Secure Social Networking By Zackary Allred.  How can we improve the RAs’ ability to involve residents in dorm life?  Social Network sites are popular.

Slides:



Advertisements
Similar presentations
Library Website 2.0: Integrating Wiki Software to Enhance Content of the Library's Website Justin Robertson, MLIS, AHIP Judy Burnham, MLS, AHIP Jie Li,
Advertisements

Creating a Facebook User Profile. Some basics: All you need to create a facebook profile is an address You can only create one facebook profile.
Surveillance and Privacy on the Internet Presented by Jill Homes and Marion Barry.
1 On Protecting Private Information in Social Networks: A Proposal Bo Luo 1 and Dongwon Lee 2 1 The University of Kansas, 2 The Pennsylvania.
By: Chris Hayes. Facebook Today, Facebook is the most commonly used social networking site for people to connect with one another online. People of all.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Search Engines and Information Retrieval
Networked application programs Skills: none Concepts: networked versus stand-alone applications, client-server architecture, Web applications versus specialized.
Direct Congress Dan Skorupski Dan Vingo 3 December 2008.
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
8/29/2000Database Management -- Fall R. Larson Database Management: Introduction University of California, Berkeley School of Information Management.
8/28/2001Database Management -- Fall R. Larson Database Management: Introduction University of California, Berkeley School of Information Management.
Forensics Tools for Social Network Security Vishal Almeida, Andrew Karnbad, Palak Shah, & Steve Kim Project Description: We have focused on two primary.
By Kelvin Canela FACIAL RECOGNITION. Facebook Online social networking site. Launched on February 2004 and founded by Mark Zuckerberg, Eduardo Saverin,
Social Networking Sites  By:  Frank Wu  Lu Xie  Yuri Chung  Paige Borah.
A Comparsion of Databases and Data Warehouses Name: Liliana Livorová Subject: Distributed Data Processing.
Sql Server Advanced Features MIS 424 Professor Sandvig.
Section 13.1 Add a hit counter to a Web page Identify the limitations of hit counters Describe the information gathered by tracking systems Create a guest.
Auto Mania is a virtual simulation, which will allow you to experience purchasing, maintaining, and using a vehicle.
Web Based Applications
CPSC 203 Introduction to Computers T59 & T64 By Jie (Jeff) Gao.
1. Define the term ‘database’(2) A database is a large and continuously updated collection of stored data structured to allow the various applications.
Search Engines and Information Retrieval Chapter 1.
1 California State University, Fullerton Chapter 7 Information System Data Management.
Child Development The need for love and security The need for new experiences The need for praise and recognition The need for responsibility.
Wei-Li Liu. + Goal: a. Do research on the history of social networking b. Compare the features of some of the past popular social networking sites c.
PGP ENCRYPTION Prepared by Noel Kigaraba. Introduction This presentation explains the basic information about PGP encryption software. It discusses the.
Ad placed based on my visit to a page on Lulu.com.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
U.S. Department of Commerce Web Advisory Group Minding Your Own Business The Platform for Privacy Preferences Project.
Facebook is national security threat. A new list of rules announced Thursday aims to prevent soldiers and Defense Ministry employees from revealing classified.
Steven Carvellas Anirban Ghosh Pramod Vedantham Rahul Sheth Varun Sarwade.
Final project presentation by Alsharidah, Mosaed.
CSC350: Learning Management Systems COMSATS Institute of Information Technology (Virtual Campus)
Privacy Issues on The Internet. Login if you want everyone to see your private life * * * * *
Security and privacy concerns regard to Facebook and its applications COMS E6125 Web-enHanced Information Management (WHIM) Spring 2008 by Szu-Jui Wu sw2423.
IceBreaker Networking App User Testing. Product Overview Ice Breaker is a business app that helps facilitate face-to-face interactions at networking events.
Buzz WordsSocial NetworksLaptop ProgramNHS?Google $100 $200 $300 $400 $500.
ATLAS Grid Requirements A First Draft Rich Baker Brookhaven National Laboratory.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
 Social network sites (SNSs) are increasingly attracting the attention of academic and industry researchers intrigued by their affordances and reach.
Engage Learning with Technology ALICE JOHNSON JUNIOR HIGH SCHOOL LEADERSHIP OFFICERS’ TRAINING CORPS (LOTC)
Web 2.0: Making the Web Work for You, Illustrated Unit A: Research 2.0.
CPSC 203 Introduction to Computers T97 By Jie (Jeff) Gao.
Student Life Committee of the Faculty Senate Assessment of Implementation of Fall 2008 Residence Life Plan.
ThoughTree Branch out your thoughts
The World of Facebook By James O’Donnell. Background Facebook is a social networking website. Created by Mark Zuckerberg in More than 500 million.
WORDPRESS CAN DO AWESOME THINGS. 1. BUILD AN ONLINE STORE WITH WORDPRESS ONE OF THE MOST POPULAR WAYS TO MONETIZE YOUR SITE IS THROUGH WOOCOMMERCE. THIS.
Presented By: Nick Koziol ISC110.  Had 1.19 billion members as of October  Largest social networking site in the world  Mark Zuckerberg  Many databases.
What’s an HRIS? Any system that supports any aspect of the HR function Primary function: –Documenting the employment relation in all it’s complexity Basic.
 A collection of data organized in a way that allows:  Easy access  Easy retrieval of specific data  Easy use of the data.
YOUR TEEN AND SOCIAL MEDIA INFORMATION FOR PARENTS ON SOCIAL MEDIA, INCLUDING SAFETY TIPS AND HOW TO HELP YOUR YOUNG TEEN NAVIGATE THE ONLINE WORLD. A.
Page: 1 Enw / Name. Page: 2 Businesses use ICT to communicate with their employees in many different ways in particular to employees which work in remote.
COOKIES Gloria Soria Network Security COSC 356. What is a Cookie? A cookie is a piece of text that a Web Server can store on a user's hard disk. Cookies.
Nathan Perkins. Project Description  Social Network that showcases original multimedia such as digital music, videos and graphics.  Similar structure.
Who is this guy?. Born May 14, 1984, New York At high school he excelled in Classical Studies At university he was known for reciting lines from epic.
Online Data Storage Companies MY Docs Online. Comparison Name Personal Edition Enterprise Edition Transcription Edition Price $9.95 monthly rate $4.99.
1 Outsourcing the RAS April 19, Primary RAS Functions: Provide network connectivity When working from home When traveling via When working.
Where it is today and how it is used.
Best Practices Goals and Approach
Communies of the future
Presentation Two Using UCROO to build community among first year programming students Rebecca England, School of Engineering and Information Technology.
Your Teen and Social Media
Secure Social Networking By Zackary Allred
REVEAL Total cost: EUR EU contribution: EUR
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
Commercial Revolution
IAPP/TRUSTe Symposium Privacy, Security and Regulatory Compliance
Global Rangelands Phase II
Wordpress.
Presentation transcript:

Secure Social Networking By Zackary Allred

 How can we improve the RAs’ ability to involve residents in dorm life?  Social Network sites are popular with students. Facebook’s original user base was residents of Harvard University.  Perhaps creating a social network service would get some of the more introverted residents to participate more.  RAs could use this social information to plan activities that match their residents interests.

 Every user will have a personal page with as many the features common to social network sites as time will allow.  Every user will also belong to their dorm’s user-group.  Every dorm will have it’s own forum and, possibly, sub-forums for individual floors and wings.  The data on the users will be stored in a database, which can then be used to plan activities.

 My primary concern is that the residents information be safe and secure.  What setbacks Facebook has had have primarily been the result of the public losing faith that their information is secure (i.e. beacon).  Non-residents should not be allowed access to the site.  The information the RAs can retrieve should not personally identify an individual (for example the number of dorm residents who ski would be available, but not necessarily the individuals).  Privacy is a complex subject and deciding what is and is not acceptable may be difficult.