TMA 4 Presentation: Social Computing Privacy and Security

Get Adobe Flash player

facebook  digg  delicious  newsvine  reddit  simpy  spurl  yahoo
Favorite  Add to Favorites     Feature  Feature This!     Inappropriate  Inappropriate     Share  Share     playlist  Add to Playlist
  • Currently 0.00/5

Rating: 0.0/5 (0 vote cast)

Type of abuse

Computer and human interaction has evolved and reached new levels with the advent of social networks and social computing. This paper investigates challenges with social computing, particularly technical challenges around the collection and management of data, security and privacy and mobile social computing. The number of users of social computing systems has grown exponentially and managing all the data produced by all the users presents a monumental infrastructure challenge. Social computing organizations have deployed hundreds of thousands of servers to safely store and quickly retrieve data. Privacy and security manifest themselves in many different ways, a level of confidence in the organizations handling of private data is necessary to attract users. Organizations user privacy policy set the legal limits to what and organization intends and is allowed to do with a userís private info. Additionally an organization needs to protect the dataís confidentiality, availability and integrity from malicious hackers. Finally and organization needs to protect users from other users, mainly minor or vulnerable users from predators and bullies. Finally there is the challenge of mobile computing which introduces an extra dimension of physical space in addition to the time and content of all users data. With mobile computing users content is superimposed with time and space factors that draws a complete picture of a userís activities and the organization now needs to handle that extra dimension in all its system design, data management, and privacy challenges.

Added on Aug 4, 2013 by wchannaa
Video Details
Time: 12:04 | Views: 38400 | Comments: 0
  COMP648  Social  Computing  Privacy  Security 
  COMP648 - Advanced Topics in Human-Computer Interaction  
Video Responses (0)

Be the first to post a video response!

User Details
Share Details

Post Comments
Comment on this video:

Comments: (0)