SlideShare a Scribd company logo
Facebook
  privacy
 problem
Six areas of concern
 1.the users to share too much
    information.
   2, some users set privacy controls.
 3, the data collected by Facebook more
    than you think.
 4.the degree of data sharing beyond
    your expectations.
 5, the protection of the law is not perfect.
 6, the privacy problems are still
    increasing
Andrew Noyes
 the company treats a very
 strict privacy and security
 issues. Every day they really
 carried the privacy of
 hundreds of millions of times
 to check to ensure that they
 can to ensure that we are
 willing to share with the
 people to browse content.
 Facebook is trying to
 respond to some concerns,
 even if Post to this article,
 Facebook announced that it
 will offer users a wider
 permission to record the
 operating records of their
 past Facebook.
Application exist privacy risk
Your personal data have been leaked is through
the Facebook game and all kinds of Application. It
doesn’t matter when you open, it will get your
public information, such as your name, gender
and personal photo and your friends list, even if
you did not put this friend list public. If still give
App certain privileges, it can penetrate deeper,
even see your friend to share with you the
information, unless they are in their privacy
Settings in set up not allowed through the App to
share.
Application exist privacy risk

As a result, unless you have carefully set up
privacy control, a friend who running App can
without your knowledge for your information. The
trouble is that only found that 37% of Facebook
users said they through the privacy Settings limit
how much information can be through the App to
view.
Conclusion:

 We are concerned about
 Facebook because it is the
 world’s largest social network,
 with 800 million users, much
 higher than Google. We have
 found a number of attractive
 content, even there are
 worrisome. However that is
 worth you to understand, if you
 want to protect your privacy
 better.
Facebook Privacy



                        Ways/Tips to
Importance to
                       manage facebook
control privacy
                           privacy



   1. Protecting your       1. Don't accept unknown friend
       reputation               request from strangers.



                           2. Monitor what your friends are
    2. As one self’s        sending and sharing with you.
         safety

                            3. Make sure that what you are
                           sharing or posting is not going to
     3. Preventing                   cause regret.
      invasion of
        privacy

                          4. Manage the photos, comments,
                           and links that you are tagged in.
     4. Reducing
    psychological
         risks
                            5. Download Facebook security
                                      software.
Importance to control facebook privacy
1.Protecting your reputation
~Facebook profile (now called timeline) is a representation of you online.
~One’s own postings to be incriminating.
~45% of employers in the United States check social networking sites to
screen job applicants and a further 11% plan to do so in the future.

2. As one self’s safety
~10-15% of Facebook users set their sharing to “public,” rather than
friends-only. That’s about 500,000 of those 4.8 million location-sharers.
~Over sharing: that’s a potential tip-off for thieves who can use that
information to plan a robbery.
~Strangers had tried to be friend with you on Facebook.
~Get in contact with fake people.
3. Preventing invasion of privacy
~Information being shared without consent.
~third-party apps on Facebook require users to “opt-in” by granting
permission for an app to look at your news feed, update your status,
and so on.
4. Reducing psychological and social risks
~Psychological risks feeling uncomfortable or regretful about their
disclose, and social risks such as experiencing conflicts with parents.
Facebook privacy

More Related Content

What's hot

Fa102a, assignment 3
Fa102a, assignment 3Fa102a, assignment 3
Fa102a, assignment 3
brittanywong12
 
Internet safety at work presentation
Internet safety at work presentationInternet safety at work presentation
Internet safety at work presentation
Devlog Integrated Services
 
Facebook And Twitter What You Really Need To Know
Facebook And Twitter What You Really Need To KnowFacebook And Twitter What You Really Need To Know
Facebook And Twitter What You Really Need To Know
guestede257
 
Facebook Privacy Settings
Facebook Privacy SettingsFacebook Privacy Settings
Facebook Privacy Settings
Greater Cleveland PC Users Group
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
Scott Penton
 
9criticalsteps protectingyourselfonfacebook
9criticalsteps protectingyourselfonfacebook9criticalsteps protectingyourselfonfacebook
9criticalsteps protectingyourselfonfacebook
Kevin Sluss
 
Working with the Bird Part Deux
Working with the Bird Part DeuxWorking with the Bird Part Deux
Working with the Bird Part Deux
Tonya Oaks Smith
 
What is Instagram
What is  InstagramWhat is  Instagram
What is Instagram
Afghanistan
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
Saul Vidal Swales
 
The Best Times to Post Social Media
The Best Times to Post Social MediaThe Best Times to Post Social Media
The Best Times to Post Social Media
Ariful Islam
 
KPS Appy night out
KPS Appy night out KPS Appy night out
KPS Appy night out Greg Fry
 
Irwin Onlinepresentation
Irwin OnlinepresentationIrwin Onlinepresentation
Irwin Onlinepresentation
apberard
 
Internet safety
Internet safetyInternet safety
Internet safety
Sofia Cennini Zezere
 
Tic(1)
Tic(1)Tic(1)
Social Media Spring Cleaning
Social Media Spring CleaningSocial Media Spring Cleaning
Social Media Spring Cleaning
US Navy Social Media
 

What's hot (18)

Fa102a, assignment 3
Fa102a, assignment 3Fa102a, assignment 3
Fa102a, assignment 3
 
Internet safety at work presentation
Internet safety at work presentationInternet safety at work presentation
Internet safety at work presentation
 
Facebook And Twitter What You Really Need To Know
Facebook And Twitter What You Really Need To KnowFacebook And Twitter What You Really Need To Know
Facebook And Twitter What You Really Need To Know
 
C1
C1C1
C1
 
Facebook Privacy Settings
Facebook Privacy SettingsFacebook Privacy Settings
Facebook Privacy Settings
 
Computer SOS
Computer SOSComputer SOS
Computer SOS
 
Internet safety
Internet safetyInternet safety
Internet safety
 
9criticalsteps protectingyourselfonfacebook
9criticalsteps protectingyourselfonfacebook9criticalsteps protectingyourselfonfacebook
9criticalsteps protectingyourselfonfacebook
 
Working with the Bird Part Deux
Working with the Bird Part DeuxWorking with the Bird Part Deux
Working with the Bird Part Deux
 
What is Instagram
What is  InstagramWhat is  Instagram
What is Instagram
 
Internet safety gerard and saul
Internet safety gerard and saulInternet safety gerard and saul
Internet safety gerard and saul
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
The Best Times to Post Social Media
The Best Times to Post Social MediaThe Best Times to Post Social Media
The Best Times to Post Social Media
 
KPS Appy night out
KPS Appy night out KPS Appy night out
KPS Appy night out
 
Irwin Onlinepresentation
Irwin OnlinepresentationIrwin Onlinepresentation
Irwin Onlinepresentation
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Tic(1)
Tic(1)Tic(1)
Tic(1)
 
Social Media Spring Cleaning
Social Media Spring CleaningSocial Media Spring Cleaning
Social Media Spring Cleaning
 

Viewers also liked

Logos ethos pathos_e32007
Logos ethos pathos_e32007Logos ethos pathos_e32007
Logos ethos pathos_e32007kb615
 
Kom 3207 cognitive dissonance
Kom 3207 cognitive dissonanceKom 3207 cognitive dissonance
Kom 3207 cognitive dissonanceJulie Xiao
 
Iqe power point for online section
Iqe power point for online sectionIqe power point for online section
Iqe power point for online section
kb615
 
Diagnostic essay revision lesson
Diagnostic essay revision lessonDiagnostic essay revision lesson
Diagnostic essay revision lessonkb615
 
Portfolio hatem lefi_2013_02
Portfolio hatem lefi_2013_02Portfolio hatem lefi_2013_02
Portfolio hatem lefi_2013_02
Hatem Lefi
 
Media
MediaMedia
Media
Julie Xiao
 

Viewers also liked (7)

Logos ethos pathos_e32007
Logos ethos pathos_e32007Logos ethos pathos_e32007
Logos ethos pathos_e32007
 
Kom 3207 cognitive dissonance
Kom 3207 cognitive dissonanceKom 3207 cognitive dissonance
Kom 3207 cognitive dissonance
 
Iqe power point for online section
Iqe power point for online sectionIqe power point for online section
Iqe power point for online section
 
Diagnostic essay revision lesson
Diagnostic essay revision lessonDiagnostic essay revision lesson
Diagnostic essay revision lesson
 
Portfolio hatem lefi_2013_02
Portfolio hatem lefi_2013_02Portfolio hatem lefi_2013_02
Portfolio hatem lefi_2013_02
 
Media
MediaMedia
Media
 
1 mlysia
1 mlysia1 mlysia
1 mlysia
 

Similar to Facebook privacy

Guide for facebook use
Guide for facebook useGuide for facebook use
Guide for facebook useHeidi Dusek
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
Mark Rogers
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
Alan Raj
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
Alan Raj
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and Advantage
Techno World 4 U
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
RinkiSharma51
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
Himabindu905359
 
Third parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using FacebookThird parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using Facebook
Daniel Ilunga
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
Facebook Privacy.Final. Privacy settings on Facebook
Facebook Privacy.Final. Privacy settings on FacebookFacebook Privacy.Final. Privacy settings on Facebook
Facebook Privacy.Final. Privacy settings on Facebook
Salford Law School
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rainstorming23m
 
Social network
Social networkSocial network
Social network
dineshorton
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
Lisa Turner
 
How to protect your facebook account from hackers
How to protect your facebook account from hackersHow to protect your facebook account from hackers
How to protect your facebook account from hackers
Dinesh Gunathilaka
 
itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
alvindalejoyosa1
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
Liberteks
 
How to avoid facebook scams
How to avoid facebook scamsHow to avoid facebook scams
How to avoid facebook scams
Mr.OoPpSs Group
 
Responsible behaviour during Browsing of sites, social.pptx
Responsible behaviour during Browsing of sites, social.pptxResponsible behaviour during Browsing of sites, social.pptx
Responsible behaviour during Browsing of sites, social.pptx
Aditya .
 
Heads up!
Heads up!Heads up!

Similar to Facebook privacy (20)

Guide for facebook use
Guide for facebook useGuide for facebook use
Guide for facebook use
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and Advantage
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
Third parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using FacebookThird parties are actively seeking out end-user information using Facebook
Third parties are actively seeking out end-user information using Facebook
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Project
ProjectProject
Project
 
Facebook Privacy.Final. Privacy settings on Facebook
Facebook Privacy.Final. Privacy settings on FacebookFacebook Privacy.Final. Privacy settings on Facebook
Facebook Privacy.Final. Privacy settings on Facebook
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Social network
Social networkSocial network
Social network
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 
How to protect your facebook account from hackers
How to protect your facebook account from hackersHow to protect your facebook account from hackers
How to protect your facebook account from hackers
 
itEraLesson3. .pptx
itEraLesson3.                       .pptxitEraLesson3.                       .pptx
itEraLesson3. .pptx
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
 
How to avoid facebook scams
How to avoid facebook scamsHow to avoid facebook scams
How to avoid facebook scams
 
Responsible behaviour during Browsing of sites, social.pptx
Responsible behaviour during Browsing of sites, social.pptxResponsible behaviour during Browsing of sites, social.pptx
Responsible behaviour during Browsing of sites, social.pptx
 
Heads up!
Heads up!Heads up!
Heads up!
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

Facebook privacy

  • 2.
  • 3. Six areas of concern  1.the users to share too much information.  2, some users set privacy controls.  3, the data collected by Facebook more than you think.  4.the degree of data sharing beyond your expectations.  5, the protection of the law is not perfect.  6, the privacy problems are still increasing
  • 4. Andrew Noyes  the company treats a very strict privacy and security issues. Every day they really carried the privacy of hundreds of millions of times to check to ensure that they can to ensure that we are willing to share with the people to browse content. Facebook is trying to respond to some concerns, even if Post to this article, Facebook announced that it will offer users a wider permission to record the operating records of their past Facebook.
  • 5. Application exist privacy risk Your personal data have been leaked is through the Facebook game and all kinds of Application. It doesn’t matter when you open, it will get your public information, such as your name, gender and personal photo and your friends list, even if you did not put this friend list public. If still give App certain privileges, it can penetrate deeper, even see your friend to share with you the information, unless they are in their privacy Settings in set up not allowed through the App to share.
  • 6. Application exist privacy risk As a result, unless you have carefully set up privacy control, a friend who running App can without your knowledge for your information. The trouble is that only found that 37% of Facebook users said they through the privacy Settings limit how much information can be through the App to view.
  • 7. Conclusion:  We are concerned about Facebook because it is the world’s largest social network, with 800 million users, much higher than Google. We have found a number of attractive content, even there are worrisome. However that is worth you to understand, if you want to protect your privacy better.
  • 8. Facebook Privacy Ways/Tips to Importance to manage facebook control privacy privacy 1. Protecting your 1. Don't accept unknown friend reputation request from strangers. 2. Monitor what your friends are 2. As one self’s sending and sharing with you. safety 3. Make sure that what you are sharing or posting is not going to 3. Preventing cause regret. invasion of privacy 4. Manage the photos, comments, and links that you are tagged in. 4. Reducing psychological risks 5. Download Facebook security software.
  • 9. Importance to control facebook privacy 1.Protecting your reputation ~Facebook profile (now called timeline) is a representation of you online. ~One’s own postings to be incriminating. ~45% of employers in the United States check social networking sites to screen job applicants and a further 11% plan to do so in the future. 2. As one self’s safety ~10-15% of Facebook users set their sharing to “public,” rather than friends-only. That’s about 500,000 of those 4.8 million location-sharers. ~Over sharing: that’s a potential tip-off for thieves who can use that information to plan a robbery. ~Strangers had tried to be friend with you on Facebook. ~Get in contact with fake people.
  • 10. 3. Preventing invasion of privacy ~Information being shared without consent. ~third-party apps on Facebook require users to “opt-in” by granting permission for an app to look at your news feed, update your status, and so on.
  • 11.
  • 12. 4. Reducing psychological and social risks ~Psychological risks feeling uncomfortable or regretful about their disclose, and social risks such as experiencing conflicts with parents.