skip to Main Content
Contact Via WhatsApp: +44-7425-498461          Email: [email protected]         

Twitter Using Java For Security

1) Introduction

According to Clark (2014), with the increase in advancement of technology across the globe and the usage of social media websites, it has also become necessary to have the concern of security of such social media websites. Twitter is one the popular social networking sites that utilize Java Virtual Machine for the security of network. This is because of high capacity and performance of JVM (Java Virtual Machine) in order to enhance the performance of social networking sites.

1.1) Aims of the Research Work

The aim of the research work is to study the effectiveness of java programming language in supporting and securing the social sites like twitter. It also aims to study the extent up to which java can be useful in the security of the operational system of Twitter. Apart from this it also focuses on the use of java for creating twitter accounts.

1.2) Objectives of Research Work

  • To study that how java language supports for the effective and efficient working as well as security of the twitter account.
  • To determine the usage of java programming language in the generation of Twitter accounts and the easy operation of accounts.
  • To study the java programming language and it architecture.

1.3) Hypothesis

  • Usage of java programming language helps in securing the data and supports the efficient functioning of twitter account.
  • Usage of java programming language does not help in securing the data and supports the efficient functioning of twitter account.

2) Literature Review

2.1) Introduction

According to Sashittal et al. (2015), twitter is one of the most popular networking sites among people so the security has become the prime concern. In fact, each social networking site should take care of the security and authentication of the users so that the data doesn’t get leaked by any third party or stranger. A security system is necessary to maintain in order to reduce data redundancy and also protect personal information of the users.

2.2) Architectural Overview of Twitter

Barbera (2014) commented that architecture of twitter is pragmatic in nature that supports different decision designs. It utilizes MySQL and database framed through open-source DBMS. It is one of the highly structured networks in nature and utilizes Hadoopfor partitioning the key values. And also utilizes java programming as a platform for successful and smooth running.

2.3) language Choices

Earlier twitter possess the use of Ruby that was later replaced by Java. The usage of Earlybird created some technical debt, so it was replaced by java blender server. This caused enhance in the quality development of protocol servers that further enhances that scalability, performance and the flexibility.

2.4) Summary

This section explains the usage of java platform in the efficient and smooth working of twitter. It also discuss the choice of language and architecture utilized for the supporting system of Twitter. In brief, it explains the need of java for the efficient working of networking site like twitter.

3) Research Methodology

3.1) Research Approach

Research approach helps to direct the research work in a direction that leads to make connection between theories and principles.The researcher has utilized deductive research approach which is also known as top-down research approach that undertakes all theories and the whole concept and narrows it in a best suited conclusion of the research work.

3.2) Research Design

According to Okamoto (2013), research design is the most essential part of research work that is like blueprint of the whole research and that helps to conclude the whole report in a successful way. The research has adopted descriptive research design for the successful accomplishment of the research work.

3.3) Research Philosophy

Interpretive research design has been taken into consideration by the researcher for the complete usage of collected data and also for acquiring useful knowledge.

3.4) Data Collection Methods

The researcher has utilized both primary and secondary data collection method. The primary data has been collected with the help of qualitative and quantitative methods that further include questionnaires and interviews. The secondary data has been collected from various online and offline sources like websites, journals, articles, books etc.

3.5) Sample Size

Primary data is the first hand information which help to gain direct experience of the views of experts. In order to collect primary data, 10 Java developers and 50 users of Twitter have been interviewed or questioned for observing their thoughts and viewpoints.

3.6) Research Ethics

All the ethics and code of conducts were followed while conducting this research work as it doesn’t attempts to hurt anyone’s sentiments or emotions.

3.7) Limitations

Time allotted for the research and the budget constraint are the major limitations of this research work.

References

Barbera, P. (2014). Birds of the Same Feather Tweet Together: Bayesian Ideal Point Estimation Using Twitter Data. Political Analysis, 23(1), pp.76-91.

Bouffard, G. and Lanet, J. (2015). The ultimate control flow transfer in a Java based smart card. Computers & Security, 50, pp.33-46.

Clark, M. (2014). Using Twitter to Practice Christian Ethics: Technology and Accompaniment. Teaching Theology & Religion, 17(3), pp.223-223.

Kaneko, T. and Yanai, K. (2015). Event photo mining from twitter using keyword bursts and image clustering. Neurocomputing.

Kim, J., Go, N. and Park, Y. (2015). A Code Concealment Method using Java Reflection and Dynamic Loading in Android. Journal of the Korea Institute of Information Security and Cryptology, 25(1), pp.17-30.

Okamoto, M. (2013). Knowledge-Based Authentication using Twitter Can We Use Lunch Menus As Passwords?. International Journal of Network Security & Its Applications, 5(5), pp.1-10.

Sashittal, H., Hodis, M. and Sriramachandramurthy, R. (2015).Entifying your brand among Twitter-using millennials. Business Horizons, 58(3), pp.325-333.

 

WhatsApp: +44-7418-404967
Back To Top
×Close search
Search