Posts

Showing posts from October, 2022

Big Data from social media and risk of Ad targeting (Conclusion)

     Big Data and social media are young, fast-growing fields. It is believed that Big Data has the answers to many questions, and through skilled analysis, the answers to these questions seem to be within reach. On the other hand, wrong conclusions drawn from the data can lead to disastrous consequences, for which analysts should be held responsible. How information is used should be supervised, and decisions based on Big Data should be taken wisely and accurately. References  Clarke, R., (2016).  Big data, big risks. Information Systems  Journal, 26(1), pp.77-90. Available at: https://onlinelibrary-wiley-com.proxy.library.dmu.ac.uk/doi/pdfdirect/10.1111/isj.12088 (Accessed: 29 October 2022) Dhawan, V.  &  Zanini, N. (2014)  Big data and social media analytics. Research Matters: A Cambridge Assessment publication , 18, 36-41. Available at: https://www.cambridgeassessment.org.uk/Images/465...

Big Data from social media and risk of Ad targeting (Main body)

     It is assumed that Big Data provides access to information previously difficult to obtain, and all that thanks to social media. This information offers businesses a better consideration for understanding their customers. By analysing human behaviour, behavioural patterns, and the marks people leave behind online, organisations can analyse this data and extract its essence. After careful analysis of the data, businesses can target their products to the right consumers, build appropriate advertising, and draw conclusions as to when to run promotional campaigns and when to release products. (Dhawan & Zanini, 2014) Social networks such as Twitter, Instagram, Facebook and LinkedIn provide a substrate for extracting valuable data. The social media users' activity is endless; every interaction on the Internet leaves a trace, a trace from which businesses deduce and by analysis draw conclusions; this is possible thanks to social media, which is a phenomenon of today's ti...

Major Project Theme

Database      A database is a structured set of data usually stored on a computer. Databases can contain all sorts of information, such as transaction histories, customer data and simpler data such as age, names, text, images or pdf files. Therefore, data is everything that can be processed mentally and by computer. It is designed to simplify access to and management of data (Lutkevich & Hughes, 2021).The most important feature of data is its usability, that is the possibility of using it. The database usually controls Database Management Systems (DBMS) (Bhojaraju & Koganurmath, 2003). Simple databases have only one or a few tables, while more complex databases have thousands of tables.  According to Lutkevich and Hughes (2021), there are many types of Database, for example  : Relational - This database type defines relations in the database in the form of tables. It is the most common type of database and ...

Big Data from social media and risk of Ad targeting (Introduction)

     Big Data from social media and risk of Ad targeting      Patrick P. Gelsinger, the CEO of Intel, once said, "Data is the new science. Big Data holds the answers" ( Forbes, 2012) . Big Data is now ubiquitous. It is used in many fields, including marketing, transport, business, healthcare, government and public administration, cyber security and social media to gather information from various sources. Data processing is complex, but analysts can extract helpful information through analysis. Big Data consists of three characteristic values: Various, Volume and Velocity, called "3Vs" (Oracle 2022). This essay will introduce the use of Big Data from social media and the risks of inadequate data analysis concerning Ad targeting.     References  Forbes (2012)  Big Bets On Big Data.  Available at:  https://www.forbes.com/sites/ciocentral/2012/06/22/big-bets-on-big-data/?goback=%2Egde_2013423_member_127364385&sh=391ee5c4d...

Computer Ethics

Thou shalt not snoop around in other people's files: Reading other people’s e-mail messages is as bad as opening and reading their letters: This is invading their privacy. Obtaining other people’s non-public files should be judged the same way as breaking into their rooms and stealing their documents. Text documents on the Internet may be protected by encryption. Above we can see one of the Ten Commandments of Computer Ethics. Ethics is the identification of certain actions, by judging whether they are appropriate or inappropriate. Depending on the environment moral principles and social standards are different, therefore, as a result of consensus in a given social circle, they may differ. In the early days of computer history, there were no set laws about what could and could not be done online. With the spread of the Internet and computers, access became the norm for everyone. Nowadays, governments have enacted laws regarding Internet crimes. Because of the anonymity on the ...

Initial idea 2 : Phishing & scams

Phishing   & scams       The Internet is filled with valuable data that is protected by many security mechanisms. The biggest security vulnerability is the human being, who thoughtlessly and often unknowingly gives away this data or access to well-guarded accounts to hackers and scammers. There are many ways to acquire sensitive data from a user. One way to do this is through phishing - "an attempt to trick a user into divulging their private information" (Fox, 2022). This method involves pretending to be legitimate companies, websites, businesses even security services in order to make a deal or financial gain. Unaware of the scam users transfer money or provide their sensitive data and find out about the fraud after the fact.  According to the Office for National Statistics (2022), 3% of users who received a phishing message responded to the message, and 11% of them shared their sensitive data. Although this seems like a small...

Initial idea 1 - Operating Systems

An operating system (OS) is a software used to manage a computer system. It creates an environment that simplifies the use of other software. Thanks to it, the right amount of operating memory is allocated. The same happens with processor time: the operating system plans and allocates it appropriately for each task. The OS also manages files and network connections. Performing multiple tasks at the same time is possible thanks to the operating system. Modern interfaces included in operating systems facilitate communication between the user and the computer. The first operating system was GM-NAA I/O, developed in 1956 by General Motors for the IBM 704 (Patrick, 1987). Windows  is one of the most popular operating systems. The Windows operating system has been created around 1980s and has had several versions. Microsoft Windows comes pre-installed on most new PC hardware. With each new Windows update or release, Microsoft continues to work on improving the user experience, ...

Initial Project Plan (Gantt Chart)

Image
(Office Timeline. 2022)      This is a Gantt Chart, i've used https://www.officetimeline.com/ to create it. The Gantt Chart is useful for planning, for example, projects or ro admaps. In the picture shown above, there is an unfinished plan for this semester. You can see on it the amount of time I have planned to write each post. After publishing all the posts presenting the milestone I have placed, it signifies the achievement of a certain goal.  In the near future, I plan to do all the planning for this semester. I will publish it separately in this post so that you can see the different stages of creating the Gantt Chart.

Software and Hardware skills

  Software and Hardware skills I like to try new things, when some of my friends gets into something, like music production, I am starting to learn about it and trying it as well. I like to talk with them about hobbies that they are interested in and help them, so I have tried plenty hobbies in my life.  In the end, it comes out that I have attempted many things but I am good at a few. I also need time for my hobbies, stuff that interest me. These are  activities that I am spending the most of my time on.  Couple months ago I made a EDM beat, my cousin is making rap beat. He told me about making music and I liked it so I have spent some time on it. I was using FL Studio. It was short relation but i know basics :)  I like photography, when I was 11 years old I got my first digital camera. Since then, I have used a lot of photo editing software, such as Photoshop, Gimp and Lightroom. At the age of 19, I got my first DSLR camera with great video quality. I beg...

Introduction

More introduction ladies and gentlemen Why I started studying at DMU? There are a few reasons. I already lived in Leicester so relocation and finding myself in new place was not a problem. I went through it 2 years ago when I moved from Poland to Leicester. With my girlfriend we decided to move,  because she wanted to study here. There are organizations in Poland, that help people wanting to study aboard to achieve this. She went thought application process with them and so did I. It was so much easier then doing it on my own.  I am still not entirely sure whether I chose the right course for me, but I hope after this year I will have better understanding of Computer Science. It might help me in choosing the right path to my future career. I decided on Computer Science because it includes all of the IT studies, it is like "the mothership" of them. In third year you can choose from 4 different optional modules, like Functional Programming, Advanced Web Development,...

Welcome

Hello and Welcome I am a DMUIC student and this is my first blog ever. I have though about writing a blog previously but I have never done it, it is difficult, especially in my second language but let's give it a try. I will do my best to research the most valuable information about the topics I will write about. I want to show you   real point of view backed with true information. I take it seriously, because this is my life philosophy I always want to share and promote only the information that I am sure about, and only those which are supported by evidence. But first, I would like to introduce myself to you .  My name is Kornel, I was born in Poland in small town named Jawor. Jawor is home to around 20000 people and I was one of them.  I got my first computer when I was 7 years old. It opened the door to a new world for me. As time went by, I was more and more engrossed in discovering different programs and games, everything that came across on my way. There was n...