Академический Документы
Профессиональный Документы
Культура Документы
relations among people, who, for example, share interests and/or activities.
phrase used to describe any Web site that enables users to create public profiles within that Web site and form relationships with other users of the same Web site who access their profile. Social networking sites can be used to describe community-based Web sites, online discussions forums, chatrooms and other social spaces online.
KEY PLAYERS
Facebook Founded: 2004 No. of users: 600 million Revenue: US$800 million Alexa Rank: 2 Revenue from: Banner ads, referral marketing, partnerships, branding elements, virtual currency
KEY PLAYERS
LinkedIn Founded: 2002 No. of users: 100+ million Revenue: US$161.4 million (Jan. Sep. 2010) Alexa Rank: 18 Revenue from: premium accounts, hiring services, advertisements, partnerships, Google AdSense
KEY PLAYERS
Myspace Founded: 2003 No. of users: 100+ million Revenue: US$385 million (2009 est.) Alexa Rank: 68 Revenue from: advertisements, Google AdSense
KEY PLAYERS
Orkut Founded: 2004 No. of users: 120 million Alexa Rank: 106 Revenue from: advertisements
Majority of people use Facebook and Myspace to keep in touch with friends and Family. Social Networking websites are also used to meet up new people all around the world and socialize. Social Networking websites can be used to find our old friends by searching their profiles over those websites. Facilitates open communication, leading to enhanced information discovery and delivery. Social Networking websites are also used by businesses for marketing of their products. Allows employees to discuss ideas, post news, ask questions and share links.
Provides an opportunity to widen business contacts. Targets a wide audience, making it a useful and effective recruitment tool. Improves business reputation and client base with minimal use of advertising. Expands market research, implements marketing campaigns, delivers communications and directs interested people to specific web sites.
Privacy Issues
Addiction
PRIVACY ISSUES
1.
2.
3.
4.
Providing a lot of Information: To use these sites, users have to provide quite a lot of personal information. While this is true, many of the issues surrounding privacy occur when there is much more than the biodata normally required. Because of the great amount of identity-relevant information, its makes it easier to destroy someone's reputation on these social networking websites. Social Network sites have financial incentives to generate revenue from the information users upload. The company uses information from users profile, create their marketing profiles and serve them with targeted ads, leaving users vulnerable to harms. Information spreads faster through a Social Network Sites than through a real-life network. Information might be disclosed to a group of people unexpectedly, because the digital information is easy copy able, can be stored indefinitely and is searchable.
ADDICTION
Despite claims of the benefits of being constantly in touch with friends, such slavish devotion to social networking sites can quickly lead to addiction.
It starts with the simple desire to stay in touch with friends. Before long, according to many users, you find yourself connecting with many more people than you otherwise would. And this is where all that instant connectivity starts to have a down side. Curiosity about what someones doing may start innocently enough, but it can easily get out of hand. This can not only be time-consuming, its also unhealthy.
Stalking :
Checked Facebook first thing in the morning, before you shower or have your morning coffee? Woke up in the middle of the night and checked Facebook to see if youve been mentioned? Felt like something is missing when you go on vacation and cant check social media accounts? Spent more time interacting with people on social sites than in person ! Filled up your friends Facebook walls with your own posts? ;)
social networks, they experience less face-to-face interaction, this leads to social isolation and is the cause of many physical and psychological problems.
2.
such as email, social networking has diminished kids' and adults' social skills. Critics believe that written communications and interaction via devices will erode people's ability to interact comfortably and thoughtfully in each other's presence.
UNFORTUNATELY
There are many negative effects associated with the use of facebook. Lower School Performance Job Termination Not Physically Being There is Bad No Sleep is No Good You Dont Want EVERYTHING Revealed
INTRODUCTION
A generalized definition of cyber crime may be unlawful acts wherein the computer is either a tool or target or both . Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime Cyber crime is known by lots of different names, including computer crime, e-crime, or electronic crime.
Cyber Squatting
Cyber Squatting is the act of registering a famous Domain Name and then selling it for a fortune. This is an issue that has not been tackled in IT ACT 2000.
Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason. The fraudster then has access to the customer's online bank account and to the funds contained in that account.
Cyber Stalking is use of the Internet or other electronic means to stalk someone. This term is used interchangeably with online harassment and online abuse. Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or
VISHING
Vishing is the criminal practice of using social engineering and Voice over IP (VoIP) to gain access to private personal and financial information from the public for the purpose of financial reward. The term is a combination of Voice" and phishing. Vishing exploits the public's trust in landline telephone services. Vishing is typically used to steal credit card numbers or other information used in identity theft schemes from individuals.
India stands 11th in the ranking for Cyber Crime in the World, constituting 3% of the Global Cyber Crime.
Cyber Crime
In India
The majority of cybercrimes are centered on forgery, fraud and Phishing, India is the third-most targeted country for Phishing attacks after the US and the UK, Social networks as well as ecommerce sites are major targets, 6.9 million bot-infected systems in 2010, 14,348 website defacements in 2010, 6,850 .in and 4,150 .com domains were defaced during 2011, 15,000 sites hacked in 2011,
(2) Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both.
S.66A
purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device; causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages;
Shall be punishable with imprisonment for a term which may extend to three years and with fine.
Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees.
S. 67 A
Whoever publishes or transmits or causes to be published or transmitted in the electronic form any material which contains sexually explicit act or conduct shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to ten lakh rupees
Firewalls:
A firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices, software programs, or a combination of the two. A network firewall typically guards an internal computer network against malicious access from outside the network.
Cryptography:
Cryptography is the science of encrypting and decrypting information. Encryption is like sending a postal mail to another party with a lock code on the envelope which is known only to the sender and the recipient. A number of cryptographic methods have been developed and some of them are still not cracked.
Cyber ethics and cyber laws are also being formulated to stop cyber crimes. It is a responsibility of every individual to follow cyber ethics and cyber laws so that the increasing cyber crimes shall reduce. Security Software like Anti Viruses and Anti Spy Wares should be installed on all computers, in order to remain secure from Cyber Crimes. Internet Service Providers should also provide high level of security at their servers in order to keep their clients secure from all types of viruses and malicious programs.
THANK YOU!!