Social Network System
-
Upload
morrison-a-akponumeta -
Category
Documents
-
view
217 -
download
0
Transcript of Social Network System
-
8/3/2019 Social Network System
1/60
ABSTRACT
This research work, social network system fouses on the building and
verifying of online social networks for communities of people who
share interests and activities, or who are interested in exploring the
interests and activities of others seen as the computer science
students of federal polytechnic nekede as they which necessitates
the use of software.
A report published by OCLC provides the following definition of social
networking systems of this like: Web sites primarily designed to
facilitate interaction between users who share interests, attitudes and
activities, such as Facebook, Mixi and MySpace.
-
8/3/2019 Social Network System
2/60
CHAPTER ONE
INTRODUCTION
1.1 Background of the study
Social network systems can best be defined as the intricate webs of
relationships by which an individual participates in the larger world.
Each relationship links an individual to another individual or groups of
other individuals, friends, organizations, institutions, or communities.
In this way, social networks create the context in which people live
among fellow human beings. After all, individuals are not simply
isolated entities with innate sets of preferences and desires, but are
woven into the larger fabric of community in which their desires,
preferences, and behaviors are shaped by the interactions and
relationships among the people they know and the formal and
informal groups they are part of. In this way, just about everyone
participates in many different social networks at the same time. By
looking at the types of relationships and the patterns of interaction
that inform these networks, we can understand the larger social
context in which the computer science students of federal polytechnic
nekede live.
-
8/3/2019 Social Network System
3/60
These network relationships are organized around certain dimensions
of life called domains. Family, work, culture, geography, identity,
interests, and shared values are among the most important domains
by which networks are structured. Each domain may include a set of
nodes or clusters. A node is a single relationship in the network,
whether it is with an individual or a group. A cluster is a group of such
relationships, a set of nodes organized around common principles.
For example, work is an important domain of life, and the people one
works with may be one cluster of the network.
1.1 Statement of the problem
Since the creation of the computer science department in the Federal
Polytechnic Nekede, all forms of interaction between students are
done face-to-face by making use of physical classrooms, cafes,
shops outside gathering etc. However, with the increasing rate of
literacy, which leads to high demand in education, learning and
knowledge interaction, the above described system as practiced has
failed to meet the requirement of student interaction and learning to
students who finds joy in social gathering and interactions.
-
8/3/2019 Social Network System
4/60
-
8/3/2019 Social Network System
5/60
Authentication: The assurance or verification that the resource at
the other end of the session really is what it claims to be solid
authentication depends on a system against the security risk of
impersonation, which a sender or receiver uses a false identity to
access a system. Traditionally, systems have used passwords and
usernames for authentication. Digital certificates can provide a more
secure method of authentication while offering other security benefits
as well. When system is linked to a public network like the internet,
user authentication takes on new dimensions.
Authorization: The assurance that the person or computer at the
other end of the session has permission to carry out the request.
Authorization is the process of determining who or what can access
system to socialize with other students and share common resources
or perform certain activities on a system. Typically, authorization is
performed in context of authentication.
Data Integrity: Data is protected from unauthorized changes or
tampering. This depends against the security risk of manipulation, in
-
8/3/2019 Social Network System
6/60
which someone intercepts and changes information to which he or
she is not authorized. In addition to protecting data that is stored
within the Social Network System, one might need additional security
to ensure data integrity when data enters the database from
untrusted sources.
System Integrity: The system provides consistent and expected
results with expected performance. This is the most commonly
overlooked component of interaction. For example makes it extremely
difficult for a hacker to imitate or change an operating system
program when you use a certain security level.
1.3 Significance of the study
The system focused on providing a social network system for
computer science students in the federal polytechnic, nekede as well
as in educational management and leadership (administration), staff
development, preparation and maintenance of School Improvement
Plans (SIP). Upon completion, the participants attained the minimum
requirements to be able to:
-
8/3/2019 Social Network System
7/60
Understand the educational change process and related drivers
of change.
Manage in the context of change and amidst a turbulent
environment.
Analyze the education industry and evaluate their schools for
relevance and appropriateness with respect to purpose, structure
and patterns of relationships.
Demonstrate an understanding of the role of stakeholders and
their impact on the effective management of the institution.
Develop interpersonal communication and group process skills.
Develop the capacity to understand and manage the financial
aspect of their jobs.
Improve written communications in report writing, memos and
correspondence.
Apply a Service orientation to educational management aimed
at increasing the efficiency and effectiveness of the institutions.
Furthermore, it will serve as an aid to student interaction problems
which higher institutions face in recent times. It will equally serve as a
-
8/3/2019 Social Network System
8/60
linkage between students in different levels of study in the
department.
1.4 Scope and Limitation of the Study
This study covers the concept of Social Network Systems with much
emphasis on the interaction between students of computer science
department as well as implementation to the problem of higher
institutions. The study scope is limited to students interaction and
effective distance learning as solely carried out on various institutions
of learning in our society today. The limitations are listed below: -
Social Security Constraint: It was very tedious to gather information
concerning the essence of security in a social network system from
educational institution. Even when explanations were made and
permission letter offered, all they could offer was to design a
questionnaire, which extended more of the time required for the work.
Programming: This is another aspect of this project that was very
difficult to achieve. Due to the technicalities involved in developing a
-
8/3/2019 Social Network System
9/60
standard Social Network System, more training was encountered
which made the implementation process to be slightly delayed.
Time Constraint: The time frame given to achieve or accomplish this
project was very short and it was carried out under pressure.
Resource Constraint: There were limited resources even when they
are available. Due to bias and double nature of the information supply
by various forms responsible the visitation were discouraged.
-
8/3/2019 Social Network System
10/60
CHAPTER TWO
LITERATURE REVIEW
2.1 Literature Review
In a research of this nature, the work extensive of other authors and
researchers alike, especially those whose work are cited because of
their elaborate work carried out in their study, are the most
appropriate tools to gather related literatures. Therefore, this literature
review is a well integrated and articulated discussion on Social
Network Systems.
2.2 Social network analysis
Social network analysis is an approach within social sciences which
focuses on the web of relations between social actors (individuals,
organisations, countries etc). It is based on the premise that the
pattern of relations between social actors affects them in multiple
ways as well as the whole network within which they are embedded.
Social network analysis enables us to examine the questions
concerning the distribution of power and influence within a network
and often to predict its evolvement.
-
8/3/2019 Social Network System
11/60
The aim of the module is to introduce students to network analysis
literature focusing on the issues concerning the computer science
department of federal polytechnic nekede. The module consists of
two parts: theoretical and practical. I will first study the theoretical
foundations of social network analysis and learn the main concepts
used within this approach. And then consider the application of
network analysis in various sub-fields of computer science and in
particular, social movements and international relations studies.
During the practical part of the module students will acquire skills
enabling them to utilize network analysis in their independent
projects. The students will have an opportunity to learn about data
collection methods and basic analysis techniques.
2.3 What Can Social Networks Be Used For?
Social networks can provide a range of benefits to members of an
organisation:
Support for learning: Social networks can enhance informal
learning and support social connections within groups of learners
and with those involved in the support of learning.
-
8/3/2019 Social Network System
12/60
Support for members of an organisation: Social networks
can potentially be used my all members of an organisation, and
not just those involved in working with students. Social networks
can help the development of communities of practice.
Engaging with others: Passive use of social networks can
provide valuable business intelligence and feedback on
institutional services (although this may give rise to ethical
concerns).
Ease of access to information and applications: The ease of
use of many social networking services can provide benefits to
users by simplifying access to other tools and applications. The
Facebook Platform provides an example of how a social
networking service can be used as an environment for other
tools.
Common interface: A possible benefit of social networks may
be the common interface which spans work / social boundaries.
Since such services are often used in a personal capacity the
interface and the way the service works may be familiar, thus
minimizing training and support needed to exploit the services in
a professional context. This can, however, also be a barrier to
-
8/3/2019 Social Network System
13/60
those who wish to have strict boundaries between work and
social activities.
2.4 Examples of Social Networking Services
Examples of popular social networking services include:
Facebook: Facebook is a social networking Web site that allows
people to communicate with their friends and exchange information.
In May 2007 Facebook launched the Facebook Platform which
provides a framework for developers to create applications that
interact with core Facebook features.
MySpace: MySpace is a social networking Web site offering an
interactive, user-submitted network of friends, personal profiles, blogs
and groups, commonly used for sharing photos, music and videos..
Ning: An online platform for creating social Web sites and social
networks aimed at users who want to create networks around specific
interests or have limited technical skills.
Twitter: Twitter is an example of a micro-blogging service. Twitter
can be used in a variety of ways including sharing brief information
with users and providing support for ones peers.
Note that this brief list of popular social networking services omits
popular social sharing services such as Flickr and YouTube.
-
8/3/2019 Social Network System
14/60
2.5 Opportunities and Challenges
The popularity and ease of use of social networking services have
excited institutions with their potential in a variety of areas. However
effective use of social networking services poses a number of
challenges for institutions including long-term sustainability of the
services; user concerns over use of social tools in a work or study
context; a variety of technical issues and legal issues such as
copyright, privacy, accessibility; etc.
Institutions would be advised to consider carefully the implications
before promoting significant use of such services.
2.6 Why Look At Social Networks
Understanding the dynamics of social networks is critical to the
success of several aspects of companies operations, including
research and development, innovation, communications, marketing,
new product development, and human resources. Indeed, social
networks play an important role as communication channels between
the companies and consumers and among consumers themselves.
-
8/3/2019 Social Network System
15/60
2.7 Creation of Social Networks
Social networks are formed well before we are aware that we even
have them. Indeed, from the time we are born, networks spring up
around us based on the family we are born into, the places we
frequent, the clubs we join, the schools we attend, the things we do,
and the people we come to know. All of lifes routines, great events,
and transitions affect the development and evolution of these
networks; entering school, moving from elementary to middle to high
school, participating in chat rooms, moving to another town, state, or
country, attending social events, joining the swim team, going to
college, studying abroad, or getting that first job. All these life-
changing events have profound influence on the architecture and
evolution of our social networks.
With every new encounter, connections emerge, linking an individual
to defined sets of people, organizations, institutions, and
communities, both on- and offline. Some connections are prominent
in the network, while others lie latent. Few connections ever go away.
Some exist without effort, and others require work. Some may be
-
8/3/2019 Social Network System
16/60
activated and deactivated over time, which requires careful
management strategies. In the end, many factors influence
the creation and evolution of a social network, including personal
interests, mobility between places and institutions, and the actions of
other people, parents and siblings, extended family, peers, friends,
teachers, and other important members of the network.
2.8 Networked Organization
If a social network is a web of relationships that evolves from the time
we are born, then each relationship is a node in that network point of
connection for any number of other relationships.
How are these nodes organized to form networks?
The participants in my study have given me important clues.
The young people I interviewed had different ways of talking about
the nodes in their networks. Some nodes were described as
individuals, others as clusters of people. In the case of Luis, for
example, a 19-year-old of Argentine descent in Silicon Valley, his
network consisted mainly of family groupings.
How do these relationships emerge?
With the help of the student participants, I was able to determine that
-
8/3/2019 Social Network System
17/60
nodes crystallize around eight key dimensions that serve as platforms
for building relationships.
2.9 Abundant Connectivity Redefines Network Dimensions
Young people are forming networks along multiple dimensions and
across traditional boundaries of geography and place. The networks
formed along these lines are extensive and diverse, each exerting
influence on an individuals desires, needs, and preferences.
By compounding or superimposing dimensions on top of each other,
individuals are redefining the dimensions themselves. For example,
ethnicity and institutions are superimposed and compounded in
Davids network. David participates in ROTC and actively recruits his
Asian friends to join ROTC. As a result, most participants in ROTC at
his school are Asian. To them, ROTC is less about patriotism and
more a platform for participating in American society. they are looking
for resources to get to college, become professionals, and achieve
their dreams.
-
8/3/2019 Social Network System
18/60
ROTC has become a resource not only for the individuals directly
involved in the program but for the Asian immigrant community as a
whole. ROTC provides ready-made access to resources,
organizational infrastructure, knowledge, and activities and provides a
connection to people in the community. In the end, ROTC is an
efficient way to become American.
I also see this superimposing of dimensions in Bernards network. He
is the classic Silicon Valley entrepreneurial personality who doesnt
differentiate friends from potential work relationships along any of
these dimensions. For him, his French friends, his gaming friends,
people at work, people he lives with, and so on are all potential
clients, partners, founders, or employees of Bernard Inc. Bernard
doesnt separate the personal from work.
2.10 Traditional Measurements Dont Work Anymore
It is important for businesses to understand the way young people
compound dimensions because traditional definitions and
measurements of the hybrid categories formed as a result of such
compounding no longer work. Traditional measurements by
demographic, socioeconomic, and psychographic characteristics take
-
8/3/2019 Social Network System
19/60
only a few dimensions into account when trying to target relatively
large consumer groups. Such broad categories may have worked
when there were fewer communication channels and fewer
possibilities for connecting across geographies, interests, and values,
but they fail to capture the richness and multidimensionality of todays
youth.
2.11 Social Network Management
The young people I interviewed are creating relationships across
boundaries of geography, ethnicity, culture, values, institutions,
interests, and communities. In fact, all the dimensions that have
traditionally served as the basis for creating social relationships in the
physical world have been fragmented by increasingly sophisticated
information and communication technologies, compounding the
possibilities for new and different types of relationships and making
the resulting networks quite complex.
The extended reach and complexity of these networks mean that
people must actively manage them if they want to get the most from
them. Indeed, network management is evolving as an indispensable
skill for living in the 21st century.
-
8/3/2019 Social Network System
20/60
2.12 Network Management Practices
Recruitment, activation, and deactivation are only some of the ways
individuals manage their networks. Indeed, there is a toolbox of
different practices for managing networks from which people can
choose at different times and for different purposes.
Recruiting
Recruiting is the practice of identifying and adding new members to
the network. At the most basic level, of course, networks cant exist
without recruiting. There are various strategies for doing so. Finding
people through online chat groups, hanging out with friends who
serve as magnets for others, or going to new places to meet new
people. For example, Jonas from Sweden, who describes himself as
shy, has found that recruiting young women to chat with him on ICQ
is a good way to have conversations with the opposite sex with little
risk of personal embarrassment. His criteria for an ongoing contact
are:
(1) How often they go online (no use talking to somebody who is not
regularly online, he figures).
(2) How able they are to carry on a conversation and discussion. As a
result, Jonas has about 30 friends (of whom 10 are also real life
-
8/3/2019 Social Network System
21/60
friends) on his ICQ list. Out of his 20 online friends, only one is
Swedish, and they are all girls. To get as big a selection as possible,
he sends ICQ chat requests in English, which explains the large
foreign component. Mr. Jones is responsible for the Japan program in
the school attended by David, a 15-year-old Chinese Vietnamese
American in Silicon Valley. To get students interested in learning
about the Japanese language and culture, Mr. Jones has been
particularly keen to use technology such as Japanese voice
recognition programs and other educational support tools in the
classroom. He has also introduced flashy activities such as Japan
Bowl, the Japanese cheering section at the homecoming game, and
an exchange program with Okayama to attract interest for the
program.
-
8/3/2019 Social Network System
22/60
2.13 Social networks drive media preferences and Protocols for
communication
Communication technologies, whether the Internet, pagers, or mobile
phones, facilitate network management. Indeed, such technologies
make up the infrastructure that sustains most social networks these
days. Not only do they allow individuals to broaden the reach of their
networks, but they also allow them to engage in the practices
necessary for effective network management, surveillance, pruning,
activation, recruitment, and so on. In fact, features such as phone
lists on mobile phones and buddy lists for instant messaging have
become proxies for the network itself. Moving people on and off these
lists is one way of managing the abundant social connectivity
technology has created in their lives.
The network itself plays an important role in defining media
preferences for groups or clusters within the network. For some
groups, the technology of choice may be a Web site, for others
mobile phones or IM sites.
-
8/3/2019 Social Network System
23/60
2.14 Social networks drive media preferences and
Protocols for communication
Communication technologies, whether the Internet, pagers, or mobile
phones, facilitate network management. Indeed, such technologies
make up the infrastructure that sustains most social networks these
days. Not only do they allow individuals to broaden the reach of their
networks, but they also allow them to engage in the practices
necessary for effective network management, surveillance, pruning,
activation, recruitment, and so on. In fact, features such as phone
lists on mobile phones and buddy lists for instant messaging have
become proxies for the network itself. Moving people on and off these
lists is one way of managing the abundant social connectivity
technology has created in their lives.
The network itself plays an important role in defining media
preferences for groups or clusters within the network. For some
groups, the technology of choice may be a Web site, for others
mobile phones or IM sites.
-
8/3/2019 Social Network System
24/60
CHAPTER THREE
RESEARCH METHODOLOGY, SYSTEM INVESTIGATION AND
ANALYSIS
3.1 Research Methodology
This research is based on the investigation undertaken in order to
discover new facts and also to get additional information. This is also
a systematic approach towards the collection of data, methods of
analyzing these data to test the hypothesis and the condition for
acceptability of the hypothesis. The description of the population
samples(s) that was selected.
Methodology is the methods that are necessary to achieve the
required subjects and fact. Therefore, research methodology is a
detailed description of what the researcher planned and procedures
adopted in gathering new facts relent to the project work.
Meanwhile, the researcher employed different types of research
findings methods. The researcher considered or did in depth and
comprehensive study to gather vital and relevant facts which would
-
8/3/2019 Social Network System
25/60
assist or be an embodiment in the design of the new system upon the
existing system.
Source Of Data
The researcher used two sources of data which include the following:
Primary Sources: This type of source, permitted the researcher to
derive first hand observation, experiences, investigation conducted
through a survey (questionnaire interview). These data were collected
for a special purpose by the researcher from various instructions of
higher learning, financial institutions and organizations. In this type of
data source, terms are carefully defined so that as far as it is humanly
possible by the researcher and misunderstanding also avoided.
Secondary Source: This source involves the researcher deriving
data from other materials such as textbooks, internet, articles,
computer journals, newspapers, magazines etc. Secondary source of
data is represented as an already made work.
3.2 System Investigation
-
8/3/2019 Social Network System
26/60
In the beginning of every system development is a concept where the
need to develop a new system is determined. Uzoeshi (2002),
emphasized that data collection is a tedious exercise when an
investigation is being conducted. The examination of the old system
is an in-depth detailed and comprehensive study carried out with
relevant facts that will be helpful in designing the system. It helps to
identify the objectives, problems and comprehensive study carried
out upon the odd system to find out relevant facts that will be of help
in designing the new system.
During this phase, methods of collecting data for information are first
hand discussion. Hence, there are two major ways of collecting these
data: primary and secondary ways.
Methods Of Data Collection
The researcher employed the following methods of data collection in
writing this project:
Interview
Observation
Questionnaire
-
8/3/2019 Social Network System
27/60
Record Inspection
Interview Method: In this type of data collection, a conversation is
carried out with definite aim of obtaining certain information. It is
designed to gather valid and reliable information through the
response of the interview to planned sequence of question. This type
of data collection method is a confrontation between two people
either face to face or through a medium such as telephone. This
method provides the research on-the-spot assessment of the
interviewee and the chance of probing the respondents further so as
to elicit further information.
Observation Method: This gives the privilege of witnessing the
events as it occurs in the natural setting. The system analyst watches
the activity in progress under as study, documents the action
observed and possibly participate in the work. It is used when the
validity of data collection through other methods are in question or the
complexity prevents at sources is obtained in a fast and immediate
mood. Hence, it was very difficult to follow complex processes or sit
through long procedures
-
8/3/2019 Social Network System
28/60
Questionnaire Methods: This is a method in which a form
containing questions is sent to every member of the sample
population to complete. Here, a questionnaire consists of a list of
questions relating to the aims of studying and the hypothesis to be
verified in his response. This type of data collection is used when the
population is too large and the area to be covered is also very large.
Record Inspection: This method of data collection allows the
investigator to ascertain the mode or method of operation of the
investigated area or concept. This provides the investigator the
avenue to identify the method embarked upon on the existing system
or the problem are of interest.
But during the research findings, the researcher employed the use of
interview observation and record inspection. In the interview method
of data collection, the researcher was permitted to interview the
workers in the computer department of various institutions, even the
supervisors and managers. In record inspection, the researcher saw
-
8/3/2019 Social Network System
29/60
for himself the processing techniques of the social networking system
and also the recommendations made by the expert developers.
3.3 System Analysis
This is an important stage in the system development lifecycle.
According to McNab (2004), system development with the
identification and specification of both functional and non-functional
requirements of the system. He said to achieve this objective, that
there is need for analyst or researcher to use systematic approach to
ensure that specification derived are accurate and the analysis
process is carried out in a controlled manner.
Analysis is the breaking down of a complex structure into smaller
units so that an intensive detailed cross-examination can be
effectively carried out on it.
Effiong E. E (2001) defined System analysis as the process of
breaking down system (problems) into subsystem and their
component parts so as to analyze on details the information needs of
a user and thereafter develop the system requirements.
-
8/3/2019 Social Network System
30/60
System analysis therefore is the study of a business problem domain
to recommend improvements and specify the business requirements
for a solution. It is also the dissection of a system into pieces to study
how they interact and work.
Meanwhile, there are lots of lapses concerning the manual
interactions involved in the Networking Systems. Organizations are
not satisfied with the present manual system due to what they
described as an insecurity that they have noticed in the processing
setup.
The major activities that go on in the Social Network System includes;
Interactions between current students of the department
Interactions between previous and current students of the
department
Socialization within the contexts of field work and group
learning
Personal goal interaction etc
-
8/3/2019 Social Network System
31/60
3.4 Objective of the Existing System
Efficient and accurate services has been the objective of the already
existing system this services rendered to their respective customers it
to save the risk of organizational integrity or loss of vital information
which will definitely trespass to fraud though fraudulent personnel.
3.5 Problem of the Existing System
Unfortunately as promising as such as a system may be, it is of note
that the proper operation of the system has a number of dependent
factors. First, the system requires that it has a roughly omnipotent
view of communication among individuals. Given that groups of
individuals will likely communicate in person at some point, one or
more semantic gaps could be created. Such gaps would prohibit
token passing among nodes, as well as create inaccuracies within the
perceived social network, reducing the overall effectiveness of the
system.
Second, there are serious ethical implementations for a system with
such far reaching observational capability. Regardless of whether or
not individuals are engaging in suspicious activity, social models are
-
8/3/2019 Social Network System
32/60
being created for future reference. Essentially, the data generated
can be used to identify how close two individuals are, what they have
been talking about, the common points of contact among them, etc.
If an individual uses the monitored text stream exclusively for
communication, a fairly accurate model of their relationships can be
generated.
3.6 Proposal of the New System
A comprehensive study and analysis has been carried out on the
existing mode of student interaction and their mode of social
representation and its short comings (constraints) properly
understood and noted. It was noticed that the method and procedures
with experts analysis was different.
A computerized knowledge social network system is therefore
proposed to help solve the problem student interaction as well as
facing the management in the control of the information within and
outside the department as it pertains the experience of knowledge
workers or experts in the field of ICT.
-
8/3/2019 Social Network System
33/60
Considering the approaches that is to be embedded in this new
system, the new system is expected to have an edge over the old
existing system by having reduce time of processing data and
immediate accurate result in the system. The proposed new system
is also expected to incorporate characteristics of knowledge workers.
3.7 Objective of the New System
In theory, the deployment of this system offers a great deal of
benefits. First, all analysis is performed in real-time. This means that,
once deployed, the system is actively monitoring the available text
stream for any and all communication activity. In the event that a
malicious situation is identified, the observer of the system can either
respond immediately or await further messages to decide whether a
security issue exists.
Second, the system indirectly models the complex social interactions
of individuals. Hence, as messages are passed, it is possible to
identify groups of people with malicious intent and how they
collaborate. This is especially crucial to recognition of social sub-
networks, in which normal keyword testing could be insufficient in
-
8/3/2019 Social Network System
34/60
identifying individuals with malicious intent. For example, consider the
deployment of this system in the interest of catching a group of
criminals involved in smuggling stolen works of art across
international borders. Assume that they are using a message passing
network to remain in constant contact along with a multitude of
innocent people. Using keywords involving the stolen works, simple
text filtering could create a number of false positives from people
simply discussing the crimes mentioned in the news. By overlaying
detected keyword uses with social network graphs, we could detect a
group of individuals using these words among themselves. Once the
group is properly identified, the entire set of individuals connected
could be captured and questioned.
Extending upon this scenario, should any of these individuals be held
responsible, the system has already generated a set of conversations
shared among the guilty parties? These exchanges could easily
translate into an evidence exhibit to be used during prosecution.
-
8/3/2019 Social Network System
35/60
CHAPTER FOUR
SYSTEM DESIGN AND IMPLEMENTATION
4.1 System Design
This generally involves the development of a logical and physical
design for the proposed system that will meet the system
requirements. System design is a process of considering several
logical solutions and converting them into a physical solution. When
this design is detailed, the system implementation will be determined
and the components identified. It addressed data, processes and
interfaces and the way in which they physical features of the system
are arranged from the system designers perspective. During this, a
new program and database are specified and the required equipment
selected to implement the system. It also shows how the system
tends to achieve its objectives by specifying the required hardware.
The aim of the system design section is to arrive to a detailed
conclusion of how the system is to be made operational.
-
8/3/2019 Social Network System
36/60
In this phase of the project the design is expected to be an alternative
solution of high security. This is a stage at which processes that can
logically be combined are grouped together into an automation
boundary.
Furthermore, the researcher at this stage interviewed professionals in
the area of social network implementation. Paying particular attention
to the ways students interact in various institutions of higher learning.
4.2 Input/Output Design and Specification
Input Design
Output Design
-
8/3/2019 Social Network System
37/60
I designed the output of the SNS with a well outlined technique
because the effectiveness of a system can be measured in terms of
the output of the proposed system. The output success of the SNS
partly depends on its input. A badly designed output or an output that
fails to adequately present information expected of it tragically
invalidates the systems purpose.
The output format tells more on how the end product will look like. It
contains the same data specification input.
4.3 File Design
This is a pre-detailed design of the program files by the analyst
before they are converted to a form design. These form design will
then contain the information from their previous state of file.
In the course of designing these file, the researcher considered
various types of files like;
Master file
Transaction file
Report file
History file
Master File is a type of file that contains a set of permanently stored
records or transaction of co-operator which can be used or
referenced during the application process or when needed. It
-
8/3/2019 Social Network System
38/60
contains records stored with a key security code. It is an indexed
sequential file and can be accessed directly.
Transaction File is a type of file that contains records of transaction
which are used to update the corresponding records in master file. It
can be maintained weekly, monthly as may be desired. It contains
information that can be added, removed from the master file as well
as new records.
Report File is a type of file that contains records extracted from
master files to be used in preparing reports probably monthly security
checkup.
History File is an out-dated master file or transaction file which
retained for use for historical or dated reasons or for back-up
purposes.
The researcher subsequently (made use of) created all this type of
files while designing the new system.
4.4 Program Design
The Social Network System has been designed to look into the
different tasks that is constituted in the different techniques
interaction and social statuss between the students of the computer
science department of federal polytechnic nekede. The programs is
designed to work on a stand-alone mode but executed and
implemented on a personal computer with windows operating system.
-
8/3/2019 Social Network System
39/60
The system is linked to a central database under the control of the
PHP/My SQL programming language. While the database is created
on a remote SQL server.
The program is designed to provide the user with facilities for a
simple query social operations so that the interaction methods and
techniques for information passing can easily be transacted.
File Organization Module handles entry and storage. It consists of
data entry screen, which is the medium through which data is entered
into the computer system and saved automatically.
Information Requirement Module handles generation of accurate
report. The comprehensive report and the report generators depend
on the users request.
Information Update Module handles the possible modification to be
made on the already maintained record. It makes the system to be
flexibly reliable.
Processing Module handles the use of operators on the source
operand so as to have a destination output.
The researcher in the process of designing this program brought
together certain features to make the entire program stand the mode
of operation that is required according to the specification. The
features are;
-
8/3/2019 Social Network System
40/60
Procedure flowchart
Program flowchart
System flowchart.
Procedure Flowchart is the type of flowchart that shows the flow of
control in the way an activity is carried out in the manual system. The
symbols used in procedure flowchart are concerned with initialization,
procedure, decision and termination.
This flowchart illustrates the procedures involved in processing web
based interactive systems specifying how social network systems are
updated.
Start
Splash Screen
Input Security/Register
If
Passwordis correct
Welcome Menu
Yes
No
-
8/3/2019 Social Network System
41/60
Choose Option Menu
If Menu
Option =
Open
Input Name friend to add
Click Find friend to search
for file
Input Name of friend or
detail
Click Locate
Click retrieve to retrieve
loaded file
Stop
Yes
Click retrieve to retrieve
loaded file
If Option
?
Advanced
Cryptography
b
b
-
8/3/2019 Social Network System
42/60
Fig. 4.4: Procedure Flowchart.
System Flowchart
This is a graphical representation of the steps necessary to solve a
problem. This diagram is used to illustrate the order in which a variety
of decisions are to be made and activities performed. It emphasizes
how data moves in various forms through the stages of input,
processing, output and storage.
The input The data processing activities
The output from each step
-
8/3/2019 Social Network System
43/60
Fig. 4.4 System Flowchart
Program Flowchart
This feature is a clearer specification of the program design itself in a
dramatic formation using a flowchart of symbols. Details of the
program flowchart is illustrated in fig. 4.1
4.5 System Requirement
The need to run a perfect program depends on specified system
requirement, whether hardware or software. Care is taken to identify
input, process, storage, control and output functions. Documentation
Enter username
and password
File 1
Validation
Validation Code
Compact Disk
Error Message
Master File
CD
File 1
Security Code
Routine
Error Message
On Security
Codes
-
8/3/2019 Social Network System
44/60
as well is needed so as to provide detailed system description. The
degree of dependency and accuracy is the key to an effective and
smarter Web based interactive systems as a social networking
software to which personnel managers, staff, students, employees,
customers etc can trust to its operation and reliability on the hardware
and software configuration.
Hardware Requirement
This is a physical component system that houses the software
components under which the instructions work. The under listed
devices are required in the configuration of the hardware components
of the social network systems software (proposed system)
1. Complete computer system comprising
System Unit Pentium iii iv, mother board with speed of at
least 1GHz.
VDU
Windows Enhanced Keyboard
Trace ball ice mouse
Laser Jet Printer
2. Uninterrupted Power Supply (UPS)
3. Other consumables flash, CD etc
-
8/3/2019 Social Network System
45/60
Software Requirement
These are written sets of instructions, procedures and associated
documentation which help the users to achieve their processing
objectives using the hardware components. In acquiring software, the
institution considers the basic activity cost which helps in determining
the cost of software to be used. The following software components
are required in the proposed system
Windows Operating System
Microsoft Internet Explorer 9 or later
Antivirus Scan of Avast, AVG, and McAfee 2009 update
antivirus recommended.
The above listed materials will create room for computerized
efficiency in the system operation of the security techniques.
4.6 System Implementation
This is concerned with implementing the system design. The activities
of a system implementation involves program coding in an
appropriate language, testing, installation, training, documenting file
set-up and conversion. Implementation of the system goes beyond
the physical environment.
-
8/3/2019 Social Network System
46/60
The management must plan for the user and operator training for the
creation of documentation such as user manual.
During the system implementation, a strategy must also be devised.
Operationally, the remote login is made on the systems software
which provides entrance for a new information requirement, security
and modification as well.
4.7 Program Testing
This stage involves the testing of data processing procedures,
production of test copies of the reports generated and other outputs,
which are meant to be viewed again by users of the newly proposed
system for possible errors. It involves the testing and debugging of all
computer programs by the researcher. Methods such as walk through
should be used to test the system incorporated with the program but
following a system levels like
Login testing
Program testing
System testing
Acceptance testing
-
8/3/2019 Social Network System
47/60
Login Testing is used especially where the system requires an
access authentication like login modules to be tested
Program Testing is used in the effect of each program module to
test so as to determine whether they are working as desired.
System Testing involves testing the complete system hardware and
software supplemental manuals.
Acceptance Testing is the final stage process before the system is
said to be accepted for operational use. It involves testing the system
with data from the organization instead of the stimulated data
developed especially for the purpose of testing. It ensures the
functionality of the program as anticipated.
System Installation
This is the process stage in system implementation that involves the
running of the compiled program into the system i.e. the integration
and adding of the software into the hardware component.
Staff Training
This is a process stage in system implementation that involves the
production of handbooks organization of courses and lectures
-
8/3/2019 Social Network System
48/60
regarding the new system. The handbook contains the description on
how the security is to be done with the software manual, system
specification, clerical procedures manuals and security aid are
designed to assist the users to carry out the required instruction.
During the training phase in the implementation stage of the new
system, the researcher did not find it difficult to bring the students and
staff to view the program because they are already computer literate.
They easily understood the program as one of the programs they
use. However, they were put through on how to
Properly start the application
Properly login into the system
Enter new details and profile updates
Create and update records
Generate reports and queries.
4.8 Program Documentation
Documentation involves the process of recording the activities and
communicating the gathered information during analysis, design and
other system development stages. It is a form of a written text that
accompanies a computer software, explaining how to use the
computer software. It can mean different things to different people but
-
8/3/2019 Social Network System
49/60
still stands as a vital tool for proper implementation and maintenance
of the new system.
Software documentation is of 3 types. Examples are;
Design documentation
Technical documentation
End-User documentation
Design Documentation is also referred to as architectural
documentation. It is an overview of the software program in relation to
the environment and construction principles which are to be used in
the design of the software components.
Technical Documentation is referred to as tool documentation in an
overview of the codes, algorithms, interface designs etc. This usually
is not availed to the users unless they are programmers in most
cases.
End User Documentation is the documentation for the users
describing how the software is to be used after installation as
discussed earlier. It describes these features to the users and assists
in realizing these features. It can be extended to troubleshooting
assistance and be considered to consist of contracts that specifies
what the limit of the software. It avails manuals for support staff end
user and the system administrator of the constitution.
-
8/3/2019 Social Network System
50/60
The researcher considered the end-user documentation as the best
documentation approach for the security after training the staff.
Added in the documentation is the model of the model of the system
components;
The detailed description of these components
The organizational structure and usage
The users responsibilities to the software
Hence the researcher also considered the purpose of documenting
this project work, which is to stand as a standard for analysis and
design work and finally to reserve the essentials of having an expert
knowledge.
4.9 System Set-Up and Conversion
During file setup it is necessary to convert the existing master file to a
new form. This new form is the responsibility of the newly designed,
which undergoes the process of converting the old system master file
to a new one.
System Conversion is a transformation process stage in system
implementation at which the newly designed system is put in place of
the old system by the organization after been tested and documented
-
8/3/2019 Social Network System
51/60
to prove that it is working. It is a significant milestone after which the
ownership of the system if been officially transferred from the
researcher (analyst) and the programmer to the end user.
The researcher completed the above process by carefully carrying
out a planned conversion which include detailed installation strategies
following stages below;
Collecting the documentation to ascertain its usefulness as atraining guide to the development user.
Writing the user documentation manuals as the need arises.
Referring to the planned conversion in review of the training
needs to the system users.
Scheduling the training sessions.
Conducting the training sessions
Distributing the user documentation
The under listed are various system conversion briefly described to
enable the implementation process.
Parallel System of Conversion
This takes place simultaneously at the same time, runs between the
old and new system until probably the new system is completely put
in place and the old system discarded.
-
8/3/2019 Social Network System
52/60
Direct System of Conversion
This takes place automatically at a time over a short period of time. It
saves cost, manages time and enhances fast operation but finds to a
high risk of failure without new system comparability.
Pilot System of Conversion
This takes place sequentially with the introduction of the new system
in a particular section of the organization. It encourages adequate
testing but does not embrace an instructed organization.
From the above descriptions, it was observed imperatively that the
parallel system of conversion is in the best position as the next
alternative means to cater the need of the security management
because the new system is allowed to operate identified and
corrected from the old system.
Finally, the researcher choose this system of conversion because it
minimizes the risk of major flows in the new system by avoiding the
irreparable harm to the department.
4.10 System Evaluation and Maintenance
-
8/3/2019 Social Network System
53/60
System Evaluation means to watch the implemented system to know
whether or not achieving the aims and objectives of designing it. The
system performance needs to be evaluated in terms of the current
user requirement. If differences are found the cost has to be
evaluated or ascertained. It may be that the system has changed
from its original specification or inadequate care caused by improper
implementation.
The evaluation procedures compares the reasons advanced from
designing and implementation of the proposed system. The
comparison is mostly to check whether the benefit estimate is equal
to the benefit obtained or to check estimated list in line with the actual
cost. Evaluation is carried in three levels which include cost analysis,
operational efficiency and intangible benefits.
System evaluation is vital for the fact that;
It is to deal with unexpected problems arising in operation.
It is to confirm that the planned objective are been met and to
take action if they are not.
It is to ensure that the system should be able to cope with the
changing requirement of the department
-
8/3/2019 Social Network System
54/60
-
8/3/2019 Social Network System
55/60
Preventive Maintenance: This covers attempts to make the software
perform more effectively. It includes user requests for enhancement,
improvement due to experience, changes to make the software more
easy to use and rewrite the code to make the maintenance that is
specifically used for the new system to reduce its chances of
breakages.
Hence, the researcher advised the use of preventive and corrective
maintenance to reduce the chances of breaking down to all and
subsequently advise these;
Proper staff orientation on the use and operation of the program
before the administration.
Frequent checking of the network and list base to facilitate easy
access and integration of the staff entirely.
Consultation of IT professionals periodically to render services
that may be of need to meet the modern technology demands.
-
8/3/2019 Social Network System
56/60
-
8/3/2019 Social Network System
57/60
underdeveloped to adequately judge. Several unexplored research
topics remain, while other areas require further elaboration.
The biggest question, however, is determining what roles this system
would play within a security-oriented environment. The most basic
role would be discovering an information leak within a communication
network. Deployed within companies and organizations concerned
with sensitive data, given a number of sensitive keywords this system
could detect when a leak occurred and how the information has
spread.
Another more advanced role involves observing behavior within a
public network. Assuming the necessary resources and authorization
was available; this system could assist in identifying groups of
individuals using a network for unlawful or undesirable intentions.
A previous example mentioned earlier in this document mentioned
tracking a group of thieves. Other scenarios could be terrorist
identification, discovery of criminal information networks, and virtually
any group of individuals discussing key subjects. Between ethical
-
8/3/2019 Social Network System
58/60
concerns and unexplored areas of machine learning applications,
more research is clearly necessary. Temporal characteristics of
tokens alone could determine the validity of generated data.
5.2 Recommendation
Institutions should take adequate care during the implementation and
maintenance of the system. This should be given proper
consideration due to its importance to effective and efficient
deployment and operation of the system by adopting parallel change-
over procedure and applying the technique of preventive after the
implementation, corrective maintenance should be done to fix it up.
In addition, the organization should give due consideration to its
limitation, so that they should not have over reliance on the system
because it may stifle creative thinking and lead to advice delivered
being slavishly followed and effects of other limitations.
-
8/3/2019 Social Network System
59/60
References
Asal, V., Nussbaum, B. and D.W. Harrington (2007) Terrorism as
Transnational Advocacy: An Organisational and Tactical
Examination, Studies in Conflict & Terrorism 30(1):15-39
Borgatti S.P. and P.C. Foster (2003) The Network Paradigm in
Organisational Research: A Review and Typology. Journal of
Management29:991-1013
Diani, M. and D. McAdam (2003) Social Movements and Networks:
Relational Approaches to Collective Action, Chapter 1 & 2
Crossley, N. (2007) Social Networks and Extraparliamentary Politics.
Sociology Compass 1(1):222-236
Kahler, M. (2009) Collective Action and Clandestine Networks: The
Case of Al Qaeda. Pp. 103-126 in Networked Politics: Agency,
Power and Governance, London: Cornell University Press
Knoke, D. and J.H. Kuklinski (1982) Network Analysis, Chapter 2
Wasserman, S., and K. Faust (1994) Social Network Analysis:
Methods and Applications, Chapter 2
Pedahzur, A. and A. Perliger (2006) Changing Nature of Suicide
Attacks A Social Network Perspective, Social Forces 64(4):1988-
2008
-
8/3/2019 Social Network System
60/60
Singerman, D. () The Networked World of Islamist Social
Movements Pp. 143-163 Q. Wiktorowicz (ed.) Islamic Activism: A
Social Movement Theory Approach, Bloomington: Indiana University
Press
Talmud, I. and S. Mishal. (2000) The Network State: Triangular
Relations in Middle Eastern Politics. International Journal of
Contemporary Sociology37(2):176-207