International Journal of Mathematics and Computational Science
Articles Information
International Journal of Mathematics and Computational Science, Vol.1, No.5, Oct. 2015, Pub. Date: Jul. 21, 2015
Good VS Bad of Social Media Sharing: How Far are We Willing to Expose Ourselves
Pages: 288-294 Views: 5346 Downloads: 1427
Authors
[01] Ahmad Kamal Bin Kamarun Hamidy, Department of Computer Science, Faculty of Computing, University Technology Malaysia, Skudai, Johor, Malaysia.
[02] Hassan Chizari, Department of Computer Science, Faculty of Computing, University Technology Malaysia, Skudai, Johor, Malaysia.
Abstract
This paper intends to highlight the good and bad of social media sharing applications and websites. In the current age of technology advancement, these social media sharing sites are blooming like mushrooms, especially when newcomers to the social media world are trying to repeat the success story of Facebook, Friendster, MySpace, YouTube and Twitter. The problem with these social media is questionable security of privacy. Though many success stories have been achieved with the help of social media sharing; embarrassment and downfall are no exemptions. This paper features the current big players of the social media sharing world, how they are connected, the current users, and the media type they are sharing. This paper will also discuss on how private and how public the information shared on the social media sharing are. With the aim of protecting privacy this paper wall also highlight suggestion in making connections success story and downfall of too much exposure on social media sharing world. By publishing this paper it is hoped that awareness of social media sharing pros and cons can be spread.
Keywords
Social Media Sharing, Privacy, Advantages, Disadvantages
References
[01] W. G. Mangold and D. J. Faulds, "Social media: The new hybrid element of the promotion mix," Business horizons, vol. 52, pp. 357-365, 2009.
[02] J. Hopkins, "Surprise! There's a third YouTube co-founder," USA TODAY, 2006.
[03] H. Kwak, et al., "What is Twitter, a social network or a news media?," in Proceedings of the 19th international conference on World wide web, 2010, pp. 591-600.
[04] E. Moreau, "What Is Instagram?," About.com, vol. http://webtrends.about.com/od/prof4/a/What-Is-Instagram-Wiki.htm.
[05] J. Lindqvist, et al., "I'm the mayor of my house: examining why people use foursquare-a social-driven location sharing application," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2011, pp. 2409-2418.
[06] Z. Papacharissi, "The virtual geographies of social networks: a comparative analysis of Facebook, LinkedIn and ASmallWorld," New Media & Society, vol. 11, pp. 199-220, 2009.
[07] E. Protalinski, "Mark Zuckerberg: Facebook minimum age limit should be removed," http://www.zdnet.com/, vol. http://www.zdnet.com/blog/facebook/mark-zuckerberg-facebook-minimum-age-limit-should-be-removed/1506, 2011.
[08] M. Website, "Keep your kids safer on the PC," Windows, vol. http://windows.microsoft.com/en-us/windows-8/family-safety, 2013.
[09] S. Website, "Galaxy Tab 3 Kids 7.0 (Wi-Fi)," vol. http://www.samsung.com/uk/consumer/mobile-devices/tablets/tablets/SM-T2105GYABTU, 2013.
[10] F. Website, "Facebook Reports First Quarter 2013 Results," vol. http://investor.fb.com/releasedetail.cfm?ReleaseID=761090, 2013.
[11] A. RANJHA, "Promoting Tourism in Abu Dhabi using Social Media," Msc Thesis for the degree in Media Technology, Royal Institute of Technology, 2010.
[12] D. M. Boyd, Taken out of context: American teen sociality in networked publics: ProQuest, 2008.
[13] G. S. O'Keeffe and K. Clarke-Pearson, "The impact of social media on children, adolescents, and families," Pediatrics, vol. 127, pp. 800-804, 2011.
[14] B. Marder, et al., "Every post you make, every pic you take, I'll be watching you: Behind social spheres on Facebook," in System Science (HICSS), 2012 45th Hawaii International Conference on, 2012, pp. 859-868.
[15] E. Deckers and K. Lacy, Branding yourself: How to use social media to invent or reinvent yourself: Que Publishing, 2012.
[16] Y. Kim and M. A. Ahmad, "Trust, distrust and lack of confidence of users in online social media-sharing communities," Knowledge-Based Systems, 2012.
[17] C. Thompson, "Facebook: About 83 million accounts are fake," USA TODAY.
[18] L. F. Website, "Why we fall for romance scams," vol. http://www.lovefraud.com/2011/07/17/why-we-fall-for-romance-scams/, 2011.
[19] S. Zhao, et al., "Identity construction on Facebook: Digital empowerment in anchored relationships," Computers in Human Behavior, vol. 24, pp. 1816-1836, 2008.
[20] E. Litt and E. Hargittai, "Smile, snap, and share? A nuanced approach to privacy and online photo-sharing," Poetics, vol. 42, pp. 1-21, 2014.
[21] S. Malik and A. Sardana, "Secure Vault: A privacy preserving reliable architecture for Secure Social Networking," in Information Assurance and Security (IAS), 2011 7th International Conference on, 2011, pp. 116-121.
[22] A. Teles, et al., "Security and Privacy Issues in Mobile Social Networks."
[23] E. Gilbert and K. Karahalios, "Predicting tie strength with social media," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2009, pp. 211-220.
[24] T. W. S. Journal, "Nigahiga Topples Fred on YouTube " vol. http://blogs.wsj.com/digits/2009/08/24/nigahiga-topples-fred-on-youtube/tab/article/.
[25] M. O. Website, "Teenager raped by internet man," Daily Mail UK, vol. http://www.dailymail.co.uk/news/article-194761/Teenager-raped-internet-man.html.
[26] L. TOPHAM, "Sarah's mother thought she'd done everything to keep her 12-year-old safe online. She couldn't have been more wrong," MAIL ONLINE, 2011.
[27] Correa, "The participation divide among ‘‘online experts’’:experience, skills and psychological factors as predictors of college students’ web content creation," Journal of Computer-Mediated Communication, pp. 71–92, 2010.
[28] G. Hull, et al., "Contextual gaps: privacy issues on Facebook," Ethics and Information Technology, vol. 13, pp. 289-302, 2011.
[29] E. Hargittai and E. Litt, "BECOMING A TWEEP: How prior online experiences influence Twitter use," Information, Communication & Society, vol. 15, pp. 680-702, 2012.
[30] N. Kshetri, "Privacy and security issues in cloud computing: The role of institutions and institutional evolution," Telecommunications Policy, 2012.
[31] Y. J. Xiao and J. J. Van Bavel, "See Your Friends Close and Your Enemies Closer Social Identity and Identity Threat Shape the Representation of Physical Distance," Personality and Social Psychology Bulletin, vol. 38, pp. 959-972, 2012.
600 ATLANTIC AVE, BOSTON,
MA 02210, USA
+001-6179630233
AIS is an academia-oriented and non-commercial institute aiming at providing users with a way to quickly and easily get the academic and scientific information.
Copyright © 2014 - American Institute of Science except certain content provided by third parties.