SlideShare a Scribd company logo
1 of 10
Social Internet TECH621 Security Concerns with Privacy in Social Media P Kenie Moses Spring 2011 urdue University
Outline ,[object Object]
Statement of Purpose
Research Question
Presentation, Relevance & Importance of Results
Conclusion & Recommendations,[object Object]
Research Purpose ~ Research Questions The purpose of this research is gain an understanding into user’s perceived responsibilities when using social media. This, in turn, will help develop an enlightened approach to how users can better equip themselves to manage the privacy of their social identity. How can social media users enable themselves to be better users by reducing risk? In what ways can one facilitate awareness among social media users to offset diminishing privacy restrictions and security protocols?
Previous Empirical Research Results
Current Research Results Facebook Facebook Account Hacked Facebook Security/Privacy Topic Profile: Facebook, Social Media Security & Privacy. Keywords:api, account hacked, privacy breach, viruses Sentiment Subjects:facebook, privacy Regions: United States Languages: English
Current Research Results Relevance Previous Research ,[object Object], versus decreased concern of privacy/ security and personal information access Current Research ,[object Object], information breaches (92% security/ privacy breaches) ,[object Object],  controls (only 5% mention concerns of how to change settings) ,[object Object],[object Object]

More Related Content

Viewers also liked

2006 a novel lipoxygenase in pea roots. its function
2006 a novel lipoxygenase in pea roots. its function2006 a novel lipoxygenase in pea roots. its function
2006 a novel lipoxygenase in pea roots. its functionAgrin Life
 
Spotlight on learning_digital_storytelling_rlevine
Spotlight on learning_digital_storytelling_rlevineSpotlight on learning_digital_storytelling_rlevine
Spotlight on learning_digital_storytelling_rlevinereisa101
 
Kazakstan lu2014 ossiannilsson
Kazakstan lu2014 ossiannilssonKazakstan lu2014 ossiannilsson
Kazakstan lu2014 ossiannilssonEbba Ossiannilsson
 
Efquel eMOOC stakeholders summit 2014 ossiannilsson
Efquel eMOOC stakeholders summit 2014 ossiannilssonEfquel eMOOC stakeholders summit 2014 ossiannilsson
Efquel eMOOC stakeholders summit 2014 ossiannilssonEbba Ossiannilsson
 
2007 differential expression of the tfiiia regulatory
2007 differential expression of the tfiiia regulatory2007 differential expression of the tfiiia regulatory
2007 differential expression of the tfiiia regulatoryAgrin Life
 
2010 food security measurement in cultural pluralism
2010 food security measurement in cultural pluralism2010 food security measurement in cultural pluralism
2010 food security measurement in cultural pluralismAgrin Life
 
РИФ 2016, Видео в регионах. Быстрый рост. Основные маркеры.
РИФ 2016, Видео в регионах. Быстрый рост. Основные маркеры.РИФ 2016, Видео в регионах. Быстрый рост. Основные маркеры.
РИФ 2016, Видео в регионах. Быстрый рост. Основные маркеры.Тарасов Константин
 
Guia del blog de trens
Guia del blog de trensGuia del blog de trens
Guia del blog de trensLeylo
 
Invito14maggio Strumenti Social E Web 2.0 Per La Competitività Di Artigiani E...
Invito14maggio Strumenti Social E Web 2.0 Per La Competitività Di Artigiani E...Invito14maggio Strumenti Social E Web 2.0 Per La Competitività Di Artigiani E...
Invito14maggio Strumenti Social E Web 2.0 Per La Competitività Di Artigiani E...Nordestcreativo social business club
 
Transport tot nadenken
Transport tot nadenkenTransport tot nadenken
Transport tot nadenkenPantopicon
 
Ossiannilsson 131024 eadtu Presentation on disstance students attitudes to th...
Ossiannilsson 131024 eadtu Presentation on disstance students attitudes to th...Ossiannilsson 131024 eadtu Presentation on disstance students attitudes to th...
Ossiannilsson 131024 eadtu Presentation on disstance students attitudes to th...Ebba Ossiannilsson
 
Group members
Group membersGroup members
Group membersNINANC
 
Ossiannilsson ngl14 oer_sverige
Ossiannilsson ngl14 oer_sverigeOssiannilsson ngl14 oer_sverige
Ossiannilsson ngl14 oer_sverigeEbba Ossiannilsson
 

Viewers also liked (20)

2006 a novel lipoxygenase in pea roots. its function
2006 a novel lipoxygenase in pea roots. its function2006 a novel lipoxygenase in pea roots. its function
2006 a novel lipoxygenase in pea roots. its function
 
Radian6 nanohub
Radian6 nanohubRadian6 nanohub
Radian6 nanohub
 
Spotlight on learning_digital_storytelling_rlevine
Spotlight on learning_digital_storytelling_rlevineSpotlight on learning_digital_storytelling_rlevine
Spotlight on learning_digital_storytelling_rlevine
 
Kazakstan lu2014 ossiannilsson
Kazakstan lu2014 ossiannilssonKazakstan lu2014 ossiannilsson
Kazakstan lu2014 ossiannilsson
 
Efquel eMOOC stakeholders summit 2014 ossiannilsson
Efquel eMOOC stakeholders summit 2014 ossiannilssonEfquel eMOOC stakeholders summit 2014 ossiannilsson
Efquel eMOOC stakeholders summit 2014 ossiannilsson
 
2007 differential expression of the tfiiia regulatory
2007 differential expression of the tfiiia regulatory2007 differential expression of the tfiiia regulatory
2007 differential expression of the tfiiia regulatory
 
2010 food security measurement in cultural pluralism
2010 food security measurement in cultural pluralism2010 food security measurement in cultural pluralism
2010 food security measurement in cultural pluralism
 
РИФ 2016, Видео в регионах. Быстрый рост. Основные маркеры.
РИФ 2016, Видео в регионах. Быстрый рост. Основные маркеры.РИФ 2016, Видео в регионах. Быстрый рост. Основные маркеры.
РИФ 2016, Видео в регионах. Быстрый рост. Основные маркеры.
 
Twitter Libya
Twitter LibyaTwitter Libya
Twitter Libya
 
Literature Review
Literature ReviewLiterature Review
Literature Review
 
Guia del blog de trens
Guia del blog de trensGuia del blog de trens
Guia del blog de trens
 
writing for the web
writing for the webwriting for the web
writing for the web
 
Invito14maggio Strumenti Social E Web 2.0 Per La Competitività Di Artigiani E...
Invito14maggio Strumenti Social E Web 2.0 Per La Competitività Di Artigiani E...Invito14maggio Strumenti Social E Web 2.0 Per La Competitività Di Artigiani E...
Invito14maggio Strumenti Social E Web 2.0 Per La Competitività Di Artigiani E...
 
Transport tot nadenken
Transport tot nadenkenTransport tot nadenken
Transport tot nadenken
 
Portfolio
PortfolioPortfolio
Portfolio
 
Session 13
Session 13Session 13
Session 13
 
Ossiannilsson 131024 eadtu Presentation on disstance students attitudes to th...
Ossiannilsson 131024 eadtu Presentation on disstance students attitudes to th...Ossiannilsson 131024 eadtu Presentation on disstance students attitudes to th...
Ossiannilsson 131024 eadtu Presentation on disstance students attitudes to th...
 
Group members
Group membersGroup members
Group members
 
Ossiannilsson ngl14 oer_sverige
Ossiannilsson ngl14 oer_sverigeOssiannilsson ngl14 oer_sverige
Ossiannilsson ngl14 oer_sverige
 
mockups prototypes
mockups prototypesmockups prototypes
mockups prototypes
 

Similar to Security Privacy Concerns Third Party APIs

Privacy and Security on Social Media
Privacy and Security on Social MediaPrivacy and Security on Social Media
Privacy and Security on Social MediaYogeshIJTSRD
 
Social Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsSocial Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsTheSRAOrg
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Kandy Woodfield
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...ijsptm
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSZac Darcy
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Anil Dhami
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingMicah Altman
 
Are we getting it right? Social media users' views on social media research
Are we getting it right? Social media users' views on social media researchAre we getting it right? Social media users' views on social media research
Are we getting it right? Social media users' views on social media researchTheSRAOrg
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
 
Web2.0 for research: The Spin, blag and blog.
Web2.0 for research: The Spin, blag and blog.Web2.0 for research: The Spin, blag and blog.
Web2.0 for research: The Spin, blag and blog.Dr Mariann Hardey
 
The “Meaningful Use” of Social Media by Physicians
The “Meaningful Use” of Social Media by PhysiciansThe “Meaningful Use” of Social Media by Physicians
The “Meaningful Use” of Social Media by Physiciansyan_stanford
 
July IAP: Confidential Information - Storage, Sharing, & Publication - with M...
July IAP: Confidential Information - Storage, Sharing, & Publication - with M...July IAP: Confidential Information - Storage, Sharing, & Publication - with M...
July IAP: Confidential Information - Storage, Sharing, & Publication - with M...Micah Altman
 
Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...Nicola Osborne
 

Similar to Security Privacy Concerns Third Party APIs (20)

Privacy and Security on Social Media
Privacy and Security on Social MediaPrivacy and Security on Social Media
Privacy and Security on Social Media
 
Social Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsSocial Media, Social Science and Research Ethics
Social Media, Social Science and Research Ethics
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
204
204204
204
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
 
Kt3518501858
Kt3518501858Kt3518501858
Kt3518501858
 
Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
 
Challenge of Technology Mediated Social Participation
Challenge of Technology Mediated Social ParticipationChallenge of Technology Mediated Social Participation
Challenge of Technology Mediated Social Participation
 
Are we getting it right? Social media users' views on social media research
Are we getting it right? Social media users' views on social media researchAre we getting it right? Social media users' views on social media research
Are we getting it right? Social media users' views on social media research
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
 
Web2.0 for research: The Spin, blag and blog.
Web2.0 for research: The Spin, blag and blog.Web2.0 for research: The Spin, blag and blog.
Web2.0 for research: The Spin, blag and blog.
 
The “Meaningful Use” of Social Media by Physicians
The “Meaningful Use” of Social Media by PhysiciansThe “Meaningful Use” of Social Media by Physicians
The “Meaningful Use” of Social Media by Physicians
 
July IAP: Confidential Information - Storage, Sharing, & Publication - with M...
July IAP: Confidential Information - Storage, Sharing, & Publication - with M...July IAP: Confidential Information - Storage, Sharing, & Publication - with M...
July IAP: Confidential Information - Storage, Sharing, & Publication - with M...
 
Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...
 

More from Dr. V Vorvoreanu

DIA2 Design requirements presentation personas
DIA2 Design requirements presentation personasDIA2 Design requirements presentation personas
DIA2 Design requirements presentation personasDr. V Vorvoreanu
 
07 principles 1 affordance
07 principles 1 affordance07 principles 1 affordance
07 principles 1 affordanceDr. V Vorvoreanu
 
HCDD for ASEE 2015 presentation
HCDD for ASEE 2015 presentationHCDD for ASEE 2015 presentation
HCDD for ASEE 2015 presentationDr. V Vorvoreanu
 
Responsive design UX intro
Responsive design UX introResponsive design UX intro
Responsive design UX introDr. V Vorvoreanu
 
Attention info scent recognition vs recall
Attention info scent recognition vs recallAttention info scent recognition vs recall
Attention info scent recognition vs recallDr. V Vorvoreanu
 
03 usability def designprocess
03 usability def designprocess03 usability def designprocess
03 usability def designprocessDr. V Vorvoreanu
 
UX Conceptual design - sketches, wireframes, mockups, prototypes
UX Conceptual design - sketches, wireframes, mockups, prototypesUX Conceptual design - sketches, wireframes, mockups, prototypes
UX Conceptual design - sketches, wireframes, mockups, prototypesDr. V Vorvoreanu
 
UX user-centered design process overview
UX user-centered design process overviewUX user-centered design process overview
UX user-centered design process overviewDr. V Vorvoreanu
 
26 social interaction design
26 social interaction design26 social interaction design
26 social interaction designDr. V Vorvoreanu
 
Sketches wireframes mockups prototypes
Sketches wireframes mockups prototypesSketches wireframes mockups prototypes
Sketches wireframes mockups prototypesDr. V Vorvoreanu
 

More from Dr. V Vorvoreanu (20)

Dia2 tues persona
Dia2 tues persona Dia2 tues persona
Dia2 tues persona
 
Dia2 sketches
Dia2 sketchesDia2 sketches
Dia2 sketches
 
DIA2 Design requirements presentation personas
DIA2 Design requirements presentation personasDIA2 Design requirements presentation personas
DIA2 Design requirements presentation personas
 
gestalt principles cats
gestalt principles catsgestalt principles cats
gestalt principles cats
 
07 principles 1 affordance
07 principles 1 affordance07 principles 1 affordance
07 principles 1 affordance
 
HCDD for ASEE 2015 presentation
HCDD for ASEE 2015 presentationHCDD for ASEE 2015 presentation
HCDD for ASEE 2015 presentation
 
Controls
ControlsControls
Controls
 
Responsive design UX intro
Responsive design UX introResponsive design UX intro
Responsive design UX intro
 
Attention info scent recognition vs recall
Attention info scent recognition vs recallAttention info scent recognition vs recall
Attention info scent recognition vs recall
 
03 bad usability kills
03 bad usability kills03 bad usability kills
03 bad usability kills
 
03 usability def designprocess
03 usability def designprocess03 usability def designprocess
03 usability def designprocess
 
Information architecture
Information architectureInformation architecture
Information architecture
 
UX Conceptual design - sketches, wireframes, mockups, prototypes
UX Conceptual design - sketches, wireframes, mockups, prototypesUX Conceptual design - sketches, wireframes, mockups, prototypes
UX Conceptual design - sketches, wireframes, mockups, prototypes
 
Cgt 256 course review
Cgt 256 course reviewCgt 256 course review
Cgt 256 course review
 
Cross channel ux
Cross channel uxCross channel ux
Cross channel ux
 
UX user-centered design process overview
UX user-centered design process overviewUX user-centered design process overview
UX user-centered design process overview
 
26 social interaction design
26 social interaction design26 social interaction design
26 social interaction design
 
Purdue MS degree CGT
Purdue MS degree CGTPurdue MS degree CGT
Purdue MS degree CGT
 
Sketches wireframes mockups prototypes
Sketches wireframes mockups prototypesSketches wireframes mockups prototypes
Sketches wireframes mockups prototypes
 
11 info architecture-2014
11 info architecture-201411 info architecture-2014
11 info architecture-2014
 

Recently uploaded

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Security Privacy Concerns Third Party APIs

  • 1. Social Internet TECH621 Security Concerns with Privacy in Social Media P Kenie Moses Spring 2011 urdue University
  • 2.
  • 5. Presentation, Relevance & Importance of Results
  • 6.
  • 7. Research Purpose ~ Research Questions The purpose of this research is gain an understanding into user’s perceived responsibilities when using social media. This, in turn, will help develop an enlightened approach to how users can better equip themselves to manage the privacy of their social identity. How can social media users enable themselves to be better users by reducing risk? In what ways can one facilitate awareness among social media users to offset diminishing privacy restrictions and security protocols?
  • 9. Current Research Results Facebook Facebook Account Hacked Facebook Security/Privacy Topic Profile: Facebook, Social Media Security & Privacy. Keywords:api, account hacked, privacy breach, viruses Sentiment Subjects:facebook, privacy Regions: United States Languages: English
  • 10.
  • 11. What field? Information & Privacy Technology
  • 12. Who should care? All individuals involved with social media
  • 13. Why?To help users reduce riskThis is an addition to previous and current research being conducted in the area of Information & Privacy Technology.
  • 14.
  • 15. References http://amor.cms.hu/berlin.de/~spiekers/website/pdfs/ONLINE_SOCIAL_NETWORKS_WHY_WE_DISCLOSE_JIT.pdf danahboyd and Nicole Ellison “Social Network Sites: Definition, History, and Scholarship,” . In Journal of Computer-Mediated Communication, 2007 danahhoyd “Social Network Sites: Public, Private, or What?”. Knowledge Tree 13, May 2007 Balachander, Krishnamurthy and Criag E. Willis. “Characterizing Privacy in Online Social Networks”. In proceedings of WOSN, August 2008 Felt, Adrienne and Davis Evans. “Privacy Protection for Social Networking API’s”. August 2007 Dwyer et al. “Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace”. In proceedings of the Thirteenth Americas Conference on Information Systems, August 2007 Chew, Monica et al. ,“Undermining Privacy in Social Networks”. In proceedings of the w2sp conference , August 2008 Squicciarini, Anna et al. “Collective Privacy Management in Social Networks”. In proceedings of the International World Wide Web Conference Committee, April 2009 Pekarek, Martin et al., “Privacy and Social Network Sites: Follow the Money!”, In proceedings of the W3C Workshop on the Future of Social Networking, January 2009. Hogben, G . “Security Issues and Recommendations for Online Social Networks”. ENISA Position Paper No.1, October 2007