PPT-DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks

Author : linda | Published Date : 2023-09-24

Sonia Jahid 1 Shirin Nilizadeh 2 Prateek Mittal 1 Nikita Borisov 1 Apu Kapadia 2 1 University of Illinois at UrbanaChampaign 2 Indiana University Bloomington

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "DECENT: A Decentralized Architecture for..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks: Transcript


Sonia Jahid 1 Shirin Nilizadeh 2 Prateek Mittal 1 Nikita Borisov 1 Apu Kapadia 2 1 University of Illinois at UrbanaChampaign 2 Indiana University Bloomington Presented by Sonia Jahid. edu Sonia Jahid University of Illinois at UrbanaChampaign sjahid2illinoisedu Prateek Mittal University of California Berkeley pmittaleecsberkeleyedu Nikita Borisov University of Illinois at UrbanaChampaign nikitaillinoisedu Apu Kapadia Indiana Univer Priyanka. . Agrawal. Abstract. Social Networks to keep in touch with friends, family and community. Newer Web 2.0 technologies encourage Social Networking. Security and privacy, market and technological factors to be considered while developing social networks.. Sonia . Jahid. 1. , . Shirin. . Nilizadeh. 2. , . Prateek. . Mittal. 1. , Nikita Borisov. 1. , . Apu. Kapadia. 2. 1. University of Illinois at Urbana-Champaign. 2. Indiana University Bloomington. Presented by: Sonia Jahid. Jordynn. , Justine, Aileen. Privacy on social networks. Thesis: Due to posting excess information on social networks one is able to access another’s private information.. Cyber stalking. How social networks invade our privacy. Sonia . Jahid. 1. , . Shirin. . Nilizadeh. 2. , . Prateek. . Mittal. 1. , Nikita Borisov. 1. , . Apu. Kapadia. 2. 1. University of Illinois at Urbana-Champaign. 2. Indiana University Bloomington. Presented by: Sonia Jahid. Sonia Jahid. Department of Computer Science. University of Illinois at Urbana-Champaign. March 10, . 2011. www.soniajahid.com. 2. Statistics. Privacy Issues. Research on Online Social Network security and privacy. Jordynn. , Justine, Aileen. Privacy on social networks. Thesis: Due to posting excess information on social networks one is able to access another’s private information.. Cyber stalking. How social networks invade our privacy. Claire Wallace. ESRI Dublin . November 2016. Why society? . Focus of research has been on happiness, satisfaction or wellbeing of individuals. But individuals live in societies so we need to understand the context of wellbeing . Xiaowei. Yang. References:. On the Leakage of Personally Identifiable Information Via Online Social Networks by . Balachander. Krishnamurthy and Craig E. Wills. Characterizing Privacy in Online Social Networks by . Sonia Jahid. Department of Computer Science. University of Illinois at Urbana-Champaign. March 10, . 2011. www.soniajahid.com. 2. Statistics. Privacy Issues. Research on Online Social Network security and privacy. . S. . Creese. , M. Goldsmith, J. Nurse, E. Phillips. 11. th. IEEE International Conference on Trust, Security and Privacy in Computing and Communications (. TrustCom. ), 2012,pp. 1124-1131. DOI: 10.1109/. Ralph Gross Alessandro Acquisti. Presenter: Chris Kelley. Outline. Motivation. Online Vs. Offline Networks. Online Social Networks - Privacy . Implications. Analysis. : The . Facebook.com. Patterns of information revelation and their privacy implications. Chapter 1. 1. Chapter. 1, . Community Detection and Mining in Social Media.  Lei Tang and Huan Liu, Morgan & Claypool, September, 2010. . Traditional Media. Broadcast Media: One-to-Many. Communication Media: One-to-One. Alessandro . Acquisti. Carnegie Mellon University. MONDAY. . Nov. 25. th. , Noon, Room . 110. W. . ashington. A. . rea. T. . rustworthy. C. . omputing. . H. . our. NSF . Stafford I . Room . 110, .

Download Document

Here is the link to download the presentation.
"DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents