To streamline friend request process and boost the number of friend requests sent or received, I would implement a secondary friend request process based photo facial recognition. Assuming that this technology, derived from a similar algorithm as facial recognition tags in photos, is functional and highly efficient, it can revive long lost friendships, particularly for older users, facilitate the friend request process, and ensure that brief acquaintances grow into friendship. However, this technology is also associated with trade offs as it can be manipulated to violate privacy rights. Still, there are many precautions available to mitigate this concern. Further, these precautions can be used to gauge interest and success.
Without a doubt, younger users have significantly more friends than
…show more content…
Some people may not want anyone to be able to access their profile from a photo. Unfortunately, people can use this tool to perpetrate harmful activities, such as stalking or molestation. To mitigate this issue, the default privacy settings will turn this tool off to ensure that it respects the rights of those people who do not want to share their profile or who do not know of the exist of such a feature. Even if users choose to switch on the feature, another net of protection can be created by allowing users to pre-approve access to the requester. If someone does not want a certain person to view his or her profile, he or she can simply decline the request and the requester will never know if their profile exists. The pre-approved requests can also defer potential stalkers because their suspicious activities will be explicit to the recipient. However, it will not deter normal acquaintances from sending these requests because they will not send a request unless they expect these recipients to accept the photo requests as like any normal friend
How many Facebook friends do you have, and how many of those friends have you spoken to in the past week, month, or even year? Are there any people that you follow on Instagram whom you’ve never introduced yourself to? The answers may come as a surprise. The use of social media makes it effortless to connect with friends and family. However, it also allows us to to catch a glimpse the lives of those we’re never met. Depending on how much information is shared on one’s profile, it can allow a person to determine enough about them to consider them a friend. Conversely, those people who have never met you have access to all of your information that you allow “friends” on Facebook to see. This is an alarming discovery, especially considering that the concept of “catfishing” (creating a fake profile online and pretending to be someone
With 50% of users logging on to Facebook everyday and more than 35 million users updating their status’s everyday (Facebook a, 2010), it posses the question what effect are social networking sites, mainly Facebook, having on our friendships? Are we extending our social networking and enriching them? Or are the effects of the ease and accessibility of a ‘friend’ demeaning our relationships?
Every single day, millions of people communicate with others they do not know online. Every day people also talk to others they do not know face to face, but it can become life-threatening when that person can learn more about someone than ever thought to be possible. This can all happen with just a few clicks on the computer. This could be done on any social media sites; such as Twitter, Facebook, Instagram, MySpace, Tumblr, or any dating websites. Even though one may think they know another, a person cannot make real friends on the internet.
Elizabeth Victor reveals the fact that when we upload any type of content to social media platforms it isn’t always secure. So it is crucial for users to understand how to use the privacy features that the many social media sites have to offer and each one of these sites has its own settings, some more complicated than others (Isentia, 2014). Elizabeth Victor takes the time to explore the privacy settings of Facebook, Instagram, Twitter, Google Plus, and LinkedIn. The research conducted and given is strictly fact, no bias involved, Isentia and Elizabeth Victor go step by step on where to change your privacy settings on these specific social media sites. Elizabeth Victor (2014) notes that, “There are three places to set privacy on Facebook, the privacy tab, your profile, and your photo settings. You have to go to your privacy settings in the tools tab by clicking on the lock icon” (p. 1). Elizabeth Victor (2014) concludes
The privacy on social media networking applications is an uproar in United States government issues as well as the entire world as a whole. Many users are terrified of what is to come with new social policies being created. Problems dealing with privacy in social media range from personal information to your everyday routine. There are two immense problems that will be touched upon that deal with these issues. The question is, will Facebook’s facial recognition destroy social media privacy? And the second issue is a controversial topic that is “Should America adopt the European way of, the right to be forgotten Facial recognition is a very controversial topic, and some Americans believe that it should be dismissed from social media policies,
It has never been easier to build a long-distance relationship or friendship, but all this power at our fingertips does come with some drawbacks. The definition of the word “friend” has changed a lot since the introduction of Facebook in 2004. Some people seems to believe that being friends in social media translate to friendship in real life. Being friends on social media usually just mean that you guys are somehow connected —according to the six degrees of separation theory, everyone on earth are connected in six round of introduction or less. Which is not surprising considering that most of our friend list on Facebook is filled with strangers or acquaintances. Having 700 friends on Facebook does not mean anything and people wouldn’t show up to a party thrown by a stranger. Would you go to a party thrown by someone who you barely know or never hang out with? Of course, you wouldn’t and that is not Facebook’s or the modern world’s fault. You have only yourself to blame for being anti-social and a
Most, if not all social media applications come with privacy settings. Settings can be adjusted so that only friends can see what your teens profile. It is my suggestion that this setting be set to the highest privacy available. Profiles contain names, addresses, phone numbers, email addresses and other personal data.
Facebook is a well know social networking site that has taken all over the world with over 500 million people using the site. Social networking sites such as Facebook share information about the user over the Internet, where it can be freely accessed by anyone. This is where issues of privacy to the individual arise. As of July 2010 Facebook has more than 500 million active users, Users may create a personal profile, add other users as friends and exchange messages, including automatic notifications when they update their profile. As of December last year, Facebook called its 500 million users to review their privacy settings at the launch of its new user control tools which allow the user to control their information easily depending on
Facial recognition has been widely used for identifying terriorist and criminals. The U.S. government has recently begun a program called US-VISIT (United States Visitor and Immigrant Status Indicator Technology), aimed at foreign travelers gaining entry to the United States. (4)When a foreigners applies for his/her visa in US Ambassy, he/she will submit fingerprints and have his/her photograph taken. The fingerprints and photograph will then be compared with the exsiting database and to be determined if they match the records of exsiting criminals and terrorists.
You already mentioned some very interesting examples of where face recognition could be used or already is in use. Authentication is needed more and more in a digitalized world. At first, I thought face recognition could be useful for unlocking phones or open door locks, for example. But I came to notice that there are situations in which this face recognition could actually be disturbing or even dangerous. Imagine a person having an accident and somebody tries to call for help using the cell phone of this person. Help could be hindered by a phone only unlocking through face recognition of the owner. A similar situation would arise in a burning house. The owner being trapped inside, firefighters may not be able to enter the house for help as quickly as they could without a face recognition lock.
The goal of action recognition is to automatically analyze current activities from an unknown video [2]. Among the different recognition techniques, two main questions arise: "Which action and the location of video ?" (like recognition and location problem) . In trying to recognize human activities, one must determine the kinetic states of a person, so that the computer can effectively recognize this activity. In daily life Human activities which are relatively easy to recognize are walking and running. On the other hand, more complex activities, such as "peeling an apple", are more difficult to identify. Complex activities can be broken down into other, simpler activities that are generally easier to recognize. Fig 1, shows the decomposition
Identification and recognition are often referred to one another as having the same meaning. For this research study, recognition is memory recall, whereas identification is matching features. This separation is to establish a clear way to separate eyewitness recognition from passport identification matching. Eyewitness recognition relies on memory to recognize an individual. This is different from identifying a child from a picture taken weeks or years prior to passport identification. The angle of view or viewpoint is used to explain the visual angle represented in images. Safety for children is a concern when examining the limitations with photos used in passport identification or in missing children posters.
The above mentioned example is one of many questioning the credibility of the social networking sites. The fact that anyone can go to a person’s profile and save his/her picture to be used as desired is uncomfortable and disturbing. Another method for the disruption of ethical boundaries in regards to these networking channels is their utilization to conduct predatory marketing. The level of discomfort is high when a product/service is offered to a user on the basis of the needs assessment done by the exploitation of personal information. Some employers are also the culprits due to the fact that they make hiring decisions on the basis of prospective employee’s social network activities. These and many other scenarios lead problem solvers to come up with alternatives and implement productive decisions.
In relation to privacy, social networking and many other genres of the internet are one of the main and easiest places to track down people, many naïve victims, posts up their details on their profile, making it easy to enable stalkers or strangers to have advantage of virtually meeting you. This problem has caused many families to live in fear, not knowing how vulnerable they are to the outside world, where
INTRODUCTION: Face book is a social networking site it makes the world open and connected. Social networking sites facilitate connecting people based on shared interests, friendship, values, membership in particular groups (i.e., friends, professional colleagues, music, movies), etc. It makes it