In this lecture we discussed short and long readings that we were to analyze and comment on. Further discussion about final steps for research was discussed and is as follows:
methods and results-graphs and pie charts
discussion(what results means…what does this mean
how does it answer research question, does it
fit with literature review, did i find out
something new, does something need to be changed or modified)

limitations-what are limitations of study, idea case scenario,
not ideal case scenario

Suggestions for future research

how to protect your Facebook/MySpace page from outside review
types of crimes involved using privacy breaches
type of information gathered from 3rd party API
(application programming interface)
how info obtained-how use obtained info
Percent of people who have been affected vs who have not
violent crime involving privacy breaches
fraud involving privacy breaches
computer corruption involving privacy breaches

RESEARCH QUESTIONS- SOCIAL MEDIAS GRIP ON PERSONAL PRIVACY:

PROTECTING YOUR ONLINE PERSONAL INFORMATION FROM THREATS

HOW TO BETTER AVOID PRIVACY BREACHES AND SECURITY RISKS THAT INFILTRATE AND EXPLOIT INDIVIDUAL’S PERSONAL ONLINE INFORMATION

Presentation for 04/05/2011
PEER TO PEER FILE SHARING-CULTURE..

[1]WHAT IT IS

[2]IMPLICATIONS
[3]SECURITY RISKS(INFO UPLOADED, INFO DOWNLOADED)
[4]UPSIDE[5]DOWNSIDE[6]HOW TO USE(HABITS)
1 definition-what is it-brief history
2 major examples
3 big ideas/values underlying
4 implications

Advertisements