Friday, March 18, 2011

Guest Post - Intern Stephanie Graziano

Intern: Stephanie Graziano
Topic: Teens and young adults- implication from social networking
In a world where people have become so consumed and adapted to social networking on a daily basis, it is overlooked that a person’s shared information on these sites can be used in ways to hurt or ruin their lives, and there’s no taking it back. 

Internship Outline #1
Version 1.0
Date: 3 March 2011


SUMMARY PARAGRAPH:
·       Social Networking has become a large trend for teenagers and young adults. With these sites becoming more popular by the day, it is important to raise awareness to the sites users about the consequences that can come from sharing too much personal information with others. Each user needs to be careful about what he or she posts on their site profiles, and they need to know how to properly protect their privacy and security.


BACKGROUND
The sites, Facebook, MySpace, Twitter, and many others have morphed themselves into every teenager and young adult’s daily routine, and not always to better his or her lifestyle. Sites like these that encourage its users to upload photos and videos and share personal information with their friends and family. The problem with these applications is that this information is not always used in a positive manner. Teenagers and young adults don’t understand the consequences that come from posting personal information and how their posts can increase exposure to people that sometimes have less than friendly intentions. Social networking users need to be educated on how to better protect their security and privacy while using these sites.
The phrase that became a nightly question in everyone’s household, “It’s 10 p.m. do you know where your children are?” has now been revolutionized thanks to social networking sites. The phrase should start including the question as to whether parents know what their children doing and exactly who are their children are talking with online. Today, parents feel inferior to the Internet because it holds so much power, and with kids starting to use the Internet at such a young age, some as young as five and six, parents feel less confident in knowing what’s available on the Internet.  It is becoming more important everyday to educate parents of young teens and adults of the serious consequences that come from being an active member of social networking sites. 


STRATEGIC PLANNING ASSUMPTIONS:
·      Parents should stay educated about these different social networking sites that attract their children to the computer every day.
·      School systems around the country should educate their students as well as their public about the risks and consequences that come from sharing too much information on social networking sites.
·      School systems should hold classes or conferences for their students to better help them in providing safer profiles on their preferred site. 


ANALYSIS:
Education seems to be one of the leading ways to reduce the implications that come from teenagers and young adults using social networking without understanding the consequences. If school systems and parents focused on this issue with their teenagers, these sites could be considered much safer. Social networking has picked up within the last few years and it has certainly become a part of our nation’s everyday life with smart phones enabling these sites to be at our finger tips. With users not fully understanding how sharing too much on their profiles could affect their future, we need to be educated on the proper ways to display our information.


In the article titled, “Police detective warns about dark side of the Internet,” Detective Rebekah Lynch stated that “Over 90 percent of American teens use the Internet and 75 percent of them have cell phones. There are social networking sites such as Facebook, chat rooms, e-mail, blogs, file sharing and gaming. Predators use all these to contact and connect with your kids. The Internet is the most efficient tool ever designed for sex predators.” Lynch explained that a predator can be anyone they choose to be online, anyone that may seem appealing to others, and users may never the truth. This is a valid point that social networking users may not be contacting who they think they are. A younger user can come into contact with a stranger via social networking and that person can seem friendly and kind; but on the other side of the networking site, that younger user could be chatting with a sex offender. Lynch went on to discuss that it is vital for parents to educate the children about the dangers of social networking, and to stress to never give out information such as a telephone number or address.


IMPLICATIONS:
·      Those who talked to people they didn’t know were significantly more likely to be aged 16-24 (22% of those with a social networking page or profile) than 25-34 (7% of those with a profile).
·      17% of adult users said they talked to people on social networking sites that they didn’t know and 35% spoke to people who were “friends of friends”
·      Having too many Facebook 'friends' and access to different social capital disrupt the sharing process due to experiences of social surveillance and social control. This social control often forces younger people in particular to use conformity as a strategy when sharing content to maintain their privacy.
·      Younger and older adults display completely open public profiles without realizing it.


KEY FINDINGS
·      Taking the statistic that states that 17% of adult users of social networking don’t know other uses who they keep in contact with, I find it interesting that after the news that has been reported about the risks social networking opens, users still find it not harmful to stay in touch with strangers through the internet (On Guard Online).
·      On Guard Online states in their article that 22% of 16-24 year olds using social networking do not know who they are sharing their information with. It is that exact age range that is most at risk for facing invasion of privacy from strangers. This age group needs the education about the dangerous side effects of sharing too much.
·      The article, “Too Many Facebook 'Friends'? Content Sharing and Sociability Versus the Need for Privacy in Social Network Sites,” states many social networking users display completely open profiles and do not realize it. This is an important example of why users need to fully understand what they are signing up for. Their profiles could hold information about their personal lives which may not be beneficial to have others know.


RECOMMENDATIONS
1)    More advanced privacy settings.
a)     Using the site Facebook as an example, as of right now each user is offered to change their privacy settings to how they see fit. Meaning they can set up their profile to each one of their friends in a different way. One friend may be able to view photos, but another may only be able to view their hobbies. If Facebook were to encourage young users to have their profiles be overseen by their parents, then it may be possible for Facebook to allow anyone who is under the age of 18 to only access their Facebook profile, through their parents own profile; that way, teenagers cannot post anything on their pages without their parents’ consent or without them knowing.
2)    Help inform teenagers and young adults of the consequences that come from posting personal information and photos.
a)     Before signing up to create a profile, each user should be educated on the site about the risks they are taking if they post too much information about themselves. Educate the users on how to safely share their information, before they create their profile.
SOURCES:
1. On Guard Online, Quick Facts, September 2007
2. WkiDot, Social Media Statistics
3. Ebsco Host, “Too Many Facebook 'Friends'? Content Sharing and Sociability Versus the Need for Privacy in Social Network Sites”  [International Journal of Human-Computer Interaction]
Authors: Brandtzæg,  Petter,  Luders, Marika, Skjetne, Jan Håvard
4. “Police detective warns about dark side of the Internet”
Author:  Nikki Patrick_morningsun.net 
.      

Friday, February 25, 2011

Apple and Viruses. Guest Post by Spring Intern - Michael Senatore


Intern:  Michael Senatore
Topic:  Apple and Viruses
Internship Outline #1
Version 1.0
Date:  25 February 2011

TEASER / TITLE
For years, Apple products have had one up on the PC regarding viruses and malware.  However, due to increased market share, that time may be coming to an end. 

SUMMARY PARAGRAPH
Throughout the history of Apple products there has been a long standing consumer myth that they are incapable of becoming infected with viruses.  Most believe that the Mac Operating System was simply more secure than that of PC.  Although the system may be more secure, it is still vulnerable to malware and other infections.  One needs to look no further than the fact that Apple sells anti-virus software from many of the leading names in the virus protection industry.  What really gave Apple its edge was their lack of market penetration, a result of occupying a small portion of the computer sales industry.  Simply put, if you want to catch a fish, you go to the pond with the most fish.  That “pond” has always been PC’s.  However, along with their growing popularity and rise in market share, Apple products are becoming more vulnerable to viruses and other harmful infections.

BACKGROUND
The myth that Apple products are impervious to viruses is almost like a virus in and of itself.  Only instead of infecting Apple products, it is infecting the way Apple users think about the product.  This “myth” continues to mislead Apple users into believing they are safe from viruses and there is no need for anti-virus programming.  Unfortunately, life would just be too simple if this was the case. From reading forums and discussing the topic with owners of Apple products, it is blatantly obvious that Apple users are completely unaware of the harm to which they are exposing their computers.
            Currently there are several types of viruses that can potentially harm Apple products.  One of the main areas of concern is downloading files that are infected with Trojan horses, spyware, and worms.  These types of files can be found on pirated software and games.  Versions of Microsoft Office infected with viruses can also infect Mac products using the program.  Also, browser plug-ins for viewing video content can harbor malware, making your Mac more vulnerable to other infections.  These problems are really just the beginning because they do not take into account the growth and success of Apple and their products. 

STRATEGIC PLANNING ASSUMPTIONS
-Apple, the company, must do a better job of informing their customers of the risk to their computers.  What was once a selling point, needs to now be addressed as a concern.
-Apple users need to become more educated.  They need to open their eyes to the problem and take appropriate action.
-Acquire an anti-virus program.  Many of the major anti-virus companies, such as McAfee, Intego, Norton and Symantec have all released programs for Apple products. 

ANALYSIS
The main reason for the recent increase in viruses infecting Apple products goes hand in hand with the success of the company.  In just the past two years, Apple has consumed nearly 3% of the entire computer sales in the United States, raising their overall market share to 10.4%.  Although that may not sound like a large increase, Apple’s annual growth is nearly off the charts.  Over those same two years, Apple’s year to year growth has been 24.1%, which dwarfs the overall industry’s growth of 3.8%.  With the wild popularity of the iPad, iPhone and other Apple products, this percentage will only continue to grow.
            In any business venture, success has its drawbacks, and this same theory can be applied to Apple and their current surge in the United States computer sales industry.  As stated previously, the idea that Apple products were incapable of being infected with viruses was a selling point.  Many businesses opted to use Apple computers for their convenience and savings that go along with not having to worry about viruses or spend more money on anti-virus programming.  While Apple products once enjoyed the safety of their own anonymity, they must now accept what comes along with their new found popularity. 

IMPLICATIONS
-The “myth” of Apple products not being able to contract viruses is simply not true.
-Apple has become a mainstay of the computer industry, holding a market share of nearly 11%, a figure which continues to rise.  As a result of the increased penetration, the most secure days of the Mac OS are in the past.
-The vulnerability of Apple products goes hand in hand with the success of the company, which is growing at a rate nearly eight times that of the rest of the computer industry.
-While the sales figures of HP and Dell have plateaued, Apple continues to grow at an annual growth rate of 24.1%.
-Apple currently holds the number four ranking in the computer sales industry, behind HP, Dell, and Acer.  Following market trends, by this time next year, Apple will be well ahead of Acer and catching up to HP and Dell. 
-Due to the wild success of the iPad, iPhone and the Mac OS, there are no signs of Apple’s growth slowing down.

KEY FINDINGS
-The majority of Apple users are completely unaware of the susceptibility of their computers when it comes to malware.  Stay informed with updates from Apple and other security upgrades.
-The easiest way to prevent computers from being infected with viruses is to stop them before they start.  We all know how difficult computers can be to work with when they are infected with any type of virus. 
-Nearly all the major anti-virus companies now sell programs for Apple products.  (A sign of things to come?)

RECOMMENDATIONS
-Verify that your computer is protected by an anti-virus program.  There are some free anti-virus programs available, such as iAntiVirus and ClamXav, however they are not considered as robust as the major companies such as McAfee, Intego, Norton and Symantec.
-Use common sense when surfing the web.  Do not visit websites that are not known to be secure and do not download files or documents from an unknown sender.  Also make sure your virus scanner and security updates are frequently updated with the newest protection.
-Stay ahead of the curve by educating yourself with the current viruses and other problems infecting computers. 
-Happy surfing!


SOURCES
“Do Apple Computers Need Virus Protection”.  Robin Noelle.  eHow.com.  April 1, 2010.
“Apple’s Share of Computer Sales Surpasses 10% in the U.S.”.  Eric Slivka.  Macrumors.com.  October 13, 2010.
“Hey Apple, About This Virus Thing”.  Steven Hodson.  WinExtra.com.  April 27, 2010.
“Antivirus Software On Your Mac:  Yes or No?”.  David Greenbaum.  Gigaom.com.  February 4, 2011.  

Friday, January 28, 2011

Egypt Protests and Social Networking Site Access Impacted

Scanning Twitter feeds this week, I saw several posts that talked about what was going on Egypt with the caveat that they were posting for someone in Egypt.  This is because the government of Egypt allegedy blocked Facebook and Twitter after a series of anti-government protests.  Facebook was aware of disruptions in service but said it did not experience a major change in traffic.

In the CNET News article the had a quote from Jim Cowie from the internet monitoring firm, Renesys:  "at approximately 2:34pm PST, his company 'observed the virtually simultaneous withdrawal of all routes to Egyptian networks in the internet's global routing table'.  "

@Scobleizer posted:  Egypt "Let's turn off the one thing keeping young people inside so they will stop protesting." Um, yeah, that really will work.

Secretary of State Hillary Clinton called on Egypt to unblock social networking sites, she asked them "not to prevent peaceful protests or block communications, including on social media".

Sources:
"US Tells Egypt to unblock Facebook, Twitter", TodayOnline, January 28, 2011.

"Twitter Reacts To Protests In Egypt", Liz McLellan, Huffington Post, January 28, 2011.

"Egypt internet outages hit Facebook and Twitter", Elinor Mills, CNET News, January 28, 2011.

Expanding Internet Access in the U.S.

"Within the next five years, we will make it possible for business to deploy the next generation of high-speed wireless coverage to 98% of all Americans."

Could interconnecting rural areas via an internet highway fuel existing economies and create new business models?  It could be part of the equation but just adding internet access is not the final solution.

At a minimum, to make this happen, we will probably need to:
1.  To encourage the television industry to give up some of their bandwidth to make it available for wireless.

2.  Provide incentives, read your tax dollars, would need to be teed up to encourage firms to lay more cable for landline access to the internet.

3.  Update the policies and inventory of the airwaves, who gets to use them, and what they get used for.

4.  Discuss policy questions such as:  If the Government drives the build out, does that mean they control and manage the newly built internet access?

Sources:
State of the Union Speech, President Obama, January 25, 2011.

"Obama Aims to Boost Infrastructure Spending", Josh Mitchell, Wall Street Journal, January 26, 2011.

"Obama Pushes Expanding High - Speed Wireless Service", Reuters, New York Times, January 26, 2011.

Do you use the Facebook "Like" Button? You Might Become Part of an Ad.

Many of us use the "like" button on our friend's posts and even when visiting company sites.

If you click on a "like" button for a store or brand, Facebook plans to incorporate your "like" into generating a "Sponsored Story" for advertisers that want to pay for it.

Once you "like" something, Facebook does not offer a way for you to opt out of your "like" being featured in an ad.

The one limit is does have is if you have set your privacy settings for your posts and limit who can see them, when the company buys a sponsored ad, only the people you authorized to see that original post can see it.




Sources:
"Facebook to let advertisers republish user posts", Barbara Ortutay, Associated Press, January 26, 2011.

Did Someone Hack Into Microsoft to Release Earnings Early?

Brian Caulfield found that a company called Selerity got Microsoft's earnings early, before they were officially announced.  But they did not hack their way in or steal them, they just guess the name of webpage, or URL, that had the earnings posted on them.

There is a fairly common practice to create web pages that are published and live, just not yet linked to main pages.  The pages exist, you just have to know how to find them.

The Selerity company actually searches for earnings releases using technology to try to guess the earnings webpage name.

Selerity reported Microsoft's earnings at 2:50 EST.  Microsoft usually reports them at the close of the stock market.


Sources:
"How Selerity Got Microsoft’s Earnings Early", Brian Caulfield, Shiny Objects on Blogs.Forbes.com, January 27, 2011.

If it sounds too good to be true, it probably is

Emails from McDonald's are making the rounds and it's very exciting.  Take a McDonald's survey and get $250 for participating.  The problem is, the email is not legitimate.  It was generated by cybercreeps who want to steal your information.

How it works:
1.  Take a 5 question survey
2.  To "win" your $250, provide your personal information AND your credit card so they will "credit" your account (warning!  warning!)

Tips to spot and avoid scams:
1.  Most surveys, if they offer everyone something, usually give you a nominal amount on a gift card or coupons for a free item
2.  If a company asks for your personal information along with credit card or bank account to "give" you money, it's most likely a scam
3.  Pay attention to the language used - does it sound like the company?  In this case, the message mentions that you are taking a "public opinion poll conducted by McDonald's, a non-partisan polling organization."  I appreciate the fact that the Golden Arches feels food should transcend political parties but that statement does not make sense.

Many thanks to Tony Bradley for highlighting this phishing scam!

Sources:

"McDonald's Phishing Scam: I'm Not Lovin' It", Tony Bradley, PCWorld, January 21, 2011.