International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 145

Research Paper | Information Technology | India | Volume 6 Issue 1, January 2017


Survey on: Privacy Strategy Presumption for Users Content on Sharing Sites

Nilesh N. Sahastrabuddhe | N. D. Kale [7]


Abstract: Usage of social medias has been considerably increasing no of pictures clients share through social destinations, keeping up protection has turned into a major issue, as per recent studies there are incidents where user accidently share the personal information sites like Facebook, twitter. For this reason there is need of tool which control the access of shared content. To overcome this problem, we propose an Adaptive Privacy Policy Prediction (A3P) framework to help clients make security settings for their pictures. To achieve this goal system access user preferences and image content and metadata information. We propose a two-level system which determines the best policy of users history and users image metadata which is being upload on the site. The proposed algorithm automatically generates the privacy prediction for each new image. - Social media, Adaptive Privacy Policy Prediction, metadata


Keywords: Social media, Adaptive Privacy Policy Prediction, metadata


Edition: Volume 6 Issue 1, January 2017,


Pages: 455 - 458


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Nilesh N. Sahastrabuddhe, N. D. Kale, "Survey on: Privacy Strategy Presumption for Users Content on Sharing Sites", International Journal of Science and Research (IJSR), Volume 6 Issue 1, January 2017, pp. 455-458, https://www.ijsr.net/get_abstract.php?paper_id=ART20164030

Similar Articles with Keyword 'Social media'

Downloads: 0

Research Paper, Information Technology, India, Volume 11 Issue 7, July 2022

Pages: 133 - 137

Wearable Computers of Leading Edge Generation and their Mystifying Mechanic's

Smital Wagh | Gunjan Behl

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Masters Thesis, Information Technology, Zimbabwe, Volume 11 Issue 4, April 2022

Pages: 383 - 388

Detection and Mitigation of Rogue Access Points

Hope Makoni

Share this Article
Top