Skip to main content
Log in

A Relational Study of Critical Threats and Risks Affecting the Potential Usage of Collaborative Pattern

  • Original Article
  • Published:
Global Journal of Flexible Systems Management Aims and scope Submit manuscript

Abstract

With increased variety of collaborative tools offering advanced features, knowledge sharing among professional and social peers has become independent of space and time. This paper identifies the potential of social networks for educational collaboration among school stakeholders. It also draws an attention towards crucial threats and risks associated with the oblivious use of this online collaborative pattern. Cyber security issues are classified; showing high impact on the acceptance and intentional use of social networking sites (SNS). Influence of security and privacy issues on a trusted participation of stakeholders in a collaborative environment is discussed in the light of comprehensive review of literature. Conclusively all devised research hypotheses were supported using structural equation modelling techniques. Moreover, this research study discusses the research questions and investigated research findings. It is suggested that vigilant dealing with possible cyber-crimes and following the best practices for safe and secure SNS usage can lead towards operative use of this participatory platform in an educational paradigm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  • Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In PET’06 Proceedings of the 6th international conference on privacy enhancing technologies (pp. 36–58). Berlin, Heidelberg: Springer.

  • Aimeur, E., Gambs, S., & Ho, A. (2010). Towards a privacy-enhanced social networking site. In ARES’10 international conference on availability, reliability, and security. IEEE.

  • Aïmeur, E., & Schonfeld, D. (2011). The ultimate invasion of privacy: Identity theft. In Ninth annual international conference on privacy, security and trust. IEEE.

  • Akgun, S., & Ciarrochi, J. (2003). Learned resourcefulness moderates the relationship between academic stress and academic performance. Educational Psychology, 23(3), 287–294.

    Article  Google Scholar 

  • Alarcón-del-Amo, M. C., Lorenzo-Romero, C., & Gómez-Borja, M. A. (2012). Analysis of acceptance of social networking sites. African Journal of Business Management, 6(29), 8609–8619.

    Google Scholar 

  • Albrechtsen, E., & Hovden, J. (2009). Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study. Computers & Security, 29(4), 432–445.

    Article  Google Scholar 

  • Almadhoun, N. M., Dominic, P. D. D, & Woon, L. F. (2011). Perceived security, privacy, and trust concerns within social networking sites: The role of information sharing and relationships development in the Malaysian Higher Education Institutions’ marketing. In 2011 IEEE international conference on control system, computing and engineering (ICCSCE).

  • Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice: A review and recommended two step approach. Journal of Psychological Bulletin, 103(3), 411–423.

    Article  Google Scholar 

  • Banks, L., & Wu, S. F. (2009). All friends are not created equal: An interaction intensity based approach to privacy in online social networks. In Computational science and engineering, 2009. CSE ‘09.

  • Beldad, A., de Jong, J., & Steehouder, M. (2010). How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust. Computers in Human Behavior, 26(5), 857–869.

    Article  Google Scholar 

  • Brandtzæg, P. B., Lüders, M., & Skjetne, J. H. (2010). Too many Facebook “friends”? Content sharing and sociability versus the need for privacy in social network sites. International Journal of Human–Computer Interaction, 26(11), 1006–1030.

    Article  Google Scholar 

  • Cain, J. (2008). Online social networking issues within academia and pharmacy education. American Journal of Pharmaceutical Education, 72(1), 1–7.

    Article  Google Scholar 

  • Carlos Roca, J., José García, J., & José de la Vega, J. (2009). The importance of perceived trust, security and privacy in online trading systems. Information Management & Computer Security, 17(2), 96–113.

    Article  Google Scholar 

  • Chen, R. (2013). Member use of social networking sites—An empirical examination. Decision Support Systems, 54(3), 1219–1227.

    Article  Google Scholar 

  • Chen, H., Yu, C., & Chang, C. (2007). E-homebook system: A web-based interactive education interface. Computers & Education, 49(2), 160–175.

    Article  Google Scholar 

  • Cheung, C. M. K., Chiu, P. Y., & Lee, M. K. O. (2011). Online social networks: Why do students use Facebook? Computers in Human Behavior, 27(4), 1337–1343.

    Article  Google Scholar 

  • Chuttur, M. (2009). Overview of the technology acceptance model: Origins, developments and future directions. Sprouts: Working Papers on Information Systems, Indiana University, USA, 9(37). http://sprouts.aisnet.org/9-37. Accessed Feb 15, 2014.

  • Cohen, J. (1998). Statistical power analysis for the behavioral sciences (2nd ed.). Hillsdale, NJ: Routledge.

    Google Scholar 

  • Cone, B. D. I., Thompson, C. E., Nguyen, M. F., & Thuy, D. (2007). A video game for cyber security training and awareness. Computers & Security, 26(1), 63–72.

    Article  Google Scholar 

  • Cranmer, S., Selwyn, N., & Potter, J. (2009). Exploring primary pupils’ experiences and understandings of ‘e-safety’. Education and Information Technologies, 14(2), 127–142.

    Article  Google Scholar 

  • Cronbach, L. J. (1951). Coefficient alpha and the internal structure of tests. Psychometrika, 16(3), 297–334.

    Article  Google Scholar 

  • Davis Iii, C. H. F., Deil-Amen, R., Rios-Aguilar, C., & González Canché, M. S. (2015). Social media, higher education, and community colleges: A research synthesis and implications for the study of two-year institutions. Community College Journal of Research and Practice, 39(5), 409–422.

    Article  Google Scholar 

  • De Souza, Z., & Dick, G. N. (2009). Disclosure of information by children in social networking—Not just a case of “you show me yours and I’ll show you mine”. International Journal of Information Management, 29(4), 255–261.

    Article  Google Scholar 

  • De Zwart, M., Henderson, M., Phillips, M., & Lindsay, D. (2010). ‘I like, stalk them on Facebook’: Teachers’ ‘privacy’ and the risks of social networking sites. In Technology and Society (ISTAS), 2010. University of Wollongong, Wollongong.

  • Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer Mediated Communication, 15(1), 83–108.

    Article  Google Scholar 

  • Dhami, A., Agarwal, N., Chakraborty, T. K., Singh, B. P., & Minj, J. (2013). Impact of trust, security and privacy concerns in social networking: An exploratory study to understand the pattern of information revelation in Facebook. In 2013 IEEE 3rd international advance computing conference (IACC). IEEE.

  • Dwyer, C., Hiltz, S. R., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. In Proceedings of the thirteenth Americas conference on information systems (pp. 1–12). Colorado: Keystone.

  • Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer Mediated Communication, 13(1), 210–230.

    Article  Google Scholar 

  • Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25(1), 153–160.

    Article  Google Scholar 

  • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50.

    Article  Google Scholar 

  • Galpin, R., & Flowerday, S. V. (2011). Online social networks: Enhancing user trust through effective controls and identity management. In Information Security South Africa (ISSA) (pp. 1–8). Johannesburg: IEEE.

  • Gliem, J. A., & Gliem, R. R. (2003). Calculating, interpreting, and reporting Cronbach’s alpha reliability coefficient for Likert-type scales. In Midwest research-to-practice conference in adult, continuing, and community education.

  • Grabner-Kräuter, S., & Bitter, S. (2013). “Trust in online social networks: A multifaceted perspective. Forum for Social Economics, 44, 1–21.

    Google Scholar 

  • Grant, L. (2011). ‘I’m a completely different person at home’: using digital technologies to connect learning between home and school. Journal of Computer Assisted learning, 27(4), 292–302.

    Article  Google Scholar 

  • Griffith, S., & Liyanage, L. (2008). An introduction to the potential of social networking sites in education. In Proceedings of emerging technologies conference. University of Wollongong, Wollongong, Australia, 18–21, June 2008.

  • Hair, J. F, Jr, Anderson, R. E., Tatham, R. L., & Black, W. C. (1998). Multivariate data analysis with readings (5th ed.). Englewood Cliffs, NJ: Prentice Hall.

    Google Scholar 

  • Hair, J. F, Jr, Hult, G. T. M., Ringle, C., & Sarstedt, M. (2014). A primer on partial least squares structural equation modeling (PLS-SEM). Los Angeles: SAGE.

    Google Scholar 

  • Harwood, C., & Blackstone, B. (2012). Using Facebook to extend learning into students’ digital lives. ELTWorldOnline.com, 4, 1–22.

    Google Scholar 

  • Henderson, M., de Zwart, M., Lindsay, D., & Phillips, M. (2010). Students’ use of social networking tools: Legal risks and other implications. In Digital diversity conference ACEC, Melbourne, Australia.

  • Hina, S., & Oxley, A. (2014). Participation/collaboration pattern: Perspectives of trust and security risks. In 2014 international conference on computer and information sciences (ICCOINS).

  • Ho, L. H., Hung, C. L., & Chen, H. C. (2013). Using theoretical models to examine the acceptance behavior of mobile phone messaging to enhance parent–teacher interactions. Computers & Education, 61(1), 105–114.

    Article  Google Scholar 

  • Jabeur, N., Zeadally, S., & Maydebura, S. (2012). Improving trust and privacy models in social networks. In 5th international conference on new technologies, mobility and security (NTMS). IEEE, pp. 1–5.

  • Kaur, J., Bharali, R., & Pradeep, Y. (2012). Attitudes to social networking sites and their potential as learning platforms in a school environment. In 2012 IEEE international conference on technology enhanced education (ICTEE).

  • Kritzinger, E., & von Solms, S. H. (2010). Cyber security for home users: A new way of protection through awareness enforcement. Computers & Security, 29(8), 840–847.

    Article  Google Scholar 

  • Lawler, J. P., & Molluzzo, J. C. (2010). A study of the perceptions of students on privacy and security on social networking sites (SNS) on the internet. Journal of Information Systems Applied Research, 3(12), 3–18.

    Google Scholar 

  • Leng, G. S., Lada, S., Muhammad, M., Ibrahim, A. A., & Amboala, T. (2011). An exploration of social networking sites (SNS) adoption in Malaysia using technology acceptance model (TAM), theory of planned behavior (TPB) and intrinsic motivation. Journal of Internet Banking and Commerce, 16(2), 1–27.

    Google Scholar 

  • Litt, E. (2013). Understanding social network site users' privacy tool use. Computers in Human Behavior, 29(4), 1649–1656.

    Article  Google Scholar 

  • Lockyer, L., & John, P. (2008). Integrating social networking technologies in education: a case study of a formal learning environment. In 8th international conference on advanced learning technologies ICALT’08. IEEE, pp. 529–533.

  • Lorenz, B., Kikkas, K., & Laanpere, M. (2011). Bottom-up development of e-safety policy for Estonian schools. In Proceedings of the 5th international conference on theory and practice of electronic governance. ACM.

  • Lorenzo-Romero, C., & Constantinides, E. (2011). Consumer adoption of social networking sites: implications for theory and practice. Journal of Research in Interactive Marketing, 5(2/3), 170–188.

    Article  Google Scholar 

  • Marin, C., Fernandez, E. B., & Petrie, M. L. (2010). Patterns for secure social networks in Web 2.0. In 8th Latin American and Caribbean conference for engineering and technology. Arequipa, Peru.

  • Mazer, J. P. M., Simonds, R. E., & Cheri, J. (2007). I’ll see you on “Facebook”: The effects of computer-mediated teacher self-disclosure on student motivation, affective learning, and classroom climate. Communication Education, 56(1), 1–17.

    Article  Google Scholar 

  • Md Nor, S., & Wee Beng Neo, J. (2001). Involving parents in children’s education: what teachers say in Malaysia. In F. Smit, F. van der Wolf & P. Sleegers (Eds.), A bridge to the future: Collaboration between parents, schools and communities (p. 167). Amsterdam: Institute for Applied Social Sciences, Catholic University of Nijmegen, SCO-Kohnstamm Institute.

  • Moreno, M. A., Egan, K. G., Bare, K., Young, H. N., & Cox, E. D. (2013). Internet safety education for youth: stakeholder perspectives. BMC Public Health, 13(1), 543.

    Article  Google Scholar 

  • Oblinger, D., Oblinger, J. L., & Lippincott, J. K. (2005). Educating the net generation. Boulder, CO: EDUCAUSE. See: www.educause.edu/educatingthenetgen/. Accessed March 2014.

  • Oxley, A. (2011). A best practices guide for mitigating risk in the use of social media. Washington, DC: IBM Center for The Business of Government.

    Google Scholar 

  • Oxley, A. (2013). Security risks in social media technologies: Safe practices in public service applications. Oxford: Chandos Publishing Social Media Series.

    Book  Google Scholar 

  • Ratnam, K. A., Dominic, P. D. D., & Ramayah, T. (2014). A structural equation modeling approach for the adoption of cloud computing to enhance the Malaysian healthcare sector. Journal of Medical Systems, 38(8), 1–14.

    Article  Google Scholar 

  • Ringle, C. M., Wende, S., & Becker, J.-M. (2015). SmartPLS 3. Bönningstedt: SmartPLS. Retrieved from http://www.smartpls.com.

  • Rosen, P. A., & Kluemper, D. H. (2008). The impact of the big five personality traits on the acceptance of social networking website. In AMCIS 2008 proceedings, p. 274.

  • Russo, D. L. (2013). The necessity of developing responsible use policies: Advocacy for use of Web 2.0 tools in a comprehensive school computing program education. National Louis University. Doctor of Education.

  • Salleh, N., Hussein, R., Mohamed, N., Karim, N. S. A., Ahlan, A. R., & Aditiawarman, U. (2012). Examining information disclosure behavior on social network sites using protection motivation theory, trust and risk. Journal of Internet Social Networking and Virtual Communities, 2012(2012), 1–11.

    Google Scholar 

  • Schlenkrich, L., & Sewry, D. (2012). Factors for successful use of social networking sites in higher education. South African Computer Journal, Department of Information Systems, Rhodes University, South Africa, 49(1), 12–24.

    Google Scholar 

  • Sharples, M., Graber, R., Harrison, C., & Logan, K. (2009). E-safety and Web 2.0 for children aged 11–16. Journal of Computer Assisted learning, 25(1), 70–84.

    Article  Google Scholar 

  • Shin, D.-H. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers, 22(5), 428–438.

    Article  Google Scholar 

  • Sullivan, Gail M., & Feinn, R. (2012). Using effect size—Or why the P value is not enough. Journal of Graduation Medical Education, 4(3), 279–282.

    Article  Google Scholar 

  • Taraszow, T., Aristodemou, E., Shitta, G., Laouris, Y., & Arsoy, A. (2010). Disclosure of personal and contact information by young people in social networking sites: An analysis using Facebook profiles as an example. International Journal of Media & Cultural Politics, 6(1), 81–101.

    Article  Google Scholar 

  • Vanderhoven, E., Schellens, T., & Valcke, M. (2013). Exploring the usefulness of school education about risks on social network sites: A survey study. The Journal of Media Literacy Education, 5(1), Article 2.

  • Veletsianos, G., & Kimmons, R. (2013). Scholars and faculty members’ lived experiences in online social networks. The Internet and Higher Education, 16, 43–50.

    Article  Google Scholar 

  • Willis, T. J. (2008). An evaluation of the technology acceptance model as a means of understanding online social networking behavior. Tampa, FL: University of South Florida. Available at: http://scholarcommons.usf.edu/etd/568.

  • Wu, C.-C., Huang, Y., & Hsu, C.-L. (2013). Benevolence trust: A key determinant of user continuance use of online social networks. Information Systems and e-Business Management, 12(2), 1–23.

    Google Scholar 

  • Yu, Y., & Zhu, Y. (2011). Review of empirical researches on social network sites. In The 4th international multi-conference on engineering and technological innovation (IMETI). Orlando, Florida, USA.

  • Zaidieh, A. J. Y. (2012). The use of social networking in education: Challenges and opportunities. World of Computer Science and Information Technology Journal (WCSIT), 2(1), 18–21.

    Article  Google Scholar 

  • Zhang, C., Sun, J., Zhu, X., & Fang, Y. (2010). Privacy and security for online social networks: Challenges and opportunities. Network, IEEE, 24(4), 13–18.

    Article  Google Scholar 

  • Zilpelwar, R. A., Bedi, R. K., & Wadhai, V. M. (2012). An overview of privacy and security in SNS. International Journal of P2P Network Trends and Technology, 2(1), 23–26.

    Google Scholar 

Download references

Acknowledgments

This research is supported by Computer and Information Science Department, Universiti Teknologi PETRONAS (UTP), Malaysia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. D. D. Dominic.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hina, S., Dominic, P.D.D. & Ratnam, K.A. A Relational Study of Critical Threats and Risks Affecting the Potential Usage of Collaborative Pattern. Glob J Flex Syst Manag 17, 373–388 (2016). https://doi.org/10.1007/s40171-016-0133-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40171-016-0133-5

Keywords

Navigation