Sie sind auf Seite 1von 60

ABSTRACT This research work, social network system fouses on the building and verifying of online social networks

for communities of people who share interests and activities, or who are interested in exploring the interests and activities of others seen as the computer science students of federal polytechnic nekede as they which necessitates the use of software.

A report published by OCLC provides the following definition of social networking systems of this like: Web sites primarily designed to facilitate interaction between users who share interests, attitudes and activities, such as Facebook, Mixi and MySpace.

CHAPTER ONE INTRODUCTION

1.1

Background of the study

Social network systems can best be defined as the intricate webs of relationships by which an individual participates in the larger world. Each relationship links an individual to another individual or groups of other individuals, friends, organizations, institutions, or communities. In this way, social networks create the context in which people live among fellow human beings. After all, individuals are not simply isolated entities with innate sets of preferences and desires, but are woven into the larger fabric of community in which their desires, preferences, and behaviors are shaped by the interactions and relationships among the people they know and the formal and informal groups they are part of. In this way, just about everyone participates in many different social networks at the same time. By looking at the types of relationships and the patterns of interaction that inform these networks, we can understand the larger social context in which the computer science students of federal polytechnic nekede live.

These network relationships are organized around certain dimensions of life called domains. Family, work, culture, geography, identity, interests, and shared values are among the most important domains by which networks are structured. Each domain may include a set of nodes or clusters. A node is a single relationship in the network, whether it is with an individual or a group. A cluster is a group of such relationships, a set of nodes organized around common principles. For example, work is an important domain of life, and the people one works with may be one cluster of the network.

1.1

Statement of the problem

Since the creation of the computer science department in the Federal Polytechnic Nekede, all forms of interaction between students are done face-to-face by making use of physical classrooms, cafes, shops outside gathering etc. However, with the increasing rate of literacy, which leads to high demand in education, learning and knowledge interaction, the above described system as practiced has failed to meet the requirement of student interaction and learning to students who finds joy in social gathering and interactions.

1.2

Objective Of The Study

The aim of this study is to create a Social Network System for computer science students of federal polytechnic nekede that will not only be efficient in providing flexible interaction protocols between current and previous students as well as students abroad, monitoring data, enhance works and outdate the old system, but will also reduce fraud, insecurity and student privacy issues.

Based on inputting the vital data, a Social Network System will facilitate the realization of the following objectives:

Resource Protection: This ensures that only registered and authorized students can interact with other students and equally access resources on the system. The ability to secure all types of system resources is a systems strength. The different categories of students on different levels of study that can access one system are defined and what access authorization that should be given to these group of users as part of creating dynamic interaction in student levels.

Authentication: The assurance or verification that the resource at the other end of the session really is what it claims to be solid authentication depends on a system against the security risk of impersonation, which a sender or receiver uses a false identity to access a system. Traditionally, systems have used passwords and usernames for authentication. Digital certificates can provide a more secure method of authentication while offering other security benefits as well. When system is linked to a public network like the internet, user authentication takes on new dimensions.

Authorization: The assurance that the person or computer at the other end of the session has permission to carry out the request. Authorization is the process of determining who or what can access system to socialize with other students and share common resources or perform certain activities on a system. Typically, authorization is performed in context of authentication.

Data Integrity: Data is protected from unauthorized changes or tampering. This depends against the security risk of manipulation, in

which someone intercepts and changes information to which he or she is not authorized. In addition to protecting data that is stored within the Social Network System, one might need additional security to ensure data integrity when data enters the database from untrusted sources.

System Integrity: The system provides consistent and expected results with expected performance. This is the most commonly overlooked component of interaction. For example makes it extremely difficult for a hacker to imitate or change an operating system program when you use a certain security level.

1.3

Significance of the study

The system focused on providing a social network system for computer science students in the federal polytechnic, nekede as well as in educational management and leadership (administration), staff development, preparation and maintenance of School Improvement Plans (SIP). Upon completion, the participants attained the minimum requirements to be able to:

Understand the educational change process and related drivers

of change.

Manage in the context of change and amidst a turbulent

environment.

Analyze the education industry and evaluate their schools for

relevance and appropriateness with respect to purpose, structure and patterns of relationships.

Demonstrate an understanding of the role of stakeholders and

their impact on the effective management of the institution.


Develop interpersonal communication and group process skills. Develop the capacity to understand and manage the financial

aspect of their jobs.

Improve written communications in report writing, memos and

correspondence.

Apply a Service orientation to educational management aimed

at increasing the efficiency and effectiveness of the institutions.

Furthermore, it will serve as an aid to student interaction problems which higher institutions face in recent times. It will equally serve as a

linkage between students in different levels of study in the department.

1.4

Scope and Limitation of the Study

This study covers the concept of Social Network Systems with much emphasis on the interaction between students of computer science department as well as implementation to the problem of higher institutions. The study scope is limited to students interaction and effective distance learning as solely carried out on various institutions of learning in our society today. The limitations are listed below: -

Social Security Constraint: It was very tedious to gather information concerning the essence of security in a social network system from educational institution. Even when explanations were made and permission letter offered, all they could offer was to design a questionnaire, which extended more of the time required for the work.

Programming: This is another aspect of this project that was very difficult to achieve. Due to the technicalities involved in developing a

standard Social Network System, more training was encountered which made the implementation process to be slightly delayed.

Time Constraint: The time frame given to achieve or accomplish this project was very short and it was carried out under pressure.

Resource Constraint: There were limited resources even when they are available. Due to bias and double nature of the information supply by various forms responsible the visitation were discouraged.

CHAPTER TWO LITERATURE REVIEW 2.1 Literature Review

In a research of this nature, the work extensive of other authors and researchers alike, especially those whose work are cited because of their elaborate work carried out in their study, are the most appropriate tools to gather related literatures. Therefore, this literature review is a well integrated and articulated discussion on Social Network Systems. 2.2 Social network analysis

Social network analysis is an approach within social sciences which focuses on the web of relations between social actors (individuals, organisations, countries etc). It is based on the premise that the pattern of relations between social actors affects them in multiple ways as well as the whole network within which they are embedded. Social network analysis enables us to examine the questions concerning the distribution of power and influence within a network and often to predict its evolvement.

The aim of the module is to introduce students to network analysis literature focusing on the issues concerning the computer science department of federal polytechnic nekede. The module consists of two parts: theoretical and practical. I will first study the theoretical foundations of social network analysis and learn the main concepts used within this approach. And then consider the application of network analysis in various sub-fields of computer science and in particular, social movements and international relations studies. During the practical part of the module students will acquire skills enabling them to utilize network analysis in their independent projects. The students will have an opportunity to learn about data collection methods and basic analysis techniques.

2.3 What Can Social Networks Be Used For? Social networks can provide a range of benefits to members of an organisation: Support for learning: Social networks can enhance informal learning and support social connections within groups of learners and with those involved in the support of learning.

Support for members of an organisation:

Social networks

can potentially be used my all members of an organisation, and not just those involved in working with students. Social networks can help the development of communities of practice. Engaging with others: Passive use of social networks can provide valuable business intelligence and feedback on

institutional services (although this may give rise to ethical concerns). Ease of access to information and applications: The ease of use of many social networking services can provide benefits to users by simplifying access to other tools and applications. The Facebook Platform provides an example of how a social networking service can be used as an environment for other tools. Common interface: A possible benefit of social networks may be the common interface which spans work / social boundaries. Since such services are often used in a personal capacity the interface and the way the service works may be familiar, thus minimizing training and support needed to exploit the services in a professional context. This can, however, also be a barrier to

those who wish to have strict boundaries between work and social activities. 2.4 Examples of Social Networking Services Examples of popular social networking services include: Facebook: Facebook is a social networking Web site that allows people to communicate with their friends and exchange information. In May 2007 Facebook launched the Facebook Platform which provides a framework for developers to create applications that interact with core Facebook features. MySpace: MySpace is a social networking Web site offering an interactive, user-submitted network of friends, personal profiles, blogs and groups, commonly used for sharing photos, music and videos.. Ning: An online platform for creating social Web sites and social networks aimed at users who want to create networks around specific interests or have limited technical skills. Twitter: Twitter is an example of a micro-blogging service. Twitter can be used in a variety of ways including sharing brief information with users and providing support for ones peers. Note that this brief list of popular social networking services omits popular social sharing services such as Flickr and YouTube.

2.5 Opportunities and Challenges The popularity and ease of use of social networking services have excited institutions with their potential in a variety of areas. However effective use of social networking services poses a number of challenges for institutions including long-term sustainability of the services; user concerns over use of social tools in a work or study context; a variety of technical issues and legal issues such as copyright, privacy, accessibility; etc. Institutions would be advised to consider carefully the implications before promoting significant use of such services.

2.6

Why Look At Social Networks

Understanding the dynamics of social networks is critical to the success of several aspects of companies operations, including research and development, innovation, communications, marketing, new product development, and human resources. Indeed, social networks play an important role as communication channels between the companies and consumers and among consumers themselves.

2.7

Creation of Social Networks

Social networks are formed well before we are aware that we even have them. Indeed, from the time we are born, networks spring up around us based on the family we are born into, the places we frequent, the clubs we join, the schools we attend, the things we do, and the people we come to know. All of lifes routines, great events, and transitions affect the development and evolution of these networks; entering school, moving from elementary to middle to high school, participating in chat rooms, moving to another town, state, or country, attending social events, joining the swim team, going to college, studying abroad, or getting that first job. All these lifechanging events have profound influence on the architecture and evolution of our social networks.

With every new encounter, connections emerge, linking an individual to defined sets of people, organizations, institutions, and

communities, both on- and offline. Some connections are prominent in the network, while others lie latent. Few connections ever go away. Some exist without effort, and others require work. Some may be

activated and deactivated over time, which requires careful management strategies. In the end, many factors influence the creation and evolution of a social network, including personal interests, mobility between places and institutions, and the actions of other people, parents and siblings, extended family, peers, friends, teachers, and other important members of the network.

2.8

Networked Organization

If a social network is a web of relationships that evolves from the time we are born, then each relationship is a node in that network point of connection for any number of other relationships. How are these nodes organized to form networks? The participants in my study have given me important clues. The young people I interviewed had different ways of talking about the nodes in their networks. Some nodes were described as individuals, others as clusters of people. In the case of Luis, for example, a 19-year-old of Argentine descent in Silicon Valley, his network consisted mainly of family groupings. How do these relationships emerge? With the help of the student participants, I was able to determine that

nodes crystallize around eight key dimensions that serve as platforms for building relationships.

2.9

Abundant Connectivity Redefines Network Dimensions

Young people are forming networks along multiple dimensions and across traditional boundaries of geography and place. The networks formed along these lines are extensive and diverse, each exerting influence on an individuals desires, needs, and preferences.

By compounding or superimposing dimensions on top of each other, individuals are redefining the dimensions themselves. For example, ethnicity and institutions are superimposed and compounded in Davids network. David participates in ROTC and actively recruits his Asian friends to join ROTC. As a result, most participants in ROTC at his school are Asian. To them, ROTC is less about patriotism and more a platform for participating in American society. they are looking for resources to get to college, become professionals, and achieve their dreams.

ROTC has become a resource not only for the individuals directly involved in the program but for the Asian immigrant community as a whole. ROTC provides ready-made access to resources,

organizational infrastructure, knowledge, and activities and provides a connection to people in the community. In the end, ROTC is an efficient way to become American. I also see this superimposing of dimensions in Bernards network. He is the classic Silicon Valley entrepreneurial personality who doesnt differentiate friends from potential work relationships along any of these dimensions. For him, his French friends, his gaming friends, people at work, people he lives with, and so on are all potential clients, partners, founders, or employees of Bernard Inc. Bernard doesnt separate the personal from work.

2.10 Traditional Measurements Dont Work Anymore It is important for businesses to understand the way young people compound dimensions because traditional definitions and

measurements of the hybrid categories formed as a result of such compounding no longer work. Traditional measurements by

demographic, socioeconomic, and psychographic characteristics take

only a few dimensions into account when trying to target relatively large consumer groups. Such broad categories may have worked when there were fewer communication channels and fewer possibilities for connecting across geographies, interests, and values, but they fail to capture the richness and multidimensionality of todays youth. 2.11 Social Network Management The young people I interviewed are creating relationships across boundaries of geography, ethnicity, culture, values, institutions, interests, and communities. In fact, all the dimensions that have traditionally served as the basis for creating social relationships in the physical world have been fragmented by increasingly sophisticated information and communication technologies, compounding the possibilities for new and different types of relationships and making the resulting networks quite complex.

The extended reach and complexity of these networks mean that people must actively manage them if they want to get the most from them. Indeed, network management is evolving as an indispensable skill for living in the 21st century.

2.12 Network Management Practices Recruitment, activation, and deactivation are only some of the ways individuals manage their networks. Indeed, there is a toolbox of different practices for managing networks from which people can choose at different times and for different purposes. Recruiting Recruiting is the practice of identifying and adding new members to the network. At the most basic level, of course, networks cant exist without recruiting. There are various strategies for doing so. Finding people through online chat groups, hanging out with friends who serve as magnets for others, or going to new places to meet new people. For example, Jonas from Sweden, who describes himself as shy, has found that recruiting young women to chat with him on ICQ is a good way to have conversations with the opposite sex with little risk of personal embarrassment. His criteria for an ongoing contact are: (1) How often they go online (no use talking to somebody who is not regularly online, he figures). (2) How able they are to carry on a conversation and discussion. As a result, Jonas has about 30 friends (of whom 10 are also real life

friends) on his ICQ list. Out of his 20 online friends, only one is Swedish, and they are all girls. To get as big a selection as possible, he sends ICQ chat requests in English, which explains the large foreign component. Mr. Jones is responsible for the Japan program in the school attended by David, a 15-year-old Chinese Vietnamese American in Silicon Valley. To get students interested in learning about the Japanese language and culture, Mr. Jones has been particularly keen to use technology such as Japanese voice recognition programs and other educational support tools in the classroom. He has also introduced flashy activities such as Japan Bowl, the Japanese cheering section at the homecoming game, and an exchange program with Okayama to attract interest for the program.

2.13 Social networks drive media preferences and Protocols for communication Communication technologies, whether the Internet, pagers, or mobile phones, facilitate network management. Indeed, such technologies make up the infrastructure that sustains most social networks these days. Not only do they allow individuals to broaden the reach of their networks, but they also allow them to engage in the practices necessary for effective network management, surveillance, pruning, activation, recruitment, and so on. In fact, features such as phone lists on mobile phones and buddy lists for instant messaging have become proxies for the network itself. Moving people on and off these lists is one way of managing the abundant social connectivity technology has created in their lives. The network itself plays an important role in defining media preferences for groups or clusters within the network. For some groups, the technology of choice may be a Web site, for others mobile phones or IM sites.

2.14 Social networks drive media preferences and Protocols for communication Communication technologies, whether the Internet, pagers, or mobile phones, facilitate network management. Indeed, such technologies make up the infrastructure that sustains most social networks these days. Not only do they allow individuals to broaden the reach of their networks, but they also allow them to engage in the practices necessary for effective network management, surveillance, pruning, activation, recruitment, and so on. In fact, features such as phone lists on mobile phones and buddy lists for instant messaging have become proxies for the network itself. Moving people on and off these lists is one way of managing the abundant social connectivity technology has created in their lives.

The network itself plays an important role in defining media preferences for groups or clusters within the network. For some groups, the technology of choice may be a Web site, for others mobile phones or IM sites.

CHAPTER THREE RESEARCH METHODOLOGY, SYSTEM INVESTIGATION AND ANALYSIS

3.1

Research Methodology

This research is based on the investigation undertaken in order to discover new facts and also to get additional information. This is also a systematic approach towards the collection of data, methods of analyzing these data to test the hypothesis and the condition for acceptability of the hypothesis. The description of the population samples(s) that was selected.

Methodology is the methods that are necessary to achieve the required subjects and fact. Therefore, research methodology is a detailed description of what the researcher planned and procedures adopted in gathering new facts relent to the project work.

Meanwhile, the researcher employed different types of research findings methods. The researcher considered or did in depth and comprehensive study to gather vital and relevant facts which would

assist or be an embodiment in the design of the new system upon the existing system.

Source Of Data The researcher used two sources of data which include the following:

Primary Sources: This type of source, permitted the researcher to derive first hand observation, experiences, investigation conducted through a survey (questionnaire interview). These data were collected for a special purpose by the researcher from various instructions of higher learning, financial institutions and organizations. In this type of data source, terms are carefully defined so that as far as it is humanly possible by the researcher and misunderstanding also avoided.

Secondary Source: This source involves the researcher deriving data from other materials such as textbooks, internet, articles, computer journals, newspapers, magazines etc. Secondary source of data is represented as an already made work.

3.2

System Investigation

In the beginning of every system development is a concept where the need to develop a new system is determined. Uzoeshi (2002), emphasized that data collection is a tedious exercise when an investigation is being conducted. The examination of the old system is an in-depth detailed and comprehensive study carried out with relevant facts that will be helpful in designing the system. It helps to identify the objectives, problems and comprehensive study carried out upon the odd system to find out relevant facts that will be of help in designing the new system.

During this phase, methods of collecting data for information are first hand discussion. Hence, there are two major ways of collecting these data: primary and secondary ways.

Methods Of Data Collection The researcher employed the following methods of data collection in writing this project: Interview Observation Questionnaire

Record Inspection

Interview Method: In this type of data collection, a conversation is carried out with definite aim of obtaining certain information. It is designed to gather valid and reliable information through the response of the interview to planned sequence of question. This type of data collection method is a confrontation between two people either face to face or through a medium such as telephone. This method provides the research on-the-spot assessment of the interviewee and the chance of probing the respondents further so as to elicit further information.

Observation Method: This gives the privilege of witnessing the events as it occurs in the natural setting. The system analyst watches the activity in progress under as study, documents the action observed and possibly participate in the work. It is used when the validity of data collection through other methods are in question or the complexity prevents at sources is obtained in a fast and immediate mood. Hence, it was very difficult to follow complex processes or sit through long procedures

Questionnaire Methods: This is a method in which a form containing questions is sent to every member of the sample population to complete. Here, a questionnaire consists of a list of questions relating to the aims of studying and the hypothesis to be verified in his response. This type of data collection is used when the population is too large and the area to be covered is also very large.

Record Inspection: This method of data collection allows the investigator to ascertain the mode or method of operation of the investigated area or concept. This provides the investigator the avenue to identify the method embarked upon on the existing system or the problem are of interest.

But during the research findings, the researcher employed the use of interview observation and record inspection. In the interview method of data collection, the researcher was permitted to interview the workers in the computer department of various institutions, even the supervisors and managers. In record inspection, the researcher saw

for himself the processing techniques of the social networking system and also the recommendations made by the expert developers.

3.3

System Analysis

This is an important stage in the system development lifecycle. According to McNab (2004), system development with the

identification and specification of both functional and non-functional requirements of the system. He said to achieve this objective, that there is need for analyst or researcher to use systematic approach to ensure that specification derived are accurate and the analysis process is carried out in a controlled manner.

Analysis is the breaking down of a complex structure into smaller units so that an intensive detailed cross-examination can be effectively carried out on it.

Effiong E. E (2001) defined System analysis as the process of breaking down system (problems) into subsystem and their component parts so as to analyze on details the information needs of a user and thereafter develop the system requirements.

System analysis therefore is the study of a business problem domain to recommend improvements and specify the business requirements for a solution. It is also the dissection of a system into pieces to study how they interact and work.

Meanwhile, there are lots of lapses concerning the manual interactions involved in the Networking Systems. Organizations are not satisfied with the present manual system due to what they described as an insecurity that they have noticed in the processing setup.

The major activities that go on in the Social Network System includes; Interactions between current students of the department Interactions between previous and current students of the department Socialization within the contexts of field work and group learning

Personal goal interaction etc

3.4

Objective of the Existing System

Efficient and accurate services has been the objective of the already existing system this services rendered to their respective customers it to save the risk of organizational integrity or loss of vital information which will definitely trespass to fraud though fraudulent personnel.

3.5

Problem of the Existing System

Unfortunately as promising as such as a system may be, it is of note that the proper operation of the system has a number of dependent factors. First, the system requires that it has a roughly omnipotent view of communication among individuals. Given that groups of individuals will likely communicate in person at some point, one or more semantic gaps could be created. Such gaps would prohibit token passing among nodes, as well as create inaccuracies within the perceived social network, reducing the overall effectiveness of the system.

Second, there are serious ethical implementations for a system with such far reaching observational capability. Regardless of whether or not individuals are engaging in suspicious activity, social models are

being created for future reference. Essentially, the data generated can be used to identify how close two individuals are, what they have been talking about, the common points of contact among them, etc. If an individual uses the monitored text stream exclusively for communication, a fairly accurate model of their relationships can be generated.

3.6

Proposal of the New System

A comprehensive study and analysis has been carried out on the existing mode of student interaction and their mode of social representation and its short comings (constraints) properly

understood and noted. It was noticed that the method and procedures with experts analysis was different.

A computerized knowledge social network system is therefore proposed to help solve the problem student interaction as well as facing the management in the control of the information within and outside the department as it pertains the experience of knowledge workers or experts in the field of ICT.

Considering the approaches that is to be embedded in this new system, the new system is expected to have an edge over the old existing system by having reduce time of processing data and immediate accurate result in the system. The proposed new system is also expected to incorporate characteristics of knowledge workers.

3.7

Objective of the New System

In theory, the deployment of this system offers a great deal of benefits. First, all analysis is performed in real-time. This means that, once deployed, the system is actively monitoring the available text stream for any and all communication activity. In the event that a malicious situation is identified, the observer of the system can either respond immediately or await further messages to decide whether a security issue exists.

Second, the system indirectly models the complex social interactions of individuals. Hence, as messages are passed, it is possible to identify groups of people with malicious intent and how they collaborate. This is especially crucial to recognition of social subnetworks, in which normal keyword testing could be insufficient in

identifying individuals with malicious intent. For example, consider the deployment of this system in the interest of catching a group of criminals involved in smuggling stolen works of art across international borders. Assume that they are using a message passing network to remain in constant contact along with a multitude of innocent people. Using keywords involving the stolen works, simple text filtering could create a number of false positives from people simply discussing the crimes mentioned in the news. By overlaying detected keyword uses with social network graphs, we could detect a group of individuals using these words among themselves. Once the group is properly identified, the entire set of individuals connected could be captured and questioned.

Extending upon this scenario, should any of these individuals be held responsible, the system has already generated a set of conversations shared among the guilty parties? These exchanges could easily translate into an evidence exhibit to be used during prosecution.

CHAPTER FOUR SYSTEM DESIGN AND IMPLEMENTATION

4.1

System Design

This generally involves the development of a logical and physical design for the proposed system that will meet the system requirements. System design is a process of considering several logical solutions and converting them into a physical solution. When this design is detailed, the system implementation will be determined and the components identified. It addressed data, processes and interfaces and the way in which they physical features of the system are arranged from the system designers perspective. During this, a new program and database are specified and the required equipment selected to implement the system. It also shows how the system tends to achieve its objectives by specifying the required hardware.

The aim of the system design section is to arrive to a detailed conclusion of how the system is to be made operational.

In this phase of the project the design is expected to be an alternative solution of high security. This is a stage at which processes that can logically be combined are grouped together into an automation boundary.

Furthermore, the researcher at this stage interviewed professionals in the area of social network implementation. Paying particular attention to the ways students interact in various institutions of higher learning.

4.2

Input/Output Design and Specification

Input Design

Output Design

I designed the output of the SNS with a well outlined technique because the effectiveness of a system can be measured in terms of the output of the proposed system. The output success of the SNS partly depends on its input. A badly designed output or an output that fails to adequately present information expected of it tragically invalidates the systems purpose. The output format tells more on how the end product will look like. It contains the same data specification input. 4.3 File Design

This is a pre-detailed design of the program files by the analyst before they are converted to a form design. These form design will then contain the information from their previous state of file. In the course of designing these file, the researcher considered various types of files like; Master file Transaction file Report file History file Master File is a type of file that contains a set of permanently stored records or transaction of co-operator which can be used or referenced during the application process or when needed. It

contains records stored with a key security code. It is an indexed sequential file and can be accessed directly. Transaction File is a type of file that contains records of transaction which are used to update the corresponding records in master file. It can be maintained weekly, monthly as may be desired. It contains information that can be added, removed from the master file as well as new records. Report File is a type of file that contains records extracted from master files to be used in preparing reports probably monthly security checkup. History File is an out-dated master file or transaction file which retained for use for historical or dated reasons or for back-up purposes. The researcher subsequently (made use of) created all this type of files while designing the new system. 4.4 Program Design

The Social Network System has been designed to look into the different tasks that is constituted in the different techniques interaction and social statuss between the students of the computer science department of federal polytechnic nekede. The programs is designed to work on a stand-alone mode but executed and implemented on a personal computer with windows operating system.

The system is linked to a central database under the control of the PHP/My SQL programming language. While the database is created on a remote SQL server. The program is designed to provide the user with facilities for a simple query social operations so that the interaction methods and techniques for information passing can easily be transacted. File Organization Module handles entry and storage. It consists of data entry screen, which is the medium through which data is entered into the computer system and saved automatically. Information Requirement Module handles generation of accurate report. The comprehensive report and the report generators depend on the users request. Information Update Module handles the possible modification to be made on the already maintained record. It makes the system to be flexibly reliable. Processing Module handles the use of operators on the source operand so as to have a destination output. The researcher in the process of designing this program brought together certain features to make the entire program stand the mode of operation that is required according to the specification. The features are;

Procedure flowchart Program flowchart System flowchart. Procedure Flowchart is the type of flowchart that shows the flow of control in the way an activity is carried out in the manual system. The symbols used in procedure flowchart are concerned with initialization, procedure, decision and termination. This flowchart illustrates the procedures involved in processing web based interactive systems specifying how social network systems are updated.
Start

Splash Screen

Input Security/Register

No If Password is correct Yes

Welcome Menu

Choose Option Menu

If Menu Option = Open

Input Name friend to add

Click Find friend to search for file

Click retrieve to retrieve loaded file

If Option ?

Input Name of friend or detail

Click retrieve to retrieve loaded file

Advanced Cryptography

Yes

Click Locate

Stop

Fig. 4.4:

Procedure Flowchart.

System Flowchart This is a graphical representation of the steps necessary to solve a problem. This diagram is used to illustrate the order in which a variety of decisions are to be made and activities performed. It emphasizes how data moves in various forms through the stages of input, processing, output and storage.

The input The data processing activities The output from each step

Enter username and password

File 1 Validation

Error Message

Validation Code Compact Disk

Master File CD

File 1 Security Code Routine

Error Message On Security Codes

Fig. 4.4

System Flowchart

Program Flowchart This feature is a clearer specification of the program design itself in a dramatic formation using a flowchart of symbols. Details of the program flowchart is illustrated in fig. 4.1

4.5

System Requirement

The need to run a perfect program depends on specified system requirement, whether hardware or software. Care is taken to identify input, process, storage, control and output functions. Documentation

as well is needed so as to provide detailed system description. The degree of dependency and accuracy is the key to an effective and smarter Web based interactive systems as a social networking software to which personnel managers, staff, students, employees, customers etc can trust to its operation and reliability on the hardware and software configuration.

Hardware Requirement This is a physical component system that houses the software components under which the instructions work. The under listed devices are required in the configuration of the hardware components of the social network systems software (proposed system)

1. Complete computer system comprising System Unit Pentium iii iv, mother board with speed of at least 1GHz. VDU Windows Enhanced Keyboard Trace ball ice mouse Laser Jet Printer 2. Uninterrupted Power Supply (UPS) 3. Other consumables flash, CD etc

Software Requirement These are written sets of instructions, procedures and associated documentation which help the users to achieve their processing objectives using the hardware components. In acquiring software, the institution considers the basic activity cost which helps in determining the cost of software to be used. The following software components are required in the proposed system

Windows Operating System

Microsoft Internet Explorer 9 or later Antivirus Scan of Avast, AVG, and McAfee 2009 update antivirus recommended. The above listed materials will create room for computerized efficiency in the system operation of the security techniques.

4.6

System Implementation

This is concerned with implementing the system design. The activities of a system implementation involves program coding in an appropriate language, testing, installation, training, documenting file set-up and conversion. Implementation of the system goes beyond the physical environment.

The management must plan for the user and operator training for the creation of documentation such as user manual. During the system implementation, a strategy must also be devised. Operationally, the remote login is made on the systems software which provides entrance for a new information requirement, security and modification as well. 4.7 Program Testing

This stage involves the testing of data processing procedures, production of test copies of the reports generated and other outputs, which are meant to be viewed again by users of the newly proposed system for possible errors. It involves the testing and debugging of all computer programs by the researcher. Methods such as walk through should be used to test the system incorporated with the program but following a system levels like

Login testing Program testing System testing Acceptance testing

Login Testing is used especially where the system requires an access authentication like login modules to be tested Program Testing is used in the effect of each program module to test so as to determine whether they are working as desired. System Testing involves testing the complete system hardware and software supplemental manuals. Acceptance Testing is the final stage process before the system is said to be accepted for operational use. It involves testing the system with data from the organization instead of the stimulated data developed especially for the purpose of testing. It ensures the functionality of the program as anticipated.

System Installation This is the process stage in system implementation that involves the running of the compiled program into the system i.e. the integration and adding of the software into the hardware component.

Staff Training This is a process stage in system implementation that involves the production of handbooks organization of courses and lectures

regarding the new system. The handbook contains the description on how the security is to be done with the software manual, system specification, clerical procedures manuals and security aid are designed to assist the users to carry out the required instruction.

During the training phase in the implementation stage of the new system, the researcher did not find it difficult to bring the students and staff to view the program because they are already computer literate. They easily understood the program as one of the programs they use. However, they were put through on how to Properly start the application Properly login into the system

Enter new details and profile updates

Create and update records Generate reports and queries. 4.8 Program Documentation

Documentation involves the process of recording the activities and communicating the gathered information during analysis, design and other system development stages. It is a form of a written text that accompanies a computer software, explaining how to use the computer software. It can mean different things to different people but

still stands as a vital tool for proper implementation and maintenance of the new system.

Software documentation is of 3 types. Examples are; Design documentation Technical documentation End-User documentation Design Documentation is also referred to as architectural documentation. It is an overview of the software program in relation to the environment and construction principles which are to be used in the design of the software components. Technical Documentation is referred to as tool documentation in an overview of the codes, algorithms, interface designs etc. This usually is not availed to the users unless they are programmers in most cases. End User Documentation is the documentation for the users describing how the software is to be used after installation as discussed earlier. It describes these features to the users and assists in realizing these features. It can be extended to troubleshooting assistance and be considered to consist of contracts that specifies what the limit of the software. It avails manuals for support staff end user and the system administrator of the constitution.

The researcher considered the end-user documentation as the best documentation approach for the security after training the staff. Added in the documentation is the model of the model of the system components; The detailed description of these components The organizational structure and usage The users responsibilities to the software Hence the researcher also considered the purpose of documenting this project work, which is to stand as a standard for analysis and design work and finally to reserve the essentials of having an expert knowledge. 4.9 System Set-Up and Conversion

During file setup it is necessary to convert the existing master file to a new form. This new form is the responsibility of the newly designed, which undergoes the process of converting the old system master file to a new one.

System Conversion is a transformation process stage in system implementation at which the newly designed system is put in place of the old system by the organization after been tested and documented

to prove that it is working. It is a significant milestone after which the ownership of the system if been officially transferred from the researcher (analyst) and the programmer to the end user.

The researcher completed the above process by carefully carrying out a planned conversion which include detailed installation strategies following stages below; Collecting the documentation to ascertain its usefulness as a training guide to the development user. Writing the user documentation manuals as the need arises. Referring to the planned conversion in review of the training needs to the system users. Scheduling the training sessions. Conducting the training sessions Distributing the user documentation The under listed are various system conversion briefly described to enable the implementation process. Parallel System of Conversion This takes place simultaneously at the same time, runs between the old and new system until probably the new system is completely put in place and the old system discarded.

Direct System of Conversion This takes place automatically at a time over a short period of time. It saves cost, manages time and enhances fast operation but finds to a high risk of failure without new system comparability.

Pilot System of Conversion This takes place sequentially with the introduction of the new system in a particular section of the organization. It encourages adequate testing but does not embrace an instructed organization.

From the above descriptions, it was observed imperatively that the parallel system of conversion is in the best position as the next alternative means to cater the need of the security management because the new system is allowed to operate identified and corrected from the old system.

Finally, the researcher choose this system of conversion because it minimizes the risk of major flows in the new system by avoiding the irreparable harm to the department.

4.10 System Evaluation and Maintenance

System Evaluation means to watch the implemented system to know whether or not achieving the aims and objectives of designing it. The system performance needs to be evaluated in terms of the current user requirement. If differences are found the cost has to be evaluated or ascertained. It may be that the system has changed from its original specification or inadequate care caused by improper implementation.

The evaluation procedures compares the reasons advanced from designing and implementation of the proposed system. The comparison is mostly to check whether the benefit estimate is equal to the benefit obtained or to check estimated list in line with the actual cost. Evaluation is carried in three levels which include cost analysis, operational efficiency and intangible benefits.

System evaluation is vital for the fact that; It is to deal with unexpected problems arising in operation.

It is to confirm that the planned objective are been met and to take action if they are not.

It is to ensure that the system should be able to cope with the changing requirement of the department

System

Maintenance

follows

successful

implementation

and

incorporates also evaluation of the system in order to give the desired or necessary improvement. It includes monitoring the process of the other stages of system development to ensure that the development plan and objective are being accomplished.

There are three types of system maintenance which include; Corrective maintenance Adaptive maintenance Preventive maintenance Corrective Maintenance: This covers maintenance, which is needed to put right coding errors and other faults, which may be introduced into the software. It include, the routine debugging of newly produced or recently amended code and emergency error correction in response to report faults.

Adaptive Maintenance: This covers the changes which are made to the software to meet new or changed circumstances, such as restructuring of a database, alternatives in operating procedures and changes to hardware or software versions.

Preventive Maintenance: This covers attempts to make the software perform more effectively. It includes user requests for enhancement, improvement due to experience, changes to make the software more easy to use and rewrite the code to make the maintenance that is specifically used for the new system to reduce its chances of breakages.

Hence, the researcher advised the use of preventive and corrective maintenance to reduce the chances of breaking down to all and subsequently advise these; Proper staff orientation on the use and operation of the program before the administration. Frequent checking of the network and list base to facilitate easy access and integration of the staff entirely. Consultation of IT professionals periodically to render services that may be of need to meet the modern technology demands.

CHAPTERS FIVE SUMMARY, CONCLUSION AND RECOMMENDATION

5.1

Summary

Interactive communication between two or more parties involved in a social outing enjoys the benefits of group privacy. This ensures collective linking and analysis of learning outcomes not only protects data from theft or alteration, but can also be used for user authentication. Social Network System is one tool that will be able to ensure flexible interactivity between the computer science students if been carefully implemented, more especially preventing the algorithm from an unauthorized person.

5.2

Conclusion

This project work has described the design and implementation of a secure social network system that has applications in counterterrorism. In theory, a context-based anomaly tracking system constructed as described in this document could offer a number of benefits to security. Unfortunately, at this time, the system is far too

underdeveloped to adequately judge. Several unexplored research topics remain, while other areas require further elaboration.

The biggest question, however, is determining what roles this system would play within a security-oriented environment. The most basic role would be discovering an information leak within a communication network. Deployed within companies and organizations concerned with sensitive data, given a number of sensitive keywords this system could detect when a leak occurred and how the information has spread.

Another more advanced role involves observing behavior within a public network. Assuming the necessary resources and authorization was available; this system could assist in identifying groups of individuals using a network for unlawful or undesirable intentions.

A previous example mentioned earlier in this document mentioned tracking a group of thieves. Other scenarios could be terrorist identification, discovery of criminal information networks, and virtually any group of individuals discussing key subjects. Between ethical

concerns and unexplored areas of machine learning applications, more research is clearly necessary. Temporal characteristics of tokens alone could determine the validity of generated data.

5.2

Recommendation

Institutions should take adequate care during the implementation and maintenance of the system. This should be given proper

consideration due to its importance to effective and efficient deployment and operation of the system by adopting parallel changeover procedure and applying the technique of preventive after the implementation, corrective maintenance should be done to fix it up.

In addition, the organization should give due consideration to its limitation, so that they should not have over reliance on the system because it may stifle creative thinking and lead to advice delivered being slavishly followed and effects of other limitations.

References Asal, V., Nussbaum, B. and D.W. Harrington (2007) Terrorism as Transnational Advocacy: An Organisational and Tactical Examination, Studies in Conflict & Terrorism 30(1):15-39 Borgatti S.P. and P.C. Foster (2003) The Network Paradigm in Organisational Research: A Review and Typology. Journal of Management 29:991-1013 Diani, M. and D. McAdam (2003) Social Movements and Networks: Relational Approaches to Collective Action, Chapter 1 & 2 Crossley, N. (2007) Social Networks and Extraparliamentary Politics. Sociology Compass 1(1):222-236 Kahler, M. (2009) Collective Action and Clandestine Networks: The Case of Al Qaeda. Pp. 103-126 in Networked Politics: Agency, Power and Governance, London: Cornell University Press Knoke, D. and J.H. Kuklinski (1982) Network Analysis, Chapter 2 Wasserman, S., and K. Faust (1994) Social Network Analysis: Methods and Applications, Chapter 2 Pedahzur, A. and A. Perliger (2006) Changing Nature of Suicide Attacks A Social Network Perspective, Social Forces 64(4):19882008

Singerman, D. () The Networked World of Islamist Social Movements Pp. 143-163 Q. Wiktorowicz (ed.) Islamic Activism: A Social Movement Theory Approach, Bloomington: Indiana University Press Talmud, I. and S. Mishal. (2000) The Network State: Triangular Relations in Middle Eastern Politics. International Journal of Contemporary Sociology 37(2):176-207

Das könnte Ihnen auch gefallen