Fake Users and Spam Destroying Value of Social Media - Slide 2

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Fake Users and Spam Destroying Value of Social Media-2 Next

Online ID registration fraud: Overstating how many users a site or service really has. Fraudulent accounts ranged from a low of five percent to an astonishing 40 percent on audited sites. The percentage depended on the site, perceived account value to spammers, and ease of account registration.

A new quarterly index based on data collected by social spam fighter Impermium finds social Web spam and abuse is now posing significant reputation risk and cost to Internet businesses that depend on public user profiles.

"Most companies will be shocked to see how rampant user registration fraud is on their site," says Mark Risher, CEO of Impermium. "Bulk accounts for most popular social networks can now be purchased on the black market for pennies. This type of fraud has many significant ramifications, including a company's ability to accurately value its user base and determine the actual cost of new customer acquisition."

The data comes from the inaugural Impermium Social Spam Index, the industry's first resource for regularly published data on social Web spam and abuse trends. The following trends are based on a 100-consecutive-day sample of the social Web between June and August, conducted by researchers at Impermium Corporation. Impermium analyzed 104 million pieces of user-generated content (UGC) on social networks, blogs and social bookmarking sites from a base of 90 million users spread across 72 countries.

More Slideshows:

How Password Savvy Are You?Test your password acumen with these 10 questions.

Nine Instant Messaging Best PracticesEssential etiquette rules for instant messaging.

Five Mistakes Companies Make in Their Cloud StrategiesLearn how to capture the full potential of the cloud.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.