Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
2K views49 pages

Privacy and Security Combine Assignment 2023

The document provides a summary of key topics covered in Week 1 of the PSOSM 2023 course. It includes 10 multiple choice questions related to social media platforms, virtual environments in Python, Git commands, and concepts like anonymous social networks and the strength of weak ties. The questions cover identifying the correct online platform from an image, statements about anonymous social networks, commands to create a virtual environment in Python and stage files in Git, and identifying which concept is related to the strength of weak ties.

Uploaded by

heydev975
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views49 pages

Privacy and Security Combine Assignment 2023

The document provides a summary of key topics covered in Week 1 of the PSOSM 2023 course. It includes 10 multiple choice questions related to social media platforms, virtual environments in Python, Git commands, and concepts like anonymous social networks and the strength of weak ties. The questions cover identifying the correct online platform from an image, statements about anonymous social networks, commands to create a virtual environment in Python and stage files in Git, and identifying which concept is related to the strength of weak ties.

Uploaded by

heydev975
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 49

Week-1 PSOSM 2023

1. Which is the correct online platform, as depicted in Figure 1?

Figure 1

a) Koo
b) Blind
c) Reddit
d) LinkedIn
2. Which of the following statement(s) is/are true about
Anonymous social networks?

a. Anonymous social networks help in providing enhanced privacy


and anonymity.
b. Anonymous social networks provide more freedom of expression.
c. Anonymous social networks reduce the fear of judgment or social
consequences.
d. None of the above

3. Choose the correct option to create a virtual environment in


Python
a. python3 -m venv <path_to_virtual_environment>
b. python3 venv -m <path_to_virtual_environment>
c. virtualpython3 -m venv
d. virtualenv python3 -m venv myenv

4. Why is it important to create a virtual environment in Python?


a. Creating a virtual environment isolates project dependencies
and prevents conflicts between different projects.
b. Creating a virtual environment enhances the performance of
Python programs.
c. Creating a virtual environment to ensure compatibility with
different operating systems.
d. Creating a virtual environment optimises memory usage in
Python applications.
5. Fill in the correct option to stage files/directories.

a) Modified, Unmodified
b) Unmodified, modified
c) modified, unstaged
d) Modified, tracked

6. Which command lists all the remote addresses associated with a local repository?
a. git remote -v
b. git pull origin master
c. Git stash
d. Git checkout

7. Which of the following concept is closely related to the fact that infrequent, arms-length
relationships are more beneficial for employment opportunities, promotions, and wages than
strong ties?
a. Six degrees of separation
b. Small world phenomenon
c. Strength of weak ties
d. None of the above

8. Which of the following is/are shortcomings of online social media platforms?


a) Spread of misinformation
b) Cyberbullying and harassment
c) Addiction and time consumption
d) limited control over privacy
9. When a piece of content, such as a video, meme, or news article, gains attention on social
media platforms, it can quickly reach a large audience within a short period. Which V of social
media does it refer to?
a. Velocity
b. Veracity
c. Value
d. Volume

10. What is the primary purpose of the Gab platform?

A) To promote free speech


B) To facilitate online shopping experience
C) It provides educational resources
D) support for professional networking
Week-2 PSOSM 2023

1. What is the primary data format utilised by the Reddit API when returning information?
a. JSON
b. XML
c. HTML
d. CSV

2. JSON stands
a) JavaScript Object Notation
b) JavaScript Object Network
c) JavaScript Oriented Notation
d) JavaScript Oriented Namespace

3. Suppose you want to retrieve the top 5 hottest posts from the subreddit "r/technology"
using the Reddit API. Which Python library would you most likely use to achieve this?
a. PRAW
b. Requests
c. Urllib
d. JSON

Explanation: PRAW (Python Reddit API Wrapper) is a Python library designed explicitly for
interacting with the Reddit API. Using PRAW, you can easily retrieve the top 5 hottest posts from the
subreddit "r/technology" and perform various other interactions with the Reddit platform.

4. You want to fetch the details of the 10 hot posts from the subreddit "r/worldnews" using
the Reddit API in Python. Which is the correct code snippet from below options?

a) import praw
reddit = praw.Reddit(client_id='MY_CLIENT_ID',
client_secret='MY_CLIENT_SECRET', user_agent='MY_USER_AGENT')
posts = reddit.subreddit('worldnews').hot(limit=10)
for post in posts:
print(post.title)

b) import requests
url = "https://www.reddit.com/r/worldnews/new.json?limit=10"
response = requests.get(url)
data = response.json()
for post in data['data']['children']:
print(post['data']['title'])
c) import praw
reddit = praw.Reddit(client_id='MY_CLIENT_ID',
client_secret='MY_CLIENT_SECRET', user_agent='MY_USER_AGENT')
posts = reddit.subreddit('worldnews').new(limit=10)
for post in posts:
print(post.title)
d) None of the above

5. Which of the following tweet content falls in category of linguistic features?


a. Number of followers
b. Presence of negative emotion words
c. Presence of smiley
d. Presence of pronouns

6. Why do we do network analysis on social media platforms?


a) To analyze the performance of computer networks and improve data transmission
speeds.
b) To understand the social structures and relationships between individuals or entities in
a network.
c) To study the behavior of network protocols and optimize their efficiency.
d) To identify and analyze patterns of diseases spreading within a population.

7. Which of the following is a recent example of misinformation spread on social media


platforms?
a) Tweet claiming that a particular brand of COVID-19 vaccine causes severe side
effects, with no evidence to support the claim.
b) Facebook post sharing information from a well-known health organization about the
effectiveness of vaccination.
c) Instagram story containing accurate information about a recent political development
with credible sources cited.
d) YouTube video providing a detailed explanation of climate change supported by
scientific evidence.

8. Given a MongoDB collection named "employees" with the following document structure:

{
"_id": ObjectId("615243d88f0ae43f255874c1"),
"name": "Ram",
"department": "CSE",
"age": 35,
"salary": 50000
}

What MongoDB query would you use to retrieve all employees with a salary greater than
or equal to 60000?

a) db.employees.find({ "salary": { $gte: 60000 } })


b) db.employees.find({ "salary": { $gt: 60000 } })
c) db.employees.find({ "salary": { $lte: 60000 } })
d) db.employees.find({ "salary": { $lt: 60000 } })

9. You are developing a social media platform, and you have a database table, "posts" to
store user posts. The "posts" table schema is given below:

CREATE TABLE posts (


post_id INT PRIMARY KEY,
user_id INT,
post_content TEXT,
post_date DATETIME
);

Now, you want to retrieve the 5 most recent posts made by a specific user with the user
ID "12345". Which SQL query would you use?

a) SELECT * FROM posts WHERE user_id = 12345 ORDER BY post_date DESC LIMIT
5;

b) SELECT * FROM posts WHERE user_id = 12345 ORDER BY post_id DESC LIMIT 5;

c) SELECT * FROM posts WHERE user_id = 12345 ORDER BY post_date ASC LIMIT
5;

d) SELECT * FROM posts WHERE user_id = 12345 ORDER BY post_id ASC LIMIT 5;

10. What is the Facebook Graph API as discussed in lecture?

a) An API that provides access to a user's Facebook friends list.


b) An API that allows developers to create and manage Facebook pages.
c) An API that enables developers to integrate Facebook login into their applications for
user authentication.
d) An API that provides access to a wide range of user data, interactions, and
connections on Facebook.
Week-3 PSOSM 2023

1. Consider the below response:


“To this segment, consumer privacy is very important; they feel that they have been
victims of privacy invasions, they are pessimistic about the future of privacy protection,
and about a third of them favour creating a general federal regulatory agency on
consumer privacy.”

To which of the three Westin Privacy categories is "they" in the above sentence most
likely to fall?
a. Fundamentalists
b. Pragmatists
c. Unconcerned
d. None of the above

2. Which of the following features is used by the credibility model- TweetCred?


a. Tweet links
b. Tweet Author
c. Tweet network
d. Tweet meta data

3. Cronbach’s alpha
a. determines the statistical significance of a research study.
b. assess the reliability and internal consistency of a questionnaire.
c. analyze the effect size of an intervention.
d. calculate the standard deviation of a sample population.

4. Suppose we have five tweets (TW1, TW2, TW3, TW4, and TW5) with their relevances based
on user feedback or relevance labels:
TW1: Highly relevant tweet (Relevance = 2)
TW2: Moderately relevant tweet (Relevance = 1)
TW3: Not relevant tweet (Relevance = 0)
TW4: Relevant tweet (Relevance = 1)
TW5: Highly relevant tweet (Relevance = 2)

Now, let's assume the ranking algorithm generates a ranked list of tweets:

Rank 1: TW5 (Highly relevant tweet)


Rank 2: TW1 (Highly relevant tweet)
Rank 3: TW3 (Not relevant tweet)
Rank 4: TW2 (Moderately relevant tweet)
Rank 5: TW4 (Relevant tweet)
What would be NDCG@5 for this ranked list of tweets?

a. 0.5
b. .513
c. .975
d. None of the above

Solution:
Step 1: Calculate DCG@5 (Discounted Cumulative Gain at rank 5).
Step 2: Calculate IDCG@5 (Ideal Discounted Cumulative Gain at rank 5).
Step 3: Divide DCG@5 by IDCG@5 to get NDCG@5.

Step 1: Calculate DCG@5 DCG@5 = rel1 + rel2/log2(2) + rel3/log2(3) + rel4/log2(4) +


rel5/log2(5)

Given relevances: rel1 = 2 (for TW5) rel2 = 2 (for TW1) rel3 = 0 (for TW3) rel4 = 1 (for TW2) rel5
= 1 (for TW4)

DCG@5 = 2 + 2/log2(2) + 0/log2(3) + 1/log2(4) + 1/log2(5) DCG@5 = 2 + 2/1 + 0 + 1/2 + 1/2


DCG@5 = 4 + 0.5 + 0.5 DCG@5 = 5

Step 2: Calculate IDCG@5 (Ideal DCG@5) To calculate IDCG@5, we consider the ideal ranking
based on relevance:

Ideal ranking: TW5 (Highly relevant tweet) > TW1 (Highly relevant tweet) > TW2 (Moderately
relevant tweet) > TW4 (Relevant tweet) > TW3 (Not relevant tweet)

IDCG@5 = rel1 + rel2/log2(2) + rel3/log2(3) + rel4/log2(4) + rel5/log2(5)


For ideal ranking: rel1 = 2 (for TW5) rel2 = 2 (for TW1) rel3 = 1 (for TW2) rel4 = 1 (for TW4) rel5
= 0 (for TW3)
IDCG@5 = 2 + 2/log2(2) + 1/log2(3) + 1/log2(4) + 0/log2(5) IDCG@5 = 2 + 2/1 + 1/1.585 + 1/2 +
0 IDCG@5 = 2 + 2 + 0.63 + 0.5 IDCG@5 = 5.13
Step 3: Calculate NDCG@5 NDCG@5 = DCG@5 / IDCG@5
NDCG@5 = 5 / 5.13
NDCG@5 ≈ 0.975 (rounded to three decimal places)
So, the NDCG@5 for the ranked list of tweets is approximately 0.975.
Read through the report “Privacy in India: Attitudes and Awareness V 2.0” at
https://cdn.iiit.ac.in/cdn/precog.iiit.ac.in/research/privacyindia/PI_2012_Complete_Report.pdf
And answer the following questions [5-7].

5. How many participants have changed their default settings on their social network?
a. 75%
b. 60%
c. 50%
d. 25%

6. What is the primary purpose of a Focus Group Discussion (FGD) in the above report?

a. To conduct one-on-one interviews with participants.


b. To collect quantitative data through surveys and questionnaires.
c. To observe participants' behaviours in a controlled environment.
d. To facilitate group discussions and gather qualitative insights.

7. “When you hear the word privacy, what comes to mind”. Which is the most common
respondent answer according to the above report?
a. Information Privacy
b. Bodily privacy
c. Communication privacy
d. Territorial privacy

8. Consider the below graph and choose the correct option:


a. For 82% of the users, the response time was less than 2 seconds, and for 99%,
the response time was under 10 seconds.
b. For 99% of the users, the response time was less than 6 seconds, and for 100%,
the response time was under 10 seconds.
c. For 82% of the users, the response time was less than 6 seconds, and for 99%,
the response time was under 10 seconds.
d. None of the above

9. What is the Likert scale?

a. rating scale in surveys and questionnaires


b. gives the score for any real-time tweets
c. Interannotator agreement
d. None of the above

10. TweetCred is
a. a real-time web-based system to automatically evaluate the credibility of content on
Twitter.
b. a real-time app-based system to automatically evaluate the score of tweets on Twitter.
c. a real-time app-based system to automatically assess the quality of content on Twitter.
d. None of the above
Week-4 PSOSM 2023

Question 1: What is the critical challenge that Latanya Sweeney's research on k-anonymity
addresses?
a) make datasets larger for analysis
b) eliminate data from datasets
c) anonymise data without losing utility
d) ignore research utility for better privacy

Suppose you're working on a project that involves analysing sales data for a chain of stores.
You are provided with a list of daily sales figures for a particular product over some time. The
task is to calculate various statistics such as the total sales, average sales, and maximum sales
for that product. Answer the following questions [2-4]:

Question 2: Which data structure can significantly enhance the efficiency and simplicity of your
calculations?
a. Python numpy list
b. Python numpy array
c. Python variables
d. None of these

Question 3: Fill in the correct function calculate_total_sales(sales_list) which calculates the total
sales from a list of daily sales figures using NumPy in the below code

import numpy as np

def calculate_total_sales(sales_list):
<<<write your code here>>>>

return total_sales

daily_sales = [1200, 1500, 1300, 1400, 1800, 1600]


total_sales = calculate_total_sales(daily_sales)
print("Total sales:", total_sales)

a. sales_array = np.array(sales_list)
total_sales = np.sum(sales_array)
b. sales_array = np.list(sales_list)
total_sales = np.sum(sales_array)
c. sales_array = np.array(sales_list)
total_sales = np.sum(np.concatenate(sales_array,sales_list))
d. None of the above

Question 4: Fill in the correct function calculate_maximum_sales(sales_list) which calculates


the maximum sales from a list of daily sales figures using NumPy in the below code

import numpy as np

def calculate_maximum_sales(sales_list):
<<<write your code here>>>>
return max_sales

daily_sales = [1200, 1500, 1300, 1400, 1800, 1600]


maximum_sales = calculate_maximum_sales(daily_sales)
print("Maximum sales:", maximum_sales)

a. sales_array = np.array(sales_list)
max_sales = np.max(sales_array)
b. sales_array = np.list(sales_list)
max_sales = np.max(sales_array)
c. sales_array = np.array(sales_list)
max_sales = np.max(np.concatenate(sales_array,sales_list))
d. None of the above

Imagine you have a NumPy array representing your monthly expenses for the past year. Each
array element corresponds to the total expenses (in dollars) for a specific month. The task is to
analyze and extract specific information.

import numpy as np

expenses_array = np.array([1200, 1500, 1300, 1400, 1800, 1600, 1400, 1250, 1350, 1500,
1700, 1900])

Answer the following questions from [5-7]:

Question 5: How would you extract expenses for the second half of the year (July to
December)?
a. second_half_expenses = expenses_array[6:]
b. second_half_expenses = expenses_array[5:]
c. second_half_expenses = expenses_array[:12]
d. second_half_expenses = expenses_array[7:]
Question 6: Identify the months where expenses exceeded $1600.
a. high_expense_months = np.where(expenses_array < 1600)[0]
b. high_expense_months = np.where(expenses_array > 1600)[0]
c. high_expense_months = np.where(expenses_array > 1600))
d. high_expense_months = np.where(expenses_array > 1600)[0] + 1

Question 7: Calculate the average expenses for the first quarter of year.

a. first_quarter_average = np.mean(expenses_array[:4])
b. first_quarter_average = np.mean(expenses_array[:2])
c. first_quarter_average = np.mean(expenses_array[:3])
d. first_quarter_average = np.mean(expenses_array[:6])

Question 8: Choose the correct option for “result”

import pandas as pd
data = {
'Product': ['A', 'B', 'A', 'B', 'C', 'A', 'C', 'B', 'C', 'A'],
'Category': ['Electronics', 'Clothing', 'Electronics', 'Clothing', 'Home', 'Electronics', 'Home',
'Clothing', 'Home', 'Electronics'],
'Price': [500, 40, 600, 35, 100, 550, 80, 30, 90, 480]
}

sales_df = pd.DataFrame(data)
grouped = sales_df.groupby('Category')
result = grouped.agg({
'Price': ['sum', 'mean']
}).reset_index()
# Rename the columns
result.columns = ['Category', 'Total Revenue', 'Average Price']
print(result)

a.
Category Total Revenue Average Price

0 clothing 105 35.00

1 electronics 1630 543.33

2 home 270 90.00


b.
Category Total Revenue Average Price

0 clothing 1630 35.00

1 electronics 105 543.33

2 home 270 90.00

c.
Category Total Revenue Average Price

0 clothing 105 35.00

1 electronics 270 90.00

2 home 1630 543.33

d. None of the above

Question 9: What is the primary goal of k-anonymity in data privacy?

A) Ensure that every attribute in the dataset is unique.


B) Prevent unauthorised access to the dataset.
C) Minimize the amount of data collected.
D) Making it difficult to link specific individuals to their records.

Question 10: What will be the output of the below code:


import numpy as np
import matplotlib.pyplot as plt
time = np.linspace(0, 2 * np.pi, 1000)
amplitude = 1.0
frequency = 1.0
sine_wave = amplitude * np.sin(frequency * time)
plt.figure(figsize=(8, 6))
plt.plot(time, sine_wave, label='Sine Wave', color='blue')
plt.title('Sine Wave')
plt.xlabel('Time')
plt.ylabel('Amplitude')
plt.legend()
plt.grid(True)
plt.show()

a. A plot consisting of sine wave


b. A plot consisting of cosine wave
c. Logical error in code
d. None of the above

Solutions

1. Refer to lecture Week 4.1


2. In this example, by converting the sales data into a NumPy array, you can use
the np.sum() function to easily calculate the total sales with just one line of code.
NumPy's built-in functions are optimized for numerical computations and can
provide better performance compared to traditional looping through a Python list.
Converting the sales list to a NumPy array also opens up the possibility to
perform various other mathematical operations (such as calculating the average,
finding the maximum sales, etc.) efficiently and with concise code.

Question 3 to 8 and Q10 -please run the code


Q8: correct answer (code)
9. D) Making it difficult to link specific individuals to their records.

K-anonymity is a technique used in data privacy to protect individual identities


within a dataset. The primary goal of k-anonymity is to make it difficult to identify
specific individuals by ensuring that each record is indistinguishable from at least
k-1 other records with respect to certain attributes.

Options A, B, and C are not accurate descriptions of the primary goal of


k-anonymity. While ensuring uniqueness, preventing unauthorized access, and
minimizing data collection are important considerations for data privacy, they are
not the central focus of k-anonymity.
Week-5 PSOSM 2023

Question 1: How do Online Social Networks improve public Communication between police and
residents?
a. provide actionable information and collective action
b. provide mutual accountability
c. understand fear and victimisation effects
d. help to contact concerned authorities

Question 2: Which of the following are examples of actionable information?


a. OSN post regarding traffic issues on the road
b. OSN post regarding open potholes on the road
c. OSN post sharing about Azaadi ka Amrit Mahotsav celebrations in the locality
d. None of the above

Question 3: What type of actionable information is highlighted in (bold) the below example?

a. Temporal data
b. Spatial data
c. Linguistic data
d. None of the above

Question 4: Given below are two types of communication as discussed in the lecture.
a. Formal and Formal
b. Informal and Formal
c. Informal and Informal
d. Formal and Informal

Question 5: How would you identify emotional and psychological states based on the written
text?
a. LIWC
b. K-means clustering
c. N-gram analysis
d. All of the above

Question 6: Consider a sentence "ISRO launched Chandrayaan and conducted experiments on


thermophysical properties and environment". What is the thematic content and subject matter
being discussed?

a. The linguistic diversity of the sentence.


b. The emotional tone is conveyed in the sentence.
c. The grammatical structure of the sentence.
d. The activities and research conducted by ISRO.

Question 7: What does an “n” represent in the n-gram analysis of a sentence?

a. The number of emotions in the analysis.


b. The number of words in each n-gram.
c. The number of characters in each n-gram.
d. The number of different languages in the sentence.

Question 8: A sentiment analysis study analyses a text passage for valence and arousal values.
On a scale of -1 to 1, the valence and arousal score is 0.75 and 0.85. What do these values
suggest about the emotional characteristics of the text?
a. Negative sentiment, low emotional intensity
b. Positive sentiment, High emotional intensity
c. Negative sentiment, high emotional intensity
d. Positive sentiment, low emotional intensity

Question 9: A social media analyst is studying the engagement characteristics (likes, comments,
and shares) of three different posts on a platform. The engagement counts for each post over a
week are as follows:

Post 1: 120 likes, 30 comments, 15 shares


Post 2: 80 likes, 45 comments, 20 shares
Post 3: 100 likes, 25 comments, 10 shares

Calculate the mean engagement (average likes, comments, and shares) for each post and then
find the standard deviation of engagement for the entire set of posts. Based on the standard
deviation, which post shows the highest variability in engagement characteristics?

A) Post 1
B) Post 2
C) Post 3
D) All posts show similar variability.

Question 10: What kind of post and sentiment is depicted in the below example?
“Absolutely disgusted by the state of our local park! It's been months since we reported the
broken playground equipment, and nothing has been done. Our kids deserve better!”
a. Citizen-initiated and positive
b. Public authority-initiated and negative
c. Citizen-initiated and negative
d. Public authority-initiated and positive
Solutions:
Question 9:

Mean Engagement for each post:

Post 1: (120 + 30 + 15) / 3 = 55 engagements


Post 2: (80 + 45 + 20) / 3 = 48.33 engagements (rounded off)
Post 3: (100 + 25 + 10) / 3 = 45 engagements

Calculate the Standard Deviation of Engagement for all posts:


Calculate the mean engagement across all posts: (55 + 48.33 + 45) / 3 ≈ 49.44 engagements
Calculate the squared differences from the mean for each post:
Post 1: (55 - 49.78)^2 ≈ 27.07
Post 2: (48.33 - 49.78)^2 ≈ 2.11
Post 3: (45 - 49.78)^2 ≈ 22.98
Calculate the average of the squared differences: (27.07 + 2.11 + 22.98) / 3 ≈ 17.05

Calculate the square root of the average (which is the standard deviation): √17.05 ≈ 4.13

Based on the standard deviation values, Post 1 shows the highest variability in engagement
characteristics among the three posts.

Likes comments shares Mean Engagement


Post 1[ 120 30 15 ] 55
Post 2[ 80 45 20 ] 48.33
Post 3 [100 25 10 ] 45

Across all rows → Average of matrix= 49.78 → overall engagement


Across all rows → Standard deviation= 4.13
17/10/2023, 00:10 Privacy And Security In Online Social Media - - Unit 8 - E-crime and social media

(https://swayam.gov.in) (https://swayam.gov.in/nc_details/NPTEL)

[email protected]

NPTEL (https://swayam.gov.in/explorer?ncCode=NPTEL) » Privacy And Security In Online Social

Media (course)

If already
registered, click
to check your
Week 6: Assignment 6
payment status The due date for submitting this assignment has passed.
Due on 2023-09-06, 23:59 IST.

Course Assignment submitted on 2023-09-06, 19:19 IST


outline
1) Consider the following scenario on a social network 1 point

How does an A is friends with B and C.


NPTEL
B is friends with A and D.
online
C is friends with A and D.
course
D is friends with B and C.
work? ()

Calculate the betweenness centrality for A, B, C, and D. Identify the individual having the highest
Prerequisite
betweenness centrality.
Assignment
() A
B
Welcome to
PSOSM C
class () All of them have the same betweenness centrality
Yes, the answer is correct.
Introduction Score: 1
to Social Accepted Answers:
Media API () All of them have the same betweenness centrality

Misinformati 2) What does indegree centrality measure in the social media and network analysis 1 point
on and context?
Privacy ()
The level of activity a user has on the platform.
Privacy and The number of outgoing connections a user has with other users.
Pictures on

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=47&assessment=130 1/4
17/10/2023, 00:10 Privacy And Security In Online Social Media - - Unit 8 - E-crime and social media

Online Social A user's popularity based on their followers or incoming connections.


Media ()
The diversity of content shared by a user.

Policing and Yes, the answer is correct.


Social Media Score: 1
() Accepted Answers:
A user's popularity based on their followers or incoming connections.

E-crime and 3) What does betweenness centrality depict about the node? 1 point
social media
() One who is quickly approachable
Who is close to everyone
Week 6.1:
eCrime on One who is most influential
Online Social All of the above
Media (unit?
No, the answer is incorrect.
unit=47&lesso
Score: 0
n=48)
Accepted Answers:
Week 6.2 One who is quickly approachable
eCrime on
Online Social 4) What is link farming? 1 point
Media (unit?
unit=47&lesso Agricultural practice that involves cultivating crops in a vertical arrangement.
n=49)
Rapidly growing links on a website through unethical or manipulative means.
Tutorial 4 A strategy for developing social connections by attending networking events.
Social Network
All of the above
Analysis (unit?
unit=47&lesso Yes, the answer is correct.
n=50) Score: 1
Accepted Answers:
Quiz: Week 6: Rapidly growing links on a website through unethical or manipulative means.
Assignment 6
(assessment?
5) Spamming the index of search engines is called 1 point
name=130)

Week 6 Spamdexing
Feedback Spamexing
Form : Privacy
Spamming
and Security in
Online Social None of the above
Media (unit?
Yes, the answer is correct.
unit=47&lesso Score: 1
n=51) Accepted Answers:
Spamdexing
Social media
Spamexing
and ecrime ()

6) Calculate the Klout score based on the following engagement metrics for a user on 0 points
Identity
online social media.
resolution
and social
Number of retweets: 50
media ()
Number of likes: 150
Number of comments: 100
Research
papers: Number of followers: 500
Location Number of mentions: 30

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=47&assessment=130 2/4
17/10/2023, 00:10 Privacy And Security In Online Social Media - - Unit 8 - E-crime and social media

based 230
Privacy ()
330

Research 430
Papers Part - 530
II ()
Yes, the answer is correct.
Score: 0
Week 11: Accepted Answers:
Summary () 330

7) Which of the following is considered as “social etiquette” on online social media 1 point
Lecture
such as Twitter?
materials/Not
es ()
Following back
Comment on the post of an influential person
Text
Transcripts () Giving likes to the post of an influential person
Saying “Thank you” to any appreciation by an influential person
Download
Yes, the answer is correct.
videos () Score: 1
Accepted Answers:
Books () Following back

Problem 8) A psychological principle where individuals feel compelled to return favours and 1 point
Solving interactions they receive is called
Session -
July 2023 () Spamming
Reciprocity
Link farming
All of the above

Yes, the answer is correct.


Score: 1
Accepted Answers:
Reciprocity

9) Which of the following is/are graph centrality measures? 1 point

Eigen centrality
Node degree
Betweenness centrality
Closeness centrality

Yes, the answer is correct.


Score: 1
Accepted Answers:
Eigen centrality
Node degree
Betweenness centrality
Closeness centrality

10) Which of the following are spam targets? 1 point

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=47&assessment=130 3/4
17/10/2023, 00:10 Privacy And Security In Online Social Media - - Unit 8 - E-crime and social media

A
B
C
S

Yes, the answer is correct.


Score: 1
Accepted Answers:
A
B

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=47&assessment=130 4/4
17/10/2023, 00:10 Privacy And Security In Online Social Media - - Unit 9 - Social media and ecrime

(https://swayam.gov.in) (https://swayam.gov.in/nc_details/NPTEL)

[email protected]

NPTEL (https://swayam.gov.in/explorer?ncCode=NPTEL) » Privacy And Security In Online Social

Media (course)

If already
registered, click
to check your
Week 7: Assignment 7
payment status The due date for submitting this assignment has passed.
Due on 2023-09-13, 23:59 IST.

Course Assignment submitted on 2023-09-12, 00:35 IST


outline
1) Consider the following statement: "Hello everyone!!!, Are you enjoying psosm 1 point
course --- and learning new skills." Choose the correct code to convert it to unpunctuated
How does an string
NPTEL
online
course
work? ()

Prerequisite
Assignment
()

Welcome to
PSOSM
class ()

Introduction
to Social
Media API ()

Misinformati
on and
Privacy ()

Privacy and
Pictures on

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=52&assessment=131 1/5
17/10/2023, 00:10 Privacy And Security In Online Social Media - - Unit 9 - Social media and ecrime

Online Social None of these


Media ()
Yes, the answer is correct.
Score: 1
Policing and
Accepted Answers:
Social Media
()

E-crime and
social media
()

Social media 2) Consider the following code: 1 point


and ecrime ()

Week-7.1: Link
Farming in
Online Social
Media (unit?
unit=52&lesso
n=53)
Which of the following is the correct option?
Week-7.2:
Nudges (unit? This code is used to retrieve an ascending sorted list having two tuples.
unit=52&lesso This code is used to retrieve a descending sorted list having two tuples.
n=54)
This code retrieves two tuples in a sorted or unsorted manner.
Week-7.3: This code returns a logical error.
Semantic
attacks: Spear Yes, the answer is correct.
Score: 1
phishing (unit?
Accepted Answers:
unit=52&lesso
This code is used to retrieve a descending sorted list having two tuples.
n=55)

Tutorial 5: 3) Which of the following are not stopwords in the following list? 1 point
Analyzing text
using Python
stopwords = ["i", "me", "my", "myself", "we", "our", "ours", "ourselves", "you", "your", "yours",
NLTK (unit?
"yourself", "yourselves", "he", "him", "his", "himself", "she", "her", "hers", "herself", "it", "its",
unit=52&lesso
n=56) "itself", "they", "them", "their", "theirs", "themselves", "what", "which", "who", "whom", "this", "that",
"these", "those", "am", "is", "are", "was", "were", "be", "been", "being", "have", "has", "had",
Quiz: Week 7: "having", "do", "does", "did", "doing", “apple”, "a", "an", "the", "and", "but", "if", "or", "because",
Assignment 7
"as", "until", "while", "of", "at", "by", "for", "with", "about", "against", "between", "into", "through",
(assessment?
"during", "before", "after", "above", "below", "to", "from", "up", "down", "in", "out", "on", "off", "over",
name=131)
"under", "again", "further", "then", "once", "here", "there", "when", "where", "why", "how", "all",
Week 7 "any", "both", "each", "few", "more", "most", "other", "some", "such", "no", "nor", "not", "only",
Feedback "own", "same", "so", "than", "too", "very", "s", "t", "can", "will", "just", "don", "should", "now"]
Form : Privacy
and Security in All of the above are stopwords.
Online Social
Further, again, apple
Media (unit?
unit=52&lesso While, apple
n=57) apple

Identity Yes, the answer is correct.


Score: 1
resolution
Accepted Answers:
apple

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=52&assessment=131 2/5
17/10/2023, 00:10 Privacy And Security In Online Social Media - - Unit 9 - Social media and ecrime

and social
4) Which elements in the below sample mail make it potentially phishing email, as 1 point
media ()
discussed in the lecture?

Research
papers:
Location
based
Privacy ()

Research
Papers Part -
II ()

Week 11:
Summary ()

Lecture
materials/Not
es ()

Text
Transcripts () Urgency in subject
Regrettable information in the body
Download
Potential phishing link along with body
videos ()
All of the above

Books () Yes, the answer is correct.


Score: 1
Problem Accepted Answers:
All of the above
Solving
Session -
July 2023 () 5) Which of the following is correct statement as discussed in the lecture? 1 point

Younger participants were more vulnerable to phishing attacks.


Older participants were more vulnerable to phishing attacks.
Younger and older participants were equally vulnerable to phishing attacks.
No one is vulnerable to phishing attacks.

Yes, the answer is correct.


Score: 1
Accepted Answers:
Younger participants were more vulnerable to phishing attacks.

6) In a scientific experiment, which group refers to manipulating the independent 1 point


variable?

Observational group
Comparison group
Control group
Experimental group

Yes, the answer is correct.

S 1

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=52&assessment=131 3/5
17/10/2023, 00:10 Privacy And Security In Online Social Media - - Unit 9 - Social media and ecrime

Score: 1
Accepted Answers:
Experimental group

7) Which of the following is/are the advantages of having privacy policies? 1 point

To help users make informed decisions with the information that is presented to them
To help individuals avoid regrettable online disclosures
Both a and b are correct
None of the above

Yes, the answer is correct.


Score: 1
Accepted Answers:
Both a and b are correct

8) Which of the following nudges is depicted in the figure below? 1 point

Timer nudge
Picture nudge
Sentiment nudge
All of the above

Yes, the answer is correct.


Score: 1
Accepted Answers:
Picture nudge

9) As discussed in the lecture, which of the following is/are not a social media nudge? 1 point

Timer Nudge
Picture Nudge
Sentiment Nudge
Voice Nudge

Yes, the answer is correct.


Score: 1
Accepted Answers:
Voice Nudge

10) Which of the following has the property of having high indegree and high outdegree 1 point
on online social media?

Top Link farmers

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=52&assessment=131 4/5
17/10/2023, 00:10 Privacy And Security In Online Social Media - - Unit 9 - Social media and ecrime

Random social network users


Top Spammers
All of the above

Yes, the answer is correct.


Score: 1
Accepted Answers:
Top Link farmers

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=52&assessment=131 5/5
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 10 - Identity resolution and social media

(https://swayam.gov.in) (https://swayam.gov.in/nc_details/NPTEL)

[email protected]

NPTEL (https://swayam.gov.in/explorer?ncCode=NPTEL) » Privacy And Security In Online Social

Media (course)

If already
registered, click
to check your
Week 8 : Assignment 8
payment status The due date for submitting this assignment has passed.
Due on 2023-09-20, 23:59 IST.

Course Assignment submitted on 2023-09-19, 01:04 IST


outline
1) What are the different approaches to profile linking? 1 point

How does an Study and analyse common attributes (place of work, profile picture, name, etc.) across
NPTEL different social media platforms
online
Check important attributes such as the same emails, locations, and contact numbers (if
course
available) used across multiple platforms
work? ()
Only looking at the user posting behaviour on social media platforms will help in profile
linking.
Prerequisite
Assignment It is not possible to find the same user profiles on different social media platforms.
() Yes, the answer is correct.
Score: 1
Welcome to Accepted Answers:
PSOSM Study and analyse common attributes (place of work, profile picture, name, etc.) across
class () different social media platforms
Check important attributes such as the same emails, locations, and contact numbers (if
Introduction available) used across multiple platforms
to Social
Media API () 2) Which of the following statements is/are true regarding username change on social 1 point
media?
Misinformati
on and S1: Changes to any profile attribute other than username do not lead to unreachability to the user
Privacy () profile.
S2: The potential benign reasons for username change include space gain, suiting a trending
Privacy and event, gaining/losing anonymity, adjusting to real-life events, and avoiding boredom.
Pictures on

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=58&assessment=133 1/4
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 10 - Identity resolution and social media

Online Social S3: The malicious intentions for username change may include obscured username promotion
Media () and username squatting.
S4: Search by the user’s old username results in a failed attempt to reach the user’s profile,
Policing and potentially making others falsely believe that the user account has been deactivated.
Social Media
() Only S1 and S4 are correct
Only S1, S2, and S3 are correct
E-crime and S1, S2, and S4 are correct
social media
All S1, S2, S3, S4 are correct.
()
No, the answer is incorrect.
Social media Score: 0
and ecrime () Accepted Answers:
All S1, S2, S3, S4 are correct.
Identity 3) Below is the graph of username change. Which of the following is correct inference 0 points
resolution from the graph (as discussed in the lecture)?
and social
media ()

Week 8.1:
Profile Linking
on Online
Social Media
(unit?
unit=58&lesso
n=59)

Week 8.2:
Anonymous
Networks
(unit? Around 35 per cent, of the users change their profile picture at least 3 times.
unit=58&lesso Around 60-70 percent of the users change their usernames atleast once.
n=60)
Around 35 percent of the users change their profile picture atmost 3 times.
Tutorial 6: Around 50-55 per cent of users have changed their descriptions thrice.
Gephi Network
Visualization Yes, the answer is correct.
(unit?
Score: 0
unit=58&lesso Accepted Answers:
n=61) Around 35 per cent, of the users change their profile picture at least 3 times.

Quiz: Week 8
4) Why do whisper users have a low clustering coefficient over the network? 1 point
: Assignment
8 Whisper users are likely to interact with complete strangers who are highly unlikely to
(assessment?
interact with each other.
name=133)
Users interact with a large sample of other users
Week 8
New users make 20% of the contribution in the whisper content.
Feedback
Form : Privacy All of the above
and Security in
No, the answer is incorrect.
Online Social Score: 0
Media (unit? Accepted Answers:
unit=58&lesso Whisper users are likely to interact with complete strangers who are highly unlikely to interact
n=62)
with each other.

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=58&assessment=133 2/4
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 10 - Identity resolution and social media

5) What is the primary purpose of Gephi software? 1 point


Research
papers: Video Editing
Location
3D Modeling
based
Privacy () Network Visualization and Analysis
Music Composition
Research
Yes, the answer is correct.
Papers Part - Score: 1
II () Accepted Answers:
Network Visualization and Analysis
Week 11:
Summary () 6) Why studying username change behaviour is/are useful for social media 1 point
researchers?
Lecture
materials/Not This is one of the unique attributes of the user
es () It is usually homogeneous
The number of characters and length of the username is restricted
Text
Transcripts () It is the publicly available attribute

Yes, the answer is correct.


Download Score: 1
videos () Accepted Answers:
This is one of the unique attributes of the user
Books () It is usually homogeneous
The number of characters and length of the username is restricted
Problem It is the publicly available attribute
Solving
Session - 7) In the network graph of Twitter, where nodes are users, the in-degree of the node 1 point
July 2023 () would be

Number of followers on Twitter


Number of people you follow
Both a and b
None of the above

Yes, the answer is correct.


Score: 1
Accepted Answers:
Number of followers on Twitter

8) Which of the following is/are anonymous social networks? 0 points

Secret
Wickr
Yak yak
Blind

Partially Correct.
Score: 0
Accepted Answers:
Secret
Wickr

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=58&assessment=133 3/4
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 10 - Identity resolution and social media

Yak yak
Blind

9) A scale-free network can be one having 1 point

Power law degree distribution


Zipf’s law
Pareto principle
All of the above

No, the answer is incorrect.


Score: 0
Accepted Answers:
All of the above

10) Consider the below situation 1 point

Imagine you're a student in a university, and you decide to survey to determine the number of
friends each of your classmates has on social media. You ask everyone to report the number of
friends they have on one popular social media platform (say Facebook).

When you collect the data and calculate the average number of friends reported by your
classmates, 300 friends. However, when you individually examine the number of friends reported
by each of your classmates, you notice that many of them have fewer than 300 friends, perhaps
ranging from 50 to 200 friends.

Why did you observe such a phenomenon?

Most of the individuals have reported it wrong in the report.


Few individuals have exceptionally high friend counts (outliers) that skew the average
upward.
There is an error in individual calculations. It is impossible to have 300 friends on average
if many individuals have fewer than 300 friends.
None of the above

Yes, the answer is correct.


Score: 1
Accepted Answers:
Few individuals have exceptionally high friend counts (outliers) that skew the average upward.

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=58&assessment=133 4/4
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 11 - Research papers: Location based Privacy

(https://swayam.gov.in) (https://swayam.gov.in/nc_details/NPTEL)

[email protected]

NPTEL (https://swayam.gov.in/explorer?ncCode=NPTEL) » Privacy And Security In Online Social

Media (course)

If already
registered, click
to check your
Week 9 : Assignment 9
payment status The due date for submitting this assignment has passed.
Due on 2023-09-27, 23:59 IST.

Course Assignment submitted on 2023-09-27, 23:30 IST


outline
1) Which of the following is/are location-based services? 1 point

How does an Foursquare


NPTEL Yelp
online
Gowalla
course
work? () Uber

Yes, the answer is correct.


Prerequisite Score: 1
Assignment Accepted Answers:
() Foursquare
Yelp
Welcome to Gowalla
PSOSM Uber
class ()
2) What is the difference between Pearson and Spearman rank correlation? 1 point
Introduction Hint: https://en.wikipedia.org/wiki/Pearson_correlation_coefficient
to Social (https://en.wikipedia.org/wiki/Pearson_correlation_coefficient)
Media API ()
Pearson correlation assesses linear relationships, while Spearman correlation evaluates
Misinformati monotonic relationships.
on and Spearman correlation is always between -1 and 1, while Pearson correlation can have
Privacy () values outside this range.
Spearman correlation is calculated using a formula involving the sum of squared
Privacy and
differences, whereas Pearson correlation is based on the product of z-scores.
Pictures on

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=63&assessment=139 1/5
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 11 - Research papers: Location based Privacy

Online Social All of the above


Media ()
Yes, the answer is correct.
Score: 1
Policing and
Accepted Answers:
Social Media Pearson correlation assesses linear relationships, while Spearman correlation evaluates
()
monotonic relationships.

E-crime and 3) You have two datasets and want to measure the strength and direction of the 1 point
social media relationship between them. One set of data consists of the ranks or ordinal values of the
() observations, while the other set consists of continuous numerical data. Which correlation
coefficient is most appropriate for this scenario?
Social media
and ecrime () Spearman's rank correlation coefficient
Pearson's correlation coefficient
Identity Either Spearman or Pearson correlation can be used interchangeably.
resolution
None of the above because correlation coefficients are not applicable in this scenario.
and social
media () Yes, the answer is correct.
Score: 1
Accepted Answers:
Research
Spearman's rank correlation coefficient
papers:
Location
based 4) Which of the following are open text fields, whose validity is not enforced by the 1 point
Privacy () system and may carry noise/invalid locations?

Week 9.1: Venue location


Privacy in tips
Location
User home city
Based Social
Networks Part dones
1 (unit? Yes, the answer is correct.
unit=63&lesso Score: 1
n=64) Accepted Answers:
Venue location
Week 9.2:
Privacy in User home city
Location
Based Social
Networks Part
2 (unit?
unit=63&lesso
n=65)

Tutorial 7:
Visualization -
Highcharts
(unit?
unit=63&lesso
n=66)

Quiz: Week 9
: Assignment
9
(assessment?
name=139)

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=63&assessment=139 2/5
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 11 - Research papers: Location based Privacy

Week 9 5) Which of the following is correct inference from Figure 2? 1 point


Feedback
Form : Privacy
and Security in
Online Social
Media (unit?
unit=63&lesso
n=67)

Research
Papers Part -
II ()

Week 11:
Summary ()

Lecture
materials/Not
es ()

Text The distributions are very skewed, with a few cities having as many as 100 mayorships,
Transcripts ()
tips or dones.
The distributions are evenly balanced, with cities having a nearly equal number of
Download
mayorships, tips, or dones.
videos ()
The distributions are normally distributed, with no cities having an exceptionally high
Books () number of mayorships, tips, or dones.
None of the above
Problem
Yes, the answer is correct.
Solving Score: 1
Session - Accepted Answers:
July 2023 () The distributions are very skewed, with a few cities having as many as 100 mayorships, tips or
dones.

6) What is the key difference between a scatter plot and a bar chart? 1 point

Scatter plots display categorical data, while bar charts are used for numerical data.
Scatter plots show the relationship between two numerical variables, while bar charts
display the frequency or distribution of categorical data.
Scatter plots are only used for displaying data with a single variable, while bar charts can
visualize data with multiple variables.
All of the above

Yes, the answer is correct.


Score: 1
Accepted Answers:
Scatter plots show the relationship between two numerical variables, while bar charts display
the frequency or distribution of categorical data.

7) Which of the following is publicly available data on Foursquare? 1 point

Mayorships
Tips

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=63&assessment=139 3/5
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 11 - Research papers: Location based Privacy

Dones
Checkins

Yes, the answer is correct.


Score: 1
Accepted Answers:
Mayorships
Tips
Dones

8) Which plot is shown in the below figure? 1 point

Scatter plot
Bar chart
Bubble plot
Histogram
Yes, the answer is correct.
Score: 1
Accepted Answers:
Bubble plot

9) What is the primary characteristic of Location-Based Social Networks (LBSNs)? 1 point

They allow users to share text-based posts with their friends and followers.
They provide a platform for online gaming and virtual reality experiences.
They enable users to connect with others and share their physical locations and activities.
They focus exclusively on professional networking and job searching.

Yes, the answer is correct.


Score: 1
Accepted Answers:
They enable users to connect with others and share their physical locations and activities.

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=63&assessment=139 4/5
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 11 - Research papers: Location based Privacy

10) As discussed in lecture, Choose the correct inference (s) for figures below (Figure 4 1 point
and Figure 5). Here mayorships (blue), Tips (red), and Dones (green).
Reference: https://cdn.iiit.ac.in/cdn/precog.iiit.ac.in/Publications_files/TP_lbsn_2012.pdf (
https://cdn.iiit.ac.in/cdn/precog.iiit.ac.in/Publications_files/TP_lbsn_2012.pdf)

In Figure 4, The distribution of minimum inter-activity times is very skewed towards short
periods of time, with almost 50% of the users posting consecutive tips/dones 1 hour apart.
In Figure 4, On average, median and maximum, users do tend to experience very long
periods of time between consecutive tips and dones. For instance, around 50% of the users
have an average interactivity time of at least 450 hours, whereas around 80% of the users
have a maximum inter-activity time above 167 hours (roughly a week).
In Figure 5, Around 36% of the users have average and maximum displacements of 0
kilometer, indicating very short distances (within a few metres)
In Figure 5, About 10% of the users have a maximum displacement of at least 6,000
kilometers.
Yes, the answer is correct.
Score: 1
Accepted Answers:
In Figure 4, The distribution of minimum inter-activity times is very skewed towards short
periods of time, with almost 50% of the users posting consecutive tips/dones 1 hour apart.
In Figure 4, On average, median and maximum, users do tend to experience very long periods
of time between consecutive tips and dones. For instance, around 50% of the users have an
average interactivity time of at least 450 hours, whereas around 80% of the users have a
maximum inter-activity time above 167 hours (roughly a week).
In Figure 5, Around 36% of the users have average and maximum displacements of 0
kilometer, indicating very short distances (within a few metres)
In Figure 5, About 10% of the users have a maximum displacement of at least 6,000
kilometers.

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=63&assessment=139 5/5
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 12 - Research Papers Part - II

(https://swayam.gov.in) (https://swayam.gov.in/nc_details/NPTEL)

[email protected]

NPTEL (https://swayam.gov.in/explorer?ncCode=NPTEL) » Privacy And Security In Online Social Media

(course)

If already
registered, click
to check your
Week 10 : Assignment 10
payment status The due date for submitting this assignment has passed.
Due on 2023-10-04, 23:59 IST.

Course Assignment submitted on 2023-10-01, 20:25 IST


outline
Please go through the below paper: “Beware of What You Share Inferring Home Location in Social
Networks” at
How does an
NPTEL online
https://cdn.iiit.ac.in/cdn/precog.iiit.ac.in/Publications_files/TP_GM_MV_AG_JA_PK_VA_Pinsoda_2012.pdf
course work?
(https://cdn.iiit.ac.in/cdn/precog.iiit.ac.in/Publications_files/TP_GM_MV_AG_JA_PK_VA_Pinsoda_2012.pdf
()

Answer the following questions from 1-3.


Prerequisite
Assignment ()
1) Which statement(s) is/are true? 1 point
Welcome to
PSOSM class The authors perform a large-scale inference study in three popular social networks:
() Foursquare, Google+ and Twitter.
The paper is looking at different social networks not only Foursquare.
Introduction The dataset used in the paper comprises many attributes including venues where the location
to Social must be defined filling the open text fields, (limited in 30 and 127 characters, respectively), and
Media API () setting a pin in the map.
None of the above
Misinformatio
n and Privacy Yes, the answer is correct.
() Score: 1
Accepted Answers:
The authors perform a large-scale inference study in three popular social networks: Foursquare,
Privacy and
Pictures on Google+ and Twitter.
Online Social The paper is looking at different social networks not only Foursquare.
Media () The dataset used in the paper comprises many attributes including venues where the location
must be defined filling the open text fields, (limited in 30 and 127 characters, respectively), and
setting a pin in the map.

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=68&assessment=140 1/6
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 12 - Research Papers Part - II

2) What is a valid AGI? 1 point


Policing and
Social Media Valid Artificial General intelligence
()
Valid Ambigious Geographical Information

E-crime and Valid Artificial Geographical Interface


social media None of the above
()
Yes, the answer is correct.
Score: 1
Social media Accepted Answers:
and ecrime () Valid Ambigious Geographical Information

Identity 3) Given the following figure depicts the quality of valid UGI, what is the correct 1 point
resolution inference(s) from the figure ?
and social
media ()

Research
papers:
Location
based Privacy
()

Research
Papers Part - In figure (a), the vast majority (80%) of Foursquare users and venues have location
II () information at the city level.

Week 10.1:
In figure (b), majority of users provide home location information at country level
Beware of What In figure (c), 60% of the users have provided their location information at the district level
You Share
In figure (b), 80% of the users have provided location information at city level.
Inferring Home
Location in Yes, the answer is correct.
Social Networks Score: 1
(unit? Accepted Answers:
unit=68&lesson In figure (a), the vast majority (80%) of Foursquare users and venues have location information at
=69) the city level.
In figure (b), 80% of the users have provided location information at city level.
Week 10.2: On
the dynamics of
username
change Please go through the following paper, “On the dynamics of username change behavior on Twitter”
behavior on
Twitter (unit?
https://cdn.iiit.ac.in/cdn/precog.iiit.ac.in/Publications_files/04-Jain.pdf
unit=68&lesson
=70)
(https://cdn.iiit.ac.in/cdn/precog.iiit.ac.in/Publications_files/04-Jain.pdf)

Week 10.3: Answer the following questions from 4-6


Boston
Marathon
Analyzing Fake 4) From the overall conclusion of the paper, which of the statements is true 0 points
Content on
Twitter (unit? The set of people who change their handle many times is slightly larger than those who
unit=68&lesson change their handle a very small number of times.
=71)
The set of people who change their handle many times is slightly smaller than the set of
Quiz: Week 10 people who change their handle very less number of times.
: Assignment The set of people who change their handle many times is roughly equal to the set of people
10
who do not change their handle.

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=68&assessment=140 2/6
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 12 - Research Papers Part - II

(assessment? None of the above


name=140)
Yes, the answer is correct.
Week 10 Score: 0
Feedback Form Accepted Answers:
: Privacy and The set of people who change their handle many times is slightly smaller than the set of people
Security in who change their handle very less number of times.
Online Social
Media (unit? 5) From the following figure, what is the correct inference? 1 point
unit=68&lesson
=72)

Week 11:
Summary ()

Lecture
materials/Not
es ()

Text
Transcripts ()

Download
videos ()

Books ()

Problem
Solving 20% of users rarely change user names in short intervals and 80% change user names
Session - July frequently after longer intervals.
2023 ()
80% of users rarely change user names in short intervals, and 20% change user names
frequently after longer intervals.
35% of users choose a user name unrelated to an old one, and 65% of users reuse an old
user name.
20% of users frequently change user names in short intervals, and 80% change user name
rarely after longer intervals.

Yes, the answer is correct.


Score: 1
Accepted Answers:
20% of users frequently change user names in short intervals, and 80% change user name rarely
after longer intervals.

6) What is the correct observation in the paper? 1 point

This paper aims at finding how and why users change their usernames within a social network
like Twitter.
Most users created new usernames unrelated to the old username when they changed
usernames within a social network.
The authors believe that unrelated usernames over time could be credited to the absence of
cognitive load to remember a past dumped username.
All of the above

Yes, the answer is correct.

S 1

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=68&assessment=140 3/6
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 12 - Research Papers Part - II

Score: 1
Accepted Answers:
All of the above

Please go through the following paper, “Boston Marathon Analyzing Fake Content on Twitter”

https://cdn.iiit.ac.in/cdn/precog.iiit.ac.in/Publications_files/ecrs2013_ag_hl_pk.pdf
(https://cdn.iiit.ac.in/cdn/precog.iiit.ac.in/Publications_files/ecrs2013_ag_hl_pk.pdf)

Answer the following questions from 7-10

7) Which of the following statements is true about Boston blasts? 1 point

Twin blasts occurred during the Boston Marathon on April 15th, 2013 at 18:50 GMT
Twin blasts occurred during the Boston Marathon on April 15th, 2009 at 18:50 GMT
Four people were killed and 264 were injured in the incident
All of the above

Yes, the answer is correct.


Score: 1
Accepted Answers:
Twin blasts occurred during the Boston Marathon on April 15th, 2013 at 18:50 GMT

8) What can be depicted from the tweets shared below? 1 point

Both tweets contain Fake content.


Figure (a) depicts a tweet from a fake charity profile.
Figure (b) depicts a rumour about a child being killed in the blasts.
All of the above

Yes, the answer is correct.

S 1

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=68&assessment=140 4/6
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 12 - Research Papers Part - II

Score: 1
Accepted Answers:
All of the above

9) What are the major contributions of the figure? 1 point

The authors characterised the spread of fake content on Twitter using temporal, source and
user attributes.
The authors used linear regression to predict how viral a rumour would be in the future based
on its current user characteristics.
The authors analysed the activity and interaction graphs for the suspended user profiles
created during the Boston blasts.
None of the above

Yes, the answer is correct.


Score: 1
Accepted Answers:
The authors characterised the spread of fake content on Twitter using temporal, source and user
attributes.
The authors used linear regression to predict how viral a rumour would be in the future based on
its current user characteristics.
The authors analysed the activity and interaction graphs for the suspended user profiles created
during the Boston blasts.

10) What does the following figure depict? 1 point

The figure shows the temporal distribution of tweets after the Boston blast
The figure shows the spatial distribution of tweets after the Boston blast
Both of the above
None of the above

Yes, the answer is correct.


Score: 1
Accepted Answers:
The figure shows the temporal distribution of tweets after the Boston blast

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=68&assessment=140 5/6
17/10/2023, 00:11 Privacy And Security In Online Social Media - - Unit 12 - Research Papers Part - II

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=68&assessment=140 6/6
17/10/2023, 00:12 Privacy And Security In Online Social Media - - Unit 13 - Week 11: Summary

(https://swayam.gov.in) (https://swayam.gov.in/nc_details/NPTEL)

[email protected]

NPTEL (https://swayam.gov.in/explorer?ncCode=NPTEL) » Privacy And Security In Online Social

Media (course)

If already
registered, click
to check your
Week 11 : Assignment 11
payment status The due date for submitting this assignment has passed.
Due on 2023-10-11, 23:59 IST.

Course Assignment submitted on 2023-10-11, 04:36 IST


outline
1) Given below the statement. The statement is “An API is a set of rules and protocols 1 point
that allows different software applications to communicate with each other, while a programming
How does an language is a formal language used to write instructions for a computer to perform specific
NPTEL
tasks.”
online
course True
work? ()
False
Can’t say
Prerequisite
Assignment Yes, the answer is correct.
() Score: 1
Accepted Answers:
Welcome to True
PSOSM
class () 2) Which of the following features is supposed to be a part of tweet content on Twitter? 1 point

Presence of pronouns
Introduction
to Social No. of followers
Media API () No. of retweets
Mention of self words (I;my;mine)
Misinformati
on and Yes, the answer is correct.
Score: 1
Privacy ()
Accepted Answers:
Presence of pronouns
Privacy and
Mention of self words (I;my;mine)
Pictures on

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=73&assessment=141 1/4
17/10/2023, 00:12 Privacy And Security In Online Social Media - - Unit 13 - Week 11: Summary

Online Social 3) Who among the following are most likely to engage in link farming? 1 point
Media ()
Highly active users
Policing and Legitimate users
Social Media Popular users
()
Bloggers and experts

E-crime and Yes, the answer is correct.


social media Score: 1
() Accepted Answers:
Highly active users
Legitimate users
Social media
and ecrime () Popular users
Bloggers and experts
Identity
resolution 4) Which of the following is username creation behaviour? 1 point
and social
Static behavior patterns
media ()
Occasional reuse patterns
Research Temporal behavior patterns
papers: Frequent reuse patterns
Location
based Yes, the answer is correct.
Score: 1
Privacy ()
Accepted Answers:
Static behavior patterns
Research
Temporal behavior patterns
Papers Part -
II ()
5) Which of the following is a username reuse behaviour? 1 point

Week 11: Static behavior patterns


Summary ()
Occasional reuse patterns
Week 11: Temporal behavior patterns
Summary
Frequent reuse patterns
(unit?
unit=73&lesso Yes, the answer is correct.
n=74) Score: 1
Accepted Answers:
Quiz: Week 11 Occasional reuse patterns
: Assignment Frequent reuse patterns
11
(assessment?
6) Why is it called a "Graph" API? 1 point
name=141)

Week 11 it allows users to draw and create graphs and charts.


Feedback it represents social connections and relationships as a graph data structure.
Form : Privacy
it primarily deals with geographical mapping and location-based services.
and Security in
Online Social it is used exclusively for graph theory and mathematical computations.
Media (unit?
Yes, the answer is correct.
unit=73&lesso Score: 1
n=75) Accepted Answers:
it represents social connections and relationships as a graph data structure.
Lecture
materials/Not

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=73&assessment=141 2/4
17/10/2023, 00:12 Privacy And Security In Online Social Media - - Unit 13 - Week 11: Summary

es () 7) Latanya Sweeney's research highlighted how two seemingly unrelated pieces of 1 point
information can be linked to reidentify an individual. Which term best describes this concept?
Text
Transcripts () Data Anonymization
Data Aggregation
Download Reidentification
videos ()
All of the above

Books () Yes, the answer is correct.


Score: 1
Accepted Answers:
Problem
Reidentification
Solving
Session -
July 2023 () 8) What is the primary purpose of an API key on Twitter? 1 point

To limit the number of characters in a tweet.


To verify a user's identity on the platform.
To authenticate and access Twitter's APIs for development purposes.
To encrypt and secure direct messages on Twitter.

Yes, the answer is correct.


Score: 1
Accepted Answers:
To authenticate and access Twitter's APIs for development purposes.

9) What is the primary purpose of link farming in the context of SEO (Search Engine 1 point
Optimization)?

To create high-quality, relevant backlinks to improve a website's search engine ranking.


To increase organic traffic by optimising on-page content and meta tags.
To manipulate search engine algorithms by generating a large number of low-quality
backlinks.
To enhance the user experience by improving website navigation and design.

Yes, the answer is correct.


Score: 1
Accepted Answers:
To manipulate search engine algorithms by generating a large number of low-quality backlinks.

10) Which V of social media represents “Viral trends that spread rapidly across social 1 point
media platforms.”

Value
Velocity
Volume
Veracity

Yes, the answer is correct.


Score: 1
Accepted Answers:
Velocity

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=73&assessment=141 3/4
17/10/2023, 00:12 Privacy And Security In Online Social Media - - Unit 13 - Week 11: Summary

https://onlinecourses.nptel.ac.in/noc23_cs69/unit?unit=73&assessment=141 4/4

You might also like