Research Challenges in Social Media Social media scraping and analytics provides a rich source of academic research challenges for social scientists, computer scientists and funding bodies. There are two types of challenges in big data analytics that includes Technical and Ethical Challenges. Technical Challenges 1. Bias and Polarization - The personalized content predicted with the aid of algorithms based on the past behavior of a user can create polarization which means that two different users could be getting fully different search results for an equal factor. However, modern deep-learning techniques, which do not entirely rely on the past data, and context aware computing and algorithms, can address these issues.
Networked Systems Security Task 1 – THREATS AND IMPACT OF NETWORK THREATS There are many types of threats that can damage your computer either temporarily or permanently. Some threats posed may not threaten your computer right away however have the potential to do so. Some threats that present themselves can include physical threats such as the theft of equipment whether that is the monitor, computer etc. Other threats can be harder to find such as viruses, worms or any kind of malware. Understanding these threats allows the organisation to prevent, protect and correct any damage done to his/her computer to an extent.
Advantage: - save cost of bandwidth - Better outage protection and security– colocation provider will manage and maintain the server. - Each party owns the server software and machinery. Each party can upgrade the server and install software or tools whenever they want. Disadvantages: - Colocation providers can be hard to find. Most providers locates in large cities with major network hubs, if a small business doesn’t locate there, it won’t find many colocation options.
Technology Risk Presentation Tammy Radcliffe XACC/210 • Limitations of Technology for E-Business System Technology is crucial in the daily operations of any business. Production of services is related to the technology used and it encourages an increase in productivity. Upgrades in technology gives an organization advantage to the competition. This could be cost effective to the organization compared to hiring new employees and paying high salaries in the long run. Technology has had several downfalls as well.
A software RAID can also be affected if the host computer is heavily loaded. Heavy processing can cause some pieces of data to be delayed by a small amount of time. These delays can add up, and negate the benefits of the RAID array to some degree. NOTE: A good website to use for RAID illustration is – Http://www.lascon.co.uk/d008005.html References Knowledgebase. (n.d.).
Low customer satisfaction is another internal weakness that is crucial to the success of CanGo. Another internal weakness includes severe communication issues within CanGo’s management and employees. External threats such as competition, plays a big role in the future success of CanGo. Your organizations internal organizational strengths such as online growth, and cost advantage offers great potential if properly utilized. Another external threat includes economic slowdown.
Many credit reporting systems that use internet as a mean to transfer credit data is insecure. Security holes can exist in several main parts of the credit reporting system such as data transfer, database, interface and network. When a user order and receive information, data are transferred through the internet where hackers can listen in and intercept the data if it’s not properly encrypted. Logins, passwords and
Considering the worst-case scenario for PRISM, assume that all internet firms products are compromised. Albeit true alternatives exist, the scope of the products offered by the co-operating companies is simply too large. One would need to change operating systems to Linux, stop using Android or Apple devices, abandon Facebook, Google, YouTube, and many other beloved services, and that’s merely scratching the surface. Even still, with the knowledge that the NSA can snoop directly through ISP’s, one would have to go to extremes such as using services such as the The Onion Router (TOR) that will completely hide ones identity. While nice in theory, TOR is not publically accepted and is widely regarded as the “darkweb” due to the sheer amount of illicit content accessible.
It will be very expensive and difficult for new entrants to match them and reach the same production volume. Access to supply or distribution channels: Microsoft has control over many computer brands so their product will be included in those computers. New entrants will have to make a lot of effort to overcome the barriers. Differentiation: Microsoft invests on differentiation by providing products and services with higher perceived value than their presumed competitors. This is another fact showing that the threat of entry is low.
CyberTurfing is the online equivalent of Astroturfing, differentiated by the online medium in which the deception is being spread. CyberTurfing is often harder to detect due to the lack of transparency that exists online. The global reach of the internet also increases the scope of people that may be deceived. For example, CyberTurf messages are being spread on Twitter through the use of Honey Pots; fake accounts that are preprogrammed to tweet, reply and direct message users, whom usually have great influence on the platform. Usually, these accounts are easy to detect but more advanced Honey Pots have shown emotional intelligence capabilities like that of humans.