Urgenthomework logo
UrgentHomeWork
Live chat

Loading..

Mn691 Research Methods And Project Assessment Answers

  56 Download     📄   11 Pages / 2625 Words

Purpose of the assessment:

The purpose of this assignment is to develop skills on literature survey on MIT library databases: EBSCOHost, IEEE, Emerald eJournals etc. Discuss project with your group mates. Prepare and present on journal papers, project scope, project statement and requirement specifications.

This final report will be marked by industry person who has expertise in the area of networking and telecommunications.

a.develop capabilities in requirements of real world case study

b.develop skills to critically review, consolidate, analyse, synthesis knowledge of overall project system

c.be able to understand and apply technical, managerial, and communication skills to real information technology applications

d.adapt knowledge and skills of core units

Description of the assessment:

  1. Background

This assignment is to develop skills on literature survey, preparation of slides and presentation on the project scope, problem statement and requirements specification. Record your presentation with video or mobile or TinyTake software (screen capture software).

  1. Requirements

It is expected to prepare and present slides (15 minutes presentation) on the following sections:

  • Summary of industry speakers – Submit in week 8
  • Introduction to the project
  • Problem domain and research questions
  • Significance of the problem
  • Critical review of  existing literature, theoretical and empirical background (include how you can related to industry speaker’s experience along with our literature survey)
  • Constraints, solution approach
  • Research method, design of experiment, data collection method, data analysis method

Submission Guidelines:

Your assignment should be completed according to the General Guidelines for Presentation of Academic Work.

1.successful completion of required tasks

2.quality of figures

a.comments

b.meaningful names

3.accompanying documentation including

a.table of contents and page numbers

b.a front page - indicating your name, a statement of what has been completed and acknowledgement of the names of all people (including other students and people outside of the university) who have assisted you.

c.list of references used (IEEE style) – please specify if none have been used.  

4.The assignment must be submitted in soft (electronic) copy (video file) on Moodle.  Record your presentation with video or mobile or TinyTake software (screen capture software).

Answer:

The income produced through publicity is considerable and hence, safety of the income sources if very crucial. Media researches (TechCrunch 2012) have stated that the huge count of parts of the internet traffics are not real traffics by the actual people on facebook. As for the short time, it can be considered that Facebook need not get influence through the bot-click threats rather as a substitute advantages through the enlarged income, hence there might available no perks to safeguard from these scam. For the huge operations, the promoter might stay away through the base when the expected promotions suppose to be not provided appropriately.

In this study, it is stated that the basic engineering test on the facebook carrying false accounts. Additionally, the aim teams were set up as well as the research along with the partly cover trial. The objective of this study is to state and understand the safety-connected problems with regarding to the social media and understand the sustainability and reliability of Facebook customer information. The chief contributions of this research are:

The socially striking fake Facebook accounts are created and added them to the prevailing friendship connections for replicating the information produce theft.

  • The analysis on the facebook customer information of accounts is done that communicates with the false accounts.
  • The analysis regarding the human aspects for inheriting the profound recognition of the methods of helpfully adding the false accounts in the prevailing friendship connections.
  • The countermeasures have been provided by making the people aware about this.

Nowadays, in a fastly paced world the use of the word ‘SOCIAL Network’ is increasing at a rapid speed and we have almost got attached to it. As we all know our country is slowly progressing, therefore it could take time to digitize. Today millions of people are on Facebook, but slowly this is becoming hazardous for the users. Increasing amount of crimes which are committed on a daily basis is surely being taken note of. Creating no of fake profiles and misusing it is costing dearly for other users as well. However, a huge quantity of leaked information is truly affected by the customers only. Our social networking experts have found that they have invented social experiment on it and they have collected data of the users qualitatively & also quantitatively. They devised a plan to create fake accounts and secure friendly interactions with as many people probably. and gather all the required information which they performed. To disclose data on a huge scale basis the activity had to be rebooted.  Regarding Bilge al et. (2009) as well as Boshmaf al et.(2011),it becomes convenient to  implement tool named high-frequency network to cream out  information gathered from networking site..

Evaluation of the Information

This reflected to huge amount of data which they collected it according to their experiments. They collect it only once in a day everyday. They do not collect it at the end of the week. From observatory point of view they regulated no. of  inwards and outwards requests. The exhaustive source was extremely helpful for them that made them aware to unfriend their fake profiles. Hence, they recorded number of  like and communication. In contrast they experimented with instantly the no. people have elevated. gradually They understood the whole prospect of it and they performed actions on it dated 11 April,2012. Interestingly,  they gathered the data, when they  went inside it  from their false accounts when they found out maximum no. of demands greater than before. The other chart calculated vast amount of users at assured junctures. This encapsulates between March12 and April, 2012 that huge amount of people have climbed up gradually though, they did not got into the act. Through this they found out what a negative account can create to harm the users using it. It can cause serious harm to oneself also for neglecting it and not reacting to it. The other table showed that the number of fake profiles females have in particular to the male profiles. According to the Labs of Barracuda (2011) findings they believed that females have huge percent of  false identities. All of this analytical friendship networks which they had  created did not gave any adequate data; principally it is only a few. Ferdinand, lisle, Mitzi and Laura consist of large number of  males, although Laura consist of greater count of male counterparts. David and Melissa  had many female s attached to them, but on the other hand in Chris and Lena, the figures rose  up sharply from both the sides. The other side which they saw was the involvement of Lena’s friendship connections.  The collected source  when they studied thoroughly from both the angles noticed that when they combined both of them they saw the results cumulatively.

Regarding the Facebook Customer Information

Facebook is by far called inner  part like giant model which comprised of users and their connecting link among them. The economical way to grab a information  through a chart  is the chart API (2012).customers, organization ,events and pages presented  as bits and pieces with linking between them. Each and every minute detail has ambiguous identity and can easily be  gathered from free table APL. Every  detailing  can be called as JSON  particle (2012). Is a fast and economical process which is digestible to understand in multiple software language.. This method was instrumented by Huber  al et (2012, 2011) to derive  data from the chart.

Connected tasks and background

As stated by the Ellison and Boyd (2007) that social media sources as “internet-depended utility that permits user to (1) pave a common or semi-common accounts in the restricted structure, (2) express a series of other people along with which the user have been exchanging their opinions and (3) look and negotiate their series of links and that created by other in the structure.”

Additionally they converse that there exist various proposals regarding the arrangement standard on various sites. Few sites aim on the look of the set-up of actual-life social sites, whereas others practise to allow creating of the fresh connections. Social sites offer despite of the instrument for interaction between the people, rather also operations for everlasting term. Smith et al. (2011) stated everlasting as “the accumulation of information for demonstrating the user’s life.”

Common connection group evaluation - The JSON matters recovered through the Facebook comprise data on connection among the certain people of any people that in this matter is only the false facebook accounts. In case of each false account, a graph is made to define their connection chain. The joint depicts the false account’s pals as well as the edges denote connection links among them. The size and color of the joint is decided at their angle. The dimension of the joint is resolute through the count of the edges straight linking to other joints in the series.  The more dark the joint would become, the larger will it be, the advanced the angle of the joint. According to it, the extreme dimensions suppose to be the elevated network solidity as well as the larger count of common friends.

Task and education data – as it is considered that one of the aspects is denoted within the report of the user that you might recognize operationally is task as well as knowledge data. The data sets are evaluated and considered as the joints along with the knowledge or agency data based upon the user’s account data that although, was not present for each account. Basically, In general, the data is being denoted by resizing and coloring the individual joints and carrying out the other joints grey and shorter. When the joint is blue or black, a definite knowledge centre, specifically the identical as denoted through the false account, was stated on the related account. Every joint, which are not colored blue or black, were not stated in the center rather other may have been stated. The joints were decided to be labelled only when they were stated the identical knowledge centres or official data evaluation on every connection links.

Location data – several accounts stated location data. In various matters, location data is efficiently connected to the common friends as well as task and knowledge data. Therefore, it is supposed that location is also the aspect, which extremely persuades the allocation of the friendship chain. Identical to the evaluation of data as well as official data, the locations have been filtered and it is denoted in the accounts regarding to the location data revealed on the false accounts.

Common interest and networks – user that exchange the identical field of interest frequently connects with the identical chain such as the identical facebook page. Several facebook customers denote entertainment and arts curiosity or their preferred ideal moment tasks on their accounts. From the vast range of interests, the interest which was selected to be evaluated was the music and preferred TV shows denoted on the produced accounts. Primarily, the occurrence of the music artists and TV shows that were denoted on the accounts were counted. It can be supported with the instance that describes the allocation of the stated TV program between Laura and her friend. Additionally, the most recurrent music artists and TV shows were determined between the friends in the false facebook accounts. The concluding things do not essentially be stated in the false accounts.

Qualitative evaluation  of the observation - throughout the tests, it can be clearly seen that the communication among the false accounts and other facebook customer. At each view point, the qualitative information is gathered on how we can observe the communications. We interpret the consideration in the diary along with the mathematical information that is being gathered. We recognize the tough inclination for Facebook people to observe the account as false when it seems to be the fresh to the facebook site, in the simple words that account has very less count of friends as well as zero wall updates. If the friend count rises, the disbelief of the another facebook customer lowers. Inheriting the greater count of friends and large number of activities creates an account more socially pleasing for other account holders as analyzed by Boshmaf et al. (2011).

Discussion

The evaluation of the false facebook accounts test presented that making and keeping the false account is such a convenient work. The Facebook resistant structure from Stein et al. (2011) is not capable of recognize the accounts as false. Additionally, at the time of making the accounts, there was not a single use of CAPTCHA.

Focus teams

Framework – as it is depicted that common engineering theft can be arranged effectively in the social media like facebook when the false accounts are basically pleasing. We tried to gather few of the facebook accounts in the prevailing friendship chains. Through the starting of the study, we aim particularly on approaching to the youth and teenagers through our social engineering test. For teenagers, social media like facebook acts as the essential component of their life. The era of current youth is increasing up with the social network as well as web as the essential component of their routine life. Particularly, the youth’s false accounts Mellissa and Lena we acquired the quite deep gathering in the prevailing connection chains, which were linked along with the identical centers as stated in the accounts as well as the large count of common friends.

Methodology

The aim team were arranged in April as well as May 2012. Primarily, we arranged a conference along with the Austrian college scholar of computer technology that engaged in the unique social network curriculums. Two authors in this research were available at the time of the conference. Afterward, we conversed regarding the result of the conference along with the scholar to receive response as well as review for the additional development the process earlier than executing the focus team along with the high school scholar. Basically, the conference is conducted  along with the college scholar assisted us to approximate whether our proposals are probable and feasible to arrange in the time limit of the two session. Hence, the outcome through the aim team pilot conference along with the university scholar is not completely contrasted along with the conclusions through the real focus team as well as the subsequent evaluation do not comprise outcomes through the experimenting conference in the university.      

Conclusions

After summing it all up we can say after they conducted experiment they looked upon the determining factors that they have contributed it successfully. Thereby by implementing a methodical way for the users that in the future they would be aware of their surroundings. We human beings are easily pronged into mischievous activities which we are not aware of. Moreover, they examined Facebook user’s privacy considerations and they have developed an inner thought of  connections among real and surreal customers.

References

Boshmaf Y, Muslukhov I, Beznosov K, & Ripeanu M (2011) The socialbot network: When bots socialize for fame and money. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC ’11. ACM, New York, NY, USA: 93-102. DOI 10.1145/2076732.2076746.

Fruchterman TMJ, Reingold EM (1991) Graph drawing by force-directed placement. In: Software: Practice and Experience 21(11):1129-1164. DOI 10.1002/spe.4380211102.

Gephi: (2012) https://gephi.org/. Accessed 10-6-2012.

NetworkX (2012) https://networkx.lanl.gov/. Accessed 10-6-2012.

Stutzman F, Capra R, & Thompson J (2011) Factors mediating disclosure in social network sites. Computers in Human Behavior 27(1):590-598. DOI 10.1016/j.chb.2010.10.017.

Stein T, Chen E, & Mangla K (2011) Facebook immune system. In: Proceedings of the 4th Workshop on Social Network Systems, SNS ’11. ACM, New York, NY, USA:8.1-8.8. DOI 10.1145/1989656.1989664.


Buy Mn691 Research Methods And Project Assessment Answers Online


Talk to our expert to get the help with Mn691 Research Methods And Project Assessment Answers to complete your assessment on time and boost your grades now

The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.


Get Online Support for Mn691 Research Methods And Project Assessment Answers Assignment Help Online


Copyright © 2009-2023 UrgentHomework.com, All right reserved.