ppt on social networking

Embed Size (px)

Citation preview

  • 7/27/2019 ppt on social networking

    1/37

  • 7/27/2019 ppt on social networking

    2/37

    A social networkingserviceis an online

    service, platform, or sitethat focuses on buildingand reflecting of socialnetworks or social

    relations among people,who, for example, shareinterests and/oractivities.

  • 7/27/2019 ppt on social networking

    3/37

    Social networking siteis thephrase used to describe any Websitethat enables users to createpublic profiles within that Website and form relationships withother users of the same Web site

    who access their profile. Socialnetworking sites can be used todescribe community-based Websites, online discussions forums,

    chatrooms and other social spacesonline.

    http://www.webopedia.com/TERM/W/Web_site.htmlhttp://www.webopedia.com/TERM/W/Web_site.htmlhttp://www.webopedia.com/TERM/W/Web_site.htmlhttp://www.webopedia.com/TERM/W/Web_site.html
  • 7/27/2019 ppt on social networking

    4/37

    SOME TOP SOCIAL NETWORKING SITES

  • 7/27/2019 ppt on social networking

    5/37

    KEY PLAYERS

    Facebook

    Founded: 2004

    No. of users: 600 millionRevenue: US$800 million

    Alexa Rank: 2

    Revenue from: Banner ads, referralmarketing, partnerships, brandingelements, virtual currency

  • 7/27/2019 ppt on social networking

    6/37

    KEY PLAYERS

    LinkedIn

    Founded: 2002

    No. of users: 100+ millionRevenue: US$161.4 million (Jan. Sep. 2010)

    Alexa Rank: 18

    Revenue from: premium accounts, hiringservices, advertisements, partnerships,Google AdSense

  • 7/27/2019 ppt on social networking

    7/37

    KEY PLAYERS

    Myspace

    Founded: 2003

    No. of users: 100+ millionRevenue: US$385 million (2009 est.)

    Alexa Rank: 68

    Revenue from: advertisements, GoogleAdSense

  • 7/27/2019 ppt on social networking

    8/37

    KEY PLAYERS

    Orkut

    Founded: 2004

    No. of users: 120 millionAlexa Rank: 106

    Revenue from: advertisements

  • 7/27/2019 ppt on social networking

    9/37

    WHY DO WE USE SOCIAL NETWORKING

    WEBSITES?

    Majority of people use Facebook and Myspace to keep intouch with friends and Family.

    Social Networking websites are also used to meet up newpeople all around the world and socialize.

    Social Networking websites can be used to find our oldfriends by searching their profiles over those websites.

    Facilitates open communication, leading to enhancedinformation discovery and delivery.

    Social Networking websites are also used by businesses for

    marketing of their products. Allows employees to discuss ideas, post news, ask

    questions and share links.

  • 7/27/2019 ppt on social networking

    10/37

    Provides an opportunity to widen business contacts. Targets a wide audience, making it a useful and effective

    recruitment tool.

    Improves business reputation and client base with minimal useof advertising.

    Expands market research, implements marketing campaigns,delivers communications and directs interested people to specificweb sites.

  • 7/27/2019 ppt on social networking

    11/37

    NEGATIVE ASPECTS OF SOCIAL NETWORKING

    Privacy Issues

    Addiction

    Diminishing Social Skills

  • 7/27/2019 ppt on social networking

    12/37

    PRIVACY ISSUES

    1. Providing a lot of Information: To use these sites, users have toprovide quite a lot of personal information. While this is true, manyof the issues surrounding privacy occur when there is much morethan the biodata normally required.

    2. Because of the great amount of identity-relevant information, itsmakes it easier to destroy someone's reputation on these socialnetworking websites.

    3. Social Network sites have financial incentives to generate revenuefrom the information users upload. The company uses informationfrom users profile, create their marketing profiles and serve themwith targeted ads, leaving users vulnerable to harms.

    4. Information spreads faster through a Social Network Sites thanthrough a real-life network. Information might be disclosed to agroup of people unexpectedly, because the digital information iseasy copy able, can be stored indefinitely and is searchable.

  • 7/27/2019 ppt on social networking

    13/37

    ADDICTION

    Despite claims of the benefits of being constantly in touch with friends,such slavish devotion to social networking sites can quickly lead to

    addiction.

    How users get Addicted ? It starts with the simpledesire to stay in touch with friends. Before long, according to manyusers, you find yourself connecting with many more people than youotherwise would. And this is where all that instant connectivity starts tohave a down side.

    Stalking :Curiosity about what someones doing may start

    innocently enough, but it can easily get out of hand. This can not only betime-consuming, its also unhealthy.

  • 7/27/2019 ppt on social networking

    14/37

    How to tell If you are addicted to Social Networkwebsites Checked Facebook first thing in the morning, before you

    shower or have your morning coffee?

    Woke up in the middle of the night and checked Facebook to

    see if youve been mentioned? Felt like something is missing when you go on vacation and

    cant check social media accounts?

    Spent more time interacting with people on social sites thanin person !

    Filled up your friends Facebook walls with your own posts?;)

  • 7/27/2019 ppt on social networking

    15/37

    DIMINISHING SOCIAL SKILLS

    1. Health Problems: As people spend increasing amounts of time onsocial networks, they experience less face-to-face interaction,this leads to social isolation and is the cause of many physicaland psychological problems.

    2. Diminishing Social Skills: Heavy use of electronic communicationssuch as email, social networking has diminished kids' and adults'social skills. Critics believe that written communications and

    interaction via devices will erode people's ability to interactcomfortably and thoughtfully in each other's presence.

  • 7/27/2019 ppt on social networking

    16/37

    REASONS TO HATE FACEBOOK

  • 7/27/2019 ppt on social networking

    17/37

    UNFORTUNATELY

    There are many negative effects associated

    with the use of facebook.

    Lower School Performance

    Job Termination

    Not Physically Being There is Bad

    No Sleep is No Good You Dont Want EVERYTHING Revealed

  • 7/27/2019 ppt on social networking

    18/37

    TYPES OF SOCIAL NETWORKERS

    Alpha Socialisers (a minority) people who

    used sites in intense short bursts to flirt,meet

    new people, and be entertained.

    Attention Seekers (some) people who

    craved attention and comments from

    others,often by posting photos and

    customising their profiles. Followers (many) people who joined sites to

    keep up with what their peers were doing.

  • 7/27/2019 ppt on social networking

    19/37

    TYPES OF SOCIAL NETWORKERS(CONTI.)

    Faithfuls(many) people who typically used

    social networking sites to rekindle old

    friendships, often from school or university.

    Functionals(a minority) people who tended

    to be single-minded in using sites for a

    particular purpose.

  • 7/27/2019 ppt on social networking

    20/37

  • 7/27/2019 ppt on social networking

    21/37

  • 7/27/2019 ppt on social networking

    22/37

    A generalized definition of cyber crime may be unlawfulacts wherein the computer is either a tool or target oroth.

    Any criminal activity that uses a computer either as aninstrumentality target or a means for perpetuatingfurther crimes comes within the ambit of cyber rime Cyber crime is known by lots of different names including

    computer crime e-crime or electronic crime.

    INTRODUCTION

  • 7/27/2019 ppt on social networking

    23/37

    IndianCrimeSceneThe major Cyber Crimes reported, in

    India, are Denial of Services, Defacement ofWebsites, Spam, Com puter Virus and Worms,

    Pornography, Cyber Squatting, Cyber Stalkingand Phishing.

    Given the fact that nearly 120 millionworth of Mobiles are being lost or stolen in the

    country every year, the users have to protectInformation, Contact details and Telephone

    numbers as these could be misused. Nearly 69per cent of information theft is carried out bycurrent and ex-employees and 31 per cent by

    hackers. India has to go a long way in protectingthe vital information.

  • 7/27/2019 ppt on social networking

    24/37

    Cyber Crime Varian ts

    Hacking" Hacking" is a cr ime, wh ich entai ls

    cracking systems and gain ing

    unauthor ized access to the data sto red in

    them. Hackin g had witn essed a 37 per centinc rease this year.

    Cyber Squatt ingCyber Squatt ing is the act of register ing a

    famou s Domain Name and th en sel l ing itfor a fortune. This is an issue that has not

    been tackled in IT ACT 2000.

  • 7/27/2019 ppt on social networking

    25/37

    Phishing is just one of the many frauds onthe Internet, trying to fool people intoparting with their money. Phishing refers tothe receipt of unsolicited emails bycustomers of Financial Institutions,requesting them to enter their Username,Password or other personal information toaccess their Account for some reason.The fraudster then has access to thecustomer s online bank account and to thefunds contained in that account.

  • 7/27/2019 ppt on social networking

    26/37

    Cyber Stalk ing is use of the Internet or

    other electronic m eans to s talk

    someone. This term is used

    interchangeably w ith onl ine

    harassm ent and on l ine abuse.

    Stalk ing general ly invo lves harassing

    or th reatening behaviou r that an

    ind iv idual engages in repeatedly, suchas fol low ing a person, appearing at a

    person's home or place of bus iness,

    making harass ing phone calls , leaving

    w ri t ten messages o r ob jects, or'

  • 7/27/2019 ppt on social networking

    27/37

    Vishing is the criminal practice of usingsocial engineering and Voice over IP

    (VoIP) to gain access to private personaland financial information from thepublic for the purpose of financialreward. The term is a combination of

    oi e and phishing. Vishing exploitsthe public's trust in landline telephone

    services.Vishing is typically used to steal credit

    card numbers or other information usedin identity theft schemes from

    individuals.

    VISHING

  • 7/27/2019 ppt on social networking

    28/37

    Software Piracy -Theft of software through the illegalcopying of genuine programs or the counterfeiting anddistribution of products intended to pass for the original.The unauthorized copying of software.

  • 7/27/2019 ppt on social networking

    29/37

    India stands 11th in the ranking for Cyber Crime inthe World, constituting 3% of the Global Cyber

    Crime.

  • 7/27/2019 ppt on social networking

    30/37

    The major i ty o f cybercr imes are centered on forgery,

    f raud and Phishing ,

    India is the thi rd-mos t targeted country fo r Phishing

    attacks after the US and th e UK,

    Social network s as well as ecommerce si tes are major

    targets, 6.9 m il l ion bot- infected s ys tems in 2010,

    14,348 webs ite defacements in 2010,

    6,850 .in and 4,150 .com domains were defaced du ring

    2011, 15,000 sites hacked in 2011,

    yber rime In India

  • 7/27/2019 ppt on social networking

    31/37

    Cyber Laws in IndiaUnder The InformationTechnology Act, 2000CHAPTER XI OFFENCES 66. Hacking with

    com puter system.

    (1) Whoever with the Intentto cause or knowingthat he is likely to cause Wrongfu l Loss orDamage to the public or any person Destroys orDeletes o r Alters any Info rmat ion Residing in a

    Computer Resourceor diminishes its value orutility or affects it injuriously by any means,

    commits hack.

    (2) Whoever commits hacking shall be punished with imprisonment up to three years,or with fine which may extend up to two lakh rupees, or with both.

  • 7/27/2019 ppt on social networking

    32/37

    S.66A - Punishment for sending offensive messages throughcommunication service etc Any person who sends by means of a computer resource or acommunication device; Any information that is grossly offensive or has menacingcharacter; or Any information which he knows to be false but for the

    purpose of causing annoyance inconvenience danger obstructioninsult injury criminal intimidation enmity hatred or ill willpersistently makes by making use of such computer resource or acommunication device; Any electronic mail or electronic mail message for the purpose of

    causing annoyance or inconvenience or to deceive or to misleadthe addressee or recipient about the origin of such messages;

    Shall be punishable with imprisonment for a term which may extendto three years and with fine.

  • 7/27/2019 ppt on social networking

    33/37

    S. 66C - Punishment for identity theftWhoever fraudulently or dishonestly make use of the

    electronic signature, password or any other unique identificationfeature of any other person, shall be punished with imprisonmentof either description for a term which may extend to three yearsand shall also be liable to fine which may extend to rupees onelakhS. 66D - Punishment for cheating by personation by usingcomputer resource

    Whoever by means of any communication device orcomputer resource cheats by personation, shall be punished withimprisonment of either description for a term which may extendto three years and shall also be liable to fine which may extend toone lakh rupees.

  • 7/27/2019 ppt on social networking

    34/37

    S. 66E - Punishment for violation of privacy.Whoever intentionally or knowingly captures publishes or

    transmits the image of a private area of any person without his orher consent under circumstances violating the privacy of thatperson shall be punished with imprisonment which may extend tothree years or with fine not exceeding two lakh rupees or withbothS. 67 A - Punishment for publishing or transmittingof material containing sexually explicit act etc. inelectronic formWhoever publishes or transmits or causes to be published ortransmitted in the electronic form any material which containssexually explicit act or conduct shall be punished on first convictionwith imprisonment of either description for a term which mayextend to five years and with fine which may extend to ten lakh

    rupees

  • 7/27/2019 ppt on social networking

    35/37

    How to Tack le Such Act iv i t ies?

    An impo r tant quest ion arises that how can these cr imes be

    prevented. A number of techniqu es and solu t ions have been

    presented but the prob lems s t i l l exists and are increasing day by

    day.

    An t iv i rus And Ant i Spyware Software:

    ntivirussof tw are cons ists of computer programs that at tempt toident i fy, thwart and el im inate compu ter virus es and o ther mal ic ious

    so ftware. An ti spy w ares are used to restr ict backd oor p rogram ,

    trojans and oth er sp y wares to be instal led on the computer.

    Firewal ls:A firewal l protects a com pu ter netwo rk from u nautho r ized access.

    Network f i rewal ls may be hardware devices, software prog rams, or a

    combinat ion of th e two. A netwo rk f i rewal l typ ical ly guards an

    internal computer netwo rk against mal ic ious access from outs ide the

    network.

  • 7/27/2019 ppt on social networking

    36/37

    Cryptography:Cryptography is the science of encrypting and decryptinginformation. Encryption is like sending a postal mail to anotherparty with a lock code on the envelope which is known only tothe sender and the recipient. A number of cryptographicmethods have been developed and some of them are still notcracked.

    Cyber Ethics and Laws:Cyber ethics and cyber laws are also being formulated to stopcyber crimes. It is a responsibility of every individual to followcyber ethics and cyber laws so that the increasing cyber crimesshall reduce. Security Software like Anti Viruses and Anti SpyWares should be installed on all computers in order to remainsecure from Cyber Crimes. Internet Service Providers should alsoprovide high level of security at their servers in order to keeptheir clients secure from all types of viruses and maliciousprograms.

  • 7/27/2019 ppt on social networking

    37/37

    THANK YOU