SlideShare a Scribd company logo
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
1
Social media platform and Our right to privacy
HardadeAkash Dattatray1
, Prof. Krutika Vartak2
1
(Department of MCA, Viva School Of MCA/ University of Mumbai, India)
2
(Department of MCA, Viva School Of MCA/ University of Mumbai, India)
Abstract—The advancement of Information Technology has hastened the ability to disseminate information across
the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive
information being published on the World Wide Web. While such socially active websites are creative tools for
expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be
termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The
purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the
Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most
appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the
competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
Keywords— Information, Right for privacy, Social Media, Social Networking, user experience.
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
2
I. INTRODUCTION
In the larger context of knowledge mining, a substantial measure of productive analyzing so on learn
are often found advanced records of human conduct in interpersonal organizations without breaching the
users’ privacy. Thus, information need to be made accessible during a manner that privacy should be
safeguarded and protection is extremely scrutinized. On the opposite hand, the suspicion that any outsider
which is intrigued to interrupt down information are often viewed as reliable is truth be told unlikely, due to
the key point of preference that the usage of all information, including recognizing and delicate ones, may
provide for these gatherings. Thanks to the precise instance of interpersonal organizations, the foremost
grounded measure which will be received is to form unflinching quality of individual’s privacy who
expresses the affiliation.
According to the authors, who had proposed that any kind of examination about the amount of inhabitants in
clients who express inclinations, therefore defusing protection dangers also as vital investigation. The
proposition remains to stay connection able to the interpersonal organization profiles of their users, however
to allow clients to partner some guaranteed property estimations with their credentials, by picking whenever
they express credits that require to uncover. within the sideline perspective of the privacy domain , the topic
ofprivacy has been under scrutiny and ensuring the essential importance given by the actual academic
grouphas deemed to be vigilant. to make sure privacy of clients by recognizing characteristics, not by
vulnerability
based anonymization. Thus, despite the very fact that from an only specialized viewpoint our answer is closer
to privacy than protection within the end of the day , individual information of clients is ensured.
II. METHODOLOGY
The sole objective of the study is to attach the quantitative system with a selected end goal to
spuriously investigate the social information of the potential users and acquire the much needed details like
demographic data, temporal data, user profile etc., of the respondents. to reinforce this process, we had taken
a survey system which will be thoroughly utilized and disseminated to over quite 200 social media users and
therefore the populace are going to be dictated by the non–probability testing strategy. Spiral testing and
respondent-driven examining have additionally permits analysts to form gauges about the interpersonal
organization joining the shrouded populace to solicit them on the protection from the present social network
communities. Hence, this comprehensive study has focused more on privacy concerns hinges on the social
networks and jolt out the privacy breaches effectively. We had identified a number of the privacy concerns
that the social users can undertake before they uses the social sites and embed their privacy setting on the
location to stop any breach of violation.
2.1 Predicting the behavior of social media users
This study goes for locating the privacy and privacy in social network sites locales recognition among Social
Media clients [6]. A specimen of 250 understudies was chosen haphazardly from distinctive piece of the
planet . A net of 185 polls were filled effectively and returned. Almost 78% of the respondents were males,
while about 22% of them were females .On the opposite hand, roughly 72 of respondents were within the age
bunch 20-35 years aged . Be that because it may, the number of respondents within the age gatherings
"between 28-41 practically got 19% where different gatherings 50 or more is true around zero. Instructive
level played a high effect after 58% are four year certification and graduate degrees are 21%. The years of
utilizing Internet believe the commonality of interpersonal organization on the grounds that from those are
utilizing the online for over 10 years are 56% and within the event that we connect the utilization wit h nature
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
3
of SN it indicates 51 you take care of decently recognizable and 49% for very documented . but 90% of this
study populace is utilizing Facebook and 36 % utilizing Islam Tag and 62% twitter so this is often leeway for
us to believe Facebook protection model.
2.2 Privacy Glitches and Concerns
As it was illustrated in Table 1 that when getting some information about privacy and the way well
they're mindful of protection and terms of conditions, 52% are modestly familiar with the weather and
redesigns in Social Media protection which was demonstrated that they're familiar with the protection when
87% confine get to some surely part in their profile. Be that because it may [2], within the matter of adjusting
protection 43% change their privacy setting every so often which means just if anything happened and 47%
once during a while change their protection setting and therefore the same goes for privacy and record
setting.
In the Table 1 below, we had identified the various privacy mechanisms that the social media site offered to
the users to line in and have interaction within the privacy concerned activities. There would be a good range
of discrimination persists within the social media sets in offering the privacy policies to the users and from
the survey taken, it's largely been noted that a lot of the users of social media site has not concern more on
their privacy settings and kept the privacy details intrinsically created
Table 1. Privacy concerns in Social Media site and its comparisons.
Privacy options Facebook Twitter LinkedIn Google+
Restrict the visibility of the
active users
Yes No No No
Set the control on how others
can find you
Yes Yes Yes No
Block the users for their photo
tag Yes No No Yes
Set login Alerts Yes No No Yes
Block Spam Users Yes Yes Yes Yes
Control who can message you Yes No Yes Yes
2.3 Various Possible Threats in Social Networking Sites
The security issues and privacy concerns are the main requirements of the social networking sites.
But there have been many deadliest attacks persists altogether these social networking sites and safeguarding
the potential users from these heinous attack have been the challenging task of the many social analyst and
developers. The essential security attacks are classified into three categories.
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
4
XPrivacy Breach - Find link between nodes and edges and possibly identify the relation between them.
xPassiveAttacks - this is often totally anonymous and undetectable.
xActive Attacks - Form the new nodes intrinsically and trying to attach to the linked nodes and gain the access to the
opposite nodes.
Table 3. illustrates the clear depictions of various attacks in social media sites and given the possible
solution to how to handle the attacks safely.
Major domain ofattacks Sub-attacks Solution to handle theattacks
Social Networking
Infrastructur
e attacks
TCPSYNFloodAttack,Sm
urfIPAttack, UDP Flood
Attack, Ping of death,
Tear Drop
-Use Anti-Virus and Anti-Malware Software.
MalwareAttacks Crime
ware,Spyware,Adware,Br
owser Hijackers,
Downloader, ToolBars
-Use of Anti-Virus.
-Do not go for unknown links, friends,
applications, email attachments etc.,
-
DisableCookies,Sessions,ActiveXifunknowno
r no counter-measuresavailable.
-Examinetheemailscarefully.
PhishingAttacks Deceptivephishing(emails
),Malware- based
phishing, Key loggers,
Search enginephishing
-Validate the source of the data.
- Beware of ads with offers
EvilTwinAttacks Socialengineeringattack -Careful about having friends andsharinginformation
-Authenticate the user profile and share the data
-Try to completely understand the policies of having
friends in the social networking sites
IdentityTheftAttacks Dumpsterdiving -Use complex passwords, avoid passwordre-usage.
-Shred your email or documents properly
Cyberbullying Cyber bullying -Donotacknowledgethemessagesthatareintended to
hurt orthreat.
-Save and Archive the messages as evidences
-Take all threats seriously
-Do not share personal information with all users
PhysicalAttacks Impersonation,Harassmen
tthrough messages
-Need a well-defined social networking policy.
-Background security and privacy checks -
Properly make use of privacy settings option
2.4 Privacy Setup on Social Networking Sites
Social network sites destinations work to strengthen privacy settings. Facebook and other long range social
communication destinations limit protection as a serious aspect of their default settings. It's essential for clients to

Recommended for you

My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks

This document summarizes a research paper that proposes a facial recognition system to help users control photo sharing on social networks while protecting privacy. It discusses how photo sharing on social networks can unintentionally reveal private user information through tags, comments or metadata. The proposed system would recognize faces in photos and allow users to choose privacy settings during the photo posting process. It would also use private user photos to train the facial recognition model while preserving privacy through a distributed consensus method. The goal is to give users more awareness and control over how their photos are shared and help prevent unintended disclosure of personal information.

An efficient control of virus propagation
An efficient control of virus propagationAn efficient control of virus propagation
An efficient control of virus propagation

This document discusses the development of an Efficient Control of Virus Propagation (ECOVP) system using case-based reasoning and object-oriented methodology. It conducted a questionnaire survey that found many computer users in Malaysia lack awareness of computer viruses and there is a need for an effective system to guide users in handling virus incidents. The ECOVP system was developed to educate users and help control virus propagation by providing customized solutions based on the symptoms users describe. It was tested for accuracy and usability and found to successfully help users clean infected machines and prevent future infections.

CHI abstract camera ready
CHI abstract camera readyCHI abstract camera ready
CHI abstract camera ready

The document summarizes a study that examined perceived risk and self-efficacy regarding internet security in a marginalized community. 44 participants were interviewed about their perceptions of risk and self-efficacy when using the internet. They were shown examples of safe and malicious websites. While participants were aware of security risks, they had low self-efficacy and saw themselves as vulnerable. They were introduced to PopJART security software but low self-efficacy and perceived barriers prevented adoption, even though they had confidence in its accuracy. The study found that increasing self-efficacy may be more important than communicating risk when designing security services for low-proficiency users.

VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
5
travel into their client settings to change their protection choices. These locales like Facebook give clients the choice
to not show individual data, for instance , conception date, email, phone number , and business status. For the
individuals who plan to incorporate this material, Facebook permit clients to limit access to their profile to only
permit the individuals who they acknowledge as "companions" to ascertain their profile. Be that because it may,
even this level of privacy can't keep one among those companions from sparing a photograph to their own PC and
posting it elsewhere. Be that because itmay, at the present less social media site clients have constrained their
profiles.
For example, allow us to take how the users to limit the profile visibility to others in several social media sites:
x Facebook: Facebook's privacy setting for brand spanking new users is about to Friends Only. to line this, visit
Settings Privacy Who can see your future post
x Twitter: Settings  Security and privacy  Privacy Tweet Privacy  Protect my Tweets.
x LinkedIn: to vary this: Settings Account Helpful Links  Edit your public profile.
x Google+: to vary this setting, type the name of a Circle within the "To" field below your post before you publish
it.
Facebook could plainly express that they might give no assurances with reference to the privacy of their
information, which if clients make their profiles open, all data contained therein could also be seen by
occupation questioners and faculty chairmen.
Keep in mind most long range informal communication destinations encourage to quit applications,
conceal companion rundown and shroud intrigues. However much of the info remains open as a matter in
fact it's crucial that each one long range interpersonal communication destinations clients limit access to
their profiles, not post data of unlawful or arrangement disregarding activities to their profiles, and be
wary of the info they create accessible.
2.5 Trust Management and Issues
Protection is a precondition for online self-divulgence, yet self-revelation additionally diminishes privacy by
expanding the measure of online data accessible to different clients; the connections between these builds
appear to be suffering from critical variables, for instance , trust and control [5]. Trust is characterized
because the conviction that folks , gatherings, or establishments are often trusted. It frequently has an
opposing association with protection, if in light of the very fact that individuals got to know data about others
keeping in mind the top goal to trust them, which thusly features a beneficial outcome on online self-
exposure.
Then again, the advancement of trust in a web domain is unpredictable on the grounds that the web world is
characterized as frail. This is the rationale a couple of studies have targeting the inclination of people to
unveil data on the premise of both trust and protection. An imperative build which will impact this amazing
relationship is that the apparent control over data. For instance, word check, things constructed particularly,
and ready raters are regularly wont to quantify online self-divulgence, and adjustments of instruments
assembled for up close and private correspondence are utilized to assess online trust.
2.6 Privacy Setup on Social Networking Sites
Late research has investigated the connection between the web revelation of individual data and privacy
concerns and therefore the high hazard identified with online ruptures of protection. It was also well
suggested
that privacy may be a term that's hard to characterize; legitimately, it alludes to at least one side to be to not
VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
6
mention, yet it can likewise incorporate the privilege to settle on the degree to which individual data is
revealed,
the privilege to focus at the purpose when, how, and what data are often imparted to others. Finding that one's
own particular private data has been scattered internet, including humiliating photographs or features that are
recovered through phishing tricks or deficient protection limitations, speaks to a genuine mental danger. On
Facebook, the setting is liquid and flimsy,
III. CONCLUSION
It has been observed that privacy concerns are very feeble within the social networking sites and therefore
the users endeavors to form the acceptable changes on their social media privacy is substantially less than
other mode of security operations. Besides, many of the social media users have the dearth of technical
makeovers and thus yield the low privacy concerns to their own content. In the statistics taken, we had
identified many of the shortcomings and hiccups on the technical side of privacy and security measures
are on the social media sites. Hence, we had given the possible root explanation for the glitches and
proposed the changes to need over for the privacy concerns of social networking site. If we might choose
enforcing a group of well defined policies for social media, like, a robust password, awareness of
adjusting password often, awareness of data disclosure, purpose of antivirus or related software, and
proprietary software etc., we might secure the social networks from further attacks and vulnerabilities.
Acknowledgements
I am thankful to my college for giving me this opportunity to make this project a success. I give my special thanks and sincere gratitude
towards Prof. krutika vartak for encouraging me to complete this research paper, guiding me and helping me through all the obstacles in
theresearch.
Withoutherassistance,myresearchpaperwouldhavebeenimpossible.Also,Ipresentmyobligationtowards
allourpastyearsteacherswhohavebestoweddeepunderstandingandknowledgeinus,overthepastyears.We
areobligedtoourparentsandfamilymemberswhoalwayssupportedmegreatlyandencouragedmeineachand every step.
REFERENCES
[1] Joshana Shibchurn, XiangbinYan.Information disclosure on social networking sites: An intrinsic – extrinsic motivation
perspective. Computers in Human Behavior. 2015;44:103-117.
[2] Yan Li, Yingjiu Li, Qiang Yan, Robert H. Deng, Privacy leakage analysis in online social Networks, Computers and Security, Mar
2015; 49(c):239-254.
[3] PatrickVanEecke,MaartenTruyens,Privacyandsocialnetworks,ComputerLaw&SecurityReview;2010;26(5):535-546.
[4] Benson Vladlena, George Saridakis, HemamaliTennakoon, Jean Noel Ezingeard, The role of security notices and online consumer
behaviour:Anempiricalstudyofsocialnetworkingusers,InternationalJournalofHumanComputerStudies;Aug2015;80:36-44.
[5] Yuan Li.Theories in online information privacy research: A critical review and an integrated framework, Decision Support
System. June 2012;54(1):471-481.
[6] Nader YahyaAlkeinay, Norita Md. Norwawi. User Oriented Privacy Model for Social Networks. International Conference on
Innovation, Management and Technology Research, Malaysia; 22 – 23 September, 2013;191-197.
[7] Gail-JoonAhn, Mohamed Shehab, Anna Squicciarini. Security and Privacy in Social Networks. IEEE Internet Computing; 2011;
15(3): 10- 12.
[8] PaulLowry,JinweiCao,AndreaEverard.PrivacyConcernsversusDesireforInterpersonalAwarenessinDrivingtheUseofSelf-Disclosure
Technologies:TheCaseofInstantMessaginginTwoCultures.JournalofManagementInformationSystems;2011;27(4):163-200.
[9] Carl Timm, Richard Perez. Seven Deadliest Social Network Attacks. Syngress Publishing;2010.
[10] Basilisa Mvungi, Mizuho Iwaihara. Associations between privacy, risk awareness, and interactive motivations of social
networking service users,andmotivationpredictionfromobservablefeatures.ComputersinHumanBehavior,Dec2014;4(c):20-34.

More Related Content

What's hot

Jf2516311637
Jf2516311637Jf2516311637
Jf2516311637
IJERA Editor
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior Adoption
Cori Faklaris
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET Journal
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
IRJET Journal
 
An efficient control of virus propagation
An efficient control of virus propagationAn efficient control of virus propagation
An efficient control of virus propagation
UltraUploader
 
CHI abstract camera ready
CHI abstract camera readyCHI abstract camera ready
CHI abstract camera ready
Mark Sinclair
 
Spammer taxonomy using scientific approach
Spammer taxonomy using scientific approachSpammer taxonomy using scientific approach
Spammer taxonomy using scientific approach
Kamoru Abiodun Balogun(Bsc,MIT,CCNA,OCA,PhD inview UPM)
 
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
AM Publications
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
Marc Smith
 
DESIGNING A CYBER-SECURITY CULTURE ASSESSMENT SURVEY TARGETING CRITICAL INFRA...
DESIGNING A CYBER-SECURITY CULTURE ASSESSMENT SURVEY TARGETING CRITICAL INFRA...DESIGNING A CYBER-SECURITY CULTURE ASSESSMENT SURVEY TARGETING CRITICAL INFRA...
DESIGNING A CYBER-SECURITY CULTURE ASSESSMENT SURVEY TARGETING CRITICAL INFRA...
IJNSA Journal
 
Dv31821825
Dv31821825Dv31821825
Dv31821825
IJERA Editor
 
The mimetic virus A vector for cyberterrorism
The mimetic virus A vector for cyberterrorismThe mimetic virus A vector for cyberterrorism
The mimetic virus A vector for cyberterrorism
Nicholas Ayres
 
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized AccessSocial Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized Access
Kory Edwards
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
Kory Edwards
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Social Engineering Role in Compromising Information/Network Security
Social Engineering Role in Compromising Information/Network SecuritySocial Engineering Role in Compromising Information/Network Security
Social Engineering Role in Compromising Information/Network Security
Oladotun Ojebode
 
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET Journal
 
Detecting fake news_with_weak_social_supervision
Detecting fake news_with_weak_social_supervisionDetecting fake news_with_weak_social_supervision
Detecting fake news_with_weak_social_supervision
Suresh S
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Information Security Awareness Group
 

What's hot (19)

Jf2516311637
Jf2516311637Jf2516311637
Jf2516311637
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior Adoption
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
 
An efficient control of virus propagation
An efficient control of virus propagationAn efficient control of virus propagation
An efficient control of virus propagation
 
CHI abstract camera ready
CHI abstract camera readyCHI abstract camera ready
CHI abstract camera ready
 
Spammer taxonomy using scientific approach
Spammer taxonomy using scientific approachSpammer taxonomy using scientific approach
Spammer taxonomy using scientific approach
 
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
 
DESIGNING A CYBER-SECURITY CULTURE ASSESSMENT SURVEY TARGETING CRITICAL INFRA...
DESIGNING A CYBER-SECURITY CULTURE ASSESSMENT SURVEY TARGETING CRITICAL INFRA...DESIGNING A CYBER-SECURITY CULTURE ASSESSMENT SURVEY TARGETING CRITICAL INFRA...
DESIGNING A CYBER-SECURITY CULTURE ASSESSMENT SURVEY TARGETING CRITICAL INFRA...
 
Dv31821825
Dv31821825Dv31821825
Dv31821825
 
The mimetic virus A vector for cyberterrorism
The mimetic virus A vector for cyberterrorismThe mimetic virus A vector for cyberterrorism
The mimetic virus A vector for cyberterrorism
 
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized AccessSocial Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized Access
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Social Engineering Role in Compromising Information/Network Security
Social Engineering Role in Compromising Information/Network SecuritySocial Engineering Role in Compromising Information/Network Security
Social Engineering Role in Compromising Information/Network Security
 
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...
 
Detecting fake news_with_weak_social_supervision
Detecting fake news_with_weak_social_supervisionDetecting fake news_with_weak_social_supervision
Detecting fake news_with_weak_social_supervision
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
 

Similar to Social media platform and Our right to privacy

Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
IRJET Journal
 
Collusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksCollusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networks
IJECEIAES
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
CSCJournals
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
IRJET Journal
 
Big data privacy issues in public social media
Big data privacy issues in public social mediaBig data privacy issues in public social media
Big data privacy issues in public social media
Supriya Radhakrishna
 
Social Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug UsageSocial Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug Usage
ijtsrd
 
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGBINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
IRJET Journal
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
 
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionA Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
IRJET Journal
 
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksDetecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
IRJET Journal
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
IJECEIAES
 
Citation Hisseine, M.A.; Chen, D.;Yang, X. The Applicatio.docx
Citation Hisseine, M.A.; Chen, D.;Yang, X. The Applicatio.docxCitation Hisseine, M.A.; Chen, D.;Yang, X. The Applicatio.docx
Citation Hisseine, M.A.; Chen, D.;Yang, X. The Applicatio.docx
richardnorman90310
 
Survey of data mining techniques for social
Survey of data mining techniques for socialSurvey of data mining techniques for social
Survey of data mining techniques for social
Firas Husseini
 
Kastriot Blakaj
Kastriot BlakajKastriot Blakaj
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET Journal
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
IOSR Journals
 
L017146571
L017146571L017146571
L017146571
IOSR Journals
 
Privacy and Security on Social Media
Privacy and Security on Social MediaPrivacy and Security on Social Media
Privacy and Security on Social Media
YogeshIJTSRD
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02
Government
 
Transformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital IdentityTransformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital Identity
IJNSA Journal
 

Similar to Social media platform and Our right to privacy (20)

Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
 
Collusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networksCollusion-resistant multiparty data sharing in social networks
Collusion-resistant multiparty data sharing in social networks
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
 
Big data privacy issues in public social media
Big data privacy issues in public social mediaBig data privacy issues in public social media
Big data privacy issues in public social media
 
Social Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug UsageSocial Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug Usage
 
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGBINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionA Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face Detection
 
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksDetecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
 
Citation Hisseine, M.A.; Chen, D.;Yang, X. The Applicatio.docx
Citation Hisseine, M.A.; Chen, D.;Yang, X. The Applicatio.docxCitation Hisseine, M.A.; Chen, D.;Yang, X. The Applicatio.docx
Citation Hisseine, M.A.; Chen, D.;Yang, X. The Applicatio.docx
 
Survey of data mining techniques for social
Survey of data mining techniques for socialSurvey of data mining techniques for social
Survey of data mining techniques for social
 
Kastriot Blakaj
Kastriot BlakajKastriot Blakaj
Kastriot Blakaj
 
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 
L017146571
L017146571L017146571
L017146571
 
Privacy and Security on Social Media
Privacy and Security on Social MediaPrivacy and Security on Social Media
Privacy and Security on Social Media
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02
 
Transformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital IdentityTransformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital Identity
 

More from vivatechijri

Understanding the Impact and Challenges of Corona Crisis on Education Sector...
Understanding the Impact and Challenges of Corona Crisis on  Education Sector...Understanding the Impact and Challenges of Corona Crisis on  Education Sector...
Understanding the Impact and Challenges of Corona Crisis on Education Sector...
vivatechijri
 
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT  LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT
vivatechijri
 
A study on solving Assignment Problem
A study on solving Assignment ProblemA study on solving Assignment Problem
A study on solving Assignment Problem
vivatechijri
 
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...
vivatechijri
 
Theoretical study of two dimensional Nano sheet for gas sensing application
Theoretical study of two dimensional Nano sheet for gas sensing  applicationTheoretical study of two dimensional Nano sheet for gas sensing  application
Theoretical study of two dimensional Nano sheet for gas sensing application
vivatechijri
 
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOODMETHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOOD
vivatechijri
 
The Business Development Ethics
The Business Development EthicsThe Business Development Ethics
The Business Development Ethics
vivatechijri
 
Digital Wellbeing
Digital WellbeingDigital Wellbeing
Digital Wellbeing
vivatechijri
 
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEAn Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
vivatechijri
 
Enhancing The Capability of Chatbots
Enhancing The Capability of ChatbotsEnhancing The Capability of Chatbots
Enhancing The Capability of Chatbots
vivatechijri
 
Smart Glasses Technology
Smart Glasses TechnologySmart Glasses Technology
Smart Glasses Technology
vivatechijri
 
Future Applications of Smart Iot Devices
Future Applications of Smart Iot DevicesFuture Applications of Smart Iot Devices
Future Applications of Smart Iot Devices
vivatechijri
 
Cross Platform Development Using Flutter
Cross Platform Development Using FlutterCross Platform Development Using Flutter
Cross Platform Development Using Flutter
vivatechijri
 
3D INTERNET
3D INTERNET3D INTERNET
3D INTERNET
vivatechijri
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
vivatechijri
 
Light Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking TechnologyLight Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking Technology
vivatechijri
 
THE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCETHE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCE
vivatechijri
 
Google File System
Google File SystemGoogle File System
Google File System
vivatechijri
 
A Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain TechnologyA Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain Technology
vivatechijri
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
vivatechijri
 

More from vivatechijri (20)

Understanding the Impact and Challenges of Corona Crisis on Education Sector...
Understanding the Impact and Challenges of Corona Crisis on  Education Sector...Understanding the Impact and Challenges of Corona Crisis on  Education Sector...
Understanding the Impact and Challenges of Corona Crisis on Education Sector...
 
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT  LEADERSHIP ONLY CAN LEAD THE ORGANIZATION  TOWARDS IMPROVEMENT AND DEVELOPMENT
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT
 
A study on solving Assignment Problem
A study on solving Assignment ProblemA study on solving Assignment Problem
A study on solving Assignment Problem
 
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...Structural and Morphological Studies of Nano Composite  Polymer Gel Electroly...
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...
 
Theoretical study of two dimensional Nano sheet for gas sensing application
Theoretical study of two dimensional Nano sheet for gas sensing  applicationTheoretical study of two dimensional Nano sheet for gas sensing  application
Theoretical study of two dimensional Nano sheet for gas sensing application
 
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOODMETHODS FOR DETECTION OF COMMON  ADULTERANTS IN FOOD
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOOD
 
The Business Development Ethics
The Business Development EthicsThe Business Development Ethics
The Business Development Ethics
 
Digital Wellbeing
Digital WellbeingDigital Wellbeing
Digital Wellbeing
 
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEAn Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGE
 
Enhancing The Capability of Chatbots
Enhancing The Capability of ChatbotsEnhancing The Capability of Chatbots
Enhancing The Capability of Chatbots
 
Smart Glasses Technology
Smart Glasses TechnologySmart Glasses Technology
Smart Glasses Technology
 
Future Applications of Smart Iot Devices
Future Applications of Smart Iot DevicesFuture Applications of Smart Iot Devices
Future Applications of Smart Iot Devices
 
Cross Platform Development Using Flutter
Cross Platform Development Using FlutterCross Platform Development Using Flutter
Cross Platform Development Using Flutter
 
3D INTERNET
3D INTERNET3D INTERNET
3D INTERNET
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
 
Light Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking TechnologyLight Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking Technology
 
THE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCETHE USABILITY METRICS FOR USER EXPERIENCE
THE USABILITY METRICS FOR USER EXPERIENCE
 
Google File System
Google File SystemGoogle File System
Google File System
 
A Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain TechnologyA Study of Tokenization of Real Estate Using Blockchain Technology
A Study of Tokenization of Real Estate Using Blockchain Technology
 
A Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud ComputingA Study of Data Storage Security Issues in Cloud Computing
A Study of Data Storage Security Issues in Cloud Computing
 

Recently uploaded

Introduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer NetworkingIntroduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer Networking
Md.Shohel Rana ( M.Sc in CSE Khulna University of Engineering & Technology (KUET))
 
Development of Chatbot Using AI/ML Technologies
Development of  Chatbot Using AI/ML TechnologiesDevelopment of  Chatbot Using AI/ML Technologies
Development of Chatbot Using AI/ML Technologies
maisnampibarel
 
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
IJAEMSJORNAL
 
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdfOCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
Muanisa Waras
 
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
VICTOR MAESTRE RAMIREZ
 
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
sanabts249
 
Germany Offshore Wind 010724 RE (1) 2 test.pptx
Germany Offshore Wind 010724 RE (1) 2 test.pptxGermany Offshore Wind 010724 RE (1) 2 test.pptx
Germany Offshore Wind 010724 RE (1) 2 test.pptx
rebecca841358
 
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Miss Khusi #V08
 
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
Mani Krishna Sarkar
 
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.docCCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
Dss
 
IS Code SP 23: Handbook on concrete mixes
IS Code SP 23: Handbook  on concrete mixesIS Code SP 23: Handbook  on concrete mixes
IS Code SP 23: Handbook on concrete mixes
Mani Krishna Sarkar
 
Chlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptxChlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptx
yadavsuyash008
 
Online music portal management system project report.pdf
Online music portal management system project report.pdfOnline music portal management system project report.pdf
Online music portal management system project report.pdf
Kamal Acharya
 
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K SchemeMSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
Anwar Patel
 
Lecture 6 - The effect of Corona effect in Power systems.pdf
Lecture 6 - The effect of Corona effect in Power systems.pdfLecture 6 - The effect of Corona effect in Power systems.pdf
Lecture 6 - The effect of Corona effect in Power systems.pdf
peacekipu
 
LeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdfLeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdf
pavanaroshni1977
 
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
sharvaridhokte
 
Software Engineering and Project Management - Introduction to Project Management
Software Engineering and Project Management - Introduction to Project ManagementSoftware Engineering and Project Management - Introduction to Project Management
Software Engineering and Project Management - Introduction to Project Management
Prakhyath Rai
 
Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.
Tool and Die Tech
 
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionUnderstanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Bert Blevins
 

Recently uploaded (20)

Introduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer NetworkingIntroduction to IP address concept - Computer Networking
Introduction to IP address concept - Computer Networking
 
Development of Chatbot Using AI/ML Technologies
Development of  Chatbot Using AI/ML TechnologiesDevelopment of  Chatbot Using AI/ML Technologies
Development of Chatbot Using AI/ML Technologies
 
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...
 
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdfOCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
 
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
 
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
 
Germany Offshore Wind 010724 RE (1) 2 test.pptx
Germany Offshore Wind 010724 RE (1) 2 test.pptxGermany Offshore Wind 010724 RE (1) 2 test.pptx
Germany Offshore Wind 010724 RE (1) 2 test.pptx
 
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
 
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
 
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.docCCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
CCS367-STORAGE TECHNOLOGIES QUESTION BANK.doc
 
IS Code SP 23: Handbook on concrete mixes
IS Code SP 23: Handbook  on concrete mixesIS Code SP 23: Handbook  on concrete mixes
IS Code SP 23: Handbook on concrete mixes
 
Chlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptxChlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptx
 
Online music portal management system project report.pdf
Online music portal management system project report.pdfOnline music portal management system project report.pdf
Online music portal management system project report.pdf
 
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K SchemeMSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
 
Lecture 6 - The effect of Corona effect in Power systems.pdf
Lecture 6 - The effect of Corona effect in Power systems.pdfLecture 6 - The effect of Corona effect in Power systems.pdf
Lecture 6 - The effect of Corona effect in Power systems.pdf
 
LeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdfLeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdf
 
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
 
Software Engineering and Project Management - Introduction to Project Management
Software Engineering and Project Management - Introduction to Project ManagementSoftware Engineering and Project Management - Introduction to Project Management
Software Engineering and Project Management - Introduction to Project Management
 
Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.
 
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionUnderstanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
 

Social media platform and Our right to privacy

  • 1. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021) 1 Social media platform and Our right to privacy HardadeAkash Dattatray1 , Prof. Krutika Vartak2 1 (Department of MCA, Viva School Of MCA/ University of Mumbai, India) 2 (Department of MCA, Viva School Of MCA/ University of Mumbai, India) Abstract—The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology Keywords— Information, Right for privacy, Social Media, Social Networking, user experience.
  • 2. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021) 2 I. INTRODUCTION In the larger context of knowledge mining, a substantial measure of productive analyzing so on learn are often found advanced records of human conduct in interpersonal organizations without breaching the users’ privacy. Thus, information need to be made accessible during a manner that privacy should be safeguarded and protection is extremely scrutinized. On the opposite hand, the suspicion that any outsider which is intrigued to interrupt down information are often viewed as reliable is truth be told unlikely, due to the key point of preference that the usage of all information, including recognizing and delicate ones, may provide for these gatherings. Thanks to the precise instance of interpersonal organizations, the foremost grounded measure which will be received is to form unflinching quality of individual’s privacy who expresses the affiliation. According to the authors, who had proposed that any kind of examination about the amount of inhabitants in clients who express inclinations, therefore defusing protection dangers also as vital investigation. The proposition remains to stay connection able to the interpersonal organization profiles of their users, however to allow clients to partner some guaranteed property estimations with their credentials, by picking whenever they express credits that require to uncover. within the sideline perspective of the privacy domain , the topic ofprivacy has been under scrutiny and ensuring the essential importance given by the actual academic grouphas deemed to be vigilant. to make sure privacy of clients by recognizing characteristics, not by vulnerability based anonymization. Thus, despite the very fact that from an only specialized viewpoint our answer is closer to privacy than protection within the end of the day , individual information of clients is ensured. II. METHODOLOGY The sole objective of the study is to attach the quantitative system with a selected end goal to spuriously investigate the social information of the potential users and acquire the much needed details like demographic data, temporal data, user profile etc., of the respondents. to reinforce this process, we had taken a survey system which will be thoroughly utilized and disseminated to over quite 200 social media users and therefore the populace are going to be dictated by the non–probability testing strategy. Spiral testing and respondent-driven examining have additionally permits analysts to form gauges about the interpersonal organization joining the shrouded populace to solicit them on the protection from the present social network communities. Hence, this comprehensive study has focused more on privacy concerns hinges on the social networks and jolt out the privacy breaches effectively. We had identified a number of the privacy concerns that the social users can undertake before they uses the social sites and embed their privacy setting on the location to stop any breach of violation. 2.1 Predicting the behavior of social media users This study goes for locating the privacy and privacy in social network sites locales recognition among Social Media clients [6]. A specimen of 250 understudies was chosen haphazardly from distinctive piece of the planet . A net of 185 polls were filled effectively and returned. Almost 78% of the respondents were males, while about 22% of them were females .On the opposite hand, roughly 72 of respondents were within the age bunch 20-35 years aged . Be that because it may, the number of respondents within the age gatherings "between 28-41 practically got 19% where different gatherings 50 or more is true around zero. Instructive level played a high effect after 58% are four year certification and graduate degrees are 21%. The years of utilizing Internet believe the commonality of interpersonal organization on the grounds that from those are utilizing the online for over 10 years are 56% and within the event that we connect the utilization wit h nature
  • 3. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021) 3 of SN it indicates 51 you take care of decently recognizable and 49% for very documented . but 90% of this study populace is utilizing Facebook and 36 % utilizing Islam Tag and 62% twitter so this is often leeway for us to believe Facebook protection model. 2.2 Privacy Glitches and Concerns As it was illustrated in Table 1 that when getting some information about privacy and the way well they're mindful of protection and terms of conditions, 52% are modestly familiar with the weather and redesigns in Social Media protection which was demonstrated that they're familiar with the protection when 87% confine get to some surely part in their profile. Be that because it may [2], within the matter of adjusting protection 43% change their privacy setting every so often which means just if anything happened and 47% once during a while change their protection setting and therefore the same goes for privacy and record setting. In the Table 1 below, we had identified the various privacy mechanisms that the social media site offered to the users to line in and have interaction within the privacy concerned activities. There would be a good range of discrimination persists within the social media sets in offering the privacy policies to the users and from the survey taken, it's largely been noted that a lot of the users of social media site has not concern more on their privacy settings and kept the privacy details intrinsically created Table 1. Privacy concerns in Social Media site and its comparisons. Privacy options Facebook Twitter LinkedIn Google+ Restrict the visibility of the active users Yes No No No Set the control on how others can find you Yes Yes Yes No Block the users for their photo tag Yes No No Yes Set login Alerts Yes No No Yes Block Spam Users Yes Yes Yes Yes Control who can message you Yes No Yes Yes 2.3 Various Possible Threats in Social Networking Sites The security issues and privacy concerns are the main requirements of the social networking sites. But there have been many deadliest attacks persists altogether these social networking sites and safeguarding the potential users from these heinous attack have been the challenging task of the many social analyst and developers. The essential security attacks are classified into three categories.
  • 4. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021) 4 XPrivacy Breach - Find link between nodes and edges and possibly identify the relation between them. xPassiveAttacks - this is often totally anonymous and undetectable. xActive Attacks - Form the new nodes intrinsically and trying to attach to the linked nodes and gain the access to the opposite nodes. Table 3. illustrates the clear depictions of various attacks in social media sites and given the possible solution to how to handle the attacks safely. Major domain ofattacks Sub-attacks Solution to handle theattacks Social Networking Infrastructur e attacks TCPSYNFloodAttack,Sm urfIPAttack, UDP Flood Attack, Ping of death, Tear Drop -Use Anti-Virus and Anti-Malware Software. MalwareAttacks Crime ware,Spyware,Adware,Br owser Hijackers, Downloader, ToolBars -Use of Anti-Virus. -Do not go for unknown links, friends, applications, email attachments etc., - DisableCookies,Sessions,ActiveXifunknowno r no counter-measuresavailable. -Examinetheemailscarefully. PhishingAttacks Deceptivephishing(emails ),Malware- based phishing, Key loggers, Search enginephishing -Validate the source of the data. - Beware of ads with offers EvilTwinAttacks Socialengineeringattack -Careful about having friends andsharinginformation -Authenticate the user profile and share the data -Try to completely understand the policies of having friends in the social networking sites IdentityTheftAttacks Dumpsterdiving -Use complex passwords, avoid passwordre-usage. -Shred your email or documents properly Cyberbullying Cyber bullying -Donotacknowledgethemessagesthatareintended to hurt orthreat. -Save and Archive the messages as evidences -Take all threats seriously -Do not share personal information with all users PhysicalAttacks Impersonation,Harassmen tthrough messages -Need a well-defined social networking policy. -Background security and privacy checks - Properly make use of privacy settings option 2.4 Privacy Setup on Social Networking Sites Social network sites destinations work to strengthen privacy settings. Facebook and other long range social communication destinations limit protection as a serious aspect of their default settings. It's essential for clients to
  • 5. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021) 5 travel into their client settings to change their protection choices. These locales like Facebook give clients the choice to not show individual data, for instance , conception date, email, phone number , and business status. For the individuals who plan to incorporate this material, Facebook permit clients to limit access to their profile to only permit the individuals who they acknowledge as "companions" to ascertain their profile. Be that because it may, even this level of privacy can't keep one among those companions from sparing a photograph to their own PC and posting it elsewhere. Be that because itmay, at the present less social media site clients have constrained their profiles. For example, allow us to take how the users to limit the profile visibility to others in several social media sites: x Facebook: Facebook's privacy setting for brand spanking new users is about to Friends Only. to line this, visit Settings Privacy Who can see your future post x Twitter: Settings  Security and privacy  Privacy Tweet Privacy  Protect my Tweets. x LinkedIn: to vary this: Settings Account Helpful Links  Edit your public profile. x Google+: to vary this setting, type the name of a Circle within the "To" field below your post before you publish it. Facebook could plainly express that they might give no assurances with reference to the privacy of their information, which if clients make their profiles open, all data contained therein could also be seen by occupation questioners and faculty chairmen. Keep in mind most long range informal communication destinations encourage to quit applications, conceal companion rundown and shroud intrigues. However much of the info remains open as a matter in fact it's crucial that each one long range interpersonal communication destinations clients limit access to their profiles, not post data of unlawful or arrangement disregarding activities to their profiles, and be wary of the info they create accessible. 2.5 Trust Management and Issues Protection is a precondition for online self-divulgence, yet self-revelation additionally diminishes privacy by expanding the measure of online data accessible to different clients; the connections between these builds appear to be suffering from critical variables, for instance , trust and control [5]. Trust is characterized because the conviction that folks , gatherings, or establishments are often trusted. It frequently has an opposing association with protection, if in light of the very fact that individuals got to know data about others keeping in mind the top goal to trust them, which thusly features a beneficial outcome on online self- exposure. Then again, the advancement of trust in a web domain is unpredictable on the grounds that the web world is characterized as frail. This is the rationale a couple of studies have targeting the inclination of people to unveil data on the premise of both trust and protection. An imperative build which will impact this amazing relationship is that the apparent control over data. For instance, word check, things constructed particularly, and ready raters are regularly wont to quantify online self-divulgence, and adjustments of instruments assembled for up close and private correspondence are utilized to assess online trust. 2.6 Privacy Setup on Social Networking Sites Late research has investigated the connection between the web revelation of individual data and privacy concerns and therefore the high hazard identified with online ruptures of protection. It was also well suggested that privacy may be a term that's hard to characterize; legitimately, it alludes to at least one side to be to not
  • 6. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021) ISSN(Online): 2581-7280 VIVA Institute of Technology 9th National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021) 6 mention, yet it can likewise incorporate the privilege to settle on the degree to which individual data is revealed, the privilege to focus at the purpose when, how, and what data are often imparted to others. Finding that one's own particular private data has been scattered internet, including humiliating photographs or features that are recovered through phishing tricks or deficient protection limitations, speaks to a genuine mental danger. On Facebook, the setting is liquid and flimsy, III. CONCLUSION It has been observed that privacy concerns are very feeble within the social networking sites and therefore the users endeavors to form the acceptable changes on their social media privacy is substantially less than other mode of security operations. Besides, many of the social media users have the dearth of technical makeovers and thus yield the low privacy concerns to their own content. In the statistics taken, we had identified many of the shortcomings and hiccups on the technical side of privacy and security measures are on the social media sites. Hence, we had given the possible root explanation for the glitches and proposed the changes to need over for the privacy concerns of social networking site. If we might choose enforcing a group of well defined policies for social media, like, a robust password, awareness of adjusting password often, awareness of data disclosure, purpose of antivirus or related software, and proprietary software etc., we might secure the social networks from further attacks and vulnerabilities. Acknowledgements I am thankful to my college for giving me this opportunity to make this project a success. I give my special thanks and sincere gratitude towards Prof. krutika vartak for encouraging me to complete this research paper, guiding me and helping me through all the obstacles in theresearch. Withoutherassistance,myresearchpaperwouldhavebeenimpossible.Also,Ipresentmyobligationtowards allourpastyearsteacherswhohavebestoweddeepunderstandingandknowledgeinus,overthepastyears.We areobligedtoourparentsandfamilymemberswhoalwayssupportedmegreatlyandencouragedmeineachand every step. REFERENCES [1] Joshana Shibchurn, XiangbinYan.Information disclosure on social networking sites: An intrinsic – extrinsic motivation perspective. Computers in Human Behavior. 2015;44:103-117. [2] Yan Li, Yingjiu Li, Qiang Yan, Robert H. Deng, Privacy leakage analysis in online social Networks, Computers and Security, Mar 2015; 49(c):239-254. [3] PatrickVanEecke,MaartenTruyens,Privacyandsocialnetworks,ComputerLaw&SecurityReview;2010;26(5):535-546. [4] Benson Vladlena, George Saridakis, HemamaliTennakoon, Jean Noel Ezingeard, The role of security notices and online consumer behaviour:Anempiricalstudyofsocialnetworkingusers,InternationalJournalofHumanComputerStudies;Aug2015;80:36-44. [5] Yuan Li.Theories in online information privacy research: A critical review and an integrated framework, Decision Support System. June 2012;54(1):471-481. [6] Nader YahyaAlkeinay, Norita Md. Norwawi. User Oriented Privacy Model for Social Networks. International Conference on Innovation, Management and Technology Research, Malaysia; 22 – 23 September, 2013;191-197. [7] Gail-JoonAhn, Mohamed Shehab, Anna Squicciarini. Security and Privacy in Social Networks. IEEE Internet Computing; 2011; 15(3): 10- 12. [8] PaulLowry,JinweiCao,AndreaEverard.PrivacyConcernsversusDesireforInterpersonalAwarenessinDrivingtheUseofSelf-Disclosure Technologies:TheCaseofInstantMessaginginTwoCultures.JournalofManagementInformationSystems;2011;27(4):163-200. [9] Carl Timm, Richard Perez. Seven Deadliest Social Network Attacks. Syngress Publishing;2010. [10] Basilisa Mvungi, Mizuho Iwaihara. Associations between privacy, risk awareness, and interactive motivations of social networking service users,andmotivationpredictionfromobservablefeatures.ComputersinHumanBehavior,Dec2014;4(c):20-34.