Social Network Analysis & Information Disclosure: A Case Study

The advent of social networking technologies has been met with mixed reactions in academic and corporate circles around the world. This study explored the influence of social network in current era, the relation being maintained between the Social networking site and its user by the extent of use, b...

Full description

Bibliographic Details
Main Authors: Shilpi Sharma, J. S. Sodhi
Format: Text
Language:English
Published: Zenodo 2015
Subjects:
Online Access:https://dx.doi.org/10.5281/zenodo.1105231
https://zenodo.org/record/1105231
Description
Summary:The advent of social networking technologies has been met with mixed reactions in academic and corporate circles around the world. This study explored the influence of social network in current era, the relation being maintained between the Social networking site and its user by the extent of use, benefits and latest technologies. The study followed a descriptive research design wherein a questionnaire was used as the main research tool. The data collected was analyzed using SPSS 16. Data was gathered from 1205 users and analyzed in accordance with the objectives of the study. The analysis of the results seem to suggest that the majority of users were mainly using Facebook, despite of concerns raised about the disclosure of personal information on social network sites, users continue to disclose huge quantity of personal information, they find that reading privacy policy is time consuming and changes made can result into improper settings. : {"references": ["null", "Abdul Molok, Nurul Nuha and Ahmad, Atif and Chang, Shanton\n\"Information Leakage through online social networking: opening the\ndoorway for advanced persistence threats\". The Journal of the Australian\nInstitute of Professional Intelligence Officers (AIPIO), 19 (2). pp. 38-55.\n(2011)", "Abu Bashar, \"Effectiveness of Social Media as a Marketing Tool: An\nEmpirical Study\", more International Journal of Marketing, Financial\nServices & Management Research Vol.1 Issue 11, November 2012", "Acquisti, A., & Gross, R. (2006),\" Imagined communities: Awareness,\ninformation sharing, and privacy on the Facebook\", Proceedings of 6th\nWorkshop on Privacy Enhancing Technologies (pp. 36\u201358), In P. Golle\n& G. Danezis (Eds.), Cambridge, UK: Robinson College.", "Acquisti Alessandro, Gross Ralph, \"Information revelation and privacy\nin online social networks\", WPES '05 Proceedings of the 2005 ACM\nworkshop on Privacy in the electronic society, pp 75-80, 2005", "Ai Ho, Abdou Maiga, Esma A\u00efmeur,\" Privacy protection issues in social\nnetworking sites\". Conference: The 7th IEEE/ACS International\nConference on Computer Systems and Applications, AICCSA 2009,", "Barnes, Susan B. \"A privacy paradox: Social networking in the United\nStates.\"First Monday 11.9 (2006).", "Barrigar, Jennifer. Social network site privacy: A comparative analysis\nof six sites. Office of the Privacy Commissioner of Canada, 2009.", "blog.reyjunco.com/pdf/Chapter6.pdf", "Barnes, John Arundel. \"Who should know what?: social science,\nprivacy, and ethics.\" (1979).\n[10] Benevenut F., Rodrigues T., Cha M., and Almeida V., \"Charactering\nuser behavior in online social networks,\" Proc, of the 9th ACM\nSIGCOMM Internet Measurement Conference, pp. 49\u201362, 2009.\n[11] Batagelj, Vladimir, and Andrej Mrvar. \"Some analyses of Erdos\ncollaboration graph.\" Social networks 22.2 (2000): 173-186.\n[12] Bosch, T.E. (2009), \"Using online social networking for teaching and\nlearning: Facebook use at the University of Cape Town\",\nCommunication, 35 (2): 185-200.\n[13] Barnes, Susan B. \"A privacy paradox: Social networking in the United\nStates.\" First Monday 11.9 (2006).\n[14] Boyd Danah and B. Ellison Nicole, \"Social Network Sites: Definition,\nHistory, and Scholarship\", Journal of Computer-Mediated\nCommunication Volume 13, Issue 1, pages 210\u2013230, October 2007\n[15] Boyd D and Eszter Hargittai, \"Facebook privacy settings: Who cares?\"\nFirst Monday, Volume 15, Number 8-2 August 2010\nhttp://firstmonday.org/ojs/index.php/fm/article/view/3086/2589\n[16] Braman, James, et al. \"Preparing Your Digital Legacy: Assessing\nAwareness of Digital Natives.\" The Social Classroom: Integrating Social\nNetwork Use in Education: Integrating Social Network Use in\nEducation (2013): 208.\n[17] Calvi, L., Cassella, M., Nuijten, K. (2010). \"Enhancing users'\nexperience: A content analysis of 12 university libraries Facebook\nprofiles\", In ELPUB 2010 International Conference on Electronic\nPublishing, Helsinki (Iceland), 16-18 June, pp.258-269.\n[18] Cheung, C. M. K., Chiu, P. Y., Lee, M. K. O. (2010). \"Online social\nnetworks: Why do students use Facebook?\", Computers in Human\nBehavior, Article in Press.\n[19] Claudia Hauff, Geert-Jan Houben, \"Deriving Knowledge Profiles form\nTwitter\", in Proceedings of EC-TEL 2011 (LNCS 6964), pp. 139-152.\n[20] Dwyer, Catherine; Hiltz, Starr Roxanne; and Passerini, Katia, \"Trust and\nPrivacy Concern Within Social Networking Sites: A Comparison of\nFacebook and MySpace\" (2007). AMCIS 2007 Proceedings. Paper 339.\n[21] Elisa Lehtinen Vilma, \"Maintaining and Extending Social Networks in\nIRC-galleria\", Helsingin yliopisto - Helsingfors universitet - Helsinki\nUniversity, 2007.\n[22] Fabr\u00edcio Benevenuto, Tiago Rodrigues, Meeyoung Cha, Virg\u00edlio\nAlmeida,\" Characterizing User Behavior in Online Social Networks\",\nProceedings IMC'09 9th ACM SIGCOMM conference on Internet\nmeasurement 2009\n[23] Govani, Tabreez, and Harriet Pashley. \"Student awareness of the\nprivacy implications when using Facebook.\" unpublished paper\npresented at the \"Privacy Poster Fair\" at the Carnegie Mellon University\nSchool of Library and Information Science 9 (2005).\n[24] Hattori Yuki, Nadamoto A, \"Extraction and Categorization of Tip\nInformation from Social Media\", Proceedings of the International Multi\nConference of Engineers and Computer Scientists, Hong Kong (IMECS\n2013)\n[25] Helms, R. \"Suitably Social: How FMCG brands can best use social\nmedia for engaging with their customers\", University of Edinburgh\nBusiness School, Masters of Business Administration.(2010)\n[26] Hew, K.F. (2011). \"Students' and teachers' use of Facebook\",\nComputers in Human Behavior, 27: 662-676.\n[27] http://lorrie.cranor.org/courses/fa05/tubzhlp.pdf.\n[28] http://www.gilc.nl/privacy/survey/intro.html\n[29] http://www.techopedia.com/definition4956/social-networking-site-sns)\n2013\n[30] https://members.reccenter.stonybrook.edu/PrivacyStatement.aspx\n[31] http://www.symantec.com/content/en/us/enterprise/media/security_respo\nnse/whitepapers/the_risks_of_social_networking.pdf. 2010\n[32] Herman, Roblyer, M.D., McDaniel, M., Webb, M., J., Witty, J.V.(2010).\n\"Findings on Facebook in higher education: A comparison of college\nfaculty and student uses and perceptions of social networking sites\",\nInternet and Higher Education, 13: 134-140.\n[33] Jefferson Lane, \"Social Networks Media in Academia\", journal of\nInformation Science, vol2, page34-56, 2009.\n[34] J. Tang, T. Lou, and J. Kleinberg, \"Inferring social ties across\nheterogeneous networks,\" presented at the Proceedings of the fifth ACM\ninternational conference on Web search and data mining, Seattle,\nWashington, USA, 2012.\n[35] Joud Albakr, \"Awareness of Social Networking Security, 2014\nhttp://prezi.com/e42yoscxdlgo/awareness-of-social-networking-security/\n[36] Katharina Krombholz, Dieter Merkl, Edgar Weippl,\"Fake Identities in\nSocial media:A case Study on the Sustainability of the Facebook\nBusiness model\", Journal of Service Science Research(2012)4:175-212\n[37] Lehtinen Vilma, N\u00e4s\u00e4nen Jaana , Sarvas Risto ,\"A little silly and emptyheaded\n: older adults' understandings of social networking sites\", BCSHCI\n'09 Proceedings of the 23rd British HCI Group Annual Conference\non People and Computers: Celebrating People and Technology, Pages\n45-54.\n[38] Lewis, K., Kaufman, J., & Christakis, N. (2008). The taste for privacy:\nAn analysis of college student privacy settings in an online social\nnetwork. Journal of Computer-Mediated Communication, 14(1), 79-100.\n[39] Liu Y, Gummandi K, Krishnamurty B, & Mislov, \"Analyzing Facebook\nprivacy settings: User expectations vs reality\" in: Proceedings of the\n2011 ACM SIGCOMM Conference on Internet Measurement\nConference, IMC'11, ACM, New York,USA:61-70\n[40] Mazman, S.G., Usluel, Y.K. (2010). \"Modeling educational usage of\nFacebook\", Computers & Education, 55: 444-453.\n[41] Nancy p, R.Geetha Ramani,\"Knowledge Discovery(Email harvesting,\ngender Identification & Prediction)in Social Network Data(Facebook\n100 Million URL)\", Proceedings of the World Congress on Engineering\nand Computer Science , WCECS 2012, San Francisco, USA 2012\n[42] Petter Bae Brandtz\u00e6g, Jan Heim ,\" Online Communities and Social\nComputing\" Third International Conference, OCSC 2009, Held as Part\nof HCI International 2009, San Diego, CA, USA, July 19-24, 2009.\nProceedings\n[43] Sharma Shilpi, J. S. Sodhi. \"Awareness on Confidentiality in Social\nNetworking Sites\", International Journal of Scientific & Engineering\nResearch, Volume 4, Issue 4, p.p1664-1670, April-2013\n[44] Sivakumar, T., and R. Venkatesan. \"A Novel Approach for Image\nEncryption using Dynamic SCAN Pattern.\" IAENG International\nJournal of Computer Science 41.2 (2014): 91-101.\n[45] S. Sodhi J., Sharma Shilpi, \"Conceptualizing of social Networking\nSites\", IJCSI International Journal of Computer Science Issues, Vol. 9,\nNo 1, Issue 1 , p.p 422-428, January 2012.\n[46] Strater K, Lipford HR, \"Strategies and struggles with privacy in an\nonline social networking community. In: proceedings of 22nd British\nHCI Group Annual conference on People and Computers: BCS-HCI,\nUK 2008, 1:111-119\n[47] Stutzman F, Capra R, & Thompson J (2011), \"Factors meditating\ndisclosure in social network sites. Computers in human behavior\n27(1):590-598. DOI 10.1016/j.chb.2010.10.017\n[48] Stutzman F, Kramer- Duffield J (2010) Friends only: Examining a\nprivacy enhancing behavior in Facebook, In: proceedings of the 298th\ninternational Conference on human factors in Computing Systems\nCHI'10, ACM, New yorkUSA:1553-1562\n[49] Thelwall, M. (2008). Social networks, gender and friending: An analysis\nof MySpace member profiles. Journal of the American Society for\nInformation Science and Technology, 59(8), 1321\u20131330.\n[50] Tommy K H Chan, Xiabing Zheng, Christy M K Cheung, Matthew K O\nLee and Zach W Y Lee, \"Antecedents and consequences of customer\nengagement in online brand communities, Journal of Marketing\nAnalytics 2, 81-97 (June 2014)\n[51] V., Viswanath, A., Mislove, M., Cha, & K.P., Gummadi, \"On the\nevolution of user interaction in Facebook\", Proceedings of the 2nd ACM\nSIGCOMM Workshop on Social Networks, Barcelona, Spain, August\n17, 2009.\n[52] W\u00fcest, Candid. \"The Risks of Social Networking.\" Symantec\nhttp://www.symantec.com/content/en/us/enterprise/media/security_respo\nnse/whitepapers/the_risks_of_social_networking. pdf (2010).\n[53] Xing Xing, Weishi Zhang, Zhichun Jia, Xiuguo Zhang ,\"Trust-Based\nSocial Item Recommendation: A Case study\", 2nd International\nConference on Computer Science and Network Technology 2012 IEEE\nChangchun, China..1050-1053, 2012\n[54] Zaideh A. J. Y., \"The Use of Social Networking in Education:challenges\nand Opportunities,\" World of Computer Science and Information\nTechnology Journal(WCSIT), vol.2,pp.18-21,2012\n[55] Zainab Asif, Mamuna Khan, \"Users Perceptions on Facebook's Privacy\npolicies\" ARPN Journal of Systems and Software, vol. 2, no. 3, March\n2012."]}