IJE TRANSACTIONS B: Applications Vol. 31, No. 8 (August 2018) 1234-1239    Article in Press

PDF URL: http://www.ije.ir/Vol31/No8/B/11-2861.pdf  
downloaded Downloaded: 50   viewed Viewed: 450

A. Mohammadi and H. Hamidi
( Received: January 06, 2018 – Accepted in Revised Form: February 08, 2018 )

Abstract    Online Social Networks (OSN) becomes the largest infrastructure for social interactions like: making relationship, sharing personal experiences and service delivery. Nowadays social networks have been widely welcomed by people. Most of the researches about managing privacy protection within social networks sites (SNS), observes users as owner of their information. However, individuals cannot control their privacy and it’s been controlled by groups. Using OSNs is making concerns about privacy related to online personal data. According to number of studies, till now so many efforts has been done to protect confidentiality and security of data on social networks, but it seems that understanding the concept of privacy protection is too essential for people. The purpose of this article is to analyze tools and algorithms that proceed concerns about privacy protection and data security situation in social networks among adults, adolescents and children. These statistical tools and algorithms, analyze collected data. The results of this literature review showed that most distribution of these articles in this case are related to 2014. Furthermore, survey method was most current of collecting information in these researches.


Keywords    Online Social Networks (OSN), Security Concerns, Protection Behavior. Information Disclosure


چکیده    شبکه­های اجتماعی برخط به بزرگترین زیربنا برای تعاملات اجتماعی مانند: برقراری ارتباط، به اشتراک­گذاری تجربه­های شخصی و تحویل خدمات تبدیل شده است. امروزه شبکه­های اجتماعی به طور گسترده­ای مورد استقبال مردم قرار گرفته­اند. بیشتر تحقیقات درباره­ی مدیریت حفاظت حریم خصوصی در شبکه­های اجتماعی کاربران را به عنوان صاحبان اطلاعات در نظر می­گیرند. با این حال، افراد نمی­توانند حریم خصوصیشان را کنترل کنند و این کنترل توسط گروهی تعیین می­شود. استفاده از شبکه­های اجتماعی برخط نگرانی­هایی در مورد حریم خصوصی مرتبط با داده­های شخصی برخط به وجود آورده است. با توجه به مطالعات انجام شده، تابه امروز تلاش­های زیادی برای حفاظت از محرمانگی و امنیت داده­ها در شبکه­های اجتماعی انجام گرفته است. امّا به­نظر می­رسد که درک مفهوم حفاظت حریم خصوصی برای مردم بسیار ضروری است. هدف این مقاله تجزیه و تحلیل ابزارها و الگوریتم­هایی است که به نگرانی­های حفاظت حریم خصوصی و موقعیت امنیتی داده­ها در شبکه­های اجتماعی میان بزرگسالان، نوجوانان و کودکان پرداخته­اند. این ابزارهای آماری و الگوریتم­ها داده­های جمع­آوری شده را بررسی کردند. نتایج مرور بر ادبیات نشان داد که بیشترین پراکندگی در این زمینه مربوط به سال 2014 است. علاوه براین، روش نظرسنجی بیشترین روش مورد استفاده برای جمع­آوری اطلاعات در این تحقیقات بوده است.


1.        Dewolf R., Willart K., Pierson J., “Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook”, Computers in Human Behavior, Vol. 35, (2014), 444-454.

2.        Li Ya., Li Yi., Deng H.R., “Privacy Leakage analysis in online Social Networks” Computers and Security, Vol. 49, (2016), 239-254.

3.        Daraei, A., & Hamidi, H., “Analysis of Pre-processing and Post-Processing Methods and Using Data Mining to Diagnose Heart Diseases”, International Journal of Engineering, Transactions B: Applications, Vol. 29, No. 8, (2016).

4.        Johnson, R. D., Li, Y., Dulebohn, J. H., “Unsuccessful Performance and Future Computer Self-Efficacy Estimations: Attributions and Generalization to Other Software Applications”, Journal of Organizational and End User Computing, Vol. 28, No. 1, (2016), 1-14.

5.        Laio C., Liu C., Chen K., “Examining the impact of privacy, trust, and risk perceptions beyond monetary transactions: AN integrated model”, Electronic Commerce Research and Applications, Vol. 10, No. 6, (2011), 702-715.

6.        Liu, Y., Tan, C., Sutanto, J., “Selective Attention to Commercial Information Displays in Globally Available Mobile Application”, Journal of Global Information Management, Vol. 24, No. 2, (2016), 18-38.

7.        Litt E., “Understanding social network site user’s privacy tool use”, Computers in Human Behavior, Vol. 29, No. 4, (2013), 1649-1656.

8.        Joinson N.A., Houghton J.D., Vasalou A., Marder L.B., “Digital crowding: privacy Self-disclosure and Technology”, Privacy Online, (2011), 33-45.

9.        Hawk T.S., Bogt T.F.M.T., Eijnden R.J.J.M.V., Nelemans S., “Too little power, too much information Power, narcissism, and adolescents’ disclosures on social networking sites”, Computers in Human Behaviour, Vol. 52, (2015), 72-80.

10.     Christofides E., Muise A., Desmarais S., “Hey Mom, what’s on your Facebook Comparing Facebook disclosure and privacy in Adolescents and adults”, Social Psychological and Personality Science, Vol. 3, No. 1, (2011), 48-54.

11.     Kim H., “What drives you to check in on Facebook? Motivations, privacy concerns, and mobile phone involvement for location-based information sharing”, Computers in Human Behavior, Vol. 54, (2015), 397-406.

12.     Buccafurri F., Lax G., Nicolazzo S., Nocera A., “Comparing Twitter and Facebook user behaviour: privacy and other aspects”, Computers in Human Behavior, Vol. 52, (2015), 87-95.

13.     Christofides E., Muise A., Desmarais S., “Risky Disclosures on Facebook: The Effect of Having a Bad Experience on Online Behavior”, Adolescent Research, Vol. 27, No. 6, (2012), 1-18.

14.     Lwin O.M., D.Miyazaki A., Andrea J.S. Stanaland., Lee E.,“Online usage motive and information disclosure for preteen children” Journal of Information, Communication and Ethics in Society, Vol. 13, No. 4,(2012),  345-356.

15.     Daraei, A. & Hamidi, H., “An Efficient Predictive Model for Myocardial Infarction Using Cost-sensitive J48 Model”, Iranian Journal of Public Health, Vol. 46, No.5, (2017),682-692.

16.     Kim K., Kim J., “Third-party privacy certification as an online advertising strategy: an investigation of the relationship between Third-party certification and initial trust”, Journal of Interactive Marketing, Vol. 25, No. 3, (2010), 145-158.

17.     Shadloo, B., Motevalian, A., Rahimi-movaghar, V., Amin-Esmaeili, M., Sharifi, V., Hajebi, A., Radgoodarzi, R., Hefazi, M. Rahimi-Movaghar, A., “Psychiatric Disorders Are Associated with an Increased Risk of Injuries: Data from the Iranian Mental Health Survey”, Iranian Journal of Public Health, Vol. 45, No. 5, (2016),623-635.

18.     Wu, J., Ding, F., Xu, M., Mo, Z., Jin, A., “Investigating the Determinants of Decision-Making on Adoption of Public Cloud Computing in E-government”, Journal of Global Information Management (JGIM), Vol. 24, No. 3, (2016), 71-89.

19.     Kisekka V., Bagchi-Sen S., Raghav Rao H., “Extent of private information disclosure on online social networks: An exploration of Facebook mobile phone users”, Computer in Human Behavior, Vol. 29, No. 6, (2013), 2722-2729.

20.     Moradi, S. Hamidi, H., “Analysis of Consideration of Security Parameters by Vendors on Trust and Customer Satisfaction in E-Commerce”, Journal of Global Information Management, Vol. 25, No. 4, (2017), 32-45.

Download PDF 

International Journal of Engineering
E-mail: office@ije.ir
Web Site: http://www.ije.ir