Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Report on Social Networking

Category: Computer Sciences Paper Type: Report Writing Reference: APA Words: 5100

Abstract of Social Networking

 Some of the social networking sites have been observed as highly famous in some of the previous centuries. This can only be happened because of infiltration of internet in some areas of universe there are number of mobile devices has been aroused. There were some more users who were utilizing the same technology on their mobile phones. Some of the users of this technology will gives the big data which holds some of the private information which increase the creativity with the effective information which has been shared to better the services of the technology. Despite from tis some of the psychological concept of disclosure has been mentioned here which shows the PII along with the purpose of developing the close connection with friends and fans mainly. Furthermore, the theory of gratification has been presented here in which it has been mentioned that why individuals reveal PII in SNSs. some of the technological specifications of social networking also holds the service which has been based on web-services, as well as, the popularity of sites of social networking has been taken as the testament to some of the technological advancement. The social framework developed from individual has been known as nodes. As well as it can be taken along with some of the interdependency

Index terms: internet, private information, social framework, social networking

       I.            INTRODUCTION of Social Networking

Some of the social networking sites have been observed as highly famous in some of the previous centuries. This can only be happened because of infiltration of internet in some areas of universe there are number of mobile devices has been aroused. Some of the data which has been taken form the Statista reveals that Facebook is the most famous social media app with almost 2.2 billion users per month. Despite for this the other most popular SNSs involved Instagram, Twitter and WhatsApp, WeChat, YouTube. Despite from this it can also be said that utilization of SNSs gives the strong influence on the social life of users and this will in some of the situation it also creates some difference among the physical interactions along with the concept of significant interactions. In this regard some of the users also said that there are personally identified information has been taken for having the insurance number among others. . Despite from tis it has also been mentioned that the social framework which has been developed from individual which has been known as nodes. As well as it can be taken along with some of the interdependency. Furthermore, some of the technological specifications of social networking also hold the service which has been based on web-services. As well as the popularity of sites of social networking has been taken as the testament to some of the technological advancement. Moreover, the study also investigates about some interpersonal factors such as social relations and they required for self-validation along with the disclosure which has been mentioned in SNSs.

In the background study it has been mentioned that a continue enhancement has been as in the form of SNSs which arouse the internet connectivity in all over the world. As well as along some more users who were utilizing the same technology on their mobile phones. Some of the users of this technology will gives the big data which holds some of the private information which increase the creativity with the effective information which has been shared to better the services of the technology. As well as some of the privacy concerns have also been mentioned in the study which holds a lot of arguments for some of the user’s private information approach which has been taken by the third party who will not have contact. As well as it can also be said that there are some privacy related challenges has also been presented in the sites and become serious even deleting account will not be helpful and information of user still seen by others.

Furthermore, there are some other threats has also been presented PII in SNSs here some of the users will now share their details. For this the recent interest in the thesis is understanding, why some of the users share their private and personal information to enhance the threats.

Motivation of doing this project has been come from the when the increased amount of cases which is related with the users of SNSs and they’re some of the member who were the victims of criminal activities which as ben in the form of data breeching. Therefore, some of the experience has been obtained in the field of cyberbullied because this software opens all the sensitive and private information which will further be risky for other users.

Complexity has also been seen in this study because it has been based on the model of social ecology, which has been accomplished on the level and behavior of humans such as organizational, interpersonal and the atmosphere of enabling policy. Despite from this research has been done to investigate about the impact of PII disclosure on SNSs.

As it has been stated above that the users of SNSs have been enhanced in an excellent way in some of the previous years along with the connectivity of internet and increase number of mobile devices all around in world. There are a lot of benefits has been mentioned in the study which is associated with the having networking with friends and family members. As well as this can also be used in some of the small organizations and large industries also use this technology in the market for the services and product and it can also be used for the fresh workers, suppliers as well. Despite from tis some of the psychological concept of disclosure has been mentioned here which shows the PII along with the purpose of developing the close connection with friends and fans mainly. Furthermore, the theory of gratification has been presented here in which it has been mentioned that why individuals reveal PII in SNSs. Moreover, the theory has been based on the perception of individuals that how they visualize social media and complete all the requirements and desire which has been attained from gratification.

The research study has been based on dependent and independent variables. As well as some of the person factors have also been included in the study. As well as some concepts of biological factors which impact the likelihood of attractive in specific behavior. Despite from this study also examines the impact of a person’s level factors on the self-disclosure of PII. Moreover, the study also investigates about some interpersonal factors such as social relations and they required for self-validation along with the disclosure which has been mentioned in SNSs. Some more concepts have also been utilized in this investigation which is related with PII in which it has been explained that some of the information has been utilized to find out the personals identity which has been mentioned with others.

    II.            LITERATURE REVIEW of Social Networking

The sites of social networking had the current which involved the great deal of attention between the users. Despite from tis it has also been mentioned that the social framework which has been developed from individual which has been known as nodes. As well as it can be taken along with some of the interdependency. Furthermore, some of the technological specifications of social networking also hold the service which has been based on web-services. As well as the popularity of sites of social networking has been taken as the testament to some of the technological advancement. As well as it has also been noticed that individuals spend more time on social networking sites and they are also involved in online activities.

As well as there are a lot of affordable technologies have been presented which supports the vast variety of having practices and investments. Some of the technological features as also been mentioned here which merely gives the persistent stability which has been aroused as in form of networks which is already present in the environment which supports and maintain some social networks but this will also help other one to share their level of interest in various perspectives.

Moreover, SNS is highly assorted along with the platform of such as Skype, Google which mainly gives the way of communication among friends and family. Despite from this it can also be said that while joining some social media apps first personal profile have to be made in which some of the personal information’s have been put in the columns. PII is the privacy policy of Facebook. In which it has been mentioned that some of the privacy policy has been made to bring distinction along with the privacy concerns. Despite from this a recent study has been mentioned in which it has been described that cyberbullying has been increasingly enhanced. Moreover, the cyber bullying has been done with the personal information which has given by users of various social media apps. As well as some of the financial transaction which can also be leaked while the data has been share with credit and debit cards. But there are some of the other SNS social security concerns have been held. After viewing all these situation PII privacy policies has been made for the users of SNSs.

Some of the theories has been made which is related with human behavior in which it has been stated that some of the personality traits community and social factors also play the significant role. There is some of the theoretical structure and some of the communication procedures may be interactive among individual and environmental factors. A model has been established in which five levels has been mentioned in which the first level is person second is company and the third one is the policy which sanctions that atmosphere.

Despite form this study also investigates about the influence and effect of significant classification of PII privacy policy which has been presented in the SNSs. As well as some of the privacy concerns have also been mentioned in the study which holds a lot of arguments for some of the user’s private information approach which has been taken by the third party who will not have contact. As well as it can also be said that there are some privacy related challenges has also been presented in the sites and become serious even deleting account will not be helpful and information of user still seen by others.

There are a lot of benefits has been mentioned in the study which is associated with the having networking with friends and family members. As well as this can also be used in some of the small organizations and large industries also use this technology in the market for the services and product and it can also be used for the fresh workers, suppliers as well. Moreover, the study also investigates about some interpersonal factors such as social relations and they required for self-validation along with the disclosure which has been mentioned in SNSs. Some more concepts have also been utilized in this investigation which is related with PII in which it has been explained that some of the information has been utilized to find out the personals identity which has been mentioned with others. Despite from tis some of the psychological concept of disclosure has been mentioned here which shows the PII along with the purpose of developing the close connection with friends and fans mainly. Furthermore, the theory of gratification has been presented here in which it has been mentioned that why individuals reveal PII in SNSs.

 III.            METHODOLOGY of Social Networking

In this chapter it is investigated that the methodology and research design of thesis in which some of the interpersonal factors has been identified which cause the personal data of client which utilized the sites of social networking. As well as it has also been mentioned that the study also investigates that what are some of the factors and reasons have been mentioned in the study which mainly disclose as the man objectives of study. In this chapter data collection method and research methodology has been presented. As well as it has been mentioned that the qualitative research method has been used to describe the relationship among the variables along with the aim of predicting the concept. Despite from this the main advantage of this study it sanctions the researchers to hold the enhanced objectivity to look back on the results. A well as through this t researcher can also perform and put the numerical data which has been made on the statistical software.

The population of SNSs users of Saudi Arab has been taken, in which most of the population which used messenger app on mobile device and they are in diffusion of 71%. On the other side is has also been mentioned that in North America the internet penetration has been on high level. As well as in some countries of Middle East there is also enhanced rate of internet connectivity among the population in the universe. Despite from this it can also be said that the population of Saudi Arab are highly using internet and they are belonging to the medium and teenagers form all the population of country. The sample size has been taken form the users of social media apps. As well as the data has been collected from 375 people. The sample include male and females. All of the participants have been taken are above from the age of 18. Despite from this a condition has been must in which it has been guaranteed the consistency of outcomes by making sure that only those participants will take part that are the part of SNSs. In this study the non-probability sampling method has been used for the collection of data to select the participants. In this technique the population has been selected randomly on the availability of personal judgment which is associated with thesis.

Despite from this survey method has been used for the collection of data, and this method is quite cost effective. The questionnaire has been developed to make sure the consistency of data by advertising the overall reliability in collecting data and in this regard the interview technique has also been used. Significantly the use of questionnaire has been eradicated where the interview technique has been impactful for the answers if they were given randomly or intentionally. On the other hand, while using this method and this method did not give the chance of tally the answer eve if some of the questions did not answered properly. As well as only the educated persons students have been choosing for the interview.

 IV.            CONCLUSION of Social Networking

In this research study it has been concluded that in the first chapter of introduction, some of the social networking sites has been observed as highly famous in some of the previous centuries. This can only be happened because of infiltration of internet in some areas of universe there are number of mobile devices has been aroused. Motivation of doing this project has been come from the when the increased amount of cases which is related with the users of SNSs and they’re some of the member who were the victims of criminal activities which as ben in the form of data breeching. The sites of social networking had the current which involved the great deal of attention between the users. Despite from tis it has also been mentioned that the social framework which has been developed from individual which has been known as nodes. As well as it can be taken along with some of the interdependency.

In the second chapter of literature review, there are a lot of affordable technologies have been presented which supports the vast variety of having practices and investments. Some of the technological features as also been mentioned here which merely gives the persistent stability which has been aroused as in form of networks which is already present in the environment which supports and maintain some social networks but this will also help other one to share their level of interest in various perspectives. Some of the theories have been made which is related with human behavior in which it has been stated that some of the personality traits community and social factors also play the significant role. There is some of the theoretical structure and some of the communication procedures may be interactive among individual and environmental factors. Despite from tis some of the psychological concept of disclosure has been mentioned here which shows the PII along with the purpose of developing the close connection with friends and fans mainly. Furthermore, the theory of gratification has been presented here in which it has been mentioned that why individuals reveal PII in SNSs.

In third chapter, it is investigated that the methodology and research design of thesis in which some of the interpersonal factors has been identified which cause the personal data of client which utilized the sites of social networking. As well as it has also been mentioned that the study also investigates that what are some of the factors and reasons have been mentioned in the study which mainly disclose as the man objectives of study. The population of SNSs users of Saudi Arab has been taken, in which most of the population which used messenger app on mobile device and they are in diffusion of 71%. On the other side is has also been mentioned that in North America the internet penetration has been on high level. The sample size has been taken form the users of social media apps. As well as the data has been collected from 375 people. The sample includes male and females. In this study the non-probability sampling method has been used for the collection of data to select the participants. In this technique the population has been selected randomly on the availability of personal judgment which is associated with thesis.

    V.            References of Social Networking

[1]   Altman, I., and Taylor, D.A. (1973). Social Penetration: The Development of Interpersonal Relationships. Holt, Rinehart & Winston.

[2]   Bazarova, N. N., & Choi, Y. H. (2014). Self-disclosure in social media: Extending the functional approach to disclosure motivations and characteristics on social network sites. Journal of Communication, 64(4), 635-657.

[3]   Boyd, D., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 210–230.

[4]   Centre for Disease Control and Prevention (CDC) (2018). The Social-Ecological Model: A Framework for Prevention. February 20th, 2018. Retrieved from https://www.cdc.gov/violenceprevention/overview/social-ecologicalmodel.html

[5]   Dinev T, and Hart P. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research, 17(1):61-80.

[6]   Ellison, N., Heino, R., and Gibbs, J. (2006). "Managing Impressions Online: Self-Presentation Processes in the Online Dating Environment." Journal of Computer Mediated Communication, 11 (2), pp. 415-441.

[7]   Frenkel S. & Roose K. (2018). Facebook’s Privacy Scandal Appears to Have Little Effect on Its Bottom Line. The New York Times. April 25, 2018. Retrieved from https://www.nytimes.com/2018/04/25/technology/facebook-privacy-earnings.html.

[8]   Gartner (2013), “US digital marketing spending report, 2013” Available at: www.gartner.com/ technology/research/digital-marketing/digital-marketing-spend.jsp (Accessed March 15, 2013).

[9]   Gibbs, J.L., Ellison, N.B., and Heino, R.D. (2006). "Self-Presentation in Online Personals." Communication Research, 33(2), pp. 152-177.

[10]           Joinson, A. N., & Paine, C. B. (2007). Self-disclosure, privacy and the Internet. Oxford handbook of Internet psychology, 237-252.

[11]           Koontz, L. D. (2008). Privacy: Alternatives Exist for Enhancing Protection of Personally Identifiable Information: DIANE Publishing.

[12]           Krasnova, H., Hildebrand, T., Günther, O., Kovrigin, S. and Nowobilska, A. (2008). Why Participate in an Online Social Networks: An empirical analysis, in W. Golden, T. Acton, K. Conboy, H. van der Heijden and V.K. Tuunainen, (eds.) Proceedings of 16th European Conference on Information Systems (Galway, Ireland; 2008), 2124–2135.

[13]           Krasnova, H., Spiekermann, S., Koroleva, K., and Hildebrand, T. (2010). "Online Social Networks: Why We Disclose." Journal of Information Technology, 25 (2), pp. 109-125.

[14]           Krasnova, H., Spiekermann, S., Koroleva, K., and Hildebrand, T. 2010. "Online Social Networks: Why We Disclose." Journal of Information Technology, 25 (2), pp. 109-125.

[15]           Livingstone, S. (2008). "Taking Risky Opportunities in Youthful Content Creation: Teenagers' Use of Social Networking Sites for Intimacy, Privacy, and Self-Expression." New media & society, 10 (3), pp. 393-411.

[16]           Meter, D. J., & Bauman, S. (2015). When sharing is a bad idea: The effects of online social network engagement and sharing passwords with friends on cyberbullying involvement. Cyberpsychology, Behavior, and Social Networking, 18(8), 437-442.

[17]           Robinson, S. C. (2017). Self-Disclosure and Managing Privacy: Implications for Interpersonal Sharing. Interacting with computers 26(6).

[18]           Rosenberg, M. (1979). Conceiving the self. New York: Basic Books.

[19]           Schibchurn J. and Yan X. (2015). Information disclosure on social networking sites: An intrinsic-extrinsic motivation perspective. Computers in Human Behaviour, 44, pp.103-117. 

[20]           Treiman D. (2014). Quantitative Data Analysis: Doing Social Research to Test Ideas. Research Methods for the Social Sciences. New York, NY: John Wiley & Sons.

[21]           Trepte, S., & Reinecke, L. (2013). The reciprocal effects of social network site use and the disposition for self-disclosure: A longitudinal study. Computers in human behaviour, 29(3), 1102-1112.

[22]           Vargo, S. L., & Lusch, R. F. (2004a). Evolving to a new dominant logic for marketing. Journal of Marketing, 68, 1–17, (January).

[23]           Walther, J.B. (2007). "Selective Self-Presentation in Computer-Mediated Communication: Hyperpersonal Dimensions of Technology, Language, and Cognition." Computers in Human Behaviour, 23 (5), pp.2538-2557.

[24]           Altman, I., and Taylor, D.A. (1973). Social Penetration: The Development of Interpersonal Relationships. Holt, Rinehart & Winston.

[25]           Bazarova, N. N., & Choi, Y. H. (2014). Self-disclosure in social media: Extending the functional approach to disclosure motivations and characteristics on social network sites. Journal of Communication, 64(4), 635-657.

[26]           Fono, D., & Raynes-Goldie, K. (2006). Hyperfriendship and beyond: Friends and social norms

[27]           on LiveJournal. In M. Consalvo & C. Haythornthwaite (Eds.), Internet Research Annual

[28]           Volume 4: Selected Papers from the AOIR Conference (pp. 91–103). New York: Peter Lang.

[29]            

[30]           Baumeister, R.F. & Leary, M.R. (1995). The Need to Belong: Desire for Interpersonal Attachments as a Fundamental Human Motivation, Psychological Bulletin, 117(3), p. 497.

[31]           Blank, G, Bolsover, G & Dubois, E. (2014). A New Privacy Paradox: Young people and privacy on social network sites.

[32]           Boyd, D., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 210–230.

[33]           Brown, C.S.D (2015). Investigating and Prosecuting Cyber-Crime: Forensic Dependencies and

[34]           Chen, R., & Sharma, S. K. (2013). Self-disclosure at social networking sites: An exploration through relational capitals. Information Systems Frontiers, 15(2), 269-278.

[35]           Commerce, 16(4), 385-404.

[36]           Centre for Disease Control and Prevention (CDC) (2018). The Social-Ecological Model: A Framework for Prevention. February 20th, 2018. Retrieved from https://www.cdc.gov/violenceprevention/overview/social-ecologicalmodel.html

[37]           Adapted from the Centers for Disease Control and Prevention (CDC), The Social Ecological Model:  A Framework for Prevention. August  10th, 2018. Retrieved from http://www.cdc.gov/violenceprevention/overview/social-ecologicalmodel.

[38]           Derlega, V.J., and Grzelak, J. (1979). "Appropriateness of Self-Disclosure," Self-disclosure: Origins, Patterns, and implications of openness in interpersonal relationships, pp. 151-176.

[39]           Dinev T, and Hart P. (2006). An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research, 17(1):61-80.

[40]           Ellison N.B, Steinfield, C, & Lampe C. (2007). The benefits of Facebook “friends.” Social Capital and college students’ use of online social networking sites. Journal of Computer-Mediated Communication, 12(4), 1143-1168.

[41]           Ellison, N., Heino, R., and Gibbs, J. (2006). "Managing Impressions Online: Self-Presentation Processes in the Online Dating Environment." Journal of Computer Mediated Communication, 11 (2), pp. 415-441.

[42]           Frenkel S. & Roose K. (2018). Facebook’s Privacy Scandal Appears to Have Little Effect on Its Bottom Line. The New York Times. April 25, 2018. Retrieved from https://www.nytimes.com/2018/04/25/technology/facebook-privacy-earnings.html

[43]           Fenigstein, A., Scheier, M. F., & Buss, A. H. (1975). Public and private self-consciousness: Assessment and theory. Journal of Consulting and Clinical Psychology, 43, 522-527. http:// doi.org/c8c.

[44]           Giddens, A. Sociology. (Cambridge: Polity Press 2006).Bargh, JA. McKenna, K. Y. A., Fitzsimons GM. ‘Can You See the Real Me? Activation and Expression of the ‘True Self’ on the Internet’ J. Soc. Issues. 58(1), 2002, pp.33–48.

[45]           Gartner (2013), “US digital marketing spending report, 2013” Available at: www.gartner.com/ technology/research/digital-marketing/digital-marketing-spend.jsp (Accessed March 15, 2013).

[46]           Gefen D., Karahanna E. & Straub D. (2003). Trust and TAM in Online Shopping: An Integrated Model. MIS Quarterly, Vol 27, (1), pp.51-90.

[47]           Ghamari, N., & Mellbin, L. (2015). Disclosing Personal Information to Social Networking Site

[48]           Gibbs, J.L., Ellison, N.B., and Heino, R.D. (2006). "Self-Presentation in Online Personals." Communication Research, 33(2), pp. 152-177.

[49]           Gould & Barak (2010). Public Self-Consciousness and Consumption Behavior. The Journal of Social Psychology, 128(3), pp. 393-400, doi: 10.1080/00224545.1988.9713756

[50]           Hasib, A. (2008). Threats of Online Social Networks. Seminar of internetworking T-110.5190

[51]            http://scholarworks.sjsu.edu/ etd theses/3601.

[52]           Joinson, A. N., & Paine, C. B. (2007). Self-disclosure, privacy and the Internet. Oxford handbook of Internet psychology, 237-252.

[53]           Joinson, A. N. (2004). Self-esteem, interpersonal risk, and preference for e-mail to face-to-face communication. CyberPsychology & Behavior, 7, 472-478. http://doi.org/cv765m

[54]           Koontz, L. D. (2008). Privacy: Alternatives Exist for Enhancing Protection of Personally Identifiable Information: DIANE Publishing.

[55]           Krasnova, H., Hildebrand, T., Günther, O., Kovrigin, S. and Nowobilska, A. (2008). Why Participate in an Online Social Networks: An empirical analysis, in W. Golden, T. Acton, K. Conboy, H. van der Heijden and V.K. Tuunainen, (eds.) Proceedings of 16th European Conference on Information Systems (Galway, Ireland; 2008), 2124–2135.

[56]           Krasnova, H., Spiekermann, S., Koroleva, K., and Hildebrand, T. 2010. "Online Social Networks: Why We Disclose." Journal of Information Technology, 25 (2), pp. 109-125.

[57]            Krasnova, H., Veltri, N. F., & Günther, O. (2012). Self-disclosure and privacy calculus on social networking sites: The role of culture. Business & Information Systems Engineering, 4(3), 127-135.

[58]           Kumar, N. S.,Deepa, K., & Saravanakumar, K. (2016). On Privacy and Security in Social Media.

[59]           Kwak, K. T., Choi, S. K., & Lee, B. G. (2014). SNS flow, SNS self-disclosure and post hoc interpersonal relations change: Focused on Korean Facebook user. Computers in Human Behavior, 31, 294-304.

[60]           Ledbetter, A. M., Mazer, J. P., DeGroot, J. M., Meyer, K. R., Mao, Y., & Swafford, B. (2011). Attitudes toward online social connection and self-disclosure as predictors of Facebook communication and relational closeness. Communication Research, 38(1), 27-53.

[61]           Liu, C., Ang, R. P., & Lwin, O. M. (2013). Cognitive, Personality and Social Factors Associated and Online Communication for Consumers and Marketers. Journal of Internet

[62]                       Barriers to Justice. International Journal of Cyber Criminology, 9(1), 55-119

[63]           Livingstone, S. (2008). "Taking Risky Opportunities in Youthful Content Creation: Teenagers' Use of Social Networking Sites for Intimacy, Privacy and Self-Expression." New media & society, 10 (3), pp. 393-411.

[64]            Personality Identifiable Information with Strangers: Effects of Public and Private

[65]            Procedia Computer Science, 78(1), 114-119.

[66]           Meter, D. J., & Bauman, S. (2015). When sharing is a bad idea: The effects of online social network engagement and sharing passwords with friends on cyberbullying involvement. Cyberpsychology, Behavior, and Social Networking, 18(8), 437-442.

[67]           Retelas, G. (2008). "Anonymity and Self Disclosure on Myspace. Master’s Thesis.3601.

[68]           Robinson, S. C. (2017). Self-Disclosure and Managing Privacy: Implications for Interpersonal Sharing. Interacting with computers 26(6).

[69]           Rosenberg, M. (1979). Conceiving the self. New York: Basic Books.

[70]           Schibchurn J. and Yan X. (2015). Information disclosure on social networking sites: An intrinsic-extrinsic motivation perspective. Computers in Human Behaviour, 44, pp.103-117. 

[71]           Trepte, S., & Reinecke, L. (2013). The reciprocal effects of social network site use and the disposition for self-disclosure: A longitudinal study. Computers in human behaviour, 29(3), 1102-1112.

[72]           UNICEF (2009). Communication for Development (C4D) Realizing Strategic Shifts and Accelerating Results for Children. New York.

[73]           Vargo, S. L., & Lusch, R. F. (2004a). Evolving to a new dominant logic for marketing. Journal of Marketing, 68, 1–17, (January).

[74]           Venkatanathan, J., Kostakos, V., Karapanos, E., & Concalves, J. (2013). Online Disclosure of Personality Identifiable Information with Strangers: Effects of Public and Private

[75]            Sharing. Interacting with computers 26(6).

[76]           Valkenburg, P. M., Peter, J., & Schouten, A. P. (2006). Friend networking sites and their relationship to adolescents’ well-being and social self-esteem. CyberPsychology & Behavior, 9, 584-590. http://doi.org/b8f2f9

[77]           Valkenburg, P. M., & Peter, J. (2007). Preadolescents’ and adolescents’ online communication and their closeness to friends. Development Psychology, 43(2), 267-277.

[78]           Walther, J.B. (2007). "Selective Self-Presentation in Computer-Mediated Communication: Hyperpersonal Dimensions of Technology, Language, and Cognition." Computers in Human Behaviour, 23 (5), pp.2538-2557.

[79]           Wheeless, L.R., & Grotz, J. (1976). Conceptualization and measurement of reported self- disclosure. Human Communication Research, 2 (4), 338-346.

[80]           Zhao, S., Grasmuck, S., & Martin, J. (2008). Identity construction on Facebook: Digital empowerment in anchored relationships. Computers in Human Behavior, 24, 1816-1836. http://doi.org/cmr349

[81]           Bickman, L., & Rog, D. (2009). Applied research design: A practical approach. In L. Bickman& D. Rog (Eds.), Handbook of applied social research methods (2nd ed., pp. 3–43). Thousand Oaks, CA: Sage.

[82]           Birchall, J. (2009). Sampling and samples. Retrieved February, 3 2020, from

[83]           http://marketresearchworld.net/content/view/23/41/

[84]           Bowling, A., & Ebrahim, S. (2005). Handbook of health research methods: Investigation, measurement and analysis. Maidenhead: Open University Press.

[85]           Daniel, J. (2012). Sampling essentials: Practical guidelines for making sampling choices. Los Angeles: Sage.

[86]           DIGITAL 2019 global digital yearbook essential digital data for every country in the world. (2019).

[87]           Galletta A., (2013). Mastering the Semi-Structured Interview and Beyond: From Research Design to Analysis and Publication. Qualitative Studies in Psychology. New York, NY: NYU Press.

[88]           Hancock G., Mueller, R., Stapleton, L., (2010). The Reviewer’s Guide to Quantitative Methods in the Social Sciences. Mason, OH: Routledge.

[89]           Muijs, D. (2004). Doing quantitative research in education with SPSS. London: SAGE.

[90]           Newman, I., & Benz, C. R. (2006). Qualitative-quantitative research methodology: Exploring the interactive continuum. Carbondale, Ill: Southern Illinois Univ. Press.

[91]           Osborne, J. (2008). Best Practices in Quantitative Methods. New York, NY: SAGE.

[92]           Parveen, H., & Showkat, N. (2017). Research Ethics.

[93]           Resnik, D. B. (1998) The Ethics of Science: An Introduction, London: Routledge.

[94]           Rubin, A., & Babbie, E. R. (2010). Essential research methods for social work. Belmont, Calif: Brooks/Cole, Cengage Learning.

[95]           SMITH, D. (2003). Five principles for research ethics Cover your bases with these ethical strategies, 34(1).

[96]           Sprenkle, D. H., & Piercy, F. P. (2005). Research methods in family therapy. New York: Guilford Press.

[97]           Thyer B. (2001). The Handbook of Social Work Research Methods. New York, NY: SAGE.

[98]           Watzlawik, M., & Born, A. (2007). Capturing identity: Quantitative and qualitative methods. Lanham: University Press of America.

[99]           Wolf, C. (2016). The SAGE handbook of survey methodology. New York, NY: Sage Publications.

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Rated Expert

ONLINE

Top Rated Expert

1869 Orders Completed

ECFX Market

ONLINE

Ecfx Market

63 Orders Completed

Assignments Hut

ONLINE

Assignments Hut

1428 Orders Completed