Вы находитесь на странице: 1из 7

Privacy & Security in Social Media

Аssignmеnt 2

Submitted By:
Divyanshu Singhal
500052338
R134216050
B.Tech CSE-CSF (batch-2)
Q.1 Discuss how to design privacy enhancing solutions in HCI.
Q.2 Discuss Boundary regulation processes and Privacy paradoxes in HCI.

Boundary regulation- It locates the management of interpersonal disclosure within a


framework of optimization. With this frame, we are able to explore how participant group
regulation strategies most effectively produce a desired level of disclosure, and how this
desired level of disclosure is constructed in relation to the group, the context, and the
affordance of the site.
In our analysis, we first identify four motives for group boundary regulation through
MPM in social media. These are: privacy, identity, utility, and propriety, which are
explicated in depth. We then observe a range of tactics, both explicit and implicit,
employed by our interviewees to manage group boundaries in social media. The first
tactic is the simple creation of more than one profile on a social media site, to have
separate persona within a single site. The second tactic is the use of privacy settings to
present a single persona within a single site differently to multiple audiences. The third
tactic involves the segmentation of audiences between social media sites, or a systematic
limiting of access to certain persona based on contextual setting. We then place these
tactics on a continuum of boundary-regulating behaviors that can be addressed in both
design and policy.

The Privacy Paradox is an information privacy behavioral phenomenon wherein


individuals are aware that the personally identifiable information (PII) they disclose in an
online transaction may be compromised, yet disclose it nonetheless. One clarification that
has been given for this marvel is that the choice to unveil data online is educated by a
hazard/reward investigation, alluded to as Privacy Calculus. Be that as it may, the wide
security analytics system doesn't really give understanding into explicitly how an
individual evaluates either hazard or prize. We evaluate several behavioral factors in an
effort to assess whether and to what extent each informs or influences an individual’s risk
assessment when deciding whether to disclose or withhold their PII in a given online
transaction. Specifically, we report findings from a recent survey we administered,
examining factors included in three different behavioral models. Results from this survey
were analyzed using exploratory factor analysis, which provided insights as to the
salience of each variable online information behavior. Our results surfaced four variables
– perceived trustworthiness, perceived vulnerability, “cyber” self-efficacy, and perceived
controllability – that appear to be particularly salient in an individual’s decision to
withhold or disclose PII online.
Q.3 Discuss Network Analysis of Fake Accounts.
The use of social networks such as Facebook, Twitter, Google+, Instagram, and LinkedIn
is on the rise. Individuals and organizations use social networks to express their views,
advertise their products, and express future policies of their companies and organizations.
By expanding the use of social networks, malicious users seek to violate the privacy of
other users and abuse their names and credentials by creating fake accounts, which has
become a concern for users. Hence, social networks providers are trying to detect
malicious users and fake accounts in order to eliminate them from social networking
environments. Creating fake accounts in social networks causes more damage than any
other cybercrime.
Different approaches are proposed to find fake accounts based on attribute similarity,
similarity of friend networks, profile analysis for a time interval, and similarity of
attribute together with IP address.
Graph Analysis is used in many applications, such as displaying circuit diagrams to
detect SHAPE, image matching, and social network analysis . The networks' graph is
analyzed in order to solve most of the social network problems. Therefore, graph
similarity measures reduce the complexity of graph analysis problems by using different
technique.

Q.4 Discuss various forms of privacy.

There are many forms of privacy-


I. Defensive Privacy- It protects against transient financial loss resulting from
information collection or theft. This is the territory of phishers, conmen,
blackmailers, identity thieves, and organized crime. It could also be the purview of
governments that seize assets from people or businesses.
An important characteristic of defensive privacy is that any loss is ultimately
transitory. A phisher might temporarily access a victim's bank accounts, or an
identity thief might cause problems by taking out new credit in the victim's name,
or a government might confiscate a victim's assets. However, once a victim's
finances have been lost, and they've spent some time clearing the problem up, they
can then get back on their feet. The losses also might be recoverable — or if not, at
least insurable.

II. Human Rights Privacy- It protects against existential threats resulting from
information collection or theft. This is the territory of stalkers and other felonious
criminals as well as authoritarian governments and other persons intent on doing
damage to someone for personal for his or her beliefs or political views.
An important characteristic of human rights privacy is that violations usually result
in more long-lasting losses than was the case with defensive privacy. Most
obviously, authoritarian governments and hardline theocracies might imprison or
kill victims while criminals might murder them. However, political groups could
also ostracize or blacklist a victim.

III. Personal Privacy- It protects persons against observation and intrusion. Though
personal privacy has grown in power in America since the 1960s, it's still under
constant attack from the media, telemarketing interests, and the government.
Meanwhile, it's not an absolute across the globe: some cultures, such as those in
China and parts of Europe, actively preach against it — advocating that community
and sharing trump personal privacy.

IV. Contextual Privacy- It protects persons against unwanted intimacy. Failure to


defend contextual privacy can result in the loss of relationships with others. No
one presents the same persona in the office as they do when spending time with
their kids or even when meeting with other parents. They speak different
languages to each of these different "tribes", and their connection to each tribe
could be at risk if they mispoke by putting on the wrong persona or speaking the
wrong language at the wrong time. Worse, the harm from this sort of privacy
breach may also be increasing in the age of data mining, as bad actors can
increasingly put together information from different contexts and twist them into a
"complete" picture that simultaneously might be damning and completely false.

Q.5 What do you understand by Big Data. Discuss the 5 V’s of big data.
Big Data is a phrase used to mean a massive volume of both structured and unstructured
data that is so large it is difficult to process using traditional database and software
techniques. In most enterprise scenarios the volume of data is too big or it moves too fast
or it exceeds current processing capacity.
5 V’s of Big Data

I. Volume- defines the huge amount of data that is produced each day by companies,
for example. The generation of data is so large and complex that it can no longer
be saved or analyzed using conventional data processing methods.

II. Variety- refers to the diversity of data types and data sources. 80 percent of the
data in the world today is unstructured and at first glance does not show any
indication of relationships. Thanks to Big Data such algorithms, data is able to be
sorted in a structured manner and examined for relationships. Data does not
always comprise only conventional datasets, but also images, videos and speech
recordings.

III. Velocity- refers to the speed with which the data is generated, analyzed and
reprocessed. Today this is mostly possible within a fraction of a second, known as
real time.

IV. Validity- is the guarantee of the data quality or, alternatively, Veracity is the
authenticity and credibility of the data. Big Data involves working with all degrees
of quality, since the Volume factor usually results in a shortage of quality.

V. Value- denotes the added value for companies. Many companies have recently
established their own data platforms, filled their data pools and invested a lot of
money in infrastructure. It is now a question of generating business value from
their investments.

Q.6 Discuss Challenges, opportunities, and pitfalls in online social networks.


Social Media Challenges are-
i. Keeping in touch with customers- Social media is not just about posting and
then waiting for results. Social is about Social. It’s about discussing and debating
new ideas, looking for users to engage with and sharing feedback on your
product/service. Not to mention asking what prospects are looking for next and
what their desires are.
ii. Providing ROI with Social Media- Convince and Convert says that measuring
ROI was listed as one of the biggest social media challenges by almost 59% of
digital marketers in 2017. Turning followers into customers, making money and
making significant sales online is a frequent topic on the web.
iii. How to be different than your competitors- In a place where competition is
constantly breathing down your neck, it’s hard to be different and build your own
identity. There are millions of companies always explaining to their customers
how are they different from others.
iv. The constant decrease of organic reach- Facebook is growing like crazy each
month and reached more than 2.2B users by April 2018. With the unbelievable
amount of content produced on each social media channel, it’s hard for a brand to
keep all of their audiences engaged. Social media networks are becoming a Pay 2
Play instrument for brands to promote their products or services.
Social Media Opportunities are-
i. Use helpdesk software that ties your social media to your customer service efforts
ii. Create a secondary social account exclusively for real-time customer support
iii. Create a poll on Twitter for taking feedback or reviews
iv. Tap your employees to widen and multiply social media reach
v. Watch your competitors
vi. By using these paid services such as Facebook, Twitter, Pinterest, and even Reddit
you can create multiple touchpoints with your general audience. If they’re
reluctant to commit during the first contact (i.e., the first time they see your social
media post or ad), you can use these advertising tools to do some retargeting until
you turn them into paying customers.

Social Media Pitfalls are-


What adds to social media’s popularity is how it promotes the idea of sharing information
casually, through the use of surveys, memes, quizzes, posting pictures and graphics, or
sharing someone else’s posting. We’re falling prey to social media pitfalls in the
following ways:
i. Over-sharing- Even seemingly innocuous information found on social
networking sites, like mother’s maiden name or high school mascot, can be used
by criminals to gain access into your accounts, as these often serve as the answers
to popular password-reset questions.
ii. Passwords- What we see time and time again are poor password practices.
Consumers often reuse passwords across accounts, and social media is no
exception. If a password is compromised on any account, an attacker can reuse
that password and gain access to other accounts.
iii. Updates and Settings- Many users are accessing social media via mobile, but are
lax about installing the latest software updates for their devices, even though not
updating can lead to vulnerabilities that put users at risk.
iv. Trust- Since we know the people in our social media networks, whether in real
life or virtually, we tend to trust them, but this is one of the biggest social media
mistakes we make. This trust means users are receiving messages from friends
whose accounts have been compromised and clicking the received link, which
results in their own account being compromised.
v. Liking Everything- Many users also have a habit of liking and following many
pages, playing apps or games using social media, which means that those apps
have access to data in their account - even long after they have finished the game.
They never go into the apps and remove the access.

Вам также может понравиться