IJE TRANSACTIONS B: Applications Vol. 31, No. 8 (August 2018) 1267-1273    Article in Press

PDF URL: http://www.ije.ir/Vol31/No8/B/15-2860.pdf  
downloaded Downloaded: 80   viewed Viewed: 270

A. Mohammadi and H. Hamidi
( Received: January 07, 2018 – Accepted in Revised Form: February 08, 2018 )

Abstract    The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished and this study builds a research model to examine privacy concerns and the effect of it on self-disclosure. The need of having knowledge and skill about privacy protection seems to be necessary with social networks technology developments. Most of the researches have been studied about privacy protection scope related to users’ privacy on social networks including women, men, children and adults in smartphone and E-health. Most of researches on this scope have been done in USA. Most studies were focused on privacy protection and security on social networks.


Keywords    Privacy Protection, Social Networks, Information Leakage. Information Disclosure, Tools and Algorithms


چکیده    هدف این تحقیق مطالعه عامل­های مؤثر بر نگرانی­های حریم خصوصی در مورد امنیت داده­ها و حفاظت از آن­ها در سایت­های شبکه­های اجتماعی و تأثیر آن بر خودافشایی است. صد مقاله درباره­ی حفاظت حریم خصوصی، امنیت داده­ها، افشای اطلاعات و درز آن در شبکه­های اجتماعی مورد مطالعه قرار گرفت. انواع مدل­ها و الگوریتم­ها و تکرار آن­ها در مقالات مستخرج بررسی شد. در نتیجه، یک مدل تحقیقاتی برای ارزیابی نگرانی­های حریم خصوصی و تأثیر آن بر خودافشایی ساخته شد. نیاز به داشتن دانش و مهارت در مورد حفظ حریم خصوصی با توجه به توسعه روز افزون شبکه­های اجتماعی بسیار ضروری به نظر می­رسد. بیشتر مطالعات در زمینه حریم خصوصی کاربران شبکه­های اجتماعی خصوصاً در تلفن­های هوشمند و سلامت الکترونیک میان زنان، مردان و کودکان است. بیشتر این مطالعات در آمریکا انجام شده است. این مطالعه بر دانشجویان فناوری اطلاعات دانشگاه آزاد اسلامی واحد تهران جنوب به عنوان نمونه تمرکز دارد. مطالعات بر حفظ حریم خصوصی و امنیت در شبکه­های اجتماعی تمرکز دارند.


1.        Cheng, P. H., Chen, L. W., “Peer learning efficacy analysis on undergraduate software design course”, Computer Applications in Engineering Education, Vol. 6, No. 1, (2018), 5-16.

2.        Lwin O.M., D. Miyazaki A., Andrea J.S. Stanaland., Lee E., “Online usage motive and information disclosure for preteen children”, Yong Consumers, Vol. 13, No. 4, (2012), 345-356.

3.        Hamidi, H., Jahanshahifard, M., The Role of the Internet of Things in the Improvement and Expansion of Business. Journal of Organizational and End User Computing, Vol. 30, No. 3, (2018).  24-44. doi:10.4018/JOEUC.2018070102

4.        Hu, L., Zhu, Y., Chen, M., Li, X., Lu, X., Liang, Y., Tan, H. “Development and Validation of a Disease Severity Scoring Model for Pediatric Sepsis”. Iranian Journal of Public Health, Vol. 45, No. 7, (2016), 875–884.

5.        Christofides E., Muise A., Desmarais S., “Hey Mom, what’s on your Facebook? Comparing Facebook disclosure and privacy in Adolescents and adults”, Social Psychological and Personality Science, Vol. 3, No. 1, (2011), 48-54.

6.        Shin W., Kang H., “Adolescent’s privacy concerns and information disclosure online: The role of parents and the Internet”, Computers in Human Behaviour, Vol. 54, (2016), 114- 123.

7.        Ajami R., Al Qirim N., Ramadan N., “Privacy Issues in Mobile Social Networks”, Procedia Computer Science, Vol. 10, (2012), 672-679.

8.        Parei A, Hamidi H., “An Approach to Managing and Organizing Text Documents Using Intelligent Text Analysis”, Journal of Information Processing and Management, Vol. 32, No. 4, (2017), 1171-1202.

9.        Stol W.PH., Kaspersen H.K.W., Kerstens J., Leukfeldt E. R., Lodder A. R., “Government filtering of websites: The Dutch Case”, Computer Law and Security Review, Vol. 25, (2009), 251-262.

10.     Gerlach J., Widjaja T., Buxmann P., “Handle with Care: How online social network provider’s privacy policies impact user’s information sharing behaviour”, Journal of Strategic Information Systems, Vol. 24, No. 1, (2014), 33-43.

11.     Johnson, R. D., Li, Y., Dulebohn, J. H., “Unsuccessful Performance and Future Computer Self-Efficacy Estimations: Attributions and Generalization to Other Software Applications”, Journal of Organizational and End User Computing, Vol. 28, No. 1, (2016), 1-14.

12.     Piao C., Li X., Pan X., “Research on the user privacy protection method in mobile commerce”, In IEEE 11th International Conference on e-Business Engineering, Vol. 11, (2014), 177-184.

13.     Thayananthan V., Albeshri A., “Big data security issues based on quantum cryptography and privacy with authentication for mobile data center”, Procedia Computer Science, Vol. 50, (2015), 149-156.

14.     Asadi Saeed Abad F., Hamidi H.,“An architecture for security and protection of big data”, International Journal of Engineering, Transaction A: Basics, Vol. 30, No. 10, (2017), 1479-1486.

15.     Najaflou Y., Jedari B., Xia F., Yang L.T., Obaidat M. S., “Safety Challenges and Solutions in Mobile Social Network” Systems Journal, Vol. 9, No. 3, (2013), 1-21.

16.     Daraei, A. Hamidi, H., “An Efficient Predictive Model for Myocardial Infarction Using Cost-sensitive J48 Model”, Iranian Journal of Public Health, Vol. 46, No.5, (2017), 682-692.

17.     Liu, Y., Tan, C., Sutanto, J., “Selective Attention to Commercial Information Displays in Globally Available Mobile Application”, Journal of Global Information Management, Vol. 24, No. 2, (2016), 18-38.

18.     Sun Y., Wang N., Shen X., Xizhany J., “Location information disclosure in location-based social network services: privacy calculus, benefit structure, and gender differences”, Computers in Human Behaviours, Vol. 52, (2015), 278-292.

19.     Wu, J., Ding, F., Xu, M., Mo, Z., Jin, A., “Investigating the Determinants of Decision-Making on Adoption of Public Cloud Computing in E-government”, Journal of Global Information Management, Vol. 24, No. 3, (2016), 71-89.

20.     Rowan M., Dehlinger J., “A privacy policy comparison of health and fitness related mobile applications”, Procedia Computer Science, Vol. 37, (2014), 348-355.

21.     Vafaei, A., Hamidi, H., Monadjemi, S. A. “A Framework for ABFT Techniques in the Design of Fault-Tolerant Computing Systems”, EURASIP Journal on Advances in Signal Processing, Springer, 2011, Volume 2011, Number 1, 90.  doi: 10.1186/1687-6180-2011-90

22.     Bimonte, S., Sautot, L., Journaux, L., &Faivre, B., “Multidimensional Model Design using Data Mining: A Rapid Prototyping Methodology”, International Journal of Data Warehousing and Mining, Vol. 13, No. 1, (2017), 1-35.







23.     Mousavi, R, Hamidi, H., Analysis and Evaluation of a Framework for Sampling Database in Recommenders. Journal of Global Information Management, (2018). Vol. 26, No. 1, 41-57. doi:10.4018/JGIM.2018010103

24.     NemecZlatolas L., WelzerT., Hericko M., Holbl M., “Privacy antecedents for SNS self-disclosure: The case of Facebook”, Computers in Human Behaviour, Vol. 45, (2014), 158-167.

25.     Esposito, C., Ficco, M., “Recent Developments on Security and Reliability in Large-Scale Data Processing with Map Reduce”, International Journal of Data Warehousing and Mining, Vol. 12, No. 1, (2016), 49-68.

26.     Chavoshi, A., Hamidi H,, Analysis of the Essential Factors for the Adoption of Mobile Learning in Higher Education: A Case Study of Students of the University of Technology, Telematics and Informatics, Vol. 35, No. 4, (2018), Pages 1053-1070,        https://doi.org/10.1016/j.tele.2017.09.016

27.     Vafaei, A., Hamidi, H., Monadjemi, S. A., “Algorithm based fault tolerant and check pointing for high performance computing systems”, Journal of Applied Sciences, Vol. 9, No. 22, (2009), 3947-3956.

28.     Trepte S., Reinecke L., “The social web as a shelter for privacy and authentic living.” Privacy Online, (2011), 61-73.

29.     Moradi, S. Hamidi, H., Analysis of Consideration of Security Parameters by Vendors on Trust and Customer Satisfaction in E-Commerce. Journal of Global Information Management, 25(4), (2017), 32-45. doi:10.4018/JGIM.2017100103

30.     Malhotra, N. K., Kim, S.S., Agarwal, J., “Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model”, Info Sys Research, Vol. 15, No. 4, (2004), 336–355.

31.     Karimzadeh-Farshbafan, M., Ashtiani, F., “Semi-myopic algorithm for resource allocation in wireless body area networks”, IET Wireless Sensor Systems, Vol. 8, No. 1, (2017), 26 –35, DOI:  10.1049/iet-wss.2017.0063

32.     Alshaheen, H., Rizk, H. T., “Improving the energy efficiency for the WBSN bottleneck zone based on random linear network coding”, IET Wireless Sensor Systems, Vol. 8, No. 1, (2017), 17 –25, DOI:  10.1049/iet-wss.2017.0056

33.     Hashemzadeh, E., Hamidi, H. “An Approach to Improve Generation of Association Rules in Order to Be Used in Recommenders”, International Journal of Data Warehousing and Mining, Vol. 13, No. 4, (2017), 1-18. doi:10.4018/IJDWM.2017100101

34.     Chen, R., “Living a private life in public social networks: An exploration of member self-disclosure”, Decision Support Systems, Vol. 55, No. 3, (2013), 661–668.

35.     Echeverría, L., Cobos, R., Machuca, L., & Claros, I.. Using collaborative learning scenarios to teach programming to nonCS majors. Computer Applications in Engineering Education, Vol. 25, No. 5, (2017), 719-731.

36.     Daraei, A., Hamidi, H. “Analysis of Pre-processing and Post-processing Methods and Using Data Mining to Diagnose Heart Diseases”, International Journal of Engineering, Transaction B: Applivcations, Vol. 29, No. 7. (2016), 921-930.

Download PDF 

International Journal of Engineering
E-mail: office@ije.ir
Web Site: http://www.ije.ir