Vajad kellegagi rääkida?
Küsi julgelt abi LasteAbi
Logi sisse

Social media information and data collection and security (0)

1 Hindamata
Punktid

Lõik failist

New Media Economy

Social media information and data collection and security

In this brief essay , i would like to focus on the social media platforms in our moren society. How people use them , what kind of information we give away , what companies will do with this. Information sharing and data protection has become very popular theme in the recent few years . People care more about their privacy and avoid „big brother “ foreshadowing. It is important to know what social media platforms promise and are they really going to keep it. Users should think about what they share and what kind of information they generate . Because it is all recorded and some info can be traced back to real people. Privacy and data protecion topics are becoming more and more important and the amouts of data generated is becoming larger. When wrongly access this kind of data, a lot damage could be done by criminals. Users privacy settings should be reviewd and fixed when needed.
Social media
Humans have always felt the need to socialize. Constantly. From the early ages to the signs and speech , from letters to telegram, from phones to internet , need to communicate has become less of an hussle and more convenient and accessible.
In our modern society social media usage is constantly rising. For example since January 2016 to January 2017 active social media users have increased by 21% and internet users have increased by 10%. Our every day life is internet connection , sharing information, expressing ideas , liking and disliking content. It helps us to feel connected to the world and mostly provides to information we need, or
Vasakule Paremale
Social media information and data collection and security #1 Social media information and data collection and security #2 Social media information and data collection and security #3 Social media information and data collection and security #4 Social media information and data collection and security #5 Social media information and data collection and security #6 Social media information and data collection and security #7 Social media information and data collection and security #8
Punktid 50 punkti Autor soovib selle materjali allalaadimise eest saada 50 punkti.
Leheküljed ~ 8 lehte Lehekülgede arv dokumendis
Aeg2017-11-11 Kuupäev, millal dokument üles laeti
Allalaadimisi 2 laadimist Kokku alla laetud
Kommentaarid 0 arvamust Teiste kasutajate poolt lisatud kommentaarid
Autor jobuhunnik Õppematerjali autor
Sotsiaalmeedia platvormid. Nende turvalisus ja millist informatsiooni on võimalik koguda

Kasutatud allikad

Sarnased õppematerjalid

thumbnail
9
docx

Big data in cloud

e w e r a o f b i g d a t a . P ii s Big a v data a l in t C o clou o l d I T opportu I 0 Academic essay (ITI0103) 2019 spring Introduction “Data is Everything and Everyone is Data. “[1] The ability to collect, organize, structure and analyse data on a large scale is probably the most significant trait that sets us, humans, apart from our primate friends. [1] To comprehend the opportunities and threats regarding big data located within the cloud, one must first realize the essence of them. Big data is not only what its name says, but it is also so much more. What is Big data? Big data is a term, which is used to describe a broad spectrum of concepts: from the

Algoritmid ja andmestruktuurid
thumbnail
11
doc

Using Blogs as a Platform in the TEFL

.......................................................................................2 REFERENCES...................................................................................11 INTRODUCTION Due to the rapid expansion of technology over the past decade, hypermedia instructional programs have become commonplace. Learners of all ages have increased access to technology such as the World Wide Web, which provides a seemingly limitless amount of information. New technologies such as Mp3, podcasting, and social networking are booming. In contrast to more traditional environments, technology offers greater opportunities for interactivity and learner control. There are more educators and language teachers using the Internet in language teaching as well. Many computer applications, especially asynchronous computer-mediated communication such as email and electronic bulletin boards, promote interactive learning. With the booming growth of

Inglise keel
thumbnail
215
docx

Steve Krug-Dont Make Me Think 2014

Illustrations by Mark Matcho and Mimi Heft Farnham fonts provided by The Font Bureau, Inc. (www.fontbureau.com) Notice of Rights All rights reserved. No part of this book may be reproduced or transmitted in any form by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. For information on getting permission for reprints and excerpts, [email protected]. Notice of Liability The information in this book is distributed on an “As Is” basis, without warranty. While every precaution has been taken in the preparation of the book, neither the author nor Peachpit shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the instructions contained in this book or by the computer software and hardware products described in it. Trademarks It’s not rocket surgery™ is a trademark of Steve Krug.

Kategoriseerimata
thumbnail
140
pdf

Thesis Kivimaa August 2022

Thesis “How is it possible to calculate IT security effectiveness?” Kristjan Kivimaa August 2022 1 Abstract In IT Security world, there is lack of available, reliable systems for measuring security levels/posture. They lack the range of quantitative measurements and easy and fast deployment, and potentially affects companies of all sizes. Readily available security standards provide qualitative security levels, but not quantitative results – that would be easily comparable. This deficiency makes it hard for companies to evaluate their security posture accurately. Absence of security metrics makes it complicated for customers to select the appropriate measures for particular security level needed. The research question for this research project is – “How is it possible to calculate IT security effectiveness?”.

Infotehnoloogia
thumbnail
8
docx

Case Google

As a full-ledged portal, Yahoo! offered easy access to a board range of third-party content and related services, organized into "channels" such as Autos, Finance, Games, Health, Kids, Movies, Music, Shopping, Sports and Travels. Yahoo! is also known as the third largest online recruitment sites. Even though Yahoo! has many amazing examples, they still are loosing the shear of search. The difference between Yahoo! and Google is that Yahoo! is more like a portal and Google just collects all the information and post's it on its web page. Microsoft's vision of cloud computing repeatedly changed both in name and conception but, by 2010, plans were increasingly firm. Windows Azure let developers run applications on Microsoft-hosted platforms, while Microsoft Office 2010 was slated to include an "Office Web" version accessible through a web browser. Whereas most cloud-based applications were run in public clouds, Microsoft promised to let

Inglise keel
thumbnail
8
pdf

To what extent does the media influence foreign policy?

TALLINN UNIVERSITY School of Governance, Law and Society To what extent does the media influence foreign policy? Essay In Great Powers Foreign Policies and Relations TALLINN 2019 Media as a mass communication of today is playing a central role in creating and shaping public opinion and perceptions and also affecting society. Media is growing every day and influencing even more as the days go by. The word media is derived from the word medium. Singly the different media channels such as radio, TV, books, newspapers, magazines and mobile devices are called mediums, but as one, they are considered as media. (Cambridge Academic Content Dictionary, 2017) The media’s role in society depends on how society chooses to use media. In today’s world, the media has become a crucial thing for society,

Rahvusvahelised suhted
thumbnail
1
docx

Infotehnoloogiast ja suhtlusvõrgud

Are IT and communication technology bringing about more positive or negative changes? Dear audience, i want to tell you about the positive and negative sides of it and communication technology. Informational technology is most commonly used to talk about computers and computer networks but it also includes other information sorces such as television and telephones. Electronic computers began to appear in the early 1940's. The origins of the internet are from the 1960's. Over a third of the human's population have used the services of the internet. But what about the other two thirds? Is is better for them to have not been able to use this huge network, or is it a bad thing? The first biggest concerns are the communication sites because they are used

Inglise keel
thumbnail
2
docx

How the right of privacy was viewed in the 1890s and 2010s.

the privacy is the right to be let alone. This means, that a person is free to go and do what ever the person wants, no one has a right to harm him/her physically or mentally and vice versa. What ever the person decides to do, nobody else has the right to know about it without persons premission. Julie Cohen starts her essay with a point that privacy has the image problem. In the world where there is no mobile platforms, data mining social meedia, in simple words the internet, its easyer to leave the person alone, but what can we do in the world where is very difficult to be incognito because your every move is statistics and sometimes lawfully, somebodys elses bussines ?. Julie Cohen continues with describeing the new sight of the privacy. Compare to the year 1890 we are now facing new problems with privacy. The technology people use can store data. Data will contain information about transactions and behavioral data about people

Ajalugu




Kommentaarid (0)

Kommentaarid sellele materjalile puuduvad. Ole esimene ja kommenteeri



Sellel veebilehel kasutatakse küpsiseid. Kasutamist jätkates nõustute küpsiste ja veebilehe üldtingimustega Nõustun