Social Network Analysis & Information Disclosure: A Case Study

The advent of social networking technologies has been
met with mixed reactions in academic and corporate circles around
the world. This study explored the influence of social network in
current era, the relation being maintained between the Social
networking site and its user by the extent of use, benefits and latest
technologies. The study followed a descriptive research design
wherein a questionnaire was used as the main research tool. The data
collected was analyzed using SPSS 16. Data was gathered from 1205
users and analyzed in accordance with the objectives of the study.
The analysis of the results seem to suggest that the majority of users
were mainly using Facebook, despite of concerns raised about the
disclosure of personal information on social network sites, users
continue to disclose huge quantity of personal information, they find
that reading privacy policy is time consuming and changes made can
result into improper settings.





References:
null[1] Abdul Molok, Nurul Nuha and Ahmad, Atif and Chang, Shanton
“Information Leakage through online social networking: opening the
doorway for advanced persistence threats”. The Journal of the Australian
Institute of Professional Intelligence Officers (AIPIO), 19 (2). pp. 38-55.
(2011)
[2] Abu Bashar, “Effectiveness of Social Media as a Marketing Tool: An
Empirical Study”, more International Journal of Marketing, Financial
Services & Management Research Vol.1 Issue 11, November 2012
[3] Acquisti, A., & Gross, R. (2006),” Imagined communities: Awareness,
information sharing, and privacy on the Facebook”, Proceedings of 6th
Workshop on Privacy Enhancing Technologies (pp. 36–58), In P. Golle
& G. Danezis (Eds.), Cambridge, UK: Robinson College.
[4] Acquisti Alessandro, Gross Ralph, “Information revelation and privacy
in online social networks”, WPES '05 Proceedings of the 2005 ACM
workshop on Privacy in the electronic society, pp 75-80, 2005
[5] Ai Ho, Abdou Maiga, Esma Aïmeur,” Privacy protection issues in social
networking sites”. Conference: The 7th IEEE/ACS International
Conference on Computer Systems and Applications, AICCSA 2009,
[6] Barnes, Susan B. "A privacy paradox: Social networking in the United
States."First Monday 11.9 (2006).
[7] Barrigar, Jennifer. Social network site privacy: A comparative analysis
of six sites. Office of the Privacy Commissioner of Canada, 2009.
[8] blog.reyjunco.com/pdf/Chapter6.pdf
[9] Barnes, John Arundel. "Who should know what?: social science,
privacy, and ethics." (1979).
[10] Benevenut F., Rodrigues T., Cha M., and Almeida V., “Charactering
user behavior in online social networks,” Proc, of the 9th ACM
SIGCOMM Internet Measurement Conference, pp. 49–62, 2009.
[11] Batagelj, Vladimir, and Andrej Mrvar. "Some analyses of Erdos
collaboration graph." Social networks 22.2 (2000): 173-186.
[12] Bosch, T.E. (2009), “Using online social networking for teaching and
learning: Facebook use at the University of Cape Town”,
Communication, 35 (2): 185-200.
[13] Barnes, Susan B. "A privacy paradox: Social networking in the United
States." First Monday 11.9 (2006).
[14] Boyd Danah and B. Ellison Nicole, “Social Network Sites: Definition,
History, and Scholarship”, Journal of Computer-Mediated
Communication Volume 13, Issue 1, pages 210–230, October 2007
[15] Boyd D and Eszter Hargittai, “Facebook privacy settings: Who cares?”
First Monday, Volume 15, Number 8-2 August 2010
http://firstmonday.org/ojs/index.php/fm/article/view/3086/2589
[16] Braman, James, et al. "Preparing Your Digital Legacy: Assessing
Awareness of Digital Natives." The Social Classroom: Integrating Social
Network Use in Education: Integrating Social Network Use in
Education (2013): 208.
[17] Calvi, L., Cassella, M., Nuijten, K. (2010). “Enhancing users’
experience: A content analysis of 12 university libraries Facebook
profiles”, In ELPUB 2010 International Conference on Electronic
Publishing, Helsinki (Iceland), 16-18 June, pp.258-269.
[18] Cheung, C. M. K., Chiu, P. Y., Lee, M. K. O. (2010). “Online social
networks: Why do students use Facebook?”, Computers in Human
Behavior, Article in Press.
[19] Claudia Hauff, Geert-Jan Houben, “Deriving Knowledge Profiles form
Twitter”, in Proceedings of EC-TEL 2011 (LNCS 6964), pp. 139-152.
[20] Dwyer, Catherine; Hiltz, Starr Roxanne; and Passerini, Katia, "Trust and
Privacy Concern Within Social Networking Sites: A Comparison of
Facebook and MySpace" (2007). AMCIS 2007 Proceedings. Paper 339.
[21] Elisa Lehtinen Vilma, “Maintaining and Extending Social Networks in
IRC-galleria”, Helsingin yliopisto - Helsingfors universitet - Helsinki
University, 2007.
[22] Fabrício Benevenuto, Tiago Rodrigues, Meeyoung Cha, Virgílio
Almeida,” Characterizing User Behavior in Online Social Networks”,
Proceedings IMC’09 9th ACM SIGCOMM conference on Internet
measurement 2009
[23] Govani, Tabreez, and Harriet Pashley. "Student awareness of the
privacy implications when using Facebook." unpublished paper
presented at the “Privacy Poster Fair” at the Carnegie Mellon University
School of Library and Information Science 9 (2005).
[24] Hattori Yuki, Nadamoto A, “Extraction and Categorization of Tip
Information from Social Media”, Proceedings of the International Multi
Conference of Engineers and Computer Scientists, Hong Kong (IMECS
2013)
[25] Helms, R. “Suitably Social: How FMCG brands can best use social
media for engaging with their customers”, University of Edinburgh
Business School, Masters of Business Administration.(2010)
[26] Hew, K.F. (2011). “Students’ and teachers’ use of Facebook”,
Computers in Human Behavior, 27: 662-676.
[27] http://lorrie.cranor.org/courses/fa05/tubzhlp.pdf.
[28] http://www.gilc.nl/privacy/survey/intro.html
[29] http://www.techopedia.com/definition4956/social-networking-site-sns)
2013
[30] https://members.reccenter.stonybrook.edu/PrivacyStatement.aspx
[31] http://www.symantec.com/content/en/us/enterprise/media/security_respo
nse/whitepapers/the_risks_of_social_networking.pdf. 2010
[32] Herman, Roblyer, M.D., McDaniel, M., Webb, M., J., Witty, J.V.(2010).
“Findings on Facebook in higher education: A comparison of college
faculty and student uses and perceptions of social networking sites”,
Internet and Higher Education, 13: 134-140.
[33] Jefferson Lane, “Social Networks Media in Academia”, journal of
Information Science, vol2, page34-56, 2009.
[34] J. Tang, T. Lou, and J. Kleinberg, "Inferring social ties across
heterogeneous networks," presented at the Proceedings of the fifth ACM
international conference on Web search and data mining, Seattle,
Washington, USA, 2012.
[35] Joud Albakr, “Awareness of Social Networking Security, 2014
http://prezi.com/e42yoscxdlgo/awareness-of-social-networking-security/
[36] Katharina Krombholz, Dieter Merkl, Edgar Weippl,”Fake Identities in
Social media:A case Study on the Sustainability of the Facebook
Business model”, Journal of Service Science Research(2012)4:175-212
[37] Lehtinen Vilma, Näsänen Jaana , Sarvas Risto ,”A little silly and emptyheaded
: older adults' understandings of social networking sites”, BCSHCI
'09 Proceedings of the 23rd British HCI Group Annual Conference
on People and Computers: Celebrating People and Technology, Pages
45-54.
[38] Lewis, K., Kaufman, J., & Christakis, N. (2008). The taste for privacy:
An analysis of college student privacy settings in an online social
network. Journal of Computer-Mediated Communication, 14(1), 79-100.
[39] Liu Y, Gummandi K, Krishnamurty B, & Mislov, “Analyzing Facebook
privacy settings: User expectations vs reality” in: Proceedings of the
2011 ACM SIGCOMM Conference on Internet Measurement
Conference, IMC’11, ACM, New York,USA:61-70
[40] Mazman, S.G., Usluel, Y.K. (2010). “Modeling educational usage of
Facebook”, Computers & Education, 55: 444-453.
[41] Nancy p, R.Geetha Ramani,”Knowledge Discovery(Email harvesting,
gender Identification & Prediction)in Social Network Data(Facebook
100 Million URL)”, Proceedings of the World Congress on Engineering
and Computer Science , WCECS 2012, San Francisco, USA 2012
[42] Petter Bae Brandtzæg, Jan Heim ,” Online Communities and Social
Computing” Third International Conference, OCSC 2009, Held as Part
of HCI International 2009, San Diego, CA, USA, July 19-24, 2009.
Proceedings
[43] Sharma Shilpi, J. S. Sodhi. "Awareness on Confidentiality in Social
Networking Sites”, International Journal of Scientific & Engineering
Research, Volume 4, Issue 4, p.p1664-1670, April-2013
[44] Sivakumar, T., and R. Venkatesan. "A Novel Approach for Image
Encryption using Dynamic SCAN Pattern." IAENG International
Journal of Computer Science 41.2 (2014): 91-101.
[45] S. Sodhi J., Sharma Shilpi, “Conceptualizing of social Networking
Sites”, IJCSI International Journal of Computer Science Issues, Vol. 9,
No 1, Issue 1 , p.p 422-428, January 2012.
[46] Strater K, Lipford HR, “Strategies and struggles with privacy in an
online social networking community. In: proceedings of 22nd British
HCI Group Annual conference on People and Computers: BCS-HCI,
UK 2008, 1:111-119
[47] Stutzman F, Capra R, & Thompson J (2011), “Factors meditating
disclosure in social network sites. Computers in human behavior
27(1):590-598. DOI 10.1016/j.chb.2010.10.017
[48] Stutzman F, Kramer- Duffield J (2010) Friends only: Examining a
privacy enhancing behavior in Facebook, In: proceedings of the 298th
international Conference on human factors in Computing Systems
CHI’10, ACM, New yorkUSA:1553-1562
[49] Thelwall, M. (2008). Social networks, gender and friending: An analysis
of MySpace member profiles. Journal of the American Society for
Information Science and Technology, 59(8), 1321–1330.
[50] Tommy K H Chan, Xiabing Zheng, Christy M K Cheung, Matthew K O
Lee and Zach W Y Lee, “Antecedents and consequences of customer
engagement in online brand communities, Journal of Marketing
Analytics 2, 81-97 (June 2014)
[51] V., Viswanath, A., Mislove, M., Cha, & K.P., Gummadi, “On the
evolution of user interaction in Facebook”, Proceedings of the 2nd ACM
SIGCOMM Workshop on Social Networks, Barcelona, Spain, August
17, 2009.
[52] Wüest, Candid. "The Risks of Social Networking." Symantec
http://www.symantec.com/content/en/us/enterprise/media/security_respo
nse/whitepapers/the_risks_of_social_networking. pdf (2010).
[53] Xing Xing, Weishi Zhang, Zhichun Jia, Xiuguo Zhang ,”Trust-Based
Social Item Recommendation: A Case study”, 2nd International
Conference on Computer Science and Network Technology 2012 IEEE
Changchun, China..1050-1053, 2012
[54] Zaideh A. J. Y., “The Use of Social Networking in Education:challenges
and Opportunities,” World of Computer Science and Information
Technology Journal(WCSIT), vol.2,pp.18-21,2012
[55] Zainab Asif, Mamuna Khan, “Users Perceptions on Facebook’s Privacy
policies” ARPN Journal of Systems and Software, vol. 2, no. 3, March
2012.