The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
My Privacy My decision: Control of Photo Sharing on Online Social Networks
This document summarizes a research paper that proposes a facial recognition system to help users control photo sharing on social networks while protecting privacy. It discusses how photo sharing on social networks can unintentionally reveal private user information through tags, comments or metadata. The proposed system would recognize faces in photos and allow users to choose privacy settings during the photo posting process. It would also use private user photos to train the facial recognition model while preserving privacy through a distributed consensus method. The goal is to give users more awareness and control over how their photos are shared and help prevent unintended disclosure of personal information.
This document discusses the development of an Efficient Control of Virus Propagation (ECOVP) system using case-based reasoning and object-oriented methodology. It conducted a questionnaire survey that found many computer users in Malaysia lack awareness of computer viruses and there is a need for an effective system to guide users in handling virus incidents. The ECOVP system was developed to educate users and help control virus propagation by providing customized solutions based on the symptoms users describe. It was tested for accuracy and usability and found to successfully help users clean infected machines and prevent future infections.
The document summarizes a study that examined perceived risk and self-efficacy regarding internet security in a marginalized community. 44 participants were interviewed about their perceptions of risk and self-efficacy when using the internet. They were shown examples of safe and malicious websites. While participants were aware of security risks, they had low self-efficacy and saw themselves as vulnerable. They were introduced to PopJART security software but low self-efficacy and perceived barriers prevented adoption, even though they had confidence in its accuracy. The study found that increasing self-efficacy may be more important than communicating risk when designing security services for low-proficiency users.
This document summarizes research on how characteristics of social media profiles impact perceptions of source credibility. Specifically, it examines how the number of followers and the ratio of followers to follows on Twitter profiles affect judgments of trustworthiness, competence, and goodwill. The research aims to identify factors that influence how people evaluate the credibility of information from social media sources.
Components of a Model of Cybersecurity Behavior AdoptionCori Faklaris
Cori Faklaris presented a model for understanding the process of adopting or not adopting cybersecurity behaviors. Existing models focus on concepts like expectancy and value but do not account for time or how thinking evolves. Stage models break the process into chunks like stages of change. Faklaris proposes exploring whether there are two trajectories for adoption - mandatory behaviors imposed by authorities versus voluntary behaviors influenced more by peers. The goal is to specify stages to target security interventions more effectively and improve adoption of behaviors.
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET Journal
This document proposes a framework called PrivRank that enables privacy-preserving social recommendations. PrivRank aims to protect users' private data from inference attacks while still allowing personalized ranking-based recommendations. It does this by obfuscating users' public data before publishing it to third parties. This allows third parties to provide accurate recommendations without accessing sensitive private user information. The framework is designed to efficiently provide continuous privacy protection for users' data streams over time as new data is published.
My Privacy My decision: Control of Photo Sharing on Online Social NetworksIRJET Journal
This document summarizes a research paper that proposes a facial recognition system to help users control photo sharing on social networks while protecting privacy. It discusses how photo sharing on social networks can unintentionally reveal private user information through tags, comments or metadata. The proposed system would recognize faces in photos and allow users to choose privacy settings during the photo posting process. It would also use private user photos to train the facial recognition model while preserving privacy through a distributed consensus method. The goal is to give users more awareness and control over how their photos are shared and help prevent unintended disclosure of personal information.
An efficient control of virus propagationUltraUploader
This document discusses the development of an Efficient Control of Virus Propagation (ECOVP) system using case-based reasoning and object-oriented methodology. It conducted a questionnaire survey that found many computer users in Malaysia lack awareness of computer viruses and there is a need for an effective system to guide users in handling virus incidents. The ECOVP system was developed to educate users and help control virus propagation by providing customized solutions based on the symptoms users describe. It was tested for accuracy and usability and found to successfully help users clean infected machines and prevent future infections.
The document summarizes a study that examined perceived risk and self-efficacy regarding internet security in a marginalized community. 44 participants were interviewed about their perceptions of risk and self-efficacy when using the internet. They were shown examples of safe and malicious websites. While participants were aware of security risks, they had low self-efficacy and saw themselves as vulnerable. They were introduced to PopJART security software but low self-efficacy and perceived barriers prevented adoption, even though they had confidence in its accuracy. The study found that increasing self-efficacy may be more important than communicating risk when designing security services for low-proficiency users.
Social network has become so popular with overwhelming high rate of growth, due to this popularity the online social networks is facing the issues of spamming, which has leads to unsubstantial economic loss to this menace of spam and spammers activities. It has leads to uncontrollable dissemination of viruses and malwares, promotional ads, phishing, and scams. spam activities has enter a new dangerous dimension, the spammers have step up their games and tactics online social networks, it consumes large amounts of network bandwidth leading to less revenue and significant economic loss to both private and public sectors. From the previous scholars work on spammer classification taxonomy, various machine learning techniques have been extensively used to detect spam activities and spammers in online social networks. There are various classifier that are learn over content-based features extracted from the user's interactions and profiles to label them as spam/spammers or legitimate. But recently, new network structural bench mark features have been proposed for spammer detection task, but their importance using structural bench mark learning methods has not been extensively evaluated yet. In this research work, we evaluate the the metric performance of some structural bench mark learning methods using scientific and strategic approach based attributes extracted from an interaction network for the task of spammer detection in online social network.
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...AM Publications
Encounter-based social networks link users who share a location at the same time, as opposed to the traditional
social network model of linking users who have an offline friendship. Privacy is one of the friction points that emerge when
communications get mediated in Encounter-based Social Networks. Different communities of computer science researchers have
framed the ‘Online Social Network privacy problem’ as one of surveillance, institutional or social privacy. In this article, we first
provide an introduction to the surveillance, social and institutional privacy perspectives. We then explore the differences between
these approaches in order to understand their complementarity. In this paper, we explore the privacy requirements for Encounterbased
social networks. We provide an overview on the privacy guarantees and feasibility of SMILE and also its drawback in meeting certain requirements.
2010 Catalyst Conference - Trends in Social Network AnalysisMarc Smith
Review of trends related to social network analysis in the enterprise. Presented at the 2010 Catalyst Conference in San Diego, CA july 29, 2010. Presented with Mike Gotta, Gartner Group.
DESIGNING A CYBER-SECURITY CULTURE ASSESSMENT SURVEY TARGETING CRITICAL INFRA...IJNSA Journal
The paper at hand presents the design of a survey aiming at the cyber-security culture assessment of critical infrastructures during the COVID-19 crisis, when living reality was heavily disturbed and working conditions fundamentally affected. The survey is rooted in a security culture framework layered into two levels, organizational and individual, further analyzed into 10 different security dimensions consisted of 52 domains. An in-depth questionnaire building analysis is presented focusing on the aims, goals, and expected results. It concludes with the survey implementation approach while underlining the framework’s first application and its revealing insights during a global crisis.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
The mimetic virus A vector for cyberterrorismNicholas Ayres
The document discusses the potential for a "mimetic virus" to be used as a vector for cyberterrorism against the general public. It presents research involving a survey of 100 participants about their understanding and fear of cyberterrorism. The survey found that while participants had some knowledge of cyberterrorism, their fear of an attack was initially low. Participants were then shown a fabricated video claiming to depict a real computer virus that caused laptop batteries to explode. The data showed this increased participants' fear levels and likely to modify their future behaviors. The research suggests a mimetic virus could be an effective method for cyberterrorists to target and influence the general public, though the ability of such a virus to spread via social media is unclear.
Social Engineering-The Underpinning of Unauthorized AccessKory Edwards
This document discusses social engineering and how it enables unauthorized access. Social engineering relies on exploiting human tendencies rather than technical vulnerabilities. The document explores how Edward Snowden used social engineering to gain access to NSA systems by persuading coworkers to provide their credentials. It examines why information security programs fail to prevent social engineering, despite training, due to human factors like lack of motivation. Common social engineering attack types are discussed, including insider threats, external threats, and the tactics used like appealing to human tendencies like authority, scarcity, and liking. The document argues a new approach is needed that incorporates social intelligence concepts to make employees less susceptible to social engineering.
Cyber Threat to Public Safety CommunicationsKory Edwards
This document discusses cyber threats to public safety communications systems. It begins by describing how communications broke down for first responders during the 9/11 attacks due to overloaded cell networks and damaged radio systems. Since then, improvements have focused on redundancy and interoperability through increased connectivity, but this also introduces more vulnerabilities. The document outlines several cyberattacks against 911 call centers and public safety networks in recent years. It identifies the most attractive targets as the public's access to 911 and single points of failure in interconnected systems. The main security challenges are complacency about risks and limited budgets to address vulnerabilities.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Social Engineering Role in Compromising Information/Network SecurityOladotun Ojebode
This document discusses the role of social engineering in compromising network security. It defines social engineering as manipulating people to gain sensitive information rather than exploiting technical vulnerabilities. While organizations implement security controls, social engineering remains effective because it targets human weaknesses. The document examines why social engineering should be included in penetration testing and provides examples of common social engineering attacks like phishing, masquerading, and pretending to be in a position of authority. It argues that social engineering testing can improve security if conducted properly with employee engagement rather than blame.
IRJET- Design and Development of a System for Predicting Threats using Data S...IRJET Journal
This document discusses the design and development of a system to predict threats using data from social media platforms. It aims to use natural language processing, machine learning algorithms, and data analytics on social media data from platforms like Facebook, Twitter, and Google Trends to identify upcoming threats. The system would categorize data into categories like toxic, severe toxic, obscene, insult, threat, and identity hate to predict threat levels. It would analyze data from various sources in real-time and predict threat levels for different regions as low, moderate, or high based on the population. The methodology involves collecting, preprocessing, and analyzing social media data using algorithms like CNN and Word2Vec for classification and sentiment analysis.
Detecting fake news_with_weak_social_supervisionSuresh S
This document discusses using weak social supervision for detecting fake news on social media. It defines weak supervision and describes how social media data provides a new type of weak supervision called weak social supervision. Weak social supervision can be generated from three aspects of social media - users, posts, and networks. Recent works have shown that user-based, post-based, and network-based weak social supervision can be effective for fake news detection, even with limited labeled data. Weak social supervision is a promising approach for learning tasks where labeled data is scarce.
This document discusses the challenges that big data poses for cybersecurity. It notes that the volume, variety, and velocity of data has increased dramatically due to factors like the growth of the internet and consumer technology. This has led to unprecedented growth in cyber threats that security companies must address. The document argues that successfully protecting users requires efficiently processing big data to generate intelligence through techniques like specialized search algorithms, machine learning, and analyzing relationships in the data. It maintains that a combination of automated analysis and human insight is needed to understand the evolving threat landscape.
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
This document discusses privacy and security issues related to social media. It begins by introducing how social media has become integral to modern life but also presents privacy risks if users share personal information publicly. Some key privacy threats on social media mentioned include data breaches, passive attacks like unauthorized data collection, and active attacks trying to access other user accounts. The document then reviews literature around social media security and privacy concerns. It outlines common security risks like unmonitored accounts, human error, and vulnerabilities in third-party apps linked to social media profiles. Potential threats to social networks are categorized as data breaches, passive attacks, and active attacks. The document concludes that social networks pose significant security and privacy risks and all users should take steps to protect
Collusion-resistant multiparty data sharing in social networksIJECEIAES
The number of users on online social networks (OSNs) has grown tremendously over the past few years, with sites like Facebook amassing over a billion users. With the popularity of OSNs, the increase in privacy risk from the large volume of sensitive and private data is inevitable. While there are many features for access control for an individual user, most OSNs still need concrete mechanisms to preserve the privacy of data shared between multiple users. The proposed method uses metrics such as identity leakage (IL) and strength of interaction (SoI) to fine-tune the scenarios that use privacy risk and sharing loss to identify and resolve conflicts. In addition to conflict resolution, bot detection is also done to mitigate collusion attacks. The final decision to share the data item is then ascertained based on whether it passes the threshold condition for the above metrics.
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happened to the social networking websites due to trust that have been given by the users. Cyber threats are discussed in this paper. We study the types of cyber threats, classify them and give some suggestions to protect social networking websites of variety of attacks. Moreover, we gave some antithreats strategies with future trends.
IRJET- Secure Social Network using Text MiningIRJET Journal
This document proposes a secure social network that uses text mining techniques. It discusses authenticating users with Aadhar numbers to allow only one account per user. It aims to restrict improper words and vulgar images/videos by maintaining dictionaries of abusive terms and notifying users about tagged inappropriate content. The proposed system focuses on privacy, restricting multiple accounts and abusive content through authentication, keyword detection, and notification processes to make user profiles and posts more secure.
This document is a seminar report submitted by Supriya R to fulfill the requirements for a Master of Technology degree. The report discusses big data privacy issues in public social media. It provides an overview of big data and how the vast amounts of user-generated content uploaded to social media each day makes it difficult for individuals to be aware of everything that could impact their privacy. The report reviews literature related to location privacy and privacy issues on Facebook. It then analyzes threats to privacy from awareness of damaging media in big datasets and privacy policies of different services. Finally, it proposes surveying metadata from social media to help users stay informed about relevant privacy issues.
Social Media Datasets for Analysis and Modeling Drug Usageijtsrd
This paper based on the research carried out in the area of data mining depends for managing bulk amount of data with mining in social media on using composite applications for performing more sophisticated analysis. Enhancement of social media may address this need. The objective of this paper is to introduce such type of tool which used in social network to characterised Medicine Usage. This paper outlined a structured approach to analyse social media in order to capture emerging trends in medicine abuse by applying powerful methods like Machine Learning. This paper describes how to fetch important data for analysis from social network. Then big data techniques to extract useful content for analysis are discussed. Sindhu S. B | Dr. B. N Veerappa "Social Media Datasets for Analysis and Modeling Drug Usage" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25246.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/25246/social-media-datasets-for-analysis-and-modeling-drug-usage/sindhu-s-b
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGIRJET Journal
This document discusses the development of a cyberharassment detection system to identify abusive content on social media platforms. It reviews related works that have used machine learning techniques like convolutional neural networks and transfer learning models to detect cyberbullying. The authors investigate four neural network optimizers - Rmsprop, Adam, Adadelta, and Adagrad - and find that Rmsprop achieved the highest accuracy of 98.45% at classifying harassing content. The goal of this research is to create an effective model for automatically detecting cyberharassment online.
Terrorism Analysis through Social Media using Data MiningIRJET Journal
This document presents a study that uses deep learning models like Deep Neural Networks (DNN) and Convolutional Neural Networks (CNN) to analyze terrorism through detecting toxicity in social media text data. The study aims to classify text data into categories like toxicity, severe toxicity, obscenity, threat, insult or identity hate. It provides an overview of DNN and CNN models for text classification and compares their methodology, architecture and performance. The models are trained on preprocessed social media data related to terrorist activities and aim to accurately predict the toxicity level and classify tweets for concerned authorities to make informed decisions.
A Privacy-Preserving Deep Learning Framework for CNN-Based Fake Face DetectionIRJET Journal
This document presents a research paper that proposes a privacy-preserving deep learning framework for CNN-based fake face detection. The framework aims to develop a robust CNN model to accurately detect fake faces in images and videos while preserving user privacy. The researchers train their CNN model on a dataset of authentic and synthetic facial images representing techniques like deepfakes, morphing, and facial reenactment. Their evaluation shows the CNN model achieves state-of-the-art performance in fake face detection with 98% accuracy, addressing an important challenge while balancing detection capabilities with privacy concerns. The proposed approach could serve as a valuable tool for content verification, privacy protection, and ensuring trust in applications using digital media.
Detecting and Resolving Privacy Conflicts in Online Social NetworksIRJET Journal
This document discusses privacy issues with sharing data on online social networks. It proposes an approach to enable collaborative privacy management of shared data between multiple users. The key issues are that current social networks only allow individual users to control privacy of their own data, but not over data involving multiple users. The proposed approach aims to provide a system and mechanisms for managing privacy of data associated with groups of users on social networks in a collaborative way.
Security techniques for intelligent spam sensing and anomaly detection in onl...IJECEIAES
The recent advances in communication and mobile technologies made it easier to access and share information for most people worldwide. Among the most powerful information spreading platforms are the Online Social Networks (OSN)s that allow Internet-connected users to share different information such as instant messages, tweets, photos, and videos. Adding to that many governmental and private institutions use the OSNs such as Twitter for official announcements. Consequently, there is a tremendous need to provide the required level of security for OSN users. However, there are many challenges due to the different protocols and variety of mobile apps used to access OSNs. Therefore, traditional security techniques fail to provide the needed security and privacy, and more intelligence is required. Computational intelligence adds high-speed computation, fault tolerance, adaptability, and error resilience when used to ensure security in OSN apps. This research provides a comprehensive related work survey and investigates the application of artificial neural networks for intrusion detection systems and spam filtering for OSNs. In addition, we use the concept of social graphs and weighted cliques in the detection of suspicious behavior of certain online groups and to prevent further planned actions such as cyber/terrorist attacks before they happen.
Survey of data mining techniques for socialFiras Husseini
This document summarizes data mining techniques that have been used for social network analysis. It discusses how social networks generate massive amounts of data that present computational challenges due to their size, noise, and dynamism. It then reviews both traditional and recent unsupervised, semi-supervised, and supervised data mining techniques that have been applied to social network analysis to handle these challenges and discover useful knowledge from social network data, including graph theoretic techniques, tools for analyzing opinions and sentiment, and techniques for topic detection and tracking.
This document discusses the influence of social networks, particularly Facebook, on electronic business and customer online security. It begins by introducing social media marketing and how businesses use Facebook for e-marketing. It then analyzes how social media can be integrated into different stages of the business process model, including marketing, sales, and customer interaction. The document also examines privacy and security issues for customers, such as third party access to user data and attacks on public profiles. It concludes that while social media provides benefits for business, customers must be careful about sharing private information online and limiting third party access.
IRJET- Event Detection and Text Summary by Disaster WarningIRJET Journal
The document proposes two models: 1) The Hot Event Evolution (HEE) model which uses short text data and user interests to detect and track the evolution of hot events on social media. 2) The IncreSTS (Incremental Short Text Summarization) algorithm which can incrementally cluster and summarize comment streams on social networks. The HEE model improves on existing event detection methods by considering how user interests change during event evolution. The IncreSTS algorithm aims to help users understand comment streams in real-time without reading all comments. Both models were found to achieve high efficiency, accuracy and scalability.
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
This document discusses an automated model for detecting fake profiles and botnets in online social networks. It begins with background on the prevalence of fake accounts, which can compromise user privacy and security. Next, it reviews related work on using data hiding techniques like steganography and watermarking to embed information in profile pictures in order to identify suspicious accounts. The proposed model aims to automatically detect fake profiles and botnets to replace current manual methods that are costly and labor-intensive.
1) The document proposes an automated model to detect fake profiles and botnets on online social networks using steganography and watermarking techniques.
2) It describes embedding unique information like a user's email or username into profile pictures during upload using watermarking. This allows detecting stolen pictures used for fake profiles.
3) The model is extended to also search uploaded pictures against billions of online images to detect multiple uses of the same picture for different profiles, as watermarking alone may fail if the picture is edited. Detected users must then prove ownership rights to the picture.
Social Media have become a integral part of human life. With over 1 billion users connected through online network. Social media is an online platform where we can share our information like text, photos, thoughts, videos, messages and many people have started to share seminar, workshop in Education domain and online survey, marketing, and targeting customers in Business domain. There are various social media platforms like Facebook, Twitter, WhatsApp, Instagram etc. The main purpose of these sites is to allow people to share activities, interests, real life connections. Using social media we can communicate with the people in a world in a powerful and fun way. While enjoying on the social media platform it requires a great knowledge of privacy and security. The Internet is the safe place for only those people who are aware about the risk and the security, and can protect themselves from any fraud. Social media is a sometimes good because it allows you to share what actually we want to share, but it can also be used for negative purpose and in both the cases we are responsible for our security. In this paper we will describe about the privacy and security issues associated with social media. Rachana Khandagale | Manali Gamre "Privacy and Security on Social Media" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43821.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/43821/privacy-and-security-on-social-media/rachana-khandagale
This document discusses cybersecurity risks facing institutions and proposes countermeasures. It begins by explaining how the expansion of cyber space has increased cyber risks and how most countries have developed national cybersecurity strategies in response. However, it notes that institutions also need their own robust cybersecurity strategies to protect against modern cyber threats targeting both infrastructure and personnel.
The document then presents a case study analyzing how open source intelligence (OSINT) techniques using social media and other online sources can expose sensitive personal and institutional data. It demonstrates how cyber criminals could potentially gather usernames, email addresses, location data and other metadata about employees and systems.
Finally, it recommends several countermeasures institutions should take. These include educating employees about metadata risks, implementing
Transformation from Identity Stone Age to Digital IdentityIJNSA Journal
Technological conversion, political interests and Business drivers has triggered a means, to establish individual characterization and personalization. People started raising concerns on multiple identities managed across various zones and hence various solutions were designed. Technological advancement has brought various issues and concerns around Identity assurance, privacy and policy enabled common Authentication framework. A compressive framework is needed to established common identity model to address national needs like standards, regulation and laws, minimum risk, interoperability and to provide user with a consistent context or user experience.
This document focuses on Transformation path of identity stone age to Identity as in state. It defines a digital identity zone model (DIZM) to showcase the Global Identity defined across the ecosystem. Also, provide insight of emerging Technology trend to enable Identity assurance, privacy and policy enabled common Authentication framework.
Similar to Social media platform and Our right to privacy (20)
Understanding the Impact and Challenges of Corona Crisis on Education Sector...vivatechijri
n the second week of March 2020, governments of all states in a country suddenly declared
shutting down of all colleges and schools for a temporary period of time as an immediate measure to stop the
spread of pandemic that is of novel corona virus. As the days pass by almost close to a month with no certainty
when they will again reopen. Due to pandemic like this an alarm bells have started sounding in the field of
education where a huge impact can be seen on teaching and learning process as well as on the entire education
sector in turn. The pandemic disruption like this is actually gave time to educators of today to really think about
the sector. Through the present research article, the author is highlighting on the possible impact of
coronavirus on education sector with the future challenges for education sector with possible suggestions.
LEADERSHIP ONLY CAN LEAD THE ORGANIZATION TOWARDS IMPROVEMENT AND DEVELOPMENT vivatechijri
This document discusses the importance of leadership in leading an organization towards improvement and development. It states that leadership is responsible for providing a clear vision and strategy to successfully achieve that vision. Effective leadership can impact the success of an organization by controlling its direction and motivating employees. Leadership is different from traditional management in that it guides employees towards organizational goals through open communication and motivation, rather than simply directing work. The paper concludes that only leadership can lead an organization to change according to its evolving environment, while management may simply follow old rules. Leadership is key to adapting to new market needs and trends.
The topic of assignment is a critical problem in mathematics and is further explored in the real
physical world. We try to implement a replacement method during this paper to solve assignment problems with
algorithm and solution steps. By using new method and computing by existing two methods, we analyse a
numerical example, also we compare the optimal solutions between this new method and two current methods. A
standardized technique, simple to use to solve assignment problems, may be the proposed method
Structural and Morphological Studies of Nano Composite Polymer Gel Electroly...vivatechijri
The document summarizes research on a nano composite polymer gel electrolyte containing SiO2 nanoparticles. Key points:
1. Polyvinylidene fluoride-co-hexafluoropropylene polymer was used as the base polymer mixed with propylene carbonate, magnesium perchlorate, and SiO2 nanoparticles to synthesize the nano composite polymer gel electrolyte.
2. The electrolyte was characterized using XRD, SEM, and FTIR which confirmed the homogeneous dispersion of SiO2 nanoparticles and increased amorphous nature of the electrolyte, enhancing its ion conductivity.
3. XRD showed decreased crystallinity and disappearance of polymer peaks upon addition of SiO2. SEM revealed
Theoretical study of two dimensional Nano sheet for gas sensing applicationvivatechijri
This study is focus on various two dimensional material for sensing various gases with theoretical
view for new research in gas sensing application. In this paper we review various two dimensional sheet such as
Graphene, Boron Nitride nanosheet, Mxene and their application in sensing various gases present in the
atmosphere.
METHODS FOR DETECTION OF COMMON ADULTERANTS IN FOODvivatechijri
Food is essential forliving. Food adulteration deceives consumers and can endanger their health. The
purpose of this document is to list common food adulterant methods commonly found in India. An adulterant is
a substance found in other substances such as food, cosmetics, pharmaceuticals, fuels, or other chemicals that
compromise the safety or effectiveness of that substance. The addition of adulterants is called adulteration. The
most common reason for adulteration is the use of undeclared materials by manufacturers that are cheaper than
the correct and declared ones. The adulterants can be harmful or reduce the effectiveness of the product, or
they can be harmless.
The novel ideas of being a entrepreneur is a key for everyone to get in the hustle, but developing a
idea from core requires a systematic plan, time management, time investment and most importantly client
attention. The Time required for developing may vary from idea to idea and strength of the team. Leadership to
build a team and manage the same throughout the peak of development is the main quality. Innovations and
Techniques to qualify the huddles is another aspect of Business Development and client Retention.
Innovation for supporting prosperity has for quite some time been a focus on numerous orders, including PC science, brain research, and human-PC connection. In any case, the meaning of prosperity isn't continuously clear and this has suggestions for how we plan for and evaluate advances that intend to cultivate it. Here, we talk about current meanings of prosperity and how it relates with and now and then is a result of self-amazing quality. We at that point center around how innovations can uphold prosperity through encounters of self-amazing quality, finishing with conceivable future bearings.
An Alternative to Hard Drives in the Coming Future:DNA-BASED DATA STORAGEvivatechijri
Demand for data storage is growing exponentially, but the capacity of existing storage media is not keeping up, there emerges a requirement for a storage medium with high capacity, high storage density, and possibility to face up to extreme environmental conditions. According to a research in 2018, every minute Google conducted 3.88 million searches, other people posted 49,000 photos on Instagram, sent 159,362,760 e-mails, tweeted 473,000 times and watched 4.33 million videos on YouTube. In 2020 it estimated a creation of 1.7 megabytes of knowledge per second per person globally, which translates to about 418 zettabytes during a single year. The magnetic or optical data-storage systems that currently hold this volume of 0s and 1s typically cannot last for quite a century. Running data centres takes vast amounts of energy. In short, we are close to have a substantial data-storage problem which will only become more severe over time. Deoxyribonucleic acid (DNA) are often potentially used for these purposes because it isn't much different from the traditional method utilized in a computer. DNA’s information density is notable, 215 petabytes or 215 million gigabytes of data can be stored in just one gram of DNA. First we can encode all data at a molecular level and then store it in a medium that will last for a while and not become out-dated just like floppy disks. Due to the improved techniques for reading and writing DNA, a rapid increase is observed in the amount of possible data storage in DNA.
The usage of chatbots has increased tremendously since past few years. A conversational interface is an interface that the user can interact with by means of a conversation. The conversation can occur by speech but also by text input. When a chatty interface uses text, it is also described as a chatbot or a conversational medium. During this study, the user experience factors of these so called chatbots were investigated. The prime objective is “to spot the state of the art in chatbot usability and applied human-computer interaction methodologies, to research the way to assess chatbots usability". Two sorts of chatbots are formulated, one with and one without personalisation factors. the planning of this research may be a two-by-two factorial design. The independent variables are the two chatbots (unpersonalised versus personalised) and thus the speci?c task or goal the user are ready to do with the chatbot within the ?nancial ?eld (a simple versus a posh task). The results are that there was no noteworthy interaction effect between personalisation and task on the user experience of chatbots. A signi?cant di?erence was found between the two tasks with regard to the user experience of chatbots, however this variation wasn't because of personalisation.
The Smart glasses Technology of wearable computing aims to identify the computing devices into today’s world.(SGT) are wearable Computer glasses that is used to add the information alongside or what the wearer sees. They are also able to change their optical properties at runtime.(SGT) is used to be one of the modern computing devices that amalgamate the humans and machines with the help of information and communication technology. Smart glasses is mainly made up of an optical head-mounted display or embedded wireless glasses with transparent heads- up display or augmented reality (AR) overlay in it. In recent years, it is been used in the medical and gaming applications, and also in the education sector. This report basically focuses on smart glasses, one of the categories of wearable computing which is very popular presently in the media and expected to be a big market in the next coming years. It Evaluate the differences from smart glasses to other smart devices. It introduces many possible different applications from the different companies for the different types of audience and gives an overview of the different smart glasses which are available presently and will be available after the next few years.
Future Applications of Smart Iot Devicesvivatechijri
With the Internet of Things (IoT) bit by bit creating as the resulting time of the headway of the Internet, it gets critical to see the diverse expected zones for the utilization of IoT and the research challenges that are connected with these applications going from splendid savvy urban areas, to medical care administrations, shrewd farming, collaborations and retail. IoT is needed to attack into for all expectations and purposes for all pieces of our day-to-day life. Despite the fact that the current IoT enabling advancements have immensely improved in the continuous years, there are so far different issues that require attention. Since the IoT ideas results from heterogeneous advancements, many examination difficulties will arise. In like manner, IoT is planning for new components of exploration to be finished. This paper presents the progressing headway of IoT advancements and inspects future applications.
Cross Platform Development Using Fluttervivatechijri
Today the development of cross-platform mobile application has under the state of compromise. The developers are not willing to choose an alternative of either building the similar app many times for many operating systems or to accept a lowest common denominator and optimal solution that will going to trade the native speed, accuracy for portability. The Flutter is an open-source SDK for creating high-performance, high fidelity mobile apps for the development of iOS and Android. Few significant features of flutter are - Just-in-time compilation (JIT), Ahead- of-time compilation (AOT compilation) into a native (system-dependent) machine code so that the resulting binary file can execute natively. The Flutter’s hot reload functionality helps us to understand quickly and easily experiment, build UIs, add features, and fix bugs. Hot reload works by injecting updated source code files into the running Dart Virtual Machine (VM). With the help of Flutter, we believe that we would be having a solution that gives us the best of both worlds: hardware accelerated graphics and UI, powered by native ARM code, targeting both popular mobile operating systems.
The Internet, today, has become an important part of our lives. The World Wide Web that was once a small and inaccessible data storage service is now large and valuable. Current activities partially or completely integrated into the physical world can be made to a higher standard. All activities related to our daily life are mapped and linked to another business in the digital world. The world has seen great strides in the Internet and in 3D stereoscopic displays. The time has come to unite the two to bring a new level of experience to the users. 3D Internet is a concept that is yet to be used and requires browsers to be equipped with in-depth visualization and artificial intelligence. When this material is included, the Internet concept of material may become a reality discussed in this paper. In this paper we have discussed the features, possible setting methods, applications, and advantages and disadvantages of using the Internet. With this paper we aim to provide a clear view of 3D Internet and the potential benefits associated with this obviously cost the amount of investment needed to be used.
Recommender System (RS) has emerged as a significant research interest that aims to assist users to seek out items online by providing suggestions that closely match their interests. Recommender system, an information filtering technology employed in many items is presented in internet sites as per the interest of users, and is implemented in applications like movies, music, venue, books, research articles, tourism and social media normally. Recommender systems research is usually supported comparisons of predictive accuracy: the higher the evaluation scores, the higher the recommender. One amongst the leading approaches was the utilization of advice systems to proactively recommend scholarly papers to individual researchers. In today's world, time has more value and therefore the researchers haven't any much time to spend on trying to find the proper articles in line with their research domain. Recommender Systems are designed to suggest users the things that best fit the user needs and preferences. Recommender systems typically produce an inventory of recommendations in one among two ways -through collaborative or content-based filtering. Additionally, both the general public and also the non-public used descriptive metadata are used. The scope of the advice is therefore limited to variety of documents which are either publicly available or which are granted copyright permits. Recommendation systems (RS) support users and developers of varied computer and software systems to beat information overload, perform information discovery tasks and approximate computation, among others.
The study LiFi (Light Fidelity) demonstrates about how can we use this technology as a medium of communication similar to Wifi . This is the latest technology proposed by Harold Haas in 2011. It explains about the process of transmitting data with the help of illumination of an Led bulb and about its speed intensity to transmit data. Basically in this paper, author will discuss about the technology and also explain that how we can replace from WiFi to LiFi . WiFi generally used for wireless coverage within the buildings while LiFi is capable for high intensity wireless data coverage in limited areas with no obstacles .This research paper represents introduction of the Lifi technology,performance,modulation and challenges. This research paper can be used as a reference and knowledge to develop some of LiFitechnology.
THE USABILITY METRICS FOR USER EXPERIENCEvivatechijri
THE USABILITY METRICS FOR USER EXPERIENCE was innovatively created by Google engineers and it is ready for production in record time. The success of Google is to attributed the efficient search algorithm, and also to the underlying commodity hardware. As Google run number of application then Google’s goal became to build a vast storage network out of inexpensive commodity hardware. So Google create its own file system, named as THE USABILITY METRICS FOR USER EXPERIENCE that is GFS. THE USABILITY METRICS FOR USER EXPERIENCE is one of the largest file system in operation. Generally THE USABILITY METRICS FOR USER EXPERIENCE is a scalable distributed file system of large distributed data intensive apps. In the design phase of THE USABILITY METRICS FOR USER EXPERIENCE, in which the given stress includes component failures , files are huge and files are mutated by appending data. The entire file system is organized hierarchically in directories and identified by pathnames. The architecture comprises of multiple chunk servers, multiple clients and a single master. Files are divided into chunks, and that is the key design parameter. THE USABILITY METRICS FOR USER EXPERIENCE also uses leases and mutation order in their design to achieve atomicity and consistency. As of there fault tolerance, THE USABILITY METRICS FOR USER EXPERIENCE is highly available, replicas of chunk servers and master exists.
Google File System was innovatively created by Google engineers and it is ready for production in record time. The success of Google is to attributed the efficient search algorithm, and also to the underlying commodity hardware. As Google run number of application then Google’s goal became to build a vast storage network out of inexpensive commodity hardware. So Google create its own file system, named as Google File System that is GFS. Google File system is one of the largest file system in operation. Generally Google File System is a scalable distributed file system of large distributed data intensive apps. In the design phase of Google file system, in which the given stress includes component failures , files are huge and files are mutated by appending data. The entire file system is organized hierarchically in directories and identified by pathnames. The architecture comprises of multiple chunk servers, multiple clients and a single master. Files are divided into chunks, and that is the key design parameter. Google File System also uses leases and mutation order in their design to achieve atomicity and consistency. As of there fault tolerance, Google file system is highly available, replicas of chunk servers and master exists.
A Study of Tokenization of Real Estate Using Blockchain Technologyvivatechijri
Real estate is by far one of the most trusted investments that people have preferred, being a lucrative investment it provides a steady source of income in the form of lease and rents. Although there are numerous advantages, one of the key downsides of real estate investments is lack of liquidity. Thus, even though global real estate investments amount to about twice the size of investments in stock markets, the number of investors in the real estate market is significantly lower. Block chain technology has real potential in addressing the issues of liquidity and transparency, opening the market to even retail investors. Owing to the functionality and flexibility of creating Security Tokens, which are backed by real-world assets, real estate can be made liquid with the help of Special Purpose Vehicles. Tokens of ERC 777 standard, which represent fractional ownership of the real estate can be purchased by an investor and these tokens can also be listed on secondary exchanges. The robustness of Smart Contracts can enable the efficient transfer of tokens and seamless distribution of earnings amongst the investors. This work describes Ethereum blockchainbased solutions to make the existing Real Estate investment system much more efficient.
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
Cloudcomputingprovidesondemandservicestoitsclients.Datastorageisamongoneoftheprimaryservices providedbycloudcomputing.Cloudserviceproviderhoststhedataofdataownerontheirserverandusercan accesstheirdatafromtheseservers.Asdata,ownersandserversaredifferentidentities,theparadigmofdata storagebringsupmanysecuritychallenges.Anindependentmechanismisrequiredtomakesurethatdatais correctlyhostedintothecloudstorageserver.Inthispaper,wewilldiscussthedifferenttechniquesthatare usedforsecuredatastorageoncloud. Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for consumers. Cloud computing offers standardized applications to users online and in a manner that can be accessed regularly. Such applications can be accessed by as many persons as permitted within an organization without bothering about the maintenance of such application. The Cloud also provides a channel to design and deploy user applications including its storage space and database without bothering about the underlying operating system. The application can run without consideration for on premise infrastructure. Also, the Cloud makes massive storage available both for data and databases. Storage of data on the Cloud is one of the core activities in Cloud computing. Storage utilizes infrastructure spread across several geographical locations.
An Internet Protocol address (IP address) is a logical numeric address that is assigned to every single computer, printer, switch, router, tablets, smartphones or any other device that is part of a TCP/IP-based network.
Types of IP address-
Dynamic means "constantly changing “ .dynamic IP addresses aren't more powerful, but they can change.
Static means staying the same. Static. Stand. Stable. Yes, static IP addresses don't change.
Most IP addresses assigned today by Internet Service Providers are dynamic IP addresses. It's more cost effective for the ISP and you.
Development of Chatbot Using AI/ML Technologiesmaisnampibarel
The rapid advancements in artificial intelligence and natural language processing have significantly transformed human-computer interactions. This thesis presents the design, development, and evaluation of an intelligent chatbot capable of engaging in natural and meaningful conversations with users. The chatbot leverages state-of-the-art deep learning techniques, including transformer-based architectures, to understand and generate human-like responses.
Key contributions of this research include the implementation of a context- aware conversational model that can maintain coherent dialogue over extended interactions. The chatbot's performance is evaluated through both automated metrics and user studies, demonstrating its effectiveness in various applications such as customer service, mental health support, and educational assistance. Additionally, ethical considerations and potential biases in chatbot responses are examined to ensure the responsible deployment of this technology.
The findings of this thesis highlight the potential of intelligent chatbots to enhance user experience and provide valuable insights for future developments in conversational AI.
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...IJAEMSJORNAL
This study primarily aimed to determine the best practices of clothing businesses to use it as a foundation of strategic business advancements. Moreover, the frequency with which the business's best practices are tracked, which best practices are the most targeted of the apparel firms to be retained, and how does best practices can be used as strategic business advancement. The respondents of the study is the owners of clothing businesses in Talavera, Nueva Ecija. Data were collected and analyzed using a quantitative approach and utilizing a descriptive research design. Unveiling best practices of clothing businesses as a foundation for strategic business advancement through statistical analysis: frequency and percentage, and weighted means analyzing the data in terms of identifying the most to the least important performance indicators of the businesses among all of the variables. Based on the survey conducted on clothing businesses in Talavera, Nueva Ecija, several best practices emerge across different areas of business operations. These practices are categorized into three main sections, section one being the Business Profile and Legal Requirements, followed by the tracking of indicators in terms of Product, Place, Promotion, and Price, and Key Performance Indicators (KPIs) covering finance, marketing, production, technical, and distribution aspects. The research study delved into identifying the core best practices of clothing businesses, serving as a strategic guide for their advancement. Through meticulous analysis, several key findings emerged. Firstly, prioritizing product factors, such as maintaining optimal stock levels and maximizing customer satisfaction, was deemed essential for driving sales and fostering loyalty. Additionally, selecting the right store location was crucial for visibility and accessibility, directly impacting footfall and sales. Vigilance towards competitors and demographic shifts was highlighted as essential for maintaining relevance. Understanding the relationship between marketing spend and customer acquisition proved pivotal for optimizing budgets and achieving a higher ROI. Strategic analysis of profit margins across clothing items emerged as crucial for maximizing profitability and revenue. Creating a positive customer experience, investing in employee training, and implementing effective inventory management practices were also identified as critical success factors. In essence, these findings underscored the holistic approach needed for sustainable growth in the clothing business, emphasizing the importance of product management, marketing strategies, customer experience, and operational efficiency.
OCS Training Institute is pleased to co-operate with
a Global provider of Rig Inspection/Audits,
Commission-ing, Compliance & Acceptance as well as
& Engineering for Offshore Drilling Rigs, to deliver
Drilling Rig Inspec-tion Workshops (RIW) which
teaches the inspection & maintenance procedures
required to ensure equipment integrity. Candidates
learn to implement the relevant standards &
understand industry requirements so that they can
verify the condition of a rig’s equipment & improve
safety, thus reducing the number of accidents and
protecting the asset.
Online music portal management system project report.pdfKamal Acharya
The iMMS is a unique application that is synchronizing both user
experience and copyrights while providing services like online music
management, legal downloads, artists’ management. There are several
other applications available in the market that either provides some
specific services or large scale integrated solutions. Our product differs
from the rest in a way that we give more power to the users remaining
within the copyrights circle.
Software Engineering and Project Management - Introduction to Project ManagementPrakhyath Rai
Introduction to Project Management: Introduction, Project and Importance of Project Management, Contract Management, Activities Covered by Software Project Management, Plans, Methods and Methodologies, some ways of categorizing Software Projects, Stakeholders, Setting Objectives, Business Case, Project Success and Failure, Management and Management Control, Project Management life cycle, Traditional versus Modern Project Management Practices.
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionBert Blevins
Cybersecurity breaches are a growing threat in today’s interconnected digital landscape, affecting individuals, businesses, and governments alike. These breaches compromise sensitive information and erode trust in online services and systems. Understanding the causes, consequences, and prevention strategies of cybersecurity breaches is crucial to protect against these pervasive risks.
Cybersecurity breaches refer to unauthorized access, manipulation, or destruction of digital information or systems. They can occur through various means such as malware, phishing attacks, insider threats, and vulnerabilities in software or hardware. Once a breach happens, cybercriminals can exploit the compromised data for financial gain, espionage, or sabotage. Causes of breaches include software and hardware vulnerabilities, phishing attacks, insider threats, weak passwords, and a lack of security awareness.
The consequences of cybersecurity breaches are severe. Financial loss is a significant impact, as organizations face theft of funds, legal fees, and repair costs. Breaches also damage reputations, leading to a loss of trust among customers, partners, and stakeholders. Regulatory penalties are another consequence, with hefty fines imposed for non-compliance with data protection regulations. Intellectual property theft undermines innovation and competitiveness, while disruptions of critical services like healthcare and utilities impact public safety and well-being.
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Social media platform and Our right to privacy
1. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
1
Social media platform and Our right to privacy
HardadeAkash Dattatray1
, Prof. Krutika Vartak2
1
(Department of MCA, Viva School Of MCA/ University of Mumbai, India)
2
(Department of MCA, Viva School Of MCA/ University of Mumbai, India)
Abstract—The advancement of Information Technology has hastened the ability to disseminate information across
the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive
information being published on the World Wide Web. While such socially active websites are creative tools for
expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be
termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The
purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the
Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most
appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the
competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
Keywords— Information, Right for privacy, Social Media, Social Networking, user experience.
2. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
2
I. INTRODUCTION
In the larger context of knowledge mining, a substantial measure of productive analyzing so on learn
are often found advanced records of human conduct in interpersonal organizations without breaching the
users’ privacy. Thus, information need to be made accessible during a manner that privacy should be
safeguarded and protection is extremely scrutinized. On the opposite hand, the suspicion that any outsider
which is intrigued to interrupt down information are often viewed as reliable is truth be told unlikely, due to
the key point of preference that the usage of all information, including recognizing and delicate ones, may
provide for these gatherings. Thanks to the precise instance of interpersonal organizations, the foremost
grounded measure which will be received is to form unflinching quality of individual’s privacy who
expresses the affiliation.
According to the authors, who had proposed that any kind of examination about the amount of inhabitants in
clients who express inclinations, therefore defusing protection dangers also as vital investigation. The
proposition remains to stay connection able to the interpersonal organization profiles of their users, however
to allow clients to partner some guaranteed property estimations with their credentials, by picking whenever
they express credits that require to uncover. within the sideline perspective of the privacy domain , the topic
ofprivacy has been under scrutiny and ensuring the essential importance given by the actual academic
grouphas deemed to be vigilant. to make sure privacy of clients by recognizing characteristics, not by
vulnerability
based anonymization. Thus, despite the very fact that from an only specialized viewpoint our answer is closer
to privacy than protection within the end of the day , individual information of clients is ensured.
II. METHODOLOGY
The sole objective of the study is to attach the quantitative system with a selected end goal to
spuriously investigate the social information of the potential users and acquire the much needed details like
demographic data, temporal data, user profile etc., of the respondents. to reinforce this process, we had taken
a survey system which will be thoroughly utilized and disseminated to over quite 200 social media users and
therefore the populace are going to be dictated by the non–probability testing strategy. Spiral testing and
respondent-driven examining have additionally permits analysts to form gauges about the interpersonal
organization joining the shrouded populace to solicit them on the protection from the present social network
communities. Hence, this comprehensive study has focused more on privacy concerns hinges on the social
networks and jolt out the privacy breaches effectively. We had identified a number of the privacy concerns
that the social users can undertake before they uses the social sites and embed their privacy setting on the
location to stop any breach of violation.
2.1 Predicting the behavior of social media users
This study goes for locating the privacy and privacy in social network sites locales recognition among Social
Media clients [6]. A specimen of 250 understudies was chosen haphazardly from distinctive piece of the
planet . A net of 185 polls were filled effectively and returned. Almost 78% of the respondents were males,
while about 22% of them were females .On the opposite hand, roughly 72 of respondents were within the age
bunch 20-35 years aged . Be that because it may, the number of respondents within the age gatherings
"between 28-41 practically got 19% where different gatherings 50 or more is true around zero. Instructive
level played a high effect after 58% are four year certification and graduate degrees are 21%. The years of
utilizing Internet believe the commonality of interpersonal organization on the grounds that from those are
utilizing the online for over 10 years are 56% and within the event that we connect the utilization wit h nature
3. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
3
of SN it indicates 51 you take care of decently recognizable and 49% for very documented . but 90% of this
study populace is utilizing Facebook and 36 % utilizing Islam Tag and 62% twitter so this is often leeway for
us to believe Facebook protection model.
2.2 Privacy Glitches and Concerns
As it was illustrated in Table 1 that when getting some information about privacy and the way well
they're mindful of protection and terms of conditions, 52% are modestly familiar with the weather and
redesigns in Social Media protection which was demonstrated that they're familiar with the protection when
87% confine get to some surely part in their profile. Be that because it may [2], within the matter of adjusting
protection 43% change their privacy setting every so often which means just if anything happened and 47%
once during a while change their protection setting and therefore the same goes for privacy and record
setting.
In the Table 1 below, we had identified the various privacy mechanisms that the social media site offered to
the users to line in and have interaction within the privacy concerned activities. There would be a good range
of discrimination persists within the social media sets in offering the privacy policies to the users and from
the survey taken, it's largely been noted that a lot of the users of social media site has not concern more on
their privacy settings and kept the privacy details intrinsically created
Table 1. Privacy concerns in Social Media site and its comparisons.
Privacy options Facebook Twitter LinkedIn Google+
Restrict the visibility of the
active users
Yes No No No
Set the control on how others
can find you
Yes Yes Yes No
Block the users for their photo
tag Yes No No Yes
Set login Alerts Yes No No Yes
Block Spam Users Yes Yes Yes Yes
Control who can message you Yes No Yes Yes
2.3 Various Possible Threats in Social Networking Sites
The security issues and privacy concerns are the main requirements of the social networking sites.
But there have been many deadliest attacks persists altogether these social networking sites and safeguarding
the potential users from these heinous attack have been the challenging task of the many social analyst and
developers. The essential security attacks are classified into three categories.
4. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
4
XPrivacy Breach - Find link between nodes and edges and possibly identify the relation between them.
xPassiveAttacks - this is often totally anonymous and undetectable.
xActive Attacks - Form the new nodes intrinsically and trying to attach to the linked nodes and gain the access to the
opposite nodes.
Table 3. illustrates the clear depictions of various attacks in social media sites and given the possible
solution to how to handle the attacks safely.
Major domain ofattacks Sub-attacks Solution to handle theattacks
Social Networking
Infrastructur
e attacks
TCPSYNFloodAttack,Sm
urfIPAttack, UDP Flood
Attack, Ping of death,
Tear Drop
-Use Anti-Virus and Anti-Malware Software.
MalwareAttacks Crime
ware,Spyware,Adware,Br
owser Hijackers,
Downloader, ToolBars
-Use of Anti-Virus.
-Do not go for unknown links, friends,
applications, email attachments etc.,
-
DisableCookies,Sessions,ActiveXifunknowno
r no counter-measuresavailable.
-Examinetheemailscarefully.
PhishingAttacks Deceptivephishing(emails
),Malware- based
phishing, Key loggers,
Search enginephishing
-Validate the source of the data.
- Beware of ads with offers
EvilTwinAttacks Socialengineeringattack -Careful about having friends andsharinginformation
-Authenticate the user profile and share the data
-Try to completely understand the policies of having
friends in the social networking sites
IdentityTheftAttacks Dumpsterdiving -Use complex passwords, avoid passwordre-usage.
-Shred your email or documents properly
Cyberbullying Cyber bullying -Donotacknowledgethemessagesthatareintended to
hurt orthreat.
-Save and Archive the messages as evidences
-Take all threats seriously
-Do not share personal information with all users
PhysicalAttacks Impersonation,Harassmen
tthrough messages
-Need a well-defined social networking policy.
-Background security and privacy checks -
Properly make use of privacy settings option
2.4 Privacy Setup on Social Networking Sites
Social network sites destinations work to strengthen privacy settings. Facebook and other long range social
communication destinations limit protection as a serious aspect of their default settings. It's essential for clients to
5. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
5
travel into their client settings to change their protection choices. These locales like Facebook give clients the choice
to not show individual data, for instance , conception date, email, phone number , and business status. For the
individuals who plan to incorporate this material, Facebook permit clients to limit access to their profile to only
permit the individuals who they acknowledge as "companions" to ascertain their profile. Be that because it may,
even this level of privacy can't keep one among those companions from sparing a photograph to their own PC and
posting it elsewhere. Be that because itmay, at the present less social media site clients have constrained their
profiles.
For example, allow us to take how the users to limit the profile visibility to others in several social media sites:
x Facebook: Facebook's privacy setting for brand spanking new users is about to Friends Only. to line this, visit
Settings Privacy Who can see your future post
x Twitter: Settings Security and privacy Privacy Tweet Privacy Protect my Tweets.
x LinkedIn: to vary this: Settings Account Helpful Links Edit your public profile.
x Google+: to vary this setting, type the name of a Circle within the "To" field below your post before you publish
it.
Facebook could plainly express that they might give no assurances with reference to the privacy of their
information, which if clients make their profiles open, all data contained therein could also be seen by
occupation questioners and faculty chairmen.
Keep in mind most long range informal communication destinations encourage to quit applications,
conceal companion rundown and shroud intrigues. However much of the info remains open as a matter in
fact it's crucial that each one long range interpersonal communication destinations clients limit access to
their profiles, not post data of unlawful or arrangement disregarding activities to their profiles, and be
wary of the info they create accessible.
2.5 Trust Management and Issues
Protection is a precondition for online self-divulgence, yet self-revelation additionally diminishes privacy by
expanding the measure of online data accessible to different clients; the connections between these builds
appear to be suffering from critical variables, for instance , trust and control [5]. Trust is characterized
because the conviction that folks , gatherings, or establishments are often trusted. It frequently has an
opposing association with protection, if in light of the very fact that individuals got to know data about others
keeping in mind the top goal to trust them, which thusly features a beneficial outcome on online self-
exposure.
Then again, the advancement of trust in a web domain is unpredictable on the grounds that the web world is
characterized as frail. This is the rationale a couple of studies have targeting the inclination of people to
unveil data on the premise of both trust and protection. An imperative build which will impact this amazing
relationship is that the apparent control over data. For instance, word check, things constructed particularly,
and ready raters are regularly wont to quantify online self-divulgence, and adjustments of instruments
assembled for up close and private correspondence are utilized to assess online trust.
2.6 Privacy Setup on Social Networking Sites
Late research has investigated the connection between the web revelation of individual data and privacy
concerns and therefore the high hazard identified with online ruptures of protection. It was also well
suggested
that privacy may be a term that's hard to characterize; legitimately, it alludes to at least one side to be to not
6. VIVA-Tech International Journal for Research and Innovation Volume 1, Issue 4 (2021)
ISSN(Online): 2581-7280
VIVA Institute of Technology
9th
National Conference on Role of Engineers in Nation Building – 2021 (NCRENB-2021)
6
mention, yet it can likewise incorporate the privilege to settle on the degree to which individual data is
revealed,
the privilege to focus at the purpose when, how, and what data are often imparted to others. Finding that one's
own particular private data has been scattered internet, including humiliating photographs or features that are
recovered through phishing tricks or deficient protection limitations, speaks to a genuine mental danger. On
Facebook, the setting is liquid and flimsy,
III. CONCLUSION
It has been observed that privacy concerns are very feeble within the social networking sites and therefore
the users endeavors to form the acceptable changes on their social media privacy is substantially less than
other mode of security operations. Besides, many of the social media users have the dearth of technical
makeovers and thus yield the low privacy concerns to their own content. In the statistics taken, we had
identified many of the shortcomings and hiccups on the technical side of privacy and security measures
are on the social media sites. Hence, we had given the possible root explanation for the glitches and
proposed the changes to need over for the privacy concerns of social networking site. If we might choose
enforcing a group of well defined policies for social media, like, a robust password, awareness of
adjusting password often, awareness of data disclosure, purpose of antivirus or related software, and
proprietary software etc., we might secure the social networks from further attacks and vulnerabilities.
Acknowledgements
I am thankful to my college for giving me this opportunity to make this project a success. I give my special thanks and sincere gratitude
towards Prof. krutika vartak for encouraging me to complete this research paper, guiding me and helping me through all the obstacles in
theresearch.
Withoutherassistance,myresearchpaperwouldhavebeenimpossible.Also,Ipresentmyobligationtowards
allourpastyearsteacherswhohavebestoweddeepunderstandingandknowledgeinus,overthepastyears.We
areobligedtoourparentsandfamilymemberswhoalwayssupportedmegreatlyandencouragedmeineachand every step.
REFERENCES
[1] Joshana Shibchurn, XiangbinYan.Information disclosure on social networking sites: An intrinsic – extrinsic motivation
perspective. Computers in Human Behavior. 2015;44:103-117.
[2] Yan Li, Yingjiu Li, Qiang Yan, Robert H. Deng, Privacy leakage analysis in online social Networks, Computers and Security, Mar
2015; 49(c):239-254.
[3] PatrickVanEecke,MaartenTruyens,Privacyandsocialnetworks,ComputerLaw&SecurityReview;2010;26(5):535-546.
[4] Benson Vladlena, George Saridakis, HemamaliTennakoon, Jean Noel Ezingeard, The role of security notices and online consumer
behaviour:Anempiricalstudyofsocialnetworkingusers,InternationalJournalofHumanComputerStudies;Aug2015;80:36-44.
[5] Yuan Li.Theories in online information privacy research: A critical review and an integrated framework, Decision Support
System. June 2012;54(1):471-481.
[6] Nader YahyaAlkeinay, Norita Md. Norwawi. User Oriented Privacy Model for Social Networks. International Conference on
Innovation, Management and Technology Research, Malaysia; 22 – 23 September, 2013;191-197.
[7] Gail-JoonAhn, Mohamed Shehab, Anna Squicciarini. Security and Privacy in Social Networks. IEEE Internet Computing; 2011;
15(3): 10- 12.
[8] PaulLowry,JinweiCao,AndreaEverard.PrivacyConcernsversusDesireforInterpersonalAwarenessinDrivingtheUseofSelf-Disclosure
Technologies:TheCaseofInstantMessaginginTwoCultures.JournalofManagementInformationSystems;2011;27(4):163-200.
[9] Carl Timm, Richard Perez. Seven Deadliest Social Network Attacks. Syngress Publishing;2010.
[10] Basilisa Mvungi, Mizuho Iwaihara. Associations between privacy, risk awareness, and interactive motivations of social
networking service users,andmotivationpredictionfromobservablefeatures.ComputersinHumanBehavior,Dec2014;4(c):20-34.