Secure Social Networking By Zackary Allred

Slides:



Advertisements
Similar presentations
Library Website 2.0: Integrating Wiki Software to Enhance Content of the Library's Website Justin Robertson, MLIS, AHIP Judy Burnham, MLS, AHIP Jie Li,
Advertisements

Creating a Facebook User Profile. Some basics: All you need to create a facebook profile is an address You can only create one facebook profile.
& Mark Zuckerberg. How it all began. Facemash, the predecessor to Facebook was created by Mark Zuckerberg on October 28, In contrast to what we.
By: Chris Hayes. Facebook Today, Facebook is the most commonly used social networking site for people to connect with one another online. People of all.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Search Engines and Information Retrieval
Direct Congress Dan Skorupski Dan Vingo 3 December 2008.
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
8/29/2000Database Management -- Fall R. Larson Database Management: Introduction University of California, Berkeley School of Information Management.
8/28/2001Database Management -- Fall R. Larson Database Management: Introduction University of California, Berkeley School of Information Management.
Forensics Tools for Social Network Security Vishal Almeida, Andrew Karnbad, Palak Shah, & Steve Kim Project Description: We have focused on two primary.
By Kelvin Canela FACIAL RECOGNITION. Facebook Online social networking site. Launched on February 2004 and founded by Mark Zuckerberg, Eduardo Saverin,
DISTRIBUTED DATABASE MANAGEMENT SYSTEM CHAPTER 07.
Social Networking Sites  By:  Frank Wu  Lu Xie  Yuri Chung  Paige Borah.
Database Design and Introduction to SQL
Jared Cinque Section 6.  Internet tracking is the process of following internet activity backwards from recipient to user through a special type of software.
Section 13.1 Add a hit counter to a Web page Identify the limitations of hit counters Describe the information gathered by tracking systems Create a guest.
“Social Networking Services: Tribute to Fashion or Vital Necessity?” Tchirkina Victoria.
1. Define the term ‘database’(2) A database is a large and continuously updated collection of stored data structured to allow the various applications.
Search Engines and Information Retrieval Chapter 1.
Facebook Tania Galíndez Olascoaga 1 e-Business. Agenda Social Networking Facebook ▫History ▫Facts Facebook structure ▫Profiles ▫Applications ▫Third-Party.
Ad placed based on my visit to a page on Lulu.com.
Intro To The Internet A Guide to Getting Started.
Secure Social Networking By Zackary Allred.  How can we improve the RAs’ ability to involve residents in dorm life?  Social Network sites are popular.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
Architectural Design Identifying system components and their interfaces.
Facebook is national security threat. A new list of rules announced Thursday aims to prevent soldiers and Defense Ministry employees from revealing classified.
Final project presentation by Alsharidah, Mosaed.
Privacy Issues on The Internet. Login if you want everyone to see your private life * * * * *
Security and privacy concerns regard to Facebook and its applications COMS E6125 Web-enHanced Information Management (WHIM) Spring 2008 by Szu-Jui Wu sw2423.
ATLAS Grid Requirements A First Draft Rich Baker Brookhaven National Laboratory.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
 Social network sites (SNSs) are increasingly attracting the attention of academic and industry researchers intrigued by their affordances and reach.
Engage Learning with Technology ALICE JOHNSON JUNIOR HIGH SCHOOL LEADERSHIP OFFICERS’ TRAINING CORPS (LOTC)
CPSC 203 Introduction to Computers T97 By Jie (Jeff) Gao.
Student Life Committee of the Faculty Senate Assessment of Implementation of Fall 2008 Residence Life Plan.
ThoughTree Branch out your thoughts
WORDPRESS CAN DO AWESOME THINGS. 1. BUILD AN ONLINE STORE WITH WORDPRESS ONE OF THE MOST POPULAR WAYS TO MONETIZE YOUR SITE IS THROUGH WOOCOMMERCE. THIS.
Basics of Databases and Information Retrieval1 Databases and Information Retrieval Lecture 1 Basics of Databases and Information Retrieval Instructor Mr.
What’s an HRIS? Any system that supports any aspect of the HR function Primary function: –Documenting the employment relation in all it’s complexity Basic.
 A collection of data organized in a way that allows:  Easy access  Easy retrieval of specific data  Easy use of the data.
YOUR TEEN AND SOCIAL MEDIA INFORMATION FOR PARENTS ON SOCIAL MEDIA, INCLUDING SAFETY TIPS AND HOW TO HELP YOUR YOUNG TEEN NAVIGATE THE ONLINE WORLD. A.
Page: 1 Enw / Name. Page: 2 Businesses use ICT to communicate with their employees in many different ways in particular to employees which work in remote.
COOKIES Gloria Soria Network Security COSC 356. What is a Cookie? A cookie is a piece of text that a Web Server can store on a user's hard disk. Cookies.
Online Data Storage Companies MY Docs Online. Comparison Name Personal Edition Enterprise Edition Transcription Edition Price $9.95 monthly rate $4.99.
Information Retrieval in Practice
Facebook privacy policy
Where it is today and how it is used.
Best Practices Goals and Approach
Communies of the future
Presentation Two Using UCROO to build community among first year programming students Rebecca England, School of Engineering and Information Technology.
INFORMATION TECHNOLOGY – INT211
Physical Database Design and Performance
Your Teen and Social Media
Multimedia Information Retrieval
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
“Eyes On You” What is one way that parents can use technology to find out where their children are? One way parents can use technology to find out where.
Keep Personal Belongings Stored Safely
Kerberos Kerberos is an authentication protocol for trusted hosts on untrusted networks.
Commercial Revolution
“MASTERED” This is my target statement for this block of work.
“MASTERING” This is my target statement for this block of work.
2University of Virginia
Login Page Requires three levels of authorization Group Name:
Mr Douglass Subject Leader ICT & Computing
JTLS International User Conference
Global Rangelands Phase II
Tools to make the process safer : secured filing
Wordpress.
Computer Applications Unit B
Presentation transcript:

Secure Social Networking By Zackary Allred Dorm Book Secure Social Networking By Zackary Allred

Dorm life How can we improve the RAs’ ability to involve residents in dorm life? Social Network sites are popular with students. Facebook’s original user base was residents of Harvard University. Perhaps creating a social network service would get some of the more introverted residents to participate more. RAs could use this social information to plan activities that match their residents interests.

Features Every user will have a personal page with as many the features common to social network sites as time will allow. Every user will also belong to their dorm’s user-group. Every dorm will have it’s own forum and, possibly, sub-forums for individual floors and wings. The data on the users will be stored in a database, which can then be used to plan activities.

Danger, Will Robinson! My primary concern is that the residents information be safe and secure. What setbacks Facebook has had have primarily been the result of the public losing faith that their information is secure (i.e. beacon). Non-residents should not be allowed access to the site. The information the RAs can retrieve should not personally identify an individual (for example the number of dorm residents who ski would be available, but not necessarily the individuals). Privacy is a complex subject and deciding what is and is not acceptable may be difficult.