Ideation Platform With Security Policies and Facial Mapping Feature

Ideation Platform With Security Policies and Facial Mapping Feature

Athish Venkatachalam Parthiban, D. Rajeswari, Priyanka Ravichandran
Copyright: © 2024 |Pages: 9
DOI: 10.4018/979-8-3693-1435-7.ch012
OnDemand:
(Individual Chapters)
Available
$33.75
List Price: $37.50
10% Discount:-$3.75
TOTAL SAVINGS: $3.75

Abstract

The emerging social media with inherent capabilities is gaining an edge over comprehensiveness, diversity, and wisdom. Nevertheless, its security and trustworthiness issues have also become increasingly severe, which needs to be addressed urgently. The available studies mainly aim at social media content and user security, including model, protocol, mechanism, and algorithm. Unfortunately, there is a lack of investigation on effective and efficient evaluations and measurements for the security and trustworthiness of various social media tools, platforms, and applications, thus affecting their further improvement and evolution. This chapter first surveyed the social media networks' security and trustworthiness to address the challenge, particularly for the increasingly growing sophistication and variety of attacks and related intelligence applications. The authors introduced a novel approach to assess fundamental platforms, proposing a vital hierarchical crowd evaluation architecture based on signaling theory and crowd computing. They conclude by acknowledging open issues and cutting-edge challenges.
Chapter Preview
Top

Introduction

Our motivation behind this project stems from a genuine concern for women who possess brilliant ideas yet lack the exposure and reliable platforms to share them with the world. In response, we are dedicated to creating a secure and empowering space where women can confidently present their ideas, projects, and work samples to a global audience. Our purpose extends beyond gender boundaries, aiming to establish a social network that welcomes everyone to share their ideas and benefit from a broader reach. To ensure the utmost privacy and security for our users, we implement robust information security policies. Moreover, we prioritize features like facial recognition to provide an extra layer of security, particularly benefiting female users and enhancing their confidence in showcasing their ideas. The scope of our project transcends geographical borders, welcoming users from all corners of the world to present their ideas and offer their support. Our primary focus revolves around creating a secure online environment that minimizes the presence of fake accounts, addressing a crucial issue faced by many. In essence, our goal is to provide a safe and inclusive social media platform where individuals, especially women, can fearlessly communicate and nurture their business ideas with minimal barriers to growth.

Privacy and Security Issues in the Future

Because humans are social beings, relationships and communication between individuals are part of human nature (Boyd & Ellison, 2007). At city markets, pubs, and cafés, people used to interact with one another in groups and congregate around fires. In the digital age, nothing about this has changed, but communication methods have. Today, we have a wide range of digital communication alternatives. We can contact with and exchange messages, pictures, and links with our friends and family via Facebook. We have Twitter for microblogging, Instagram for photo sharing, WhatsApp for instant messaging, and YouTube for videos. Use LinkedIn to network professionally. There are many such websites, some of which serve certain demographics or purposes. Through social media, we have new opportunities for connection and rapid access to millions of people. We have new opportunities for contact and rapid access to millions of individuals thanks to social media. We can read each other's statements, keep up with our friends' status updates, and share our experiences with them. We may come across people's recommendations for a product we wish to buy or for a hotel where we intend to spend our next vacation via social media. Social media is used by people for a variety of purposes. The survey “Why People Use Social Media Sites” (2009) found that 31% of social media users claimed that they use the sites to meet new people, 21% said they use them to keep contact with friends, and 14% said they use them for general socializing (Boyd & Ellison, 2007).

Recent technologies and networks have created a massive change and improved the method of approach in a range of fields, industries, and aspects of global society to stay on their toes about latest trends. All participating entities (man, machine, group, and even brain-like computer) in the “Global Village” now use Web 2.0 and Science 2.0 as vital network infrastructure and knowledge platforms for exchanging, sharing, and contributing a significant quantity of data, information, knowledge, and wisdom. The social media ecosystem emphasizes stakeholder organization, content medium, and comprehensiveness, variety, and intelligence of these groups. As a result, it promotes the development of fresh virtual social networks and organizational structures. The use of social media has increased significantly in recent years. Recently sites like Facebook, LinkedIn have become the main mode of contact for a lot of people.

Complete Chapter List

Search this Book:
Reset