The Role of Social Networking in the Social Reform of Young Society

Author(s):  
Emad Abu-Shanab ◽  
Mushera Frehat

Social networks are virtual communication sites that allow its participants to connect, building relationships, and collaborate on social issues. It became part of our lives and spread rapidly among youth. Young people join these sites to keep strong relationships with friends and to make new ones. Therefore, it is important to investigate the factors that influence the intention to use social networking sites (SNSs) to gain better position in the social reform among young people. This study developed an integrated theoretical model which has five major factors that predict the intention to use SNSs. An empirical test was conducted, where a sample of 302 university students and an instrument containing 27 items was used. The results provide consistent evidence that all hypothesized positive associations exist except for the isolation variable. After taking into account different demographic and attitudinal variables, Facebook use still predicted respondents' social reform. The future work might focus on a specific context such as the effects of using social networks on education, and focus on students' environment in education and the influence of social network. Detailed results, conclusions and future work are stated in later sections.

2015 ◽  
Vol 6 (1) ◽  
pp. 61-75 ◽  
Author(s):  
Emad Abu-Shanab ◽  
Mushera Frehat

Social networks are virtual communication sites that allow its participants to connect, building relationships, and collaborate on social issues. It became part of our lives and spread rapidly among youth. Young people join these sites to keep strong relationships with friends and to make new ones. Therefore, it is important to investigate the factors that influence the intention to use social networking sites (SNSs) to gain better position in the social reform among young people. This study developed an integrated theoretical model which has five major factors that predict the intention to use SNSs. An empirical test was conducted, where a sample of 302 university students and an instrument containing 27 items was used. The results provide consistent evidence that all hypothesized positive associations exist except for the isolation variable. After taking into account different demographic and attitudinal variables, Facebook use still predicted respondents' social reform. The future work might focus on a specific context such as the effects of using social networks on education, and focus on students' environment in education and the influence of social network. Detailed results, conclusions and future work are stated in later sections.


2019 ◽  
Vol 8 (2) ◽  
pp. 124-139
Author(s):  
E. Savchenko ◽  
A.Yu. Khokhlova

The article is devoted to the analysis of written language of adolescents and young people with hearing impairment in the virtual space. The study involved 28 people, aged 16 to 20 years, 14 of them were with hearing impairments. 3 people at the age of 16 years old, 9 people are 17 years old, 4 people are 18 years old. The first part of the study was conducted as online questionnaires, which was aimed to clarify preferred virtual spaces for communication, the attitude to the written communication, also creative tasks for evaluation of written language developed by O.V. Vilenskaya was included. The second part consisted of analysis of the contents of the social network profile of the participants. The results have shown that the written language of deaf adolescents and young people in social networks reflected the general features of their verbal communication and social relations (in general, they use less detailed written statements than hearing peers do, less actually initiated written language, less flexible writing, less partners for communication in social networks, the prevalence of consistency errors). Nevertheless, it is significant that they appreciate the importance of writing and try to monitor its accuracy. Virtual communication in the life of young people with hearing impairments plays the same role as in the life of hearing peers and they successfully master this side of modern reality.


2019 ◽  
Vol 50 (7) ◽  
pp. 2172-2190
Author(s):  
Margareta Hydén ◽  
David Gadd ◽  
Thomas Grund

Abstract Combining narrative analysis with social network analysis, this article analyses the case of a young Swedish female who had been physically and sexually abused. We show how she became trapped in an abusive relationship at the age of fourteen years following social work intervention in her family home, and how she ultimately escaped from this abuse aged nineteen years. The analysis illustrates the significance of responses to interpersonal violence from the social networks that surround young people; responses that can both entrap them in abusive relationships by blaming them for their problems and enable them to escape abuse by recognising their strengths and facilitating their choices. The article argues that the case for social work approaches that envision young people’s social networks after protective interventions have been implemented. The article explains that such an approach has the potential to reconcile the competing challenges of being responsive to young people’s needs while anticipating the heightened risk of being exposed to sexual abuse young people face when estranged from their families or after their trust in professionals has been eroded.


2013 ◽  
Vol 15 (1) ◽  
Author(s):  
Stephen M. Mutula

Background: With the growing adoption and acceptance of social networking, there are increased concerns about the violation of the users’ legitimate rights such as privacy, confidentiality, trust, security, safety, content ownership, content accuracy, integrity, access and accessibility to computer and digital networks amongst others.Objectives: The study sought to investigate the following research objectives to: (1) describe the types of social networks, (2) examine global penetration of the social networks, (3) outline the users’ legitimate rights that must be protected in the social networking sites (SNS), (4) determine the methods employed by SNS to protect the users’ legitimate rights and (5) identify the policy gaps and technological deficiencies in the protection of the users’ legitimate rights in the SNS.Method: A literature survey and content analysis of the SNS user policies were used to address objective four and objective five respectively.Results: The most actively used sites were Facebook and Twitter. Asian markets were leading in participation and in creating content than any other region. Business, education, politics and governance sectors were actively using social networking sites. Social networking sites relied upon user trust and internet security features which however, were inefficient and inadequate.Conclusion: Whilst SNS were impacting people of varying ages and of various professional persuasions, there were increased concerns about the violation and infringement of the users’ legitimate rights. Reliance on user trust and technological security features SNS to protect the users’ legitimate rights seemed ineffectual and inadequate.


Author(s):  
Khalid Abdulkareem Al-Enezi ◽  
Imad Fakhri Taha Al Shaikhli ◽  
Sufyan Salim Mahmood AlDabbagh

<span>This research aims to measure the role of social networks in influencing purchasing decisions among consumers in Kuwait; the research used the quantitative methods, and analytical the technique to get the results, and the research developed a measure to study the relationship between the variables to the study and selection of a sample of consumers of (100). The results indicated that the social networking variables (exchange of information, evaluation of product) possess influence on purchasing decisions. Furthermore, the results indicate that majority of respondents do their digital scanning more often before intend to go to the store. The unexpected results came from the question “traditional advertising (TV, Newspaper, Magazine, Billboards) are more effective than the social networking; 23% agreed, 36% said no, and 41% said sometimes. In light of these findings, the study made a series of recommendations; the most important are; The executives and sales representatives need to understand the benefits offered by social networks, and understand the advantages and functions and tools of social communication, and knowing how to apply them effectively and efficiently, and then use the appropriate social networking tool.</span>


2014 ◽  
pp. 1717-1730
Author(s):  
Joanne Kuzma

The growth of Online Social Networking sites has brought new services and communication methods to consumers. However, along with benefits, serious problems such as online cyber harassment have recently come to the forefront of the electronic media. This behavior can have significant negative effect on individuals, businesses and the social networks. Some sites have begun to provide some levels of protection and create specific anti-harassment policies in their terms of service along with implementing protection technologies. However, these protective measures are not consistent among social media, leaving some consumers at greater risk. This study analyzed 60 worldwide social sites and determined the level of cyber-harassment protection. It reviewed statistical differences among geographical-based social networks. The results showed significant gaps among various social networks, but suggests methods for improving consumer safeguards to provide consistent levels of protection.


Author(s):  
Agostino Poggi ◽  
Michele Tomaiuolo

Social web sites are used daily by many millions of users. They have attracted users with very weak interest in technology, including absolute neophytes of computers in general. Common users of social web sites often have a carefree attitude in sharing information. Moreover, some system operators offer sub-par security measures, which are not adequate for the high value of the published information. For all these reasons, online social networks suffer more and more attacks by sophisticated crackers and scammers. To make things worse, the information gathered from social web sites can trigger attacks to even more sensible targets. This work reviews some typical social attacks that are conducted on social networking systems, describing real-world examples of such violations and analyzing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.


2011 ◽  
pp. 1286-1297
Author(s):  
Malcolm Shore

This chapter is about the way in which computer hackers invoke social networking paradigms to support and encourage their activities. It reviews the evolution of hacking as a form of social networking, from its roots in Bulletin Board systems to the current attacks on Second Life, and considers the motivation for hacking. Ajzen’s Theory of Planned Behavior and Beveren’s Flow Theory model are, when considered together, found to explain many of the observed characteristics of early hacker activity. The place of social networks in motivating hacking is explored, and some observations are made in relation to hacking and the Second Life environment. A number of control variables are identified which can be used to reduce the likelihood of people engaging in the hacking activity. Addressing the social network factors which motivate hacking provides an important early step in addressing cybercrime.


Author(s):  
Mehmet Ferhat Sönmez

Identity emerges as a flexible, multidimensional, variable, and slippery concept that cannot be defined through the processes of discussion and understanding. The new construction area of this concept, which is regarded as a process constructed on the social plane, is the social networking platforms. This is because these platforms are the most common communication environments where people and their lifestyles are presented to the outside world, in addition to the cheap and rapid satisfaction of their needs for information and entertainment. Face-to-face communication and language practices are not sufficient enough in the identity presentation anymore. Individuals choose to design and update their identities through social networks and to perform an image-based identity manifestation. This chapter examines how identity was established and manifested through social networks, and analyzes the identities the popular people in these networks designed and exhibited.


Sign in / Sign up

Export Citation Format

Share Document