Module 5 MOOC
Module 5 MOOC
1. What are the primary privacy concerns associated with location-based social
networks like Foursquare and Yelp?
2. How can location check-ins on social media platforms lead to privacy risks for
users?
4. Why is location privacy a major concern when using services like Facebook
check-ins and Twitter geo-tagging?
5. What measures can users take to mitigate privacy risks when using location-
based social networks?
• Disable Location Services: Turn off location tracking on social media apps
unless necessary.
• Avoid Public Check-Ins: Share location only with trusted friends instead of
the public.
• Delay Location Sharing: Post check-ins after leaving a location to avoid real-
time tracking.
• Review Privacy Settings: Regularly update social media settings to restrict
who can view location data.
• Disable Metadata in Photos: Remove GPS coordinates from images before
uploading them.
• Be Selective with Third-Party Apps: Limit which apps have access to
location services.
• Use VPN Services: A VPN can obscure IP-based location tracking.
• Regularly Clear Location History: Periodically delete location data from
social media accounts.
• Educate Friends & Family: Encourage others to avoid tagging you in
location-based posts.
• Stay Informed on Privacy Policies: Understand how social media platforms
use location data and adjust settings accordingly.
6. What are the three major social networks studied for home location inference,
and what were the accuracy rates for each?
8. What percentage of Twitter users change their usernames, and what are the
patterns observed?
• Rebranding and Identity Shifts: Users may change handles to align with
new personal or professional identities.
• Privacy and Anonymity: Some users change usernames to distance
themselves from previous identities.
• Trending Events: Users modify handles to match current events (e.g., during
major sports tournaments or political movements).
• Avoiding Harassment: Victims of cyberbullying often change usernames to
evade harassers.
• Marketing and Engagement: Brands and influencers may adjust their
handles to optimize searchability.
• Username Availability: Some users squat on usernames and later switch to
newly available desirable handles.
• Username Sharing Among Groups: Certain groups share or rotate handles,
making tracking them harder.
• Gaming Twitter’s Algorithm: Some users believe changing handles can help
bypass restrictions or shadow bans.
• Avoiding Association with Old Content: Users with controversial pasts may
change usernames to dissociate from old tweets.
• Space Optimization: Shorter usernames allow more space for tweet content,
especially under previous 140-character limits.
10. What challenges does frequent username changing create for online safety
and security?
11. How does Twitter’s username change policy compare to other social media
platforms?
• Twitter allows unlimited username changes, making it more flexible but
prone to abuse.
• Facebook restricts username changes, allowing only one change after initial
selection.
• Instagram allows username changes but retains old names for a grace
period to prevent impersonation.
• LinkedIn enforces real-name policies, making username changes less
common.
• Reddit does not allow username changes at all, ensuring long-term
accountability.
• TikTok allows occasional changes but monitors for misuse.
• YouTube username changes affect channel URLs, discouraging frequent
modifications.
• Telegram allows handle changes but warns followers.
• Discord retains old usernames for reference, preventing impersonation.
• Username change policies vary based on platform goals—some prioritize
identity verification, while others allow greater anonymity.
• Limit the frequency of changes (e.g., one change per 30 days) to reduce
abuse.
• Implement a username history feature, allowing users to see previous
handles.
• Prevent immediate reuse of old usernames to reduce impersonation risks.
• Introduce account verification requirements for frequent changers.
• Alert followers when a user changes their handle, improving transparency.
• Enhance detection of malicious username swaps using AI models.
• Implement stricter bans for violators who frequently change handles to
evade policies.
• Require justification for username changes beyond a certain limit.
• Offer reserved usernames for brands and influencers to prevent
impersonation.
• Collaborate with law enforcement to track frequent username changers
engaging in illegal activities.
13. How was fake content spread during the Boston Marathon bombings?
14. What were the primary sources of fake content during the event?
15. What measures can help reduce the spread of fake news on Twitter?