PPT-“Social Networks, Privacy and Freedom of Association”

Author : tatiana-dople | Published Date : 2015-12-06

Professor Peter Swire Ohio State University Privacy Working Group April 25 2012 Overview Linguistics network and association Social networks as platforms for association

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "“Social Networks, Privacy and Freedom ..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

“Social Networks, Privacy and Freedom of Association”: Transcript


Professor Peter Swire Ohio State University Privacy Working Group April 25 2012 Overview Linguistics network and association Social networks as platforms for association Cyber conferences. Definitions and concepts . How do they networks relate to health?. Case studies . Session outcomes . To outline the nature of social and community networks . To define the concepts of social support and social capital . Priyanka. . Agrawal. Abstract. Social Networks to keep in touch with friends, family and community. Newer Web 2.0 technologies encourage Social Networking. Security and privacy, market and technological factors to be considered while developing social networks.. Facebook. Article by Simon . Garfinkel. Presentation by Adam Miller. The Constitution. There are no laws specifically stating the right to privacy. Amendments imply privacy rights. Third, Fourth, and Fifth Amendments (Restriction of soldiers being quartered in homes, unreasonable search and seizures, and being a witness against yourself, respectively). CS408-01 Final Paper Presentation. By: Christina Sulfaro . Privacy Lost . Privacy Lost: How Technology is Endangering Your Privacy. The author is David H. . Holtzman. Published in 2006. Book Overview . Xiaowei. Yang. References:. On the Leakage of Personally Identifiable Information Via Online Social Networks by . Balachander. Krishnamurthy and Craig E. Wills. Characterizing Privacy in Online Social Networks by . Mathias Klang . @. klangable. . klang@umb.edu. “A mans home is his castle”. William Pitt (1776) “The poorest man may in his cottage bid defiance to all the forces of the Crown. It may be frail—its roof may shake—the wind may blow through it—the storm may enter—the rain may enter—but the King of England cannot enter!” Indeed, the law even recognizes a certain zone of privacy around the home that we can reasonably expect to reserve for ourselves. That space, along with our house, is protected by the Fourth Amendment. Under the law, this area is known as the “curtilage.” To most of us, it is known as our yard.. Arvind Narayanan and Vitaly Shmatikov. The University of Texas at Austin. Presenter: Humam Nameer. Problem Facts:. - All of us here are . Target. in this domain. It directly effects us!!. - Events, location, occasions, pictures, video and even intentions are at public display. Sonia Jahid. Department of Computer Science. University of Illinois at Urbana-Champaign. March 10, . 2011. www.soniajahid.com. 2. Statistics. Privacy Issues. Research on Online Social Network security and privacy. . S. . Creese. , M. Goldsmith, J. Nurse, E. Phillips. 11. th. IEEE International Conference on Trust, Security and Privacy in Computing and Communications (. TrustCom. ), 2012,pp. 1124-1131. DOI: 10.1109/. Imrul Kayes, Adriana Iamnitchi. Social Privacy Risks. 2. Why Does This Happen?. Inappropriate sharing and transferring of information . (Permissive) Default . privacy . settings . by OSN . provider. Because they can. Steven Procopio, Ph.D.. PAR Policy Director. PAR is an independent voice, offering solutions to critical public issues in Louisiana through accurate, objective research and focusing public attention on those solutions.. information from the user o their computer unless the user decides to provide it directly Users can accept or deny the use of cookies however most browsers automatically accept cookies as they serve t Eduardo . Cuervo. Amre. . Shakimov. Context of this talk…. Do we sacrifice privacy by using various network services (Internet, online social networks, mobile phones)?. How does the structure/topology of a network affect its privacy properties?. John M. Abowd. Cornell University . January 17, 2013. Acknowledgements and Disclaimer. This research uses data from the Census Bureau’s Longitudinal Employer-Household Dynamics (LEHD) Program, which was partially supported by the following grants: National Science Foundation (NSF) SES-9978093, SES-0339191 and ITR-0427889; National Institute on Aging AG018854; and grants from the Alfred P. Sloan .

Download Document

Here is the link to download the presentation.
"“Social Networks, Privacy and Freedom of Association”"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents