Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
3Activity
0 of .
Results for:
No results containing your search query
P. 1
Social Networking Sites: A Target for Abuse

Social Networking Sites: A Target for Abuse

Ratings:

4.0

(1)
|Views: 358 |Likes:
Published by iovation
The Web’s built-in anonymity makes member identification difficult, and accountability nearly impossible. Consequently, the industry has been an easy target for spammers, scammers and predators. These offenders pose as someone they are not and prey on unsuspecting members, causing emotional and financial harm to members while tarnishing the reputation of the site.

iovation focuses on the scammers’ device
as the nexus of their activities and exposes them by accurately identifying their device across social networking
sites and beyond.
The Web’s built-in anonymity makes member identification difficult, and accountability nearly impossible. Consequently, the industry has been an easy target for spammers, scammers and predators. These offenders pose as someone they are not and prey on unsuspecting members, causing emotional and financial harm to members while tarnishing the reputation of the site.

iovation focuses on the scammers’ device
as the nexus of their activities and exposes them by accurately identifying their device across social networking
sites and beyond.

More info:

Published by: iovation on Apr 03, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

12/13/2012

pdf

text

original

 
 
Social NetworkingSites:
A Target for Abuse
Online social networking has exploded in popularity. In just a few short years, it has inuenced the way we
socialize and interact with one other across the globe. This growth has attracted abusive and predatory behavior.
The Web’s built-in anonymity makes member identication difcult, and accountability nearly impossible.
Consequently, the industry has been an easy target for spammers, scammers and predators. These offenders
pose as someone they are not and prey on unsuspecting members, causing emotional and nancial harm to
members while tarnishing the reputation of the site. However, it is the loss of 
trust 
in this burgeoning industry that
is the greatest threat. Whether measured in tarnished reputations, operational inefciency, or dollars lost, the
effective control of abusive activities needs vigilance when operating a social networking Web site.Social networking sites must also be responsive to regulatory pressures related to the more serious childpredation and harassment issues. The industry has been accused of allowing sexual predators to directly solicitkids. According to a recent Youth Internet Safety Survey, online harassment and cyber bullying of youth grew 50%from 2000 to 2006.“After an extensive search for a solution that would give us the desired level of security and protection, iovationwas the clear choice for us. By proactively identifying known fraudsters and their devices across iovation’sreputation network, we can better prevent fraudulent activities and inappropriate behavior that can impact the
integrity of our site, and most importantly, our members’ trust, condence and satisfaction.”
- Grant Carter, PresidentCapazoo.com
How iovation ReputationManager
works
Nothing beats fraud like iovation
NuisanceCriminal
Abusive Language/Bullying Spam Scam/Financial Fraud Predatory Behavior
Spectrum of abuse facing Social Networks
 
Benets
 Increase
protability
Increase operational
efciency
protect sitereputationExposes scammers and helps sites keepthem out without impacting good members
Reduces abusive behavior, such as spamand chat abuse
Shuts down the revolving door of scammers
Protect site reputation and increasesmembers’ trust and satisfaction
Reduces payment and chargeback fraud
 
Increases efciency and reduces
operational costs of screening for abusers
Enables geographic risk assessment
Can share evidence of known abusers amongnetworking sites and beyond
Helps with existing and emerging regulatoryrequirements
How iovation ReputationManager
works
The table below highlights the benets cited most often by existing iovation customers:
iovation ReputationManager is the only proven online abuse and fraud management solution that can provide thislevel of protection for any Web site and for the industry as a whole. iovation focuses on the scammers’ deviceas the nexus of their activities and exposes them by accurately identifying their device across social networking
sites and beyond. When abusive behavior is detected against a device or proles/account on a site, all associateddevices and proles on that site can be quickly exposed and agged at once to prevent repeat offenders fromhiding behind multiple proles and devices. The information can be shared with other subscribing sites for pro-
active protection against scammers.
Solution: iovation ReputationManager 
As one networking site executive lamented-- “we identify IP addresses originating from certain countries as a highrisk. Now we are seeing IP addresses being used from the United States. So it’s essentially someone overseasworking with someone in the States who, let’s say, has an AOL or Comcast account, and they are working in
tandem. It makes it more difcult for us to detect them.”
Scammers are typically repeat offenders and target multiple sites. Once detected, they return using a different
prole/identity. The industry needs a solution that can detect and shut down scammers so they can’t hide behindchanging proles and cause harm even when they are visiting a site for the rst time.

Activity (3)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Sabrina Kiprawi liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->