SlideShare a Scribd company logo
Social Internet TECH621 Security Concerns with Privacy in Social Media P Kenie Moses Spring 2011 urdue University
Outline ,[object Object]
Statement of Purpose
Research Question
Presentation, Relevance & Importance of Results
Conclusion & Recommendations,[object Object]
Research Purpose ~ Research Questions The purpose of this research is gain an understanding into user’s perceived responsibilities when using social media. This, in turn, will help develop an enlightened approach to how users can better equip themselves to manage the privacy of their social identity. How can social media users enable themselves to be better users by reducing risk? In what ways can one facilitate awareness among social media users to offset diminishing privacy restrictions and security protocols?
Previous Empirical Research Results
Current Research Results Facebook Facebook Account Hacked Facebook Security/Privacy Topic Profile: Facebook, Social Media Security & Privacy. Keywords:api, account hacked, privacy breach, viruses Sentiment Subjects:facebook, privacy Regions: United States Languages: English
Current Research Results Relevance Previous Research ,[object Object], versus decreased concern of privacy/ security and personal information access Current Research ,[object Object], information breaches (92% security/ privacy breaches) ,[object Object],  controls (only 5% mention concerns of how to change settings) ,[object Object],[object Object]

More Related Content

Viewers also liked

In the Public Realm: Growing Privacy Concerns in Social Media
In the Public Realm: Growing Privacy Concerns in Social MediaIn the Public Realm: Growing Privacy Concerns in Social Media
In the Public Realm: Growing Privacy Concerns in Social Media
andreamstewart
 
Privacy and social media for Australian governments
Privacy and social media for Australian governmentsPrivacy and social media for Australian governments
Privacy and social media for Australian governments
Craig Thomler
 
Public/Private Social Media
Public/Private Social Media Public/Private Social Media
Public/Private Social Media
For3, LLC
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
Arpan Shah
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
Corinne Weisgerber
 
I amable sixty second tv psa script draft
I amable sixty second tv psa script draftI amable sixty second tv psa script draft
I amable sixty second tv psa script draft
dakotabilly
 
Git vol 2
Git vol 2Git vol 2
Git vol 2
Joel Krebs
 
Digipak analysis
Digipak analysisDigipak analysis
Digipak analysisnuchi_
 
Animal Classification
Animal ClassificationAnimal Classification
Animal Classification
Mariela Sanchez
 
Workshop recuperación 11ces
Workshop recuperación  11cesWorkshop recuperación  11ces
Workshop recuperación 11ces
jolehidy6
 
Ngā rauemi hāpai i tā mātou rangahau me te toi mō ngā tuna me ngā hīnaki
Ngā rauemi hāpai i tā mātou rangahau me te toi mō ngā tuna me ngā hīnakiNgā rauemi hāpai i tā mātou rangahau me te toi mō ngā tuna me ngā hīnaki
Ngā rauemi hāpai i tā mātou rangahau me te toi mō ngā tuna me ngā hīnaki
Ruth Lemon
 
TERAKOYA プレゼンテーション資料
TERAKOYA プレゼンテーション資料TERAKOYA プレゼンテーション資料
TERAKOYA プレゼンテーション資料
TAKIMOTO Hiroki
 
A menina do vale Bel Pesce
A menina do vale   Bel PesceA menina do vale   Bel Pesce
A menina do vale Bel Pesce
Cleber Ribeiro
 
динамичные цепи поставок_попов_а_3
динамичные цепи поставок_попов_а_3динамичные цепи поставок_попов_а_3
динамичные цепи поставок_попов_а_3Ольга Правук
 
От чего зависит эффективность рекламы в группах ВК
От чего зависит эффективность рекламы в группах ВКОт чего зависит эффективность рекламы в группах ВК
От чего зависит эффективность рекламы в группах ВКSergey Shmakov
 
A Recipe For $uccess: Tracking & Converting Supporters for Maximum Results
A Recipe For $uccess: Tracking & Converting Supporters for Maximum ResultsA Recipe For $uccess: Tracking & Converting Supporters for Maximum Results
A Recipe For $uccess: Tracking & Converting Supporters for Maximum Results
Care2Team
 
Robotics map based navigation in urban
Robotics map based navigation in urbanRobotics map based navigation in urban
Robotics map based navigation in urbanSagheer Abbas
 
Astek Academy checklist-(120224-final)
Astek Academy checklist-(120224-final)Astek Academy checklist-(120224-final)
Astek Academy checklist-(120224-final)Astek Consulting
 

Viewers also liked (20)

In the Public Realm: Growing Privacy Concerns in Social Media
In the Public Realm: Growing Privacy Concerns in Social MediaIn the Public Realm: Growing Privacy Concerns in Social Media
In the Public Realm: Growing Privacy Concerns in Social Media
 
Privacy and social media for Australian governments
Privacy and social media for Australian governmentsPrivacy and social media for Australian governments
Privacy and social media for Australian governments
 
Public/Private Social Media
Public/Private Social Media Public/Private Social Media
Public/Private Social Media
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
I amable sixty second tv psa script draft
I amable sixty second tv psa script draftI amable sixty second tv psa script draft
I amable sixty second tv psa script draft
 
Git vol 2
Git vol 2Git vol 2
Git vol 2
 
Digipak analysis
Digipak analysisDigipak analysis
Digipak analysis
 
Animal Classification
Animal ClassificationAnimal Classification
Animal Classification
 
Nkh knk
Nkh knkNkh knk
Nkh knk
 
Workshop recuperación 11ces
Workshop recuperación  11cesWorkshop recuperación  11ces
Workshop recuperación 11ces
 
Ngā rauemi hāpai i tā mātou rangahau me te toi mō ngā tuna me ngā hīnaki
Ngā rauemi hāpai i tā mātou rangahau me te toi mō ngā tuna me ngā hīnakiNgā rauemi hāpai i tā mātou rangahau me te toi mō ngā tuna me ngā hīnaki
Ngā rauemi hāpai i tā mātou rangahau me te toi mō ngā tuna me ngā hīnaki
 
TERAKOYA プレゼンテーション資料
TERAKOYA プレゼンテーション資料TERAKOYA プレゼンテーション資料
TERAKOYA プレゼンテーション資料
 
A menina do vale Bel Pesce
A menina do vale   Bel PesceA menina do vale   Bel Pesce
A menina do vale Bel Pesce
 
динамичные цепи поставок_попов_а_3
динамичные цепи поставок_попов_а_3динамичные цепи поставок_попов_а_3
динамичные цепи поставок_попов_а_3
 
От чего зависит эффективность рекламы в группах ВК
От чего зависит эффективность рекламы в группах ВКОт чего зависит эффективность рекламы в группах ВК
От чего зависит эффективность рекламы в группах ВК
 
A Recipe For $uccess: Tracking & Converting Supporters for Maximum Results
A Recipe For $uccess: Tracking & Converting Supporters for Maximum ResultsA Recipe For $uccess: Tracking & Converting Supporters for Maximum Results
A Recipe For $uccess: Tracking & Converting Supporters for Maximum Results
 
7%的分享
7%的分享7%的分享
7%的分享
 
Robotics map based navigation in urban
Robotics map based navigation in urbanRobotics map based navigation in urban
Robotics map based navigation in urban
 
Astek Academy checklist-(120224-final)
Astek Academy checklist-(120224-final)Astek Academy checklist-(120224-final)
Astek Academy checklist-(120224-final)
 

Similar to Security Concerns With Privacy in Social Media

Privacy and Security on Social Media
Privacy and Security on Social MediaPrivacy and Security on Social Media
Privacy and Security on Social Media
YogeshIJTSRD
 
Social Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsSocial Media, Social Science and Research Ethics
Social Media, Social Science and Research Ethics
TheSRAOrg
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
ijsptm
 
Social Media Influence Analysis using Data Science Techniques
Social Media Influence Analysis using Data Science TechniquesSocial Media Influence Analysis using Data Science Techniques
Social Media Influence Analysis using Data Science Techniques
Muhammad Bilal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
Kandy Woodfield
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
ijsptm
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
CSCJournals
 
204
204204
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Zac Darcy
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Anil Dhami
 
Kt3518501858
Kt3518501858Kt3518501858
Kt3518501858
IJERA Editor
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
Micah Altman
 
Challenge of Technology Mediated Social Participation
Challenge of Technology Mediated Social ParticipationChallenge of Technology Mediated Social Participation
Challenge of Technology Mediated Social Participation
Uniq UI: Usability, UX, and UI design, consulting and training
 
Are we getting it right? Social media users' views on social media research
Are we getting it right? Social media users' views on social media researchAre we getting it right? Social media users' views on social media research
Are we getting it right? Social media users' views on social media research
TheSRAOrg
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
ijsptm
 
Web2.0 for research: The Spin, blag and blog.
Web2.0 for research: The Spin, blag and blog.Web2.0 for research: The Spin, blag and blog.
Web2.0 for research: The Spin, blag and blog.
Dr Mariann Hardey
 
The “Meaningful Use” of Social Media by Physicians
The “Meaningful Use” of Social Media by PhysiciansThe “Meaningful Use” of Social Media by Physicians
The “Meaningful Use” of Social Media by Physiciansyan_stanford
 
July IAP: Confidential Information - Storage, Sharing, & Publication - with M...
July IAP: Confidential Information - Storage, Sharing, & Publication - with M...July IAP: Confidential Information - Storage, Sharing, & Publication - with M...
July IAP: Confidential Information - Storage, Sharing, & Publication - with M...
Micah Altman
 

Similar to Security Concerns With Privacy in Social Media (20)

Privacy and Security on Social Media
Privacy and Security on Social MediaPrivacy and Security on Social Media
Privacy and Security on Social Media
 
Social Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsSocial Media, Social Science and Research Ethics
Social Media, Social Science and Research Ethics
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
 
Social Media Influence Analysis using Data Science Techniques
Social Media Influence Analysis using Data Science TechniquesSocial Media Influence Analysis using Data Science Techniques
Social Media Influence Analysis using Data Science Techniques
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
204
204204
204
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
 
Kt3518501858
Kt3518501858Kt3518501858
Kt3518501858
 
Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
 
Challenge of Technology Mediated Social Participation
Challenge of Technology Mediated Social ParticipationChallenge of Technology Mediated Social Participation
Challenge of Technology Mediated Social Participation
 
Are we getting it right? Social media users' views on social media research
Are we getting it right? Social media users' views on social media researchAre we getting it right? Social media users' views on social media research
Are we getting it right? Social media users' views on social media research
 
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...PERSONAL INFORMATION PRIVACY SETTINGS OF  ONLINE SOCIAL NETWORKS AND THEIR  S...
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...
 
Web2.0 for research: The Spin, blag and blog.
Web2.0 for research: The Spin, blag and blog.Web2.0 for research: The Spin, blag and blog.
Web2.0 for research: The Spin, blag and blog.
 
The “Meaningful Use” of Social Media by Physicians
The “Meaningful Use” of Social Media by PhysiciansThe “Meaningful Use” of Social Media by Physicians
The “Meaningful Use” of Social Media by Physicians
 
July IAP: Confidential Information - Storage, Sharing, & Publication - with M...
July IAP: Confidential Information - Storage, Sharing, & Publication - with M...July IAP: Confidential Information - Storage, Sharing, & Publication - with M...
July IAP: Confidential Information - Storage, Sharing, & Publication - with M...
 

Recently uploaded

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

Security Concerns With Privacy in Social Media

  • 1. Social Internet TECH621 Security Concerns with Privacy in Social Media P Kenie Moses Spring 2011 urdue University
  • 2.
  • 5. Presentation, Relevance & Importance of Results
  • 6.
  • 7. Research Purpose ~ Research Questions The purpose of this research is gain an understanding into user’s perceived responsibilities when using social media. This, in turn, will help develop an enlightened approach to how users can better equip themselves to manage the privacy of their social identity. How can social media users enable themselves to be better users by reducing risk? In what ways can one facilitate awareness among social media users to offset diminishing privacy restrictions and security protocols?
  • 9. Current Research Results Facebook Facebook Account Hacked Facebook Security/Privacy Topic Profile: Facebook, Social Media Security & Privacy. Keywords:api, account hacked, privacy breach, viruses Sentiment Subjects:facebook, privacy Regions: United States Languages: English
  • 10.
  • 11. What field? Information & Privacy Technology
  • 12. Who should care? All individuals involved with social media
  • 13. Why?To help users reduce riskThis is an addition to previous and current research being conducted in the area of Information & Privacy Technology.
  • 14.
  • 15. References http://amor.cms.hu/berlin.de/~spiekers/website/pdfs/ONLINE_SOCIAL_NETWORKS_WHY_WE_DISCLOSE_JIT.pdf danahboyd and Nicole Ellison “Social Network Sites: Definition, History, and Scholarship,” . In Journal of Computer-Mediated Communication, 2007 danahhoyd “Social Network Sites: Public, Private, or What?”. Knowledge Tree 13, May 2007 Balachander, Krishnamurthy and Criag E. Willis. “Characterizing Privacy in Online Social Networks”. In proceedings of WOSN, August 2008 Felt, Adrienne and Davis Evans. “Privacy Protection for Social Networking API’s”. August 2007 Dwyer et al. “Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace”. In proceedings of the Thirteenth Americas Conference on Information Systems, August 2007 Chew, Monica et al. ,“Undermining Privacy in Social Networks”. In proceedings of the w2sp conference , August 2008 Squicciarini, Anna et al. “Collective Privacy Management in Social Networks”. In proceedings of the International World Wide Web Conference Committee, April 2009 Pekarek, Martin et al., “Privacy and Social Network Sites: Follow the Money!”, In proceedings of the W3C Workshop on the Future of Social Networking, January 2009. Hogben, G . “Security Issues and Recommendations for Online Social Networks”. ENISA Position Paper No.1, October 2007