I.
INTRODUCTION of Social Networking
Some of the social networking sites have been observed
as highly famous in some of the previous centuries. This can only be happened
because of infiltration of internet in some areas of universe there are number
of mobile devices has been aroused. Some of the data which has been taken form
the Statista reveals that Facebook is the most famous social media app with
almost 2.2 billion users per month. Despite for this the other most popular
SNSs involved Instagram, Twitter and WhatsApp, WeChat, YouTube. Despite from
this it can also be said that utilization of SNSs gives the strong influence on
the social life of users and this will in some of the situation it also creates
some difference among the physical interactions along with the concept of
significant interactions. In this regard some of the users also said that there
are personally identified information has been taken for having the insurance
number among others. . Despite from tis it has also been mentioned that the
social framework which has been developed from individual which has been known
as nodes. As well as it can be taken along with some of the interdependency.
Furthermore, some of the technological specifications of social networking also
hold the service which has been based on web-services. As well as the
popularity of sites of social networking has been taken as the testament to
some of the technological advancement. Moreover, the study also investigates
about some interpersonal factors such as social relations and they required for
self-validation along with the disclosure which has been mentioned in SNSs.
In the background study it has been mentioned that a
continue enhancement has been as in the form of SNSs which arouse the internet
connectivity in all over the world. As well as along some more users who were
utilizing the same technology on their mobile phones. Some of the users of this
technology will gives the big data which holds some of the private information
which increase the creativity with the effective information which has been shared
to better the services of the technology. As well as some of the privacy
concerns have also been mentioned in the study which holds a lot of arguments
for some of the user’s private information approach which has been taken by the
third party who will not have contact. As well as it can also be said that
there are some privacy related challenges has also been presented in the sites
and become serious even deleting account will not be helpful and information of
user still seen by others.
Furthermore, there are some other threats has also
been presented PII in SNSs here some of the users will now share their details.
For this the recent interest in the thesis is understanding, why some of the
users share their private and personal information to enhance the threats.
Motivation of doing this project has been come from
the when the increased amount of cases which is related with the users of SNSs
and they’re some of the member who were the victims of criminal activities
which as ben in the form of data breeching. Therefore, some of the experience
has been obtained in the field of cyberbullied because this software opens all
the sensitive and private information which will further be risky for other
users.
Complexity has also been seen in this study because it
has been based on the model of social ecology, which has been accomplished on
the level and behavior of humans such as organizational, interpersonal and the
atmosphere of enabling policy. Despite from this research has been done to
investigate about the impact of PII disclosure on SNSs.
As it has been stated above that the users of SNSs
have been enhanced in an excellent way in some of the previous years along with
the connectivity of internet and increase number of mobile devices all around
in world. There are a lot of benefits has been mentioned in the study which is
associated with the having networking with friends and family members. As well
as this can also be used in some of the small organizations and large
industries also use this technology in the market for the services and product
and it can also be used for the fresh workers, suppliers as well. Despite from
tis some of the psychological concept of disclosure has been mentioned here
which shows the PII along with the purpose of developing the close connection
with friends and fans mainly. Furthermore, the theory of gratification has been
presented here in which it has been mentioned that why individuals reveal PII
in SNSs. Moreover, the theory has been based on the perception of individuals
that how they visualize social media and complete all the requirements and
desire which has been attained from gratification.
The research study has been based on dependent and
independent variables. As well as some of the person factors have also been
included in the study. As well as some concepts of biological factors which
impact the likelihood of attractive in specific behavior. Despite from this
study also examines the impact of a person’s level factors on the
self-disclosure of PII. Moreover, the study also investigates about some
interpersonal factors such as social relations and they required for
self-validation along with the disclosure which has been mentioned in SNSs.
Some more concepts have also been utilized in this investigation which is
related with PII in which it has been explained that some of the information
has been utilized to find out the personals identity which has been mentioned
with others.
II.
LITERATURE REVIEW of Social Networking
The sites of social networking had the current which
involved the great deal of attention between the users. Despite from tis it has
also been mentioned that the social framework which has been developed from
individual which has been known as nodes. As well as it can be taken along with
some of the interdependency. Furthermore, some of the technological
specifications of social networking also hold the service which has been based
on web-services. As well as the popularity of sites of social networking has
been taken as the testament to some of the technological advancement. As well
as it has also been noticed that individuals spend more time on social
networking sites and they are also involved in online activities.
As well as there are a lot of affordable technologies
have been presented which supports the vast variety of having practices and
investments. Some of the technological features as also been mentioned here
which merely gives the persistent stability which has been aroused as in form
of networks which is already present in the environment which supports and
maintain some social networks but this will also help other one to share their
level of interest in various perspectives.
Moreover, SNS is highly assorted along with the
platform of such as Skype, Google which mainly gives the way of communication
among friends and family. Despite from this it can also be said that while
joining some social media apps first personal profile have to be made in which
some of the personal information’s have been put in the columns. PII is the
privacy policy of Facebook. In which it has been mentioned that some of the
privacy policy has been made to bring distinction along with the privacy
concerns. Despite from this a recent study has been mentioned in which it has
been described that cyberbullying has been increasingly enhanced. Moreover, the
cyber bullying has been done with the personal information which has given by
users of various social media apps. As well as some of the financial
transaction which can also be leaked while the data has been share with credit
and debit cards. But there are some of the other SNS social security concerns
have been held. After viewing all these situation PII privacy policies has been
made for the users of SNSs.
Some of the theories has been made which is related
with human behavior in which it has been stated that some of the personality
traits community and social factors also play the significant role. There is
some of the theoretical structure and some of the communication procedures may
be interactive among individual and environmental factors. A model has been
established in which five levels has been mentioned in which the first level is
person second is company and the third one is the policy which sanctions that
atmosphere.
Despite form this study also investigates about the
influence and effect of significant classification of PII privacy policy which
has been presented in the SNSs. As well as some of the privacy concerns have
also been mentioned in the study which holds a lot of arguments for some of the
user’s private information approach which has been taken by the third party who
will not have contact. As well as it can also be said that there are some
privacy related challenges has also been presented in the sites and become
serious even deleting account will not be helpful and information of user still
seen by others.
There are a lot of benefits has been mentioned in the
study which is associated with the having networking with friends and family
members. As well as this can also be used in some of the small organizations
and large industries also use this technology in the market for the services
and product and it can also be used for the fresh workers, suppliers as well.
Moreover, the study also investigates about some interpersonal factors such as
social relations and they required for self-validation along with the
disclosure which has been mentioned in SNSs. Some more concepts have also been
utilized in this investigation which is related with PII in which it has been
explained that some of the information has been utilized to find out the
personals identity which has been mentioned with others. Despite from tis some
of the psychological concept of disclosure has been mentioned here which shows
the PII along with the purpose of developing the close connection with friends
and fans mainly. Furthermore, the theory of gratification has been presented
here in which it has been mentioned that why individuals reveal PII in SNSs.
III.
METHODOLOGY
of Social Networking
In this chapter it is investigated that the methodology
and research design of thesis in which some of the interpersonal factors has
been identified which cause the personal data of client which utilized the
sites of social networking. As well as it has also been mentioned that the
study also investigates that what are some of the factors and reasons have been
mentioned in the study which mainly disclose as the man objectives of study. In
this chapter data collection method and research methodology has been
presented. As well as it has been mentioned that the qualitative research
method has been used to describe the relationship among the variables along
with the aim of predicting the concept. Despite from this the main advantage of
this study it sanctions the researchers to hold the enhanced objectivity to
look back on the results. A well as through this t researcher can also perform
and put the numerical data which has been made on the statistical software.
The population of SNSs users of Saudi Arab has been
taken, in which most of the population which used messenger app on mobile
device and they are in diffusion of 71%. On the other side is has also been
mentioned that in North America the internet penetration has been on high
level. As well as in some countries of Middle East there is also enhanced rate
of internet connectivity among the population in the universe. Despite from
this it can also be said that the population of Saudi Arab are highly using
internet and they are belonging to the medium and teenagers form all the
population of country. The sample size has been taken form the users of social
media apps. As well as the data has been collected from 375 people. The sample
include male and females. All of the participants have been taken are above
from the age of 18. Despite from this a condition has been must in which it has
been guaranteed the consistency of outcomes by making sure that only those
participants will take part that are the part of SNSs. In this study the
non-probability sampling method has been used for the collection of data to select
the participants. In this technique the population has been selected randomly
on the availability of personal judgment which is associated with thesis.
Despite from this survey method has been used for the
collection of data, and this method is quite cost effective. The questionnaire
has been developed to make sure the consistency of data by advertising the
overall reliability in collecting data and in this regard the interview
technique has also been used. Significantly the use of questionnaire has been
eradicated where the interview technique has been impactful for the answers if
they were given randomly or intentionally. On the other hand, while using this
method and this method did not give the chance of tally the answer eve if some
of the questions did not answered properly. As well as only the educated
persons students have been choosing for the interview.
IV.
CONCLUSION of Social Networking
In this research study it has been concluded that in the
first chapter of introduction, some of the social networking sites has been
observed as highly famous in some of the previous centuries. This can only be
happened because of infiltration of internet in some areas of universe there
are number of mobile devices has been aroused. Motivation of doing this project
has been come from the when the increased amount of cases which is related with
the users of SNSs and they’re some of the member who were the victims of
criminal activities which as ben in the form of data breeching. The sites of
social networking had the current which involved the great deal of attention
between the users. Despite from tis it has also been mentioned that the social
framework which has been developed from individual which has been known as
nodes. As well as it can be taken along with some of the interdependency.
In the second chapter of literature review, there are a lot
of affordable technologies have been presented which supports the vast variety
of having practices and investments. Some of the technological features as also
been mentioned here which merely gives the persistent stability which has been
aroused as in form of networks which is already present in the environment
which supports and maintain some social networks but this will also help other
one to share their level of interest in various perspectives. Some of the
theories have been made which is related with human behavior in which it has
been stated that some of the personality traits community and social factors
also play the significant role. There is some of the theoretical structure and
some of the communication procedures may be interactive among individual and
environmental factors. Despite from tis some of the psychological concept of
disclosure has been mentioned here which shows the PII along with the purpose
of developing the close connection with friends and fans mainly. Furthermore,
the theory of gratification has been presented here in which it has been
mentioned that why individuals reveal PII in SNSs.
In third chapter, it is investigated that the
methodology and research design of thesis in which some of the interpersonal
factors has been identified which cause the personal data of client which
utilized the sites of social networking. As well as it has also been mentioned
that the study also investigates that what are some of the factors and reasons
have been mentioned in the study which mainly disclose as the man objectives of
study. The population of SNSs users of Saudi Arab has been taken, in which most
of the population which used messenger app on mobile device and they are in
diffusion of 71%. On the other side is has also been mentioned that in North
America the internet penetration has been on high level. The sample size has
been taken form the users of social media apps. As well as the data has been
collected from 375 people. The sample includes male and females. In this study
the non-probability sampling method has been used for the collection of data to
select the participants. In this technique the population has been selected
randomly on the availability of personal judgment which is associated with
thesis.
V.
References of Social Networking
[1] Altman,
I., and Taylor, D.A. (1973). Social Penetration: The Development of
Interpersonal Relationships. Holt, Rinehart & Winston.
[2] Bazarova,
N. N., & Choi, Y. H. (2014). Self-disclosure in social media: Extending the
functional approach to disclosure motivations and characteristics on social
network sites. Journal of Communication, 64(4), 635-657.
[3] Boyd,
D., & Ellison, N. B. (2007). Social network sites: Definition, history, and
scholarship. Journal of Computer-Mediated Communication, 13(1), 210–230.
[4] Centre
for Disease Control and Prevention (CDC) (2018). The Social-Ecological Model: A
Framework for Prevention. February 20th, 2018. Retrieved from https://www.cdc.gov/violenceprevention/overview/social-ecologicalmodel.html
[5] Dinev
T, and Hart P. (2006). An Extended Privacy Calculus Model for E-Commerce
Transactions. Information Systems Research, 17(1):61-80.
[6] Ellison,
N., Heino, R., and Gibbs, J. (2006). "Managing Impressions Online:
Self-Presentation Processes in the Online Dating Environment." Journal of
Computer Mediated Communication, 11 (2), pp. 415-441.
[7] Frenkel
S. & Roose K. (2018). Facebook’s Privacy Scandal Appears to Have Little
Effect on Its Bottom Line. The New York Times. April 25, 2018. Retrieved from
https://www.nytimes.com/2018/04/25/technology/facebook-privacy-earnings.html.
[8] Gartner
(2013), “US digital marketing spending report, 2013” Available at:
www.gartner.com/ technology/research/digital-marketing/digital-marketing-spend.jsp
(Accessed March 15, 2013).
[9] Gibbs,
J.L., Ellison, N.B., and Heino, R.D. (2006). "Self-Presentation in Online
Personals." Communication Research, 33(2), pp. 152-177.
[10]
Joinson, A. N., & Paine, C. B.
(2007). Self-disclosure, privacy and the Internet. Oxford handbook of Internet
psychology, 237-252.
[11]
Koontz, L. D. (2008). Privacy:
Alternatives Exist for Enhancing Protection of Personally Identifiable
Information: DIANE Publishing.
[12]
Krasnova, H., Hildebrand, T., Günther,
O., Kovrigin, S. and Nowobilska, A. (2008). Why Participate in an Online Social
Networks: An empirical analysis, in W. Golden, T. Acton, K. Conboy, H. van der
Heijden and V.K. Tuunainen, (eds.) Proceedings of 16th European Conference on
Information Systems (Galway, Ireland; 2008), 2124–2135.
[13]
Krasnova, H., Spiekermann, S.,
Koroleva, K., and Hildebrand, T. (2010). "Online Social Networks: Why We
Disclose." Journal of Information Technology, 25 (2), pp. 109-125.
[14]
Krasnova, H., Spiekermann, S.,
Koroleva, K., and Hildebrand, T. 2010. "Online Social Networks: Why We
Disclose." Journal of Information Technology, 25 (2), pp. 109-125.
[15]
Livingstone, S. (2008). "Taking
Risky Opportunities in Youthful Content Creation: Teenagers' Use of Social
Networking Sites for Intimacy, Privacy, and Self-Expression." New media
& society, 10 (3), pp. 393-411.
[16]
Meter, D. J., & Bauman, S. (2015).
When sharing is a bad idea: The effects of online social network engagement and
sharing passwords with friends on cyberbullying involvement. Cyberpsychology,
Behavior, and Social Networking, 18(8), 437-442.
[17]
Robinson, S. C. (2017). Self-Disclosure
and Managing Privacy: Implications for Interpersonal Sharing. Interacting with
computers 26(6).
[18]
Rosenberg, M. (1979). Conceiving the
self. New York: Basic Books.
[19]
Schibchurn J. and Yan X. (2015).
Information disclosure on social networking sites: An intrinsic-extrinsic
motivation perspective. Computers in Human Behaviour, 44, pp.103-117.
[20]
Treiman D. (2014). Quantitative Data
Analysis: Doing Social Research to Test Ideas. Research Methods for the Social
Sciences. New York, NY: John Wiley & Sons.
[21]
Trepte, S., & Reinecke, L. (2013).
The reciprocal effects of social network site use and the disposition for
self-disclosure: A longitudinal study. Computers in human behaviour, 29(3),
1102-1112.
[22]
Vargo, S. L., & Lusch, R. F.
(2004a). Evolving to a new dominant logic for marketing. Journal of Marketing,
68, 1–17, (January).
[23]
Walther, J.B. (2007). "Selective
Self-Presentation in Computer-Mediated Communication: Hyperpersonal Dimensions
of Technology, Language, and Cognition." Computers in Human Behaviour, 23
(5), pp.2538-2557.
[24]
Altman, I., and Taylor, D.A. (1973).
Social Penetration: The Development of Interpersonal Relationships. Holt,
Rinehart & Winston.
[25]
Bazarova, N. N., & Choi, Y. H.
(2014). Self-disclosure in social media: Extending the functional approach to
disclosure motivations and characteristics on social network sites. Journal of
Communication, 64(4), 635-657.
[26]
Fono, D., & Raynes-Goldie, K.
(2006). Hyperfriendship and beyond: Friends and social norms
[27]
on LiveJournal. In M. Consalvo & C.
Haythornthwaite (Eds.), Internet Research Annual
[28]
Volume 4: Selected Papers from the AOIR
Conference (pp. 91–103). New York: Peter Lang.
[29]
[30]
Baumeister, R.F. & Leary, M.R.
(1995). The Need to Belong: Desire for Interpersonal Attachments as a
Fundamental Human Motivation, Psychological Bulletin, 117(3), p. 497.
[31]
Blank, G, Bolsover, G & Dubois, E.
(2014). A New Privacy Paradox: Young people and privacy on social network
sites.
[32]
Boyd, D., & Ellison, N. B. (2007).
Social network sites: Definition, history, and scholarship. Journal of
Computer-Mediated Communication, 13(1), 210–230.
[33]
Brown, C.S.D (2015). Investigating and
Prosecuting Cyber-Crime: Forensic Dependencies and
[34]
Chen, R., & Sharma, S. K. (2013).
Self-disclosure at social networking sites: An exploration through relational
capitals. Information Systems Frontiers, 15(2), 269-278.
[35]
Commerce, 16(4), 385-404.
[36]
Centre for Disease Control and
Prevention (CDC) (2018). The Social-Ecological Model: A Framework for
Prevention. February 20th, 2018. Retrieved from
https://www.cdc.gov/violenceprevention/overview/social-ecologicalmodel.html
[37]
Adapted from the Centers for Disease
Control and Prevention (CDC), The Social Ecological Model: A Framework for Prevention. August 10th, 2018. Retrieved from
http://www.cdc.gov/violenceprevention/overview/social-ecologicalmodel.
[38]
Derlega, V.J., and Grzelak, J. (1979).
"Appropriateness of Self-Disclosure," Self-disclosure: Origins,
Patterns, and implications of openness in interpersonal relationships, pp.
151-176.
[39]
Dinev T, and Hart P. (2006). An
Extended Privacy Calculus Model for E-Commerce Transactions. Information
Systems Research, 17(1):61-80.
[40]
Ellison N.B, Steinfield, C, & Lampe
C. (2007). The benefits of Facebook “friends.” Social Capital and college
students’ use of online social networking sites. Journal of Computer-Mediated
Communication, 12(4), 1143-1168.
[41]
Ellison, N., Heino, R., and Gibbs, J.
(2006). "Managing Impressions Online: Self-Presentation Processes in the
Online Dating Environment." Journal of Computer Mediated Communication, 11
(2), pp. 415-441.
[42]
Frenkel S. & Roose K. (2018).
Facebook’s Privacy Scandal Appears to Have Little Effect on Its Bottom Line.
The New York Times. April 25, 2018. Retrieved from https://www.nytimes.com/2018/04/25/technology/facebook-privacy-earnings.html
[43]
Fenigstein, A., Scheier, M. F., &
Buss, A. H. (1975). Public and private self-consciousness: Assessment and
theory. Journal of Consulting and Clinical Psychology, 43, 522-527. http:// doi.org/c8c.
[44]
Giddens, A. Sociology. (Cambridge:
Polity Press 2006).Bargh, JA. McKenna, K. Y. A., Fitzsimons GM. ‘Can You See
the Real Me? Activation and Expression of the ‘True Self’ on the Internet’ J.
Soc. Issues. 58(1), 2002, pp.33–48.
[45]
Gartner (2013), “US digital marketing
spending report, 2013” Available at: www.gartner.com/
technology/research/digital-marketing/digital-marketing-spend.jsp (Accessed
March 15, 2013).
[46]
Gefen D., Karahanna E. & Straub D.
(2003). Trust and TAM in Online Shopping: An Integrated Model. MIS Quarterly,
Vol 27, (1), pp.51-90.
[47]
Ghamari, N., & Mellbin, L. (2015).
Disclosing Personal Information to Social Networking Site
[48]
Gibbs, J.L., Ellison, N.B., and Heino,
R.D. (2006). "Self-Presentation in Online Personals." Communication
Research, 33(2), pp. 152-177.
[49]
Gould & Barak (2010). Public
Self-Consciousness and Consumption Behavior. The Journal of Social Psychology,
128(3), pp. 393-400, doi: 10.1080/00224545.1988.9713756
[50]
Hasib, A. (2008). Threats of Online
Social Networks. Seminar of internetworking T-110.5190
[51]
http://scholarworks.sjsu.edu/ etd theses/3601.
[52]
Joinson, A. N., & Paine, C. B.
(2007). Self-disclosure, privacy and the Internet. Oxford handbook of Internet
psychology, 237-252.
[53]
Joinson, A. N. (2004). Self-esteem,
interpersonal risk, and preference for e-mail to face-to-face communication.
CyberPsychology & Behavior, 7, 472-478. http://doi.org/cv765m
[54]
Koontz, L. D. (2008). Privacy:
Alternatives Exist for Enhancing Protection of Personally Identifiable
Information: DIANE Publishing.
[55]
Krasnova, H., Hildebrand, T., Günther,
O., Kovrigin, S. and Nowobilska, A. (2008). Why Participate in an Online Social
Networks: An empirical analysis, in W. Golden, T. Acton, K. Conboy, H. van der
Heijden and V.K. Tuunainen, (eds.) Proceedings of 16th European Conference on
Information Systems (Galway, Ireland; 2008), 2124–2135.
[56]
Krasnova, H., Spiekermann, S.,
Koroleva, K., and Hildebrand, T. 2010. "Online Social Networks: Why We
Disclose." Journal of Information Technology, 25 (2), pp. 109-125.
[57]
Krasnova, H., Veltri, N. F., & Günther, O.
(2012). Self-disclosure and privacy calculus on social networking sites: The
role of culture. Business & Information Systems Engineering, 4(3), 127-135.
[58]
Kumar, N. S.,Deepa, K., &
Saravanakumar, K. (2016). On Privacy and Security in Social Media.
[59]
Kwak, K. T., Choi, S. K., & Lee, B.
G. (2014). SNS flow, SNS self-disclosure and post hoc interpersonal relations
change: Focused on Korean Facebook user. Computers in Human Behavior, 31,
294-304.
[60]
Ledbetter, A. M., Mazer, J. P.,
DeGroot, J. M., Meyer, K. R., Mao, Y., & Swafford, B. (2011). Attitudes
toward online social connection and self-disclosure as predictors of Facebook
communication and relational closeness. Communication Research, 38(1), 27-53.
[61]
Liu, C., Ang, R. P., & Lwin, O. M.
(2013). Cognitive, Personality and Social Factors Associated and Online
Communication for Consumers and Marketers. Journal of Internet
[62]
Barriers
to Justice. International Journal of Cyber Criminology, 9(1), 55-119
[63]
Livingstone, S. (2008). "Taking
Risky Opportunities in Youthful Content Creation: Teenagers' Use of Social
Networking Sites for Intimacy, Privacy and Self-Expression." New media
& society, 10 (3), pp. 393-411.
[64]
Personality Identifiable Information with
Strangers: Effects of Public and Private
[65]
Procedia Computer Science, 78(1), 114-119.
[66]
Meter, D. J., & Bauman, S. (2015).
When sharing is a bad idea: The effects of online social network engagement and
sharing passwords with friends on cyberbullying involvement. Cyberpsychology,
Behavior, and Social Networking, 18(8), 437-442.
[67]
Retelas, G. (2008). "Anonymity and
Self Disclosure on Myspace. Master’s Thesis.3601.
[68]
Robinson, S. C. (2017). Self-Disclosure
and Managing Privacy: Implications for Interpersonal Sharing. Interacting with
computers 26(6).
[69]
Rosenberg, M. (1979). Conceiving the
self. New York: Basic Books.
[70]
Schibchurn J. and Yan X. (2015).
Information disclosure on social networking sites: An intrinsic-extrinsic
motivation perspective. Computers in Human Behaviour, 44, pp.103-117.
[71]
Trepte, S., & Reinecke, L. (2013).
The reciprocal effects of social network site use and the disposition for
self-disclosure: A longitudinal study. Computers in human behaviour, 29(3),
1102-1112.
[72]
UNICEF (2009). Communication for
Development (C4D) Realizing Strategic Shifts and Accelerating Results for
Children. New York.
[73]
Vargo, S. L., & Lusch, R. F.
(2004a). Evolving to a new dominant logic for marketing. Journal of Marketing,
68, 1–17, (January).
[74]
Venkatanathan, J., Kostakos, V.,
Karapanos, E., & Concalves, J. (2013). Online Disclosure of Personality
Identifiable Information with Strangers: Effects of Public and Private
[75]
Sharing. Interacting with computers 26(6).
[76]
Valkenburg, P. M., Peter, J., &
Schouten, A. P. (2006). Friend networking sites and their relationship to
adolescents’ well-being and social self-esteem. CyberPsychology & Behavior,
9, 584-590. http://doi.org/b8f2f9
[77]
Valkenburg, P. M., & Peter, J.
(2007). Preadolescents’ and adolescents’ online communication and their
closeness to friends. Development Psychology, 43(2), 267-277.
[78]
Walther, J.B. (2007). "Selective
Self-Presentation in Computer-Mediated Communication: Hyperpersonal Dimensions
of Technology, Language, and Cognition." Computers in Human Behaviour, 23
(5), pp.2538-2557.
[79]
Wheeless, L.R., & Grotz, J. (1976).
Conceptualization and measurement of reported self- disclosure. Human
Communication Research, 2 (4), 338-346.
[80]
Zhao, S., Grasmuck, S., & Martin,
J. (2008). Identity construction on Facebook: Digital empowerment in anchored
relationships. Computers in Human Behavior, 24, 1816-1836.
http://doi.org/cmr349
[81]
Bickman, L., & Rog, D. (2009).
Applied research design: A practical approach. In L. Bickman& D. Rog
(Eds.), Handbook of applied social research methods (2nd ed., pp. 3–43).
Thousand Oaks, CA: Sage.
[82]
Birchall, J. (2009). Sampling and
samples. Retrieved February, 3 2020, from
[83]
http://marketresearchworld.net/content/view/23/41/
[84]
Bowling, A., & Ebrahim, S. (2005).
Handbook of health research methods: Investigation, measurement and analysis. Maidenhead:
Open University Press.
[85]
Daniel, J. (2012). Sampling essentials:
Practical guidelines for making sampling choices. Los Angeles: Sage.
[86]
DIGITAL 2019 global digital yearbook
essential digital data for every country in the world. (2019).
[87]
Galletta A., (2013). Mastering the
Semi-Structured Interview and Beyond: From Research Design to Analysis and
Publication. Qualitative Studies in Psychology. New York, NY: NYU Press.
[88]
Hancock G., Mueller, R., Stapleton, L.,
(2010). The Reviewer’s Guide to Quantitative Methods in the Social Sciences.
Mason, OH: Routledge.
[89]
Muijs, D. (2004). Doing quantitative
research in education with SPSS. London: SAGE.
[90]
Newman, I., & Benz, C. R. (2006).
Qualitative-quantitative research methodology: Exploring the interactive
continuum. Carbondale, Ill: Southern Illinois Univ. Press.
[91]
Osborne, J. (2008). Best Practices in
Quantitative Methods. New York, NY: SAGE.
[92]
Parveen, H., & Showkat, N. (2017).
Research Ethics.
[93]
Resnik, D. B. (1998) The Ethics of
Science: An Introduction, London: Routledge.
[94]
Rubin, A., & Babbie, E. R. (2010).
Essential research methods for social work. Belmont, Calif: Brooks/Cole,
Cengage Learning.
[95]
SMITH, D. (2003). Five principles for
research ethics Cover your bases with these ethical strategies, 34(1).
[96]
Sprenkle, D. H., & Piercy, F. P.
(2005). Research methods in family therapy. New York: Guilford Press.
[97]
Thyer B. (2001). The Handbook of Social
Work Research Methods. New York, NY: SAGE.
[98]
Watzlawik, M., & Born, A. (2007).
Capturing identity: Quantitative and qualitative methods. Lanham: University
Press of America.
[99]
Wolf, C. (2016). The SAGE handbook of
survey methodology. New York, NY: Sage Publications.