How much privacy we still have on social network?
Recently, internet is one of the most efficient and effective ways to communicate and sharing the information especially in terms of social networking sites. With over billions of users connected through online social network and due to the popularity of social network sites, m...
| Main Authors: | Chewae, Mafaisu, Hayikader, Sameer, Hasan, Muhamad Hairulnizam, Ibrahim, Jamaludin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IJSRP.ORG
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/45403/ http://irep.iium.edu.my/45403/1/2015-1-How_Much_Privacy_We_Still_Have_on_Social_Network-www.ijsrp.org.pdf |
Similar Items
Privacy concern and perceived benefits towards privacy and election in Indonesia
by: Lubis, Muharman, et al.
Published: (2014)
by: Lubis, Muharman, et al.
Published: (2014)
Attitude towards information privacy issues among students of IIUM
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016)
Employing information security awareness to minimize over-exposure of average Internet user on social networks
by: Binden, Worawit, et al.
Published: (2014)
by: Binden, Worawit, et al.
Published: (2014)
Privacy in public spaces: what expectations of privacy do we have in social media intelligence?
by: Edwards, Lilian, et al.
Published: (2016)
by: Edwards, Lilian, et al.
Published: (2016)
Buru Island: Still much more to reveal
by: Hearman, Vannessa
Published: (2020)
by: Hearman, Vannessa
Published: (2020)
A social networking-based advertising to enhance customer reach target
by: Nuar, Ahmad Najmi Amer Haider, et al.
Published: (2017)
by: Nuar, Ahmad Najmi Amer Haider, et al.
Published: (2017)
Debt: how much is too much?
by: Haron, Razali
Published: (2014)
by: Haron, Razali
Published: (2014)
Pemantauan keselamatan aset dan kenderaan menggunakan teknologi radio frequency identification (RFID)
by: Omar, Abdul Halim, et al.
Published: (2017)
by: Omar, Abdul Halim, et al.
Published: (2017)
Governing networks in tourism: what have we achieved, what is still to be done and learned?
by: Volgger, Michael, et al.
Published: (2015)
by: Volgger, Michael, et al.
Published: (2015)
Cloud computing: cloud adoption in professional practice
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
The role of IT consulting practice: a successful enterprise mobility solution
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
How much influence does the Chinese state have over CEOs and their compensation?
by: Bryson, Alex, et al.
Published: (2014)
by: Bryson, Alex, et al.
Published: (2014)
Potential use of data mining techniques in information technology consulting operations
by: Qadri, Mehran, et al.
Published: (2015)
by: Qadri, Mehran, et al.
Published: (2015)
Network device ad-blocker
by: Mohamad, Juhaina, et al.
Published: (2020)
by: Mohamad, Juhaina, et al.
Published: (2020)
An evaluation of photonic switching network
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
Steganography: a review of information security research and development in Muslim world
by: Yunus, Yunura Azura, et al.
Published: (2013)
by: Yunus, Yunura Azura, et al.
Published: (2013)
A survey of photonic switching network
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
The knowledge management strategies used as a tool within and through strategic consulting firms to increase the organisational performance
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
Information security in ICT from an Islamic
perspective
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015)
by: Abdullah, Istikoma, et al.
Published: (2015)
Impact of NSA-PRISM to National Information Security
Strategy & Policy
by: Khudayer, Aiesha Y., et al.
Published: (2014)
by: Khudayer, Aiesha Y., et al.
Published: (2014)
Model Reka Bentuk Konseptual Operasian Storan Data Bagi Aplikasi Kepintaran Perniagaan
by: Muhamad Shahbani, Abu Bakar
Published: (2012)
by: Muhamad Shahbani, Abu Bakar
Published: (2012)
Durian Farm Threats Identification through Convolution Neural
Networks and Multimedia Mobile Development
by: Yusoff, Aiman, et al.
by: Yusoff, Aiman, et al.
Positive impact of smartphone application: whatsapp &
facebook for online business
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
Scale free network analysis of a large crowd through their
spatio-temporal activities
by: Ahmad, Akhlaq, et al.
Published: (2016)
by: Ahmad, Akhlaq, et al.
Published: (2016)
Comparison of Business Model Canvas (BMC) among the three consulting companies
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2015)
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2015)
A 10 C’s of social networking, interconnections and the impact on social networking
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
An adaptive social-aware device-to-device communication mechanism for wireless networks
by: Alden, Feras Zen
Published: (2020)
by: Alden, Feras Zen
Published: (2020)
The role of social media in empowering the involvement of women in information technology workforce in Iraq
by: Mohammed, Rammah Ghanim
Published: (2016)
by: Mohammed, Rammah Ghanim
Published: (2016)
Conceptual model of persuasive multimedia content (PMC) for social media advertising of island homestays
by: Muhammad Abdul Malik, Saedon
Published: (2019)
by: Muhammad Abdul Malik, Saedon
Published: (2019)
The role of social media in learning among male students in secondary school: A case of Iraq
by: Abdulwaheed, Mustafa Sabah
Published: (2016)
by: Abdulwaheed, Mustafa Sabah
Published: (2016)
Determinants of the Acceptance of Social Media as a Medium for Tax Education Among Salaried Earners in Selangor
by: Azizi, Mamat
Published: (2024)
by: Azizi, Mamat
Published: (2024)
Wireless sensor networks for developing countries: First International Conference, WSN4DC 2013 Jamshoro, Pakistan, April 2013 revised selected papers
Published: (2013)
Published: (2013)
Should we be concerned with spam emails? A look at its impacts and implications
by: Bujang, Yanti Rosmunie, et al.
Published: (2013)
by: Bujang, Yanti Rosmunie, et al.
Published: (2013)
The Influence of Social Media Communication Management on Clients' Satisfaction With Dubai Police Service - The Mediating Role of Service Quality
by: AlSalman, Salman Essa Hussain
Published: (2023)
by: AlSalman, Salman Essa Hussain
Published: (2023)
Faktor penentu niat terhadap perkongsian maklumat mangsa banjir Rantau Panjang, Kelantan dari perspektif teori kognitif social
by: Nurzawani, Mohamad Zani
Published: (2015)
by: Nurzawani, Mohamad Zani
Published: (2015)
Information technology club management system
by: Ibrahim, Mohd Shukri, et al.
Published: (2018)
by: Ibrahim, Mohd Shukri, et al.
Published: (2018)
Sweet8 bakery booking system
by: Basir, Nor Farhana, et al.
Published: (2018)
by: Basir, Nor Farhana, et al.
Published: (2018)
Lensalyza photography studio reservation system
by: Ku Mohd Razali, Ku Siti Nor Habibah, et al.
Published: (2018)
by: Ku Mohd Razali, Ku Siti Nor Habibah, et al.
Published: (2018)
Collaboration system towards Program Anak Emas in Malaysia (SPANE)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
Similar Items
-
Privacy concern and perceived benefits towards privacy and election in Indonesia
by: Lubis, Muharman, et al.
Published: (2014) -
Attitude towards information privacy issues among students of IIUM
by: Mohamud, Ibrahim Kalif, et al.
Published: (2016) -
Employing information security awareness to minimize over-exposure of average Internet user on social networks
by: Binden, Worawit, et al.
Published: (2014) -
Privacy in public spaces: what expectations of privacy do we have in social media intelligence?
by: Edwards, Lilian, et al.
Published: (2016) -
Buru Island: Still much more to reveal
by: Hearman, Vannessa
Published: (2020)