PPT-1 Privacy in Social Networks:
Author : conchita-marotz | Published Date : 2015-12-08
Introduction 2 Social networks model social relationships by graph structures using vertices and edges Vertices model individual social actors in a network while
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "1 Privacy in Social Networks:" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
1 Privacy in Social Networks:: Transcript
Introduction 2 Social networks model social relationships by graph structures using vertices and edges Vertices model individual social actors in a network while edges model relationships between social actors. Definitions and concepts . How do they networks relate to health?. Case studies . Session outcomes . To outline the nature of social and community networks . To define the concepts of social support and social capital . Priyanka. . Agrawal. Abstract. Social Networks to keep in touch with friends, family and community. Newer Web 2.0 technologies encourage Social Networking. Security and privacy, market and technological factors to be considered while developing social networks.. Professor Peter Swire. Ohio State University. Privacy Working Group. April 25, 2012 . Overview. Linguistics: “network” and “association”. Social networks as platforms for association. Cyber conferences. Moving On from . Homelessness. Discussion:. Due to the heterogeneous sample, the variety of responses obtained showed there is . no . common . form . of social networks for all homeless people. . However, some common themes emerged. . Sonia Jahid. Department of Computer Science. University of Illinois at Urbana-Champaign. March 10, . 2011. www.soniajahid.com. 2. Statistics. Privacy Issues. Research on Online Social Network security and privacy. CS408-01 Final Paper Presentation. By: Christina Sulfaro . Privacy Lost . Privacy Lost: How Technology is Endangering Your Privacy. The author is David H. . Holtzman. Published in 2006. Book Overview . Mathias Klang . @. klangable. . klang@umb.edu. “A mans home is his castle”. William Pitt (1776) “The poorest man may in his cottage bid defiance to all the forces of the Crown. It may be frail—its roof may shake—the wind may blow through it—the storm may enter—the rain may enter—but the King of England cannot enter!” Indeed, the law even recognizes a certain zone of privacy around the home that we can reasonably expect to reserve for ourselves. That space, along with our house, is protected by the Fourth Amendment. Under the law, this area is known as the “curtilage.” To most of us, it is known as our yard.. Sonia Jahid. Department of Computer Science. University of Illinois at Urbana-Champaign. March 10, . 2011. www.soniajahid.com. 2. Statistics. Privacy Issues. Research on Online Social Network security and privacy. Imrul Kayes, Adriana Iamnitchi. Social Privacy Risks. 2. Why Does This Happen?. Inappropriate sharing and transferring of information . (Permissive) Default . privacy . settings . by OSN . provider. Because they can. Anthony Bonato. Ryerson University. 1. st. Symposium on Spatial Networks. Oxford University. 1. Friendship networks. network of on- and off-line friends form a large web of interconnected links. 2. Geometry of Social Networks. rights and obligations of individuals and organizations with respect to the collection, use, retention, disclosure, and destruction of personal information. .. This pertains to the . Privacy of Personal Information. Chapter 1. 1. Chapter. 1, . Community Detection and Mining in Social Media. Lei Tang and Huan Liu, Morgan & Claypool, September, 2010. . Traditional Media. Broadcast Media: One-to-Many. Communication Media: One-to-One. John M. Abowd. Cornell University . January 17, 2013. Acknowledgements and Disclaimer. This research uses data from the Census Bureau’s Longitudinal Employer-Household Dynamics (LEHD) Program, which was partially supported by the following grants: National Science Foundation (NSF) SES-9978093, SES-0339191 and ITR-0427889; National Institute on Aging AG018854; and grants from the Alfred P. Sloan . Sonia . Jahid. 1. , . Shirin. . Nilizadeh. 2. , . Prateek. . Mittal. 1. , Nikita Borisov. 1. , . Apu. Kapadia. 2. 1. University of Illinois at Urbana-Champaign. 2. Indiana University Bloomington. Presented by: Sonia Jahid.
Download Document
Here is the link to download the presentation.
"1 Privacy in Social Networks:"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents