Students’ Perception of Privacy Risks in Using Social Networking Sites for Learning: A Study of Uganda Christian University

  • Francis OttoEmail author
  • Nurul Amin Badrul
  • Shirley Williams
  • Karsten Øster Lundqvist
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 160)


Although social networking sites (SNSs) present a great deal of opportunities to support learning, the privacy risk is perceived by learners as a friction point that affects their full use for learning. Privacy risks in SNSs can be divided into risks that are posed by the SNS provider itself and risks that result from user’s social interactions. Using an online survey questionnaire, this study explored the students’ perception of the benefits in using social networking sites for learning purposes and their perceived privacy risks. A sample of 214 students from Uganda Christian University in Africa was studied. The results show that although 88 % of participants indicated the usefulness of SNSs for learning, they are also aware of the risks associated with these sites. Most of the participants are concerned with privacy risks such as identity theft, cyber bullying, and impersonation that might influence their online learning participation in SNSs.


Social networking sites Online social network Privacy risks Learning Students 


  1. 1.
    Gurses, S., Diaz, C.: Two tales of privacy in online social networks. IEEE Secur. Priv. 11(3), 29–37 (2013)CrossRefGoogle Scholar
  2. 2.
    Boyd, D., Ellison, N.B.: Social network sites: definition, history, and scholarship. J. Computer-Mediated Commun. 13(1), 23 (2007)CrossRefGoogle Scholar
  3. 3.
    Idris, Y., Wang, Q.: Affordances of Facebook for learning. Intl. J. Cont. Eng. Educ. Lifelong Learn. 19(2), 247–255 (2009)CrossRefGoogle Scholar
  4. 4.
    McLoughlin, C., Lee, M.J.: Social software and participatory learning: pedagogical choices with technology affordances in the Web 2.0 era. In: ICT: Providing Choices for Learners and Learning. Proceedings ascilite Singapore 2007 (2007)Google Scholar
  5. 5.
    Bryant, T.: Social software in academia. Educause Q. 29(2), 61 (2006)Google Scholar
  6. 6.
    Tess, P.A.: The role of social media in higher education classes (real and virtual) – a literature review. Comput. Hum. Behav. 29(5), A60–A68 (2013)CrossRefGoogle Scholar
  7. 7.
    Martin, S., et al.: New technology trends in education: seven years of forecasts and convergence. Comput. Educ. 57(3), 1893–1906 (2011)CrossRefGoogle Scholar
  8. 8.
    Van Dijck, J.: ‘You have one identity’: performing the self on Facebook and LinkedIn. Media Cult. Soc. 35(2), 199–215 (2013)CrossRefGoogle Scholar
  9. 9.
    Facebook. Statement of Rights and Responsibilities 30 January 2015 [cited 27 March 2015]Google Scholar
  10. 10.
    Jones, A., Martin, T.: Digital forensics and the issues of identity. Inf. Secur. Tech. Rep. 15(2), 67–71 (2010)CrossRefGoogle Scholar
  11. 11.
    Aïmeur, E., Schonfeld, D.: The ultimate invasion of privacy: identity theft. In: 2011 Ninth Annual International Conference on Privacy, Security and Trust (PST). IEEE (2011)Google Scholar
  12. 12.
    Pempek, T.A., Yermolayeva, Y.A., Calvert, S.L.: College students’ social networking experiences on Facebook. J. Appl. Dev. Psychol. 30(3), 227–238 (2009)CrossRefGoogle Scholar
  13. 13.
    Price, K.: Web 2.0 and education: what it means for us all. In: Australian Computers in Education Conference (2006)Google Scholar
  14. 14.
    Richardson, W.: Blogs, Wikis, Podcasts, and Other Powerful Web Tools for Classrooms. Corwin Press, Thousand Oaks (2010)Google Scholar
  15. 15.
    Thomas, K., Grier, C., Nicol, D.M.: UnFriendly: multi-party privacy risks in social networks. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 236–252. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  16. 16.
    Dinev, T., Hart, P.: An extended privacy calculus model for e-commerce transactions. Inf. Syst. Res. 17(1), 61–80 (2006)CrossRefGoogle Scholar
  17. 17.
    Debatin, B.: Ethics, privacy, and self-restraint in social networking. Privacy Online, pp. 47–60. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  18. 18.
    Bonneau, J., Preibusch, S.: The privacy jungle: on the market for data protection in social networks. Economics of Information Security and Privacy, pp. 121–167. Springer, US (2010)CrossRefGoogle Scholar
  19. 19.
    Jones, H., Soltren, J.: Facebook: threats to privacy. In: Project MAC: MIT Project on Mathematics and Computing (2009)Google Scholar
  20. 20.
    boyd, d., Hargittai, E.: Facebook privacy settings: who cares?. First Monday 15(8) (2010). Accessed 5 May 2015
  21. 21.
    Yang, Y., et al.: Stalking online: on user privacy in social networks. In: Proceedings of the Second ACM Conference on Data and Application Security and Privacy. ACM (2012)Google Scholar
  22. 22.
    Gundecha, P., et al.: User vulnerability and its reduction on a social networking site. ACM Trans. Knowl. Discov. Data (TKDD) 9(2), 12 (2014)Google Scholar
  23. 23.
    Lynch, J.: Identity theft in cyberspace: crime control methods and their effectiveness in combating phishing attacks. Berkeley Tech. Law J. 20, 259 (2005)Google Scholar
  24. 24.
    Campbell, M.A.: Cyber bullying: an old problem in a new guise? Aust. J. Guidance Couns. 15(01), 68–76 (2005)CrossRefGoogle Scholar
  25. 25.
    Albrechtslund, A.: Online social networking as participatory surveillance. First Monday 13(3) (2008). Accessed 5 May 2015
  26. 26.
    Tokunaga, R.S.: Social networking site or social surveillance site? Understanding the use of interpersonal electronic surveillance in romantic relationships. Comput. Hum. Behav. 27(2), 705–713 (2011)CrossRefGoogle Scholar
  27. 27.
    Lenhart, A., et al.: Social Media & Mobile Internet Use Among Teens and Young Adults. Pew Internet & American Life Project, Washington D.C. (2010)Google Scholar
  28. 28.
    Marwick, A.E., boyd, d.: Networked privacy: how teenagers negotiate context in social media. New Media Soc. 16(7), 1051–1067 (2014)CrossRefGoogle Scholar
  29. 29.
    Deirmenjian, J.M.: Stalking in cyberspace. J. Am. Acad. Psychiatry Law Online 27(3), 407–413 (1999)Google Scholar
  30. 30.
    Dreßing, H., et al.: Cyberstalking in a large sample of social network users: prevalence, characteristics, and impact upon victims. Cyberpsychology Behav. Soc. Netw. 17(2), 61–67 (2014)CrossRefGoogle Scholar
  31. 31.
    Besmer, A., Richter Lipford, H.: Moving beyond untagging: photo privacy in a tagged world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM (2010)Google Scholar
  32. 32.
    Brandtzæg, P.B., Lüders, M., Skjetne, J.H.: Too many Facebook “friends”? Content sharing and sociability versus the need for privacy in social network sites. Intl. J. Human-Computer Interact. 26(11–12), 1006–1030 (2010)CrossRefGoogle Scholar
  33. 33.
    Madejski, M., Johnson, M.L., Bellovin, S.M.: The failure of online social network privacy settings (2011)Google Scholar
  34. 34.
    Liu, Y., et al.: Analyzing Facebook privacy settings: user expectations vs. reality. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference. ACM (2011)Google Scholar

Copyright information

© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2016

Authors and Affiliations

  • Francis Otto
    • 1
    Email author
  • Nurul Amin Badrul
    • 1
  • Shirley Williams
    • 1
  • Karsten Øster Lundqvist
    • 1
  1. 1.School of Systems EngineeringUniversity of ReadingReadingUK

Personalised recommendations