<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Online Social Networks: A Survey of Usage and Risks Experience among University Students in North-Central Nigeria</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Victor Legbo Yisa</string-name>
          <email>1victor.yisa@futminna.edu.ng</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oluwafemi Osho</string-name>
          <email>2femi.osho@futminna.edu.ng</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Isaac Soje</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Cyber Security Science, Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <volume>48</volume>
      <issue>2</issue>
      <fpage>190</fpage>
      <lpage>198</lpage>
      <abstract>
        <p>-Online social networks (OSNs), since the advent of the first, have continued to influence virtually every facet of human existence, as well as appeal to users of different ages and races, including students. This study seeks to investigate the usage of online social networks and associated risks experienced among university students in North-Central, Nigeria. The study involves three tertiary institutions in NorthCentral Nigeria. Data were collected via questionnaires. Most of the respondents were male, full-time undergraduate students, and within the ages of 24 - 29. Findings reveal that most of the students use OSNs to interact with friends. More than half of the students usually uploaded their locations while online, actually connected with other users they did not know, have extended relationships that commenced online to offline relationship, and used most of their time on the networks for academic purposes. Other uses included dating and offering financial assistance to acquaintances. For most of the students, the use of OSNs had positively affected their performance. Most of the students were found to have experienced risks including identity theft, unsolicited and irrelevant messages, information-request attack, and stolen password attack.</p>
      </abstract>
      <kwd-group>
        <kwd>-component</kwd>
        <kwd>online networking site</kwd>
        <kwd>security</kwd>
        <kwd>risk</kwd>
        <kwd>privacy</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>social</p>
      <p>network; social
I.</p>
      <p>INTRODUCTION</p>
      <p>
        An Online social network, also called Social networking
site (SNSs), can be defined as an online application that
enable people to build a profile of themselves and share with
users of which it is believed they have some connection. It
can also be defined as an interactive website that interacts
with you while giving you information. It is a group of
applications based on the Internet that allows the generation
and exchange of user-created contents [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]–[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] . Since the
advent of the first OSN, SixDegrees.com [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], the networks
have increased rapidly in number and sophistication. By
2010, up to 300 had pervaded the internet [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. SNSs
including Facebook, Instagram, 2go, Whatsapp, Twitter, and
LinkedIn have intensely changed the way interaction is done
on a global scale.
      </p>
      <p>
        SNSs offer many advantages and usefulness. They can be
used to increase sales, educate, meet new friends or old ones,
and even as a tool to communicate with the general public
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. They provide a platform for a user with no physical
friend in the real world to have lots of friends on social
media, without ever meeting them [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. A new complete
virtual community can be created where users irrespective of
boundaries or other segregating values of traditional
communities interact, socialize, do business, learn, and
engage in a whole lot of other things. Disgruntled people in
the physical world may enjoy a whole lot of happiness and
acceptance on social media.
      </p>
      <p>
        Social networking sites have had massive impact on
people‟s online activities. Users update status or tweet about
themselves [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. The number of those using social
networking sites has more than doubled since 2008 [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]
Facebook alone in 2016 has a total of 1.71 billion monthly
active users [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], a figure greater than china‟s population
which happens to be the world most populous country.
Businesses, organizations and even governments have
accepted the use of social networks in trying to achieve their
aims.
      </p>
      <p>
        With a population of over one hundred and eighty six
million, Nigeria has an internet penetration level of 46.1
percent meaning over 86 million Nigerians have access to
the internet [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Because of the proliferation of smart phones
and internet services in the country, youngsters especially
students are constantly on OSNs, updating status, chatting,
dating, reading news, commenting on profiles or sharing
multimedia information. Over the years, the use of OSNs
amongst Nigerians has been increasing. Facebook alone
boast of 16 million users as at February 2016.
      </p>
      <p>
        In Nigeria, OSNs appeal not only to individuals;
organizations, institutions and even government institutions
now employ them. Students share educative materials, chat,
make new friends, stream videos today using them. During
the 2011 elections in the country, OSNs were actively
engaged by politicians, who took their campaigns more often
to the various SNSs where they could reach millions of
Nigerians easily and directly [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        However the many and diverse benefits that OSNs
afford, like many systems, they are prone to be exploited for
unethical uses. Unfortunately, many users can be said to be
naïve regarding the security mechanisms of the networks.
Thus, they become vulnerable to malicious users lurking
behind their walls. A popular comedian was recently robbed
after the wife had posted a picture of their recently acquired
home on Instagram. There have been instances where OSNs
were used as aid to commit criminal activities in the physical
world. One example that readily comes to mind is the
Cynthia Osokugu murder by some Facebook friends; an
event that shook the entire country in 2012. Investigations
showed that she had made friends and given out chunks of
personal information to her so called Facebook friends that
killed her in a Lagos hotel after she had travelled to meet
them [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. These are clear examples of crimes that occurred
due to users‟ ignorance and careless release of sensitive
information on SNSs.
      </p>
      <p>This study investigates the usage of online social
networks and associated risks experienced among university
students in North-Central, Nigeria.</p>
      <p>The rest of the paper is organized as follows: a review of
risks associated with online social networks and summary of
related studies are presented in section II. Section III
describes the methodology used in the survey. In section IV
and V, the findings are presented and discussed respectively.
Section VI concludes the study.</p>
      <p>II.</p>
      <p>LITERATURE REVIEW</p>
    </sec>
    <sec id="sec-2">
      <title>A. Online Social Networks Risks</title>
      <p>
        Although the benefits of using social media abounds, it
can also have serious security risks. While some of these
risks are consequent of inherent vulnerabilities in SNSs,
primarily, they are often caused or exacerbated by users
themselves. Many users either lack basic knowledge to
manage their security while online, or outrightly are care less
about security. Consequently, attackers exploit these security
lapses for economic, social, or psychological benefits [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>
        Figure 1 presents a taxonomy of OSN risks. The risks are
either IT- or Non-IT-related. Many studies have shown the
evidence and effects of non-IT risks including excessive use
[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], addiction [14], sexual solicitation and harassment [15],
posting regret [16], [
        <xref ref-type="bibr" rid="ref14">17</xref>
        ].
      </p>
      <p>
        On the other hand, IT-related risks on OSNs are basically
privacy-related. Online privacy is a fundamental right of
every OSN user. User typically expects to retain exclusive
right over their information available online. Unfortunately,
absolute privacy on SNSs is highly unlikely. Lucas and
Borisov [
        <xref ref-type="bibr" rid="ref15">18</xref>
        ] opined that privacy breaches are inevitable,
regardless of OSNS‟ proprietors‟ and users‟ efforts. These
breaches are directly or indirectly caused by users
themselves, proprietors of SNSs, and other malicious users.
      </p>
      <p>
        Firstly, users, either intentionally or unintentionally,
expose themselves to privacy risks. While users could
unintentionally self-breach their privacy [
        <xref ref-type="bibr" rid="ref15">18</xref>
        ], many,
however, often display nonchalant disposition to personal
privacy. Studies have shown users‟ indifference to their
privacy, leaving default security settings unchanged [
        <xref ref-type="bibr" rid="ref16">19</xref>
        ],
and in some cases, despite being cognizant of the security
implications [
        <xref ref-type="bibr" rid="ref17">20</xref>
        ]. Unfortunately, this is more common
among young OSN users [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Adult users have been found to
be more privacy-conscious while online [
        <xref ref-type="bibr" rid="ref18">21</xref>
        ], [
        <xref ref-type="bibr" rid="ref19">22</xref>
        ].
Selfbreach of privacy exposes users to risks including
overdisclosure of information and cyber-stalking.
      </p>
      <p>
        Secondly, OSN proprietors also expose users to privacy
risks. These networks naturally thrive on their capacity to
provide easy-to-use functionalities that encourage
information sharing. Unfortunately, security often suffers.
This is because, it is almost impossible to guarantee
simultaneously usability, functionality, and security. Many
of the OSNs only afford weak security mechanisms. Hence,
they are prone to automatic crawling and access [
        <xref ref-type="bibr" rid="ref15">18</xref>
        ], [
        <xref ref-type="bibr" rid="ref20">23</xref>
        ].
Other risks center on proprietors‟ unethical use of users‟
personal information [
        <xref ref-type="bibr" rid="ref21">24</xref>
        ]. Users‟ data can be mined and sold
for targeted advertisements [
        <xref ref-type="bibr" rid="ref22">25</xref>
        ].
      </p>
      <p>
        Lastly, privacy breaches are caused by malicious users.
Specifically, most risks are the handiwork of malicious users
who often pose as legitimate users. Regrettably, these
constitute a significant portion of OSN users. In a study by
[
        <xref ref-type="bibr" rid="ref23">26</xref>
        ], it was discovered that up to 10% of profiles on
Facebook were either fake or duplicate accounts. As a result,
users are exposed to risks like spamming, social engineering,
stalking, identity theft, phishing, and malware attacks [
        <xref ref-type="bibr" rid="ref19">22</xref>
        ],
[
        <xref ref-type="bibr" rid="ref24">27</xref>
        ]–[
        <xref ref-type="bibr" rid="ref27">30</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>B. Related works</title>
      <p>
        The prevalent use of social media sites has attracted the
interest of many researchers. Studies by [
        <xref ref-type="bibr" rid="ref28">31</xref>
        ], [
        <xref ref-type="bibr" rid="ref29">32</xref>
        ] focused
on usage of SNS amongst students‟ of tertiary institutions.
      </p>
      <p>
        While [
        <xref ref-type="bibr" rid="ref28">31</xref>
        ] focused on a University in Zimbabwe, [
        <xref ref-type="bibr" rid="ref29">32</xref>
        ]
considered one in Nsukka, Nigeria. Some studies have
investigated the impact of social media on students‟
academic performance. These include [
        <xref ref-type="bibr" rid="ref30">33</xref>
        ] who focused on
impact on students‟ performance in Ghana. The other study,
by [
        <xref ref-type="bibr" rid="ref31">34</xref>
        ] considered students in Kosovo. Despite the different
geographical location, the findings of [
        <xref ref-type="bibr" rid="ref28">31</xref>
        ], [
        <xref ref-type="bibr" rid="ref29">32</xref>
        ], [
        <xref ref-type="bibr" rid="ref31">34</xref>
        ] suggest
that high percentage of tertiary institution students use SNS,
among which Facebook is one of the most prevalent.
      </p>
      <p>Secondly, SNS usage has a huge impact on the academic
performance of students.</p>
      <p>
        Many authors have critically examined the security issues
associated with the use of online social networks. These
include privacy issues faced by users of social networking
site [
        <xref ref-type="bibr" rid="ref32">35</xref>
        ], types of associated cyber threats [
        <xref ref-type="bibr" rid="ref33">36</xref>
        ], impact of
provided user information on privacy [
        <xref ref-type="bibr" rid="ref34">37</xref>
        ], [
        <xref ref-type="bibr" rid="ref35">38</xref>
        ].
      </p>
      <p>III.</p>
      <p>METHODOLOGY</p>
      <p>To achieve the objective of the study, a survey of
students in three universities in the north central part of
Nigeria was conducted. The schools were Federal University
of Technology, Minna, and Ibrahim Badamasi Babangida
University, Lapai, both in Niger State, and University of
Abuja, in the Federal Capital Territory. The survey took
place in 2014. Data were collected via questionnaires. A total
of 300 were distributed, while 266 were returned. Out of the
completed and returned questionnaires, 12 were found to be
invalid. The remaining 254 were consequently used for
analysis. Most of the respondents were male, 64.6% v.
35.4%; full-time undergraduate students, 79.5%; within the
ages of 24 – 29, 46.1%; and used Facebook, 35.8%.The
demographic characteristics of the respondents are presented
in Table I.</p>
      <p>The questionnaire sought information on respondents‟
usage of online social networks, effects of and risks
experienced with the usage. The 5-point Likert-type was
used to indicate level of agreement. It consisted of SA =
Strongly Agree, A = Agree, N = Neutral, D = Disagree, and</p>
      <p>SD = Strongly Disagree.</p>
      <p>From our findings, as presented in Table II, almost all the
university students, 93.3%, used online social network to
interact with other users. More than half of the students
usually uploaded their locations while online (66.9%),
actually connected with other users they did not know
(70.1%), have extended relationships that commenced online
to offline relationship (61.0%), and used most of their time
on the networks for academic purposes (55.1%). In the same
vein, compared to those who have not, more students have
dated someone met on the social networks (47.6%).</p>
      <p>However, fewer students (31.9%) reported they have sent
money to their online acquaintance. On the other hand,
53.5% confessed they had offered financial help to friends on
their social networks.</p>
      <p>On the effect of online social network use on academic
performance, more than half of the students, 57.5%, either
agreed or strongly agreed the use had positively affected
their performance.</p>
      <p>B. Risks Associated with Use of Online Social Networks</p>
      <p>Table II also contains findings on risks experienced by
students on online social networks. With the exception of
physical threat or assault (39.7%s), most of the students
reported having experienced all identified risks. These risks
include identity theft (51.9%), unsolicited and irrelevant
messages (81.5%), information-request attack (75.9%), and
stolen password attack (66.9%).</p>
      <p>The study sought to identify the different uses of online
social networks by university students, the effect of the use
on their academics, and security risks they are exposed to
while online. Students from three universities were surveyed.</p>
      <p>Findings revealed that in addition to using online social
networks for academic purposes, university students also use
online social networks for other purposes, including meeting
new acquaintances and even dating. Many were found to
have extended relationships that commenced online offline.</p>
      <p>
        Evidently, this category of online social networks users feel
very much at ease while online. They tend to develop and
maintain relationships without much anxiety. These findings
agree with those of [14] and [
        <xref ref-type="bibr" rid="ref36">39</xref>
        ].
      </p>
      <p>USAGE OF SOCIAL NETWORK, EFFECTS OF USAGE ON ACADEMICS AND RISKS EXPERIENCED ON THE NETWORKS</p>
      <p>
        However, many students seemed to care less about their
security. The online networks may have become so natural
an ambience that many use them without consideration for
their privacy and security. For instance, most of the students
reveal locations while online. This has been referred to as
unintentional self-breach of privacy [
        <xref ref-type="bibr" rid="ref15">18</xref>
        ]. Findings also
reveled most of the students having connections they were
actually not familiar with. These confirm findings in
previous studies that categorized young users of online social
networks as indifferent about protecting their privacy [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>One reason suggested is their ignorance or limited
knowledge of the public nature of the internet.</p>
      <p>
        Considering their seeming lackadaisical attitude to
security, it was not surprising to that most of the students
have experienced one form of attack or the other while using
their online social networks. Our findings confirm existing
findings that identified social media sites as a veritable
platform where different attacks, including spamming [
        <xref ref-type="bibr" rid="ref20">23</xref>
        ],
identity theft [
        <xref ref-type="bibr" rid="ref19">22</xref>
        ], information-request – with the intent of
launching a phishing attack [
        <xref ref-type="bibr" rid="ref25">28</xref>
        ], and assault [
        <xref ref-type="bibr" rid="ref36">39</xref>
        ], are
targeted at users.
      </p>
      <p>The success of most of these attacks depends to a large
extent on the type and quantity of information that users
share online, which is a direct consequence of the level of
importance they attach to their privacy and security.</p>
      <p>Consequently, the need to be more circumspect while online
cannot be overemphasized.</p>
      <p>VI.</p>
      <p>CONCLUSION</p>
      <p>This study has increased our understanding of the
acceptance of online social networks by students of
universities in North-Central Nigeria who use them not only
for academic purpose, but also to develop and maintain
social relationships. On the other hand, they too, like other
users, are not spared by malicious users who inundate them
with unsolicited and irrelevant messages, and launch other
attacks to steal their online credentials and identity.</p>
      <p>Consequently, the need for the students to be more security
aware while using these networks cannot be
overemphasized.
[16] W. Xie and C. Kang, “See you, see me: Teenagers‟ self-disclosure
and regret of posting on social network site,” Comput. Human Behav.,
vol. 52, pp. 398–407, 2015.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>D. M.</given-names>
            <surname>Boyd</surname>
          </string-name>
          and
          <string-name>
            <given-names>N. B.</given-names>
            <surname>Ellison</surname>
          </string-name>
          , “
          <article-title>Social Network Sites : Definition , History , and Scholarship Social Network Sites : A Definition,”</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Comput</surname>
          </string-name>
          . Commun., vol.
          <volume>13</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>210</fpage>
          -
          <lpage>230</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>C.</given-names>
            <surname>Steinfield</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. B.</given-names>
            <surname>Ellison</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lampe</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Vitak</surname>
          </string-name>
          , “
          <article-title>Online social network sites and the concept of social capital,” Front. New Media Res</article-title>
          ., pp.
          <fpage>115</fpage>
          -
          <lpage>131</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          , “
          <article-title>A Short Description of Social Networking Websites And Its Uses,”</article-title>
          <string-name>
            <given-names>Int. J.</given-names>
            <surname>Adv</surname>
          </string-name>
          .
          <source>Comput. Sci. Appl</source>
          ., vol.
          <volume>2</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>124</fpage>
          -
          <lpage>128</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>C.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Fang</surname>
          </string-name>
          , “
          <article-title>Privacy and Security for Online Social Networks: Challenges and Opportunities,” IEEE Netw.</article-title>
          , vol.
          <volume>24</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>13</fpage>
          -
          <lpage>18</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>P.</given-names>
            <surname>Collin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Rahilly</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.</surname>
          </string-name>
          <article-title>Richardson, and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Third</surname>
          </string-name>
          , “The Benefits of Social Networking Services,”
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>R.</given-names>
            <surname>Sawyer</surname>
          </string-name>
          , “The Impact of New Social Media on Intercultural Adaptation,” University of Rhode Island,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>K. N.</given-names>
            <surname>Hampton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. S.</given-names>
            <surname>Goulet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Rainie</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Purcell</surname>
          </string-name>
          , “
          <article-title>Social networking sites and our lives</article-title>
          ,”
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Statista</surname>
          </string-name>
          , “
          <article-title>Number of monthly active Facebook users worldwide as of 2nd quarter 2016 (in millions)</article-title>
          .” [Online]. Available: http://www.statista.com/statistics/263424/the-largest
          <article-title>-energy-utilitycompanies-worldwide-based-on-market-value/.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Internet</given-names>
            <surname>Live</surname>
          </string-name>
          <string-name>
            <surname>Stats</surname>
          </string-name>
          , “Nigeria Internet Users.” [Online]. Available: http://www.internetlivestats.com/internet-users/nigeria/.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>N.</given-names>
            <surname>Okoro</surname>
          </string-name>
          and
          <string-name>
            <given-names>K. A.</given-names>
            <surname>Nwafo</surname>
          </string-name>
          , “
          <article-title>Social Media and Political Participation in Nigeria during the 2011 General Elections: The Lapses and the Lessons,”</article-title>
          <string-name>
            <given-names>Glob. J.</given-names>
            <surname>Arts</surname>
          </string-name>
          ,
          <source>Humanit. Soc. Sci.</source>
          , vol.
          <volume>1</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>29</fpage>
          -
          <lpage>45</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>E.</given-names>
            <surname>Usman</surname>
          </string-name>
          , “
          <string-name>
            <surname>How</surname>
          </string-name>
          ex-General‟
          <article-title>s daughter, Cynthia, was killed by facebook „friends</article-title>
          ,‟” Vanguard Newspaper,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Larionovs</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Teilans</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Grabusts</surname>
          </string-name>
          , “
          <article-title>CORAS for Threat and Risk Modeling in Social Networks,” Procedia Comput</article-title>
          . Sci., vol.
          <volume>43</volume>
          , pp.
          <fpage>26</fpage>
          -
          <lpage>32</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>C. M. K. Cheung</surname>
          </string-name>
          , P.-Y. Chiu, and
          <string-name>
            <surname>M. K. O. Lee</surname>
          </string-name>
          , “
          <article-title>Online social networks: Why do students use facebook?,”</article-title>
          <string-name>
            <given-names>Comput. Human</given-names>
            <surname>Behav</surname>
          </string-name>
          ., vol.
          <volume>27</volume>
          , pp.
          <fpage>1337</fpage>
          -
          <lpage>1343</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Norcie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Komanduri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Acquisti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. G.</given-names>
            <surname>Leon</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L. F.</given-names>
            <surname>Cranor</surname>
          </string-name>
          , “
          <article-title>I regretted the minute I pressed share: A qualitative study of regrets on Facebook,”</article-title>
          <source>in Proceedings of the Seventh Symposium on Usable Privacy and Security</source>
          ,
          <year>2011</year>
          , p.
          <fpage>10</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [18]
          <string-name>
            <surname>M. M. Lucas</surname>
            and
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Borisov</surname>
          </string-name>
          , “flyByNight :
          <article-title>Mitigating the Privacy Risks of Social Networking,”</article-title>
          <source>in Proceedings of the 7th ACM workshop on Privacy in the electronic society</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>R.</given-names>
            <surname>Gross</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Acquisti</surname>
          </string-name>
          , “
          <article-title>Information Revelation and Privacy in Online Social Networks (The Facebook case</article-title>
          ),
          <source>” in Proceedings of the 2005 ACM workshop on Privacy in the electronic society</source>
          ,
          <year>2005</year>
          , pp.
          <fpage>71</fpage>
          -
          <lpage>80</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>J. L.</given-names>
            <surname>Becker</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Chen</surname>
          </string-name>
          , “
          <article-title>Measuring privacy risk in online social networks</article-title>
          ,
          <source>” in Proceedings of the 2009 Workshop on Web (Vol. 2)</source>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>N.</given-names>
            <surname>Li</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Chen</surname>
          </string-name>
          , “Sharing Location in Online Social Networks,” IEEE Netw., vol.
          <volume>24</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>20</fpage>
          -
          <lpage>25</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>A.</given-names>
            <surname>Nosko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Wood</surname>
          </string-name>
          , and S. Molema, “
          <article-title>All about me : Disclosure in online social networking profiles : The case of FACEBOOK,”</article-title>
          <string-name>
            <given-names>Comput. Human</given-names>
            <surname>Behav</surname>
          </string-name>
          ., vol.
          <volume>26</volume>
          , pp.
          <fpage>406</fpage>
          -
          <lpage>418</lpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>L.</given-names>
            <surname>Bilge</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Strufe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Balzarotti</surname>
          </string-name>
          , and E. Kirda, “All Your Contacts Are Belong to Us :
          <source>Automated Identity Theft Attacks on Social Networks,” in Proceedings of the 18th international conference on World Wide Web</source>
          ,
          <year>2009</year>
          , pp.
          <fpage>551</fpage>
          -
          <lpage>560</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>G.</given-names>
            <surname>Cecere</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Le Guel</surname>
          </string-name>
          , and
          <string-name>
            <given-names>N.</given-names>
            <surname>Soulie</surname>
          </string-name>
          , “
          <article-title>Perceived internet privacy concerns on social networks in Europe,”</article-title>
          <source>Technol. Forecast. Soc. Change</source>
          , vol.
          <volume>96</volume>
          , pp.
          <fpage>277</fpage>
          -
          <lpage>287</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>C.</given-names>
            <surname>Patsakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zigomitros</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Papageorgiou</surname>
          </string-name>
          , “
          <article-title>Distributing privacy policy over multimedia content across multiple online social networks</article-title>
          ,
          <source>” Comput. Networks</source>
          , vol.
          <volume>75</volume>
          , pp.
          <fpage>531</fpage>
          -
          <lpage>543</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>A.</given-names>
            <surname>Vishwanath</surname>
          </string-name>
          , “
          <article-title>Habitual Facebook Use and its Impact on Getting Deceived on Social Media,”</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Comput</surname>
          </string-name>
          . Commun., vol.
          <volume>20</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>83</fpage>
          -
          <lpage>98</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>G.</given-names>
            <surname>Brown</surname>
          </string-name>
          , T. Howe,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ihbe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Prakash</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Borders</surname>
          </string-name>
          , “
          <article-title>Social networks and context-aware spam</article-title>
          ,”
          <source>in Proceedings of the 2008 ACM conference on Computer supported cooperative work</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>403</fpage>
          -
          <lpage>412</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>T.</given-names>
            <surname>Jagatic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Johnson</surname>
          </string-name>
          , M. Jakobsson, and
          <string-name>
            <given-names>F.</given-names>
            <surname>Menczer</surname>
          </string-name>
          , “Social Phishing ∗,
          <source>” Commun. ACM</source>
          , vol.
          <volume>50</volume>
          , no.
          <issue>10</issue>
          , pp.
          <fpage>94</fpage>
          -
          <lpage>100</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>G.</given-names>
            <surname>Yan</surname>
          </string-name>
          , G. Ghen,
          <string-name>
            <given-names>S.</given-names>
            <surname>Eidenbenz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>N.</given-names>
            <surname>Li</surname>
          </string-name>
          , “
          <article-title>Malware Propagation in Online Social Networks: Nature, Dynamics,</article-title>
          and Defense Implications,”
          <source>in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security</source>
          ,
          <year>2011</year>
          , pp.
          <fpage>196</fpage>
          -
          <lpage>206</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>X.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zeng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Rong</surname>
          </string-name>
          , “
          <article-title>Detecting spammers on social networks</article-title>
          ,
          <source>” Neuorcomputing</source>
          , vol.
          <volume>159</volume>
          , pp.
          <fpage>27</fpage>
          -
          <lpage>34</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>D.</given-names>
            <surname>Christina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Fanuel</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Stella</surname>
          </string-name>
          , “
          <article-title>The use of social media technology in universities: A case of Solusi University</article-title>
          , Zimbabwe,
          <string-name>
            <given-names>” J. Media</given-names>
            <surname>Commun</surname>
          </string-name>
          . Stud., vol.
          <volume>7</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>101</fpage>
          -
          <lpage>111</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>C. O.</given-names>
            <surname>Omekwu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. N.</given-names>
            <surname>Eke</surname>
          </string-name>
          , and
          <string-name>
            <given-names>N. J.</given-names>
            <surname>Odoh</surname>
          </string-name>
          , “
          <article-title>The Use of Social Networking Sites among the Undergraduate Students</article-title>
          of University of Nigeria, Nsukka,” Libr. Philos. Pract., pp.
          <fpage>1</fpage>
          -
          <lpage>26</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>M.</given-names>
            <surname>Owusu-Acheaw</surname>
          </string-name>
          and
          <string-name>
            <given-names>A. G.</given-names>
            <surname>Larson</surname>
          </string-name>
          , “
          <article-title>Use of Social Media and its Impact on Academic Performance of Tertiary Institution Students: A Study of Students of Koforidua Polytechnic</article-title>
          , Ghana,
          <string-name>
            <given-names>” J.</given-names>
            <surname>Educ</surname>
          </string-name>
          . Pract., vol.
          <volume>6</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>94</fpage>
          -
          <lpage>101</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>G.</given-names>
            <surname>Beqiri</surname>
          </string-name>
          , “
          <article-title>The Impact of Social Media on Higher Education in Kosovo : The Student ‟ s Perspective,”</article-title>
          <string-name>
            <given-names>Acad. J.</given-names>
            <surname>Interdiscip</surname>
          </string-name>
          . Stud., vol.
          <volume>3</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>155</fpage>
          -
          <lpage>164</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Abdulhamid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. O.</given-names>
            <surname>Waziri</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F. N.</given-names>
            <surname>Jibril</surname>
          </string-name>
          , “
          <article-title>Privacy and National Security Issues in Social Networks : The Challenges,”</article-title>
          <string-name>
            <given-names>Int. J. Comput. Internet</given-names>
            <surname>Manag</surname>
          </string-name>
          ., vol.
          <volume>19</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>14</fpage>
          -
          <lpage>20</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>W.</given-names>
            <surname>Gharibi</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Shaabi</surname>
          </string-name>
          , “Cyber Threats In Social Networking Websites,”
          <string-name>
            <surname>Int</surname>
            .
            <given-names>J. Distrib. Parallel</given-names>
          </string-name>
          <string-name>
            <surname>Syst</surname>
          </string-name>
          ., vol.
          <volume>3</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>119</fpage>
          -
          <lpage>126</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Abdulhamid</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. T.</given-names>
            <surname>Abdulazeez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Abraham</surname>
          </string-name>
          , and U. Mohammed, “
          <article-title>Analyzing Membership Profile Privacy Issues in Online Social Networks,” IUP</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Inf</surname>
          </string-name>
          . Technol., vol.
          <volume>7</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>32</fpage>
          -
          <lpage>44</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gangopadhyay</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Dhar</surname>
          </string-name>
          , “
          <article-title>Social networking sites and privacy issues concerning youths,” Glob</article-title>
          . Media J. - Indian Ed., vol.
          <volume>5</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sánchez</surname>
          </string-name>
          ,
          <string-name>
            <surname>N.</surname>
          </string-name>
          <article-title>Muñoz-fernández, and</article-title>
          <string-name>
            <surname>R.</surname>
          </string-name>
          <article-title>Ortega-ruíz, “Computers in Human Behavior „“ Cyberdating Q _ A ”‟: An instrument to assess the quality of adolescent dating relationships in social networks</article-title>
          ,
          <source>” Comput. Human Behav</source>
          ., vol.
          <volume>48</volume>
          , pp.
          <fpage>78</fpage>
          -
          <lpage>86</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>