You are on page 1of 13

ABBREVIATING THE RANDOM

RETRIEVAL OF USERS’ DATA


ON SOCIAL MEDIA THROUGH
DATA ENGINEERING

GROUP D
JOHN WOGU | KUCELI ENGLAMA | ABDUL-QUDUS JIMOH | OLUWAMAYOWA MIKE-ADEOGUN | MOHAMMED UMAR BELLO 1
INTRODUCTION
• Social media is a web-based platform that helps us share information and opinions. Without doubt,
social media is presently the most powerful communication tool. The social media companies have
access to these data that users put out or post which can be sold to their affiliates and partners. These
third party attacks involve data engineering as it deals with data collection and analysis.
• It is possible for one to secure their sensitive information to prevent cybercriminals from gaining
access to them. Every individual is accountable for the protection of his or her personal information.
Although some terms and conditions on social media platforms can seem complex, it is important to
always go through them. By agreeing to these terms, social media network, websites and mobile
applications could be granted the permission to collect, process and sell personal details.

2
RESEARCH STUDIES

• We give out our data, whether we realize it or not, every time we visit a website or use social
media. These data could be birthday, email address, residential address, gender identity and
phone number.
• New research conducted by a tech reporter, Jordan Hogan, suggests that users’ data are being
sent all around the world. In his report, he mentioned a new study by MacKeeper, a software
company for digital privacy, which investigated 56 websites including, Instagram, amazon,
Walmart, Facebook, Slack and LinkedIn among others to examine where users’ data is being
sent.

3
CONT’D
• Thierry Ngutegure, a Data and Insights Manager, mentioned that, “Once the data is being
pinged around and shared with third party people and sent to other countries where their
data privacy laws may not be as stringent as the origin of said data it means they can
package up and create a really holistic view of that individual, far greater than their
individual entity that they were collecting, to begin with” [4].
• Users can be allowed to select whether or not to authorize the application they are using
to track their data reclaiming some control for themselves. This practice has now been
adopted by companies like Google and Apple. On the other hand, companies like
Instagram, claim that the users’ data gathered is beneficial to its business because it helps
provide personalized ads to assist small businesses.

4
METHODOLOGY

• A questionnaire was created to ask social media users questions. AUN instructors and
students were asked those questions. The survey's purpose was to see how users reacted to
various privacy-related options, as well as if they were even aware of them or cared about
them. The respondents were randomly selected to participate in the survey.

5
SURVEY QUESTIONS AND ANSWERS

The following questions were asked of 5 participants:

• Question: Do you use the social media to share your personal information?

Yes, 40% of the participants share personal information, according to their responses.
Participants were also asked if their social media content was private and only shared with
their friends. Unfortunately, some people did not even use the data-sharing capabilities of
their limited service

6
CONT’D
• Question: Have you read your social media privacy statement and terms of service?
When asked about their social media privacy statement, 60% stated that they had not
even attempted to read the terms of service. The rest of those who took part in the
survey read a portion of the privacy statement. The privacy statement is quite long,
making it hard to read in a reasonable amount of time. Although some users may not
agree with any of the claims after reading it, there is no option to challenge or change
these statements. As a result, if clients do not agree with the terms of service statement,
they can either accept it or refuse to use the services.

7
RECOMMENDATIONS

Below are some suggestions on ways to prevent unwanted access to user content and privacy:
• Personal information: Users should not supply unnecessary personal data on social media.
• Location information: The location information of a user can be obtained possibly through
the position specified by the user when setting up his or her profile. One’s location
information on social media should not really be revealed in order to avoid attacks.

8
CONT’D

Antivirus and antimalware: An anti-virus prevents the execution of an already attacked file so
that no other file on your computer can be affected. An anti-malware, on the other hand, “scans
a computer system to prevent, detect and remove malware” [13]. It is recommended to have
antivirus and antimalware software programs to protect one’s computer and files in them.

9
CONCLUSION

Social media has completely transformed our lives. It is a powerful tool that helps us communicate
daily. It is undeniably beneficial to human life. Along with the significant benefits, social media has
some drawbacks. Users are vulnerable to security and privacy issues. These issues may be caused
by third parties who rely on the user data gotten from social media sites. The ultimate goal of this
research was to discuss the security and privacy issues surrounding social media as well as the
means by which third parties retrieve users’ data through data engineering with probable
suggestions on how users can protect themselves from falling victim.

10
REFERENCES
• A. M. Kaplan and M. Haenlein, "Users of the world, unite! The challenges and opportunities of Social Media," Business Horizons,
vol. 53, no. 1, pp. 59-68, 2010.
• N. Giandomenico, "What is Spear-phishing? Defining and Differentiating Spear-phishing from Phishing," 1 December 2020.
[Online]. Available: https://digitalguardian.com/blog/what-is-spear-phishing-defining-and-differentiating-spear-phishing-and-
phishing. [Accessed 30 May 2021].
• B. Alghamdi, J. Watson and Y. Xu, "Toward detecting malicious links in online social networks through user behavious," in
Proceedings of IEEE/WIC/ACM International Conference on Web Intelligence Workshops, Omaha, NE, USA, 2016.
• J. Hogan, "A new study reveals where your data is being sent by websites and why," 22 May 2021. [Online]. Available:
https://www.fox13now.com/news/technology/a-new-study-reveals-where-your-data-is-being-sent-by-websites-and-why. [Accessed
30 May 2021].
• Lancaster University, "Social media plagued by privacy problems say researchers," 20 May 2013. [Online]. Available:
https://www.youtube.com/watch?v=B2lpOkx9SVQ. [Accessed May 2021.
• I. Daga, A. Gupta, R. Vardhan and P. Mukherjee, "Prediction of Likes and Retweets Using Text Information Retrieval," Procedia
Computer Science, vol. 168, pp. 123-128, 2020.
• M. Junior, S. Xavier and R. Prates, "Investigating the Use of a Simulator to Support Users in Anticipating Impact of Privacy
Settings in Facebook," in Proceedings of the 18th International Conference on Supporting Group Work, 2014.

11
CONT’D
• M. S. D. P. M. V. T. S. Thomas Paul, "C4PS - Helping Facebookers Manage Their Privacy Settings," International Conference on Social Informatics,
vol. 7710, pp. 188-201, 2012.

• R. Gross and A. Acquisti, "Information revelation and privacy in online social networks," in The Proceedings of the 2005 ACM workshop on privacy
in the electronic society, Alexandria, VA, USA, 2005.

• E. F. R. H. M. K. B. T. Barbara Carminati, "A semantic web based framework for social network access control," in The Proceedings of the 14th ACM
symposium on Access control models and technologies, 2009

• M. Madjeski, M. Johnson and S. Bellovin, "A study of privacy settings errors in an online social network," in Proceedings of the IEEE International
Conference on Pervasive Computing and Communications Workshops, Lugano, Switzerland, 2012.

• . Makridakis, E. Athanasopoulos, S. Antonatos, D. Antoniades, S. Ioannidis and E. P. Markatos, "Understanding the behavior of malicious
applications in social networks," IEEE Network, vol. 24, no. 5, pp. 14-19, 2010.

• A. Makridakis, E. Athanasopoulos, S. Antonatos, D. Antoniades, S. Ioannidis and E. P. Markatos, "Understanding the behavior of malicious
applications in social networks," IEEE Network, vol. 24, no. 5, pp. 14-19, 2010.

• L. Rosencrance, "antimalware (anti-malware)," TechTarget Search Security, March 2021. [Online]. Available:
https://searchsecurity.techtarget.com/definition/antimalware. [Accessed 20 May 2021].

• T. Micro, Director, How Cybercriminals Can Use Your Social Media Activity Against You. [Film]. 2018.
12
THANK YOU!

QUESTIONS?

13

You might also like