SlideShare a Scribd company logo
1 of 17
1 | P a g e
Chapter 1. Business Case
1.1 Introduction
Normally telephone calls or e-mails were the most popular way friends and family
communicated with each other. However, telephone calls, especially long distance could be
very expensive and e-mails did not guarantee an immediate response .Since the introduction of
social networking sites, the way people communicate has changed drastically. Since the rise of
the social networking sites, people have formed relationships with people from far away from
their geographic location.
Common problems to social networking sites include issues with security, privacy,
inappropriate content and cyber bullying (Hinduja, S. Patchin, J.W. (n.d)). In light of addressing
these issues, this fourth year project review Amba in greater details, on how lack of security can
be reduced. By focusing on the current social networking site like Facebook, user can view
someone’s personal information without being his/her friend. Amba will rectify the mistakes
that were made by other social networking site developers.
2 | P a g e
1.2 Literature Review
Social networking is an easy way of communicating with friends and family, while some use
it to make new friends. Before social networking sites, people use to communicate by e-
mail and telephone calls and it was costing more, especially long distance phone calls. Social
networking sites allows people to share what on their mind, pictures and related personal
information
This literature review is based on trust and security settings. It’s important to talk about
trust and security as most of the people share their personal details more this days
compared to previous years. Teens are sharing more information about themselves on
social media sites than they did in the past. According to the survey taken in both 2006 and
2012,shows that soft personal information like cell phone number were more likely to be
shared by teen social media users (Beaton,M. Cortesi,S. Duggan,M. Gasser,U. Lenhart,A.
Madden,M. et al.(2013)). This statistics shows how teenagers share their personal
information on social networking sites, “91% post a photo of themselves, up from 79% in
2006, 53% post their email address, up from 29%” (Beaton, et al. (2013)).
Facebook is a social networking site that began with a focus on colleges and universities,
but now includes high schools and other organizations; some of the organizations even
advertise their product(s) on Facebook (Newman,A.A (2011)). Facebook members reveal a
lot of information about them, and are not aware of privacy options or who can actually
view their profile.
Common problems are, availability of soft personal information easily, and once you invite
someone you can still get their timeline and updates even though they did not accepted
you which is creepy, a person do not have to see someone’s timeline until they become
friends. Again there is Follow option on Facebook were a person follow someone to get
every update about that person, is either the person upload a photo or change the
3 | P a g e
telephone number, the updates will be sent automatically, this easy way of accessing
someone’s information, and stockers can easily stock you anytime and everywhere.
Amba would not eliminate the number of information shared on the site, but its intention is
to reduce accessibility of someone’s information without being friends first or even if they
are friends. When a person registers to be a member of Amba, they will receive a unique
identifier key that they can share it with their friends and family. Search option will only
search by unique pin, if you search a person by a name or surname you won’t find any
results, by that it will eliminate the number of unknown people to jump on your profile.
Lastly, Amba will not have follow option.
1.3 RelatedSystem’s Analysis
Focusing on a big social networking site (Facebook), there is lack of security setting, the security
setting have loopholes on it. Information is easily available for people to see, by having
someone’s fragile information like cell number or location can result, to stockers to stock you
easily.
Highlighting a little bit about Amba social networking site, when a person register to be a user,
him/her will receive a unique identifier pin which she/he can give it to her/his friends and
family so that they can invite him/her
1.4 Conclusions
Social networking online involves using Web sites to share information with others and
connect with them by creating a profile that may include a personal Web page. Social
networking sites allow users to add friends, send messages and comment on others' profile
pages.
4 | P a g e
Chapter 2 Requirements Specifications
2.1 Introduction
Current social networking sites have many short-comings, for example, personal information is
freely available and accessible. The main objective of this project is to develop a secure social
networking site, called AMBA which will avoid several of the above mentioned short-comings.
The purpose of this chapter is to highlight the requirements specifications that need to be met
when developing a secure social networking site (AMBA). Various project specifications and
problems with current social networking site will also be briefly mentioned.
The functional and non-functional requirements will be discussed. A brief problem scope also
included in this chapter, which describes the background of how this system will integrates with
another system. This chapter also contains what the projects objectives are and what significant
change this project could make by simply improving previous systems that are currently
available.
5 | P a g e
2.2 ProblemStatement /Opportunity /Directive
There are several social networking sites (e.g. Facebook, Twitter, and Twoo) that are very
popular, they provide a platform for people to communicate and share information (e.g. news,
status, photo) very easily. However, these sites come with a price. Some of the main problems
that arise from these social networking sites are easily available of soft personal information.
2.3 Objectives/ProposedSolution
The main objective of AMBA is to reduce the availability of soft personal information, as
strangers able to obtain other’s people personal information very easily.
AMBA will provide a Personal Identification Number (PIN) to each and every user, a user will
give his/her pin to the people he/she would want to chat with. The friend request will require
PROBLEM/OPPORTUNITY STATEMENT
Brief Statement of Problem, Opportunity or Directive:
Personal information is freely and easily available on current social networking sites.
Cause and Effect:
Cause: Lack of tight security options.
Effect: Stalker friendly, Theoretically, someone that you do not even know can say that they
go to your school, add you, and get all of your information. This may include your phone
number, house address, and locations you visit frequently
System Objective:
To reduce the availability of information.
To make a social networking site more secure.
6 | P a g e
information more than just a pin, the person sending friend request will also be required to
provide some personal information, for example, their full names and how they know the
person.
And as people share other people’s information, AMBA will have an option where you first
chat with the person who invited you so that you can know him/her before you accept the
friendship.
On the problem of stalkers being able to search you and check your information, this project is
going to handle it by not allowing users to search others by their names or surnames. This
project will use tools like Visual Studio, SQL Server to solve the problems.
2.4 Project Scope
2.4.1 Business Data Requirements(Information Scope)
Must have’s
 User personal information
 Administrator personal information
2.4.2 Business Data Requirements(Functional Scope)
Must have’s
 User registration
 User verification
 Administrator authentication
 Database storage and retrieval
2.4.3 Business Data Requirements (Communication Scope)
Must have’s
 Web based application
7 | P a g e
2.5 Project Specification (Requirements)
2.5.1 Functional Requirements
 User (people) must register to use the site
 User (people) must login if they have already a member
 User must search people by the unique identifier pin
 User must request friendship
 User must post status
 User must comment
2.5.2 Non-functional (reliability/performance) requirements
 Allow failure of log in must not more than three times
 The search engine has ability to search by unique pin.
 Users can post, like and comment.
2.5.3 User Interface requirements
 User identification window (The user identification window shall display the name
of the user logged)
 Navigation
8 | P a g e
2.5.4 Database requirements
2.6 Conclusions
This chapter clearly discussed the problems with the current social networking sites (e.g.
Facebook). There is definitely a need of a more secure social networking site, like AMBA, to
reduce the availability of the information. This chapter discussed the hardware and the
software needed to develop AMBA social networking site.
9 | P a g e
Chapter 3: Detailed Technical Design
3.1 Introduction
The purpose of this document is to outline the technical design of AMBA social networking
system and provide an overview for AMBA implementation.
Its main purpose is to -
• Provide the link between the Functional Specification and the detailed Technical
Design documents
This document is not intended to address installation and configuration details of the actual
implementation. As is true with any high level design, this document will be updated and
refined based on changing requirements.
10 | P a g e
3.2 Analysis
Users play a big role in this system, a User interaction with the systemis the major role. The
User will register by entering his/her personal details to become an active member or user of
AMBA social networking site
When a user register to the system, using a computer, a User is required to fill all information
required then the user will be called a member of AMBA. AMBA store all information on SQL
Server database
User Computer System
11 | P a g e
3.3 User Interface
12 | P a g e
13 | P a g e
14 | P a g e
15 | P a g e
16 | P a g e
3.4 Database Design
17 | P a g e
3.5 Conclusions
This document shows that the number of methodologies, methods and techniques as proposed
in the literature, how data flow will occur. AMBA Social networking online involves using Web
sites to share information with others and connect with them by creating a profile that may
include a personal Web page. Social networking sites allow users to add friends, send messages
and comment on others' profile pages.

More Related Content

What's hot

A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesIRJET Journal
 
Project Proposal Based On Social Media
Project Proposal Based On Social MediaProject Proposal Based On Social Media
Project Proposal Based On Social MediaNahian Sarower
 
2000-ACM SIGCHI-The social life of small graphical chat spaces
2000-ACM SIGCHI-The social life of small graphical chat spaces2000-ACM SIGCHI-The social life of small graphical chat spaces
2000-ACM SIGCHI-The social life of small graphical chat spacesMarc Smith
 
Social Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A ModelSocial Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A ModelIJMER
 
Iccee2012 paper baylon
Iccee2012 paper   baylonIccee2012 paper   baylon
Iccee2012 paper baylonLeahcim Nolyab
 
IRJET- Application of Case based Algorithm in Design and Development of a...
IRJET-  	  Application of Case based Algorithm in Design and Development of a...IRJET-  	  Application of Case based Algorithm in Design and Development of a...
IRJET- Application of Case based Algorithm in Design and Development of a...IRJET Journal
 
Melanie g done 6565
Melanie g done 6565Melanie g done 6565
Melanie g done 6565pizonaim
 
Development of Security Detection Model for the Security of Social Blogs and ...
Development of Security Detection Model for the Security of Social Blogs and ...Development of Security Detection Model for the Security of Social Blogs and ...
Development of Security Detection Model for the Security of Social Blogs and ...AIRCC Publishing Corporation
 
Ashpiaaaaa
AshpiaaaaaAshpiaaaaa
Ashpiaaaaapizonaim
 
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY   diana cerojales and jude bagayEMPOWERMENT TECHNOLOGY   diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagayniniogolo
 
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...IJASRD Journal
 

What's hot (16)

A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
 
Web 2.0 ... How to
Web 2.0 ... How toWeb 2.0 ... How to
Web 2.0 ... How to
 
Project Proposal Based On Social Media
Project Proposal Based On Social MediaProject Proposal Based On Social Media
Project Proposal Based On Social Media
 
Facebook
FacebookFacebook
Facebook
 
2000-ACM SIGCHI-The social life of small graphical chat spaces
2000-ACM SIGCHI-The social life of small graphical chat spaces2000-ACM SIGCHI-The social life of small graphical chat spaces
2000-ACM SIGCHI-The social life of small graphical chat spaces
 
Social Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A ModelSocial Tagging Of Multimedia Content A Model
Social Tagging Of Multimedia Content A Model
 
Iccee2012 paper baylon
Iccee2012 paper   baylonIccee2012 paper   baylon
Iccee2012 paper baylon
 
Facebook primer
Facebook primerFacebook primer
Facebook primer
 
IRJET- Application of Case based Algorithm in Design and Development of a...
IRJET-  	  Application of Case based Algorithm in Design and Development of a...IRJET-  	  Application of Case based Algorithm in Design and Development of a...
IRJET- Application of Case based Algorithm in Design and Development of a...
 
Blogosphere
BlogosphereBlogosphere
Blogosphere
 
Melanie g done 6565
Melanie g done 6565Melanie g done 6565
Melanie g done 6565
 
Development of Security Detection Model for the Security of Social Blogs and ...
Development of Security Detection Model for the Security of Social Blogs and ...Development of Security Detection Model for the Security of Social Blogs and ...
Development of Security Detection Model for the Security of Social Blogs and ...
 
Ashpiaaaaa
AshpiaaaaaAshpiaaaaa
Ashpiaaaaa
 
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY   diana cerojales and jude bagayEMPOWERMENT TECHNOLOGY   diana cerojales and jude bagay
EMPOWERMENT TECHNOLOGY diana cerojales and jude bagay
 
ICT
ICTICT
ICT
 
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
 

Similar to June Documentation

Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.STO STRATEGY
 
Social network privacy
Social network privacySocial network privacy
Social network privacySTO STRATEGY
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guideYury Chemerkin
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.Yury Chemerkin
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
Identification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social NetworksIdentification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social Networkseditorjournal
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image PrivacyIOSR Journals
 
Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...rahulmonikasharma
 
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...Nicola Osborne
 
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docxjoyjonna282
 
Privacy of facebook
Privacy of facebookPrivacy of facebook
Privacy of facebookhernan_j1
 
Facebook and Security Settings Report
Facebook and Security Settings ReportFacebook and Security Settings Report
Facebook and Security Settings ReportAbhishek Gupta
 
Finaly! Untangling Web 2.0
Finaly! Untangling Web 2.0Finaly! Untangling Web 2.0
Finaly! Untangling Web 2.0sydneyblackmore
 
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET Journal
 
SXSW09: The Future Of Social Networks
SXSW09: The Future Of Social NetworksSXSW09: The Future Of Social Networks
SXSW09: The Future Of Social NetworksCharlene Li
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkeSAT Publishing House
 

Similar to June Documentation (20)

Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guide
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015
 
Identification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social NetworksIdentification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social Networks
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
 
Social networks
Social networksSocial networks
Social networks
 
Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...
 
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...
Cataloguing Your Friends and Neighbours: Personal Metadata and the Opportunit...
 
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 
Privacy of facebook
Privacy of facebookPrivacy of facebook
Privacy of facebook
 
Facebook and Security Settings Report
Facebook and Security Settings ReportFacebook and Security Settings Report
Facebook and Security Settings Report
 
Finaly! Untangling Web 2.0
Finaly! Untangling Web 2.0Finaly! Untangling Web 2.0
Finaly! Untangling Web 2.0
 
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat Application
 
SXSW09: The Future Of Social Networks
SXSW09: The Future Of Social NetworksSXSW09: The Future Of Social Networks
SXSW09: The Future Of Social Networks
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
 
Social media
Social mediaSocial media
Social media
 

June Documentation

  • 1. 1 | P a g e Chapter 1. Business Case 1.1 Introduction Normally telephone calls or e-mails were the most popular way friends and family communicated with each other. However, telephone calls, especially long distance could be very expensive and e-mails did not guarantee an immediate response .Since the introduction of social networking sites, the way people communicate has changed drastically. Since the rise of the social networking sites, people have formed relationships with people from far away from their geographic location. Common problems to social networking sites include issues with security, privacy, inappropriate content and cyber bullying (Hinduja, S. Patchin, J.W. (n.d)). In light of addressing these issues, this fourth year project review Amba in greater details, on how lack of security can be reduced. By focusing on the current social networking site like Facebook, user can view someone’s personal information without being his/her friend. Amba will rectify the mistakes that were made by other social networking site developers.
  • 2. 2 | P a g e 1.2 Literature Review Social networking is an easy way of communicating with friends and family, while some use it to make new friends. Before social networking sites, people use to communicate by e- mail and telephone calls and it was costing more, especially long distance phone calls. Social networking sites allows people to share what on their mind, pictures and related personal information This literature review is based on trust and security settings. It’s important to talk about trust and security as most of the people share their personal details more this days compared to previous years. Teens are sharing more information about themselves on social media sites than they did in the past. According to the survey taken in both 2006 and 2012,shows that soft personal information like cell phone number were more likely to be shared by teen social media users (Beaton,M. Cortesi,S. Duggan,M. Gasser,U. Lenhart,A. Madden,M. et al.(2013)). This statistics shows how teenagers share their personal information on social networking sites, “91% post a photo of themselves, up from 79% in 2006, 53% post their email address, up from 29%” (Beaton, et al. (2013)). Facebook is a social networking site that began with a focus on colleges and universities, but now includes high schools and other organizations; some of the organizations even advertise their product(s) on Facebook (Newman,A.A (2011)). Facebook members reveal a lot of information about them, and are not aware of privacy options or who can actually view their profile. Common problems are, availability of soft personal information easily, and once you invite someone you can still get their timeline and updates even though they did not accepted you which is creepy, a person do not have to see someone’s timeline until they become friends. Again there is Follow option on Facebook were a person follow someone to get every update about that person, is either the person upload a photo or change the
  • 3. 3 | P a g e telephone number, the updates will be sent automatically, this easy way of accessing someone’s information, and stockers can easily stock you anytime and everywhere. Amba would not eliminate the number of information shared on the site, but its intention is to reduce accessibility of someone’s information without being friends first or even if they are friends. When a person registers to be a member of Amba, they will receive a unique identifier key that they can share it with their friends and family. Search option will only search by unique pin, if you search a person by a name or surname you won’t find any results, by that it will eliminate the number of unknown people to jump on your profile. Lastly, Amba will not have follow option. 1.3 RelatedSystem’s Analysis Focusing on a big social networking site (Facebook), there is lack of security setting, the security setting have loopholes on it. Information is easily available for people to see, by having someone’s fragile information like cell number or location can result, to stockers to stock you easily. Highlighting a little bit about Amba social networking site, when a person register to be a user, him/her will receive a unique identifier pin which she/he can give it to her/his friends and family so that they can invite him/her 1.4 Conclusions Social networking online involves using Web sites to share information with others and connect with them by creating a profile that may include a personal Web page. Social networking sites allow users to add friends, send messages and comment on others' profile pages.
  • 4. 4 | P a g e Chapter 2 Requirements Specifications 2.1 Introduction Current social networking sites have many short-comings, for example, personal information is freely available and accessible. The main objective of this project is to develop a secure social networking site, called AMBA which will avoid several of the above mentioned short-comings. The purpose of this chapter is to highlight the requirements specifications that need to be met when developing a secure social networking site (AMBA). Various project specifications and problems with current social networking site will also be briefly mentioned. The functional and non-functional requirements will be discussed. A brief problem scope also included in this chapter, which describes the background of how this system will integrates with another system. This chapter also contains what the projects objectives are and what significant change this project could make by simply improving previous systems that are currently available.
  • 5. 5 | P a g e 2.2 ProblemStatement /Opportunity /Directive There are several social networking sites (e.g. Facebook, Twitter, and Twoo) that are very popular, they provide a platform for people to communicate and share information (e.g. news, status, photo) very easily. However, these sites come with a price. Some of the main problems that arise from these social networking sites are easily available of soft personal information. 2.3 Objectives/ProposedSolution The main objective of AMBA is to reduce the availability of soft personal information, as strangers able to obtain other’s people personal information very easily. AMBA will provide a Personal Identification Number (PIN) to each and every user, a user will give his/her pin to the people he/she would want to chat with. The friend request will require PROBLEM/OPPORTUNITY STATEMENT Brief Statement of Problem, Opportunity or Directive: Personal information is freely and easily available on current social networking sites. Cause and Effect: Cause: Lack of tight security options. Effect: Stalker friendly, Theoretically, someone that you do not even know can say that they go to your school, add you, and get all of your information. This may include your phone number, house address, and locations you visit frequently System Objective: To reduce the availability of information. To make a social networking site more secure.
  • 6. 6 | P a g e information more than just a pin, the person sending friend request will also be required to provide some personal information, for example, their full names and how they know the person. And as people share other people’s information, AMBA will have an option where you first chat with the person who invited you so that you can know him/her before you accept the friendship. On the problem of stalkers being able to search you and check your information, this project is going to handle it by not allowing users to search others by their names or surnames. This project will use tools like Visual Studio, SQL Server to solve the problems. 2.4 Project Scope 2.4.1 Business Data Requirements(Information Scope) Must have’s  User personal information  Administrator personal information 2.4.2 Business Data Requirements(Functional Scope) Must have’s  User registration  User verification  Administrator authentication  Database storage and retrieval 2.4.3 Business Data Requirements (Communication Scope) Must have’s  Web based application
  • 7. 7 | P a g e 2.5 Project Specification (Requirements) 2.5.1 Functional Requirements  User (people) must register to use the site  User (people) must login if they have already a member  User must search people by the unique identifier pin  User must request friendship  User must post status  User must comment 2.5.2 Non-functional (reliability/performance) requirements  Allow failure of log in must not more than three times  The search engine has ability to search by unique pin.  Users can post, like and comment. 2.5.3 User Interface requirements  User identification window (The user identification window shall display the name of the user logged)  Navigation
  • 8. 8 | P a g e 2.5.4 Database requirements 2.6 Conclusions This chapter clearly discussed the problems with the current social networking sites (e.g. Facebook). There is definitely a need of a more secure social networking site, like AMBA, to reduce the availability of the information. This chapter discussed the hardware and the software needed to develop AMBA social networking site.
  • 9. 9 | P a g e Chapter 3: Detailed Technical Design 3.1 Introduction The purpose of this document is to outline the technical design of AMBA social networking system and provide an overview for AMBA implementation. Its main purpose is to - • Provide the link between the Functional Specification and the detailed Technical Design documents This document is not intended to address installation and configuration details of the actual implementation. As is true with any high level design, this document will be updated and refined based on changing requirements.
  • 10. 10 | P a g e 3.2 Analysis Users play a big role in this system, a User interaction with the systemis the major role. The User will register by entering his/her personal details to become an active member or user of AMBA social networking site When a user register to the system, using a computer, a User is required to fill all information required then the user will be called a member of AMBA. AMBA store all information on SQL Server database User Computer System
  • 11. 11 | P a g e 3.3 User Interface
  • 12. 12 | P a g e
  • 13. 13 | P a g e
  • 14. 14 | P a g e
  • 15. 15 | P a g e
  • 16. 16 | P a g e 3.4 Database Design
  • 17. 17 | P a g e 3.5 Conclusions This document shows that the number of methodologies, methods and techniques as proposed in the literature, how data flow will occur. AMBA Social networking online involves using Web sites to share information with others and connect with them by creating a profile that may include a personal Web page. Social networking sites allow users to add friends, send messages and comment on others' profile pages.