Skip to main content

Fixbook

INTRODUCTION
These days social media has become an integral part of our lives and consists of all our real-world experiences. It has become a norm to share everything we do to everywhere we go with the whole world using social media. But unknowingly many people sometimes share things which might reveal their personal information like phone numbers and locations. They don’t realize that what they are sharing might come back and bite them in the future. The only thing on their mind while posting a status is the idea of sharing their activities, because of which they don’t make an informed decision about the content. Our solution to this problem is to nudge the user when they are about to post something which might reveal their personal information like location or phone number or email address.  
Another problem that users face is finding posts and comments with undesirable content in their feed. Our solution to this is to hide such posts and comments.

METHODOLOGY
Nudge
We created a chrome extension to solve this problem which works for Facebook.
When the user starts typing a Facebook post the chrome extension issues a REST API server call with the status as the input, then the server processes it and a reply is sent stating whether the post contains any private information like location, phone number or email address. If it does, then the extension shows a nudge to the user telling them what kind of information they are sharing. After this, it's the user’s choice whether to ignore the nudge or edit the post.




Working of REST server
The server gets a string as input and then it uses a regex to check for phone numbers and email addresses in the string. It uses NLTK to check for a location in the string. While checking for the location it checks for the context as well for example ‘Delhi is an awesome place’ won’t fire the nudge but ‘moving to Delhi’ will.
A REST server was used because NLTK does not support Javascript and also so that all the computation is handled by the server and not the host. This would also make the whole process real-time.
 



Hiding Content
It takes a comma-separated list of words from the user that they deem undesirable. Whenever a new comment or post is loaded, using these keywords the extension checks if it contains one of the words if it does then that post or comment is hidden from that user’s timeline.



CONCLUSION
We successfully built a chrome extension with the desired functionalities. On posting a status with personal information, the extension nudged every time. However, we faced a few limitations. Due to the shortcomings of the NLTK library, the extension could not always accurately detect when the user is referring to a location.


THE TEAM



Group 3: [L-R] - Pahal Krishnia, Ishbir Walia, Aayushi Malik, Gargi Gupta, Varnit Jain


REFERENCES
1. http://www.django-rest-framework.org/
2. http://www.nltk.org/
3. https://developer.chrome.com/extensions/getstarted
4. https://docs.python.org/2/library/re.html
5. https://firebase.google.com

Comments

Popular posts from this blog

Identifying Tinder Profiles on Facebook

Identifying Tinder Profiles on Facebook In the online world, everything that you ever put is linked and connected. You might think that you’ve put some information on one platform and that’s it, you’re good to go. But you, my friend, are sadly mistaken. With this thought in mind and the privacy concerns linked with Online Social Media, we would like to introduce you to our problem statement: Identifying Facebook Profiles from Tinder Profiles. Given a tinder profile, our aim is to identify the corresponding Facebook profile of that person. We are addressing the linkability issue here and trying to highlight how more information than what you’ve mentioned on Tinder can be picked up from your Facebook profile. For those who don’t know, Tinder is a Dating Platform available for a Mobile Application and a Web App. It shows the geographically close profiles around you and you have an option to right swipe(Like) or left swipe(Dislike) them. When two people right swipe each other then it’

iFROOSN: Incentivised Fake Reviews On OSNs with Yelp as the reference

Yelp is an OSN primarily used to popularise the businesses and give reviews about those business. Yelp can be used as an efficient business expander for many upcoming restaurants/spas/saloons who always look for new customers. Problem Statement Our main objective of this course project was to target fake/incentivised reviews on yelp and give a credibility score using which a new user of Yelp can get an overall estimate about the restaurant he/she will visit .We developed an application which required an business ID of yelp as an input and it gave the credibility score as the output along with some inferred results in form of graphs Dataset The primary requirement before starting the project was collecting dataset for Yelp business and corresponding reviews and details about the user which post these reviews .The dataset was obtained through Yelp dataset challenge which was available for academic usage and result collections .The database had predefined schema and

Privacy Control

Online social networks have become an important part of our social lives, and their inherent privacy problems have become a major concern for users. As of March 2016, 142 million Indians maintain a social network profile on Facebook and 30 million on Twitter, which provides them with a convenient way to communicate with family, friends and even total strangers. The Services provided by social media though add convenience to our life to a great extent and have made the world a much closely connected, this boon comes with few hidden problems. Though social media lets users share a part of our life to the world, it also gives birth to the security threats to our personal information.  The users are confronted with a dichotomy between sharing information with their loved ones and friends and sharing information with everyone else on the internet. To help users tackle this dilemma, social networks provide a plethora of privacy settings which allow the user to control his/her pri