This literature review discusses privacy concerns related to the use of social media, particularly Facebook. It summarizes research that finds that as social media use by businesses and government agencies has increased, so have privacy issues for individual users. Several articles describe issues like third parties accessing users' personal information without consent, flaws in privacy settings that expose more private information than users intend, and government surveillance of social media data. The review concludes that while social media companies have attempted to address some of these issues, users remain at risk of privacy breaches and unclear privacy policies pose ongoing challenges.
The case for social media management and archivingActiance, Inc.
Social media offers a number of important benefits to both users and organizations that maintain a social media presence. For example, users benefit from the use of social media by having a ready source of current information, being able to share views, and partnering with like-minded individuals. Organizations benefit by building a following among current and prospective customers, gaining competitive advantage by being perceived as thought leaders, and sharing information in ways that would not otherwise be possible using conventional communication channels. Despite the many benefits of social media for both users and organizations, there are two primary risks associated with it:
• Users can send business records, confidential information or racially or sexually offensive content using social media tools in violation of the law, legal best practice or corporate policies.
• Users can generate content using social media that needs to be preserved according to corporate and regulatory retention requirements – but often is not.
Actiance whitepaper-ost-federal-unified-communicationsActiance, Inc.
Federal agencies must manage content in a manner that is consistent with the growing number of Federal regulations focused on information security and content retention. This includes the traditional content medium of paper, of course, but more recently, content sent electronically through email and instant messages.
Why you need to focus on social networking in your companyActiance, Inc.
Social networking tools like Twitter, Facebook, LinkedIn and many others fill an important gap in electronic communication and information delivery, they allow the broadcast of information in ways not practical with email or other collaboration tools, while at the same time allowing a highly granular push and pull model of information delivery, such as rapid back-and-forth dialogue between employees, customers, etc. These tools can be used to build a brand or a company’s reputation, monitor perceptions about a wide range of issues, disseminate information, demonstrate industry expertise, and build brand loyalty. Social networking permits individuals to share information and companies to gain competitive advantage in ways not practical or possible with other tools.
However, social networking tools used in a corporate context also pose an enormous liability on a number of fronts.
Sbs facebook data privacy dilemma case studysmumbahelp
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...ijsptm
The privacy of personal information is an important issue affecting the confidence of internet users. The
widespread adoption of online social networks and access to these platforms using mobile devices has
encouraged developers to make the systems and interfaces acceptable to users who seek privacy. The aim
of this study is to test a wizard that allows users to control the sharing of personal information with others.
We also assess the concerns of users in terms of such sharing such as whether to hide personal data in
current online social network accounts. Survey results showed the wizard worked very well and that
females concealed more personal information than did males. In addition, most users who were concerned
about misuse of personal information hid those items. The results can be used to upgrade current privacy
systems or to design new systems that work on mobile internet devices. The system can also be used to save
time when setting personal privacy settings and makes users more aware of items that will be shared with
others.
En su conferencia, "Government 2.0.: Opportunities and challenges", Jane Fountain enseña las consecuencias del uso de herramientas tecnológicas de comunicación en la campaña y la administración de Barack Obama. 12-02-2010
Vídeo relacionado:
http://bit.ly/dp0bvx
“Social Networking Sites: A Surveillance Studies Primer”
In recognizing social networking sites as sites of sociological concern, this presentation will offer a surveillance studies perspective to this topic. Using Facebook as a case study, a review of key surveillance material as well as preliminary findings will underscore directions for future research. In particular, the popularized and controversial practice of 'Facebook stalking' will serve to illustrate how lateral (or peer-to-peer) surveillance not only supplements, but may also amplify conventional forms of monitoring.
Questions:
1) Can practices such as deception or dissimulation on social networking sites be regarded as ways of resisting surveillance?
2) What kind of connections does Facebook enable between peer-based forms of surveillance, and practices such as employee screening?
The case for social media management and archivingActiance, Inc.
Social media offers a number of important benefits to both users and organizations that maintain a social media presence. For example, users benefit from the use of social media by having a ready source of current information, being able to share views, and partnering with like-minded individuals. Organizations benefit by building a following among current and prospective customers, gaining competitive advantage by being perceived as thought leaders, and sharing information in ways that would not otherwise be possible using conventional communication channels. Despite the many benefits of social media for both users and organizations, there are two primary risks associated with it:
• Users can send business records, confidential information or racially or sexually offensive content using social media tools in violation of the law, legal best practice or corporate policies.
• Users can generate content using social media that needs to be preserved according to corporate and regulatory retention requirements – but often is not.
Actiance whitepaper-ost-federal-unified-communicationsActiance, Inc.
Federal agencies must manage content in a manner that is consistent with the growing number of Federal regulations focused on information security and content retention. This includes the traditional content medium of paper, of course, but more recently, content sent electronically through email and instant messages.
Why you need to focus on social networking in your companyActiance, Inc.
Social networking tools like Twitter, Facebook, LinkedIn and many others fill an important gap in electronic communication and information delivery, they allow the broadcast of information in ways not practical with email or other collaboration tools, while at the same time allowing a highly granular push and pull model of information delivery, such as rapid back-and-forth dialogue between employees, customers, etc. These tools can be used to build a brand or a company’s reputation, monitor perceptions about a wide range of issues, disseminate information, demonstrate industry expertise, and build brand loyalty. Social networking permits individuals to share information and companies to gain competitive advantage in ways not practical or possible with other tools.
However, social networking tools used in a corporate context also pose an enormous liability on a number of fronts.
Sbs facebook data privacy dilemma case studysmumbahelp
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...ijsptm
The privacy of personal information is an important issue affecting the confidence of internet users. The
widespread adoption of online social networks and access to these platforms using mobile devices has
encouraged developers to make the systems and interfaces acceptable to users who seek privacy. The aim
of this study is to test a wizard that allows users to control the sharing of personal information with others.
We also assess the concerns of users in terms of such sharing such as whether to hide personal data in
current online social network accounts. Survey results showed the wizard worked very well and that
females concealed more personal information than did males. In addition, most users who were concerned
about misuse of personal information hid those items. The results can be used to upgrade current privacy
systems or to design new systems that work on mobile internet devices. The system can also be used to save
time when setting personal privacy settings and makes users more aware of items that will be shared with
others.
En su conferencia, "Government 2.0.: Opportunities and challenges", Jane Fountain enseña las consecuencias del uso de herramientas tecnológicas de comunicación en la campaña y la administración de Barack Obama. 12-02-2010
Vídeo relacionado:
http://bit.ly/dp0bvx
“Social Networking Sites: A Surveillance Studies Primer”
In recognizing social networking sites as sites of sociological concern, this presentation will offer a surveillance studies perspective to this topic. Using Facebook as a case study, a review of key surveillance material as well as preliminary findings will underscore directions for future research. In particular, the popularized and controversial practice of 'Facebook stalking' will serve to illustrate how lateral (or peer-to-peer) surveillance not only supplements, but may also amplify conventional forms of monitoring.
Questions:
1) Can practices such as deception or dissimulation on social networking sites be regarded as ways of resisting surveillance?
2) What kind of connections does Facebook enable between peer-based forms of surveillance, and practices such as employee screening?
Important Issues for Federal Agencies to Consider When Using Social Media and...Osterman Research, Inc.
This white paper discusses some of the technologies in use by the US Federal government, it provides an overview of some of the variety of regulations imposed upon Federal agencies, and it offers advice on what Federal agencies should do to mitigate the risks created by use of established and new communications technologies.
Literature Review of Information Behaviour on Social MediaDavid Thompson
Using your knowledge about information resource and skills in searching and evaluating information achieved in the first half of the semester, now you are required to choose a specific topic in the area of information research, explore the exisiting literature within this domain and write a literature review.
Case Analysis Presentation On Facebook Data BreachSiddhesh Shah
This case is basically all about Facebook data breach which was done through Cambridge Analytica Company, and allegation was charged on the Facebook company because this data breached was said to influence the US President Election.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Online radicalisation: work, challenges and future directionsMiriam Fernandez
Talk at Staffordshire University. 5th of March 2020. Describes some of the work we have conducted for online radicalisation, including some of the challenges identified
The Design of an Online Social Network Site for Emergency Management: A One-S...guest636475b
Web 2.0 is creating new opportunities for communication and collaboration. Part of this explosion is the increase in popularity and use of Social Network Sites (SNSs) for general and domain-specific use. In the emergency domain there are a number of websites, wikis, SNSs, etc. but they stand as silos in the field, unable to allow for cross-site collaboration. In this paper we describe ongoing design science research to develop and refine guiding principles for developing an SNS that will bring together emergency domain professionals in a “one-stop-shop.” We surveyed emergency professionals who study crisis information systems, to ascertain potential functionalities of such an SNS. Preliminary results suggest that there is a need for the envisioned SNS. Future research will continue to explore possible solutions to issues addressed in this paper.
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
Ensuring privacy of users of social networks is probably an unsolvable conundrum. At the same time, an informed use of the existing privacy options by the social network participants may alleviate - or even prevent - some of the more drastic privacy-averse incidents. Unfortunately, recent surveys show that an average user is either not aware of these options or does not use them, probably due to their perceived complexity. It is therefore reasonable to believe that tools assisting users with two tasks: 1) understanding their social net behaviour in terms of their privacy settings and broad privacy categories, and 2)recommending reasonable privacy options, will be a valuable tool for everyday privacy practice in a social
network context. This paper presents YourPrivacyProtector, a recommender system that shows how simple machine learning techniques may provide useful assistance in these two tasks to Facebook users. We support our claim with empirical results of application of YourPrivacyProtector to two groups of Facebook
users.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Important Issues for Federal Agencies to Consider When Using Social Media and...Osterman Research, Inc.
This white paper discusses some of the technologies in use by the US Federal government, it provides an overview of some of the variety of regulations imposed upon Federal agencies, and it offers advice on what Federal agencies should do to mitigate the risks created by use of established and new communications technologies.
Literature Review of Information Behaviour on Social MediaDavid Thompson
Using your knowledge about information resource and skills in searching and evaluating information achieved in the first half of the semester, now you are required to choose a specific topic in the area of information research, explore the exisiting literature within this domain and write a literature review.
Case Analysis Presentation On Facebook Data BreachSiddhesh Shah
This case is basically all about Facebook data breach which was done through Cambridge Analytica Company, and allegation was charged on the Facebook company because this data breached was said to influence the US President Election.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Online radicalisation: work, challenges and future directionsMiriam Fernandez
Talk at Staffordshire University. 5th of March 2020. Describes some of the work we have conducted for online radicalisation, including some of the challenges identified
The Design of an Online Social Network Site for Emergency Management: A One-S...guest636475b
Web 2.0 is creating new opportunities for communication and collaboration. Part of this explosion is the increase in popularity and use of Social Network Sites (SNSs) for general and domain-specific use. In the emergency domain there are a number of websites, wikis, SNSs, etc. but they stand as silos in the field, unable to allow for cross-site collaboration. In this paper we describe ongoing design science research to develop and refine guiding principles for developing an SNS that will bring together emergency domain professionals in a “one-stop-shop.” We surveyed emergency professionals who study crisis information systems, to ascertain potential functionalities of such an SNS. Preliminary results suggest that there is a need for the envisioned SNS. Future research will continue to explore possible solutions to issues addressed in this paper.
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
Ensuring privacy of users of social networks is probably an unsolvable conundrum. At the same time, an informed use of the existing privacy options by the social network participants may alleviate - or even prevent - some of the more drastic privacy-averse incidents. Unfortunately, recent surveys show that an average user is either not aware of these options or does not use them, probably due to their perceived complexity. It is therefore reasonable to believe that tools assisting users with two tasks: 1) understanding their social net behaviour in terms of their privacy settings and broad privacy categories, and 2)recommending reasonable privacy options, will be a valuable tool for everyday privacy practice in a social
network context. This paper presents YourPrivacyProtector, a recommender system that shows how simple machine learning techniques may provide useful assistance in these two tasks to Facebook users. We support our claim with empirical results of application of YourPrivacyProtector to two groups of Facebook
users.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
Protecting personal information privacy has become a controversial issue among online social network
providers and users. Most social network providers have developed several techniques to decrease threats
and risks to the users’ privacy. These risks include the misuse of personal information which may lead to
illegal acts such as identity theft. This study aims to measure the awareness of users on protecting their
personal information privacy, as well as the suitability of the privacy systems which they use to modify
privacy settings. Survey results show high percentage of the use of smart phones for web services but the
current privacy settings for online social networks need to be improved to support different type of mobile
phones screens. Because most users use their mobilephones for Internet services, privacy settings that are
compatible with mobile phones need to be developed. The method of selecting privacy settings should also
be simplified to provide users with a clear picture of the data that will be shared with others. Results of this
study can be used to develop a new privacy system which will help users control their personal information
easily from different devices, including mobile Internet devices and computers.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Order 32740459
1. Running Head: PRIVACY CONCERNS ON FACEBOOK 1
University
Literature Review in “Privacy Concerns on Facebook”
Assignment # 3 Second edition
June 16th, 2014
2. PRIVACY CONCERNS ON FACEBOOK 2
Literature Review
Patino, A., Pitta, D. A., & Quinones, R. (2012). Social Media's Emerging Importance in Market
Research. Journal of Consumer Marketing, 233-237.
Social Media has gained high importance in area of market research, business, and social
lives of people. Most firms and consultants make decisions on basis of social networking
websites results. Businesses are now using social sites and applications to earn profits by
different means, i.e. ads postings, web page discussions, and user focused marketing. These
social media websites serve as the means of communication between the businesses and
customers. It has also been observed that the effectiveness of traditional marketing and research
techniques has been reduced due to social media. However, the advancements in social
networking has also led various privacy issues (Patino, Pitta, & Quinones, 2012).
Linklaters. (2014). Social Media and the Law: A Handbook for UK Companies. LinklatersLLP.
According to the Linklaters (2014) report, growth of social networking has been
significantly increased in past few years. Facebook users have been increased up to 1.2 billion in
the last 10 years, i.e. fifth of the world population. Similarly, Twitter was launched in 2006, but
in just few years, its number of users has grown up to 230 million users. LinkedIn also has more
than 259 million users all over the world. In addition to the individual accounts, the growth has
also been observed in the Facebook pages of the companies. Most companies today deal with the
customers by means of social networking sites.
3. PRIVACY CONCERNS ON FACEBOOK 3
Lloyd's. (2011, Mar 11). The Emerging Risks of Social Networking. Retrieved from Lloyd's:
http://www.lloyds.com/news-and-insight/news-and-features/emerging-risk/emerging-
risk-2011/the-emerging-risks-of-social-networking
Recent reports by Deloitte found that firms using social networking sites for research and
marketing are at higher risk than other organizations following traditional means. Moreover,
these new techniques of business marketing are not yet clear; neither any written policies have
been developed for social networks. It was surveyed and found out that about 43% of health
sciences firms had no guidelines or policies for managing adverse events. Other risks involved
are intellectual property infringement, sharing of personal information, and so on (Lloyd's,
2011).
Linklaters. (2014). Social Media and the Law: A Handbook for UK Companies. LinklatersLLP.
It is though difficult to control privacy issues in social networking sites but still certain
policies and strategies can help reducing these issues. First, social networks should keep its users
well informed about the privacy standard. They should know how secure is their personal
information and what the owners are doing with this data. If any personal information of the
users is forwarded to third party or for any other purpose, it should be in notice of the users. This
information can only be used with the consent of the users. Moreover, provide users with an easy
way to understand security polices and steps to implement them (Linklaters, 2014).
Linklaters. (2014). Social Media and the Law: A Handbook for UK Companies. LinklatersLLP.
An organization is responsible for implementation of data protection legislation and
therefore, it must take consistent measures to secure data especially users’ personal information.
This personal information is of high interest for the criminals as they can use this data in identity
4. PRIVACY CONCERNS ON FACEBOOK 4
fraud and other criminal activities. In 2011, Sony’s PlayStation Network was hacked and
personal information of 77 million customers was leaked. This cost around $1.25 billion loss to
the company (Linklaters, 2014).
Batorski, D. (2012). The Burden of Big Data.
Most of the social media websites generate a large amount of data daily. Facebook
generates 500 terabytes of information in a day. This information is a fertile ground for the
analysis of Big Data. Similarly, Google also generates hug amount of data on regular basis.
Google and Facebook use this big data by creating data profile of each user who visits the same
day. This information is recorded, and the relevant ads of their interest are posted on their page.
This profile is incredibly valuable for marketing purposes. Most of the small and large
businesses make a contract with the social networking websites and pay them for posting their ad
on the page of concerned users. Similarly, Government Agencies also use services of social
networking websites to collect information about the citizens and other purposes (Batorski,
2012).
Semitsu, J. (2011). From Facebook to Mug Shot: How the Dearth of Social Networking Privacy
Rights Revolutionized Online Government Surveillance. Social Science Research Network.
Government agencies and local authorities also use Facebook information to investigate
crimes and collect evidences. These agencies collect information like location, motives, and
other demographic information. At times, these agencies also get an access to the
communications to collect deep information. Facebook has not restricted profiles from
Government Agencies, and that renders doubt in minds of users regarding privacy (Semitsu,
2011).
5. PRIVACY CONCERNS ON FACEBOOK 5
Kirkpatrick, D. (2010). The Facebook Effect: The Inside Story of the Company that is
Connecting the World. 191.
Social Networking websites like Facebook and Twitter are rapidly gaining popularity.
These websites provide a platform to people around the world to connect with each other and
eliminate distances. However, these services are also carrying critical user privacy issues along
with them. Hull, Lipford, and Latulipe (2011) studied two new features of Facebook, News Feed
and Applications. News Feed that appeared on Facebook page of every user in 2006 had
experience various issues. It displays recent activities of other Facebook friends. The similar
kind of feature, i.e. MiniFeed was also introduced during the same time. It keeps log of similar
kind of events on every user’s profile. Newsfeed was given an access to various posts and
pictures of friends of friends. Similarly, in case of Applications, when the user access any
application, he/she not only invisibly shares personal information, but a friend’s information as
well with third party. Large number of users reacted on this issue and for this reason, and
Facebook introduced new privacy features. In May 2010, the control was given to the users by
which they could choose options to enable to disable, which information to broadcast in News
Feed. It also added various new privacy controls, i.e. to manage access to selective status
updates, photos, and other posts (Kirkpatrick, 2010).
Milian, M. (2011, June 9). Facebook lets users opt out facial recognition. Retrieved from CNN:
http://edition.cnn.com/2011/TECH/social.media/06/07/facebook.facial.recognition/
In June 2011, Facebook introduced new feature that is automatic facial recognition. The
facial recognition while tagging a friend has also engendered various privacy issues. It gives tag
suggestions by comparing it with photos of friends that they have recently uploaded. This feature
access friend’s photos even if they have set it private. This issue raised large number of
6. PRIVACY CONCERNS ON FACEBOOK 6
complaints. Data protection officials also complained that this feature is activated without the
consent of the user. For this reason, Facebook introduced privacy feature by which users can
disable this option. However, the privacy issue is still there (Milian, 2011).
Woollaston, V. (2013, September 18). Facebook users are committing 'virtual identity suicide' in
droves and quitting the site over privacy and addiction fears. Retrieved from Daily Mail:
http://www.dailymail.co.uk/sciencetech/article-2423713/Facebook-users-committing-virtual-
identity-suicide-quitting-site-droves-privacy-addiction-fears.html
Many users report that they experience glitches during the use of Facebook. It has been
observed at times that any post get visible even after setting it to private. An incident occurred in
May 2010, unauthorized users got an access to private chat logs of their friends on Facebook.
Though, such bugs are fixed quickly, but lots of information may get leaked in just few hours of
time (Wortham, 2010).
Privacy Rights Clearinghouse. (2010, June). Fact Sheet 35: Social Networking Privacy: How to
be Safe, Secure, and Social. Retrieved from Privacy Rights :
https://www.privacyrights.org/social-networking-privacy-how-be-safe-secure-and-social
Users’ personal information on the social networks like Facebook may also be accessed
through electronic tracking. It was found by the AT&T Labs and Worester Polytechnic Institute,
there is a unique identifying code that is assigned to users by social networks. This code can be
matched with behavior of particular user found through cookies, and thus, profile can be built
using information of his/her browsing habits. For this purpose, social networks have introduced
various techniques and codes to improve the level of security (Privacy Rights Clearinghouse,
2010).
7. PRIVACY CONCERNS ON FACEBOOK 7
Liu, Y., Gummadi, K. P., Krishnamurthy, B., & Mislove, A. (2011). Analyzing Facebook
Privacy Settings: User Expectations Vs. Reality. IMC '11 Proceedings of the 2011 ACM
SIGCOMM conference on Internet measurement conference , (pp. 61-70). New York.
Liu, Gummadi, Krishnamurthy, and Mislove (2011) studied 200 Facebook users to study
the actual privacy settings that users experience. It was found that 36% of the content remained
shared using the default privacy settings, and only 37% of the privacy settings match with the
users’ expectations. It most of the time expose content to more people that expected. This study
shows that either there are flaws in the privacy settings of the Facebook or people don’t
understand the correct implementation of these settings.
Woollaston, V. (2013, September 18). Facebook users are committing 'virtual identity suicide' in
droves and quitting the site over privacy and addiction fears. Retrieved from Daily Mail:
http://www.dailymail.co.uk/sciencetech/article-2423713/Facebook-users-committing-virtual-
identity-suicide-quitting-site-droves-privacy-addiction-fears.html
According to some recent studies, it has been observed that Facebook users are quitting
with social network websites due to increasing concerns of privacy. The researchers of Vienna
analyzed 600 people that found that among various reasons of why people are deleting or
inactivating their Facebook accounts, one is data protection issues. According to Eircom B&A
Survey 2013, 48.3 per cent users quit Facebook due to privacy concerns, 13.5 per cent due to
general dissatisfaction, 12.6 per cent due to shallow conversations, and 6 per cent due to fear of
becoming addicted (Woollaston, 2013).
8. PRIVACY CONCERNS ON FACEBOOK 8
Esguerra, R. (2010, April 28). A Handy Facebook-to-English Translator. Retrieved from
Electronic Frontier Foundation: https://www.eff.org/deeplinks/2010/04/handy-facebook-english-
translator
Electronic Frontier Foundation in 2010 identified two techniques of personal information
aggregation that are instant personalization and connections. It was demonstrated that
information is saved with an intention of not making it public, even then anyone can get an
access to that particular information. Facebook user connection is made with the post or else on
just clicking “Like” button, even if it is done on Facebook website or an external link. Facebook
considers this relationship as public information and for this reason, it may display user’s
identity on the Facebook page of a friend or any product/service page (Esguerra, 2010).
Esguerra, R. (2010, April 28). A Handy Facebook-to-English Translator. Retrieved from
Electronic Frontier Foundation: https://www.eff.org/deeplinks/2010/04/handy-facebook-english-
translator
Similarly, instant personalization links up Facebook information with certain affiliated
website. For example, a music website that is linked with Facebook, shares a user’s list of
“liked” bands and thus help users to automatically get the playlist of preferred songs. However,
Electronic Frontier Foundation found that instant personalization opens a way to data leakage.
When the user visits the website in the pilot program, it accesses your current location, picture,
name, friend list, and pages that you have liked. A user who opts out of instant personalization is
still not safe from the data leakage, if his/her friends are using it. Because, such instant
personalization websites also access friends list information and anything that Facebook has set
as public. A user can only be safe from data leakage if these websites are blocked individually.
9. PRIVACY CONCERNS ON FACEBOOK 9
These settings are quite confusing for the common person, and therefore, Facebook must explain
it in easy terms (Esguerra, 2010).