How to cite this paper
AlHadid, I., Abu-Taieh, E., Rawajbeh, M., Alkhawaldeh, R., Khwaldeh, S., Afaneh, S., Alrowwad, A & Alrwashdeh, D. (2023). Evaluating the influence of security considerations on information dissemination via social networks.International Journal of Data and Network Science, 7(4), 1471-1484.
Refrences
Abualkishik, A., Alzyadat, W., Al Share, M., Al-Khaifi, S., & Nazari, M. (2023). Intelligent Gesture Recognition System for Deaf People by using CNN and IoT. International Journal of Advances in Soft Computing & Its Applications, 15(1).
Abu-Taieh, E. M., AlHadid, I., Abu-Tayeh, S., Masa’deh, R. E., Alkhawaldeh, R. S., Khwaldeh, S., & Alrowwad, A. A. (2022c). Continued Intention to Use of M-Banking in Jordan by integrating UTAUT, TPB, TAM and Service Quality with ML. Journal of Open Innovation: Technology, Market, and Complexity, 8(3), 120.
Abu-Taieh, E. M., AlHadid, I., Masa’deh, R. E., Alkhawaldeh, R. S., Khwaldeh, S., & Alrowwad, A. A. (2022a). Factors affecting the use of social networks and its effect on anxiety and depression among parents and their children: Predic-tors using ML, SEM and extended TAM. International Journal of Environmental Research and Public Health, 19(21), 13764.
Abu-Taieh, E., AlHadid, I., Masa’deh, R. E., Alkhawaldeh, R. S., Khwaldeh, S., & Alrowwad, A. A. (2022b). Factors influ-encing YouTube as a learning tool and its influence on academic achievement in a bilingual environment using ex-tended information adoption model (IAM) with ML prediction—Jordan case study. Applied Sciences, 12(12), 5856.
Ajzen, I. (1991). The theory of planned behavior. Organizational behavior and human decision processes, 50(2), 179-211.
Al Rawajbeh, M., Sayenko, V., & Muhairat, M. I. (2016). Simplified CBA concept and express choice method for inte-grated network management system. International Journal of Computer Networks & Communications (IJCNC), 8(3).
AlHadid, I., Abu-Taieh, E., Alkhawaldeh, R. S., Khwaldeh, S., Masa’deh, R. E., Kaabneh, K., & Alrowwad, A. A. (2022). Predictors for E-government adoption of SANAD App services integrating UTAUT, TPB, TAM, Trust, and perceived risk. International Journal of Environmental Research and Public Health, 19(14), 8281.
Alkhawaldeh, R. S. (2019). DGR: gender recognition of human speech using one-dimensional conventional neural net-work. Scientific Programming, 2019.
Alkhawaldeh, R. S. (2021). Arabic (Indian) digit handwritten recognition using recurrent transfer deep architecture. Soft Computing, 25(4), 3131-3141.
Alkhawaldeh, R. S., Alawida, M., Alshdaifat, N. F. F., Alma’aitah, W. Z. A., & Almasri, A. (2022). Ensemble deep trans-fer learning model for Arabic (Indian) handwritten digit recognition. Neural Computing and Applications, 34(1), 705-719.
Alshare, K. A., Moqbel, M., & Al-Garni, M. A. (2019a). The impact of trust, security, and privacy on individual's use of the internet for online shopping and social media: a multi-cultural study. International Journal of Mobile Communica-tions, 17(5), 513-536.
Alshare, K. A., Moqbel, M., & Al-Garni, M. A. (2019b). The impact of trust, security, and privacy on individual's use of the internet for online shopping and social media: a multi-cultural study. International Journal of Mobile Communica-tions, 17(5), 513-536.
Breiman, L. (1996). Bagging predictors. Machine learning, 24, 123-140.
Carlos Roca, J., José García, J., & José de la Vega, J. (2009). The importance of perceived trust, security and privacy in online trading systems. Information Management & Computer Security, 17(2), 96-113.
Chai, S., Bagchi-Sen, S., Morrell, C., Rao, H. R., & Upadhyaya, S. J. (2009). Internet and online information privacy: An exploratory study of preteens and early teens. IEEE Transactions on Professional Communication, 52(2), 167-182.
Chawla, D., & Joshi, H. (2020). The moderating role of gender and age in the adoption of mobile wallet. Foresight, 22(4), 483-504.
Da Silva, I. N., Hernane Spatti, D., Andrade Flauzino, R., Liboni, L. H. B., dos Reis Alves, S. F., da Silva, I. N., ... & dos Reis Alves, S. F. (2017). Artificial neural network architectures and training processes (pp. 21-28). Springer Interna-tional Publishing.
Dhami, A., Agarwal, N., Chakraborty, T. K., Singh, B. P., & Minj, J. (2013, February). Impact of trust, security and priva-cy concerns in social networking: An exploratory study to understand the pattern of information revelation in Face-book. In 2013 3rd IEEE International Advance Computing Conference (IACC) (pp. 465-469). IEEE.
Flavián, C., & Guinalíu, M. (2006). Consumer trust, perceived security and privacy policy: three basic elements of loyalty to a web site. Industrial management & data Systems, 106(5), 601-620.
Gibson, K., & Trnka, S. (2020). Young people's priorities for support on social media: “It takes trust to talk about these is-sues”. Computers in human behavior, 102, 238-247.
Gross, R., & Acquisti, A. (2005, November). Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society (pp. 71-80).
Gupta, A., & Dhami, A. (2015). Measuring the impact of security, trust and privacy in information sharing: A study on so-cial networking sites. Journal of Direct, Data and Digital Marketing Practice, 17, 43-53.
Hair, J. F., Anderson, R. E., Babin, B. J., & Black, W. C. (2010). Multivariate data analysis: A global perspective (Vol. 7).
Hartono, E., Holsapple, C. W., Kim, K. Y., Na, K. S., & Simpson, J. T. (2014). Measuring perceived security in B2C elec-tronic commerce website usage: A respecification and validation. Decision support systems, 62, 11-21.
Hou, J. R., & Kankham, S. (2022). More than feelings? How Facebook reaction icons affect online users' behavioral inten-tions toward online health rumor posts. Internet Research, 32(6), 1978-2002.
Ingram, D., Panchadar, A., & Auchard, E. (2018). Facebook Privacy Scandal Widens as Data Leak Hits 87 Million Users. CIO. Available online at: https://www. cio. com. au/article/635768/facebook-privacy-scandal-widensdata-leak-hits-87-million-users/(accessed September 5, 2019).
Jeong, Y., & Kim, Y. (2017). Privacy concerns on social networking sites: Interplay among posting types, content, and au-diences. Computers in Human Behavior, 69, 302-310.
Khan, F., Al Rawajbeh, M., Ramasamy, L. K., & Lim, S. (2023). Context-aware and Click Session-based Graph Pattern Mining with Recommendations for Smart EMS through AI. IEEE Access.
Kim, M., Jun, M., & Han, J. (2023). The relationship between needs, motivations and information sharing behaviors on social media: Focus on the self-connection and social connection. Asia Pacific Journal of Marketing and Logistics, 35(1), 1-16.
Koohang, A., Floyd, K., Yerby, J., & Paliszkiewicz, J. (2021). Social media privacy concerns, security concerns, trust, and awareness: Empirical validation of an instrument. Issues in Information Systems, 22(2), 133-145.
Kumar, S., Kumar, P., & Bhasker, B. (2018). Interplay between trust, information privacy concerns and behavioural inten-tion of users on online social networks. Behaviour & Information Technology, 37(6), 622-633.
Kwateng, K. O., Atiemo, K. A. O., & Appiah, C. (2018). Acceptance and use of mobile banking: an application of UTAUT2. Journal of enterprise information management, 32(1), 118-151.
Lin, S. W., & Liu, Y. C. (2012). The effects of motivations, trust, and privacy concern in social networking. Service Busi-ness, 6, 411-424.
Lin, X., & Wang, X. (2020). Examining gender differences in people’s information-sharing decisions on social network-ing sites. International Journal of Information Management, 50, 45-56.
Lin, X., Sarker, S., & Featherman, M. (2019). Users’ psychological perceptions of information sharing in the context of social media: A comprehensive model. International Journal of Electronic Commerce, 23(4), 453-491.
Majerczak, P., & Strzelecki, A. (2022). Trust, media credibility, social ties, and the intention to share towards information verification in an age of fake news. Behavioral Sciences, 12(2), 51.
Maqableh, M., Hmoud, H. Y., & Jaradat, M. (2021). Integrating an information systems success model with perceived pri-vacy, perceived security, and trust: the moderating role of Facebook addiction. Heliyon, 7(9).
Masa’deh, R. E., AlHadid, I., Abu-Taieh, E., Khwaldeh, S., Alrowwad, A. A., & Alkhawaldeh, R. S. (2022). Factors influ-encing students’ intention to use E-textbooks and their impact on academic achievement in Bilingual environment: An empirical study Jordan. Information, 13(5), 233.
Miyazaki, A. D., & Fernandez, A. (2001). Consumer perceptions of privacy and security risks for online shopping. Journal of Consumer affairs, 35(1), 27-44.
Pallant, J. (2020). SPSS survival manual: A step by step guide to data analysis using IBM SPSS. McGraw-hill education (UK).
Paramarta, V., Jihad, M., Dharma, A., Hapsari, I. C., Sandhyaduhita, P. I., & Hidayanto, A. N. (2018, October). Impact of user awareness, trust, and privacy concerns on sharing personal information on social media: Facebook, Twitter, and Instagram. In 2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS) (pp. 271-276).
Platt, J. (1998). Sequential minimal optimization: A fast algorithm for training support vector machines.
Rawajbeh, M. A., Mansi, I., & Hussien, M. (2010). Algorithm development for measurement and prediction the traffic in broad band integrated service networks. Journal of Computer Science, 6(10), 1164.
Rawajbeh, M., Alzyadat, W., Kaabneh, K., Afaneh, S., Alrwashdeh, D., Albayaydah, H., & AlHadid, I. (2023). A new model for security analysis of network anomalies for IoT devices. International Journal of Data and Network Sci-ence, 7(3), 1241-1248.
Ruan, O., Zhang, L., & Zhang, Y. (2021). Location-sharing protocol for privacy protection in mobile online social net-works. EURASIP Journal on Wireless Communications and Networking, 2021(1), 1-14.
Samsudeen, S. N., Selvaratnam, G., & Hayathu Mohamed, A. H. (2022). Intention to use mobile banking services: An Is-lamic banking customers’ perspective from Sri Lanka. Journal of Islamic Marketing, 13(2), 410-433.
Sekaran, U., & Bougie, R. (2016). Research methods for business: A skill building approach. john Wiley & Sons.
Shin, D. H. (2010). The effects of trust, security and privacy in social networking: A security-based approach to under-stand the pattern of adoption. Interacting with computers, 22(5), 428-438.
Singh, K. P., & Gill, M. S. (2015). Role and users’ approach to social networking sites (SNSs): a study of universities of North India. The Electronic Library, 33(1), 19-34.
Stallings, W. (2017). The principles and practice of cryptography and network security 7th edition, isbn-10: 0134444280. Pearson Education, 20(1), 7.
Tasin, T., & Habib, M. A. (2022). Computer-Aided Cataract Detection Using Random Forest Classifier. In Proceedings of the International Conference on Big Data, IoT, and Machine Learning: BIM 2021 (pp. 27-38). Springer Singapore.
Witten, I. H., Frank, E., Hall, M. A., & Pal, C. J. (2016). Data mining fourth edition: Practical machine learning tools and techniques. San Francisco: Morgan Kaufmann Publishers Inc.
Yao, W., & Li, L. (2014). A new regression model: modal linear regression. Scandinavian Journal of Statistics, 41(3), 656-671.
Abu-Taieh, E. M., AlHadid, I., Abu-Tayeh, S., Masa’deh, R. E., Alkhawaldeh, R. S., Khwaldeh, S., & Alrowwad, A. A. (2022c). Continued Intention to Use of M-Banking in Jordan by integrating UTAUT, TPB, TAM and Service Quality with ML. Journal of Open Innovation: Technology, Market, and Complexity, 8(3), 120.
Abu-Taieh, E. M., AlHadid, I., Masa’deh, R. E., Alkhawaldeh, R. S., Khwaldeh, S., & Alrowwad, A. A. (2022a). Factors affecting the use of social networks and its effect on anxiety and depression among parents and their children: Predic-tors using ML, SEM and extended TAM. International Journal of Environmental Research and Public Health, 19(21), 13764.
Abu-Taieh, E., AlHadid, I., Masa’deh, R. E., Alkhawaldeh, R. S., Khwaldeh, S., & Alrowwad, A. A. (2022b). Factors influ-encing YouTube as a learning tool and its influence on academic achievement in a bilingual environment using ex-tended information adoption model (IAM) with ML prediction—Jordan case study. Applied Sciences, 12(12), 5856.
Ajzen, I. (1991). The theory of planned behavior. Organizational behavior and human decision processes, 50(2), 179-211.
Al Rawajbeh, M., Sayenko, V., & Muhairat, M. I. (2016). Simplified CBA concept and express choice method for inte-grated network management system. International Journal of Computer Networks & Communications (IJCNC), 8(3).
AlHadid, I., Abu-Taieh, E., Alkhawaldeh, R. S., Khwaldeh, S., Masa’deh, R. E., Kaabneh, K., & Alrowwad, A. A. (2022). Predictors for E-government adoption of SANAD App services integrating UTAUT, TPB, TAM, Trust, and perceived risk. International Journal of Environmental Research and Public Health, 19(14), 8281.
Alkhawaldeh, R. S. (2019). DGR: gender recognition of human speech using one-dimensional conventional neural net-work. Scientific Programming, 2019.
Alkhawaldeh, R. S. (2021). Arabic (Indian) digit handwritten recognition using recurrent transfer deep architecture. Soft Computing, 25(4), 3131-3141.
Alkhawaldeh, R. S., Alawida, M., Alshdaifat, N. F. F., Alma’aitah, W. Z. A., & Almasri, A. (2022). Ensemble deep trans-fer learning model for Arabic (Indian) handwritten digit recognition. Neural Computing and Applications, 34(1), 705-719.
Alshare, K. A., Moqbel, M., & Al-Garni, M. A. (2019a). The impact of trust, security, and privacy on individual's use of the internet for online shopping and social media: a multi-cultural study. International Journal of Mobile Communica-tions, 17(5), 513-536.
Alshare, K. A., Moqbel, M., & Al-Garni, M. A. (2019b). The impact of trust, security, and privacy on individual's use of the internet for online shopping and social media: a multi-cultural study. International Journal of Mobile Communica-tions, 17(5), 513-536.
Breiman, L. (1996). Bagging predictors. Machine learning, 24, 123-140.
Carlos Roca, J., José García, J., & José de la Vega, J. (2009). The importance of perceived trust, security and privacy in online trading systems. Information Management & Computer Security, 17(2), 96-113.
Chai, S., Bagchi-Sen, S., Morrell, C., Rao, H. R., & Upadhyaya, S. J. (2009). Internet and online information privacy: An exploratory study of preteens and early teens. IEEE Transactions on Professional Communication, 52(2), 167-182.
Chawla, D., & Joshi, H. (2020). The moderating role of gender and age in the adoption of mobile wallet. Foresight, 22(4), 483-504.
Da Silva, I. N., Hernane Spatti, D., Andrade Flauzino, R., Liboni, L. H. B., dos Reis Alves, S. F., da Silva, I. N., ... & dos Reis Alves, S. F. (2017). Artificial neural network architectures and training processes (pp. 21-28). Springer Interna-tional Publishing.
Dhami, A., Agarwal, N., Chakraborty, T. K., Singh, B. P., & Minj, J. (2013, February). Impact of trust, security and priva-cy concerns in social networking: An exploratory study to understand the pattern of information revelation in Face-book. In 2013 3rd IEEE International Advance Computing Conference (IACC) (pp. 465-469). IEEE.
Flavián, C., & Guinalíu, M. (2006). Consumer trust, perceived security and privacy policy: three basic elements of loyalty to a web site. Industrial management & data Systems, 106(5), 601-620.
Gibson, K., & Trnka, S. (2020). Young people's priorities for support on social media: “It takes trust to talk about these is-sues”. Computers in human behavior, 102, 238-247.
Gross, R., & Acquisti, A. (2005, November). Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society (pp. 71-80).
Gupta, A., & Dhami, A. (2015). Measuring the impact of security, trust and privacy in information sharing: A study on so-cial networking sites. Journal of Direct, Data and Digital Marketing Practice, 17, 43-53.
Hair, J. F., Anderson, R. E., Babin, B. J., & Black, W. C. (2010). Multivariate data analysis: A global perspective (Vol. 7).
Hartono, E., Holsapple, C. W., Kim, K. Y., Na, K. S., & Simpson, J. T. (2014). Measuring perceived security in B2C elec-tronic commerce website usage: A respecification and validation. Decision support systems, 62, 11-21.
Hou, J. R., & Kankham, S. (2022). More than feelings? How Facebook reaction icons affect online users' behavioral inten-tions toward online health rumor posts. Internet Research, 32(6), 1978-2002.
Ingram, D., Panchadar, A., & Auchard, E. (2018). Facebook Privacy Scandal Widens as Data Leak Hits 87 Million Users. CIO. Available online at: https://www. cio. com. au/article/635768/facebook-privacy-scandal-widensdata-leak-hits-87-million-users/(accessed September 5, 2019).
Jeong, Y., & Kim, Y. (2017). Privacy concerns on social networking sites: Interplay among posting types, content, and au-diences. Computers in Human Behavior, 69, 302-310.
Khan, F., Al Rawajbeh, M., Ramasamy, L. K., & Lim, S. (2023). Context-aware and Click Session-based Graph Pattern Mining with Recommendations for Smart EMS through AI. IEEE Access.
Kim, M., Jun, M., & Han, J. (2023). The relationship between needs, motivations and information sharing behaviors on social media: Focus on the self-connection and social connection. Asia Pacific Journal of Marketing and Logistics, 35(1), 1-16.
Koohang, A., Floyd, K., Yerby, J., & Paliszkiewicz, J. (2021). Social media privacy concerns, security concerns, trust, and awareness: Empirical validation of an instrument. Issues in Information Systems, 22(2), 133-145.
Kumar, S., Kumar, P., & Bhasker, B. (2018). Interplay between trust, information privacy concerns and behavioural inten-tion of users on online social networks. Behaviour & Information Technology, 37(6), 622-633.
Kwateng, K. O., Atiemo, K. A. O., & Appiah, C. (2018). Acceptance and use of mobile banking: an application of UTAUT2. Journal of enterprise information management, 32(1), 118-151.
Lin, S. W., & Liu, Y. C. (2012). The effects of motivations, trust, and privacy concern in social networking. Service Busi-ness, 6, 411-424.
Lin, X., & Wang, X. (2020). Examining gender differences in people’s information-sharing decisions on social network-ing sites. International Journal of Information Management, 50, 45-56.
Lin, X., Sarker, S., & Featherman, M. (2019). Users’ psychological perceptions of information sharing in the context of social media: A comprehensive model. International Journal of Electronic Commerce, 23(4), 453-491.
Majerczak, P., & Strzelecki, A. (2022). Trust, media credibility, social ties, and the intention to share towards information verification in an age of fake news. Behavioral Sciences, 12(2), 51.
Maqableh, M., Hmoud, H. Y., & Jaradat, M. (2021). Integrating an information systems success model with perceived pri-vacy, perceived security, and trust: the moderating role of Facebook addiction. Heliyon, 7(9).
Masa’deh, R. E., AlHadid, I., Abu-Taieh, E., Khwaldeh, S., Alrowwad, A. A., & Alkhawaldeh, R. S. (2022). Factors influ-encing students’ intention to use E-textbooks and their impact on academic achievement in Bilingual environment: An empirical study Jordan. Information, 13(5), 233.
Miyazaki, A. D., & Fernandez, A. (2001). Consumer perceptions of privacy and security risks for online shopping. Journal of Consumer affairs, 35(1), 27-44.
Pallant, J. (2020). SPSS survival manual: A step by step guide to data analysis using IBM SPSS. McGraw-hill education (UK).
Paramarta, V., Jihad, M., Dharma, A., Hapsari, I. C., Sandhyaduhita, P. I., & Hidayanto, A. N. (2018, October). Impact of user awareness, trust, and privacy concerns on sharing personal information on social media: Facebook, Twitter, and Instagram. In 2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS) (pp. 271-276).
Platt, J. (1998). Sequential minimal optimization: A fast algorithm for training support vector machines.
Rawajbeh, M. A., Mansi, I., & Hussien, M. (2010). Algorithm development for measurement and prediction the traffic in broad band integrated service networks. Journal of Computer Science, 6(10), 1164.
Rawajbeh, M., Alzyadat, W., Kaabneh, K., Afaneh, S., Alrwashdeh, D., Albayaydah, H., & AlHadid, I. (2023). A new model for security analysis of network anomalies for IoT devices. International Journal of Data and Network Sci-ence, 7(3), 1241-1248.
Ruan, O., Zhang, L., & Zhang, Y. (2021). Location-sharing protocol for privacy protection in mobile online social net-works. EURASIP Journal on Wireless Communications and Networking, 2021(1), 1-14.
Samsudeen, S. N., Selvaratnam, G., & Hayathu Mohamed, A. H. (2022). Intention to use mobile banking services: An Is-lamic banking customers’ perspective from Sri Lanka. Journal of Islamic Marketing, 13(2), 410-433.
Sekaran, U., & Bougie, R. (2016). Research methods for business: A skill building approach. john Wiley & Sons.
Shin, D. H. (2010). The effects of trust, security and privacy in social networking: A security-based approach to under-stand the pattern of adoption. Interacting with computers, 22(5), 428-438.
Singh, K. P., & Gill, M. S. (2015). Role and users’ approach to social networking sites (SNSs): a study of universities of North India. The Electronic Library, 33(1), 19-34.
Stallings, W. (2017). The principles and practice of cryptography and network security 7th edition, isbn-10: 0134444280. Pearson Education, 20(1), 7.
Tasin, T., & Habib, M. A. (2022). Computer-Aided Cataract Detection Using Random Forest Classifier. In Proceedings of the International Conference on Big Data, IoT, and Machine Learning: BIM 2021 (pp. 27-38). Springer Singapore.
Witten, I. H., Frank, E., Hall, M. A., & Pal, C. J. (2016). Data mining fourth edition: Practical machine learning tools and techniques. San Francisco: Morgan Kaufmann Publishers Inc.
Yao, W., & Li, L. (2014). A new regression model: modal linear regression. Scandinavian Journal of Statistics, 41(3), 656-671.