Mining Facebook: Analyzing Fan Pages, Examining Friendships, and More

Total Page:16

File Type:pdf, Size:1020Kb

Mining Facebook: Analyzing Fan Pages, Examining Friendships, and More CHAPTER 2 Mining Facebook: Analyzing Fan Pages, Examining Friendships, and More In this chapter, we’ll tap into the Facebook platform through its (Social) Graph API and explore some of the vast possibilities. Facebook is arguably the heart of the social web and is somewhat of an all-in-one wonder, given that more than half of its 1 billion users1 are active each day updating statuses, posting photos, exchanging messages, chatting in real time, checking in to physical locales, playing games, shopping, and just about anything else you can imagine. From a social web mining standpoint, the wealth of data that Facebook stores about individuals, groups, and products is quite exciting, because Facebook’s clean API presents incredible opportunities to synthesize it into information (the world’s most precious commodity), and glean valuable insights. On the other hand, this great power commands great responsibility, and Facebook has instrumented the most sophisticated set of online privacy controls that the world has ever seen in order to help protect its users from exploit. It’s worth noting that although Facebook is self-proclaimed as a social graph, it’s been steadily transforming into a valuable interest graph as well, because it maintains rela‐ tionships between people and the things that they’re interested in through its Facebook pages and “Likes” feature. In this regard, you may increasingly hear it framed as a “social interest graph.” For the most part, you can make a case that interest graphs implicitly exist and can be bootstrapped from most sources of social data. As an example, Chap‐ ter 1 made the case that Twitter is actually an interest graph because of its asymmetric “following” (or, to say it another way, “interested in”) relationships between people and other people, places, or things. The notion of Facebook as an interest graph will come 1. Internet usage statistics show that the world’s population is estimated to be approximately 7 billion, with the estimated number of Internet users being almost 2.5 billion. 45 www.it-ebooks.info up throughout this chapter, and we’ll return to the idea of explicitly bootstrapping an interest graph from social data in Chapter 7. The remainder of this chapter assumes that you have an active Facebook account, which is required to gain access to the Facebook APIs. Although there are plenty of fun things that you can do to analyze public information, you may find that it’s a little bit more fun if you are analyzing data from your own social network, so it’s worth adding a few friends if you are new to Facebook. Always get the latest bug-fixed source code for this chapter (and every other chapter) online at http://bit.ly/MiningTheSocialWeb2E. Be sure to also take advantage of this book’s virtual machine experience, as described in Appendix A, to maximize your enjoyment of the sample code. 2.1. Overview As this is the second chapter in the book, the concepts we’ll cover are a bit more complex than those in Chapter 1, but should still be highly accessible for a very broad audience. In this chapter you’ll learn about: • Facebook’s Social Graph API and how to make API requests • The Open Graph protocol and its relationship to Facebook’s Social Graph • Analyzing likes from Facebook pages and from Facebook friends • Techniques such as clique analysis for analyzing social graphs • Visualizing social graphs with the D3 JavaScript library 2.2. Exploring Facebook’s Social Graph API The Facebook platform is a mature, robust, and well-documented gateway into what may be the most comprehensive and well-organized information store ever amassed, both in terms of breadth and depth. It’s broad in that its user base represents about one- seventh of the entire living population, and it’s deep with respect to the amount of information that’s known about any one of its particular users. Whereas Twitter features an asymmetric friendship model that is open and predicated on following other users without any particular consent, Facebook’s friendship model is symmetric and requires a mutual agreement between users to gain visibility into one another’s interactions and activities. 46 | Chapter 2: Mining Facebook: Analyzing Fan Pages, Examining Friendships, and More www.it-ebooks.info Furthermore, whereas virtually all interactions except for private messages between users on Twitter are public statuses, Facebook allows for much more finely grained privacy controls in which friendships can be organized and maintained as lists with varying levels of visibility available to a friend on any particular activity. For example, you might choose to share a link or photo only with a particular list of friends as opposed to your entire social network. As a social web miner, the only way that you can access a Facebook user’s account data is by registering an application and using that application as the entry point into the Facebook developer platform. Moreover, the only data that’s available to an application is whatever the user has explicitly authorized it to access. For example, as a developer writing a Facebook application, you’ll be the user who’s logging into the application, and the application will be able to access any data that you explicitly authorize it to access. In that regard, as a Facebook user you might think of an application a bit like any of your Facebook friends, in that you’re ultimately in control of what the application can access and you can revoke access at any time. The Facebook Platform Policies docu‐ ment is a must-read for any Facebook developer, as it provides the comprehensive set of rights and responsibilities for all Facebook users as well as the spirit and letter of the law for Facebook developers. If you haven’t already, it’s worth taking a moment to review Facebook’s developer policies and to bookmark the Facebook Developers home page, since it is the definitive entry point into the Facebook platform and its documentation. Keep in mind that as a developer mining your own account, you may not have a problem allowing your own application to access all of your account data. Beware, however, of aspiring to develop a successful hosted application that requests access to more than the minimum amount of data necessary to complete, because it’s quite likely that a user will not recognize or trust your application to command that level of privilege (and rightly so). Although we’ll programmatically access the Facebook platform later in this chapter, Facebook provides a number of useful developer tools, including a Graph API Explorer app that we’ll be using for initial familiarization with the Social Graph. The app provides an intuitive and turnkey way of querying the Social Graph, and once you’re comfortable with how the Social Graph works, translating queries into Python code for automation and further processing comes quite naturally. Although we’ll work through the Graph API as part of the discussion, you may benefit from an initial review of the well-written “Getting Started: The Graph API” document as a comprehensive preamble. 2.2. Exploring Facebook’s Social Graph API | 47 www.it-ebooks.info In addition to the Graph API, you may also encounter the Facebook Query Language (FQL) and what is now referred to as the Legacy REST API. Be advised that although FQL is still very much alive and will be briefly introduced in this chapter, the Legacy REST API is in depreca‐ tion and will be phased out soon. Do not use it for any development that you do with Facebook. 2.2.1. Understanding the Social Graph API As its name implies, Facebook’s Social Graph is a massive graph data structure repre‐ senting social interactions and consisting of nodes and connections between the nodes. The Graph API provides the primary means of interacting with the Social Graph, and the best way to get acquainted with the Graph API is to spend a few minutes tinkering around with the Graph API Explorer. It is important to note that the Graph API Explorer is not a particularly special tool of any kind. Aside from being able to prepopulate and debug your access token, it is an ordinary Facebook app that uses the same developer APIs that any other developer application would use. In fact, the Graph API Explorer is handy when you have a par‐ ticular OAuth token that’s associated with a specific set of authorizations for an appli‐ cation that you are developing and you want to run some queries as part of an explor‐ atory development effort or debug cycle. We’ll revisit this general idea shortly as we programmatically access the Graph API. Figures 2-1 through 2-4 illustrate a progressive series of Graph API queries that result from clicking on the plus (+) symbol and adding connections and fields. There are a few items to note about this particular query: Access token The access token that appears in the application is an OAuth token that is provided as a courtesy for the logged-in user; it is the same OAuth token that your application would need to access the data in question. We’ll opt to use this access token throughout this chapter, but you can consult Appendix B for a brief overview of OAuth, including details on implementing an OAuth flow for Facebook in order to retrieve an access token. As mentioned in Chapter 1, if this is your first encounter with OAuth, it’s probably sufficient at this point to know that the protocol is a social web standard that stands for Open Authorization.
Recommended publications
  • AI, Robots, and Swarms: Issues, Questions, and Recommended Studies
    AI, Robots, and Swarms Issues, Questions, and Recommended Studies Andrew Ilachinski January 2017 Approved for Public Release; Distribution Unlimited. This document contains the best opinion of CNA at the time of issue. It does not necessarily represent the opinion of the sponsor. Distribution Approved for Public Release; Distribution Unlimited. Specific authority: N00014-11-D-0323. Copies of this document can be obtained through the Defense Technical Information Center at www.dtic.mil or contact CNA Document Control and Distribution Section at 703-824-2123. Photography Credits: http://www.darpa.mil/DDM_Gallery/Small_Gremlins_Web.jpg; http://4810-presscdn-0-38.pagely.netdna-cdn.com/wp-content/uploads/2015/01/ Robotics.jpg; http://i.kinja-img.com/gawker-edia/image/upload/18kxb5jw3e01ujpg.jpg Approved by: January 2017 Dr. David A. Broyles Special Activities and Innovation Operations Evaluation Group Copyright © 2017 CNA Abstract The military is on the cusp of a major technological revolution, in which warfare is conducted by unmanned and increasingly autonomous weapon systems. However, unlike the last “sea change,” during the Cold War, when advanced technologies were developed primarily by the Department of Defense (DoD), the key technology enablers today are being developed mostly in the commercial world. This study looks at the state-of-the-art of AI, machine-learning, and robot technologies, and their potential future military implications for autonomous (and semi-autonomous) weapon systems. While no one can predict how AI will evolve or predict its impact on the development of military autonomous systems, it is possible to anticipate many of the conceptual, technical, and operational challenges that DoD will face as it increasingly turns to AI-based technologies.
    [Show full text]
  • D2.2: Research Data Exchange Solution
    H2020-ICT-2018-2 /ICT-28-2018-CSA SOMA: Social Observatory for Disinformation and Social Media Analysis D2.2: Research data exchange solution Project Reference No SOMA [825469] Deliverable D2.2: Research Data exchange (and transparency) solution with platforms Work package WP2: Methods and Analysis for disinformation modeling Type Report Dissemination Level Public Date 30/08/2019 Status Final Authors Lynge Asbjørn Møller, DATALAB, Aarhus University Anja Bechmann, DATALAB, Aarhus University Contributor(s) See fact-checking interviews and meetings in appendix 7.2 Reviewers Noemi Trino, LUISS Datalab, LUISS University Stefano Guarino, LUISS Datalab, LUISS University Document description This deliverable compiles the findings and recommended solutions and actions needed in order to construct a sustainable data exchange model for stakeholders, focusing on a differentiated perspective, one for journalists and the broader community, and one for university-based academic researchers. SOMA-825469 D2.2: Research data exchange solution Document Revision History Version Date Modifications Introduced Modification Reason Modified by v0.1 28/08/2019 Consolidation of first DATALAB, Aarhus draft University v0.2 29/08/2019 Review LUISS Datalab, LUISS University v0.3 30/08/2019 Proofread DATALAB, Aarhus University v1.0 30/08/2019 Final version DATALAB, Aarhus University 30/08/2019 Page | 1 SOMA-825469 D2.2: Research data exchange solution Executive Summary This report provides an evaluation of current solutions for data transparency and exchange with social media platforms, an account of the historic obstacles and developments within the subject and a prioritized list of future scenarios and solutions for data access with social media platforms. The evaluation of current solutions and the historic accounts are based primarily on a systematic review of academic literature on the subject, expanded by an account on the most recent developments and solutions.
    [Show full text]
  • Letter, If Not the Spirit, of One Or the Other Definition
    Producing Open Source Software How to Run a Successful Free Software Project Karl Fogel Producing Open Source Software: How to Run a Successful Free Software Project by Karl Fogel Copyright © 2005-2021 Karl Fogel, under the CreativeCommons Attribution-ShareAlike (4.0) license. Version: 2.3214 Home site: https://producingoss.com/ Dedication This book is dedicated to two dear friends without whom it would not have been possible: Karen Under- hill and Jim Blandy. i Table of Contents Preface ............................................................................................................................. vi Why Write This Book? ............................................................................................... vi Who Should Read This Book? ..................................................................................... vi Sources ................................................................................................................... vii Acknowledgements ................................................................................................... viii For the first edition (2005) ................................................................................ viii For the second edition (2021) .............................................................................. ix Disclaimer .............................................................................................................. xiii 1. Introduction ...................................................................................................................
    [Show full text]
  • Information Retrieval and Mining in Distributed Environments Studies in Computational Intelligence,Volume 324 Editor-In-Chief Prof
    Alessandro Soro, Eloisa Vargiu, Giuliano Armano, and Gavino Paddeu (Eds.) Information Retrieval and Mining in Distributed Environments Studies in Computational Intelligence,Volume 324 Editor-in-Chief Prof. Janusz Kacprzyk Systems Research Institute Polish Academy of Sciences ul. Newelska 6 01-447 Warsaw Poland E-mail: [email protected] Further volumes of this series can be found on our homepage: springer.com Vol. 313. Imre J. Rudas, J´anos Fodor, and Janusz Kacprzyk (Eds.) Vol. 301. Giuliano Armano, Marco de Gemmis, Computational Intelligence in Engineering, 2010 Giovanni Semeraro, and Eloisa Vargiu (Eds.) ISBN 978-3-642-15219-1 Intelligent Information Access, 2010 Vol. 314. Lorenzo Magnani,Walter Carnielli, and ISBN 978-3-642-13999-4 Claudio Pizzi (Eds.) Vol. 302. Bijaya Ketan Panigrahi,Ajith Abraham, Model-Based Reasoning in Science and Technology, 2010 and Swagatam Das (Eds.) ISBN 978-3-642-15222-1 Computational Intelligence in Power Engineering, 2010 Vol. 315. Mohammad Essaaidi, Michele Malgeri, and ISBN 978-3-642-14012-9 Costin Badica (Eds.) Vol. 303. Joachim Diederich, Cengiz Gunay, and Intelligent Distributed Computing IV, 2010 James M. Hogan ISBN 978-3-642-15210-8 Recruitment Learning, 2010 Vol. 316. Philipp Wolfrum ISBN 978-3-642-14027-3 Information Routing, Correspondence Finding, and Object Vol. 304.Anthony Finn and Lakhmi C. Jain (Eds.) Recognition in the Brain, 2010 Innovations in Defence Support Systems, 2010 ISBN 978-3-642-15253-5 ISBN 978-3-642-14083-9 Vol. 317. Roger Lee (Ed.) Vol. 305. Stefania Montani and Lakhmi C. Jain (Eds.) Computer and Information Science 2010 Successful Case-Based Reasoning Applications-1, 2010 ISBN 978-3-642-15404-1 ISBN 978-3-642-14077-8 Vol.
    [Show full text]
  • 2014 URCA Abstracts for Oral and Poster Presentations
    Oral & Poster Presentation Abstracts Katheryn Adam, Chemistry Faculty Mentor: Marco Bonizzoni, Chemistry An off-the-shelf sensing system for physiologically relevant phosphates We have developed a chemical sensing system that can differentiate biologically relevant phosphates (nucleoside diphosphates, pyrophosphate) in neutral water solution using only commercially available components. Our approach uses a common fluorescent indicator and a poly(amidoamine) (PAMAM) polycationic receptor to construct an indicator displacement assay (IDA). The system crucially relies on multivariate data collection and analysis. In fact, using different phosphates in the dye-displacement assay results in subtle differences in the optical signals; however, it is not possible to capture this information using classical univariate data presentation techniques. Instead, we rely on principal component analysis, a multivariate data analysis technique, to evaluate these differences and thus distinguish between the biologically relevant phosphates. We will also present supporting data reporting on the anion binding capabilities of the PAMAM system acquired using optical spectroscopy methods. Alison Adams, Biological Sciences Faculty Mentor: Laura Reed, Biological Sciences QTL affecting genotype-by-diet interactions of larval triglyceride levels Metabolic Syndrome (MetS) is a complex disease that is becoming increasingly prevalent in the world today. It is identified by an assortment of symptoms such as obesity, insulin resistance, and elevated blood lipids. This disease and its various phenotypes can be modeled in Drosophila melanogaster. In a previous study of MetS, our lab implemented a round-robin crossing scheme on approximately 800 isogenic lines from a recombinant inbred line population, and a linear regression was used to determine genotype, diet, and genotype-by-diet interactions.
    [Show full text]
  • Social Media Evaluation for Non-Profit Organizations
    Social media evaluation for non-profit organizations The case of Oxfam Italia Master Thesis Author: Giuseppe Antonio Coco Thesis Supervisor: Jessica Gustafsson Department of Informatics and Media Specialization in Digital Media & Society Uppsala University, Sweden Autumn 2014 Abstract The thesis presents an evaluation of the Facebook page of the Italian non-profit organization Oxfam Italia from November 2013 to March 2014. The research’s aim is to analyze the community which follows the organization, how this community interacts with it and how the moderators of the page communicate with its followers. The research aims also to find ways to increase Oxfam Italia’s performance on Facebook. The theoretical framework focuses on non-profit marketing and its peculiarities, Social Media Marketing and notions such as engagement and brand community. The methods used in the research consist in data mining and content analysis. Data have been gathered from Facebook Insights and through the issuing of FQL queries from the Facebook Graph API. The research found out that Oxfam has more female followers than male (62% vs 36,5%), the age range of them is 25-44 years. Oxfam’s presence, in particular, is very rooted in the region of Tuscany (where its headquarter is). Facebook followers showed a very good attitude toward the organization, even though criticisms are common, and Oxfam used its social media presence mainly to update the followers concerning ongoing activities and to urge to on-line activism. The users’ favourite engagement method was “liking” photographic contents. Keywords Social media evaluation – Non-profits organizations – Non-profits marketing – Facebook – Oxfam Italia – Facebook Graph API – Facebook Insights – content analysis II Table of Contents Abstract ..............................................................................................................................
    [Show full text]
  • Developing Facebook Applications by M.ALI and Amir Latif
    Developing Facebook Applications By M.ALI and Aamir Latif Application Development Objective • A very basic introduction to developing applications with Facebook using PHP. • Keep it simple. • Goal is learning. • Level:Basic Application Development Agenda • Presentation [M.ALI] 20 mins • Demonstration [Amir Latif] 15 mins • Question/Answer 10 mins Application Development What is Facebook? • Facebook is a web application that provides a kind of social networking with people near you. • Facebook was founded by Mark Zuckerberg in 2004. • Originally designed to connect different colleges and universities. • Facebook name has origin in magazine that was distributed to new students Application Development Facebook facts • World largest social network with over 350 million users. • An average teen spends about 20 mins daily. • More than 65 million active users at a time. • Consists of more than 500,000 active applications. • 6.5 millions users access FB from mobile • More facts on http://www.facebook.com/press/info.php?statist ics Application Development Facebook application • Developing facebook application mean it is accessible from FB. • Application is exposed to millions of users worldwide. • There is a chance for the application to become a popular one in FB. • Applications can be social applications like super wall,games like crazy taxi and quizzes. Application Development Facebook Applications Some Popular Facebook applications Application Development Farm Ville Application Development Facebook Platform • Facebook platform is a framework for developers to interact with the core features of the facebook site. • Anyone can developed an application in Facebook by pointing their URL to developers.facebook.com • The idea was to enable everyone to provide content to the facebook site.
    [Show full text]
  • Università Degli Studi Di Bergamo Moogle: a Web Crawler and Full-Text Search Application for Distributed Private Data
    UNIVERSITÀ DEGLI STUDI DI BERGAMO Dipartimento di Ingegneria Corso di Laurea Specialistica in Ingegneria Informatica Classe n. 35/S - Classe delle lauree specialistiche in ingegneria dell’informazione MOOGLE: A WEB CRAWLER AND FULL-TEXT SEARCH APPLICATION FOR DISTRIBUTED PRIVATE DATA Relatore: Chiar.mo Prof. Stefano Paraboschi Tesi di Laurea Specialistica Paolo COFFETTI Matricola n. 42519 ANNO ACCADEMICO 2013/2014 Abstract You want to search for that sushi restaurant someone recommended you last month but you don't remember its name: you type "sushi restaurant" in your laptop and you get an old tweet from a friend talking about Tokyo Sushi. You also get a comment you wrote on Facebook, an SMS message you sent your brother and a bookmark in your browser, all about the same restaurant. And imagine that you can do this with your smart phone, your laptop, tablet or smart TV. Something so basic yet so far from the reality. This is Moogle - My Own Google, the search engine for private data. This thesis describes the work I accomplished in order to design, develop and deploy a first solid version of Moogle following the iterative and incremental software development process outlined by Grady Booch. 1 Acknowledgments First and foremost I'd like to thank my parents and sisters for their patience and the support they provided me during my studies. I also want to express my gratitude to Professor Stefano Paraboschi for his precious guidance. I wish to thank my girlfriend Boyang for her loving support and who, once again, had to deal with those long hours of my absence while working on this project.
    [Show full text]
  • Proceedings of the First Karlsruhe Service Summit Research Workshop - Advances in Service Research
    KIT SCIENTIFIC REPOrts 7692 Proceedings of the First Karlsruhe Service Summit Research Workshop - Advances in Service Research Karlsruhe, Germany, February 2015 Roland Görlitz, Valentin Bertsch, Simon Caton, Niels Feldmann, Patrick Jochem, Maria Maleshkova, Melanie Reuter-Oppermann (eds.) Roland Görlitz, Valentin Bertsch, Simon Caton, Niels Feldmann, Patrick Jochem, Maria Maleshkova, Melanie Reuter-Oppermann (eds.) Proceedings of the First Karlsruhe Service Summit Research Workshop - Advances in Service Research Karlsruhe, Germany, February 2015 Karlsruhe Institute of Technology KIT SCIENTIFIC REPORTS 7692 Advances in Service Research Series Editors Wolf Fichtner Karlsruhe Institute of Technology (KIT) Kai Furmans Karlsruhe Institute of Technology (KIT) Stefan Nickel Karlsruhe Institute of Technology (KIT) Ralf Reussner Karlsruhe Institute of Technology (KIT) Gerhard Satzger Karlsruhe Institute of Technology (KIT) and IBM Rudi Studer Karlsruhe Institute of Technology (KIT) Christof Weinhardt Karlsruhe Institute of Technology (KIT) Helmut Wlcek Karlsruhe Institute of Technology (KIT) and Bosch Proceedings of the First Karlsruhe Service Summit Research Workshop - Advances in Service Research Karlsruhe, Germany, February 2015 by Roland Görlitz Valentin Bertsch Simon Caton Niels Feldmann Patrick Jochem Maria Maleshkova Melanie Reuter-Oppermann (eds.) Report-Nr. KIT-SR 7692 Volume Editors Valentin Bertsch Senior Researcher at Karlsruhe Institute of Technology [email protected] Simon Caton Lecturer at the National College of Ireland [email protected]
    [Show full text]
  • Predicting User Interaction on Social Media Using Machine Learning Chad Crowe University of Nebraska at Omaha
    University of Nebraska at Omaha DigitalCommons@UNO Student Work 11-2018 Predicting User Interaction on Social Media using Machine Learning Chad Crowe University of Nebraska at Omaha Follow this and additional works at: https://digitalcommons.unomaha.edu/studentwork Part of the Computer Sciences Commons Recommended Citation Crowe, Chad, "Predicting User Interaction on Social Media using Machine Learning" (2018). Student Work. 2920. https://digitalcommons.unomaha.edu/studentwork/2920 This Thesis is brought to you for free and open access by DigitalCommons@UNO. It has been accepted for inclusion in Student Work by an authorized administrator of DigitalCommons@UNO. For more information, please contact [email protected]. Predicting User Interaction on Social Media using Machine Learning A Thesis Presented to the College of Information Science and Technology and the Faculty of the Graduate College University of Nebraska at Omaha In Partial Fulfillment of the Requirements for the Degree Master of Science in Computer Science by Chad Crowe November 2018 Supervisory Committee Dr. Brian Ricks Dr. Margeret Hall Dr. Yuliya Lierler ProQuest Number:10974767 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. ProQuest 10974767 Published by ProQuest LLC ( 2019). Copyright of the Dissertation is held by the Author. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code Microform Edition © ProQuest LLC.
    [Show full text]
  • Top Tips to Protect Your Privacy and Data (PDF)
    Top Tips to Protect Your Privacy and Data Monday, Jan. 28th is Data Privacy Day Data Privacy Day is held on January 28th every year. It is an effort to empower people to protect their privacy and control their digital footprint and escalate the protection of privacy and data as everyone’s priority. Presented by: Tim Gurganus 1/28/2013 Data Privacy Day 2013 Top Tips to Protect Your Privacy and Data January is Data Privacy Month OIT is hosting several activities during Data Privacy Month (January) to empower campus users to protect their privacy and to control their digital footprint. All events will be held in DH Hill Library Auditorium 12pm – 1pm Tuesday: “What Data is sensitive and How do we keep it private?” Thursday: “Data Protection, Privacy and the Law” NCSU Privacy Month website: http://go.ncsu.edu/dpm2013 Top Tips to Protect Your Privacy and Data Student Data Privacy @ NCSU The University publishes an directory online. You can control what information is displayed using the instructions in this document: http://www.ncsu.edu/registrar/forms/pdf/privacyblock.pdf You can update or remove your personal information by logging into the MyPack portal at: http://mypack.ncsu.edu Under the FOR STUDENTS tab in MyPack Portal, select Privacy Settings . Top Tips to Protect Your Privacy and Data Faculty/Staff Data Privacy @ NCSU The University publishes an directory online. You can update or remove your personal information by visiting this website: https://ssl.ncsu.edu/directory/updatelisting.php The University also maintains other personal information about you that you can view and update in the MyPack Portal: http://mypack.ncsu.edu Under the FOR Faculty and STAFF tab in MyPack Portal, select Employee Self-Service and then Personal Information Top Tips to Protect Your Privacy and Data Pick Good Passwords • Passwords should be hard to guess and longer is better • Use good passwords with strength appropriate for the importance of the site.
    [Show full text]
  • Facebook Graph Search POV
    January 2013 Facebook Graph Search POV Facebook Graph Search POV Introduction On January 15, 2013 Facebook introduced the world to Graph Search. Released in beta, Graph Search joins News Feed and Timeline as Facebook’s third foundational pillar, allowing users to search their social graphs with queries such as: • Friends who like Florence + the Machine • National Parks liked by people who speak Russian and live in Burlington, VT • Photos taken before 2005 Search results draw from any information a Page, place, group, app, game, or person has shared with connections or the public. The first version of Graph Search focuses on people, photos (excluding Instagram), places, and interests, but will expand to include data from posts, status updates, and third- party apps. Search results are unique to each person as no two social graphs are the same. Also, results are based not just on relationships, but rather strength of the relationships. A search for “People who like the things I like” might yield a set of results that look something like the image below. Since that particular search results in over 1,000 people it might be worth filtering. Using the column on the right, users can filter by categories like gender, relationship, current city, and employer. Figure 1 Sample Graph Search results for People who like the things I like 1 Facebook Graph Search POV Results are not just unique based on social graphs, they are also dependent on what Facebook determines to be the category of search. If Facebook thinks it’s a recruiting search the results will contain snippets of people’s work history.
    [Show full text]