{"title":"Social Network Analysis & Information Disclosure: A Case Study","authors":"Shilpi Sharma, J. S. Sodhi","volume":98,"journal":"International Journal of Computer and Information Engineering","pagesStart":567,"pagesEnd":576,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/10001376","abstract":"
The advent of social networking technologies has been
\r\nmet with mixed reactions in academic and corporate circles around
\r\nthe world. This study explored the influence of social network in
\r\ncurrent era, the relation being maintained between the Social
\r\nnetworking site and its user by the extent of use, benefits and latest
\r\ntechnologies. The study followed a descriptive research design
\r\nwherein a questionnaire was used as the main research tool. The data
\r\ncollected was analyzed using SPSS 16. Data was gathered from 1205
\r\nusers and analyzed in accordance with the objectives of the study.
\r\nThe analysis of the results seem to suggest that the majority of users
\r\nwere mainly using Facebook, despite of concerns raised about the
\r\ndisclosure of personal information on social network sites, users
\r\ncontinue to disclose huge quantity of personal information, they find
\r\nthat reading privacy policy is time consuming and changes made can
\r\nresult into improper settings.<\/p>\r\n","references":"null[1] Abdul Molok, Nurul Nuha and Ahmad, Atif and Chang, Shanton\r\n\u201cInformation Leakage through online social networking: opening the\r\ndoorway for advanced persistence threats\u201d. The Journal of the Australian\r\nInstitute of Professional Intelligence Officers (AIPIO), 19 (2). pp. 38-55.\r\n(2011)\r\n[2] Abu Bashar, \u201cEffectiveness of Social Media as a Marketing Tool: An\r\nEmpirical Study\u201d, more International Journal of Marketing, Financial\r\nServices & Management Research Vol.1 Issue 11, November 2012\r\n[3] Acquisti, A., & Gross, R. (2006),\u201d Imagined communities: Awareness,\r\ninformation sharing, and privacy on the Facebook\u201d, Proceedings of 6th\r\nWorkshop on Privacy Enhancing Technologies (pp. 36\u201358), In P. Golle\r\n& G. Danezis (Eds.), Cambridge, UK: Robinson College.\r\n[4] Acquisti Alessandro, Gross Ralph, \u201cInformation revelation and privacy\r\nin online social networks\u201d, WPES '05 Proceedings of the 2005 ACM\r\nworkshop on Privacy in the electronic society, pp 75-80, 2005\r\n[5] Ai Ho, Abdou Maiga, Esma A\u00efmeur,\u201d Privacy protection issues in social\r\nnetworking sites\u201d. Conference: The 7th IEEE\/ACS International\r\nConference on Computer Systems and Applications, AICCSA 2009,\r\n[6] Barnes, Susan B. \"A privacy paradox: Social networking in the United\r\nStates.\"First Monday 11.9 (2006).\r\n[7] Barrigar, Jennifer. Social network site privacy: A comparative analysis\r\nof six sites. Office of the Privacy Commissioner of Canada, 2009.\r\n[8] blog.reyjunco.com\/pdf\/Chapter6.pdf\r\n[9] Barnes, John Arundel. \"Who should know what?: social science,\r\nprivacy, and ethics.\" (1979).\r\n[10] Benevenut F., Rodrigues T., Cha M., and Almeida V., \u201cCharactering\r\nuser behavior in online social networks,\u201d Proc, of the 9th ACM\r\nSIGCOMM Internet Measurement Conference, pp. 49\u201362, 2009.\r\n[11] Batagelj, Vladimir, and Andrej Mrvar. \"Some analyses of Erdos\r\ncollaboration graph.\" Social networks 22.2 (2000): 173-186.\r\n[12] Bosch, T.E. (2009), \u201cUsing online social networking for teaching and\r\nlearning: Facebook use at the University of Cape Town\u201d,\r\nCommunication, 35 (2): 185-200.\r\n[13] Barnes, Susan B. \"A privacy paradox: Social networking in the United\r\nStates.\" First Monday 11.9 (2006).\r\n[14] Boyd Danah and B. Ellison Nicole, \u201cSocial Network Sites: Definition,\r\nHistory, and Scholarship\u201d, Journal of Computer-Mediated\r\nCommunication Volume 13, Issue 1, pages 210\u2013230, October 2007\r\n[15] Boyd D and Eszter Hargittai, \u201cFacebook privacy settings: Who cares?\u201d\r\nFirst Monday, Volume 15, Number 8-2 August 2010\r\nhttp:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/view\/3086\/2589\r\n[16] Braman, James, et al. \"Preparing Your Digital Legacy: Assessing\r\nAwareness of Digital Natives.\" The Social Classroom: Integrating Social\r\nNetwork Use in Education: Integrating Social Network Use in\r\nEducation (2013): 208.\r\n[17] Calvi, L., Cassella, M., Nuijten, K. (2010). \u201cEnhancing users\u2019\r\nexperience: A content analysis of 12 university libraries Facebook\r\nprofiles\u201d, In ELPUB 2010 International Conference on Electronic\r\nPublishing, Helsinki (Iceland), 16-18 June, pp.258-269.\r\n[18] Cheung, C. M. K., Chiu, P. Y., Lee, M. K. O. (2010). \u201cOnline social\r\nnetworks: Why do students use Facebook?\u201d, Computers in Human\r\nBehavior, Article in Press.\r\n[19] Claudia Hauff, Geert-Jan Houben, \u201cDeriving Knowledge Profiles form\r\nTwitter\u201d, in Proceedings of EC-TEL 2011 (LNCS 6964), pp. 139-152.\r\n[20] Dwyer, Catherine; Hiltz, Starr Roxanne; and Passerini, Katia, \"Trust and\r\nPrivacy Concern Within Social Networking Sites: A Comparison of\r\nFacebook and MySpace\" (2007). AMCIS 2007 Proceedings. Paper 339.\r\n[21] Elisa Lehtinen Vilma, \u201cMaintaining and Extending Social Networks in\r\nIRC-galleria\u201d, Helsingin yliopisto - Helsingfors universitet - Helsinki\r\nUniversity, 2007.\r\n[22] Fabr\u00edcio Benevenuto, Tiago Rodrigues, Meeyoung Cha, Virg\u00edlio\r\nAlmeida,\u201d Characterizing User Behavior in Online Social Networks\u201d,\r\nProceedings IMC\u201909 9th ACM SIGCOMM conference on Internet\r\nmeasurement 2009\r\n[23] Govani, Tabreez, and Harriet Pashley. \"Student awareness of the\r\nprivacy implications when using Facebook.\" unpublished paper\r\npresented at the \u201cPrivacy Poster Fair\u201d at the Carnegie Mellon University\r\nSchool of Library and Information Science 9 (2005).\r\n[24] Hattori Yuki, Nadamoto A, \u201cExtraction and Categorization of Tip\r\nInformation from Social Media\u201d, Proceedings of the International Multi\r\nConference of Engineers and Computer Scientists, Hong Kong (IMECS\r\n2013)\r\n[25] Helms, R. \u201cSuitably Social: How FMCG brands can best use social\r\nmedia for engaging with their customers\u201d, University of Edinburgh\r\nBusiness School, Masters of Business Administration.(2010)\r\n[26] Hew, K.F. (2011). \u201cStudents\u2019 and teachers\u2019 use of Facebook\u201d,\r\nComputers in Human Behavior, 27: 662-676.\r\n[27] http:\/\/lorrie.cranor.org\/courses\/fa05\/tubzhlp.pdf.\r\n[28] http:\/\/www.gilc.nl\/privacy\/survey\/intro.html\r\n[29] http:\/\/www.techopedia.com\/definition4956\/social-networking-site-sns)\r\n2013\r\n[30] https:\/\/members.reccenter.stonybrook.edu\/PrivacyStatement.aspx\r\n[31] http:\/\/www.symantec.com\/content\/en\/us\/enterprise\/media\/security_respo\r\nnse\/whitepapers\/the_risks_of_social_networking.pdf. 2010\r\n[32] Herman, Roblyer, M.D., McDaniel, M., Webb, M., J., Witty, J.V.(2010).\r\n\u201cFindings on Facebook in higher education: A comparison of college\r\nfaculty and student uses and perceptions of social networking sites\u201d,\r\nInternet and Higher Education, 13: 134-140.\r\n[33] Jefferson Lane, \u201cSocial Networks Media in Academia\u201d, journal of\r\nInformation Science, vol2, page34-56, 2009.\r\n[34] J. Tang, T. Lou, and J. Kleinberg, \"Inferring social ties across\r\nheterogeneous networks,\" presented at the Proceedings of the fifth ACM\r\ninternational conference on Web search and data mining, Seattle,\r\nWashington, USA, 2012.\r\n[35] Joud Albakr, \u201cAwareness of Social Networking Security, 2014\r\nhttp:\/\/prezi.com\/e42yoscxdlgo\/awareness-of-social-networking-security\/\r\n[36] Katharina Krombholz, Dieter Merkl, Edgar Weippl,\u201dFake Identities in\r\nSocial media:A case Study on the Sustainability of the Facebook\r\nBusiness model\u201d, Journal of Service Science Research(2012)4:175-212\r\n[37] Lehtinen Vilma, N\u00e4s\u00e4nen Jaana , Sarvas Risto ,\u201dA little silly and emptyheaded\r\n: older adults' understandings of social networking sites\u201d, BCSHCI\r\n'09 Proceedings of the 23rd British HCI Group Annual Conference\r\non People and Computers: Celebrating People and Technology, Pages\r\n45-54.\r\n[38] Lewis, K., Kaufman, J., & Christakis, N. (2008). The taste for privacy:\r\nAn analysis of college student privacy settings in an online social\r\nnetwork. Journal of Computer-Mediated Communication, 14(1), 79-100.\r\n[39] Liu Y, Gummandi K, Krishnamurty B, & Mislov, \u201cAnalyzing Facebook\r\nprivacy settings: User expectations vs reality\u201d in: Proceedings of the\r\n2011 ACM SIGCOMM Conference on Internet Measurement\r\nConference, IMC\u201911, ACM, New York,USA:61-70\r\n[40] Mazman, S.G., Usluel, Y.K. (2010). \u201cModeling educational usage of\r\nFacebook\u201d, Computers & Education, 55: 444-453.\r\n[41] Nancy p, R.Geetha Ramani,\u201dKnowledge Discovery(Email harvesting,\r\ngender Identification & Prediction)in Social Network Data(Facebook\r\n100 Million URL)\u201d, Proceedings of the World Congress on Engineering\r\nand Computer Science , WCECS 2012, San Francisco, USA 2012\r\n[42] Petter Bae Brandtz\u00e6g, Jan Heim ,\u201d Online Communities and Social\r\nComputing\u201d Third International Conference, OCSC 2009, Held as Part\r\nof HCI International 2009, San Diego, CA, USA, July 19-24, 2009.\r\nProceedings\r\n[43] Sharma Shilpi, J. S. Sodhi. \"Awareness on Confidentiality in Social\r\nNetworking Sites\u201d, International Journal of Scientific & Engineering\r\nResearch, Volume 4, Issue 4, p.p1664-1670, April-2013\r\n[44] Sivakumar, T., and R. Venkatesan. \"A Novel Approach for Image\r\nEncryption using Dynamic SCAN Pattern.\" IAENG International\r\nJournal of Computer Science 41.2 (2014): 91-101.\r\n[45] S. Sodhi J., Sharma Shilpi, \u201cConceptualizing of social Networking\r\nSites\u201d, IJCSI International Journal of Computer Science Issues, Vol. 9,\r\nNo 1, Issue 1 , p.p 422-428, January 2012.\r\n[46] Strater K, Lipford HR, \u201cStrategies and struggles with privacy in an\r\nonline social networking community. In: proceedings of 22nd British\r\nHCI Group Annual conference on People and Computers: BCS-HCI,\r\nUK 2008, 1:111-119\r\n[47] Stutzman F, Capra R, & Thompson J (2011), \u201cFactors meditating\r\ndisclosure in social network sites. Computers in human behavior\r\n27(1):590-598. DOI 10.1016\/j.chb.2010.10.017\r\n[48] Stutzman F, Kramer- Duffield J (2010) Friends only: Examining a\r\nprivacy enhancing behavior in Facebook, In: proceedings of the 298th\r\ninternational Conference on human factors in Computing Systems\r\nCHI\u201910, ACM, New yorkUSA:1553-1562\r\n[49] Thelwall, M. (2008). Social networks, gender and friending: An analysis\r\nof MySpace member profiles. Journal of the American Society for\r\nInformation Science and Technology, 59(8), 1321\u20131330.\r\n[50] Tommy K H Chan, Xiabing Zheng, Christy M K Cheung, Matthew K O\r\nLee and Zach W Y Lee, \u201cAntecedents and consequences of customer\r\nengagement in online brand communities, Journal of Marketing\r\nAnalytics 2, 81-97 (June 2014)\r\n[51] V., Viswanath, A., Mislove, M., Cha, & K.P., Gummadi, \u201cOn the\r\nevolution of user interaction in Facebook\u201d, Proceedings of the 2nd ACM\r\nSIGCOMM Workshop on Social Networks, Barcelona, Spain, August\r\n17, 2009.\r\n[52] W\u00fcest, Candid. \"The Risks of Social Networking.\" Symantec\r\nhttp:\/\/www.symantec.com\/content\/en\/us\/enterprise\/media\/security_respo\r\nnse\/whitepapers\/the_risks_of_social_networking. pdf (2010).\r\n[53] Xing Xing, Weishi Zhang, Zhichun Jia, Xiuguo Zhang ,\u201dTrust-Based\r\nSocial Item Recommendation: A Case study\u201d, 2nd International\r\nConference on Computer Science and Network Technology 2012 IEEE\r\nChangchun, China..1050-1053, 2012\r\n[54] Zaideh A. J. Y., \u201cThe Use of Social Networking in Education:challenges\r\nand Opportunities,\u201d World of Computer Science and Information\r\nTechnology Journal(WCSIT), vol.2,pp.18-21,2012\r\n[55] Zainab Asif, Mamuna Khan, \u201cUsers Perceptions on Facebook\u2019s Privacy\r\npolicies\u201d ARPN Journal of Systems and Software, vol. 2, no. 3, March\r\n2012.","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 98, 2015"}