Exploring Privacy Issues in Facebook, Google, and Other Applications
VerifiedAdded on 2023/04/25
|8
|3652
|411
Essay
AI Summary
This essay delves into the privacy issues associated with Facebook, Google, and developing applications like IoT, addressing concerns such as default privacy settings, data security, and the ethical implications of data collection and usage. It highlights Facebook's privacy vulnerabilities, including the risk of publicizing private information, automatic posting of activities, and rogue applications, alongside Google's issues related to tax avoidance, manipulation of search results, and data aggregation. The essay further explores the security and management challenges posed by IoT, emphasizing the need for robust security measures, standardized protocols, and intelligent data analysis to mitigate risks and ensure the protection of sensitive information. The rise of IoT brings concerns about hacking, connectivity, and the ability to analyze unstructured data, thus impacting communication models and technologies. This essay provides a comprehensive overview of the privacy and security challenges in the digital age, stressing the importance of user awareness and responsible data handling.

Running head: ISSUES ASSOCIATED WITH FACEBOOK, GOOGLE AND OTHER
DEVELOPING APPLICATIONS
Issues associated with Facebook, Google and other developing applications
Name of the Student:
Name of the University:
DEVELOPING APPLICATIONS
Issues associated with Facebook, Google and other developing applications
Name of the Student:
Name of the University:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
ISSUES ASSOCIATED WITH FACEBOOK, GOOGLE AND OTHER DEVELOPING
APPLICATIONS
1.0 Introduction
The paper is base on analyzing the issues related to Facebook, Google and developing
applications such as IoT. Facebook and Google are emerged as biggest Internet of Things (IoT).
IoT is connected things, provided physical data and processed data in cloud for delivering
business insights. It provides high opportunities of players in the business and industry. Most of
the companies are organized to focus on IoT along with connectivity of future products plus
services. Use of Facebook has psychological effects, included feelings of jealousy, stress, lack of
consideration as well as addiction to the social media. There are various problems for the
students to use of Facebook. There are privacy issues related to Facebook as some of people are
not putting their privacy as concern. People are sharing their Facebook passwords and other
details with others which cause privacy issue when third party person can have bad motive
behind it (Khan et al. 2018). Issues related to Google are included for avoidance of tax, misuse
as well as manipulation of the search results. Compilation of the data causes violation of privacy
of people as well as collaboration with Google Earth to spy on people. Security and privacy are
issues related to integration of IoT in the business organization.
2.0 Issues associated with Facebook, Google and IoT
Issues associated with Facebook
In Facebook, there is default privacy as well as security settings. There are complaints in
the past is that each time Facebook redesigns site and integrates changes in the site, the privacy
settings of Facebook is reverted back to default mode. It puts users of Facebook at risk as
information which is private is made public so that each and everyone can access to it. In fact,
users are not warned that their information is made public. Therefore, the users are at risk from
the cybercriminals as well as scammers get the information (Chatterjee 2018). There are different
complaints related to standard of Facebook plus recommended settings are too lax. Other issues
is default as well as recommended settings which provide access to the friend’s data applications
throughout information which are accessible throughout friend’s options. It is deactivated at
default along with recommended settings are to be compromised. Based on recent overhaul of
the security as well as privacy options, there is removal of the user’s control over posting of
recent activities on Facebook wall. When anyone liked the page, comment and photo, then this
particular activity is automatically posted on the wall (Ali and Asif 2018). On the personal
levels, there is uncomfortable situations as it provides too visibility to activities of Facebook by
automatic posting of the activities on walls of Facebook. It makes easier for people to track move
of Facebook as well as comments. It makes easier to recognize theft as cybercriminals are easily
profile as per the post on the pages. Automatic posts of the recent activities make it easier for
scams of Facebook and jacks to be spread.
In Facebook, there is no control of users over the news feed shown the homepage. In
automatic posting of recent activities, there is venue to spread scams along with malware as the
users are not separated top news from the friends as per groups, lists as well as pages (Nagahara
ISSUES ASSOCIATED WITH FACEBOOK, GOOGLE AND OTHER DEVELOPING
APPLICATIONS
1.0 Introduction
The paper is base on analyzing the issues related to Facebook, Google and developing
applications such as IoT. Facebook and Google are emerged as biggest Internet of Things (IoT).
IoT is connected things, provided physical data and processed data in cloud for delivering
business insights. It provides high opportunities of players in the business and industry. Most of
the companies are organized to focus on IoT along with connectivity of future products plus
services. Use of Facebook has psychological effects, included feelings of jealousy, stress, lack of
consideration as well as addiction to the social media. There are various problems for the
students to use of Facebook. There are privacy issues related to Facebook as some of people are
not putting their privacy as concern. People are sharing their Facebook passwords and other
details with others which cause privacy issue when third party person can have bad motive
behind it (Khan et al. 2018). Issues related to Google are included for avoidance of tax, misuse
as well as manipulation of the search results. Compilation of the data causes violation of privacy
of people as well as collaboration with Google Earth to spy on people. Security and privacy are
issues related to integration of IoT in the business organization.
2.0 Issues associated with Facebook, Google and IoT
Issues associated with Facebook
In Facebook, there is default privacy as well as security settings. There are complaints in
the past is that each time Facebook redesigns site and integrates changes in the site, the privacy
settings of Facebook is reverted back to default mode. It puts users of Facebook at risk as
information which is private is made public so that each and everyone can access to it. In fact,
users are not warned that their information is made public. Therefore, the users are at risk from
the cybercriminals as well as scammers get the information (Chatterjee 2018). There are different
complaints related to standard of Facebook plus recommended settings are too lax. Other issues
is default as well as recommended settings which provide access to the friend’s data applications
throughout information which are accessible throughout friend’s options. It is deactivated at
default along with recommended settings are to be compromised. Based on recent overhaul of
the security as well as privacy options, there is removal of the user’s control over posting of
recent activities on Facebook wall. When anyone liked the page, comment and photo, then this
particular activity is automatically posted on the wall (Ali and Asif 2018). On the personal
levels, there is uncomfortable situations as it provides too visibility to activities of Facebook by
automatic posting of the activities on walls of Facebook. It makes easier for people to track move
of Facebook as well as comments. It makes easier to recognize theft as cybercriminals are easily
profile as per the post on the pages. Automatic posts of the recent activities make it easier for
scams of Facebook and jacks to be spread.
In Facebook, there is no control of users over the news feed shown the homepage. In
automatic posting of recent activities, there is venue to spread scams along with malware as the
users are not separated top news from the friends as per groups, lists as well as pages (Nagahara

2
ISSUES ASSOCIATED WITH FACEBOOK, GOOGLE AND OTHER DEVELOPING
APPLICATIONS
2017). The friend finder of Facebook provides options to connect with friends by taking data
from email address as well as suggest them. Sometimes, users of Facebook complained that this
particular feature is suggested friends that they have no relation to them. Facebook games are
against security as well as privacy as it encourages users to connect with lot of people they do
not know them. Having people who do not know how to gain access to the confidential personal
information is an issue (Hogan and Piccarreta 2018). In Facebook, there are also rogue
applications. Quiz can take scam page as poll can sign to the mobile subscriptions without
knowledge, the applications can post in the Facebook wall, and then that application mines data
and sell them to the third party which can lead generation services. Facebook cannot
resourcefully control in crowd of the third party application developers. Users of Facebook as
well as rogue applications can deliver malware, abuse of the data of users and promotion of
Facebook scams.
Rogue advertisements are growing hazard to the users of Facebook. As Facebook has
inability to screen the advertisements that get in the network, the advertisements are embedded
with malicious codes which are getting throughout. For example, antivirus advertisement showed
that 9.6 million of Farmtown player’s screens are urging to download such an antivirus program
which has viruses (Roca et al. 2018). There are also fake Facebook profiles, there is
approximately 40% of the profiles are fake and formed by bots and impostors. After deactivate
of the Facebook account, Facebook cannot able to erase the data. It means when a user quits
Facebook, then the company users and sells the information to the third party advertisers and
others. Apart from mentioned privacy as well as security issues of Facebook, there are bugs
along with programming loopholes which can raise it start from time to time (Burton et al.
2018). Recent Facebook bug is caused that TechCrunch stumbled is an example where the
Facebook users view the live chat of friend with other Facebook users in real time mode.
Issues associated with Google
Criticism of Google is included avoidance of tax, misuse as well as manipulation of the
search results. There is also issue of intellectual property; concerns related to compilation of the
data can violate privacy of people in addition to collaboration with Google Earth as a result of
military to scout on them (Silverman 2017). Issues of Google raised concerns among the critics
of the company. Most of the criticism pertain issues which are not addressed by the cyber laws.
Google is accused by number of countries to avoid pay tens of billions of dollars of taxes
throughout scheme of the licensing agreements of inter company as well as transfers to the tax
havens. Change in the privacy of Google enables company to share of data across varieties of
services. Facebook is controlling 68% of $16 billion in spending of advertisement on the social
networks of US, followed by Twitter 7% in addition to LinkedIn less than 5%. Google is fallen
somewhere in other category (Puthal et al. 2017). The mobile world is critical. The users of
Smartphone tend not to go towards Google.com to search for the hotels and gifts. The users
should go for particular applications means there is no central front door towards mobile web.
Google remained at middle of the mobile computing with Android as well as popular
applications such as YouTube, Gmail; it is not controlling discovery experiences. When the
customers are started search outside of Google, then Google is not paid to help them find what
they are searching for. More activities are happened off the desktops and moved to the cell
phones as well as tablets (Linthicum 2016). Google is responded to the changes. It makes the
hardware devices powered by the voice assistant.
ISSUES ASSOCIATED WITH FACEBOOK, GOOGLE AND OTHER DEVELOPING
APPLICATIONS
2017). The friend finder of Facebook provides options to connect with friends by taking data
from email address as well as suggest them. Sometimes, users of Facebook complained that this
particular feature is suggested friends that they have no relation to them. Facebook games are
against security as well as privacy as it encourages users to connect with lot of people they do
not know them. Having people who do not know how to gain access to the confidential personal
information is an issue (Hogan and Piccarreta 2018). In Facebook, there are also rogue
applications. Quiz can take scam page as poll can sign to the mobile subscriptions without
knowledge, the applications can post in the Facebook wall, and then that application mines data
and sell them to the third party which can lead generation services. Facebook cannot
resourcefully control in crowd of the third party application developers. Users of Facebook as
well as rogue applications can deliver malware, abuse of the data of users and promotion of
Facebook scams.
Rogue advertisements are growing hazard to the users of Facebook. As Facebook has
inability to screen the advertisements that get in the network, the advertisements are embedded
with malicious codes which are getting throughout. For example, antivirus advertisement showed
that 9.6 million of Farmtown player’s screens are urging to download such an antivirus program
which has viruses (Roca et al. 2018). There are also fake Facebook profiles, there is
approximately 40% of the profiles are fake and formed by bots and impostors. After deactivate
of the Facebook account, Facebook cannot able to erase the data. It means when a user quits
Facebook, then the company users and sells the information to the third party advertisers and
others. Apart from mentioned privacy as well as security issues of Facebook, there are bugs
along with programming loopholes which can raise it start from time to time (Burton et al.
2018). Recent Facebook bug is caused that TechCrunch stumbled is an example where the
Facebook users view the live chat of friend with other Facebook users in real time mode.
Issues associated with Google
Criticism of Google is included avoidance of tax, misuse as well as manipulation of the
search results. There is also issue of intellectual property; concerns related to compilation of the
data can violate privacy of people in addition to collaboration with Google Earth as a result of
military to scout on them (Silverman 2017). Issues of Google raised concerns among the critics
of the company. Most of the criticism pertain issues which are not addressed by the cyber laws.
Google is accused by number of countries to avoid pay tens of billions of dollars of taxes
throughout scheme of the licensing agreements of inter company as well as transfers to the tax
havens. Change in the privacy of Google enables company to share of data across varieties of
services. Facebook is controlling 68% of $16 billion in spending of advertisement on the social
networks of US, followed by Twitter 7% in addition to LinkedIn less than 5%. Google is fallen
somewhere in other category (Puthal et al. 2017). The mobile world is critical. The users of
Smartphone tend not to go towards Google.com to search for the hotels and gifts. The users
should go for particular applications means there is no central front door towards mobile web.
Google remained at middle of the mobile computing with Android as well as popular
applications such as YouTube, Gmail; it is not controlling discovery experiences. When the
customers are started search outside of Google, then Google is not paid to help them find what
they are searching for. More activities are happened off the desktops and moved to the cell
phones as well as tablets (Linthicum 2016). Google is responded to the changes. It makes the
hardware devices powered by the voice assistant.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
ISSUES ASSOCIATED WITH FACEBOOK, GOOGLE AND OTHER DEVELOPING
APPLICATIONS
In the year 2009, Google reported that there are bugs in the Google docs which allowed
unintended access to the private documents. It is seen that 0.05% of the documents which are
stored in Google docs are affected by bugs (Kang 2018). Google stated that those bugs are being
fixed. Google placed one or more than one cookies in user’s computer. It is used to track
person’s web browser on unrelated websites and then track for the search history. When logged
in Google services, then it uses cookies to record which of Google account is accessed websites
and done searches. Cookies of Google expired in two years, but it is again renewed itself when
the services are started (Nolin and Olson 2016). Privacy policy of Google does not promise about
whether it records web browsing and searching are being deleted from the records. Google is
faced criticism with release of Google Buzz; it is a version of social networking where users of
Gmail have contract lists made public unless it is opted out.
Most of the users suspected that Google is collected and aggregated data about the
internet users throughout using various tools which can provide to developers like Google
Analytics and others. The developers enable Google to determine route of users throughout
internet by tracking their IP address (Ray 2016). This data is invaluable to the marketing
agencies and Google can raise proficiency of promotion as well as publicity activities. Google
claimed that emails which are sending from Gmail are never being read by the human beings. In
the year 2004, third-one privacy wrote to Google for suspending their Gmail services as it is a
privacy issues when information are shared with others which provide an impact on the business
functions of Google. Google has taken privacy as well as security concerns of Gmail users as
serious issue (Madakam 2017). Google is criticized to disclose more information to the
governments and not to disclose information that the governments required to enforce the laws.
In the year 2008, Consumer Watchdog produced video which showed that Google Chrome
recorded the user types in web addresses field and send that information to the servers of Google
to populate suggestions of search. The video is included discussion regards to privacy
implications of the feature.
Issues associated with IoT
Rise of IoT needs that it is considered of issues pertain to the performance in addition to
management. IoT provides physical data as well as process those data to deliver of business
insights. It is a huge opportunity for the players in business along with industries. There are
various technological challenges of IoT such as security, standards as well as intelligent analysis
and actions (Raman, Weigel and Lee 2016). Security is a serious concern for IoT as it draws
attention of tech firms, government agencies across world. There is hacking of various systems
such as smart fridges, drug infusion camps, radio, thermostats as well as camera which are
caused by means of future of IoT. The internet provides malicious actors with attack vectors
along with possibilities to perform evil deeds, since there is considerable with the security holes.
There are concerns regarding protection of the sensitive information as well as assets. Lives of
people are the target of IoT hack attacks. Connectivity of the devices is one of the huge problems
of future of IoT (Al-Fuqaha et al. 2015). It provides an impact on communicational models as
well as technologies. IoT is growing in various directions with various technologies compete to
become standard. It causes difficulties and requires deployment of both hardware as well as
software when connected with the devices. Technology standards are included network and
communication protocols along with aggregation of data standards. It is the activities used to
handle process and store data collected from sensors (Whitmore, Agarwal and Da Xu 2015).
ISSUES ASSOCIATED WITH FACEBOOK, GOOGLE AND OTHER DEVELOPING
APPLICATIONS
In the year 2009, Google reported that there are bugs in the Google docs which allowed
unintended access to the private documents. It is seen that 0.05% of the documents which are
stored in Google docs are affected by bugs (Kang 2018). Google stated that those bugs are being
fixed. Google placed one or more than one cookies in user’s computer. It is used to track
person’s web browser on unrelated websites and then track for the search history. When logged
in Google services, then it uses cookies to record which of Google account is accessed websites
and done searches. Cookies of Google expired in two years, but it is again renewed itself when
the services are started (Nolin and Olson 2016). Privacy policy of Google does not promise about
whether it records web browsing and searching are being deleted from the records. Google is
faced criticism with release of Google Buzz; it is a version of social networking where users of
Gmail have contract lists made public unless it is opted out.
Most of the users suspected that Google is collected and aggregated data about the
internet users throughout using various tools which can provide to developers like Google
Analytics and others. The developers enable Google to determine route of users throughout
internet by tracking their IP address (Ray 2016). This data is invaluable to the marketing
agencies and Google can raise proficiency of promotion as well as publicity activities. Google
claimed that emails which are sending from Gmail are never being read by the human beings. In
the year 2004, third-one privacy wrote to Google for suspending their Gmail services as it is a
privacy issues when information are shared with others which provide an impact on the business
functions of Google. Google has taken privacy as well as security concerns of Gmail users as
serious issue (Madakam 2017). Google is criticized to disclose more information to the
governments and not to disclose information that the governments required to enforce the laws.
In the year 2008, Consumer Watchdog produced video which showed that Google Chrome
recorded the user types in web addresses field and send that information to the servers of Google
to populate suggestions of search. The video is included discussion regards to privacy
implications of the feature.
Issues associated with IoT
Rise of IoT needs that it is considered of issues pertain to the performance in addition to
management. IoT provides physical data as well as process those data to deliver of business
insights. It is a huge opportunity for the players in business along with industries. There are
various technological challenges of IoT such as security, standards as well as intelligent analysis
and actions (Raman, Weigel and Lee 2016). Security is a serious concern for IoT as it draws
attention of tech firms, government agencies across world. There is hacking of various systems
such as smart fridges, drug infusion camps, radio, thermostats as well as camera which are
caused by means of future of IoT. The internet provides malicious actors with attack vectors
along with possibilities to perform evil deeds, since there is considerable with the security holes.
There are concerns regarding protection of the sensitive information as well as assets. Lives of
people are the target of IoT hack attacks. Connectivity of the devices is one of the huge problems
of future of IoT (Al-Fuqaha et al. 2015). It provides an impact on communicational models as
well as technologies. IoT is growing in various directions with various technologies compete to
become standard. It causes difficulties and requires deployment of both hardware as well as
software when connected with the devices. Technology standards are included network and
communication protocols along with aggregation of data standards. It is the activities used to
handle process and store data collected from sensors (Whitmore, Agarwal and Da Xu 2015).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
ISSUES ASSOCIATED WITH FACEBOOK, GOOGLE AND OTHER DEVELOPING
APPLICATIONS
Aggregation can raise value of data by raising, scale and scope plus frequency of the availability
of data for purpose of analysis.
In IoT, there is lack of presence of outliers which can lead to false positives as well as
negative positives. It explores of different algorithmic limitations. Legacy system can have
ability to analyse the unstructured data. The system can suit for handling of data, where most of
businesses are interacted and generated unstructured data (Botta et al. 2016). The system has
ability to handle real time data. The factors which can drive adoption of actions by means of IoT
are lower the prices of machines, improves over functionality of machine and deep learning
tools. It is critical to standardize IoT sensors on daily basis, and any type of electrical sensors
(Want, Schilit and Jenson 2015). The sensors are embedded in various devices, included panel
meters, monitoring of power and it is critical to synchronize dataflow among hardware with no
assist of the professional teams.
In IoT, there are also connectivity issues as server client model provides connectivity to
different servers and systems. The business is embraced IoT and the business is waiting for the
governmental administrators to interfere with new principles as well as regulations. Despite to
the challenges as well as bottlenecks of IoT within the current state, there are many benefits of
business world. IoT devices are not having computational power for processing collected data.
They are sending back to the server (Wortmann and Fluchter 2015). At this time, it costs more
energy for purpose of communication as well as internet is not available for the IoT devices. IoT
devices are being vulnerable to the cyber attacks because of constrained of the computational
resources. Any antivirus software is not installed and sophisticated methods are not effective. In
order to secure the IoT devices, security methods are required to design. IoT devices are
collected sensitive and confidential data; therefore there are high chances of privacy and security
issues (Roca et al. 2018). More IoT related technologies are applied in daily lives of people to
make improvement in their life; therefore it makes progress to their security concerns.
3.0 Conclusion
It is concluded that in Facebook and Google, mainly there are social issues as both the
platform is related to social media. Privacy and security issues reduce complex webs of causes as
well as effects. In order to use those two platforms for the business needs, it can put list of the
challenges that the small businesses can face. Social media becomes a vital parts of person’s life.
There are possibilities of data leakages and theft that can lead to undesirable situations of
fraudulent. The financial organizations and other companies are handling confidential
information of customers and keep them safe from hackers. Due to loss of data, it affects the
customers as the hacker can stole information and handle to attain information. It is a criminal
offense which is required to stop. On the social media websites such as Facebook, the users can
create fake accounts and make spam. Those fake accounts can lead to viruses being let in the
devices. In order to avoid those issues, the user should alert while using websites. In this way,
Google also creates problem when it is seen that the user searches for the information in web is
being visible to others. Therefore, there are high chances of data loss and leakage in Google
similar as Facebook. A big issue in IoT environment is lean how to patch with vulnerabilities of
IoT devices. As IoT devices are required firmware update to patch with the vulnerabilities, then
ISSUES ASSOCIATED WITH FACEBOOK, GOOGLE AND OTHER DEVELOPING
APPLICATIONS
Aggregation can raise value of data by raising, scale and scope plus frequency of the availability
of data for purpose of analysis.
In IoT, there is lack of presence of outliers which can lead to false positives as well as
negative positives. It explores of different algorithmic limitations. Legacy system can have
ability to analyse the unstructured data. The system can suit for handling of data, where most of
businesses are interacted and generated unstructured data (Botta et al. 2016). The system has
ability to handle real time data. The factors which can drive adoption of actions by means of IoT
are lower the prices of machines, improves over functionality of machine and deep learning
tools. It is critical to standardize IoT sensors on daily basis, and any type of electrical sensors
(Want, Schilit and Jenson 2015). The sensors are embedded in various devices, included panel
meters, monitoring of power and it is critical to synchronize dataflow among hardware with no
assist of the professional teams.
In IoT, there are also connectivity issues as server client model provides connectivity to
different servers and systems. The business is embraced IoT and the business is waiting for the
governmental administrators to interfere with new principles as well as regulations. Despite to
the challenges as well as bottlenecks of IoT within the current state, there are many benefits of
business world. IoT devices are not having computational power for processing collected data.
They are sending back to the server (Wortmann and Fluchter 2015). At this time, it costs more
energy for purpose of communication as well as internet is not available for the IoT devices. IoT
devices are being vulnerable to the cyber attacks because of constrained of the computational
resources. Any antivirus software is not installed and sophisticated methods are not effective. In
order to secure the IoT devices, security methods are required to design. IoT devices are
collected sensitive and confidential data; therefore there are high chances of privacy and security
issues (Roca et al. 2018). More IoT related technologies are applied in daily lives of people to
make improvement in their life; therefore it makes progress to their security concerns.
3.0 Conclusion
It is concluded that in Facebook and Google, mainly there are social issues as both the
platform is related to social media. Privacy and security issues reduce complex webs of causes as
well as effects. In order to use those two platforms for the business needs, it can put list of the
challenges that the small businesses can face. Social media becomes a vital parts of person’s life.
There are possibilities of data leakages and theft that can lead to undesirable situations of
fraudulent. The financial organizations and other companies are handling confidential
information of customers and keep them safe from hackers. Due to loss of data, it affects the
customers as the hacker can stole information and handle to attain information. It is a criminal
offense which is required to stop. On the social media websites such as Facebook, the users can
create fake accounts and make spam. Those fake accounts can lead to viruses being let in the
devices. In order to avoid those issues, the user should alert while using websites. In this way,
Google also creates problem when it is seen that the user searches for the information in web is
being visible to others. Therefore, there are high chances of data loss and leakage in Google
similar as Facebook. A big issue in IoT environment is lean how to patch with vulnerabilities of
IoT devices. As IoT devices are required firmware update to patch with the vulnerabilities, then

5
ISSUES ASSOCIATED WITH FACEBOOK, GOOGLE AND OTHER DEVELOPING
APPLICATIONS
the task is done in real time basis. Upgrading of firmware is required additional time along with
efforts. The issue is identification of where the security controls are required for the internet
based connected devices. The organization has layer security as well as redundancy to handle
risks related to IoT. The security system can communicate as well as coordinate with others
which allow the business to automate time consuming activities.
ISSUES ASSOCIATED WITH FACEBOOK, GOOGLE AND OTHER DEVELOPING
APPLICATIONS
the task is done in real time basis. Upgrading of firmware is required additional time along with
efforts. The issue is identification of where the security controls are required for the internet
based connected devices. The organization has layer security as well as redundancy to handle
risks related to IoT. The security system can communicate as well as coordinate with others
which allow the business to automate time consuming activities.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
ISSUES ASSOCIATED WITH FACEBOOK, GOOGLE AND OTHER DEVELOPING
APPLICATIONS
References
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M. and Ayyash, M., 2015. Internet of
things: A survey on enabling technologies, protocols, and applications. IEEE Communications
Surveys & Tutorials, 17(4), pp.2347-2376.
Ali, I. and Asif, M., 2018, February. Applying security patterns for authorization of users in IoT
based applications. In Engineering and Emerging Technologies (ICEET), 2018 International
Conference on (pp. 1-5). IEEE.
Botta, A., De Donato, W., Persico, V. and Pescapé, A., 2016. Integration of cloud computing and
internet of things: a survey. Future Generation Computer Systems, 56, pp.684-700.
Burton, L., Dave, N., Fernandez, R.E., Jayachandran, K. and Bhansali, S., 2018. Smart
Gardening IoT Soil Sheets for Real-Time Nutrient Analysis. Journal of The Electrochemical
Society, 165(8), pp.B3157-B3162.
Chatterjee, A., 2018. Artificial Intelligence based IoT Automation: Controlling devices with
Google and Facebook. Artificial Intelligence, 5(04).
Hogan, M.D. and Piccarreta, B.M., 2018. Interagency Report on the Status of International
Cybersecurity Standardization for the Internet of Things (IoT) (No. NIST Interagency/Internal
Report (NISTIR)-8200).
Kang, S., 2018. A Study on Programs Applying the Internet of Things (IoT) for Prevention of
Falls in the Elderly. In IT Convergence and Security 2017 (pp. 49-53). Springer, Singapore.
Khan, M., Anwar, M.W., Azam, F., Samea, F. and Shinwari, M.F., 2018, October. A Model-
Driven Approach for Access Control in Internet of Things (IoT) Applications–An Introduction to
UMLOA. In International Conference on Information and Software Technologies (pp. 198-209).
Springer, Cham.
Linthicum, D.S., 2016. Responsive Data Architecture for the Internet of Things. IEEE
Computer, 49(10), pp.72-75.
Madakam, S., 2017, June. A Study on IoT Technologies in Smart Cities. In International
Conference on Practical Applications of Agents and Multi-Agent Systems (pp. 234-237).
Springer, Cham.
Nagahara, L.A., 2017, September. Convergence between Academic and Industrial Research:
Practical Implementation in Commercialization of Sensors. In Meeting Abstracts (No. 50, pp.
2127-2127). The Electrochemical Society.
Nolin, J. and Olson, N., 2016. The Internet of Things and convenience. Internet Research, 26(2),
pp.360-376.
Puthal, D., Ranjan, R., Nepal, S. and Chen, J., 2017. IoT and big data: An architecture with data
flow and security issues. In Cloud Infrastructures, Services, and IoT Systems for Smart
Cities (pp. 243-252). Springer, Cham.
ISSUES ASSOCIATED WITH FACEBOOK, GOOGLE AND OTHER DEVELOPING
APPLICATIONS
References
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M. and Ayyash, M., 2015. Internet of
things: A survey on enabling technologies, protocols, and applications. IEEE Communications
Surveys & Tutorials, 17(4), pp.2347-2376.
Ali, I. and Asif, M., 2018, February. Applying security patterns for authorization of users in IoT
based applications. In Engineering and Emerging Technologies (ICEET), 2018 International
Conference on (pp. 1-5). IEEE.
Botta, A., De Donato, W., Persico, V. and Pescapé, A., 2016. Integration of cloud computing and
internet of things: a survey. Future Generation Computer Systems, 56, pp.684-700.
Burton, L., Dave, N., Fernandez, R.E., Jayachandran, K. and Bhansali, S., 2018. Smart
Gardening IoT Soil Sheets for Real-Time Nutrient Analysis. Journal of The Electrochemical
Society, 165(8), pp.B3157-B3162.
Chatterjee, A., 2018. Artificial Intelligence based IoT Automation: Controlling devices with
Google and Facebook. Artificial Intelligence, 5(04).
Hogan, M.D. and Piccarreta, B.M., 2018. Interagency Report on the Status of International
Cybersecurity Standardization for the Internet of Things (IoT) (No. NIST Interagency/Internal
Report (NISTIR)-8200).
Kang, S., 2018. A Study on Programs Applying the Internet of Things (IoT) for Prevention of
Falls in the Elderly. In IT Convergence and Security 2017 (pp. 49-53). Springer, Singapore.
Khan, M., Anwar, M.W., Azam, F., Samea, F. and Shinwari, M.F., 2018, October. A Model-
Driven Approach for Access Control in Internet of Things (IoT) Applications–An Introduction to
UMLOA. In International Conference on Information and Software Technologies (pp. 198-209).
Springer, Cham.
Linthicum, D.S., 2016. Responsive Data Architecture for the Internet of Things. IEEE
Computer, 49(10), pp.72-75.
Madakam, S., 2017, June. A Study on IoT Technologies in Smart Cities. In International
Conference on Practical Applications of Agents and Multi-Agent Systems (pp. 234-237).
Springer, Cham.
Nagahara, L.A., 2017, September. Convergence between Academic and Industrial Research:
Practical Implementation in Commercialization of Sensors. In Meeting Abstracts (No. 50, pp.
2127-2127). The Electrochemical Society.
Nolin, J. and Olson, N., 2016. The Internet of Things and convenience. Internet Research, 26(2),
pp.360-376.
Puthal, D., Ranjan, R., Nepal, S. and Chen, J., 2017. IoT and big data: An architecture with data
flow and security issues. In Cloud Infrastructures, Services, and IoT Systems for Smart
Cities (pp. 243-252). Springer, Cham.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
ISSUES ASSOCIATED WITH FACEBOOK, GOOGLE AND OTHER DEVELOPING
APPLICATIONS
Raman, S., Weigel, R. and Lee, T., 2016. The Internet of space (IoS): A future backbone for the
Internet of Things?. IEEE IoT Newsletter.
Ray, P.P., 2016. A survey of IoT cloud platforms. Future Computing and Informatics
Journal, 1(1-2), pp.35-46.
Roca, D., Milito, R., Nemirovsky, M. and Valero, M., 2018. Tackling IoT Ultra Large Scale
Systems: fog computing in support of hierarchical emergent behaviors. In Fog Computing in the
Internet of Things (pp. 33-48). Springer, Cham.
Silverman, M., 2017. Regulation of Digital Government. In Digital Government (pp. 63-82).
Springer, Cham.
Want, R., Schilit, B.N. and Jenson, S., 2015. Enabling the internet of things. Computer, 48(1),
pp.28-35.
Whitmore, A., Agarwal, A. and Da Xu, L., 2015. The Internet of Things—A survey of topics and
trends. Information Systems Frontiers, 17(2), pp.261-274.
Wortmann, F. and Flüchter, K., 2015. Internet of things. Business & Information Systems
Engineering, 57(3), pp.221-224.
ISSUES ASSOCIATED WITH FACEBOOK, GOOGLE AND OTHER DEVELOPING
APPLICATIONS
Raman, S., Weigel, R. and Lee, T., 2016. The Internet of space (IoS): A future backbone for the
Internet of Things?. IEEE IoT Newsletter.
Ray, P.P., 2016. A survey of IoT cloud platforms. Future Computing and Informatics
Journal, 1(1-2), pp.35-46.
Roca, D., Milito, R., Nemirovsky, M. and Valero, M., 2018. Tackling IoT Ultra Large Scale
Systems: fog computing in support of hierarchical emergent behaviors. In Fog Computing in the
Internet of Things (pp. 33-48). Springer, Cham.
Silverman, M., 2017. Regulation of Digital Government. In Digital Government (pp. 63-82).
Springer, Cham.
Want, R., Schilit, B.N. and Jenson, S., 2015. Enabling the internet of things. Computer, 48(1),
pp.28-35.
Whitmore, A., Agarwal, A. and Da Xu, L., 2015. The Internet of Things—A survey of topics and
trends. Information Systems Frontiers, 17(2), pp.261-274.
Wortmann, F. and Flüchter, K., 2015. Internet of things. Business & Information Systems
Engineering, 57(3), pp.221-224.
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





