SlideShare a Scribd company logo
ARTICLES PRESENTATION
Networking and Online Privacy: Facebook Users'
Perceptions
O' Bien, D., & Torres, A. M. (2012). Social Irish Journal of Management,
31(2), 63-97.
Discovering interest groups for marketing in
virtual communities: An integrated approach
Wang, K.-Y., Ting, I. H., & Wu, H.-J. (2013). Journal of Business Research,
66(9), 1360-1366
Group L – CHAOYUE, MEUNIER, ROUSSEAU, VEAU DE LANOUVELLE, ZHRAOUI
ARTICLE 1
Networking and Online Privacy:
Facebook Users' Perceptions
Introduction
Definitions
Refers to the moral right of individuals to avoid intrusion
into their personal affairs by third parties**
A psychological state comprising the intention to
accept vulnerability based on positive expectations of
the intentions or behaviours of another*
*Chaffey et al (2009) Internet Marketing: Strategy, Implementation and Practice , fourth edition
** Rousseauet al (1998) ‘Not so Different after all: A Cross-Discipline View of Trust,’ Academy of Management Review , 23, pp. 393–404.
Factors of control :
-awareness of information being collected
-information usage
-information sensitivity
-familiarity with the entity collecting the information
• Depending on
- Context
- Privacy concerns
- Browser
- Website and Transactions
- Individual’s perception
- Perceived risk
• Vital for social media
METHODOLOGY
1. BACKGROUND CASE DESCRIPTION
-Facebook Privacy
- Dec 2009 : Facebook made users’ information publicly available (by default)
- 80% of users had not read the privacy policy
- Tolerance of dissatisfactory elements  to share in experiences with others
-Facebook Trust
- 2006: users’ trust in FB was great
- Over the years: decrease of the users’ options to
control their own information
METHODOLOGY
2. RESEARCH DESIGN
1.Focus group: Qualitative research
Generate discussion about online privacy, trust and social
networking among users
2. Survey: Quantitative research
Cross-sectional survey enables data collected , relating to
Facebook users’ perceptions of online privacy
Data collection
1.Focus group: divided into four age groups
18-21 years, 22-25years, 26-29 years,
30 years plus
2. Survey: distributed to 600 active Facebook users and 285 responses were
collected. (47.5%)
Survey Monkey : employed for the design, distribution and analysis of the survey
instrument
23 questions comprised the survey.
METHODOLOGY
3. RESULTS
-Survey (key figures and results)
-Privacy statement and policy
-Trust statement
METHODOLOGY
4. DISCUSSION
-Privacy:
Users control their privacy
settings
-Trust
Facebook only has a
“social utility” according
to users
CONCLUSION
RECOMMENDATIONS
For Facebook
For Facebook’s users
QUESTIONS
ARTICLE 2
Discovering interest groups for marketing in
virtual communities:
An integrated approach
INTRODUCTION
Purpose: how to use proper advanced techniques for
effective marketing in virtual communities ?
 Social Network Analysis :
tool to study the
structure of social
networks
 Web mining: the most
suitable technique to
analyze web content
METHODOLOGY
Research design
Sample
RESULTS
Three measurements (responses, citations & recommendations)
allow researchers to find the
key members for WOM
marketing.
Interactions, discussed
topics and recommended
content helps to identify
group interest.
CONCLUSION
1.This research extends the use of the SNA from offline to online settings
2.Demonstrate the use of the SNA in conjunction with web mining
techniques
3.The proposed method offers an alternative which improves the
efficiency and accuracy of a recommendation
4.Benefit future researchers
5. Minimize the possibility of invading consumer privacy
Managerial implications
Enhancing service quality
 Simplying searching process and save users' time
Attract more users
Facilitate marketers’ work
For online advertisers :
Target better
Improving the click-through rate
Products promoting
by opinion leaders
Increase
WOM
Product trial
and
purchases
QUESTIONS

More Related Content

What's hot

Social Media Mining - Chapter 2 (Graph Essentials)
Social Media Mining - Chapter 2 (Graph Essentials)Social Media Mining - Chapter 2 (Graph Essentials)
Social Media Mining - Chapter 2 (Graph Essentials)
SocialMediaMining
 
Survey of data mining techniques for social
Survey of data mining techniques for socialSurvey of data mining techniques for social
Survey of data mining techniques for social
Firas Husseini
 
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
BAINIDA
 
บริการต่างๆบนอินเตอร์เน็ต
บริการต่างๆบนอินเตอร์เน็ตบริการต่างๆบนอินเตอร์เน็ต
บริการต่างๆบนอินเตอร์เน็ต
Code_16032
 
Implications of writing, reading, and tagging on the web for reflection supp...
Implications of writing, reading, and tagging  on the web for reflection supp...Implications of writing, reading, and tagging  on the web for reflection supp...
Implications of writing, reading, and tagging on the web for reflection supp...
Christian Glahn
 
mgreyes_MarketingGame_ITA2015
mgreyes_MarketingGame_ITA2015mgreyes_MarketingGame_ITA2015
mgreyes_MarketingGame_ITA2015
Matthew G. Reyes
 
Multiparty access control for online social networks model and mechanisms
Multiparty access control for online social networks model and mechanismsMultiparty access control for online social networks model and mechanisms
Multiparty access control for online social networks model and mechanisms
JPINFOTECH JAYAPRAKASH
 
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIARESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
Nexgen Technology
 
Paper Presentation - Marketing Management
Paper Presentation - Marketing ManagementPaper Presentation - Marketing Management
Paper Presentation - Marketing Management
Carrine Aulia
 
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Kiran K.V.S.
 
Do hierarchical positions influence participant’s network behaviour within C...
Do hierarchical positions influence participant’s network behaviour within  C...Do hierarchical positions influence participant’s network behaviour within  C...
Do hierarchical positions influence participant’s network behaviour within C...
Martin Rehm
 
Spring Symposium 2015_Poster McCabe.pptx3
Spring Symposium 2015_Poster McCabe.pptx3Spring Symposium 2015_Poster McCabe.pptx3
Spring Symposium 2015_Poster McCabe.pptx3
National University
 
Social Media Mining - Chapter 3 (Network Measures)
Social Media Mining - Chapter 3 (Network Measures)Social Media Mining - Chapter 3 (Network Measures)
Social Media Mining - Chapter 3 (Network Measures)
SocialMediaMining
 
The Verification Of Virtual Community Member’s Socio-Demographic Profile
The Verification Of Virtual Community Member’s Socio-Demographic ProfileThe Verification Of Virtual Community Member’s Socio-Demographic Profile
The Verification Of Virtual Community Member’s Socio-Demographic Profile
acijjournal
 
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIARESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
Nexgen Technology
 

What's hot (15)

Social Media Mining - Chapter 2 (Graph Essentials)
Social Media Mining - Chapter 2 (Graph Essentials)Social Media Mining - Chapter 2 (Graph Essentials)
Social Media Mining - Chapter 2 (Graph Essentials)
 
Survey of data mining techniques for social
Survey of data mining techniques for socialSurvey of data mining techniques for social
Survey of data mining techniques for social
 
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
Subscriber Churn Prediction Model using Social Network Analysis In Telecommun...
 
บริการต่างๆบนอินเตอร์เน็ต
บริการต่างๆบนอินเตอร์เน็ตบริการต่างๆบนอินเตอร์เน็ต
บริการต่างๆบนอินเตอร์เน็ต
 
Implications of writing, reading, and tagging on the web for reflection supp...
Implications of writing, reading, and tagging  on the web for reflection supp...Implications of writing, reading, and tagging  on the web for reflection supp...
Implications of writing, reading, and tagging on the web for reflection supp...
 
mgreyes_MarketingGame_ITA2015
mgreyes_MarketingGame_ITA2015mgreyes_MarketingGame_ITA2015
mgreyes_MarketingGame_ITA2015
 
Multiparty access control for online social networks model and mechanisms
Multiparty access control for online social networks model and mechanismsMultiparty access control for online social networks model and mechanisms
Multiparty access control for online social networks model and mechanisms
 
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIARESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
 
Paper Presentation - Marketing Management
Paper Presentation - Marketing ManagementPaper Presentation - Marketing Management
Paper Presentation - Marketing Management
 
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
 
Do hierarchical positions influence participant’s network behaviour within C...
Do hierarchical positions influence participant’s network behaviour within  C...Do hierarchical positions influence participant’s network behaviour within  C...
Do hierarchical positions influence participant’s network behaviour within C...
 
Spring Symposium 2015_Poster McCabe.pptx3
Spring Symposium 2015_Poster McCabe.pptx3Spring Symposium 2015_Poster McCabe.pptx3
Spring Symposium 2015_Poster McCabe.pptx3
 
Social Media Mining - Chapter 3 (Network Measures)
Social Media Mining - Chapter 3 (Network Measures)Social Media Mining - Chapter 3 (Network Measures)
Social Media Mining - Chapter 3 (Network Measures)
 
The Verification Of Virtual Community Member’s Socio-Demographic Profile
The Verification Of Virtual Community Member’s Socio-Demographic ProfileThe Verification Of Virtual Community Member’s Socio-Demographic Profile
The Verification Of Virtual Community Member’s Socio-Demographic Profile
 
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIARESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
RESOLVING MULTI-PARTY PRIVACY CONFLICTS IN SOCIAL MEDIA
 

Viewers also liked

Jael nicolas castro sanchez
Jael nicolas castro sanchezJael nicolas castro sanchez
Jael nicolas castro sanchez
nicolas1811
 
Vamos praticar - HLP - Origem da Língua Portuguesa
Vamos praticar - HLP - Origem da Língua PortuguesaVamos praticar - HLP - Origem da Língua Portuguesa
Vamos praticar - HLP - Origem da Língua Portuguesa
Susana Sobrenome
 
Yesenia
YeseniaYesenia
Yesenia
danijess
 
Value Chain
Value ChainValue Chain
Value Chain
BOL Advisory Group
 
Certificate Food Hygiene
Certificate Food HygieneCertificate Food Hygiene
Certificate Food HygieneShaheed Premji
 
2015.9告訴団強制起訴議決
2015.9告訴団強制起訴議決2015.9告訴団強制起訴議決
2015.9告訴団強制起訴議決
Kazuhide Fukada
 
Pelanggaran ham
Pelanggaran hamPelanggaran ham
Alberto Luini - Pubblicazioni dal 2008 al 2012
Alberto Luini - Pubblicazioni dal 2008 al 2012Alberto Luini - Pubblicazioni dal 2008 al 2012
Alberto Luini - Pubblicazioni dal 2008 al 2012
AlbertoLuini
 
Escola estadual 1
Escola estadual 1Escola estadual 1
Escola estadual 1
Maria José Menossi
 
Food and Beverage Management
Food and Beverage ManagementFood and Beverage Management
Food and Beverage ManagementShaheed Premji
 
基調講演:「ビッグデータのセキュリティとガバナンス要件」 #cwt2015
基調講演:「ビッグデータのセキュリティとガバナンス要件」 #cwt2015基調講演:「ビッグデータのセキュリティとガバナンス要件」 #cwt2015
基調講演:「ビッグデータのセキュリティとガバナンス要件」 #cwt2015
Cloudera Japan
 
Terpenos e Óleos voláteis
Terpenos e Óleos voláteisTerpenos e Óleos voláteis
Terpenos e Óleos voláteis
Flavia Alencar
 
Ficha informativa - Tempestade e chegada à Índia
Ficha informativa - Tempestade e chegada à ÍndiaFicha informativa - Tempestade e chegada à Índia
Ficha informativa - Tempestade e chegada à Índia
Susana Sobrenome
 
2009/2010_4ª ficha de avaliação_9
2009/2010_4ª ficha de avaliação_92009/2010_4ª ficha de avaliação_9
2009/2010_4ª ficha de avaliação_9
Susana Sobrenome
 

Viewers also liked (15)

Jael nicolas castro sanchez
Jael nicolas castro sanchezJael nicolas castro sanchez
Jael nicolas castro sanchez
 
Vamos praticar - HLP - Origem da Língua Portuguesa
Vamos praticar - HLP - Origem da Língua PortuguesaVamos praticar - HLP - Origem da Língua Portuguesa
Vamos praticar - HLP - Origem da Língua Portuguesa
 
Yesenia
YeseniaYesenia
Yesenia
 
Value Chain
Value ChainValue Chain
Value Chain
 
Certificate Food Hygiene
Certificate Food HygieneCertificate Food Hygiene
Certificate Food Hygiene
 
2015.9告訴団強制起訴議決
2015.9告訴団強制起訴議決2015.9告訴団強制起訴議決
2015.9告訴団強制起訴議決
 
Pelanggaran ham
Pelanggaran hamPelanggaran ham
Pelanggaran ham
 
NCC certificate
NCC certificateNCC certificate
NCC certificate
 
Alberto Luini - Pubblicazioni dal 2008 al 2012
Alberto Luini - Pubblicazioni dal 2008 al 2012Alberto Luini - Pubblicazioni dal 2008 al 2012
Alberto Luini - Pubblicazioni dal 2008 al 2012
 
Escola estadual 1
Escola estadual 1Escola estadual 1
Escola estadual 1
 
Food and Beverage Management
Food and Beverage ManagementFood and Beverage Management
Food and Beverage Management
 
基調講演:「ビッグデータのセキュリティとガバナンス要件」 #cwt2015
基調講演:「ビッグデータのセキュリティとガバナンス要件」 #cwt2015基調講演:「ビッグデータのセキュリティとガバナンス要件」 #cwt2015
基調講演:「ビッグデータのセキュリティとガバナンス要件」 #cwt2015
 
Terpenos e Óleos voláteis
Terpenos e Óleos voláteisTerpenos e Óleos voláteis
Terpenos e Óleos voláteis
 
Ficha informativa - Tempestade e chegada à Índia
Ficha informativa - Tempestade e chegada à ÍndiaFicha informativa - Tempestade e chegada à Índia
Ficha informativa - Tempestade e chegada à Índia
 
2009/2010_4ª ficha de avaliação_9
2009/2010_4ª ficha de avaliação_92009/2010_4ª ficha de avaliação_9
2009/2010_4ª ficha de avaliação_9
 

Similar to Article presentation group l

Social networks for knowledge management: the groups feature as a Personal Kn...
Social networks for knowledge management: the groups feature as a Personal Kn...Social networks for knowledge management: the groups feature as a Personal Kn...
Social networks for knowledge management: the groups feature as a Personal Kn...
Cleopatra Mushonga
 
Impact of social media in digital marketing
Impact of social media in digital marketingImpact of social media in digital marketing
Impact of social media in digital marketing
Dr. C.V. Suresh Babu
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
Kandy Woodfield
 
Social Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsSocial Media, Social Science and Research Ethics
Social Media, Social Science and Research Ethics
TheSRAOrg
 
Strategic impact of Social Media in tourism- Research paper
Strategic impact of Social Media in tourism- Research paperStrategic impact of Social Media in tourism- Research paper
Strategic impact of Social Media in tourism- Research paper
Ambuj Saxena
 
The Effect of Social Media Marketing To Brand Loyalty (Case Study at the Univ...
The Effect of Social Media Marketing To Brand Loyalty (Case Study at the Univ...The Effect of Social Media Marketing To Brand Loyalty (Case Study at the Univ...
The Effect of Social Media Marketing To Brand Loyalty (Case Study at the Univ...
inventionjournals
 
The Effect of Social Media Marketing To Brand Loyalty (Case Study at the Univ...
The Effect of Social Media Marketing To Brand Loyalty (Case Study at the Univ...The Effect of Social Media Marketing To Brand Loyalty (Case Study at the Univ...
The Effect of Social Media Marketing To Brand Loyalty (Case Study at the Univ...
inventionjournals
 
Gratification of new media while marketing a new product
Gratification of new media while marketing   a new productGratification of new media while marketing   a new product
Gratification of new media while marketing a new product
saurav kishor
 
Social media presentation
Social media presentationSocial media presentation
Social media presentation
mhabibian
 
Social media presentation (1)
Social media presentation (1)Social media presentation (1)
Social media presentation (1)
mhabibian
 
Social media presentation
Social media presentationSocial media presentation
Social media presentation
BobbyS95
 
MINING USER KNOWLEDGE FOR INVESTIGATING THE FACEBOOK.pdf
MINING USER KNOWLEDGE FOR INVESTIGATING THE FACEBOOK.pdfMINING USER KNOWLEDGE FOR INVESTIGATING THE FACEBOOK.pdf
MINING USER KNOWLEDGE FOR INVESTIGATING THE FACEBOOK.pdf
Wassie Getahun (PhD)
 
Identifying the Factors Affecting Users’ Adoption of Social Networking
Identifying the Factors Affecting Users’ Adoption of Social NetworkingIdentifying the Factors Affecting Users’ Adoption of Social Networking
Identifying the Factors Affecting Users’ Adoption of Social Networking
Waqas Tariq
 
Social networks management policies
Social networks management policiesSocial networks management policies
Social networks management policies
Gabriel BREZOIU
 
Social Media
Social MediaSocial Media
Social Media
Munirah Memo
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
Anil Dhami
 
Use of SOCIAL MEDIA in Business
Use of SOCIAL MEDIA  in Business Use of SOCIAL MEDIA  in Business
Use of SOCIAL MEDIA in Business
Tanuj Barai
 
A Guide to Social Network Analysis
A Guide to Social Network AnalysisA Guide to Social Network Analysis
A Guide to Social Network Analysis
Olivier Serrat
 
A study on user satisfaction of social network sites with special reference t...
A study on user satisfaction of social network sites with special reference t...A study on user satisfaction of social network sites with special reference t...
A study on user satisfaction of social network sites with special reference t...
Dr. Linda Mary Simon
 
Social media presentation
Social media presentation Social media presentation
Social media presentation
mhabibian
 

Similar to Article presentation group l (20)

Social networks for knowledge management: the groups feature as a Personal Kn...
Social networks for knowledge management: the groups feature as a Personal Kn...Social networks for knowledge management: the groups feature as a Personal Kn...
Social networks for knowledge management: the groups feature as a Personal Kn...
 
Impact of social media in digital marketing
Impact of social media in digital marketingImpact of social media in digital marketing
Impact of social media in digital marketing
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
 
Social Media, Social Science and Research Ethics
Social Media, Social Science and Research EthicsSocial Media, Social Science and Research Ethics
Social Media, Social Science and Research Ethics
 
Strategic impact of Social Media in tourism- Research paper
Strategic impact of Social Media in tourism- Research paperStrategic impact of Social Media in tourism- Research paper
Strategic impact of Social Media in tourism- Research paper
 
The Effect of Social Media Marketing To Brand Loyalty (Case Study at the Univ...
The Effect of Social Media Marketing To Brand Loyalty (Case Study at the Univ...The Effect of Social Media Marketing To Brand Loyalty (Case Study at the Univ...
The Effect of Social Media Marketing To Brand Loyalty (Case Study at the Univ...
 
The Effect of Social Media Marketing To Brand Loyalty (Case Study at the Univ...
The Effect of Social Media Marketing To Brand Loyalty (Case Study at the Univ...The Effect of Social Media Marketing To Brand Loyalty (Case Study at the Univ...
The Effect of Social Media Marketing To Brand Loyalty (Case Study at the Univ...
 
Gratification of new media while marketing a new product
Gratification of new media while marketing   a new productGratification of new media while marketing   a new product
Gratification of new media while marketing a new product
 
Social media presentation
Social media presentationSocial media presentation
Social media presentation
 
Social media presentation (1)
Social media presentation (1)Social media presentation (1)
Social media presentation (1)
 
Social media presentation
Social media presentationSocial media presentation
Social media presentation
 
MINING USER KNOWLEDGE FOR INVESTIGATING THE FACEBOOK.pdf
MINING USER KNOWLEDGE FOR INVESTIGATING THE FACEBOOK.pdfMINING USER KNOWLEDGE FOR INVESTIGATING THE FACEBOOK.pdf
MINING USER KNOWLEDGE FOR INVESTIGATING THE FACEBOOK.pdf
 
Identifying the Factors Affecting Users’ Adoption of Social Networking
Identifying the Factors Affecting Users’ Adoption of Social NetworkingIdentifying the Factors Affecting Users’ Adoption of Social Networking
Identifying the Factors Affecting Users’ Adoption of Social Networking
 
Social networks management policies
Social networks management policiesSocial networks management policies
Social networks management policies
 
Social Media
Social MediaSocial Media
Social Media
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
 
Use of SOCIAL MEDIA in Business
Use of SOCIAL MEDIA  in Business Use of SOCIAL MEDIA  in Business
Use of SOCIAL MEDIA in Business
 
A Guide to Social Network Analysis
A Guide to Social Network AnalysisA Guide to Social Network Analysis
A Guide to Social Network Analysis
 
A study on user satisfaction of social network sites with special reference t...
A study on user satisfaction of social network sites with special reference t...A study on user satisfaction of social network sites with special reference t...
A study on user satisfaction of social network sites with special reference t...
 
Social media presentation
Social media presentation Social media presentation
Social media presentation
 

Recently uploaded

Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
MattGardner52
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
ssusera97a2f
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
20jcoello
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
lawyersonia
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
Milind Agarwal
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
Energizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining FuturesEnergizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining Futures
USDAReapgrants.com
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
EbizfilingIndia
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 

Recently uploaded (20)

Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
Matthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government LiaisonMatthew Professional CV experienced Government Liaison
Matthew Professional CV experienced Government Liaison
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
Energizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining FuturesEnergizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining Futures
 
Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 

Article presentation group l

  • 1. ARTICLES PRESENTATION Networking and Online Privacy: Facebook Users' Perceptions O' Bien, D., & Torres, A. M. (2012). Social Irish Journal of Management, 31(2), 63-97. Discovering interest groups for marketing in virtual communities: An integrated approach Wang, K.-Y., Ting, I. H., & Wu, H.-J. (2013). Journal of Business Research, 66(9), 1360-1366 Group L – CHAOYUE, MEUNIER, ROUSSEAU, VEAU DE LANOUVELLE, ZHRAOUI
  • 2. ARTICLE 1 Networking and Online Privacy: Facebook Users' Perceptions
  • 3. Introduction Definitions Refers to the moral right of individuals to avoid intrusion into their personal affairs by third parties** A psychological state comprising the intention to accept vulnerability based on positive expectations of the intentions or behaviours of another* *Chaffey et al (2009) Internet Marketing: Strategy, Implementation and Practice , fourth edition ** Rousseauet al (1998) ‘Not so Different after all: A Cross-Discipline View of Trust,’ Academy of Management Review , 23, pp. 393–404.
  • 4. Factors of control : -awareness of information being collected -information usage -information sensitivity -familiarity with the entity collecting the information • Depending on - Context - Privacy concerns - Browser - Website and Transactions - Individual’s perception - Perceived risk • Vital for social media
  • 5. METHODOLOGY 1. BACKGROUND CASE DESCRIPTION -Facebook Privacy - Dec 2009 : Facebook made users’ information publicly available (by default) - 80% of users had not read the privacy policy - Tolerance of dissatisfactory elements  to share in experiences with others -Facebook Trust - 2006: users’ trust in FB was great - Over the years: decrease of the users’ options to control their own information
  • 6. METHODOLOGY 2. RESEARCH DESIGN 1.Focus group: Qualitative research Generate discussion about online privacy, trust and social networking among users 2. Survey: Quantitative research Cross-sectional survey enables data collected , relating to Facebook users’ perceptions of online privacy
  • 7. Data collection 1.Focus group: divided into four age groups 18-21 years, 22-25years, 26-29 years, 30 years plus 2. Survey: distributed to 600 active Facebook users and 285 responses were collected. (47.5%) Survey Monkey : employed for the design, distribution and analysis of the survey instrument 23 questions comprised the survey.
  • 8. METHODOLOGY 3. RESULTS -Survey (key figures and results) -Privacy statement and policy -Trust statement
  • 9. METHODOLOGY 4. DISCUSSION -Privacy: Users control their privacy settings -Trust Facebook only has a “social utility” according to users
  • 13. ARTICLE 2 Discovering interest groups for marketing in virtual communities: An integrated approach
  • 14. INTRODUCTION Purpose: how to use proper advanced techniques for effective marketing in virtual communities ?  Social Network Analysis : tool to study the structure of social networks  Web mining: the most suitable technique to analyze web content
  • 16. RESULTS Three measurements (responses, citations & recommendations) allow researchers to find the key members for WOM marketing. Interactions, discussed topics and recommended content helps to identify group interest.
  • 17. CONCLUSION 1.This research extends the use of the SNA from offline to online settings 2.Demonstrate the use of the SNA in conjunction with web mining techniques 3.The proposed method offers an alternative which improves the efficiency and accuracy of a recommendation 4.Benefit future researchers 5. Minimize the possibility of invading consumer privacy
  • 18. Managerial implications Enhancing service quality  Simplying searching process and save users' time Attract more users Facilitate marketers’ work For online advertisers : Target better Improving the click-through rate Products promoting by opinion leaders Increase WOM Product trial and purchases