0% found this document useful (0 votes)
18 views5 pages

Unit 1

The document discusses the Semantic Web, its limitations, and the emergence of the Social Web, including key concepts in network analysis and privacy. It covers various aspects such as the function of the Semantic Web, its applications, and the historical evolution of privacy laws. Additionally, it addresses privacy risks, data encryption, and principles relevant to modern privacy regulations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views5 pages

Unit 1

The document discusses the Semantic Web, its limitations, and the emergence of the Social Web, including key concepts in network analysis and privacy. It covers various aspects such as the function of the Semantic Web, its applications, and the historical evolution of privacy laws. Additionally, it addresses privacy risks, data encryption, and principles relevant to modern privacy regulations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

UNIT-I

Introduction to Semantic Web, Limitations of current Web, Development of Semantic Web,


Emergence of the Social Web, Social Network analysis, Development of Social Network Analysis,
Key concepts and measures in network analysis, Historical overview of privacy and security, Major
paradigms, for understanding privacy and security.

PART-A (2 Marks)

1. What is network analysis?

o This is a general question about network analysis as a field.

o It is not specific to electronic sources like blogs, online communities, or web-based


networks.

o It focuses more on the theory and methods of network analysis in general.

2. What is the main function of the semantic web?

o The semantic web deals with structuring data to make it machine-readable and
interoperable.

o This question does not focus on electronic sources for network analysis, like blogs or
online communities.

o It’s about semantic technologies and how they enhance the web.

3. Identify the use of semantic web in current systems.

o This question addresses how semantic web technologies (RDF, OWL, SPARQL) are
applied in current systems.

o It’s more about semantic technologies rather than electronic sources for network
analysis.

4. Define semantic web.

o The semantic web refers to a web of data that is structured and machine-readable.

o This question is focused on defining the semantic web, not on network analysis or
electronic sources like blogs or communities.

5. What is the function of machine-readable description?

o This question is about how data is structured to be machine-readable, a key part of


the semantic web.

o It doesn’t directly relate to electronic sources for network analysis like blogs or
online communities.

6. Why is semantic web so useful for the development of the web?


o This addresses the advantages of the semantic web in improving data integration
and making the web more intelligent.

o It is not concerned with social networks or web-based networks used in network


analysis.

7. Illustrate the global structure of networks.

o This is a general question about network structures.

o It doesn’t focus on electronic sources for network analysis, which is the focus of
your syllabus (e.g., blogs or online communities).

8. Differentiate Web 2.0 and Web 3.0.

o This question compares the evolution of the web from Web 2.0 (user-generated
content, social networks) to Web 3.0 (semantic web).

o It is more about web development trends rather than specific network analysis of
blogs or online communities.

9. Give the design flaws involved in HTML forms.

o This question deals with HTML form design flaws, which is related to web design,
not network analysis or electronic sources like blogs or online communities.

10. What are limitations of Web 2.0?

o This is a broader question about the limitations of Web 2.0, focusing on user-
generated content and social media.

o It doesn’t directly pertain to electronic sources for network analysis (blogs,


discussion networks, etc.).

11. Explain why is semantic web regarded as an integrator?

o This question is about how the semantic web integrates different data types and
platforms.

o It’s more about data integration and technological functionality, not about network
analysis or social networks.

12. List out the purpose of the semantic web.

o This asks for the purpose of the semantic web, which is to enable machines to
understand and process web data.

o It doesn’t relate to electronic sources for network analysis.

13. List the activities performed using HTML.

o This is about HTML (HyperText Markup Language) and how it is used to create web
pages.

o It is not related to social network analysis or electronic sources like blogs and online
communities.
14. Why is HTML used in the semantic web?

o This focuses on how HTML is used in combination with semantic web technologies
(RDF, OWL).

o It’s not about network analysis or electronic sources used for analysis in your
syllabus.

15. What is Core-Periphery (C/P) structure?

o While the Core-Periphery structure is related to social network analysis, it is not


directly linked to electronic discussion networks, blogs, or web-based networks as
sources for network analysis.

16. Will the Jaccard-coefficient show a correlation in cases where there is a significant
difference in the sizes of the two sets? Justify your answer.

o The Jaccard coefficient is a measure of similarity used in network analysis, but this
question is more about the mathematical aspect of network analysis, not specifically
about blogs, online communities, or web-based networks.

17. State Jaccard-coefficient.

o The Jaccard coefficient is a measure used in network analysis to quantify the


similarity between two sets.

o It is not specifically related to the topic of electronic sources for network analysis
(e.g., blogs, online communities).

18. Define Privacy and explain its significance in the context of data security.

o Privacy is the right to control and protect personal information.

o Significance: It ensures that sensitive data is protected from unauthorized access,


builds trust, and helps prevent identity theft and fraud.

19. Discuss the historical evolution of privacy laws and regulations across the world.

o 1890 (USA): "Right to Privacy" by Warren and Brandeis.

o 1970s (USA): Privacy laws like the Privacy Act and FCRA.

o 1995 (EU): Data Protection Directive.

o 2018 (EU): GDPR set global standards.

o 2020 (USA): CCPA gives California residents data rights.

20. Describe the major privacy risks associated with the use of personal data in the digital age.

o Data breaches: Unauthorized access to personal data.


o Tracking: Online behavior monitoring by advertisers.

o Identity theft: Using stolen data for fraudulent activities.

o Misuse of data: Unauthorized selling or sharing of personal data.

21. Explain the concept of Data Encryption and its role in ensuring data privacy and security.

o Data Encryption converts data into unreadable code.

o Role: It ensures data confidentiality, protects data during transmission, and


maintains integrity by preventing unauthorized access.

22. Discuss the "Fair Information Practice Principles" (FIPPs) and their relevance to

modern privacy regulations.

o FIPPs are guidelines for handling personal data:

o Notice: Inform individuals about data collection.

o Choice: Allow users to opt-in or opt-out.

o Access: Enable users to access and correct their data.

o Security: Protect data from unauthorized access.

o Enforcement: Ensure compliance with privacy standards.

o Relevance: FIPPs are the foundation for modern laws like GDPR.

23. What are the key differences between Privacy and Security in the context of

Aspect Privacy Security

Control over personal Protection of data from unauthorized


Focus
information. access.

Protect personal data from Protect data from breaches and


Goal
misuse. damage.

Example User consent for data sharing. Encrypting sensitive data.

Security standards (e.g., ISO/IEC


Regulation Privacy laws (e.g., GDPR).
27001).

computer systems?
24. Discuss the major paradigms of privacy protection, such as Data Anonymization, Access
Control,and Cryptographic techniques. How do they contribute to maintaining privacy in digital
environments?

o Data Anonymization: Removes identifiers to protect individuals' identities.

o Access Control: Limits data access to authorized users only.

o Cryptography: Encrypts data to prevent unauthorized access.

o These methods ensure that personal data remains secure and private, protecting
users from misuse.

25. Explain the concept of "Data Minimization" and its role in protecting privacy.

Data Minimization refers to the practice of collecting only the minimum amount of personal
data necessary for a specific purpose.

Role in Protecting Privacy:

o Reduces the risk of exposing excessive personal information.

o Limits the potential damage in case of a data breach.

o Ensures that organizations handle only the most relevant data, enhancing user privacy
and complying with regulations like GDPR.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy