Perception analysis of social networks’ privacy policy: Instagram as a case study
Social network emergence has had a remarkable impact on how people communicate and share information. It has increased revenues tremendously. However, it has added another problem to data confidentiality. This is due to the advances in communication technology that keep on producing a better, e...
| Main Authors: | Talib, Shuhaili, Abdul Razak, Siti Munirah, Olowolayemo, Akeem Koye, Salependi, Melasari, Ahmad, Nur Fatihah, Kunhamoo, Syakila, Bani, Siti Khalijah |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/40799/ http://irep.iium.edu.my/40799/1/40799.pdf http://irep.iium.edu.my/40799/3/40799_Perception%20analysis%20of%20social.SCOPUS.pdf |
Similar Items
Social networks privacy policy awareness among undergraduate students: the case of Twitter
by: Talib, Shuhaili, et al.
Published: (2014)
by: Talib, Shuhaili, et al.
Published: (2014)
Towards implementing a privacy policy: an observation on existing practices in hospital information system
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
Security and privacy for IoT and fog computing paradigm
by: Rauf, Abdul, et al.
Published: (2018)
by: Rauf, Abdul, et al.
Published: (2018)
The future of data privacy and security concerns in
Internet of things
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
ICT in telemedicine: conquering privacy and security issues in health care services
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
Privacy models for protecting personal medical information: a preliminary study
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
Adopting a knowledge management concept in securing the privacy of electronic medical record systems
by: Samsuri, Suhaila, et al.
Published: (2013)
by: Samsuri, Suhaila, et al.
Published: (2013)
Exploring the factors influencing top management involvement and participation in information security
by: Abdul Munir, Rufizah, et al.
Published: (2017)
by: Abdul Munir, Rufizah, et al.
Published: (2017)
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
Risk management policies of telecommunication and engineering laboratories
by: Shah, Abdul Salam, et al.
Published: (2016)
by: Shah, Abdul Salam, et al.
Published: (2016)
Efficient cache replacement policy for minimising error rate in L2-STT-MRAM caches
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Consumers' perceptions towards mobile halal application system
by: Abu Bakar, Elistina, et al.
Published: (2014)
by: Abu Bakar, Elistina, et al.
Published: (2014)
Forensic analysis of offline signature using multi-layer perception and random forest
by: Shah, Abdul Salam, et al.
Published: (2017)
by: Shah, Abdul Salam, et al.
Published: (2017)
An analysis of information security awareness within home and work environments
by: Talib, Shuhaili, et al.
Published: (2010)
by: Talib, Shuhaili, et al.
Published: (2010)
The system architecture of E-braille by using the microcontroller and external controller unit
by: Burhan, Muhammad Mansor, et al.
Published: (2016)
by: Burhan, Muhammad Mansor, et al.
Published: (2016)
Managing flood in the context of education, research and partnership in Malaysia
by: Maidin, Siti Sarah, et al.
Published: (2019)
by: Maidin, Siti Sarah, et al.
Published: (2019)
Governance framework for flood disaster in Malaysia: integration of COBIT and Hyogo principles
by: Maidin, Siti Sarah, et al.
Published: (2019)
by: Maidin, Siti Sarah, et al.
Published: (2019)
Manpower model for human resource planning management
by: Halim, Siti Sarah A., et al.
Published: (2012)
by: Halim, Siti Sarah A., et al.
Published: (2012)
Log visualization of intrusion and prevention reverse proxy server against web attacks
by: Mantoro, Teddy, et al.
Published: (2013)
by: Mantoro, Teddy, et al.
Published: (2013)
Information sharing in governance of flood management in Malaysia: COBIT based framework
by: Maidin, Siti Sarah, et al.
Published: (2014)
by: Maidin, Siti Sarah, et al.
Published: (2014)
Factors influence novice programmers toward test first approach
by: Yahya, Norzariyah, et al.
Published: (2019)
by: Yahya, Norzariyah, et al.
Published: (2019)
A novel neuroscience-inspired architecture: for computer vision applications
by: Hassan, Marwa Yousif, et al.
Published: (2016)
by: Hassan, Marwa Yousif, et al.
Published: (2016)
A systematic review of modalities in computer-based interventions (CBIs) for language comprehension and decoding skills of children
with autism spectrum disorder (ASD)
by: Khowaja, Kamran, et al.
Published: (2020)
by: Khowaja, Kamran, et al.
Published: (2020)
The design of a speech delay screening mobile application for Malaysian parents
by: Mohammed, Siti Asma, et al.
Published: (2019)
by: Mohammed, Siti Asma, et al.
Published: (2019)
Design of an intelligent robotic donationbox a case study
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2011)
by: Salami, Momoh Jimoh Emiyoka, et al.
Published: (2011)
Trust and resource oriented communication scheme in mobile ad hoc networks
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
Appraisal on social perception pertaining to communication and psychology
by: Abdul Hamid, Norashikin, et al.
Published: (2020)
by: Abdul Hamid, Norashikin, et al.
Published: (2020)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Calculus and its applications in scale-free networks
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
An analysis of scheduling scheme for QoS guaranteed interactive multimedia over high speed wireless campus networks
by: Alam, M.K., et al.
Published: (2013)
by: Alam, M.K., et al.
Published: (2013)
Development of wearable pulse oximetry for telehealth monitoring system
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
A scheduling algorithm for bandwidth aggregation in heterogeneous wireless network
by: Masud, M.H., et al.
Published: (2014)
by: Masud, M.H., et al.
Published: (2014)
Adaptive multi-rate video transcoding method
by: Fadlallah, Fadlallah Ali, et al.
Published: (2014)
by: Fadlallah, Fadlallah Ali, et al.
Published: (2014)
Analysis of design principles and requirements for procedural rigging of bipeds and quadrupeds characters with custom manipulators for animation
by: Bhati, Zeeshan, et al.
Published: (2015)
by: Bhati, Zeeshan, et al.
Published: (2015)
The most favourable mobile messaging apps
among IIUM students
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
A novel scheme of binding update no sense drop BCE in LMA
by: Geaiger, Mohamed, et al.
Published: (2014)
by: Geaiger, Mohamed, et al.
Published: (2014)
Node status detection and information diffusion in router network using scale-free network
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
r-TOLA: an architecture for real time open learning application for universities
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Video viewing and streaming enhancement
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
Similar Items
-
Social networks privacy policy awareness among undergraduate students: the case of Twitter
by: Talib, Shuhaili, et al.
Published: (2014) -
Towards implementing a privacy policy: an observation on existing practices in hospital information system
by: Samsuri, Suhaila, et al.
Published: (2011) -
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015) -
Security and privacy for IoT and fog computing paradigm
by: Rauf, Abdul, et al.
Published: (2018) -
The future of data privacy and security concerns in
Internet of things
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)