Social Network and Privacy

Noura Al-Alawi


Whiles some use the internet basically for commerce, other use for educational purposes whiles to others, it is all about entertainment. The internet can therefore be likened to a blank check, which serves different purposes as and how a person wants to define it. The user variety of the internet notwithstanding, recent studies have actually confirmed that an aspect of internet usage that seem to have caught up with over 70% of all internet users is the phenomenon of social media networking (Compaine and Gomery, 2011). The research paper was conducted with the aim of finding the privacy risks associated with the use of social networking sites and for the practice of social media networking. To realize this aim, five major objectives were set, based on which research questions were developed. The research questions became a guide for the researcher to collect primary and secondary data, with particular emphasis on primary data collection, where a questionnaire was prepared for 50 respondents selected from a university campus. All 50 respondents were users of social networking sites and had strong academic background in journalism and communication, putting them in a position to provid well informed answers to the questions to the respondent. The primary data collection emphasized largely on the attitude of the respondents towards privacy issues whiles using social networking sites. The primary data collection exercise was also committed to knowing the depth of knowledge on privacy issues with social media networks. Through secondary data collection also, the researcher had the opportunity of knowing what the hosts of social networking sites are doing to protect the privacy of users.


Social network; Privacy; Security issues

Full Text:



Abraham, A. (2012). Computational social networks: Security and privacy. New York: Springer.

Al-Jenaibi, B. (2014). The nature of Arab public discourse: Social media and the “Arab Spring”. Journal of Applied Journalism & Media Studies, 3(2), 241-260.

Al-Jenaibi, B. (2013). Satisfying public relations: The Promise of social media in the UAE. International Journal of E-Adoption, 5(1), 1-16.

Al-Jenaibi, B. (2012). The scope and impact of workplace diversity in the United Arab Emirates–A preliminary study. Malaysia Journal of Society and Space, 8(1), 1-14.

Al-Jenaibi, B. (2011). The practice of public relations departments in increasing social support in the diverse workplaces of the United Arab Emirates. Cross-Cultural Communication, 7(3), 41-54.

Al-Jenaibi, B. (2010). Differences between gender treatments in the work Force. Cross-Cultural Communication, 6(2), 63-74.

Boyd, D., & Ellison, N. (2008). Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication, 13, 210–23.

Chang, W., Abu-Amara, H., & Stanford, J. (2010). Transforming enterprise cloud services. New York: Springer.

CNBC News. (2012). Google data merge called privacy threat. CNBC. Retrieved from

Compaine, B., & Gomery, D. (2011). Who owns the media?: Competition and concentration in the mass media industry (3rd ed.). Mahwah, NJ: Lawrence Erlbaum Associates.

Curtis, A. (2013). The brief history of social media: Where people interact freely, sharing and discussing information about their lives. Retrieved from

Elovici, Y. (2012). Security and privacy in social networks. New York: Springer.

Federal Bureau of Investigations. (2013). Internet social networking risks. Retrieved from

Fellow, A. (2009). American media history. Stamford: Cengage Learning.

Ferguson, C. H. (2005). What’s Next for Google?: The search firm wants to organize all digital information. That means war with microsoft. Technology Review: MIT's Magazine of Innovation, 5(3), 45-64.

Fogel, J., & Nehmand, E. (2009). Internet social network communities: Risk taking, trust, and privacy concern. Computers in Human Behavior, 25, 153-160.

Gross, D. (2013). Zuckerberg’s Facebook page hacked to prove security flaw. CNN. Retrieved from

Kelly, H. (2013). Twitter hacked; 250,000 accounts affected. CNN. Retrieved from

Kings, J. (2013). Privacy concerned social network for activists launches. Digital Journal. Retrieved from

Lewis, K., Kaufman, J., & Christakis, N. (2008). The taste for privacy; an analysis of college student privacy in an online social network. Journal of Computer Mediated Communication, 14, 79-100.

Lusted, M. (2011). Social networking: MySpace, facebook, & twitter. Edina: ABDO Publishing.

McGinn, R. E. (2011). Science, technology, and society. Englewood Cliffs, NJ: Prentice Hall.

Michelle, M., Lupe, J., & Michael, B. (2011). The failure of online social network privacy settings. New York: Columbia University Press.

Mowshowitz, A., & Kawaguchi, A. (2012). Bias on the Web. Communications of the ACM, 45(9), 60.

Ostrom, M. A. (2003, February 26). Pasdena, Calif., commercial search firm to buy web search properties. San Jose Mercury News, p.4

Pagliery, J. (2013). 2 million Facebook, Gmail and Twitter passwords stolen in massive hack. CNN Money. Retrieved from

Qualman, E. (2012). Socialnomics: How social media transforms the way we live and do business. Hoboken: John Wiley & Sons.

Salerno, J., et al. (2011). Social computing, behavioral-cultural modeling and prediction: 4th international conference. SBP 2011, College Park, MD, USA, March 29-31, 2011. Proceedings. New York: Springer.

Stewart, K. (2013). Social network: An extraordinary guide on social networking for business, social networking for career success, social network marketing, diaspora, digital age and more. Montgomery: Tru Divine Publishing.

van Vark, C. (2004). Search engines: Search still sets the pace. Revolution, 4(2), 24-34.

Waters, R., & Lee, A. (2003, March 5). Ask Jeeves to Join Excite Internet. The Financial Times, p.43.

Williams, C. (2013). Google faces privacy investigation over merging search, Gmail and YouTube data. The Telegraph. Retrieved from

Zittrain, J. (2013, April 13). In searching the Web, Google Finds Riches. The New York Times, p.4.



  • There are currently no refbacks.

Copyright (c) 2015 Management Science and Engineering

Share us to:   


  • How to do online submission to another Journal?
  • If you have already registered in Journal A, then how can you submit another article to Journal B? It takes two steps to make it happen:

1. Register yourself in Journal B as an Author

  • Find the journal you want to submit to in CATEGORIES, click on “VIEW JOURNAL”, “Online Submissions”, “GO TO LOGIN” and “Edit My Profile”. Check “Author” on the “Edit Profile” page, then “Save”.

2. Submission

  • Go to “User Home”, and click on “Author” under the name of Journal B. You may start a New Submission by clicking on “CLICK HERE”.

We only use three mailboxes as follows to deal with issues about paper acceptance, payment and submission of electronic versions of our journals to databases:;;

 Articles published in Management Science and Engineering are licensed under Creative Commons Attribution 4.0 (CC-BY).


Address:1055 Rue Lucien-L'Allier, Unit #772, Montreal, QC H3G 3C4, Canada.

Telephone: 1-514-558 6138
Http:// Http://

Copyright © 2010 Canadian Research & Development Centre of Sciences and Cultures