Submit Search
Upload
Privacy and Security in Online Social Media: A Guide
•
1 like
•
1,670 views
AI-enhanced title
IIIT Hyderabad
Follow
Privacy and Security in Online Social Media : Privacy and Social Media
Read less
Read more
Data & Analytics
Report
Share
Report
Share
1 of 20
Download now
Download to read offline
Recommended
Social network privacy & security
Social network privacy & security
nadikari123
Social Networking Security
Social Networking Security
S. M. Shakib Limon
Purple Team - Work it out: Organizing Effective Adversary Emulation Exercises
Purple Team - Work it out: Organizing Effective Adversary Emulation Exercises
Jorge Orchilles
Social engineering
Social engineering
Abdelhamid Limami
Cyber attack
Cyber attack
Manjushree Mashal
Cyber security awareness
Cyber security awareness
Jason Murray
How to Plan Purple Team Exercises
How to Plan Purple Team Exercises
Haydn Johnson
social networking site
social networking site
Abhishek Ranjan
Recommended
Social network privacy & security
Social network privacy & security
nadikari123
Social Networking Security
Social Networking Security
S. M. Shakib Limon
Purple Team - Work it out: Organizing Effective Adversary Emulation Exercises
Purple Team - Work it out: Organizing Effective Adversary Emulation Exercises
Jorge Orchilles
Social engineering
Social engineering
Abdelhamid Limami
Cyber attack
Cyber attack
Manjushree Mashal
Cyber security awareness
Cyber security awareness
Jason Murray
How to Plan Purple Team Exercises
How to Plan Purple Team Exercises
Haydn Johnson
social networking site
social networking site
Abhishek Ranjan
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Edureka!
Cyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
Ethical hacking
Ethical hacking
Mohammad Affan
Chapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K I
Dr. Ahmed Al Zaidy
Software Liability.pptx
Software Liability.pptx
RaeesKhan691281
Cybersecurity
Cybersecurity
jumanne rajabu
Illuminating the dark web
Illuminating the dark web
Jisc
Introduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
Cyber Security Awareness
Cyber Security Awareness
Ramiro Cid
Privacy and personal information
Privacy and personal information
Uc Man
PHISHING PROJECT REPORT
PHISHING PROJECT REPORT
vineetkathan
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
Harsh Bhanushali
Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
Instagram Clone | Instagram Clone App | Instagram Clone Script
Instagram Clone | Instagram Clone App | Instagram Clone Script
SwethaMohan21
Social Networking Website
Social Networking Website
guestec05a4
Certified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdf
Tuan Yang
Introduction to IoT Security
Introduction to IoT Security
CAS
Network security
Network security
Gichelle Amon
Final Year Project Report
Final Year Project Report
ChongKit liew
Blockchain and Cybersecurity
Blockchain and Cybersecurity
gppcpa
Privacy and Security in Online Social Media : Trust and Credebillity on OSM
Privacy and Security in Online Social Media : Trust and Credebillity on OSM
IIIT Hyderabad
Week 7.2 Nudges
Week 7.2 Nudges
IIIT Hyderabad
More Related Content
What's hot
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Edureka!
Cyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
Ethical hacking
Ethical hacking
Mohammad Affan
Chapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K I
Dr. Ahmed Al Zaidy
Software Liability.pptx
Software Liability.pptx
RaeesKhan691281
Cybersecurity
Cybersecurity
jumanne rajabu
Illuminating the dark web
Illuminating the dark web
Jisc
Introduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
Cyber Security Awareness
Cyber Security Awareness
Ramiro Cid
Privacy and personal information
Privacy and personal information
Uc Man
PHISHING PROJECT REPORT
PHISHING PROJECT REPORT
vineetkathan
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
Harsh Bhanushali
Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
Instagram Clone | Instagram Clone App | Instagram Clone Script
Instagram Clone | Instagram Clone App | Instagram Clone Script
SwethaMohan21
Social Networking Website
Social Networking Website
guestec05a4
Certified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdf
Tuan Yang
Introduction to IoT Security
Introduction to IoT Security
CAS
Network security
Network security
Gichelle Amon
Final Year Project Report
Final Year Project Report
ChongKit liew
Blockchain and Cybersecurity
Blockchain and Cybersecurity
gppcpa
What's hot
(20)
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cyber security awareness presentation nepal
Cyber security awareness presentation nepal
Ethical hacking
Ethical hacking
Chapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K I
Software Liability.pptx
Software Liability.pptx
Cybersecurity
Cybersecurity
Illuminating the dark web
Illuminating the dark web
Introduction to Cyber Security
Introduction to Cyber Security
Cyber Security Awareness
Cyber Security Awareness
Privacy and personal information
Privacy and personal information
PHISHING PROJECT REPORT
PHISHING PROJECT REPORT
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
Cyber security awareness for students
Cyber security awareness for students
Instagram Clone | Instagram Clone App | Instagram Clone Script
Instagram Clone | Instagram Clone App | Instagram Clone Script
Social Networking Website
Social Networking Website
Certified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdf
Introduction to IoT Security
Introduction to IoT Security
Network security
Network security
Final Year Project Report
Final Year Project Report
Blockchain and Cybersecurity
Blockchain and Cybersecurity
Viewers also liked
Privacy and Security in Online Social Media : Trust and Credebillity on OSM
Privacy and Security in Online Social Media : Trust and Credebillity on OSM
IIIT Hyderabad
Week 7.2 Nudges
Week 7.2 Nudges
IIIT Hyderabad
Week 6.2: eCrime
Week 6.2: eCrime
IIIT Hyderabad
Week 6.1: eCrime
Week 6.1: eCrime
IIIT Hyderabad
Privacy and Security in Online Social Media : Policing and Social Media - Part 3
Privacy and Security in Online Social Media : Policing and Social Media - Part 3
IIIT Hyderabad
Week 7.1 Link Farming
Week 7.1 Link Farming
IIIT Hyderabad
Week 7.3 Semantic Attacks - Spear Phishing
Week 7.3 Semantic Attacks - Spear Phishing
IIIT Hyderabad
Privacy and Security in Online Social Media : Policing and Social Media - Part 1
Privacy and Security in Online Social Media : Policing and Social Media - Part 1
IIIT Hyderabad
Week 8.2 Anonymous Networks
Week 8.2 Anonymous Networks
IIIT Hyderabad
Privacy and Security in Online Social Media : Incidents
Privacy and Security in Online Social Media : Incidents
IIIT Hyderabad
Privacy and Security in Online Social Media : OSM APIs and tools for data col...
Privacy and Security in Online Social Media : OSM APIs and tools for data col...
IIIT Hyderabad
Privacy and Security in Online Social Media : Intro to OSM
Privacy and Security in Online Social Media : Intro to OSM
IIIT Hyderabad
Privacy and Security in Online Social Media : Misinformation on Social Media
Privacy and Security in Online Social Media : Misinformation on Social Media
IIIT Hyderabad
Privacy and Security in Online Social Media : Policing and Social Media - Part 2
Privacy and Security in Online Social Media : Policing and Social Media - Part 2
IIIT Hyderabad
Privacy and Security in Online Social Media : Intro to course
Privacy and Security in Online Social Media : Intro to course
IIIT Hyderabad
Week 8.1 Profile Linking on Online Social Media
Week 8.1 Profile Linking on Online Social Media
IIIT Hyderabad
Privacy and Security in Online Social : Privacy and Pictures on Online Social...
Privacy and Security in Online Social : Privacy and Pictures on Online Social...
IIIT Hyderabad
Viewers also liked
(17)
Privacy and Security in Online Social Media : Trust and Credebillity on OSM
Privacy and Security in Online Social Media : Trust and Credebillity on OSM
Week 7.2 Nudges
Week 7.2 Nudges
Week 6.2: eCrime
Week 6.2: eCrime
Week 6.1: eCrime
Week 6.1: eCrime
Privacy and Security in Online Social Media : Policing and Social Media - Part 3
Privacy and Security in Online Social Media : Policing and Social Media - Part 3
Week 7.1 Link Farming
Week 7.1 Link Farming
Week 7.3 Semantic Attacks - Spear Phishing
Week 7.3 Semantic Attacks - Spear Phishing
Privacy and Security in Online Social Media : Policing and Social Media - Part 1
Privacy and Security in Online Social Media : Policing and Social Media - Part 1
Week 8.2 Anonymous Networks
Week 8.2 Anonymous Networks
Privacy and Security in Online Social Media : Incidents
Privacy and Security in Online Social Media : Incidents
Privacy and Security in Online Social Media : OSM APIs and tools for data col...
Privacy and Security in Online Social Media : OSM APIs and tools for data col...
Privacy and Security in Online Social Media : Intro to OSM
Privacy and Security in Online Social Media : Intro to OSM
Privacy and Security in Online Social Media : Misinformation on Social Media
Privacy and Security in Online Social Media : Misinformation on Social Media
Privacy and Security in Online Social Media : Policing and Social Media - Part 2
Privacy and Security in Online Social Media : Policing and Social Media - Part 2
Privacy and Security in Online Social Media : Intro to course
Privacy and Security in Online Social Media : Intro to course
Week 8.1 Profile Linking on Online Social Media
Week 8.1 Profile Linking on Online Social Media
Privacy and Security in Online Social : Privacy and Pictures on Online Social...
Privacy and Security in Online Social : Privacy and Pictures on Online Social...
More from IIIT Hyderabad
Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
IIIT Hyderabad
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success stories
IIIT Hyderabad
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
IIIT Hyderabad
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
IIIT Hyderabad
#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI
IIIT Hyderabad
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
IIIT Hyderabad
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
IIIT Hyderabad
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
IIIT Hyderabad
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
IIIT Hyderabad
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper
IIIT Hyderabad
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBias
IIIT Hyderabad
Social Computing Research in India
Social Computing Research in India
IIIT Hyderabad
Social Computing Research in India
Social Computing Research in India
IIIT Hyderabad
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
IIIT Hyderabad
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
IIIT Hyderabad
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
IIIT Hyderabad
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
IIIT Hyderabad
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial Advice
IIIT Hyderabad
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
IIIT Hyderabad
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
IIIT Hyderabad
More from IIIT Hyderabad
(20)
Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success stories
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Social Computing Research in India
Social Computing Research in India
Social Computing Research in India
Social Computing Research in India
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial Advice
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
Recently uploaded
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Rachmat Ramadhan H
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
Boston Institute of Analytics
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
shivangimorya083
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
shivangimorya083
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Sapana Sha
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
Anupama Kate
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
Aishani27
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
ccctableauusergroup
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
Suhani Kapoor
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
soniya singh
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
ffjhghh
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
Samantha Rae Coolbeth
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
atducpo
Predicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project Presentation
Boston Institute of Analytics
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
MarinCaroMartnezBerg
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
Lars Albertsson
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Social Samosa
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
Lars Albertsson
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
Invezz1
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
Pooja Nehwal
Recently uploaded
(20)
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
Predicting Employee Churn: A Data-Driven Approach Project Presentation
Predicting Employee Churn: A Data-Driven Approach Project Presentation
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
Privacy and Security in Online Social Media: A Guide
1.
Privacy and Security
in Online Social Media
2.
App details ⚫ ⚫ ⚫
3.
Tutorial: Twitter API
4.
Topics that we
will cover ⚫ ⚫ ⚫ ⚫ ⚫ ⚫ ⚫ ⚫ ⚫ ⚫
5.
How do we
define privacy?
6.
Westin’s 3 categories ⚫ ⚫ ⚫
7.
You thought that
on the Internet nobody knew you were a dog… …but then you started getting personalized ads for your favorite brand of dog food
8.
#privacyindia12 Methodology
9.
10.
Demographics
11.
Internet & Social
Media
12.
Internet & Social
Media
13.
Internet & Social
Media
14.
Internet & Social
Media
15.
Internet & Social
Media
16.
Internet & Social
Media
17.
Internet & Social
Media
18.
http://precog.iiitd.edu.in/research/privacyindia/
19.
Different types of
Privacy issues in FB?
20.
Thank you
Download now