You are on page 1of 27

FINAL LAB ASSIGNMENT

Social network and Communication Software Project

Created By

Sadia Afrin Antara

ID: CSE 06607662

Supervised By

Tarikuzzaman Emon

Assistant Professor of Department of Computer Science and


Engineering

Stamford University Bangladesh

1|Page
Index

CHAPTER PAGES

Introduction 3

Business Case 7

Project Management 8

Technical Specifications 12

Risk Management 19

Conclusion 27

2|Page
1.Introduction
Social networking in mobile application is social networking where individuals with similar interests
converse and connect with one another through their mobile phone and/or tablet. Much like web-based
social networking, mobile social networking occurs in virtual communities. A current trend for social
networking websites, such as Face book, is to create mobile apps to give their users instant and real-
time access from their device. In turn, native mobile social networks have been created .communities
which are built around mobile functionality. More and more, the line between mobile and web is being
blurred as mobile apps use existing social networks to create native communities and promote
discovery, and webbased social networks take advantage of mobile features and accessibility. Mobile
social networking sites allow users to create a profile, send and receive messages via phone or computer
and visit an on-line version of mobile site.

Aim & objective


The main aim of this social network is to give different online access and can be used by our country to
make communication and information sharing, chatting among the society of the country easily with
accusable and also this project is significant for application developer and other social network
developer to achieve the goal of improving the development of online information system in mobile
application in our country.

General objective

The overall object of this project is to develop social network in country for mobile application system.

Specific objective

Studying and analyzing the existing system. Identifying problems of the Existing System. Specifying
Functional and Non-Functional requirements of the new System. Analysis the proposed System. Design
the proposed System. Develop social network in chatting system for mobile application system for
upload text or image. Provide the solution how to communication with the friends creating their own
privileges and account. To enable users to store their data in a mobile application system way. To
enables user online communication in the chatting time. To minimize cost User can communicate easily
via our social network without wastage of their time.

Expected outcomes

The project will focus on the following activities. Develop the social network in chatting system for the
country to access the network. Provide the solution how to communication with the friends creating

3|Page
Introduction Aim & objective Expected outcomes3 | P a g e their own privileges and account. Help build
communication of people in the chatting. Understand how social network works in mobile application
system. This project is will involve all society in Wide area network .Information exchange in the mobile
application system.

Required resource for this project

Software tools Activity


Activities Eclipse Android studio Software to design the
proposed system editor .
Java for android Developed of the project area .programming
language.
MYSQL(SQULIT) Process data in relational database
embedded to database.
Microsoft office For the documentation and presentation
purpose.
Android devices To test the software we will develop.

E-Draw For UML Diagram

Hard ware tools

CD/RW ,Printer Computer: Intel(R) core(TM-3220 CPU @3.30 GHZ Processor and 2.00GB (1.88GB),
Usable installed memory or RAM, Connection cable.

Method

Our work takes inspiration from this manual process of finding pages that look the same. Specifically, we
automate some of what the human does to recognize duplication of an original page. To do this we
analyze a web page based on some of its structural characteristics and based on the way it looks visually.
Specifically, we record a number of page markup characteristics including the page title text and number
of links, images, forms, frames and metatags. Throughout the rest of this paper we will refer to this 5
tuple as a pages structural fingerprint. The image analysis portion of this work is at it’s simplest is done
by setting a fixed dimension and quality setting for rendering a page within a headless browser and then
taking a page screenshot. We computer hash of the resulting image and compare the hash values using
the Hamming Distance equation. This process takes on average 4 seconds a page including software

4|Page
build-up/tear-down time. To speed up the process further, we could prioritize image analysis for pages
that with matches in the most easily parsed/computed items from the pages markup.

Fig1: Phishing Detection Process Overview

Capture System Network Design:


We have built the following system to overcome the combination of rate limitations imposed by the
various social media networks as well as network session throttling imposed by carriers of residential
Internet service. This system is minimizes the number of outgoing connections by wrapping them in an
encrypted tunnel through the use of the TOR network. As a result, the IP and MAC address of the
requesting computer is hidden from the social media network providers which pro-vides research
anonymity.

5|Page
Fig2: TOR network

Project Feature

1. Privacy and Security

2. Integration of Other Social Media Platforms

3. Notification and News Feed

4. Customizable Individual Profiles

5. Post creation & interaction

6. Search

7. Chat

8. Push Notifications

6|Page
2. Business Case

Regulation can affect provider pofitability and ability to scale .

7|Page
3.Project Management

The project manager


It was necessary to change responsibilities of stakeholders in the project before adopting any
rule or method of communication. The project manager who played at the same time account
manager responsibilities began to be focused only on customer business aspects and project
manager functions were taken over by another person, a company employee who did not have
any liabilities on that client to put concerned project delivery due to other issues on the
agenda. This redefinition of roles it’s illustrated in Figure 3.

Figure 3 - Redefining project manager responsibilities

Project management adopted method


The implementation of the previous point was required to be able to proceed with the adoption of a
standard or method in project management. First was investigated the existence of any ISO standard on
project management. ISO 21500: 2012 was the choice because indicates how to create the best
practices in project management. After the study of the ISO and verify the similarities and differences

8|Page
with the PMBOK, with the latter having the definition of tools and techniques to use as opposed to the
ISO and this being the standard that is recommended by the company's PMO, it was decided to apply
the PMBOK in project management. With the project management standard defined a project kick-off
meeting was convened. Until this meeting never the various elements involved in the project, with a
year and a half of execution had been together in the same meeting room. The purpose of this meeting
was to clearly define the scope of the project, the role of each in the project, known limitations and
internally present the work plan to further communicate it to the customer and get a validation. In
addition to the information to be provided was intended that the various elements involved in the
project began to form a project team, as illustrated in Figure 8. The project team, in the implementation
phase, has in some moments up to 16 elements assigned. The project manager plays a key role in this
field, working as a facilitator for the various elements can perform the necessary work, communicate in
a timely and constructive manner the next steps related to the project plan and help create a sense of
belonging to the project.

Figure 4 - Project Team (TO-BE)

Implemented communication model


The communication model, the main objective of this work can only be achieved after the redefinition of
the role project manager and the adoption of a project management standard. The goal was to create a
support for an effective communication between the various elements of the project team and allow
access to relevant information anytime anywhere. It was necessary to define a communication plan and

9|Page
was followed PMBOK's Project Communication Management. [ This PMBOK knowledge area defines
three methods for implementing a communication management model, each consisting of inputs, tools
and techniques and outputs. Being the desired end result to have a more effective form of
communication between the various members of the team.

Manage Communications
With this process the concern was to ensure that the information stored in the repository were updated
as much as possible, and that the information sent to the client it was the only one he needed.

Control Communications
With this process it was possible to control the communication plan and at the same time carry out his
monitoring. Sending emails to the heads of each unit for decision making about the project decreased.
The number of documents produced in project increased.

Action Plan
OBJECTIVE 1 : Finalize the project budget and secure the resources and funds.

 Submit a budget plan to the finance manager.

 Identify suppliers of materials and equipment.

OBJECTIVE 2 : Successfully begin and finish the renovation project as scheduled.

 Notify the team about the project timeline.

 Brief the team members about the project’s 1st phase.

 Create a Gantt chart for checking the project's progress.

 Set reminders about the deadline.

Cost management

10 | P a g e
Figure 5: Cost management stage

Budget
Description Price Total

Planning 40,000$ 40,000$

Materials and Equipment 20,000$ 20,000$

Employee(8) 4000$ 32,000$

Total 92,000$

11 | P a g e
4.Technical Specifications

Data Flow Diagram

Fig6: Data flow diagram

12 | P a g e
Use case diagram

Login/Registration:

Fig 7: Login

13 | P a g e
Home page :

Fig 8: Homepage

14 | P a g e
Blog page:

Fig 9: Blog Page

Profile page:

Fig 10: Profile Page

Search friend page:

Fig 11: search friend page

Friend list page:

15 | P a g e
Fig 12: Friend list Page

Photo page:

Fig 13: photo page

16 | P a g e
Entity Relationship diagram

Fig 14: ERD

17 | P a g e
UML class diagram

Fig 15: UML class diagram

18 | P a g e
5.Risk Management
Social networks may be described as internet-based applications that allow users to create
profiles and share content easily with other users. A huge variety of these applications are
readily available and users can interact from a large range of devices, including mobile phones.
Many organisations have embraced Social Networking as a cost-effective and quick way to
engage their clients or promote their brand to new and existing markets.

As with other internet-based systems, there are a number of risks that should be fully managed
and understood before organisations adopt social networking too widely. A range of controls
will usually be required in order to balance these risks with the business needs.

This document is presented in an effort to describe some of the main risks in a non technical
way, to aid the debate within organisations around social networking. The risks detailed in the
table below are based on the assumption of relatively open access to social networking for staff
in a business environment.

Actual measures of risk are not given as these can vary between organisations and sectors. For
example, a bank may be more risk-averse than a marketing organisation. Similarly, risk
mitigation strategies are not discussed here as without an understanding of the exposure to a
risk it is difficult to generalise as to what would constitute an acceptable mitigation strategy.

Some of the risks described in the table below are associated with the behaviour of staff.
Governance must take into account technical capabilities and relative tendency of staff to
engage in risky behaviour on these sites. It may be easier to anticipate bad behaviour and
reputation damage so that these risks can be mitigated prior to adoption.

It should also be noted that some of the risks are not related to the actual technology used, or
to the security of information. For example, the risk of ‘loss of productivity’ or ‘time-wasting’ is
often cited as the primary reason why some organisations choose to block access to social
networking sites. Similarly, when it comes to the risk of ‘reputational damage’, the reaction to a
incident needs to be very carefully managed, usually with input from ‘communications’ or
‘public relations’ staff.

As social networking risks and benefits may be shared across different business units, it is
recommended that an organisational-wide strategy is developed which engages risk owners
and stakeholders.

19 | P a g e
It is also worth noting that some of the risks below are already established risks, for which some
mitigating actions may already be in place. An example might be the risks associated with ‘virus
infection’ or ‘malware’.

In reading the table below please bear in mind that these risks are being presented to help
stimulate informed debate around the issue of social networking, and to help the business
understand some of the risks that may need to be considered in your organisation.

No Risk Detail Symptom Area of Category


Responsibility
1 Disclosure of Social networking Identity theft / Information People
Personal Data sites allow people to account hi-jacking Security
share personal Social engineering
information about attacks
themselves. This
might include their
name, age, gender,
location, workplace,
family members,
interests, and so on.
Photos can also
contain information
such as car
registration plates in
the background.
Photos taken on
certain devices (such
as mobile phones)
may also be tagged
with location
information as part
of the photograph
properties. Personal
information posted
in a user’s online
profile may be mis-
used, potentially
leading to ‘identity
theft’ or ‘social
engineering attacks’
(see below).
2 Identity Theft Some of the personal Fraudulent Information People
data sometimes activity, usually Security
posted on social financial, which
networking sites may can adversely
also be used for affect the victim

20 | P a g e
identity verification of identity theft
(e.g. birthday). This
data may be used by
criminals to
impersonate an
individual, usually in
order to gain access
to resources such as
a bank account, or to
obtain credit or
other benefits in
their name.
3 Social Social engineering Information Information People
Engineering attacks can occur wrongly provided Security
Attacks when personal to a third party,
information available which is
online is used to help subsequently
trick people into used for malicious
releasing purposes
confidential,
sensitive or
otherwise useful
information, either
about themselves, or
their organisation.
The personal
information available
online might make it
easier to successfully
target an individual.
For example,
‘LinkedIn’ often
contains
organisational
information.
4 Identity Hi- Often, social Reputational Information People
jacking networking sites use damage May lead Security
fairly basic methods to other attacks,
to verify a user’s including the
identity and simple distribution of
password controls. ‘malware’ (see
This makes it below), or
relatively easy for financial scams
one individual to such as asking
pose as another, or ‘online friends’
to create a ‘fake’ for money
organisational

21 | P a g e
profile. This is usually
done to inflict
personal or
reputational
damage.
5 Physical Safety Online activity can Physical attack Information People
lead to actual Security
physical attacks as
users may post their
address, family
details and location
(directly or
indirectly). This is
particularly relevant
for individuals who
have sensitive roles
or positions within
society.
Some social
networking sites,
such as ‘Twitter’ or
‘Twitter 360’,can
contain an
individual’s actual
real-time location.
6 Online Bullying Bullying and
harassment are
sometimes
conducted online.
Children and adults
can find themselves
the subject of this
type of activity and
employers should
remember that they
have ‘duty of care’
for their staff.
7 Malware ‘Malware’, such as Distribution of Information Technology
computer viruses malware onto Security
and worms, can be computers and
embedded in mobile devices
software, graphics through staff or
and weblinks within corporate
social media sites. profiles.
Although this is an
existing internet-
based risk, social

22 | P a g e
networking provides
new distribution
methods which
include mobile
devices through SMS
/ MMS / Mobile
Internet Browsing
and ‘Apps’.
8 Reputation Organisations, as Personal and/or Public Relations / Information
well as individuals, corporate Marketing /
increasingly have an reputations are Communications
online presence damaged through
within social the posting of
networking sites. inappropriate
Reputational and/or
damage can occur unwelcome
through identity content.
theft, or simply
through online
postings / responses
made by others.
Also, organisations
that advertise within
social media sites
may be subject to
abuse or
modification of their
advertising content.
9 Legal and Content posted, Examples of Information Information
Regulatory accessed or exposure to legal Security
distributed by liability include:
individuals or staff slanderous,
can create legal and libellous, or
financial liabilities defamatory
Some organisations comments;
may also have a leakage of
regulatory sensitive
requirement to information;
record all customer online bullying;
contact. The legal breach of
framework around copyright; and,
social networking is breach of
evolving and can intellectual
vary greatly between property rights.
sites and across
countries.
10 Crisis ‘Crisis management‘ Virtual pressure Public Relations / Information

23 | P a g e
Management is changing, due to groups can form Marketing /
widespread use of quickly, requiring Communications
the Internet and prompt action.
social media. Full- The increased
blown crises can pressure could
evolve very quickly, result in an
in a way that many inappropriate
organisations have response.
never dealt with
before.
11 Data Leakage Internal information, Breach of Information Information
trade secrets or intellectual Security
intellectual property property or
may be leaked into internal
the public domain information. Loss
via social networking of income Loss of
sites. This could have competitive
financial advantage Loss of
implications. For confidence / trus
those organisations
that sell information,
such as newspapers,
information released
through social media
could undermine
revenue-based
services. Once
posted online, it is
virtually impossible
to completely delete
it.
12 Productivity Social networking Reduced HR / Business People
sites are generally productivity in Managers
accessible from a the work
range of devices environment
such as computers,
phones and PDA’s.
This means that
users can receive
alerts and access
sites almost
‘anywhere, anytime’.
13 Professional Social networking Can contribute to HR / Business People
Standards tends to be based on a loss of Managers
a single identity or productivity.
profile, often making Blurring of the
it hard to separate line between

24 | P a g e
work and personal personal and
life. By comparison, professional life.
e-mail is more
straightforward, as
users can have a
work and personal e-
mail address.
14 Governance If social networking New, informal HR / Business People
is embraced within work practices Managers
an organisation, develop which
there is a risk that don’t conform to
existing governance existing lines of
arrangements may authority.
be undermined.
15 Recruitment Social networking People may be HR People
sites are increasingly wrongly excluded
used during from a position as
recruitment a result of
processes. Given the content linked to
possibility of identity their identity, on
theft, pertinent social media sites.
information should
be verified through
other channels.
16 Inappropriate There is a tendency Staff subject to HR People
Activity for people to engage disciplinary action
in ‘risky’ behaviour as a result of their
on social networking online conduct.
sites.
17 Weak Typically, user access User accounts Information Technology
Authentication to social networking and identities can Security
applications is not be compromised.
sufficiently secured.
This can lead to
identity theft and
‘hacking’ attacks.
18 Audit Control Communications and Inability to Information Technology
data transfers made monitor or record Security
through social communications
networking sites are or to enforce
not easily audited. copyright or
Some sites use a distribution
range of different controls.
applications or
functions to
encourage
interaction with

25 | P a g e
other sites, for
example, combining
social networking
with ‘online storage’
sites, ‘instant
messaging’ or e-mail.
19 Content Control It is harder to control Reduced control Information Technology
the distribution of over distribution Security
information within of information,
social networks as potentially
the audience can be leading to data
very large and leakage and/or
effectively, records
anonymous. By management
comparison, e-mail issues.
tends to be aimed at
specific people,
allowing some
control over content
distribution. Some
social networking
sites may contain
‘Adult’ or otherwise
‘inappropriate’
content, particularly
within adverts. In
some cases, social
networking sites
have terms and
conditions which
mean that they
actually own any
information once it is
posted.
20 Continuity Attacks on social Loss of service Business Technology
networking sites may Managers
render them
unavailable. For
organisations that
utilise these sites for
business purposes,
this raises business
continuity issues.
21 Technical Fault There have been Release of Information Technology
examples in the past sensitive and/or Security
where a technical personal
fault has resulted in information.

26 | P a g e
a failure to
implement the user’s
privacy settings.
22 Bandwidth Widespread use of Loss of service Business Technology
social networking Managers
sites may increase
the amount of
internet bandwidth
required. If the
service is not
properly planned,
then it could impact
other services that
rely on the same
bandwidth.

6. Conclusion
Social media can be a powerful tool for any organization. It can increase your
visibility, enhance relationships, establish two-way communication with
customers, provide a forum for feedback, and improve the awareness and
reputation of the organization. For these reasons, social media websites have
become an important platform for organizations. As organizations “focus on
effectively leveraging social media platforms, there are a few critical things to
keep in mind”. Organizations must first develop a comprehensive social media
communication strategy and then incorporate best practices in the
implementation of that strategy. Following this guide can help the organization
effectively and successfully derive the maximum benefit from their social media
initiative.

27 | P a g e

You might also like