Abstract
With increased variety of collaborative tools offering advanced features, knowledge sharing among professional and social peers has become independent of space and time. This paper identifies the potential of social networks for educational collaboration among school stakeholders. It also draws an attention towards crucial threats and risks associated with the oblivious use of this online collaborative pattern. Cyber security issues are classified; showing high impact on the acceptance and intentional use of social networking sites (SNS). Influence of security and privacy issues on a trusted participation of stakeholders in a collaborative environment is discussed in the light of comprehensive review of literature. Conclusively all devised research hypotheses were supported using structural equation modelling techniques. Moreover, this research study discusses the research questions and investigated research findings. It is suggested that vigilant dealing with possible cyber-crimes and following the best practices for safe and secure SNS usage can lead towards operative use of this participatory platform in an educational paradigm.
Similar content being viewed by others
References
Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing, and privacy on the Facebook. In PET’06 Proceedings of the 6th international conference on privacy enhancing technologies (pp. 36–58). Berlin, Heidelberg: Springer.
Aimeur, E., Gambs, S., & Ho, A. (2010). Towards a privacy-enhanced social networking site. In ARES’10 international conference on availability, reliability, and security. IEEE.
Aïmeur, E., & Schonfeld, D. (2011). The ultimate invasion of privacy: Identity theft. In Ninth annual international conference on privacy, security and trust. IEEE.
Akgun, S., & Ciarrochi, J. (2003). Learned resourcefulness moderates the relationship between academic stress and academic performance. Educational Psychology, 23(3), 287–294.
Alarcón-del-Amo, M. C., Lorenzo-Romero, C., & Gómez-Borja, M. A. (2012). Analysis of acceptance of social networking sites. African Journal of Business Management, 6(29), 8609–8619.
Albrechtsen, E., & Hovden, J. (2009). Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study. Computers & Security, 29(4), 432–445.
Almadhoun, N. M., Dominic, P. D. D, & Woon, L. F. (2011). Perceived security, privacy, and trust concerns within social networking sites: The role of information sharing and relationships development in the Malaysian Higher Education Institutions’ marketing. In 2011 IEEE international conference on control system, computing and engineering (ICCSCE).
Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice: A review and recommended two step approach. Journal of Psychological Bulletin, 103(3), 411–423.
Banks, L., & Wu, S. F. (2009). All friends are not created equal: An interaction intensity based approach to privacy in online social networks. In Computational science and engineering, 2009. CSE ‘09.
Beldad, A., de Jong, J., & Steehouder, M. (2010). How shall I trust the faceless and the intangible? A literature review on the antecedents of online trust. Computers in Human Behavior, 26(5), 857–869.
Brandtzæg, P. B., Lüders, M., & Skjetne, J. H. (2010). Too many Facebook “friends”? Content sharing and sociability versus the need for privacy in social network sites. International Journal of Human–Computer Interaction, 26(11), 1006–1030.
Cain, J. (2008). Online social networking issues within academia and pharmacy education. American Journal of Pharmaceutical Education, 72(1), 1–7.
Carlos Roca, J., José García, J., & José de la Vega, J. (2009). The importance of perceived trust, security and privacy in online trading systems. Information Management & Computer Security, 17(2), 96–113.
Chen, R. (2013). Member use of social networking sites—An empirical examination. Decision Support Systems, 54(3), 1219–1227.
Chen, H., Yu, C., & Chang, C. (2007). E-homebook system: A web-based interactive education interface. Computers & Education, 49(2), 160–175.
Cheung, C. M. K., Chiu, P. Y., & Lee, M. K. O. (2011). Online social networks: Why do students use Facebook? Computers in Human Behavior, 27(4), 1337–1343.
Chuttur, M. (2009). Overview of the technology acceptance model: Origins, developments and future directions. Sprouts: Working Papers on Information Systems, Indiana University, USA, 9(37). http://sprouts.aisnet.org/9-37. Accessed Feb 15, 2014.
Cohen, J. (1998). Statistical power analysis for the behavioral sciences (2nd ed.). Hillsdale, NJ: Routledge.
Cone, B. D. I., Thompson, C. E., Nguyen, M. F., & Thuy, D. (2007). A video game for cyber security training and awareness. Computers & Security, 26(1), 63–72.
Cranmer, S., Selwyn, N., & Potter, J. (2009). Exploring primary pupils’ experiences and understandings of ‘e-safety’. Education and Information Technologies, 14(2), 127–142.
Cronbach, L. J. (1951). Coefficient alpha and the internal structure of tests. Psychometrika, 16(3), 297–334.
Davis Iii, C. H. F., Deil-Amen, R., Rios-Aguilar, C., & González Canché, M. S. (2015). Social media, higher education, and community colleges: A research synthesis and implications for the study of two-year institutions. Community College Journal of Research and Practice, 39(5), 409–422.
De Souza, Z., & Dick, G. N. (2009). Disclosure of information by children in social networking—Not just a case of “you show me yours and I’ll show you mine”. International Journal of Information Management, 29(4), 255–261.
De Zwart, M., Henderson, M., Phillips, M., & Lindsay, D. (2010). ‘I like, stalk them on Facebook’: Teachers’ ‘privacy’ and the risks of social networking sites. In Technology and Society (ISTAS), 2010. University of Wollongong, Wollongong.
Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer Mediated Communication, 15(1), 83–108.
Dhami, A., Agarwal, N., Chakraborty, T. K., Singh, B. P., & Minj, J. (2013). Impact of trust, security and privacy concerns in social networking: An exploratory study to understand the pattern of information revelation in Facebook. In 2013 IEEE 3rd international advance computing conference (IACC). IEEE.
Dwyer, C., Hiltz, S. R., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. In Proceedings of the thirteenth Americas conference on information systems (pp. 1–12). Colorado: Keystone.
Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer Mediated Communication, 13(1), 210–230.
Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25(1), 153–160.
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50.
Galpin, R., & Flowerday, S. V. (2011). Online social networks: Enhancing user trust through effective controls and identity management. In Information Security South Africa (ISSA) (pp. 1–8). Johannesburg: IEEE.
Gliem, J. A., & Gliem, R. R. (2003). Calculating, interpreting, and reporting Cronbach’s alpha reliability coefficient for Likert-type scales. In Midwest research-to-practice conference in adult, continuing, and community education.
Grabner-Kräuter, S., & Bitter, S. (2013). “Trust in online social networks: A multifaceted perspective. Forum for Social Economics, 44, 1–21.
Grant, L. (2011). ‘I’m a completely different person at home’: using digital technologies to connect learning between home and school. Journal of Computer Assisted learning, 27(4), 292–302.
Griffith, S., & Liyanage, L. (2008). An introduction to the potential of social networking sites in education. In Proceedings of emerging technologies conference. University of Wollongong, Wollongong, Australia, 18–21, June 2008.
Hair, J. F, Jr, Anderson, R. E., Tatham, R. L., & Black, W. C. (1998). Multivariate data analysis with readings (5th ed.). Englewood Cliffs, NJ: Prentice Hall.
Hair, J. F, Jr, Hult, G. T. M., Ringle, C., & Sarstedt, M. (2014). A primer on partial least squares structural equation modeling (PLS-SEM). Los Angeles: SAGE.
Harwood, C., & Blackstone, B. (2012). Using Facebook to extend learning into students’ digital lives. ELTWorldOnline.com, 4, 1–22.
Henderson, M., de Zwart, M., Lindsay, D., & Phillips, M. (2010). Students’ use of social networking tools: Legal risks and other implications. In Digital diversity conference ACEC, Melbourne, Australia.
Hina, S., & Oxley, A. (2014). Participation/collaboration pattern: Perspectives of trust and security risks. In 2014 international conference on computer and information sciences (ICCOINS).
Ho, L. H., Hung, C. L., & Chen, H. C. (2013). Using theoretical models to examine the acceptance behavior of mobile phone messaging to enhance parent–teacher interactions. Computers & Education, 61(1), 105–114.
Jabeur, N., Zeadally, S., & Maydebura, S. (2012). Improving trust and privacy models in social networks. In 5th international conference on new technologies, mobility and security (NTMS). IEEE, pp. 1–5.
Kaur, J., Bharali, R., & Pradeep, Y. (2012). Attitudes to social networking sites and their potential as learning platforms in a school environment. In 2012 IEEE international conference on technology enhanced education (ICTEE).
Kritzinger, E., & von Solms, S. H. (2010). Cyber security for home users: A new way of protection through awareness enforcement. Computers & Security, 29(8), 840–847.
Lawler, J. P., & Molluzzo, J. C. (2010). A study of the perceptions of students on privacy and security on social networking sites (SNS) on the internet. Journal of Information Systems Applied Research, 3(12), 3–18.
Leng, G. S., Lada, S., Muhammad, M., Ibrahim, A. A., & Amboala, T. (2011). An exploration of social networking sites (SNS) adoption in Malaysia using technology acceptance model (TAM), theory of planned behavior (TPB) and intrinsic motivation. Journal of Internet Banking and Commerce, 16(2), 1–27.
Litt, E. (2013). Understanding social network site users' privacy tool use. Computers in Human Behavior, 29(4), 1649–1656.
Lockyer, L., & John, P. (2008). Integrating social networking technologies in education: a case study of a formal learning environment. In 8th international conference on advanced learning technologies ICALT’08. IEEE, pp. 529–533.
Lorenz, B., Kikkas, K., & Laanpere, M. (2011). Bottom-up development of e-safety policy for Estonian schools. In Proceedings of the 5th international conference on theory and practice of electronic governance. ACM.
Lorenzo-Romero, C., & Constantinides, E. (2011). Consumer adoption of social networking sites: implications for theory and practice. Journal of Research in Interactive Marketing, 5(2/3), 170–188.
Marin, C., Fernandez, E. B., & Petrie, M. L. (2010). Patterns for secure social networks in Web 2.0. In 8th Latin American and Caribbean conference for engineering and technology. Arequipa, Peru.
Mazer, J. P. M., Simonds, R. E., & Cheri, J. (2007). I’ll see you on “Facebook”: The effects of computer-mediated teacher self-disclosure on student motivation, affective learning, and classroom climate. Communication Education, 56(1), 1–17.
Md Nor, S., & Wee Beng Neo, J. (2001). Involving parents in children’s education: what teachers say in Malaysia. In F. Smit, F. van der Wolf & P. Sleegers (Eds.), A bridge to the future: Collaboration between parents, schools and communities (p. 167). Amsterdam: Institute for Applied Social Sciences, Catholic University of Nijmegen, SCO-Kohnstamm Institute.
Moreno, M. A., Egan, K. G., Bare, K., Young, H. N., & Cox, E. D. (2013). Internet safety education for youth: stakeholder perspectives. BMC Public Health, 13(1), 543.
Oblinger, D., Oblinger, J. L., & Lippincott, J. K. (2005). Educating the net generation. Boulder, CO: EDUCAUSE. See: www.educause.edu/educatingthenetgen/. Accessed March 2014.
Oxley, A. (2011). A best practices guide for mitigating risk in the use of social media. Washington, DC: IBM Center for The Business of Government.
Oxley, A. (2013). Security risks in social media technologies: Safe practices in public service applications. Oxford: Chandos Publishing Social Media Series.
Ratnam, K. A., Dominic, P. D. D., & Ramayah, T. (2014). A structural equation modeling approach for the adoption of cloud computing to enhance the Malaysian healthcare sector. Journal of Medical Systems, 38(8), 1–14.
Ringle, C. M., Wende, S., & Becker, J.-M. (2015). SmartPLS 3. Bönningstedt: SmartPLS. Retrieved from http://www.smartpls.com.
Rosen, P. A., & Kluemper, D. H. (2008). The impact of the big five personality traits on the acceptance of social networking website. In AMCIS 2008 proceedings, p. 274.
Russo, D. L. (2013). The necessity of developing responsible use policies: Advocacy for use of Web 2.0 tools in a comprehensive school computing program education. National Louis University. Doctor of Education.
Salleh, N., Hussein, R., Mohamed, N., Karim, N. S. A., Ahlan, A. R., & Aditiawarman, U. (2012). Examining information disclosure behavior on social network sites using protection motivation theory, trust and risk. Journal of Internet Social Networking and Virtual Communities, 2012(2012), 1–11.
Schlenkrich, L., & Sewry, D. (2012). Factors for successful use of social networking sites in higher education. South African Computer Journal, Department of Information Systems, Rhodes University, South Africa, 49(1), 12–24.
Sharples, M., Graber, R., Harrison, C., & Logan, K. (2009). E-safety and Web 2.0 for children aged 11–16. Journal of Computer Assisted learning, 25(1), 70–84.
Shin, D.-H. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers, 22(5), 428–438.
Sullivan, Gail M., & Feinn, R. (2012). Using effect size—Or why the P value is not enough. Journal of Graduation Medical Education, 4(3), 279–282.
Taraszow, T., Aristodemou, E., Shitta, G., Laouris, Y., & Arsoy, A. (2010). Disclosure of personal and contact information by young people in social networking sites: An analysis using Facebook profiles as an example. International Journal of Media & Cultural Politics, 6(1), 81–101.
Vanderhoven, E., Schellens, T., & Valcke, M. (2013). Exploring the usefulness of school education about risks on social network sites: A survey study. The Journal of Media Literacy Education, 5(1), Article 2.
Veletsianos, G., & Kimmons, R. (2013). Scholars and faculty members’ lived experiences in online social networks. The Internet and Higher Education, 16, 43–50.
Willis, T. J. (2008). An evaluation of the technology acceptance model as a means of understanding online social networking behavior. Tampa, FL: University of South Florida. Available at: http://scholarcommons.usf.edu/etd/568.
Wu, C.-C., Huang, Y., & Hsu, C.-L. (2013). Benevolence trust: A key determinant of user continuance use of online social networks. Information Systems and e-Business Management, 12(2), 1–23.
Yu, Y., & Zhu, Y. (2011). Review of empirical researches on social network sites. In The 4th international multi-conference on engineering and technological innovation (IMETI). Orlando, Florida, USA.
Zaidieh, A. J. Y. (2012). The use of social networking in education: Challenges and opportunities. World of Computer Science and Information Technology Journal (WCSIT), 2(1), 18–21.
Zhang, C., Sun, J., Zhu, X., & Fang, Y. (2010). Privacy and security for online social networks: Challenges and opportunities. Network, IEEE, 24(4), 13–18.
Zilpelwar, R. A., Bedi, R. K., & Wadhai, V. M. (2012). An overview of privacy and security in SNS. International Journal of P2P Network Trends and Technology, 2(1), 23–26.
Acknowledgments
This research is supported by Computer and Information Science Department, Universiti Teknologi PETRONAS (UTP), Malaysia.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hina, S., Dominic, P.D.D. & Ratnam, K.A. A Relational Study of Critical Threats and Risks Affecting the Potential Usage of Collaborative Pattern. Glob J Flex Syst Manag 17, 373–388 (2016). https://doi.org/10.1007/s40171-016-0133-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s40171-016-0133-5