Fortune.com asked several User Experience designers how they would redesign Facebook's privacy settings. These are my recommendations.
Read the full Fortune.com article here:
http://money.cnn.com/galleries/2010/fortune/1005/gallery.facebook_privacy_redesign.fortune/index.html
Read my blog posts on www.inspireUX.com for details on how this redesign came together
Fortune.com contacted several User Experience designers and asked us how we would redesign Facebook's privacy settings. This is my proposed solution.
Read the Fortune article here:
http://bit.ly/9ajK1M
Read my blog posts explaining the concept in more detail here:
Part 1: http://bit.ly/9MJnof
Part 2: http://bit.ly/aUz4c6
NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...Byeongseok Yu
This document describes the NEOS-IoTSP, an IoT security platform based on the NEOS RTOS. It includes secure RTOS software, an integrated development environment, a system-on-module reference hardware, and a development kit. The platform features secure boot, firmware updates, cryptographic functions, device management integration, and key management integration. It is designed for applications requiring security such as public safety, military, healthcare and manufacturing.
This document provides an agenda for a talk on breaking modern cryptography. It discusses various side channel and fault injection attacks that can be used to break cryptographic implementations running on untrusted hardware. It covers side channel basics like power analysis and EM analysis techniques. It also discusses fault injection basics and how errors can be injected and propagated in cryptosystems. Finally, it summarizes countermeasures for side channel and fault injection attacks and discusses how the same techniques can be applied beyond attacking cryptography.
SRECon EU 2016: Riot Games Vs the InternetAdam Comerford
League of Legends (LoL) is not a game of seconds, but of milliseconds. In day-to-day life, two seconds fly by unnoticed but in-game a two-second stun can feel like an eternity. In any single match of LoL, thousands of decisions made in milliseconds dictate which team scores bragging rights and which settles for “honorable opponent” points. The Internet, however, was not constructed for applications that run like this, essentially in real time.
This talk will discuss the steps Riot Games has taken, and will continue to take, to fix this fundamental problem with commodity Internet, with a specific focus on the work done to improve the experience of our European players.
The Biggest Lies on the Internet. Using Real Life Examples to Help Students M...Lucinda Rush
Presentation at The Innovative Library Conference (TILC), Radford University, May, 2016
Teaching students about the information cycle and the research process under ideal circumstances is valuable in showcasing intended functions and effects, but may leave students ill-equipped to deal with real-word circumstances. I’m going to argue that talking about case studies in information cycles that have short-circuited, either due to moral panics about new technologies, poor reporting gone bad, and even poorly conducted scientific research we can teach students how to be critical readers of empirical-based research claims.
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...Michael Altendorf
Michael Altendorf discusses how the internet and emerging technologies are changing concepts of personal identity. As the web permeates all aspects of daily life by 2020, individuals will have multiple, fluid online identities across social networks and digital platforms that are constantly tracked and stored in massive databases. While this development ends privacy and anonymity, it also allows people to curate and express different aspects of themselves through various virtual identities. However, individuals must consider who truly shapes and controls their digital identity in this new paradigm.
1) Online interactions allow people to selectively curate and modify their self-presentation by editing photos, choosing profile pictures, and crafting personas. This ability to shape one's online identity differs from the fixed self presented in face-to-face interactions.
2) Teens in particular may present different selves to different audiences online versus what they display to their families at home, indicating they see online spaces as opportunities for self-expression without disapproval.
3) While people can form impressions of others' personalities online, these perceptions do not always match how individuals view themselves, showing that online identities may diverge from internal senses of self.
There are many Problems what a user face while using facebook. These problems could be related to hacking, unwanted users, spamming etc. These problems can be resolved using "facebook security and privacy settings" which is offered by the facebook itself. In this presentation, you will be having a fair view of how to configure your facebook security and privacy settings and what facebook is Exactly!
For more details, you can visit here: http://bit.ly/2kEkIrU
Fortune.com contacted several User Experience designers and asked us how we would redesign Facebook's privacy settings. This is my proposed solution.
Read the Fortune article here:
http://bit.ly/9ajK1M
Read my blog posts explaining the concept in more detail here:
Part 1: http://bit.ly/9MJnof
Part 2: http://bit.ly/aUz4c6
NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Plat...Byeongseok Yu
This document describes the NEOS-IoTSP, an IoT security platform based on the NEOS RTOS. It includes secure RTOS software, an integrated development environment, a system-on-module reference hardware, and a development kit. The platform features secure boot, firmware updates, cryptographic functions, device management integration, and key management integration. It is designed for applications requiring security such as public safety, military, healthcare and manufacturing.
This document provides an agenda for a talk on breaking modern cryptography. It discusses various side channel and fault injection attacks that can be used to break cryptographic implementations running on untrusted hardware. It covers side channel basics like power analysis and EM analysis techniques. It also discusses fault injection basics and how errors can be injected and propagated in cryptosystems. Finally, it summarizes countermeasures for side channel and fault injection attacks and discusses how the same techniques can be applied beyond attacking cryptography.
SRECon EU 2016: Riot Games Vs the InternetAdam Comerford
League of Legends (LoL) is not a game of seconds, but of milliseconds. In day-to-day life, two seconds fly by unnoticed but in-game a two-second stun can feel like an eternity. In any single match of LoL, thousands of decisions made in milliseconds dictate which team scores bragging rights and which settles for “honorable opponent” points. The Internet, however, was not constructed for applications that run like this, essentially in real time.
This talk will discuss the steps Riot Games has taken, and will continue to take, to fix this fundamental problem with commodity Internet, with a specific focus on the work done to improve the experience of our European players.
The Biggest Lies on the Internet. Using Real Life Examples to Help Students M...Lucinda Rush
Presentation at The Innovative Library Conference (TILC), Radford University, May, 2016
Teaching students about the information cycle and the research process under ideal circumstances is valuable in showcasing intended functions and effects, but may leave students ill-equipped to deal with real-word circumstances. I’m going to argue that talking about case studies in information cycles that have short-circuited, either due to moral panics about new technologies, poor reporting gone bad, and even poorly conducted scientific research we can teach students how to be critical readers of empirical-based research claims.
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...Michael Altendorf
Michael Altendorf discusses how the internet and emerging technologies are changing concepts of personal identity. As the web permeates all aspects of daily life by 2020, individuals will have multiple, fluid online identities across social networks and digital platforms that are constantly tracked and stored in massive databases. While this development ends privacy and anonymity, it also allows people to curate and express different aspects of themselves through various virtual identities. However, individuals must consider who truly shapes and controls their digital identity in this new paradigm.
1) Online interactions allow people to selectively curate and modify their self-presentation by editing photos, choosing profile pictures, and crafting personas. This ability to shape one's online identity differs from the fixed self presented in face-to-face interactions.
2) Teens in particular may present different selves to different audiences online versus what they display to their families at home, indicating they see online spaces as opportunities for self-expression without disapproval.
3) While people can form impressions of others' personalities online, these perceptions do not always match how individuals view themselves, showing that online identities may diverge from internal senses of self.
There are many Problems what a user face while using facebook. These problems could be related to hacking, unwanted users, spamming etc. These problems can be resolved using "facebook security and privacy settings" which is offered by the facebook itself. In this presentation, you will be having a fair view of how to configure your facebook security and privacy settings and what facebook is Exactly!
For more details, you can visit here: http://bit.ly/2kEkIrU
The document provides guidance on managing personal information and privacy settings on Facebook to balance personal and professional use. It recommends:
1. Creating customized "Friend Lists" to organize contacts into groups and selectively sharing information.
2. Carefully controlling access to personal information like birthdays, hometowns, and contact details that could aid identity theft.
3. Making profile details like employer, education, and activities appropriate to share professionally by restricting sensitive details to personal lists.
4. Regularly reviewing settings and content to ensure a professional online presence is maintained.
Facebook's new Ticker news feature organizes real-time news much better than the previous “Top-News” and “Most Recent” set up. This new Facebook ticker is live, everything that happens will pop up here, no matter how minute the activity.
Facebook and Twitter are two of the most popular social networking sites. Facebook allows users to connect with friends, join groups, and share photos and updates. Key aspects include personal profiles and walls where others can post. Twitter is a microblogging service that allows short message posts called tweets that are limited to 140 characters. It enables users to follow others and engage in conversations. Both sites fulfill social needs but also raise privacy and distraction concerns if not used carefully.
Identification of inference attacks on private Information from Social Networkseditorjournal
Online social networks, like
Facebook, twitter are increasingly utilized by
many people. These networks permit users to
publish details about them and to connect to
their friends. Some of the details revealed
inside these networks are meant to be
keeping private. Yet it is possible to use
learning algorithms and methods on released
data have to predict private information,
which cause inference attacks. This paper
discovers how to launch inference attacks
using released social networking details to
predict private information’s. It then
separate three possible sanitization
algorithms that could be used in various
situations. Then, it investigates the
effectiveness of these techniques and tries to
use methods of collective inference
techniques to determine sensitive attributes
of the user data set. It shows that it can
decline the effectiveness of both the local and
relational classification algorithms by using
the sanitization methods we described.
If you are a Facebook user, I suggest you view the presentation attached, and resolve to protect your privacy by following the practical steps to maximise your privacy settings. A few simple clicks are all that is required.
Facebook collects various types of user information including data from user accounts, friends' shares, actions on Facebook, devices used to access Facebook, and third parties. Facebook uses this information to provide services to users and third parties like advertisers and developers. Facebook only shares user information with permission, after providing notice, or after removing personally identifiable information. Facebook's privacy settings allow users to control who can see their posts, who can contact them, how to block other users, and customize privacy on a granular level for different types of content and sharing. The presentation provides an overview of Facebook's privacy policy and tools users can use to manage their privacy settings.
On Wednesday, July 21, 2010, I will be presenting in front of the Secretary’s Advisory Committee on Human Research Protections (SACHRP), part of the Office for Human Research Protections in the United States Department of Health and Human Services (HHS). My presentation will focus on how Web 2.0 tools, environments, and experiences are creating new conceptual gaps in our understanding of privacy, anonymity/identifiability, consent, and harm.
This document provides a guide to improving social network privacy. It discusses:
- The basic features of social networks, including profiles, friends lists, groups, media sharing, and applications.
- Common privacy issues with social networks like oversharing personal information, third parties accessing data, and lack of control over how information is used and shared.
- Tips for improving privacy like using selective friend lists, hiding sensitive details, carefully choosing app permissions, and adjusting default privacy settings.
- Facebook is used as a case study, outlining its various profile sections and recommending privacy settings like using "Friends" or "Only Me" for maximum protection of shared content.
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. The main uses of ICT are for obtaining and sharing information, education, accessing services, and raising social awareness. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0, with Web 1.0 being read-only, Web 2.0 allowing user interaction and user-generated content, and Web 3.0 being data-driven. It also covers topics such as social media, technology convergence in smartphones, and cybersecurity issues like email spam, phishing, and computer viruses.
Chatter best practices tips and tricksCraig Bolden
This document provides tips and tricks for maximizing the use of Chatter for various roles including end users, managers, and administrators. It includes guidance on completing profiles, using groups, managing email settings, following the right people and records, using hashtags and @mentions, sharing files, and staying connected via mobile. The tips are intended to help admins guide others and drive adoption of Chatter's collaboration features.
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
Ensuring privacy of users of social networks is probably an unsolvable conundrum. At the same time, an informed use of the existing privacy options by the social network participants may alleviate - or even prevent - some of the more drastic privacy-averse incidents. Unfortunately, recent surveys show that an average user is either not aware of these options or does not use them, probably due to their perceived complexity. It is therefore reasonable to believe that tools assisting users with two tasks: 1) understanding their social net behaviour in terms of their privacy settings and broad privacy categories, and 2)recommending reasonable privacy options, will be a valuable tool for everyday privacy practice in a social
network context. This paper presents YourPrivacyProtector, a recommender system that shows how simple machine learning techniques may provide useful assistance in these two tasks to Facebook users. We support our claim with empirical results of application of YourPrivacyProtector to two groups of Facebook
users.
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
ICT refers to information and communication technologies and includes any devices or applications used for communication like radio, TV, and computers. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses current technologies like social media, technology convergence, and security measures like firewalls and antivirus software. Common issues related to ICT like email spam, phishing, and computer viruses are also explained.
The document provides information about ICT (Information Communication Technology), the evolution of the web from Web 1.0 to Web 3.0, examples of technology convergence like smartphones, and popular social media platforms. It also discusses online security threats like viruses, worms, trojans, and hackers. Tips are provided for maintaining computer security including using firewalls, automatic updates, and antivirus software. Common digital file formats for images and text are explained, categorizing them as either proprietary, open, uncompressed, lossless, or lossy formats. Specific raster image file formats like JPEG, PNG, GIF, and BMP are outlined along with vector image files.
This document discusses managing your digital identity online. It begins by defining digital identity and noting that everyone has an online presence and footprint. It then discusses verifying identities online and the challenges of doing so. It outlines some of the risks of having your identity stolen online. The document then discusses managing personal versus professional identities on social media and challenges the idea that anyone is truly anonymous online. It provides examples of legal issues that can arise from improper social media use and shares tips for maintaining privacy and managing one's online reputation.
The document outlines 3 principles for designing social products:
1) Ensure personal value before emphasizing network value. Ask if the product provides value when used alone.
2) Give users a sense of control over their data and privacy settings through opt-in options and microcopy explaining changes.
3) Start with simple social objects and activities that people naturally share rather than aiming for complexity from the beginning, as complex systems evolve from simple ones that work.
Diana Silveira presented on privacy and reputation management on social media. She discussed the default privacy settings of major social media sites like Facebook, Twitter, Google+, and Pinterest and emphasized that anything shared could become publicly visible. She provided tips on reviewing and customizing privacy settings as well as monitoring one's online reputation through tools like Google Alerts. Silveira stressed the importance of being thoughtful about what information is shared online since once shared, it can be difficult to remove.
An overview of Facebook; plus, a step-by-step guide to creating an account on Facebook. http://www.queenslibrary.org/
http://www.facebook.com/queenslibrarynyc
Presentation for Library Association of Singapore-National Librarian Board Professional Sharing Session on 28 September 2018. Theme: "Library 3.0 - Apomediation"
10 Steps To Nonprofit Success On Twittergivezooks!
John Haydon was the guest presenter as we covered the "Whys" and the "Hows" of including Twitter in your Social Media Strategy. Topics range from setting expectations to the mechanics and tools to help you reach constituents, both new and existing. If your organization is just embarking on Twitter - this is a must, and if you already have a following - we'll cover topics that help refine your organization’s use of Twitter for social fundraising.
The document provides guidance on managing personal information and privacy settings on Facebook to balance personal and professional use. It recommends:
1. Creating customized "Friend Lists" to organize contacts into groups and selectively sharing information.
2. Carefully controlling access to personal information like birthdays, hometowns, and contact details that could aid identity theft.
3. Making profile details like employer, education, and activities appropriate to share professionally by restricting sensitive details to personal lists.
4. Regularly reviewing settings and content to ensure a professional online presence is maintained.
Facebook's new Ticker news feature organizes real-time news much better than the previous “Top-News” and “Most Recent” set up. This new Facebook ticker is live, everything that happens will pop up here, no matter how minute the activity.
Facebook and Twitter are two of the most popular social networking sites. Facebook allows users to connect with friends, join groups, and share photos and updates. Key aspects include personal profiles and walls where others can post. Twitter is a microblogging service that allows short message posts called tweets that are limited to 140 characters. It enables users to follow others and engage in conversations. Both sites fulfill social needs but also raise privacy and distraction concerns if not used carefully.
Identification of inference attacks on private Information from Social Networkseditorjournal
Online social networks, like
Facebook, twitter are increasingly utilized by
many people. These networks permit users to
publish details about them and to connect to
their friends. Some of the details revealed
inside these networks are meant to be
keeping private. Yet it is possible to use
learning algorithms and methods on released
data have to predict private information,
which cause inference attacks. This paper
discovers how to launch inference attacks
using released social networking details to
predict private information’s. It then
separate three possible sanitization
algorithms that could be used in various
situations. Then, it investigates the
effectiveness of these techniques and tries to
use methods of collective inference
techniques to determine sensitive attributes
of the user data set. It shows that it can
decline the effectiveness of both the local and
relational classification algorithms by using
the sanitization methods we described.
If you are a Facebook user, I suggest you view the presentation attached, and resolve to protect your privacy by following the practical steps to maximise your privacy settings. A few simple clicks are all that is required.
Facebook collects various types of user information including data from user accounts, friends' shares, actions on Facebook, devices used to access Facebook, and third parties. Facebook uses this information to provide services to users and third parties like advertisers and developers. Facebook only shares user information with permission, after providing notice, or after removing personally identifiable information. Facebook's privacy settings allow users to control who can see their posts, who can contact them, how to block other users, and customize privacy on a granular level for different types of content and sharing. The presentation provides an overview of Facebook's privacy policy and tools users can use to manage their privacy settings.
On Wednesday, July 21, 2010, I will be presenting in front of the Secretary’s Advisory Committee on Human Research Protections (SACHRP), part of the Office for Human Research Protections in the United States Department of Health and Human Services (HHS). My presentation will focus on how Web 2.0 tools, environments, and experiences are creating new conceptual gaps in our understanding of privacy, anonymity/identifiability, consent, and harm.
This document provides a guide to improving social network privacy. It discusses:
- The basic features of social networks, including profiles, friends lists, groups, media sharing, and applications.
- Common privacy issues with social networks like oversharing personal information, third parties accessing data, and lack of control over how information is used and shared.
- Tips for improving privacy like using selective friend lists, hiding sensitive details, carefully choosing app permissions, and adjusting default privacy settings.
- Facebook is used as a case study, outlining its various profile sections and recommending privacy settings like using "Friends" or "Only Me" for maximum protection of shared content.
Epowerment Technology by: Geraldine Salve Pepe and Lailanie Pepesalvepepe
ICT refers to information and communication technologies and includes any devices or applications used for communication, such as radio, television and computers. The main uses of ICT are for obtaining and sharing information, education, accessing services, and raising social awareness. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0, with Web 1.0 being read-only, Web 2.0 allowing user interaction and user-generated content, and Web 3.0 being data-driven. It also covers topics such as social media, technology convergence in smartphones, and cybersecurity issues like email spam, phishing, and computer viruses.
Chatter best practices tips and tricksCraig Bolden
This document provides tips and tricks for maximizing the use of Chatter for various roles including end users, managers, and administrators. It includes guidance on completing profiles, using groups, managing email settings, following the right people and records, using hashtags and @mentions, sharing files, and staying connected via mobile. The tips are intended to help admins guide others and drive adoption of Chatter's collaboration features.
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
Ensuring privacy of users of social networks is probably an unsolvable conundrum. At the same time, an informed use of the existing privacy options by the social network participants may alleviate - or even prevent - some of the more drastic privacy-averse incidents. Unfortunately, recent surveys show that an average user is either not aware of these options or does not use them, probably due to their perceived complexity. It is therefore reasonable to believe that tools assisting users with two tasks: 1) understanding their social net behaviour in terms of their privacy settings and broad privacy categories, and 2)recommending reasonable privacy options, will be a valuable tool for everyday privacy practice in a social
network context. This paper presents YourPrivacyProtector, a recommender system that shows how simple machine learning techniques may provide useful assistance in these two tasks to Facebook users. We support our claim with empirical results of application of YourPrivacyProtector to two groups of Facebook
users.
Impowerment technology BY CEDRIC PADA,ROSIE GURA,LOIDA GULA, MARIAN GOZONCedricPada
ICT refers to information and communication technologies and includes any devices or applications used for communication like radio, TV, and computers. The document discusses the evolution of the internet from Web 1.0 to Web 2.0 to Web 3.0. It also discusses current technologies like social media, technology convergence, and security measures like firewalls and antivirus software. Common issues related to ICT like email spam, phishing, and computer viruses are also explained.
The document provides information about ICT (Information Communication Technology), the evolution of the web from Web 1.0 to Web 3.0, examples of technology convergence like smartphones, and popular social media platforms. It also discusses online security threats like viruses, worms, trojans, and hackers. Tips are provided for maintaining computer security including using firewalls, automatic updates, and antivirus software. Common digital file formats for images and text are explained, categorizing them as either proprietary, open, uncompressed, lossless, or lossy formats. Specific raster image file formats like JPEG, PNG, GIF, and BMP are outlined along with vector image files.
This document discusses managing your digital identity online. It begins by defining digital identity and noting that everyone has an online presence and footprint. It then discusses verifying identities online and the challenges of doing so. It outlines some of the risks of having your identity stolen online. The document then discusses managing personal versus professional identities on social media and challenges the idea that anyone is truly anonymous online. It provides examples of legal issues that can arise from improper social media use and shares tips for maintaining privacy and managing one's online reputation.
The document outlines 3 principles for designing social products:
1) Ensure personal value before emphasizing network value. Ask if the product provides value when used alone.
2) Give users a sense of control over their data and privacy settings through opt-in options and microcopy explaining changes.
3) Start with simple social objects and activities that people naturally share rather than aiming for complexity from the beginning, as complex systems evolve from simple ones that work.
Diana Silveira presented on privacy and reputation management on social media. She discussed the default privacy settings of major social media sites like Facebook, Twitter, Google+, and Pinterest and emphasized that anything shared could become publicly visible. She provided tips on reviewing and customizing privacy settings as well as monitoring one's online reputation through tools like Google Alerts. Silveira stressed the importance of being thoughtful about what information is shared online since once shared, it can be difficult to remove.
An overview of Facebook; plus, a step-by-step guide to creating an account on Facebook. http://www.queenslibrary.org/
http://www.facebook.com/queenslibrarynyc
Presentation for Library Association of Singapore-National Librarian Board Professional Sharing Session on 28 September 2018. Theme: "Library 3.0 - Apomediation"
10 Steps To Nonprofit Success On Twittergivezooks!
John Haydon was the guest presenter as we covered the "Whys" and the "Hows" of including Twitter in your Social Media Strategy. Topics range from setting expectations to the mechanics and tools to help you reach constituents, both new and existing. If your organization is just embarking on Twitter - this is a must, and if you already have a following - we'll cover topics that help refine your organization’s use of Twitter for social fundraising.
Similar to Proposed redesign for Facebook privacy settings (20)
Fonts play a crucial role in both User Interface (UI) and User Experience (UX) design. They affect readability, accessibility, aesthetics, and overall user perception.
Visual Style and Aesthetics: Basics of Visual Design
Visual Design for Enterprise Applications
Range of Visual Styles.
Mobile Interfaces:
Challenges and Opportunities of Mobile Design
Approach to Mobile Design
Patterns
Architectural and constructions management experience since 2003 including 18 years located in UAE.
Coordinate and oversee all technical activities relating to architectural and construction projects,
including directing the design team, reviewing drafts and computer models, and approving design
changes.
Organize and typically develop, and review building plans, ensuring that a project meets all safety and
environmental standards.
Prepare feasibility studies, construction contracts, and tender documents with specifications and
tender analyses.
Consulting with clients, work on formulating equipment and labor cost estimates, ensuring a project
meets environmental, safety, structural, zoning, and aesthetic standards.
Monitoring the progress of a project to assess whether or not it is in compliance with building plans
and project deadlines.
Attention to detail, exceptional time management, and strong problem-solving and communication
skills are required for this role.
ARENA - Young adults in the workplace (Knight Moves).pdfKnight Moves
Presentations of Bavo Raeymaekers (Project lead youth unemployment at the City of Antwerp), Suzan Martens (Service designer at Knight Moves) and Adriaan De Keersmaeker (Community manager at Talk to C)
during the 'Arena • Young adults in the workplace' conference hosted by Knight Moves.
PDF SubmissionDigital Marketing Institute in NoidaPoojaSaini954651
https://www.safalta.com/online-digital-marketing/advance-digital-marketing-training-in-noidaTop Digital Marketing Institute in Noida: Boost Your Career Fast
[3:29 am, 30/05/2024] +91 83818 43552: Safalta Digital Marketing Institute in Noida also provides advanced classes for individuals seeking to develop their expertise and skills in this field. These classes, led by industry experts with vast experience, focus on specific aspects of digital marketing such as advanced SEO strategies, sophisticated content creation techniques, and data-driven analytics.
EASY TUTORIAL OF HOW TO USE CAPCUT BY: FEBLESS HERNANEFebless Hernane
CapCut is an easy-to-use video editing app perfect for beginners. To start, download and open CapCut on your phone. Tap "New Project" and select the videos or photos you want to edit. You can trim clips by dragging the edges, add text by tapping "Text," and include music by selecting "Audio." Enhance your video with filters and effects from the "Effects" menu. When you're happy with your video, tap the export button to save and share it. CapCut makes video editing simple and fun for everyone!
Storytelling For The Web: Integrate Storytelling in your Design ProcessChiara Aliotta
In this slides I explain how I have used storytelling techniques to elevate websites and brands and create memorable user experiences. You can discover practical tips as I showcase the elements of good storytelling and its applied to some examples of diverse brands/projects..
International Upcycling Research Network advisory board meeting 4Kyungeun Sung
Slides used for the International Upcycling Research Network advisory board 4 (last one). The project is based at De Montfort University in Leicester, UK, and funded by the Arts and Humanities Research Council.
Practical eLearning Makeovers for EveryoneBianca Woods
Welcome to Practical eLearning Makeovers for Everyone. In this presentation, we’ll take a look at a bunch of easy-to-use visual design tips and tricks. And we’ll do this by using them to spruce up some eLearning screens that are in dire need of a new look.
1. Facebook Privacy Settings
Proposed Redesign
Prepared for JP Mangalindan of Fortune.com – May 2010
Catriona Cornett
User Experience Strategist at The Archer Group
Blogger for inspireUX.com
catriona@inspireUX.com
www.inspireUX.com
www.catrionacornett.com
2. Summary
There are two primary types of privacy issues prevalent on Facebook today:
Unwanted public disclosure of information Difficult management of social networks
Outside of friend interactions, there is a layer of third party Users have a hard time managing who sees what within their
and public visibility to your profile information and activity. social network. In our real lives, we disclose different things
There is a level of fear, mistrust, and confusion over what to different groups of people. On Facebook, by default,
information is shared publically. By default, this information is everyone is grouped together. It requires a significant
difficult to find and users must often opt-out to public amount of work to manage your friends list and monitor your
disclosure of information. activity to make sure that information is exposed to the right
people. Because of this difficulty, personal information is
Changes that need to be made frequently exposed to unintended audiences.
· Default to opt-in to any personal information disclosure that Changes that need to be made
will be seen outside of your friends
· Provide a prominent visual indicator of the level of public · Make it easier to see who can see what within your network
information currently being disclosed · Reduce the amount of work needed to manage friend
· Visually indicate changes to public information disclosure groupings, or lists, in order to control information access
and one-click settings to turn it on/off · Provide visual feedback while posting information that
· Encourage and contextually incorporate reasons why a indicates who can see your activity
user should opt-in to disclosing more information and · Provide contextual assistance to guide users to make smart
clearly communicate its benefits as opposed to making this choices in restricting information to part of their network
decision on the user's behalf
Proposed design solutions
Proposed design solutions · Privacy toolbar that provides immediate feedback upon user
activity, allowing you to quickly see who can and can’t see
· Visible privacy gauge your information
· Ability to switch public privacy settings on/off in a · Contextual help within the privacy toolbar to prevent
centralized location accidental information disclosure
· Privacy toolbar with contextual messages explaining · Improved friend list that allows filtering based on information
privacy settings and encouraging users to disclose more access
information when appropriate · Smart lists that create automatic friend lists based on friend
profile information – reducing work to create custom lists
Catriona Cornett // catriona@inspireUX.com // www.inspireUX.com // May 2010
3. “Privacy Toolbar”
§ Keeps privacy visible, yet unobtrusive, no matter where you are on the site. Removes the sense that
privacy controls are “hidden.”
§ Provides quick access to all privacy controls.
§ Gives users piece of mind by making it clear who can and can’t see their information.
§ Becomes “active” upon user activity that impacts privacy.
§ Provides instant feedback upon user activity (status updates, comments, photo uploads, etc. that
submit information to the site) that tell the user how many people will be able to see their activity.
§ Upon clicking the privacy bar, the user has the ability to get visual feedback as to who can see their
latest activity and immediately correct any unexpected or forgotten privacy controls.
§ Contextual feedback can be flexible, perhaps giving messages such as “You seem to be writing about
your job. Check privacy settings for coworkers” that would be useful to the end user.
§ Contextual feedback could also help elevate Facebook’s goals to open up information as much as
possible, with messages such as “By making your photos visible to more people, you will be able to
interact with more of your friends.”
§ Privacy toolbar messaging can also represent recent activity outside of Facebook in order to better
educate users about what happens when they disclose profile information to the public.
Catriona Cornett // catriona@inspireUX.com // www.inspireUX.com // May 2010
7. “Manage Friends”
§ Combine friend privacy settings with the “all friends” view to increase visibility and allow better friend
management.
§ Allow easy filtering and sorting of friends based on various criteria:
- Find people who currently have access to specific profile information.
- Institute “smart lists” that create automatic friend groupings based on friend profile information to
reduce the work needed to group together friends for privacy settings.
- Continue the ability to create custom lists for when smart lists don’t provide sufficient customization.
§ Provide immediate feedback as to who can see specific profile information as opposed to focusing more
on those who can’t. This makes it easier to see if anyone is currently viewing information that the user
is uncomfortable having access.
§ Provide the ability to quickly select friends and alter privacy permissions in one centralized location.
Catriona Cornett // catriona@inspireUX.com // www.inspireUX.com // May 2010
12. Facebook Logo Search Home Profile Account
Privacy Toolbar Privacy Tools
My Friends My Friends
Filter friends
Find Friends
All 350 Friends: Advertisement
Invite Friends Name Name Name
Profile List 1, List 2, Profile List 1, List 2, Profile List 1, List 2,
Phonebook Picture List 3 Picture List 3 Picture List 3
Lorem ipsum dolor sit
Recently Added amet, consectetaur
Name Name Name adipisicing
Profile List 1, List 2, Profile List 1, List 2, Profile List 1, List 2,
Recently Updated Picture List 3 Picture List 3 Picture List 3
Advertisement
Name Name Name
Profile List 1, List 2, Profile List 1, List 2, Profile List 1, List 2,
Picture List 3 Picture List 3 Picture List 3
Lorem ipsum dolor sit
amet, consectetaur
Name Name Name adipisicing
Profile List 1, List 2, Profile List 1, List 2, Profile List 1, List 2,
Picture List 3 Picture List 3 Picture List 3
Select All Select None Send Invite to Edit access to Edit Remove Advertisement
With selected: message event my information List(s) as friend
Lorem ipsum dolor sit
amet, consectetaur
adipisicing
Catriona Cornett // catriona@inspireUX.com // www.inspireUX.com // May 2010
13. Facebook Logo Search Home Profile Account
Privacy Toolbar Privacy Tools
My Friends My Friends
Show: Everyone About Me Select All Select None
Find Friends Sex Looking For
Show: Contact Info
Access to My Profile Advertisement
Information Interests/Likes Birthday Current City
Invite Friends
Posts Parents Hometown
Smart Lists Photos/Video Siblings Political Views
Phonebook
Friends Children Religious Views
Relationship Status Lorem ipsum dolor sit
Biography
Recently Added Custom Lists amet, consectetaur
Interested In Quotations adipisicing
Recently Updated
120 people can see my:
x Religious views x Political views Advertisement
Name Name Name
Profile List 1, List 2, Profile List 1, List 2, Profile List 1, List 2, Lorem ipsum dolor sit
Picture List 3 Picture List 3 Picture List 3 amet, consectetaur
adipisicing
Name Name Name
Profile List 1, List 2, Profile List 1, List 2, Profile List 1, List 2,
Picture List 3 Picture List 3 Picture List 3
Advertisement
Name Name Name
Profile List 1, List 2, Profile List 1, List 2, Profile List 1, List 2,
Picture List 3 Picture List 3 Picture List 3
Lorem ipsum dolor sit
amet, consectetaur
Name Name Name adipisicing
Profile List 1, List 2, Profile List 1, List 2, Profile List 1, List 2,
Picture List 3 Picture List 3 Picture List 3
Select All Select None Send Invite to Edit access to Edit Remove
With selected: message event my information List(s) as friend
Catriona Cornett // catriona@inspireUX.com // www.inspireUX.com // May 2010
14. Facebook Logo Search Home Profile Account
Privacy Toolbar Privacy Tools
My Friends My Friends
Show: Everyone About Me Select All Select None
Find Friends Sex Looking For
Show: Contact Info
Access to My Profile Advertisement
Information Interests/Likes Birthday Current City
Invite Friends
Posts Parents Hometown
Smart Lists Photos/Video Siblings Political Views
Phonebook
Friends Children Religious Views
Relationship Status Lorem ipsum dolor sit
Biography
Recently Added Custom Lists amet, consectetaur
Interested In Quotations adipisicing
Recently Updated
120 people can see my:
x Religious views x Political views Advertisement
Name Name Name
Profile List 1, List 2, Profile List 1, List 2, Profile List 1, List 2, Lorem ipsum dolor sit
Picture List 3 Picture List 3 Picture List 3 amet, consectetaur
adipisicing
Name Name Name
Profile List 1, List 2, Profile List 1, List 2, Profile List 1, List 2,
Picture List 3 Picture List 3 Picture List 3
Advertisement
Name Name Name
Profile List 1, List 2, Profile List 1, List 2, Profile List 1, List 2,
Picture List 3 Picture List 3 Picture List 3
Lorem ipsum dolor sit
amet, consectetaur
Name Name Name adipisicing
Profile List 1, List 2, Profile List 1, List 2, Profile List 1, List 2,
Picture List 3 Picture List 3 Picture List 3
Select All Select None Send Invite to Edit access to Edit Remove
With selected: message event my information List(s) as friend
Catriona Cornett // catriona@inspireUX.com // www.inspireUX.com // May 2010
15. Facebook Logo Search Home Profile Account
Privacy Toolbar Privacy Tools
My Friends My Friends
Show: Everyone About Me Select All Select None
Find Friends Sex Looking For
Show: Contact Info
Access to My Profile Advertisement
Information Interests/Likes Birthday Current City
Invite Friends
Posts Parents Hometown
Smart Lists Photos/Video Siblings Political Views
Phonebook
Friends Children Religious Views
Edit Access to My Profile for: Lorem ipsum dolor sit
Relationship Status Biography
Recently Added Custom Lists amet, consectetaur
Name Name Interested In Name Quotations adipisicing
Profile Profile Profile
Recently Updated Picture Picture Picture
can
120 people see my:
x Religious views x Political views x Status updates Advertisement
Checked: Visible to friends Unchecked: Not visible to friends
Name Name
Select All Select None Name
About Me
Profile List 1, List 2, Profile List 1, List 2, Profile List 1, List 2, Lorem ipsum dolor sit
PictureContact Info
List 3 Sex
Picture List 3 Looking For
Picture List 3 amet, consectetaur
Interests/Likes Birthday Current City adipisicing
PostsName Parents Name Hometown Name
ProfilePhotos/Video 2,
List 1, List Siblings
Profile List 1, List 2, Political ViewsList 1, List 2,
Profile
Picture List 3 Picture List 3 Picture List 3
Friends Children Religious Views
Relationship Status Biography Advertisement
Name Interested In Name Quotations Name
Profile List 1, List 2, Profile List 1, List 2, Profile List 1, List 2,
Picture List 3 Picture List 3 Picture List 3
Save
Cancel Lorem ipsum dolor sit
amet, consectetaur
Name Name Name adipisicing
Profile List 1, List 2, Profile List 1, List 2, Profile List 1, List 2,
Picture List 3 Picture List 3 Picture List 3
Select All Select None Send Invite to Edit access to Edit Remove
With selected: message event my information List(s) as friend
Catriona Cornett // catriona@inspireUX.com // www.inspireUX.com // May 2010
16. Facebook Logo Search Home Profile Account
Privacy Toolbar Privacy Tools
My Friends My Friends
Show: Everyone Friends are automatically added to smart lists based on their profile information
Find Friends
Show:
Access to My Profile Create New Select All Select None Advertisement
Invite Friends Information
x Current coworkers x Different religious views
Smart Lists x Past coworkers x Similar interests
Phonebook
x Family x Different interested in
x Highschool friends x Lorem ipsum dolor sit
Recently Added From my current city
Custom Lists amet, consectetaur
1 2 Next adipisicing
Recently Updated
7 people are in this smart list: Add Friends to This List
x Current coworkers Advertisement
Name Name Name
Profile List 1, List 2, Profile List 1, List 2, Profile List 1, List 2, Lorem ipsum dolor sit
Picture List 3 Picture List 3 Picture List 3 amet, consectetaur
adipisicing
Name Name Name
Profile List 1, List 2, Profile List 1, List 2, Profile List 1, List 2,
Picture List 3 Picture List 3 Picture List 3
Advertisement
Name
Profile List 1, List 2,
Picture List 3
Lorem ipsum dolor sit
amet, consectetaur
Select All Select None Send Invite to Edit access to Edit Remove adipisicing
With selected: message event my information List(s) as friend
Catriona Cornett // catriona@inspireUX.com // www.inspireUX.com // May 2010
17. 1
Before an activity,
the privacy bar is in
its neutral state
with quick access
to privacy tools
2
After recent
activity, the privacy
bar is activated and
a status message
provides feedback
about how many
people can see the
user’s submitted
information
3
Upon clicking the
privacy bar, a
drawer opens up to
specifically reveal
who can (and can’t)
see the user’s
submitted
information.
Changes can be
made immediately
to correct any
accidental privacy
settings
Catriona Cornett // catriona@inspireUX.com // www.inspireUX.com // May 2010
18. Facebook Logo Search Home Profile Account
Privacy Toolbar Privacy Tools
My Name News Feed Top News Most Recent Requests
Profile
Picture Edit my profile 10 friend requests
1 event invitation
News Feed
Attach: Privacy Share
Messages
Name Lorem ipsum dolor sit amet, consectetaur adipisicing elit, sed do eiusmod tempor Advertisement
Events
Profile incididunt ut labore et dolore magna aliqua.
Picture
Photos
Lorem ipsum dolor sit
Name Lorem ipsum dolor sit amet, consectetaur adipisicing eli amet, consectetaur
Friends Profile
Picture adipisicing
Applications
Name Lorem ipsum dolor sit amet, consectetaur adipisicing elit, sed do eiusmod tempor Events
Profile incididunt ut labore et dolore magna aliqua.
Games Picture What are you planning?
Name’s birthday today
Groups Name’s birthday Sunday
Name
Profile Name’s birthday Sunday
Picture
Get Connected
Who’s on Facebook?
Who’s not on Facebook?
Who’s here because of you?
Lorem ipsum dolor sit amet, consectetaur adipisicing elit, Connect on the go
sed do eiusmod tempor
Name Lorem ipsum dolor sit amet, consectetaur adipisicing eli
Profile
Picture
Name Lorem ipsum dolor sit amet, consectetaur adipisicing elit, sed do eiusmod tempor
Profile incididunt ut labore et dolore magna aliqua.
Picture
Catriona Cornett // catriona@inspireUX.com // www.inspireUX.com // May 2010
19. Facebook Logo Search Home Profile Account
Privacy Toolbar Your status update is now viewable to 325 friends Privacy Tools
My Name News Feed Top News Most Recent Requests
Profile
Picture Edit my profile 10 friend requests
What’s on your mind?
1 event invitation
News Feed Attach: Privacy Share
Messages Your name lorem ipsum dolor sit amet, consectetaur adipisicing eli
Profile
Picture Advertisement
Events
Photos Name Lorem ipsum dolor sit amet, consectetaur adipisicing elit, sed do eiusmod tempor
Profile incididunt ut labore et dolore magna aliqua.
Picture Lorem ipsum dolor sit
Friends amet, consectetaur
adipisicing
Name Lorem ipsum dolor sit amet, consectetaur adipisicing eli
Applications Profile
Picture Events
Games What are you planning?
Name Lorem ipsum dolor sit amet, consectetaur adipisicing elit, sed do eiusmod tempor
Profile incididunt ut labore et dolore magna aliqua. Name’s birthday today
Groups Picture
Name’s birthday Sunday
Name’s birthday Sunday
Name
Profile
Picture Get Connected
Who’s on Facebook?
Who’s not on Facebook?
Who’s here because of you?
Connect on the go
Lorem ipsum dolor sit amet, consectetaur adipisicing elit,
sed do eiusmod tempor
Name Lorem ipsum dolor sit amet, consectetaur adipisicing eli
Profile
Picture
Catriona Cornett // catriona@inspireUX.com // www.inspireUX.com // May 2010
20. Facebook Logo Search Home Profile Account
Privacy Toolbar Your status update is now viewable to 325 friends Privacy Tools
Who can see this update? Change
My Name News Feed Top News Most Recent Requests
Profile
Quick find
Picture Edit my profile 10 friend requests
All Friends (325) What’s on your mind?
Name Profile
Name Name Name Name 1 event invitation
Name
Profile Profile Profile Profile Profile
Smart Lists (3 of 12) Picture Picture Picture Picture Picture Picture
News Feed
Current coworkers Attach: Privacy Share
Past coworkers
Messages
Family Name Profile
Name Name Name Name Name
Profile Profile Profile Profile Profile
Picture
Profile Picture
Your name lorem ipsum dolor sit amet, consectetaur adipisicing eli
Picture Picture Picture Picture
Custom Lists (1 of 3) Advertisement
Events Picture
Photos Name Lorem ipsum dolor sit amet, consectetaur adipisicing elit, sed do eiusmod tempor
Profile incididunt ut labore et dolore magna aliqua.
Picture Lorem ipsum dolor sit
Friends amet, consectetaur
adipisicing
Name Lorem ipsum dolor sit amet, consectetaur adipisicing eli
Applications Profile
Picture Events
Games What are you planning?
Name Lorem ipsum dolor sit amet, consectetaur adipisicing elit, sed do eiusmod tempor
Profile incididunt ut labore et dolore magna aliqua. Name’s birthday today
Groups Picture
Name’s birthday Sunday
Name’s birthday Sunday
Name
Profile
Picture Get Connected
Who’s on Facebook?
Who’s not on Facebook?
Who’s here because of you?
Connect on the go
Lorem ipsum dolor sit amet, consectetaur adipisicing elit,
sed do eiusmod tempor
Name Lorem ipsum dolor sit amet, consectetaur adipisicing eli
Profile
Picture
Catriona Cornett // catriona@inspireUX.com // www.inspireUX.com // May 2010