SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1243
PRIVACY & SECURITY SETTINGS: A REVIEW
Aradhana Gupta1, Gaurav Singh2
1,2Masters of Computer Application, VESIT, Mumbai, Maharashtra, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - India is One of the largest Smartphone market.
Now a days whether a person is educated or uneducated
posses at least one smartphone. According to IDC report total
shipment of smart phones in India in 2017 was 124 million.
This shows the 14 percent healthy annual growth for Indian
smartphone market. [1] In year 2018 India will be having 330
million smartphones user. [2] India is the 2nd largest [3]
market for smartphone in the world. As people are using
Smartphone for the smart solutions. So as a result
Smartphones user do make use of internet data, since many
network providers gives value of money plans to users to
defeat their competitors. The network provider usually
provides data plans along with calling plans. This leads to
usage of data. Which gives in information to networking
company or to the service based companies. This is used
further to provide more services to users.
Key Words: Privacy settings, Security setting, user
preferences, Google, Gmail, Data collection.
1. INTRODUCTION
Internet shortly called as net and sometimes also preferred
as data. It uses internet protocol suit (TCP/IP) to link the
devices globally for making the interconnected computer
networks which carries a vast range of information
resources and all the applications of World Wide Web.
[4]Browser used to access WWW. It helps user to interact
with services provided by the internet.
Google LLC is the product based American multinational
technology company which is provides various products or
services based of internet. Google also made a mobile based
operating system called as Android. This provides all the
services for the android smartphone. Services may vary
based on the smartphone companies and which networks
users are using. Google play store provides various
applications which end users can use based on their use.
Developers can also upload their application on play store
for end users either free or chargeable. In this paper will try
to conclude that how end users data is getting used by
various products based or services based companies to
influence them. How the end user can be in problem in
future if they don’t use these services carefully or without
reading all the privacy pop ups and allow the companies to
fetch their entire data store on their smartphone oroncloud
or on any other devices they are using to make their life
easier. By making some settings to their google account
users can avoid unwanted data collection by the internet or
by companies.
1.1 How and what data Google Collects?
What all information end users share with Google and
other companies while they are using their services?
When an end user creates an account with Google. They
share their some basic information with them (company).
But while end users are already logged in, with youraccount
and then they are using some services. In association with
the user account they store all the relevant information like
users IP address, cookie data (whichcontainsall confidential
credentials), device information, location and whereall they
had went in past few days or whenever and wherever they
are using their service. They alsorecordthaton whichall ads
users have clicked or tap. All videos you have watched.
Website you have visited and things you have searched for.
[5]
When user searched for a video on YouTube, or watched a
video, views, user interaction with ads which might be
coming at the start of the video or in between the video all
the activity of user will get recorded in associationwiththeir
account. User might be using video, voice or audio
information for their search. Their search query and form of
the search will also be stored at google at server of users are
using google services while doing these activities. Purchase
activity of the user, with whom user communicates or share
content, and all the other activity on third party side when
users are using google services.All theseinformationwill get
recorded. Chrome browsing history when they have synced
with their google account.
Companies can also record you call log information if
users are making a call using company services. They can
store the information like user contact number, to whom
users have contacted, forwardednumberstimedurationand
date of calls, messages, routing information and types of
calls. In some cases they might record user calls also.
Whenever users are using company services they used to
keep an eye on user.
When user ON their GPS to locate there nearby things.
Internet will actually locate you and all yournearby things.It
will determine you location by GPS, IP address, sensor data
from your device, information about things nearby user
device such as Wi-Fi accesspoints,cell towers,andBluetooth
enabled devices. [5] So might be user parents don’t know
where users are currently but internet might be knowing
more about user know their self.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1244
1.2 Google Ask Before Collecting
As google and some other services orientedcompaniestakes
users data to provide more services to users again and make
more profit but before collecting users data they ask for it
whether they want to share their with them or not. So they
make some privacy setting for their users, but users are not
aware of it. Users don’t read the privacy pop up’s or
messages before installing the apps or visiting to some web
site. This leads to problems. Since users are not aware of
where their data is going or who are using their data to
influence more customers to grow their market. So to make
sure that user’s data is not getting in any wrong hand. Or it’s
getting used by someone who is trying to do some criminal
activity. Google uses different technologytocollectandstore
user’s information; this includes technology like serverlogs,
database, applicationdata caches,local storage,browserweb
storage, pixel tag and cookies etc. Google collect user’s
information only when user contact to their server i.e. when
users are using services provided by the google.
2. Use Security and Privacy Options
To make sure that user’s data is not getting in any wrong
hand or it’s getting used by someone who is trying to do
some criminal activity. But since users are using
smartphones to find smart solutions for their needs. With
finding the smart solution or their smart problems users
should also know how to use smartphone smartly.
First 3 Major rules which any user should keep it mind
before using internet.
 First step towards safe search and keepyourdata insafer
hand is to use secure network. Users should make sure
that they should not public or free Wi-Fi even those
requiring a password. When user connects to a public
network, anyone in the vicinity may be able to monitor
your Internet activity, such as the websites user visit and
the information user entered into sites. [6]
 Use incognito mode for safe search. User search history
might be getting saved on the browser server. But will
not be accessible for any other user who might use that
device in future. [6]
 Users should make sure log out from your every account
after completing their work to which they haveloggedin.
it could be any account not just a Gmail account. Like
Facebook, WhatsApp web etc.
2.1 Make google Account Secure
On google account page users can find different privacy and
security options to make their data more secure andprivate.
A. Sign in & security(Security Checkup)[7]
The first thing user can do to protect their Google
Account is by taking the security checkup. Google made
some account security checkup steps which user can
perform to see the security of their account.
i. What was user’s recent 3 devices where they have
logged in
ii. Recent security activity
iii. Sign in recovery option
iv. using the google account which apps accessing user’s
data[8]
B. Personal Info & Privacy(Privacy Checkup)[8]
Users can performtheprivacycheckuptocheck that
how private is their account is? According to that user
can on/off the services which collect specifictypeofdata.
i. Activity control
 Web and app activity
 Location history
 Device information
 Voice and audio activity
 You tube search history
 You tube watched history
ii. Make ads more relevant to you
 Change the types of ads you see from google ads
based on your interest or what kind of person user
are. So that users won’t get unwanted ads while
they are searching for something.[9]
C. Account preference [9]
i. Sign in & security
 Signing to google
 Device activity & security events
 Apps with account access
User should changetheirpasswordoccasionally.Toprevent
access to their profile if someone might be accessing it.
[13]Turn on your 2-step verification process. To avoid the
unwanted login to account.[13]Set a password for apps if
users wants to secure it more. Set an google account PIN,
which could be used it while login to google payment app
like Tez.[13]
Users can use account recovery options when they forgot
the password to login to their account. These options will
help to get back to their account. It includes recovery email
and recovery phonewhileusermighthavementionedwhile
creating an account. And also which apps passwordor PINs
are saved in user’s account. [13]
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1245
ii. Personal info & privacy
User can control all the data created by the google services
from my activity link. Like what user had searched, what
they had seen on you tube. How much data (internet) user
had used for a day? For what all serviceshowmuchinternet
has been used? How many times user has visited the
particular web site or social site or there apps which is
downloaded from google play store and/or they might be
using google services? Users can control all thing related to
them, to provide the security to themselves. [14]
Some other things which can manage under personal info
and security tabs like Contact, Ads setting, Content control,
Set an account trustee i.e. User can make settingsthatwhen
their account should get inactivated and should handover
to someone else might be there friend or family member.
iii. preferences
 Payment - User can add payment method to pay for
products related google or with their services.
 Purchase, subscription and reservation - User
first online purchase to latest order everything has been
stored on google. On what day user had place theirorder,
till which phase user’s order has been went. Whether
user’s order was completed or not everything about
every order. Subscription and reservation will give a
detail about their respective information.
 Language and input tools - user can set language
according their preference and choice and also in input
tools like keyboard and English, suggest English or
handwriting English.
 Google Drive storage - user can manage their google
drive storage and also some privacy and accessibility
settings related to it. Manage how much space/storage
need to be allotted to which service. User’sdrivestorage
is shared across google drive, Gmail and Google photos.
By default user gets 15GB of space/storagetostoretheir
information on google derive. User can also purchase a
space according to their need. According to currentplan
a user can buy maximum 30TB of space on google drive.
User can Control what information peoplecanseeabout
them through google account from user’s google+
profile link.
3. CONCLUSIONS
Don’t let internet decide who you are. Ifyoudon’twantto
store your any activity you are performing with google
services except Gmail and some other services can only be
performed by after login to google account. Except that
services don’t login to your account to use those services
which are not mandatory to login. This will store your
activity only associated with your device. Will not be stored
in your google account or further will not be share with
others in associated with your profile. Login for only
appropriate activity, where you need to do a login. Google
play store in China is banned due to security reasons. They
use their own play store and browsers. To restrict their data
to go outside the country. [10] Since India has a hug market
for internet and internet related activities, therefore India
should also have their own web browser and other internet
related services. So that our data and our money both will
stay inside our country only.
REFERENCES
[1] https://www.idc.com/getdoc.jsp?containerId=prAP435
69518
[2] https://www.statista.com/statistics/257048/smartpho
ne-user-penetration-in-india
[3] http://indianexpress.com/article/technology/india-set-
to-have-530-million-smartphone-users-in-2018-study-
4893159/
[4] https://en.wikipedia.org/wiki/Internet
[5] https://policies.google.com/privacy?hl=en
[6] https://privacy.google.com/intl/en/your-
security.html?categories_activeEl=browse
[7] https://myaccount.google.com/security-
checkup?continue=https://myaccount.google.com/
[8] https://myaccount.google.com/privacycheckup/7?conti
nue=https%3A%2F%2Fmyaccount.google.com%2F
[9] https://myaccount.google.com/preferences
[10] https://www.bloomberg.com/gadfly/articles/2017-02-
06/google-china-app-entry-won-t-be-something-to-
shout-about

More Related Content

What's hot

penalties offences with case studies
penalties offences with case studiespenalties offences with case studies
penalties offences with case studiesKirtesh Dudawat
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET Journal
 
Aadhaar authentication how to use virtual id (vid)
Aadhaar authentication how to use virtual id (vid)Aadhaar authentication how to use virtual id (vid)
Aadhaar authentication how to use virtual id (vid)Ujjwal Singh
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment9945446746
 
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET Journal
 
IRJET- Online E-Governance
IRJET- Online E-GovernanceIRJET- Online E-Governance
IRJET- Online E-GovernanceIRJET Journal
 
Internet Of Things (IOT)
Internet  Of Things (IOT)Internet  Of Things (IOT)
Internet Of Things (IOT)rabbianasir99
 

What's hot (8)

penalties offences with case studies
penalties offences with case studiespenalties offences with case studies
penalties offences with case studies
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
 
Bv4201481484
Bv4201481484Bv4201481484
Bv4201481484
 
Aadhaar authentication how to use virtual id (vid)
Aadhaar authentication how to use virtual id (vid)Aadhaar authentication how to use virtual id (vid)
Aadhaar authentication how to use virtual id (vid)
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment
 
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...IRJET-  	  Identification of Location of Laptop Devices using Raspberry Pi Mo...
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Mo...
 
IRJET- Online E-Governance
IRJET- Online E-GovernanceIRJET- Online E-Governance
IRJET- Online E-Governance
 
Internet Of Things (IOT)
Internet  Of Things (IOT)Internet  Of Things (IOT)
Internet Of Things (IOT)
 

Similar to IRJET- Privacy & Security Settings: A Review

IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web ServicesIRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web ServicesIRJET Journal
 
Google Policy Primer
Google Policy PrimerGoogle Policy Primer
Google Policy PrimerIrene Pollak
 
IRJET- TRACKITUP-An Android Application to Track Multiple Users
IRJET- TRACKITUP-An Android Application to Track Multiple UsersIRJET- TRACKITUP-An Android Application to Track Multiple Users
IRJET- TRACKITUP-An Android Application to Track Multiple UsersIRJET Journal
 
Cookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdfCookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdfAdzappier
 
IRJET- Queue Control System using Android
IRJET- Queue Control System using AndroidIRJET- Queue Control System using Android
IRJET- Queue Control System using AndroidIRJET Journal
 
Home Security App Development.docx
Home Security App Development.docxHome Security App Development.docx
Home Security App Development.docxCMARIX TechnoLabs
 
Privacy on Mobile Apps
Privacy on Mobile AppsPrivacy on Mobile Apps
Privacy on Mobile AppsMays Mrayyan
 
IRJET- UID Secure Travel Identity
IRJET- UID Secure Travel IdentityIRJET- UID Secure Travel Identity
IRJET- UID Secure Travel IdentityIRJET Journal
 
WEB BASED APPLICATION ON FLATMATE SEARCHINGSYSTEM
WEB BASED APPLICATION ON FLATMATE SEARCHINGSYSTEMWEB BASED APPLICATION ON FLATMATE SEARCHINGSYSTEM
WEB BASED APPLICATION ON FLATMATE SEARCHINGSYSTEMIRJET Journal
 
IRJET- Automated Mess Service based on User's Location PART-2
IRJET- Automated Mess Service based on User's Location PART-2IRJET- Automated Mess Service based on User's Location PART-2
IRJET- Automated Mess Service based on User's Location PART-2IRJET Journal
 
Activity 3 - Ethical Dilemma.docx
Activity 3 - Ethical Dilemma.docxActivity 3 - Ethical Dilemma.docx
Activity 3 - Ethical Dilemma.docxAmanmundey
 
IRJET- IoT based Sensor Enabled Smart Parking System
IRJET- IoT based Sensor Enabled Smart Parking SystemIRJET- IoT based Sensor Enabled Smart Parking System
IRJET- IoT based Sensor Enabled Smart Parking SystemIRJET Journal
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)scobycakau
 
IRJET- Tiffin Services Application and Live Tracking
IRJET-  	  Tiffin Services Application and Live TrackingIRJET-  	  Tiffin Services Application and Live Tracking
IRJET- Tiffin Services Application and Live TrackingIRJET Journal
 
IRJET- City Complaint Management System
IRJET-  	  City Complaint Management SystemIRJET-  	  City Complaint Management System
IRJET- City Complaint Management SystemIRJET Journal
 
OPENi Privacy by design @Athens hackathon, September 2014
OPENi Privacy by design @Athens hackathon, September 2014OPENi Privacy by design @Athens hackathon, September 2014
OPENi Privacy by design @Athens hackathon, September 2014openi_ict
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreIBM Software India
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]IBM Software India
 
Fraud App Detection using Machine Learning
Fraud App Detection using Machine LearningFraud App Detection using Machine Learning
Fraud App Detection using Machine LearningIRJET Journal
 
UXPSystems_whitepaper_Privacy_Nov182016
UXPSystems_whitepaper_Privacy_Nov182016UXPSystems_whitepaper_Privacy_Nov182016
UXPSystems_whitepaper_Privacy_Nov182016Andrey Plotnikov
 

Similar to IRJET- Privacy & Security Settings: A Review (20)

IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web ServicesIRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
IRJET- An Analysis of Personal Data Shared to Third Parties by Web Services
 
Google Policy Primer
Google Policy PrimerGoogle Policy Primer
Google Policy Primer
 
IRJET- TRACKITUP-An Android Application to Track Multiple Users
IRJET- TRACKITUP-An Android Application to Track Multiple UsersIRJET- TRACKITUP-An Android Application to Track Multiple Users
IRJET- TRACKITUP-An Android Application to Track Multiple Users
 
Cookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdfCookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdf
 
IRJET- Queue Control System using Android
IRJET- Queue Control System using AndroidIRJET- Queue Control System using Android
IRJET- Queue Control System using Android
 
Home Security App Development.docx
Home Security App Development.docxHome Security App Development.docx
Home Security App Development.docx
 
Privacy on Mobile Apps
Privacy on Mobile AppsPrivacy on Mobile Apps
Privacy on Mobile Apps
 
IRJET- UID Secure Travel Identity
IRJET- UID Secure Travel IdentityIRJET- UID Secure Travel Identity
IRJET- UID Secure Travel Identity
 
WEB BASED APPLICATION ON FLATMATE SEARCHINGSYSTEM
WEB BASED APPLICATION ON FLATMATE SEARCHINGSYSTEMWEB BASED APPLICATION ON FLATMATE SEARCHINGSYSTEM
WEB BASED APPLICATION ON FLATMATE SEARCHINGSYSTEM
 
IRJET- Automated Mess Service based on User's Location PART-2
IRJET- Automated Mess Service based on User's Location PART-2IRJET- Automated Mess Service based on User's Location PART-2
IRJET- Automated Mess Service based on User's Location PART-2
 
Activity 3 - Ethical Dilemma.docx
Activity 3 - Ethical Dilemma.docxActivity 3 - Ethical Dilemma.docx
Activity 3 - Ethical Dilemma.docx
 
IRJET- IoT based Sensor Enabled Smart Parking System
IRJET- IoT based Sensor Enabled Smart Parking SystemIRJET- IoT based Sensor Enabled Smart Parking System
IRJET- IoT based Sensor Enabled Smart Parking System
 
Internet usage policy(1)
Internet usage policy(1)Internet usage policy(1)
Internet usage policy(1)
 
IRJET- Tiffin Services Application and Live Tracking
IRJET-  	  Tiffin Services Application and Live TrackingIRJET-  	  Tiffin Services Application and Live Tracking
IRJET- Tiffin Services Application and Live Tracking
 
IRJET- City Complaint Management System
IRJET-  	  City Complaint Management SystemIRJET-  	  City Complaint Management System
IRJET- City Complaint Management System
 
OPENi Privacy by design @Athens hackathon, September 2014
OPENi Privacy by design @Athens hackathon, September 2014OPENi Privacy by design @Athens hackathon, September 2014
OPENi Privacy by design @Athens hackathon, September 2014
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
Fraud App Detection using Machine Learning
Fraud App Detection using Machine LearningFraud App Detection using Machine Learning
Fraud App Detection using Machine Learning
 
UXPSystems_whitepaper_Privacy_Nov182016
UXPSystems_whitepaper_Privacy_Nov182016UXPSystems_whitepaper_Privacy_Nov182016
UXPSystems_whitepaper_Privacy_Nov182016
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 

Recently uploaded (20)

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 

IRJET- Privacy & Security Settings: A Review

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1243 PRIVACY & SECURITY SETTINGS: A REVIEW Aradhana Gupta1, Gaurav Singh2 1,2Masters of Computer Application, VESIT, Mumbai, Maharashtra, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - India is One of the largest Smartphone market. Now a days whether a person is educated or uneducated posses at least one smartphone. According to IDC report total shipment of smart phones in India in 2017 was 124 million. This shows the 14 percent healthy annual growth for Indian smartphone market. [1] In year 2018 India will be having 330 million smartphones user. [2] India is the 2nd largest [3] market for smartphone in the world. As people are using Smartphone for the smart solutions. So as a result Smartphones user do make use of internet data, since many network providers gives value of money plans to users to defeat their competitors. The network provider usually provides data plans along with calling plans. This leads to usage of data. Which gives in information to networking company or to the service based companies. This is used further to provide more services to users. Key Words: Privacy settings, Security setting, user preferences, Google, Gmail, Data collection. 1. INTRODUCTION Internet shortly called as net and sometimes also preferred as data. It uses internet protocol suit (TCP/IP) to link the devices globally for making the interconnected computer networks which carries a vast range of information resources and all the applications of World Wide Web. [4]Browser used to access WWW. It helps user to interact with services provided by the internet. Google LLC is the product based American multinational technology company which is provides various products or services based of internet. Google also made a mobile based operating system called as Android. This provides all the services for the android smartphone. Services may vary based on the smartphone companies and which networks users are using. Google play store provides various applications which end users can use based on their use. Developers can also upload their application on play store for end users either free or chargeable. In this paper will try to conclude that how end users data is getting used by various products based or services based companies to influence them. How the end user can be in problem in future if they don’t use these services carefully or without reading all the privacy pop ups and allow the companies to fetch their entire data store on their smartphone oroncloud or on any other devices they are using to make their life easier. By making some settings to their google account users can avoid unwanted data collection by the internet or by companies. 1.1 How and what data Google Collects? What all information end users share with Google and other companies while they are using their services? When an end user creates an account with Google. They share their some basic information with them (company). But while end users are already logged in, with youraccount and then they are using some services. In association with the user account they store all the relevant information like users IP address, cookie data (whichcontainsall confidential credentials), device information, location and whereall they had went in past few days or whenever and wherever they are using their service. They alsorecordthaton whichall ads users have clicked or tap. All videos you have watched. Website you have visited and things you have searched for. [5] When user searched for a video on YouTube, or watched a video, views, user interaction with ads which might be coming at the start of the video or in between the video all the activity of user will get recorded in associationwiththeir account. User might be using video, voice or audio information for their search. Their search query and form of the search will also be stored at google at server of users are using google services while doing these activities. Purchase activity of the user, with whom user communicates or share content, and all the other activity on third party side when users are using google services.All theseinformationwill get recorded. Chrome browsing history when they have synced with their google account. Companies can also record you call log information if users are making a call using company services. They can store the information like user contact number, to whom users have contacted, forwardednumberstimedurationand date of calls, messages, routing information and types of calls. In some cases they might record user calls also. Whenever users are using company services they used to keep an eye on user. When user ON their GPS to locate there nearby things. Internet will actually locate you and all yournearby things.It will determine you location by GPS, IP address, sensor data from your device, information about things nearby user device such as Wi-Fi accesspoints,cell towers,andBluetooth enabled devices. [5] So might be user parents don’t know where users are currently but internet might be knowing more about user know their self.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1244 1.2 Google Ask Before Collecting As google and some other services orientedcompaniestakes users data to provide more services to users again and make more profit but before collecting users data they ask for it whether they want to share their with them or not. So they make some privacy setting for their users, but users are not aware of it. Users don’t read the privacy pop up’s or messages before installing the apps or visiting to some web site. This leads to problems. Since users are not aware of where their data is going or who are using their data to influence more customers to grow their market. So to make sure that user’s data is not getting in any wrong hand. Or it’s getting used by someone who is trying to do some criminal activity. Google uses different technologytocollectandstore user’s information; this includes technology like serverlogs, database, applicationdata caches,local storage,browserweb storage, pixel tag and cookies etc. Google collect user’s information only when user contact to their server i.e. when users are using services provided by the google. 2. Use Security and Privacy Options To make sure that user’s data is not getting in any wrong hand or it’s getting used by someone who is trying to do some criminal activity. But since users are using smartphones to find smart solutions for their needs. With finding the smart solution or their smart problems users should also know how to use smartphone smartly. First 3 Major rules which any user should keep it mind before using internet.  First step towards safe search and keepyourdata insafer hand is to use secure network. Users should make sure that they should not public or free Wi-Fi even those requiring a password. When user connects to a public network, anyone in the vicinity may be able to monitor your Internet activity, such as the websites user visit and the information user entered into sites. [6]  Use incognito mode for safe search. User search history might be getting saved on the browser server. But will not be accessible for any other user who might use that device in future. [6]  Users should make sure log out from your every account after completing their work to which they haveloggedin. it could be any account not just a Gmail account. Like Facebook, WhatsApp web etc. 2.1 Make google Account Secure On google account page users can find different privacy and security options to make their data more secure andprivate. A. Sign in & security(Security Checkup)[7] The first thing user can do to protect their Google Account is by taking the security checkup. Google made some account security checkup steps which user can perform to see the security of their account. i. What was user’s recent 3 devices where they have logged in ii. Recent security activity iii. Sign in recovery option iv. using the google account which apps accessing user’s data[8] B. Personal Info & Privacy(Privacy Checkup)[8] Users can performtheprivacycheckuptocheck that how private is their account is? According to that user can on/off the services which collect specifictypeofdata. i. Activity control  Web and app activity  Location history  Device information  Voice and audio activity  You tube search history  You tube watched history ii. Make ads more relevant to you  Change the types of ads you see from google ads based on your interest or what kind of person user are. So that users won’t get unwanted ads while they are searching for something.[9] C. Account preference [9] i. Sign in & security  Signing to google  Device activity & security events  Apps with account access User should changetheirpasswordoccasionally.Toprevent access to their profile if someone might be accessing it. [13]Turn on your 2-step verification process. To avoid the unwanted login to account.[13]Set a password for apps if users wants to secure it more. Set an google account PIN, which could be used it while login to google payment app like Tez.[13] Users can use account recovery options when they forgot the password to login to their account. These options will help to get back to their account. It includes recovery email and recovery phonewhileusermighthavementionedwhile creating an account. And also which apps passwordor PINs are saved in user’s account. [13]
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1245 ii. Personal info & privacy User can control all the data created by the google services from my activity link. Like what user had searched, what they had seen on you tube. How much data (internet) user had used for a day? For what all serviceshowmuchinternet has been used? How many times user has visited the particular web site or social site or there apps which is downloaded from google play store and/or they might be using google services? Users can control all thing related to them, to provide the security to themselves. [14] Some other things which can manage under personal info and security tabs like Contact, Ads setting, Content control, Set an account trustee i.e. User can make settingsthatwhen their account should get inactivated and should handover to someone else might be there friend or family member. iii. preferences  Payment - User can add payment method to pay for products related google or with their services.  Purchase, subscription and reservation - User first online purchase to latest order everything has been stored on google. On what day user had place theirorder, till which phase user’s order has been went. Whether user’s order was completed or not everything about every order. Subscription and reservation will give a detail about their respective information.  Language and input tools - user can set language according their preference and choice and also in input tools like keyboard and English, suggest English or handwriting English.  Google Drive storage - user can manage their google drive storage and also some privacy and accessibility settings related to it. Manage how much space/storage need to be allotted to which service. User’sdrivestorage is shared across google drive, Gmail and Google photos. By default user gets 15GB of space/storagetostoretheir information on google derive. User can also purchase a space according to their need. According to currentplan a user can buy maximum 30TB of space on google drive. User can Control what information peoplecanseeabout them through google account from user’s google+ profile link. 3. CONCLUSIONS Don’t let internet decide who you are. Ifyoudon’twantto store your any activity you are performing with google services except Gmail and some other services can only be performed by after login to google account. Except that services don’t login to your account to use those services which are not mandatory to login. This will store your activity only associated with your device. Will not be stored in your google account or further will not be share with others in associated with your profile. Login for only appropriate activity, where you need to do a login. Google play store in China is banned due to security reasons. They use their own play store and browsers. To restrict their data to go outside the country. [10] Since India has a hug market for internet and internet related activities, therefore India should also have their own web browser and other internet related services. So that our data and our money both will stay inside our country only. REFERENCES [1] https://www.idc.com/getdoc.jsp?containerId=prAP435 69518 [2] https://www.statista.com/statistics/257048/smartpho ne-user-penetration-in-india [3] http://indianexpress.com/article/technology/india-set- to-have-530-million-smartphone-users-in-2018-study- 4893159/ [4] https://en.wikipedia.org/wiki/Internet [5] https://policies.google.com/privacy?hl=en [6] https://privacy.google.com/intl/en/your- security.html?categories_activeEl=browse [7] https://myaccount.google.com/security- checkup?continue=https://myaccount.google.com/ [8] https://myaccount.google.com/privacycheckup/7?conti nue=https%3A%2F%2Fmyaccount.google.com%2F [9] https://myaccount.google.com/preferences [10] https://www.bloomberg.com/gadfly/articles/2017-02- 06/google-china-app-entry-won-t-be-something-to- shout-about