The document discusses the Internet and social networking services. It begins by defining the Internet as a network of networks that connects computers globally using TCP/IP protocols. It describes how users can connect to the Internet via dial-up or broadband connections using modems. Common Internet applications are discussed, including the World Wide Web, email, file transfer, and social networking services. Social networks allow users to create profiles, make connections with friends, and share content. Emerging trends include businesses using social networks for branding and recruitment. Issues with privacy and oversharing personal information on social platforms are also noted.
Integrative Programming Technology Chapter 5 - Dr. J. VijiPriyaVijiPriya Jeyamani
Chapter 5 in Integrative Programming Technology
Integrative Coding: Design Patterns; Interfaces; Inheritance
Miscellaneous Issues: Adopt and Adapt vs. make; Versioning and version control
The current evolution in Information technology bring major changes in the way of Information communication. Information Communication technology developments opened up new avenues to e-resources publishing in a big way. E- resources is distribution of information in any electronic form such as CD- ROM, Floppy Disk or Magnetic tape or across a computer network like e-journals, E-Books, ETD etc. accessible dial-up bulletin board or on-line services.
Integrative Programming Technology Chapter 5 - Dr. J. VijiPriyaVijiPriya Jeyamani
Chapter 5 in Integrative Programming Technology
Integrative Coding: Design Patterns; Interfaces; Inheritance
Miscellaneous Issues: Adopt and Adapt vs. make; Versioning and version control
The current evolution in Information technology bring major changes in the way of Information communication. Information Communication technology developments opened up new avenues to e-resources publishing in a big way. E- resources is distribution of information in any electronic form such as CD- ROM, Floppy Disk or Magnetic tape or across a computer network like e-journals, E-Books, ETD etc. accessible dial-up bulletin board or on-line services.
MLIS- Workshop AIOU 2013, Library and information science, LIS Studies, , Information Management, Internet Application In Libraries, E-Mail Application In Libraries, Information Centers, Internet And E-Mail In Libraries, , Information technology, Computer Basics
Learning Registry is an open source project that helps content producers and content consumers share and exchange what they know within a public space. "Social networking for metadata."
Digital technologies for learning in prison: what one Australian university i...Helen Farley
In most Australian correctional jurisdictions, prisoners are not allowed access to the internet precluding them from participating in higher education online. Making the Connection is an Australian government funded project which is taking digital technologies, that don’t require internet access, into prisons to enable prisoners to enroll in a suite of pre-tertiary and undergraduate programs. A version of the University of Southern Queensland’s learning management system has been installed onto the education server of participating prisons. The second stage of the project will see notebook computers preloaded with the learning management system and course materials, allocated to participating prisoners. At the time of writing, the project has been deployed at thirteen sites in Queensland and Western Australia, with a further three sites coming on board in time for semester I 2016 and negotiations underway for further rollout to Victoria, New South Wales, South Australia, Tasmania, the ACT and the Northern Territory.
MLIS- Workshop AIOU 2013, Library and information science, LIS Studies, , Information Management, Internet Application In Libraries, E-Mail Application In Libraries, Information Centers, Internet And E-Mail In Libraries, , Information technology, Computer Basics
Learning Registry is an open source project that helps content producers and content consumers share and exchange what they know within a public space. "Social networking for metadata."
Digital technologies for learning in prison: what one Australian university i...Helen Farley
In most Australian correctional jurisdictions, prisoners are not allowed access to the internet precluding them from participating in higher education online. Making the Connection is an Australian government funded project which is taking digital technologies, that don’t require internet access, into prisons to enable prisoners to enroll in a suite of pre-tertiary and undergraduate programs. A version of the University of Southern Queensland’s learning management system has been installed onto the education server of participating prisons. The second stage of the project will see notebook computers preloaded with the learning management system and course materials, allocated to participating prisoners. At the time of writing, the project has been deployed at thirteen sites in Queensland and Western Australia, with a further three sites coming on board in time for semester I 2016 and negotiations underway for further rollout to Victoria, New South Wales, South Australia, Tasmania, the ACT and the Northern Territory.
The training course «How to write Learning Outcomes in Environmental Science» is designed for teachers and education professionals who plan to participate in the development and the implementation of new educational programs for writing and design of learning outcomes in the environmental sciences, together with the National Qualifications Framework of Ukraine and European Qualifications Framework. The training course consists of three sections that allow you to get acquainted with the normative content categories of training, concept and basic principles of learning outcomes in different areas of development stages of evaluation and criteria for evaluation of learning outcomes. Provides for variation of approaches to choice of forms, types of methods of evaluating learning outcomes. Training course provides lectures and seminars in groups of up to ten people.
Classic project management meets panopticism - How to monitor projects and (t...Philip Jæger
This paper will not focus on why you should monitor, but acknowledge the premise that it’s needed, and therefore instead focus on expanding its aspects. Panopticism has in relation to monitoring many promising comforts of fx. being economical and bringing error-prevention, but in the shadow of these comforts lurks an asymmetrical power-relationship which may not be suited for today's workspace.
Computer Introduction-, Lecture07 for applied scince college students, Seiyun University , yemen 2023-2024 Academic year. لطلاب كلية العلوم التطبيقية بجامعة سيئون
مقدمة في علوم الحاسوب المحاضرة السابعه
Internet ppt includes :history, introduction, defination, internet services, differences between web and internet, different types of web browser, web page., web browsers, protocol, electron mail, advantages and disadvantages of internet
Human Computer Interaction Chapter 2 Interaction and Interaction Design Basi...VijiPriya Jeyamani
Interaction:
Introduction
Models of interaction
Ergonomics
Interaction styles
The context of the interactions
Paradigms:
Introduction
Paradigms for interaction.
2.2 Interaction Design:
Introduction
What is design?
User focus
Scenarios
Navigation design
Screen design and layout
Interaction and prototyping
Human Computer Interaction Chapter 3 HCI in the Software Process and Design ...VijiPriya Jeyamani
HCI in the Software Process:
Introduction
The software lifecycle
Usability engineering
Interactive design and prototyping
Design rationale
3.2 Design Rules
Introduction
Principles to support usability
Standards
Guidelines
Golden rules and heuristics
HCI patterns
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...VijiPriya Jeyamani
Implementation Support:
Introduction
Elements of windowing systems
Programming the application
User interface management systems
4.2 Evaluation Techniques
What is evaluation?
Goals of evaluation
Choosing an evaluation method
Human Computer Interaction Chapter 5 Universal Design and User Support - Dr....VijiPriya Jeyamani
Universal Design:
Introduction
Universal design principles
Multi-modal interaction
Designing for diversity
User Support:
Introduction
Requirements of user support
Approaches to user support
Adaptive help systems
Designing user support systems
Expert System Lecture Notes Chapter 1,2,3,4,5 - Dr.J.VijiPriyaVijiPriya Jeyamani
Chapter 1 Introduction to AI
Chapter 2 Introduction to Expert Systems
Chapter 3 Knowledge Representation
Chapter 4 Inference Methods and Reasoning
Chapter 5 Expert System Design and Pattern Matching
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Dr. J. VijiPriya - Information and Communication Technology Chapter 8 The Internet
1. Information and CommunicationInformation and Communication
TechnologyTechnology
Chapter 8
The Internet
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 1
2. What is Internet?What is Internet?
a network of networks
huge collection of computer networks , freely exchange
information
To ensure the delivery of the data to the right computer, each
computer on the Internet is given an address(Domain Name
System or IP address)
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 2
3. How does the Internet work?How does the Internet work?
In order to make the Internet work, it requires:
1. a physical connection between the computers
2. a Transmission Control Protocol/Internet Protocol (TCP/IP)
◦ all kinds of computers with different operating systems run on the Internet
◦ All computers to communicate over the Internet
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 3
4. Getting connected to InternetGetting connected to Internet
Two basic ways:
1. dial-up internet connection
2. broad band or leased line internet connection
Dial-up internet connection
dialing into an Internet service provider's (ISP) computer
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 4
5. Getting connected to InternetGetting connected to Internet
con…con…
To establish a dial-up connection to the Internet, requires
following:
◦ An account with an ISP (a company that provides the Internet access)
◦ A telephone connection
◦ Modem (external/internal): used to connect the telephone line to the computer
◦ Communication software: e internet browsers such as internet explorer,
Mozila, Firebox, Chrome, Netscape Navigator, Opera, Safari
Advantages of dial-up connection:
◦ flexible: use it anywhere if you have an account, telephone line and computer
◦ Less monthly payment: it charges based on the amount of time usage
Disadvantages of dial-up connection:
◦ Not faster: it is very slow because its the public service
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 5
6. Getting connected to InternetGetting connected to Internet
con…con…
Broad band internet connection
◦ direct connection to an ISP if you have a fixed cable or a dedicated phone
line to the ISP
Advantages of broad band connection:
◦ Faster: because use a free telephone line is dedicated for this internet service o
Disadvantages of broad band connection:
◦ the fixed amount of money must be paid monthly regardless of usage
◦ Not flexible: have a fixed telephone line and use it on that area only
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 6
7. ProtocolsProtocols
the formal rules governing the exchange of information between computers
provide reliable and efficient transfer of information
define the format in which data and messages are to be sent
Why Protocols?
◦ Most computers are not similar, and they have to share the same language to
understand each other
Example : TCP/IP
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 7
9. Protocols con…Protocols con…
To send a message across the Internet to another user:
In Sender side
◦ TCP divides the data into manageable units called packets
◦ attaches the information necessary to each packet for reassemble the
data and check for errors
◦ IP labels all the packets with a header containing the address of the
destination and sends them on their way
In Receiver side
◦ Once the packets reach their destination, the receiver removes the IP
header
◦ The receiver uses the data that TCP attached to each packet to make sure
none of the packets have been lost or damaged
◦ The packets are reassembled into the original message
◦ If the receiver discovers a damaged packet, it sends a message to the sender
asking it to resend the packet.
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 9
10. Protocols con…Protocols con…
Website
refers to a collection of one or more web pages on the web
Relationship between browsers (client) and the web servers:
Is a client/server relationship
The web client (browser) requests information from the web server (containing the
requested information)
The server delivers it
To access pages on web servers by using a browser:
tell your browser what web page you want to view,
It goes to the web server that holds the page and retrieves it
The links contained in web pages can point to areas within the same page, to other
pages residing on the same web server
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 10
11. Relationship between browsers (client) and the web servers:
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 11
12. Social Network ServiceSocial Network Service
focuses on building online communities of people who share interests and/or
activities
provide a variety of ways for users to interact, such as e-mail and instant messaging
services
encouraged new ways to communicate and share information
used regularly by millions of people
types of social networking services
◦ Facebook widely used worldwide
◦ MySpace, Twitter and LinkedIn in North America
◦ Nexopia in Canada
◦ Bebo, Hi5, MySpace, dol2day in Germany
◦ Tagged, XING;and Skyrock in Europe
◦ Orkut and Hi5 in South America and Central America
◦ Friendster, Multiply, Orkut, Xiaonei and Cyworld in Asia and Pacific
Islands
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 12
13. Social Network Service Con…Social Network Service Con…
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 13
14. History of Social Network ServiceHistory of Social Network Service
Early social networks via computer-mediated communication supported by Usenet,
ARPANET, LISTSERV, bulletin board services (BBS) and EIES: Electronic Information
Exchange Service
Early social networking websites started in the form of online communities
◦ The WELL (1985)
◦ Theglobe.com (1994),
◦ Geocities (1994)
◦ Tripod (1995)
◦ Classmates.com (1995)
◦ SixDegrees.com (1997)
◦ Friendster, MySpace, Bebo(2003)
◦ Facebook (2004),
◦ MySpace, Yahoo, ITV (2005)
◦ Twitter(2009)
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 14
15. Internet Applications or ServicesInternet Applications or Services
Types of Internet Services
1. World wide web
2. Electronic mail
3. File Transfer Protocol (FTP)
4. Telnet
5. Internet Relay Chat (IRC)
6. Internet Telephony
7. Video conferencing
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 15
16. Internet Services Con…Internet Services Con…
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 16
17. Internet Applications or ServicesInternet Applications or Services
con…con…
World Wide Web (WWW)
a vast collection of documents stored on Internet computers
The web documents contain links that lead to other web pages
uses Hypertext Mark-up language (HTML) to design a web document
user can click on any of the links and jump to the related document (non
linear)
The web includes text, voice, video, pictures, graphics, sound etc (rich media
system)
A web user can fill in forms on-line, run programs, select options
( interactive )
Basic Internet Terms:
Web Server
◦ a program and a computer clubbed into one entity which responds to the
requests from web browsers for Internet resources
Home Page
◦ the first hypertext document to be shown when a user follows a link to the
web server.
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 17
18. Internet Applications or ServicesInternet Applications or Services
con…con…
Hyper Text Transfer Protocol (HTTP)
◦ the protocol used by the Web to transfer hypertext documents & other
Internet resources
Uniform Resource Locator (URL)
◦ a special scheme tells the user exactly where a resource is located on the
Internet
◦ example: http://www.hu.edu.et
Web Browser
◦ a program allows a user to display & interact with a hypertext document
How to surf the web with a Browser
◦ Netscape Navigator, Microsoft Internet Explorer.
◦ Both browsers have a simple toolbar for navigating the web including buttons to
move backward and forward through pages and reload the current page.
◦ Several other options, including printing and searching, are also available from
the toolbar
◦ when the mouse cursor passes over a hyperlink, it changes to a hand with
pointing finger.
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 18
19. Internet Applications or ServicesInternet Applications or Services
con…con…
E-mail
a user can send and receive mail through computers to and from any Internet
user
transmit text, messages, audio and video clips to just one user or a group of
users while Large documents can be attached
Users can read, print, forward, answer or delete a message
cheaper and faster in comparison to other communication services
assigned a unique address, used by the e-mail network to deliver the
message
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 19
20. Internet Applications or ServicesInternet Applications or Services
con…con…
FTP (File Transfer Protocol)
allows a user to transfer data between computers on the Internet
allow users to manage and download files from computers connected to the
Internet
Telnet
allows one computer to connect to another computer, anywhere in the world
allows user to log into computers on the Internet where user commands as
text will be executed
To Telnet to a computer, user must know its address, consist of domain name
(locis.loc.gov) or IP address (140.147.254.3)
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 20
21. Internet Applications or ServicesInternet Applications or Services
con…con…
Usenet News
global electronic bulletin board system in which millions of computer users
exchange information from academic to recreational topics
Usenet messages are stored on central computers, users must connect to these
computers to read or download the messages posted to these groups
But email messages arrive in the electronic mailboxes of each list member
not as popular nowadays , instead Blogs and RSS (Rich Site Summary) feeds are
newer modes of communication
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 21
22. Internet Applications or ServicesInternet Applications or Services
con…con…
Chat
allow users on the Internet to communicate with each other by typing in real
time.
Internet Relay Chat (IRC)
allows participants to communicate to each other on hundreds of channels
( based on specific topics)
To access IRC, user must use an IRC software program
Instant messaging
allows a user on the Web to contact another user currently logged in and type
a conversation
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 22
23. Internet Applications or ServicesInternet Applications or Services
con…con…
Search Engine
computer software that compiles lists of documents
respond to a user entry, or query, by searching the lists and displaying a list of
documents (text or URL of website) that match the search query
Examples: Google, Mama, Yahoo etc..
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 23
24. Social Network Services :-Social Network Services :-
Typical structureTypical structure
1. Basics Features
2. Normal Features
3. Additional Features
Basics Features
Two categories
1. Internal Social Networking (ISN)
◦ closed/private community that consists of a group of people within a
company, association, society, education provider and organization
II. External Social Networking (ESN) Sites
◦ open/public and available to all web users to communicate and are
designed to attract advertisers
◦ smaller specialized communities (i.e. linked by a single common interest e.g.
TheSocialGolfer, ACountryLife.Com, Great Cooks Community)
◦ large generic social networking sites (Eg:-MySpace, Facebook , Twitter and
Bebo etc),
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 24
25. Social Network Services :-Social Network Services :-
Typical structure Con…Typical structure Con…
Basics Features Con…
In Social Network, Users can:
create a profile for themselves
Upload a picture of themselves,
Often be "friends" with other users.
Both users must confirm that they are friends before they are linked. For example,
if Alice lists Bob as a friend, then Bob would have to approve Alice's friend request
before they are listed as friends.
Some social networking sites have a "favorites" feature that does not need
approval from the other user
Social networks usually have privacy controls that allows the user to choose who
can view their profile or contact them, etc…
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 25
26. Social Network Services :-Social Network Services :-
Typical structure Con…Typical structure Con…
Normal Features
A set of features are considered essential to qualify as a social networking service,
namely:
The ability to set up and customize a personal 'profile'
An ability for members to comment
Fine granular control of who sees what (privacy settings)
Ability to block an unwanted member
Have own page of personal (blog like) entries or notes and individual picture
albums
Ability to own, form or be member of a Group or Community within the network
Ability to include "Social Apps" or "Gadgets“ can create online contact and spread
of information
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 26
27. Social Network Services :-Social Network Services :-
Typical structure Con…Typical structure Con…
Additional features
Ability to create groups share common interests or affiliations, upload or
stream live videos, and hold discussions in forums
Lately, mobile social networking has become popular
Mobile phone users can create their own profiles, make friends, participate in
chat rooms, create chat rooms, hold private conversations, share photos and
videos, and share blogs by using their mobile phone
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 27
28. Emerging Trends in Social NetworksEmerging Trends in Social Networks
use of Social Networks in the Science communities. Researchers sharing
information and knowledge with one another
Social Network use by college students to network with professionals for
internship and job opportunities
One popular use for this new technology is social networking between businesses.
Companies found that social networking sites such as Facebook, MySpace and
twitter are great ways to build their brand image
five major uses for businesses and social media. They are:
i. to create Brand Awareness, online reputation management tool, recruiting,
ii. learn about new technologies and competitors and to intercept potential
prospects
iii. companies are able to drive traffic to their own online sites
iv. encouraging their consumers and clients to have discussions on how to improve
or change products or services
v. Social networks operate under an autonomous business model via online
advertisement, in which a social network's members serve dual roles as both the
suppliers and the consumers of content
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 28
29. Issues in Social Network Services
1. Privacy
Users giving out too much personal information and increasingly the threat of
sexual predators
Users of these services need to be aware of data theft or viruses
Medical and scientific research data are public, republishing it in a research
paper might be considered invasion of privacy
2. Notifications on websites
social networking sites to send out only 'positive' notifications to users if a user
is moved to the top of another user's friends list.
but no notification is sent if they are moved down the list or they are
removed totally from a person's friends list
3. Potential for misuse
The relative freedom afforded by social networking services has caused concern
regarding the potential of its misuse by users
Eg: Craete Fake profile
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 29
30. Issues in Social Network ServicesIssues in Social Network Services
con…con…
Risk for child safety
misuse by child and teenagers of social network services, particularly in relation to
online sexual predators
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 30
31. Social Network Services inSocial Network Services in
InvestigationsInvestigations
Social network services are increasingly being used in legal and
criminal investigations
MySpace and Facebook used by police, probation, and university officials to
prosecute users of said sites, evidence in court
Facebook is increasingly being used by school administrations and law
enforcement agencies as a source of evidence against student users
Facebook to help their crack down on knife and gun crime
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 31
32. Application domainsApplication domains
1. Business applications
Social networks connect people at low cost; this can be beneficial for
entrepreneurs and small businesses looking to expand their contact/customer
base
Interactive technology makes it possible for people to network with their peers
from anywhere, at anytime in an online environment by creating informative and
interactive meeting places
2. Medical applications
Social networks adopted by healthcare professionals as a means to manage
institutional knowledge, disseminate peer to peer knowledge and to
highlight individual physicians and institutions
For people suffering from life altering diseases, PatientsLikeMe offers its
members the chance to connect with others dealing with similar issues
SoberCircle for alcoholics and addicts to communicate with one another and
strengthen their recovery through the encouragement of others who can relate
to their situation.
Daily strength support groups for a wide array of topics
SparkPeople for peer support during weight loss
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 32
33. What is Malware?What is Malware?
Malicious software designed to infiltrate or damage a computer system without
the owner's informed consent
Malware includes computer viruses, worms, trojan horses, spyware, dishonest
adware, and other malicious and unwanted software, defective software
contains harmful bugs
Most Malware have the following phases while affecting your computer
system:
1. Dormancy phase - create a sense of trust in the user
2. Propagation phase - duplicates itself without making damage
3. Triggering phase -triggered by some occurrence such as date or a particular
number of replications, sequence of keystroke
4. Damage phase- formatting the hard disk thereby destroying all the data in it,
reserving space on disk so that files cannot be stored on it etc…
Types of malware: viruses, worms, trojan horses, spyware
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 33
34. Malware Con…Malware Con…
Viruses
A computer virus attaches itself to a program or file enabling it to spread from one
computer to another
1. Macro Viruses
A macro virus, often scripted into common application programs such as Word or
Excel, is spread by infecting documents.
When the application is running, this allows the macro virus to spread amongst the
operating systems
Examples : Melissa A and Bablas pc
2. Network Viruses
Network viruses rapidly spread through a Local Network Area (LAN), and
sometimes throughout the internet.
Example: Nimda and SQLSlammer.
3. Logic bomb virus
piece of code that is inputted into a software system
clicking on an internet browser or opening a particular file, the logic bomb virus is
set off
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 34
35. Malware Con…Malware Con…
Viruses Con…
4. Companion Viruses
Companion viruses take advantage of MS-DOS. This virus creates a new file with he
.COM extensions, .EXD extension, .EXE extension
is rare among Windows XP computers does not use the MS-DOS
5. Boot Sector Viruses
Boot sector viruses generally hide in the boot sector, either in the bootable disk or
the hard drive.
Unlike most viruses, this virus does not harm the files in the hard disk, but harm the
hard disk itself.
spread rapidly by floppy disks and not on CD-ROMs
6. Multipartite Viruses
spread through infected media and usually hide in the memory Gradually
moves to the boot sector of the hard drive and infects executable files on the hard
drive and later across the computer system
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 35
36. Malware Con…Malware Con…
Worm
similar to a virus by design and is considered to be a sub-class of a virus
capability to travel without any human action
Due to the copying nature of a worm and its capability to travel across networks
the end result is the worm consumes too much system memory (or network
bandwidth), causing Web servers, network servers and individual computers to
stop responding
allow malicious users to control your computer remotely
Trojan horse
at first glance will appear to be useful software but will actually do damage once
installed or run on your computer
designed to be more annoying than malicious (like changing your desktop, adding
silly active desktop icons)
cause serious damage by deleting files and destroying information on your system
create a backdoor for that gives malicious users access to your system, possibly
allowing confidential or personal information
No self-replication unlike other viruses
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 36
37. Malware Con…Malware Con…
Combating Viruses, Worms and Trojan Horses
few primary indicators that your system might be infected:
Runs consistently slower than normal
Stops responding or locks up often
Crashes and restarts every few minutes
Restarts on its own and then fails to run normally
Applications don't work properly
Disks or disk drives are inaccessible
Printing doesn't work correctly
You see unusual error messages
You see distorted menus and dialog boxes
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 37
38. Adware and SpywareAdware and Spyware
Adware
Advertising Supported Software is bundled within software a computer owner
purchases
collect data on which sites the user visits, send this data back to the company and
deliver advertising based on the information
using a free software product that includes adware, so a user may opt to purchase a
registered or licensed version without adware to remove the ads
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 38
39. Adware and SpywareAdware and Spyware
Spyware
type of malware that is considered by many to be privacy-invasive. Spyware can
steal a user’s information or corrupt the user’s system files
Antivirus software today detects and removes both adware
and spyware
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 39
40. How to protect your computerHow to protect your computer
against virusesagainst viruses
Protect your computer current with the latest updates.
Use an Internet firewall (Note: Windows XP with SP2 has a firewall already built-in
and active).
A firewall is a system that prevents unauthorized use and access to your computer
A firewall can be either hardware or software.
Subscribe to industry standard antivirus software and keep it current.
Never open an e-mail attachment from someone you don't know
Avoid opening an e-mail attachment from someone you know, unless you know
exactly what the attachment is because the sender may be unaware that it contains
a virus.
If you use Microsoft Office applications, it's a good idea to keep them updated too
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 40