Analysis and Evaluation of Privacy Protection Behavior and Information Disclosure Concerns in Online Social Networks

Authors

1 Islamic Azad University South of Tehran Branch, Department of Electrical Engineering, Tehran, Iran

2 Department of Industrial Engineering, Information Technology Group, K. N.Toosi University of Technology, Tehran, Iran

Abstract

Online Social Networks (OSN) becomes the largest infrastructure for social interactions like: making relationship, sharing personal experiences and service delivery. Nowadays social networks have been widely welcomed by people. Most of the researches about managing privacy protection within social networks sites (SNS), observes users as owner of their information. However, individuals cannot control their privacy and it’s been controlled by groups. Using OSNs is making concerns about privacy related to online personal data. According to number of studies, till now so many efforts has been done to protect confidentiality and security of data on social networks, but it seems that understanding the concept of privacy protection is too essential for people. The purpose of this article is to analyze tools and algorithms that proceed concerns about privacy protection and data security situation in social networks among adults, adolescents and children. These statistical tools and algorithms, analyze collected data. The results of this literature review showed that most distribution of these articles in this case are related to 2014. Furthermore, survey method was most current of collecting information in these researches.

Keywords


  1. Dewolf R., Willart K., Pierson J., “Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook”, Computers in Human Behavior, Vol. 35, (2014), 444-454.
  2. Li Ya., Li Yi., Deng H.R., “Privacy Leakage analysis in online Social Networks” Computers and Security, Vol. 49, (2016), 239-254.
  3. Daraei, A., & Hamidi, H., “Analysis of Pre-processing and Post-Processing Methods and Using Data Mining to Diagnose Heart Diseases”, International Journal of Engineering, Transactions B: Applications, Vol. 29, No. 8, (2016).
  4. Johnson, R. D., Li, Y., Dulebohn, J. H., “Unsuccessful Performance and Future Computer Self-Efficacy Estimations: Attributions and Generalization to Other Software Applications”, Journal of Organizational and End User Computing, Vol. 28, No. 1, (2016), 1-14.
  5. Laio C., Liu C., Chen K., “Examining the impact of privacy, trust, and risk perceptions beyond monetary transactions: AN integrated model”, Electronic Commerce Research and Applications, Vol. 10, No. 6, (2011), 702-715.
  6. Liu, Y., Tan, C., Sutanto, J., “Selective Attention to Commercial Information Displays in Globally Available Mobile Application”, Journal of Global Information Management, Vol. 24, No. 2, (2016), 18-38.
  7. Litt E., “Understanding social network site user’s privacy tool use”, Computers in Human Behavior, Vol. 29, No. 4, (2013), 1649-1656.
  8. Joinson N.A., Houghton J.D., Vasalou A., Marder L.B., “Digital crowding: privacy Self-disclosure and Technology”, Privacy Online, (2011), 33-45.
  9. Hawk T.S., Bogt T.F.M.T., Eijnden R.J.J.M.V., Nelemans S., “Too little power, too much information Power, narcissism, and adolescents’ disclosures on social networking sites”, Computers in Human Behaviour, Vol. 52, (2015), 72-80.
  10. Christofides E., Muise A., Desmarais S., “Hey Mom, what’s on your Facebook Comparing Facebook disclosure and privacy in Adolescents and adults”, Social Psychological and Personality Science, Vol. 3, No. 1, (2011), 48-54.
  11. Kim H., “What drives you to check in on Facebook? Motivations, privacy concerns, and mobile phone involvement for location-based information sharing”, Computers in Human Behavior, Vol. 54, (2015), 397-406.
  12. Buccafurri F., Lax G., Nicolazzo S., Nocera A., “Comparing Twitter and Facebook user behaviour: privacy and other aspects”, Computers in Human Behavior, Vol. 52, (2015), 87-95.
  13. Christofides E., Muise A., Desmarais S., “Risky Disclosures on Facebook: The Effect of Having a Bad Experience on Online Behavior”, Adolescent Research, Vol. 27, No. 6, (2012), 1-18.
  14. Lwin O.M., D.Miyazaki A., Andrea J.S. Stanaland., Lee E.,“Online usage motive and information disclosure for preteen children” Journal of Information, Communication and Ethics in Society, Vol. 13, No. 4,(2012),  345-356.
  15. Daraei, A. & Hamidi, H., “An Efficient Predictive Model for Myocardial Infarction Using Cost-sensitive J48 Model”, Iranian Journal of Public Health, Vol. 46, No.5, (2017),682-692.
  16. Kim K., Kim J., “Third-party privacy certification as an online advertising strategy: an investigation of the relationship between Third-party certification and initial trust”, Journal of Interactive Marketing, Vol. 25, No. 3, (2010), 145-158.
  17. Shadloo, B., Motevalian, A., Rahimi-movaghar, V., Amin-Esmaeili, M., Sharifi, V., Hajebi, A., Radgoodarzi, R., Hefazi, M. Rahimi-Movaghar, A., “Psychiatric Disorders Are Associated with an Increased Risk of Injuries: Data from the Iranian Mental Health Survey”, Iranian Journal of Public Health, Vol. 45, No. 5, (2016),623-635.
  18. Wu, J., Ding, F., Xu, M., Mo, Z., Jin, A., “Investigating the Determinants of Decision-Making on Adoption of Public Cloud Computing in E-government”,Journal of Global Information Management (JGIM), Vol. 24, No. 3, (2016), 71-89.
  19. Kisekka V., Bagchi-Sen S., Raghav Rao H., “Extent of private information disclosure on online social networks: An exploration of Facebook mobile phone users”, Computer in Human Behavior, Vol. 29, No. 6, (2013), 2722-2729.
  20. Moradi, S. Hamidi, H., “Analysis of Consideration of Security Parameters by Vendors on Trust and Customer Satisfaction in E-Commerce”, Journal of Global Information Management, Vol. 25, No. 4, (2017), 32-45.
  21. Debatin B., “Ethics, privacy, and self-restraint in social networking”, Privacy Online, (2011), 47-60.
  22. Kizza M. J., “Ethical, Privacy, and Security Issues in the online social network ecosystems”, Computer Science, Vol. 51, (2013), 255-280.
  23. Buccafurri F., Fotia L., Lax G., Saraswat V., “Analysis-preserving protection of user privacy against information leakage of social-network likes”, Information Sciences, Vol.  328, (2016), 340-358.
  24. Bimonte, S., Sautot, L., Journaux, L., Faivre, B., “Multidimensional Model Design using Data Mining: A Rapid Prototyping Methodology”, International Journal of Data Warehousing and Mining (IJDWM), Vol. 13, No. 1, (2017), 1-35.
  25. Jin Park Y., “Do men and women differ in privacy? Gendered privacy and (in) equality in the Internet”, Computers in Human Behaviour, Vol. 50, (2015), 252-258.
  26. Esposito, C., Ficco, M., “Recent Developments on Security and Reliability in Large-Scale Data Processing with Map Reduce”, International Journal of Data Warehousing and Mining (IJDWM), Vol. 12, No. 1, (2016), 49-68.
  27. Mousavi, R, Hamidi, H., “Analysis and Evaluation of a Framework for Sampling Database in Recommenders”, Journal of Global Information Management, Vol. 26, No. 1, (2018), 41-57.
  28. Hu, L., Zhu, Y., Chen, M., Li, X., Lu, X., Liang, Y., & Tan, H., “Development and Validation of a Disease Severity Scoring Model for Paediatric Sepsis”, Iranian Journal of Public Health, Vol. 45, No. 7, (2016), 875–884.
  29. Hashemzadeh, E., Hamidi, H., “An Approach to Improve Generation of Association Rules in Order to Be Used in Recommenders”, International Journal of Data Warehousing and Mining (IJDWM), Vol. 13, No. 4, (2017), 1-18.
  30. Vafaei, A., Hamidi, H., and Monadjemi, S.A., “Algorithm based fault tolerant and check pointing for high performance computing systems”, Journal of Applied Sciences, Vol. 9, No. 22, (2009), 3947-3956.
  31. Hamidi, H., Jahanshahifard, M., “The Role of the Internet of Things in the Improvement and Expansion of Business”, Journal of Organizational and End User Computing (JOEUC), Vol. 30, No. 3, (2018), 24-44.
  32. Moekotte B.F.P., Brand-Gruwel S., Ritzen H.T.M., Jan Simons P.R., “Early school leavers’ attitudes towards online self-presentation and explicit participation”, Computers in Human Behavior, Vol. 49, (2015), 171-184.
  33. Feng Y., Xie W., “Teens’ concern for privacy when using social networking sites: An analysis of socialization agents and relationships with privacy-protecting behaviors”, Computers in Human Behavior, Vol. 33, (2014), 153-162.
  34. Cheng, P. H., & Chen, L. W.,“Peer learning efficacy analysis on undergraduate software design course”, Computer Applications in Engineering Education, Vol. 26, No. 1, (2018), 5-16.
  35. Mathiesea K., “The Internet, Children, and Privacy: the case against parental monitoring”, Ethics and Information Technology, Vol. 15, No. 4, (2013), 263-274.
  36. Belanger F., Crossler R.E., Hiller J.S., Park J., Hsiao M.S., “POCKET: A tool for protecting children’s privacy online”, Decision Support Systems, Vol. 54, No. 2, (2013) 11611173.
  37. Echeverría, L., Cobos, R., Machuca, L., & Claros, I.,“Using collaborative learning scenarios to teach programming to non‐CS majors”, Computer Applications in Engineering Education, Vol. 25, No. 5,(2017), 719-731.
  38. Fogel J., Nehmad E., “Internet Social Network Communities: Risk taking, trust, and privacy concerns”, Computers in Human Behavior, Vol. 25, No. 1, (2008), 153-160.