conclude that: 1) Most users are unaware of how their info is used (85%) 2) Most users don’t know how to protect their online info 3) Most users trust that their privacy is maintained 4) Most users access more than one social media platform Awad and Krishnan 2008, Gross and Acquisti 2005, White 2010, PEW Trust Report 2000, Krishnamurthy and Willis 2008)
2. Social Media Privacy Settings~Harris Poll Taken from http://www.marketingcharts.com/direct/younger-see-more-socnet-..... …..benefit-15761/harris-social-media-privacy-settings-jan11gif/
3. Steps in Safeguarding Your Privacy Anti-Virus Software 2) Beware Of Phishing Setup Safeguards 4) Don’t Chat With Strangers Wipe Clean 6) Clear Private Data 7) Log Off Facebook Privacy Settings~4 Simple Steps On the Facebook homepage click Account (pull-down at top right) Select Privacy Settings (a menu choice) Select Customize Settings (click link) Choose one of the following: a) Everyone b) Friends of Friends c) Friends Only
4. 26% 23% FB users don’t know about FB privacy controls or care how to use them Parents posted photos & info about their kids 7% 5% Users access 3rd party applications while on Facebook Have listed their full addresses
5. Third party Application Programming Interfaces (API’s) “HMM, TO GET SUPERPOKE, I HAVE TO INSTALL “SUPERPOKE EXTREME” “OH COOL, SOMEONE POKED ME” “TO INSTALL SUPERPOKE EXTREME, YOU MUST ALLOW ACCESS TO SOME OF YOUR INFO…” “WHAT THE??? DISPLAY ALL INTERNET ACTIVITY, PUBLISH ALL MY PASSWORDS, SHOW ALL INTERNET BANKING, DISPLAY ALL MEDICAL RECORDS AND LIST MY MEDICATIONS?” “DAMN, I’D REALLY LIKE TO SEE THAT POKE!” “THIS IS PRIVACY OUTRAGE!!” “OK, INSTALL SUPERPOKE EXTREME” CLICK
6. Third party Application Programming Interfaces (API’s) An application programming interface (API) is a particular set of rules and specifications that a software program can follow to access and make use of the services and resources provided by another particular software program that implements that API. It serves as an interface between different software programs and facilitates their interaction, similar to the way the user interface facilitates interaction between humans and computers. (http://en.wikipedia.org/wiki/API/ accessed 4/11/11) Popular Examples Include: Java, DirectX, Carbon & Cocoa for Macintosh, GroupTweet, Farmville, Like/ Dislike, StumbleUpon, Ghacks, Voyage
7. Third party Application Programming Interfaces (API’s) Main Idea: Third party apps and services can improve the core service significantly. Users do need to make sure on the other hand that they check the permissions and authorizations regularly, to block apps and services that they no longer use. This reduces the risk of information theft, account tampering and of other malicious activities significantly WARNING DISCLAIMER!!! Third party services can only access your data only if it is authorized by the user. There exists dangers regardless if maximum security efforts are exercised. Once access has been granted developers could sell their product to another company or their service could be hacked or high-jacked and there is the possibility that you authorize malicious services or tools unknowingly.
10. Never give out private information unless you trust the sourceRemember: The only tried and true solution to social network privacy and security issues is to limit your presence altogether. Don't post anything you wouldn't mind telling a complete stranger, because in reality that's the potential for access. - Brendan Collins