social network system

Upload: morrison-a-akponumeta

Post on 06-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 Social Network System

    1/60

    ABSTRACT

    This research work, social network system fouses on the building and

    verifying of online social networks for communities of people who

    share interests and activities, or who are interested in exploring the

    interests and activities of others seen as the computer science

    students of federal polytechnic nekede as they which necessitates

    the use of software.

    A report published by OCLC provides the following definition of social

    networking systems of this like: Web sites primarily designed to

    facilitate interaction between users who share interests, attitudes and

    activities, such as Facebook, Mixi and MySpace.

  • 8/3/2019 Social Network System

    2/60

    CHAPTER ONE

    INTRODUCTION

    1.1 Background of the study

    Social network systems can best be defined as the intricate webs of

    relationships by which an individual participates in the larger world.

    Each relationship links an individual to another individual or groups of

    other individuals, friends, organizations, institutions, or communities.

    In this way, social networks create the context in which people live

    among fellow human beings. After all, individuals are not simply

    isolated entities with innate sets of preferences and desires, but are

    woven into the larger fabric of community in which their desires,

    preferences, and behaviors are shaped by the interactions and

    relationships among the people they know and the formal and

    informal groups they are part of. In this way, just about everyone

    participates in many different social networks at the same time. By

    looking at the types of relationships and the patterns of interaction

    that inform these networks, we can understand the larger social

    context in which the computer science students of federal polytechnic

    nekede live.

  • 8/3/2019 Social Network System

    3/60

    These network relationships are organized around certain dimensions

    of life called domains. Family, work, culture, geography, identity,

    interests, and shared values are among the most important domains

    by which networks are structured. Each domain may include a set of

    nodes or clusters. A node is a single relationship in the network,

    whether it is with an individual or a group. A cluster is a group of such

    relationships, a set of nodes organized around common principles.

    For example, work is an important domain of life, and the people one

    works with may be one cluster of the network.

    1.1 Statement of the problem

    Since the creation of the computer science department in the Federal

    Polytechnic Nekede, all forms of interaction between students are

    done face-to-face by making use of physical classrooms, cafes,

    shops outside gathering etc. However, with the increasing rate of

    literacy, which leads to high demand in education, learning and

    knowledge interaction, the above described system as practiced has

    failed to meet the requirement of student interaction and learning to

    students who finds joy in social gathering and interactions.

  • 8/3/2019 Social Network System

    4/60

  • 8/3/2019 Social Network System

    5/60

    Authentication: The assurance or verification that the resource at

    the other end of the session really is what it claims to be solid

    authentication depends on a system against the security risk of

    impersonation, which a sender or receiver uses a false identity to

    access a system. Traditionally, systems have used passwords and

    usernames for authentication. Digital certificates can provide a more

    secure method of authentication while offering other security benefits

    as well. When system is linked to a public network like the internet,

    user authentication takes on new dimensions.

    Authorization: The assurance that the person or computer at the

    other end of the session has permission to carry out the request.

    Authorization is the process of determining who or what can access

    system to socialize with other students and share common resources

    or perform certain activities on a system. Typically, authorization is

    performed in context of authentication.

    Data Integrity: Data is protected from unauthorized changes or

    tampering. This depends against the security risk of manipulation, in

  • 8/3/2019 Social Network System

    6/60

    which someone intercepts and changes information to which he or

    she is not authorized. In addition to protecting data that is stored

    within the Social Network System, one might need additional security

    to ensure data integrity when data enters the database from

    untrusted sources.

    System Integrity: The system provides consistent and expected

    results with expected performance. This is the most commonly

    overlooked component of interaction. For example makes it extremely

    difficult for a hacker to imitate or change an operating system

    program when you use a certain security level.

    1.3 Significance of the study

    The system focused on providing a social network system for

    computer science students in the federal polytechnic, nekede as well

    as in educational management and leadership (administration), staff

    development, preparation and maintenance of School Improvement

    Plans (SIP). Upon completion, the participants attained the minimum

    requirements to be able to:

  • 8/3/2019 Social Network System

    7/60

    Understand the educational change process and related drivers

    of change.

    Manage in the context of change and amidst a turbulent

    environment.

    Analyze the education industry and evaluate their schools for

    relevance and appropriateness with respect to purpose, structure

    and patterns of relationships.

    Demonstrate an understanding of the role of stakeholders and

    their impact on the effective management of the institution.

    Develop interpersonal communication and group process skills.

    Develop the capacity to understand and manage the financial

    aspect of their jobs.

    Improve written communications in report writing, memos and

    correspondence.

    Apply a Service orientation to educational management aimed

    at increasing the efficiency and effectiveness of the institutions.

    Furthermore, it will serve as an aid to student interaction problems

    which higher institutions face in recent times. It will equally serve as a

  • 8/3/2019 Social Network System

    8/60

    linkage between students in different levels of study in the

    department.

    1.4 Scope and Limitation of the Study

    This study covers the concept of Social Network Systems with much

    emphasis on the interaction between students of computer science

    department as well as implementation to the problem of higher

    institutions. The study scope is limited to students interaction and

    effective distance learning as solely carried out on various institutions

    of learning in our society today. The limitations are listed below: -

    Social Security Constraint: It was very tedious to gather information

    concerning the essence of security in a social network system from

    educational institution. Even when explanations were made and

    permission letter offered, all they could offer was to design a

    questionnaire, which extended more of the time required for the work.

    Programming: This is another aspect of this project that was very

    difficult to achieve. Due to the technicalities involved in developing a

  • 8/3/2019 Social Network System

    9/60

    standard Social Network System, more training was encountered

    which made the implementation process to be slightly delayed.

    Time Constraint: The time frame given to achieve or accomplish this

    project was very short and it was carried out under pressure.

    Resource Constraint: There were limited resources even when they

    are available. Due to bias and double nature of the information supply

    by various forms responsible the visitation were discouraged.

  • 8/3/2019 Social Network System

    10/60

    CHAPTER TWO

    LITERATURE REVIEW

    2.1 Literature Review

    In a research of this nature, the work extensive of other authors and

    researchers alike, especially those whose work are cited because of

    their elaborate work carried out in their study, are the most

    appropriate tools to gather related literatures. Therefore, this literature

    review is a well integrated and articulated discussion on Social

    Network Systems.

    2.2 Social network analysis

    Social network analysis is an approach within social sciences which

    focuses on the web of relations between social actors (individuals,

    organisations, countries etc). It is based on the premise that the

    pattern of relations between social actors affects them in multiple

    ways as well as the whole network within which they are embedded.

    Social network analysis enables us to examine the questions

    concerning the distribution of power and influence within a network

    and often to predict its evolvement.

  • 8/3/2019 Social Network System

    11/60

    The aim of the module is to introduce students to network analysis

    literature focusing on the issues concerning the computer science

    department of federal polytechnic nekede. The module consists of

    two parts: theoretical and practical. I will first study the theoretical

    foundations of social network analysis and learn the main concepts

    used within this approach. And then consider the application of

    network analysis in various sub-fields of computer science and in

    particular, social movements and international relations studies.

    During the practical part of the module students will acquire skills

    enabling them to utilize network analysis in their independent

    projects. The students will have an opportunity to learn about data

    collection methods and basic analysis techniques.

    2.3 What Can Social Networks Be Used For?

    Social networks can provide a range of benefits to members of an

    organisation:

    Support for learning: Social networks can enhance informal

    learning and support social connections within groups of learners

    and with those involved in the support of learning.

  • 8/3/2019 Social Network System

    12/60

    Support for members of an organisation: Social networks

    can potentially be used my all members of an organisation, and

    not just those involved in working with students. Social networks

    can help the development of communities of practice.

    Engaging with others: Passive use of social networks can

    provide valuable business intelligence and feedback on

    institutional services (although this may give rise to ethical

    concerns).

    Ease of access to information and applications: The ease of

    use of many social networking services can provide benefits to

    users by simplifying access to other tools and applications. The

    Facebook Platform provides an example of how a social

    networking service can be used as an environment for other

    tools.

    Common interface: A possible benefit of social networks may

    be the common interface which spans work / social boundaries.

    Since such services are often used in a personal capacity the

    interface and the way the service works may be familiar, thus

    minimizing training and support needed to exploit the services in

    a professional context. This can, however, also be a barrier to

  • 8/3/2019 Social Network System

    13/60

    those who wish to have strict boundaries between work and

    social activities.

    2.4 Examples of Social Networking Services

    Examples of popular social networking services include:

    Facebook: Facebook is a social networking Web site that allows

    people to communicate with their friends and exchange information.

    In May 2007 Facebook launched the Facebook Platform which

    provides a framework for developers to create applications that

    interact with core Facebook features.

    MySpace: MySpace is a social networking Web site offering an

    interactive, user-submitted network of friends, personal profiles, blogs

    and groups, commonly used for sharing photos, music and videos..

    Ning: An online platform for creating social Web sites and social

    networks aimed at users who want to create networks around specific

    interests or have limited technical skills.

    Twitter: Twitter is an example of a micro-blogging service. Twitter

    can be used in a variety of ways including sharing brief information

    with users and providing support for ones peers.

    Note that this brief list of popular social networking services omits

    popular social sharing services such as Flickr and YouTube.

  • 8/3/2019 Social Network System

    14/60

    2.5 Opportunities and Challenges

    The popularity and ease of use of social networking services have

    excited institutions with their potential in a variety of areas. However

    effective use of social networking services poses a number of

    challenges for institutions including long-term sustainability of the

    services; user concerns over use of social tools in a work or study

    context; a variety of technical issues and legal issues such as

    copyright, privacy, accessibility; etc.

    Institutions would be advised to consider carefully the implications

    before promoting significant use of such services.

    2.6 Why Look At Social Networks

    Understanding the dynamics of social networks is critical to the

    success of several aspects of companies operations, including

    research and development, innovation, communications, marketing,

    new product development, and human resources. Indeed, social

    networks play an important role as communication channels between

    the companies and consumers and among consumers themselves.

  • 8/3/2019 Social Network System

    15/60

    2.7 Creation of Social Networks

    Social networks are formed well before we are aware that we even

    have them. Indeed, from the time we are born, networks spring up

    around us based on the family we are born into, the places we

    frequent, the clubs we join, the schools we attend, the things we do,

    and the people we come to know. All of lifes routines, great events,

    and transitions affect the development and evolution of these

    networks; entering school, moving from elementary to middle to high

    school, participating in chat rooms, moving to another town, state, or

    country, attending social events, joining the swim team, going to

    college, studying abroad, or getting that first job. All these life-

    changing events have profound influence on the architecture and

    evolution of our social networks.

    With every new encounter, connections emerge, linking an individual

    to defined sets of people, organizations, institutions, and

    communities, both on- and offline. Some connections are prominent

    in the network, while others lie latent. Few connections ever go away.

    Some exist without effort, and others require work. Some may be

  • 8/3/2019 Social Network System

    16/60

    activated and deactivated over time, which requires careful

    management strategies. In the end, many factors influence

    the creation and evolution of a social network, including personal

    interests, mobility between places and institutions, and the actions of

    other people, parents and siblings, extended family, peers, friends,

    teachers, and other important members of the network.

    2.8 Networked Organization

    If a social network is a web of relationships that evolves from the time

    we are born, then each relationship is a node in that network point of

    connection for any number of other relationships.

    How are these nodes organized to form networks?

    The participants in my study have given me important clues.

    The young people I interviewed had different ways of talking about

    the nodes in their networks. Some nodes were described as

    individuals, others as clusters of people. In the case of Luis, for

    example, a 19-year-old of Argentine descent in Silicon Valley, his

    network consisted mainly of family groupings.

    How do these relationships emerge?

    With the help of the student participants, I was able to determine that

  • 8/3/2019 Social Network System

    17/60

    nodes crystallize around eight key dimensions that serve as platforms

    for building relationships.

    2.9 Abundant Connectivity Redefines Network Dimensions

    Young people are forming networks along multiple dimensions and

    across traditional boundaries of geography and place. The networks

    formed along these lines are extensive and diverse, each exerting

    influence on an individuals desires, needs, and preferences.

    By compounding or superimposing dimensions on top of each other,

    individuals are redefining the dimensions themselves. For example,

    ethnicity and institutions are superimposed and compounded in

    Davids network. David participates in ROTC and actively recruits his

    Asian friends to join ROTC. As a result, most participants in ROTC at

    his school are Asian. To them, ROTC is less about patriotism and

    more a platform for participating in American society. they are looking

    for resources to get to college, become professionals, and achieve

    their dreams.

  • 8/3/2019 Social Network System

    18/60

    ROTC has become a resource not only for the individuals directly

    involved in the program but for the Asian immigrant community as a

    whole. ROTC provides ready-made access to resources,

    organizational infrastructure, knowledge, and activities and provides a

    connection to people in the community. In the end, ROTC is an

    efficient way to become American.

    I also see this superimposing of dimensions in Bernards network. He

    is the classic Silicon Valley entrepreneurial personality who doesnt

    differentiate friends from potential work relationships along any of

    these dimensions. For him, his French friends, his gaming friends,

    people at work, people he lives with, and so on are all potential

    clients, partners, founders, or employees of Bernard Inc. Bernard

    doesnt separate the personal from work.

    2.10 Traditional Measurements Dont Work Anymore

    It is important for businesses to understand the way young people

    compound dimensions because traditional definitions and

    measurements of the hybrid categories formed as a result of such

    compounding no longer work. Traditional measurements by

    demographic, socioeconomic, and psychographic characteristics take

  • 8/3/2019 Social Network System

    19/60

    only a few dimensions into account when trying to target relatively

    large consumer groups. Such broad categories may have worked

    when there were fewer communication channels and fewer

    possibilities for connecting across geographies, interests, and values,

    but they fail to capture the richness and multidimensionality of todays

    youth.

    2.11 Social Network Management

    The young people I interviewed are creating relationships across

    boundaries of geography, ethnicity, culture, values, institutions,

    interests, and communities. In fact, all the dimensions that have

    traditionally served as the basis for creating social relationships in the

    physical world have been fragmented by increasingly sophisticated

    information and communication technologies, compounding the

    possibilities for new and different types of relationships and making

    the resulting networks quite complex.

    The extended reach and complexity of these networks mean that

    people must actively manage them if they want to get the most from

    them. Indeed, network management is evolving as an indispensable

    skill for living in the 21st century.

  • 8/3/2019 Social Network System

    20/60

    2.12 Network Management Practices

    Recruitment, activation, and deactivation are only some of the ways

    individuals manage their networks. Indeed, there is a toolbox of

    different practices for managing networks from which people can

    choose at different times and for different purposes.

    Recruiting

    Recruiting is the practice of identifying and adding new members to

    the network. At the most basic level, of course, networks cant exist

    without recruiting. There are various strategies for doing so. Finding

    people through online chat groups, hanging out with friends who

    serve as magnets for others, or going to new places to meet new

    people. For example, Jonas from Sweden, who describes himself as

    shy, has found that recruiting young women to chat with him on ICQ

    is a good way to have conversations with the opposite sex with little

    risk of personal embarrassment. His criteria for an ongoing contact

    are:

    (1) How often they go online (no use talking to somebody who is not

    regularly online, he figures).

    (2) How able they are to carry on a conversation and discussion. As a

    result, Jonas has about 30 friends (of whom 10 are also real life

  • 8/3/2019 Social Network System

    21/60

    friends) on his ICQ list. Out of his 20 online friends, only one is

    Swedish, and they are all girls. To get as big a selection as possible,

    he sends ICQ chat requests in English, which explains the large

    foreign component. Mr. Jones is responsible for the Japan program in

    the school attended by David, a 15-year-old Chinese Vietnamese

    American in Silicon Valley. To get students interested in learning

    about the Japanese language and culture, Mr. Jones has been

    particularly keen to use technology such as Japanese voice

    recognition programs and other educational support tools in the

    classroom. He has also introduced flashy activities such as Japan

    Bowl, the Japanese cheering section at the homecoming game, and

    an exchange program with Okayama to attract interest for the

    program.

  • 8/3/2019 Social Network System

    22/60

    2.13 Social networks drive media preferences and Protocols for

    communication

    Communication technologies, whether the Internet, pagers, or mobile

    phones, facilitate network management. Indeed, such technologies

    make up the infrastructure that sustains most social networks these

    days. Not only do they allow individuals to broaden the reach of their

    networks, but they also allow them to engage in the practices

    necessary for effective network management, surveillance, pruning,

    activation, recruitment, and so on. In fact, features such as phone

    lists on mobile phones and buddy lists for instant messaging have

    become proxies for the network itself. Moving people on and off these

    lists is one way of managing the abundant social connectivity

    technology has created in their lives.

    The network itself plays an important role in defining media

    preferences for groups or clusters within the network. For some

    groups, the technology of choice may be a Web site, for others

    mobile phones or IM sites.

  • 8/3/2019 Social Network System

    23/60

    2.14 Social networks drive media preferences and

    Protocols for communication

    Communication technologies, whether the Internet, pagers, or mobile

    phones, facilitate network management. Indeed, such technologies

    make up the infrastructure that sustains most social networks these

    days. Not only do they allow individuals to broaden the reach of their

    networks, but they also allow them to engage in the practices

    necessary for effective network management, surveillance, pruning,

    activation, recruitment, and so on. In fact, features such as phone

    lists on mobile phones and buddy lists for instant messaging have

    become proxies for the network itself. Moving people on and off these

    lists is one way of managing the abundant social connectivity

    technology has created in their lives.

    The network itself plays an important role in defining media

    preferences for groups or clusters within the network. For some

    groups, the technology of choice may be a Web site, for others

    mobile phones or IM sites.

  • 8/3/2019 Social Network System

    24/60

    CHAPTER THREE

    RESEARCH METHODOLOGY, SYSTEM INVESTIGATION AND

    ANALYSIS

    3.1 Research Methodology

    This research is based on the investigation undertaken in order to

    discover new facts and also to get additional information. This is also

    a systematic approach towards the collection of data, methods of

    analyzing these data to test the hypothesis and the condition for

    acceptability of the hypothesis. The description of the population

    samples(s) that was selected.

    Methodology is the methods that are necessary to achieve the

    required subjects and fact. Therefore, research methodology is a

    detailed description of what the researcher planned and procedures

    adopted in gathering new facts relent to the project work.

    Meanwhile, the researcher employed different types of research

    findings methods. The researcher considered or did in depth and

    comprehensive study to gather vital and relevant facts which would

  • 8/3/2019 Social Network System

    25/60

    assist or be an embodiment in the design of the new system upon the

    existing system.

    Source Of Data

    The researcher used two sources of data which include the following:

    Primary Sources: This type of source, permitted the researcher to

    derive first hand observation, experiences, investigation conducted

    through a survey (questionnaire interview). These data were collected

    for a special purpose by the researcher from various instructions of

    higher learning, financial institutions and organizations. In this type of

    data source, terms are carefully defined so that as far as it is humanly

    possible by the researcher and misunderstanding also avoided.

    Secondary Source: This source involves the researcher deriving

    data from other materials such as textbooks, internet, articles,

    computer journals, newspapers, magazines etc. Secondary source of

    data is represented as an already made work.

    3.2 System Investigation

  • 8/3/2019 Social Network System

    26/60

    In the beginning of every system development is a concept where the

    need to develop a new system is determined. Uzoeshi (2002),

    emphasized that data collection is a tedious exercise when an

    investigation is being conducted. The examination of the old system

    is an in-depth detailed and comprehensive study carried out with

    relevant facts that will be helpful in designing the system. It helps to

    identify the objectives, problems and comprehensive study carried

    out upon the odd system to find out relevant facts that will be of help

    in designing the new system.

    During this phase, methods of collecting data for information are first

    hand discussion. Hence, there are two major ways of collecting these

    data: primary and secondary ways.

    Methods Of Data Collection

    The researcher employed the following methods of data collection in

    writing this project:

    Interview

    Observation

    Questionnaire

  • 8/3/2019 Social Network System

    27/60

    Record Inspection

    Interview Method: In this type of data collection, a conversation is

    carried out with definite aim of obtaining certain information. It is

    designed to gather valid and reliable information through the

    response of the interview to planned sequence of question. This type

    of data collection method is a confrontation between two people

    either face to face or through a medium such as telephone. This

    method provides the research on-the-spot assessment of the

    interviewee and the chance of probing the respondents further so as

    to elicit further information.

    Observation Method: This gives the privilege of witnessing the

    events as it occurs in the natural setting. The system analyst watches

    the activity in progress under as study, documents the action

    observed and possibly participate in the work. It is used when the

    validity of data collection through other methods are in question or the

    complexity prevents at sources is obtained in a fast and immediate

    mood. Hence, it was very difficult to follow complex processes or sit

    through long procedures

  • 8/3/2019 Social Network System

    28/60

    Questionnaire Methods: This is a method in which a form

    containing questions is sent to every member of the sample

    population to complete. Here, a questionnaire consists of a list of

    questions relating to the aims of studying and the hypothesis to be

    verified in his response. This type of data collection is used when the

    population is too large and the area to be covered is also very large.

    Record Inspection: This method of data collection allows the

    investigator to ascertain the mode or method of operation of the

    investigated area or concept. This provides the investigator the

    avenue to identify the method embarked upon on the existing system

    or the problem are of interest.

    But during the research findings, the researcher employed the use of

    interview observation and record inspection. In the interview method

    of data collection, the researcher was permitted to interview the

    workers in the computer department of various institutions, even the

    supervisors and managers. In record inspection, the researcher saw

  • 8/3/2019 Social Network System

    29/60

    for himself the processing techniques of the social networking system

    and also the recommendations made by the expert developers.

    3.3 System Analysis

    This is an important stage in the system development lifecycle.

    According to McNab (2004), system development with the

    identification and specification of both functional and non-functional

    requirements of the system. He said to achieve this objective, that

    there is need for analyst or researcher to use systematic approach to

    ensure that specification derived are accurate and the analysis

    process is carried out in a controlled manner.

    Analysis is the breaking down of a complex structure into smaller

    units so that an intensive detailed cross-examination can be

    effectively carried out on it.

    Effiong E. E (2001) defined System analysis as the process of

    breaking down system (problems) into subsystem and their

    component parts so as to analyze on details the information needs of

    a user and thereafter develop the system requirements.

  • 8/3/2019 Social Network System

    30/60

    System analysis therefore is the study of a business problem domain

    to recommend improvements and specify the business requirements

    for a solution. It is also the dissection of a system into pieces to study

    how they interact and work.

    Meanwhile, there are lots of lapses concerning the manual

    interactions involved in the Networking Systems. Organizations are

    not satisfied with the present manual system due to what they

    described as an insecurity that they have noticed in the processing

    setup.

    The major activities that go on in the Social Network System includes;

    Interactions between current students of the department

    Interactions between previous and current students of the

    department

    Socialization within the contexts of field work and group

    learning

    Personal goal interaction etc

  • 8/3/2019 Social Network System

    31/60

    3.4 Objective of the Existing System

    Efficient and accurate services has been the objective of the already

    existing system this services rendered to their respective customers it

    to save the risk of organizational integrity or loss of vital information

    which will definitely trespass to fraud though fraudulent personnel.

    3.5 Problem of the Existing System

    Unfortunately as promising as such as a system may be, it is of note

    that the proper operation of the system has a number of dependent

    factors. First, the system requires that it has a roughly omnipotent

    view of communication among individuals. Given that groups of

    individuals will likely communicate in person at some point, one or

    more semantic gaps could be created. Such gaps would prohibit

    token passing among nodes, as well as create inaccuracies within the

    perceived social network, reducing the overall effectiveness of the

    system.

    Second, there are serious ethical implementations for a system with

    such far reaching observational capability. Regardless of whether or

    not individuals are engaging in suspicious activity, social models are

  • 8/3/2019 Social Network System

    32/60

    being created for future reference. Essentially, the data generated

    can be used to identify how close two individuals are, what they have

    been talking about, the common points of contact among them, etc.

    If an individual uses the monitored text stream exclusively for

    communication, a fairly accurate model of their relationships can be

    generated.

    3.6 Proposal of the New System

    A comprehensive study and analysis has been carried out on the

    existing mode of student interaction and their mode of social

    representation and its short comings (constraints) properly

    understood and noted. It was noticed that the method and procedures

    with experts analysis was different.

    A computerized knowledge social network system is therefore

    proposed to help solve the problem student interaction as well as

    facing the management in the control of the information within and

    outside the department as it pertains the experience of knowledge

    workers or experts in the field of ICT.

  • 8/3/2019 Social Network System

    33/60

    Considering the approaches that is to be embedded in this new

    system, the new system is expected to have an edge over the old

    existing system by having reduce time of processing data and

    immediate accurate result in the system. The proposed new system

    is also expected to incorporate characteristics of knowledge workers.

    3.7 Objective of the New System

    In theory, the deployment of this system offers a great deal of

    benefits. First, all analysis is performed in real-time. This means that,

    once deployed, the system is actively monitoring the available text

    stream for any and all communication activity. In the event that a

    malicious situation is identified, the observer of the system can either

    respond immediately or await further messages to decide whether a

    security issue exists.

    Second, the system indirectly models the complex social interactions

    of individuals. Hence, as messages are passed, it is possible to

    identify groups of people with malicious intent and how they

    collaborate. This is especially crucial to recognition of social sub-

    networks, in which normal keyword testing could be insufficient in

  • 8/3/2019 Social Network System

    34/60

    identifying individuals with malicious intent. For example, consider the

    deployment of this system in the interest of catching a group of

    criminals involved in smuggling stolen works of art across

    international borders. Assume that they are using a message passing

    network to remain in constant contact along with a multitude of

    innocent people. Using keywords involving the stolen works, simple

    text filtering could create a number of false positives from people

    simply discussing the crimes mentioned in the news. By overlaying

    detected keyword uses with social network graphs, we could detect a

    group of individuals using these words among themselves. Once the

    group is properly identified, the entire set of individuals connected

    could be captured and questioned.

    Extending upon this scenario, should any of these individuals be held

    responsible, the system has already generated a set of conversations

    shared among the guilty parties? These exchanges could easily

    translate into an evidence exhibit to be used during prosecution.

  • 8/3/2019 Social Network System

    35/60

    CHAPTER FOUR

    SYSTEM DESIGN AND IMPLEMENTATION

    4.1 System Design

    This generally involves the development of a logical and physical

    design for the proposed system that will meet the system

    requirements. System design is a process of considering several

    logical solutions and converting them into a physical solution. When

    this design is detailed, the system implementation will be determined

    and the components identified. It addressed data, processes and

    interfaces and the way in which they physical features of the system

    are arranged from the system designers perspective. During this, a

    new program and database are specified and the required equipment

    selected to implement the system. It also shows how the system

    tends to achieve its objectives by specifying the required hardware.

    The aim of the system design section is to arrive to a detailed

    conclusion of how the system is to be made operational.

  • 8/3/2019 Social Network System

    36/60

    In this phase of the project the design is expected to be an alternative

    solution of high security. This is a stage at which processes that can

    logically be combined are grouped together into an automation

    boundary.

    Furthermore, the researcher at this stage interviewed professionals in

    the area of social network implementation. Paying particular attention

    to the ways students interact in various institutions of higher learning.

    4.2 Input/Output Design and Specification

    Input Design

    Output Design

  • 8/3/2019 Social Network System

    37/60

    I designed the output of the SNS with a well outlined technique

    because the effectiveness of a system can be measured in terms of

    the output of the proposed system. The output success of the SNS

    partly depends on its input. A badly designed output or an output that

    fails to adequately present information expected of it tragically

    invalidates the systems purpose.

    The output format tells more on how the end product will look like. It

    contains the same data specification input.

    4.3 File Design

    This is a pre-detailed design of the program files by the analyst

    before they are converted to a form design. These form design will

    then contain the information from their previous state of file.

    In the course of designing these file, the researcher considered

    various types of files like;

    Master file

    Transaction file

    Report file

    History file

    Master File is a type of file that contains a set of permanently stored

    records or transaction of co-operator which can be used or

    referenced during the application process or when needed. It

  • 8/3/2019 Social Network System

    38/60

    contains records stored with a key security code. It is an indexed

    sequential file and can be accessed directly.

    Transaction File is a type of file that contains records of transaction

    which are used to update the corresponding records in master file. It

    can be maintained weekly, monthly as may be desired. It contains

    information that can be added, removed from the master file as well

    as new records.

    Report File is a type of file that contains records extracted from

    master files to be used in preparing reports probably monthly security

    checkup.

    History File is an out-dated master file or transaction file which

    retained for use for historical or dated reasons or for back-up

    purposes.

    The researcher subsequently (made use of) created all this type of

    files while designing the new system.

    4.4 Program Design

    The Social Network System has been designed to look into the

    different tasks that is constituted in the different techniques

    interaction and social statuss between the students of the computer

    science department of federal polytechnic nekede. The programs is

    designed to work on a stand-alone mode but executed and

    implemented on a personal computer with windows operating system.

  • 8/3/2019 Social Network System

    39/60

    The system is linked to a central database under the control of the

    PHP/My SQL programming language. While the database is created

    on a remote SQL server.

    The program is designed to provide the user with facilities for a

    simple query social operations so that the interaction methods and

    techniques for information passing can easily be transacted.

    File Organization Module handles entry and storage. It consists of

    data entry screen, which is the medium through which data is entered

    into the computer system and saved automatically.

    Information Requirement Module handles generation of accurate

    report. The comprehensive report and the report generators depend

    on the users request.

    Information Update Module handles the possible modification to be

    made on the already maintained record. It makes the system to be

    flexibly reliable.

    Processing Module handles the use of operators on the source

    operand so as to have a destination output.

    The researcher in the process of designing this program brought

    together certain features to make the entire program stand the mode

    of operation that is required according to the specification. The

    features are;

  • 8/3/2019 Social Network System

    40/60

    Procedure flowchart

    Program flowchart

    System flowchart.

    Procedure Flowchart is the type of flowchart that shows the flow of

    control in the way an activity is carried out in the manual system. The

    symbols used in procedure flowchart are concerned with initialization,

    procedure, decision and termination.

    This flowchart illustrates the procedures involved in processing web

    based interactive systems specifying how social network systems are

    updated.

    Start

    Splash Screen

    Input Security/Register

    If

    Passwordis correct

    Welcome Menu

    Yes

    No

  • 8/3/2019 Social Network System

    41/60

    Choose Option Menu

    If Menu

    Option =

    Open

    Input Name friend to add

    Click Find friend to search

    for file

    Input Name of friend or

    detail

    Click Locate

    Click retrieve to retrieve

    loaded file

    Stop

    Yes

    Click retrieve to retrieve

    loaded file

    If Option

    ?

    Advanced

    Cryptography

    b

    b

  • 8/3/2019 Social Network System

    42/60

    Fig. 4.4: Procedure Flowchart.

    System Flowchart

    This is a graphical representation of the steps necessary to solve a

    problem. This diagram is used to illustrate the order in which a variety

    of decisions are to be made and activities performed. It emphasizes

    how data moves in various forms through the stages of input,

    processing, output and storage.

    The input The data processing activities

    The output from each step

  • 8/3/2019 Social Network System

    43/60

    Fig. 4.4 System Flowchart

    Program Flowchart

    This feature is a clearer specification of the program design itself in a

    dramatic formation using a flowchart of symbols. Details of the

    program flowchart is illustrated in fig. 4.1

    4.5 System Requirement

    The need to run a perfect program depends on specified system

    requirement, whether hardware or software. Care is taken to identify

    input, process, storage, control and output functions. Documentation

    Enter username

    and password

    File 1

    Validation

    Validation Code

    Compact Disk

    Error Message

    Master File

    CD

    File 1

    Security Code

    Routine

    Error Message

    On Security

    Codes

  • 8/3/2019 Social Network System

    44/60

    as well is needed so as to provide detailed system description. The

    degree of dependency and accuracy is the key to an effective and

    smarter Web based interactive systems as a social networking

    software to which personnel managers, staff, students, employees,

    customers etc can trust to its operation and reliability on the hardware

    and software configuration.

    Hardware Requirement

    This is a physical component system that houses the software

    components under which the instructions work. The under listed

    devices are required in the configuration of the hardware components

    of the social network systems software (proposed system)

    1. Complete computer system comprising

    System Unit Pentium iii iv, mother board with speed of at

    least 1GHz.

    VDU

    Windows Enhanced Keyboard

    Trace ball ice mouse

    Laser Jet Printer

    2. Uninterrupted Power Supply (UPS)

    3. Other consumables flash, CD etc

  • 8/3/2019 Social Network System

    45/60

    Software Requirement

    These are written sets of instructions, procedures and associated

    documentation which help the users to achieve their processing

    objectives using the hardware components. In acquiring software, the

    institution considers the basic activity cost which helps in determining

    the cost of software to be used. The following software components

    are required in the proposed system

    Windows Operating System

    Microsoft Internet Explorer 9 or later

    Antivirus Scan of Avast, AVG, and McAfee 2009 update

    antivirus recommended.

    The above listed materials will create room for computerized

    efficiency in the system operation of the security techniques.

    4.6 System Implementation

    This is concerned with implementing the system design. The activities

    of a system implementation involves program coding in an

    appropriate language, testing, installation, training, documenting file

    set-up and conversion. Implementation of the system goes beyond

    the physical environment.

  • 8/3/2019 Social Network System

    46/60

    The management must plan for the user and operator training for the

    creation of documentation such as user manual.

    During the system implementation, a strategy must also be devised.

    Operationally, the remote login is made on the systems software

    which provides entrance for a new information requirement, security

    and modification as well.

    4.7 Program Testing

    This stage involves the testing of data processing procedures,

    production of test copies of the reports generated and other outputs,

    which are meant to be viewed again by users of the newly proposed

    system for possible errors. It involves the testing and debugging of all

    computer programs by the researcher. Methods such as walk through

    should be used to test the system incorporated with the program but

    following a system levels like

    Login testing

    Program testing

    System testing

    Acceptance testing

  • 8/3/2019 Social Network System

    47/60

    Login Testing is used especially where the system requires an

    access authentication like login modules to be tested

    Program Testing is used in the effect of each program module to

    test so as to determine whether they are working as desired.

    System Testing involves testing the complete system hardware and

    software supplemental manuals.

    Acceptance Testing is the final stage process before the system is

    said to be accepted for operational use. It involves testing the system

    with data from the organization instead of the stimulated data

    developed especially for the purpose of testing. It ensures the

    functionality of the program as anticipated.

    System Installation

    This is the process stage in system implementation that involves the

    running of the compiled program into the system i.e. the integration

    and adding of the software into the hardware component.

    Staff Training

    This is a process stage in system implementation that involves the

    production of handbooks organization of courses and lectures

  • 8/3/2019 Social Network System

    48/60

    regarding the new system. The handbook contains the description on

    how the security is to be done with the software manual, system

    specification, clerical procedures manuals and security aid are

    designed to assist the users to carry out the required instruction.

    During the training phase in the implementation stage of the new

    system, the researcher did not find it difficult to bring the students and

    staff to view the program because they are already computer literate.

    They easily understood the program as one of the programs they

    use. However, they were put through on how to

    Properly start the application

    Properly login into the system

    Enter new details and profile updates

    Create and update records

    Generate reports and queries.

    4.8 Program Documentation

    Documentation involves the process of recording the activities and

    communicating the gathered information during analysis, design and

    other system development stages. It is a form of a written text that

    accompanies a computer software, explaining how to use the

    computer software. It can mean different things to different people but

  • 8/3/2019 Social Network System

    49/60

    still stands as a vital tool for proper implementation and maintenance

    of the new system.

    Software documentation is of 3 types. Examples are;

    Design documentation

    Technical documentation

    End-User documentation

    Design Documentation is also referred to as architectural

    documentation. It is an overview of the software program in relation to

    the environment and construction principles which are to be used in

    the design of the software components.

    Technical Documentation is referred to as tool documentation in an

    overview of the codes, algorithms, interface designs etc. This usually

    is not availed to the users unless they are programmers in most

    cases.

    End User Documentation is the documentation for the users

    describing how the software is to be used after installation as

    discussed earlier. It describes these features to the users and assists

    in realizing these features. It can be extended to troubleshooting

    assistance and be considered to consist of contracts that specifies

    what the limit of the software. It avails manuals for support staff end

    user and the system administrator of the constitution.

  • 8/3/2019 Social Network System

    50/60

    The researcher considered the end-user documentation as the best

    documentation approach for the security after training the staff.

    Added in the documentation is the model of the model of the system

    components;

    The detailed description of these components

    The organizational structure and usage

    The users responsibilities to the software

    Hence the researcher also considered the purpose of documenting

    this project work, which is to stand as a standard for analysis and

    design work and finally to reserve the essentials of having an expert

    knowledge.

    4.9 System Set-Up and Conversion

    During file setup it is necessary to convert the existing master file to a

    new form. This new form is the responsibility of the newly designed,

    which undergoes the process of converting the old system master file

    to a new one.

    System Conversion is a transformation process stage in system

    implementation at which the newly designed system is put in place of

    the old system by the organization after been tested and documented

  • 8/3/2019 Social Network System

    51/60

    to prove that it is working. It is a significant milestone after which the

    ownership of the system if been officially transferred from the

    researcher (analyst) and the programmer to the end user.

    The researcher completed the above process by carefully carrying

    out a planned conversion which include detailed installation strategies

    following stages below;

    Collecting the documentation to ascertain its usefulness as atraining guide to the development user.

    Writing the user documentation manuals as the need arises.

    Referring to the planned conversion in review of the training

    needs to the system users.

    Scheduling the training sessions.

    Conducting the training sessions

    Distributing the user documentation

    The under listed are various system conversion briefly described to

    enable the implementation process.

    Parallel System of Conversion

    This takes place simultaneously at the same time, runs between the

    old and new system until probably the new system is completely put

    in place and the old system discarded.

  • 8/3/2019 Social Network System

    52/60

    Direct System of Conversion

    This takes place automatically at a time over a short period of time. It

    saves cost, manages time and enhances fast operation but finds to a

    high risk of failure without new system comparability.

    Pilot System of Conversion

    This takes place sequentially with the introduction of the new system

    in a particular section of the organization. It encourages adequate

    testing but does not embrace an instructed organization.

    From the above descriptions, it was observed imperatively that the

    parallel system of conversion is in the best position as the next

    alternative means to cater the need of the security management

    because the new system is allowed to operate identified and

    corrected from the old system.

    Finally, the researcher choose this system of conversion because it

    minimizes the risk of major flows in the new system by avoiding the

    irreparable harm to the department.

    4.10 System Evaluation and Maintenance

  • 8/3/2019 Social Network System

    53/60

    System Evaluation means to watch the implemented system to know

    whether or not achieving the aims and objectives of designing it. The

    system performance needs to be evaluated in terms of the current

    user requirement. If differences are found the cost has to be

    evaluated or ascertained. It may be that the system has changed

    from its original specification or inadequate care caused by improper

    implementation.

    The evaluation procedures compares the reasons advanced from

    designing and implementation of the proposed system. The

    comparison is mostly to check whether the benefit estimate is equal

    to the benefit obtained or to check estimated list in line with the actual

    cost. Evaluation is carried in three levels which include cost analysis,

    operational efficiency and intangible benefits.

    System evaluation is vital for the fact that;

    It is to deal with unexpected problems arising in operation.

    It is to confirm that the planned objective are been met and to

    take action if they are not.

    It is to ensure that the system should be able to cope with the

    changing requirement of the department

  • 8/3/2019 Social Network System

    54/60

  • 8/3/2019 Social Network System

    55/60

    Preventive Maintenance: This covers attempts to make the software

    perform more effectively. It includes user requests for enhancement,

    improvement due to experience, changes to make the software more

    easy to use and rewrite the code to make the maintenance that is

    specifically used for the new system to reduce its chances of

    breakages.

    Hence, the researcher advised the use of preventive and corrective

    maintenance to reduce the chances of breaking down to all and

    subsequently advise these;

    Proper staff orientation on the use and operation of the program

    before the administration.

    Frequent checking of the network and list base to facilitate easy

    access and integration of the staff entirely.

    Consultation of IT professionals periodically to render services

    that may be of need to meet the modern technology demands.

  • 8/3/2019 Social Network System

    56/60

  • 8/3/2019 Social Network System

    57/60

    underdeveloped to adequately judge. Several unexplored research

    topics remain, while other areas require further elaboration.

    The biggest question, however, is determining what roles this system

    would play within a security-oriented environment. The most basic

    role would be discovering an information leak within a communication

    network. Deployed within companies and organizations concerned

    with sensitive data, given a number of sensitive keywords this system

    could detect when a leak occurred and how the information has

    spread.

    Another more advanced role involves observing behavior within a

    public network. Assuming the necessary resources and authorization

    was available; this system could assist in identifying groups of

    individuals using a network for unlawful or undesirable intentions.

    A previous example mentioned earlier in this document mentioned

    tracking a group of thieves. Other scenarios could be terrorist

    identification, discovery of criminal information networks, and virtually

    any group of individuals discussing key subjects. Between ethical

  • 8/3/2019 Social Network System

    58/60

    concerns and unexplored areas of machine learning applications,

    more research is clearly necessary. Temporal characteristics of

    tokens alone could determine the validity of generated data.

    5.2 Recommendation

    Institutions should take adequate care during the implementation and

    maintenance of the system. This should be given proper

    consideration due to its importance to effective and efficient

    deployment and operation of the system by adopting parallel change-

    over procedure and applying the technique of preventive after the

    implementation, corrective maintenance should be done to fix it up.

    In addition, the organization should give due consideration to its

    limitation, so that they should not have over reliance on the system

    because it may stifle creative thinking and lead to advice delivered

    being slavishly followed and effects of other limitations.

  • 8/3/2019 Social Network System

    59/60

    References

    Asal, V., Nussbaum, B. and D.W. Harrington (2007) Terrorism as

    Transnational Advocacy: An Organisational and Tactical

    Examination, Studies in Conflict & Terrorism 30(1):15-39

    Borgatti S.P. and P.C. Foster (2003) The Network Paradigm in

    Organisational Research: A Review and Typology. Journal of

    Management29:991-1013

    Diani, M. and D. McAdam (2003) Social Movements and Networks:

    Relational Approaches to Collective Action, Chapter 1 & 2

    Crossley, N. (2007) Social Networks and Extraparliamentary Politics.

    Sociology Compass 1(1):222-236

    Kahler, M. (2009) Collective Action and Clandestine Networks: The

    Case of Al Qaeda. Pp. 103-126 in Networked Politics: Agency,

    Power and Governance, London: Cornell University Press

    Knoke, D. and J.H. Kuklinski (1982) Network Analysis, Chapter 2

    Wasserman, S., and K. Faust (1994) Social Network Analysis:

    Methods and Applications, Chapter 2

    Pedahzur, A. and A. Perliger (2006) Changing Nature of Suicide

    Attacks A Social Network Perspective, Social Forces 64(4):1988-

    2008

  • 8/3/2019 Social Network System

    60/60

    Singerman, D. () The Networked World of Islamist Social

    Movements Pp. 143-163 Q. Wiktorowicz (ed.) Islamic Activism: A

    Social Movement Theory Approach, Bloomington: Indiana University

    Press

    Talmud, I. and S. Mishal. (2000) The Network State: Triangular

    Relations in Middle Eastern Politics. International Journal of

    Contemporary Sociology37(2):176-207