Skip to main content

Dark Side of Online Social Networks: Technical, Managerial, and Behavioral Perspectives

  • Reference work entry
  • First Online:
Encyclopedia of Social Network Analysis and Mining

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 2,500.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Acquisti A, Gross R (2006) Imagined communities: awareness, information sharing, and privacy on the Facebook. In: Danezis G, Golle P (eds) Privacy enhancing technologies: 6th international workshop, PET 2006, Cambridge, UK, June 28–30, 2006, revised selected papers. Springer, Berlin/Heidelberg, pp 36–58. https://doi.org/10.1007/11957454_3

    Google Scholar 

  • Addas S, Pinsonneault A (2015) The many faces of information technology interruptions: a taxonomy and preliminary investigation of their performance effects. Inf Syst J 25(3):231–273

    Article  Google Scholar 

  • Ajzen I (1991) The theory of planned behavior. Organ Behav Hum Decis Process 50:179–211

    Article  Google Scholar 

  • Altshuler Y, Elovici Y, Cremers AB, Aharony N, Pentland A (eds) (2013) Security and privacy in social networks. Springer, New York. https://doi.org/10.1007/978-1-4614-4139-7

    Google Scholar 

  • Andreassen CS, Torsheim T, Brunborg GS, Pallesen S (2012) Development of a Facebook addiction scale. Psychol Rep 110(2):501–517

    Article  Google Scholar 

  • Baltazar J, Costoya J, Flores R (2009) The real face of Koobface: the largest web 2.0 botnet explained. Trend Micro Res 5(9):10

    Google Scholar 

  • Bandura A (1991) Social cognitive theory of self-regulation. Organ Behav Hum Decis Process 50(2):248–287

    Article  Google Scholar 

  • Becker GS, Murphy KM (1988) A theory of rational addiction. J Polit Econ 96(4):675–700

    Article  Google Scholar 

  • Benbasat I, Zmud RW (1999) Benbasat 1999 empirical research in information systems the practice of relevance.pdf. MIS Q 23(1):3–16

    Article  Google Scholar 

  • Brandtzaeg PB, Lüders M, Skjetne JH (2010) Too many Facebook “friends”? Content sharing and sociability versus the need for privacy in social network sites. Intl J Human–Comput Interact 26:11–12

    Article  Google Scholar 

  • Buckels EE, Trapnell PD, Paulhus DL (2014) Trolls just want to have fun. Pers Individ Dif 67:97–102

    Article  Google Scholar 

  • Cavoukian A (2010) Privacy by design. Identity Inf Soc 3(2):1–12

    Google Scholar 

  • Cenfetelli RT, Schwarz A (2011) Identifying and testing the inhibitors of technology usage intentions. Inf Syst Res 22(4):808–823

    Article  Google Scholar 

  • Chbeir R, Al Bouna B (eds) (2013) Security and privacy preserving in social networks, Lecture notes in social networks. Springer. https://doi.org/10.1007/978-3-7091-0894-9

    Google Scholar 

  • Chin WW (1998) The partial least squares approach to structural equation modeling. Mod Methods Bus Res 295(2):295–336

    Google Scholar 

  • Choi SB, Lim MS (2016) Effects of social and technology overload on psychological well-being in young south Korean adults: the mediatory role of social network service addiction. Comput Human Behav 61:245–254

    Article  Google Scholar 

  • Coburn PI, Connolly DA, Roesch R (2015) Cyberbullying: is federal criminal legislation the solution? Can J Criminol Crim Justice 57(4):566–579

    Article  Google Scholar 

  • D’Arcy J, Herath T, Shoss MK (2014) Understanding employee responses to stressful information security requirements: a coping perspective. J Manag Inf Syst 31(2):285–318

    Article  Google Scholar 

  • Davis FD (1989) Perceived usefulness, perceived ease of use, and user accep. MIS Q 13(3):319

    Article  Google Scholar 

  • Deci EL, Ryan RM (2000) The ‘what’ and “why of goal pursuits”. Psychol Inq 11:227–268

    Article  Google Scholar 

  • Directive 95/46/EC of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data (24AD) Directive 95/46/EC of the European parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data. European Union

    Google Scholar 

  • Dunbar RIM (1992) Neocortex size as a constraint on group size in primates. J Hum Evol 22(6):469–493

    Article  Google Scholar 

  • Elmagarmid AK, Ipeirotis PG, Verykios VS (2007) Duplicate record detection: a survey. IEEE Trans Knowl Data Eng 19(1):1–16

    Article  Google Scholar 

  • Faghani MR, Nguyen UT (2013) A study of malware propagation via online social networking. In: Özyer T, Erdem Z, Rokne J, Khoury S (eds) Mining social networks and security informatics. Springer Netherlands, Dordrecht, pp 243–265. https://doi.org/10.1007/978-94-007-6359-3_13

    Chapter  Google Scholar 

  • Felt A, Ha E, Egelman S, Haney A (2012) Android permissions: user attention, comprehension, and behavior. In: SOUPS ‘12 proceedings of the eighth symposium on usable privacy and security, pp 1–16

    Google Scholar 

  • Fire M, Kagan D, Elyashar A, Elovici Y (2014) Friend or foe? Fake profile identification in online social networks. Soc Netw Anal Min 4(1):1–23

    Article  Google Scholar 

  • Fornell C, Cha J (1994) Partial least squares. Adv Methods Mark Res 407:52–78

    Google Scholar 

  • Fornell C, Larcker DF (1981) Structural equation models with unobservable variables and measurement error: algebra and statistics. J Mark Res 18(3):382–388

    Article  Google Scholar 

  • Fox J, Moreland JJ (2015) The dark side of social networking sites: an exploration of the relational and psychological stressors associated with Facebook use and affordances. Comput Human Behav 45:168–176

    Article  Google Scholar 

  • Gao H, Hu J, Huang T, Wang J, Chen Y (2011) Security issues in online social networks. IEEE Internet Comput 15(4):56–63. https://doi.org/10.1109/MIC.2011.50

    Article  Google Scholar 

  • Germonprez M, Hovorka DS (2013) Member engagement within digitally enabled social network communities: new methodological considerations. Inf Syst J 23(6):525–549

    Article  Google Scholar 

  • Gironda JT, Korgaonkar PK (2016) Understanding consumers’ social networking site usage. J Market Manag, 30(5–6):571–605

    Article  Google Scholar 

  • Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. Presented at the proceedings of the 2005 ACM workshop on privacy in the electronic society. ACM, New York, pp 71–80. https://doi.org/10.1145/1102199.1102214

  • Hair JF, Sarstedt M, Ringle CM, Mena JA (2012) An assessment of the use of partial least squares structural equation modeling in marketing research. J Acad Mark Sci 40(3):414–433

    Article  Google Scholar 

  • Hendrikx F, Bubendorfer K, Chard R (2015) Reputation systems: a survey and taxonomy. J Parallel Distrib Comput 75:184–197

    Article  Google Scholar 

  • Ifinedo P (2016) Applying uses and gratifications theory and social influence processes to understand students’ pervasive adoption of social networking sites: perspectives from the Americas. Int J Inf Manag 36(2):192–206

    Article  Google Scholar 

  • Kefi H, Mlaiki A, Kalika M (2016) Understanding the phenomenon of dependence on digital social networks: the effects of habit and information overload in the case of Facebook – Comprendre le Phénomène de Dépendance envers les Réseaux Sociaux Numériques : les Effets de l’Habitude et de la surcharge Informationnelle dans le cas de Facebook. Systèmes d’information Manag 21(4):7

    Article  Google Scholar 

  • Kelley PG, Consolvo S, Cranor LF, Jung J, Sadeh N, Wetherall D (2012) A conundrum of permissions: Installing applications on an android smartphone. In: Blyth J, Dietrich S, and Camp LJ (eds), Financial cryptography and data security. FC 2012. Lecture Notes in Computer Science, vol 7398. Springer, Berlin, Heidelberg

    Chapter  Google Scholar 

  • Kelman HC (1958) Compliance, identification, and internalization three processes of attitude change. J Confl Resolut 2(1):51–60

    Article  Google Scholar 

  • Kowalski RM, Giumetti GW, Schroeder AN, Lattanner MR (2014) Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth. Psychol Bull 140(4):1073–1137

    Article  Google Scholar 

  • Kuss DJ, Griffiths MD (2011) Online social networking and addiction-a review of the psychological literature. Int J Environ Res Public Health 8(9):3528–3552

    Article  Google Scholar 

  • LaRose R, Eastin MS (2002) A social cognitive theory of internet uses and gratifications: toward a new model of media attendance. J Broadcast Electron Media 48(3):358–377. page 1 of 15

    Article  Google Scholar 

  • LaRose R, Lin CA, Eastin MS (2003) Unregulated internet usage: addiction, habit, or deficient self-regulation? Media Psychol 5(3):225–253

    Article  Google Scholar 

  • Layton R, Watters P, Dazeley R (2011) Automated unsupervised authorship analysis using evidence accumulation clustering. Nat Lang Eng 19(1):1–26

    Google Scholar 

  • Lazer D, Pentland A, Adamic L, Aral S, Barabasi A-L, Brewer D, Christakis N, Contractor N, Fowler J, Gutmann M, Jebara T, King G, Macy M, Roy D, Van Alstyne M (2009) Computational social science. Science 323(5915):721–723. (80- )

    Article  Google Scholar 

  • Lee SY (2014) How do people compare themselves with others on social network sites?: the case of Facebook. Comput Human Behav 32:253–260

    Article  Google Scholar 

  • Liben-Nowell D, Kleinberg J (2007) The link-prediction problem for social networks. J Am Soc Inf Sci Technol 58(7):1019–1031

    Article  Google Scholar 

  • Limayem M, Hirt S (2003) Force of habit and information systems usage: theory and initial validation. J Assoc Inf Syst 4:65–95

    Google Scholar 

  • Limayem M, Hirt SG, Cheung CMK (2007) How habit limits the predictive power of intention: the case of information systems continuance 1. MIS Q 31(4):705–737

    Article  Google Scholar 

  • Lü L, Zhou T (2011) Link prediction in complex networks: a survey. Phys A Stat Mech its Appl 390(6):1150–1170

    Article  Google Scholar 

  • Maier C, Laumer S, Weinert C, Weitzel T (2015a) The effects of technostress and switching stress on discontinued use of social networking services: a study of Facebook use. Inf Syst J 25(3):275–308

    Article  Google Scholar 

  • Maier C, Laumer S, Eckhardt A, Weitzel T (2015b) Giving too much social support: social overload on social networking sites. Eur J Inf Syst 24(5):447–464

    Article  Google Scholar 

  • Maltby J, Day L, Hatcher RM, Tazzyman S, Flowe HD, Palmer EJ, Frosch CA, O’Reilly M, Jones C, Buckley C, Knieps M, Cutts K (2016) Implicit theories of online trolling: evidence that attention-seeking conceptions are associated with increased psychological resilience. Br J Psychol 107(3):448–466

    Article  Google Scholar 

  • Mäntymäki M, Islam AKMN (2016) The janus face of Facebook: positive and negative sides of social networking site use. Comput Human Behav 61:14–26

    Article  Google Scholar 

  • Mislove A, Marcon M, Gummadi KP, Druschel P, Bhattacharjee B 2007 Measurement and analysis of online social networks. In: Proceedings of 7th ACM SIGCOMM conference internet measurement – IMC ‘07, pp 29–42

    Google Scholar 

  • Moore GC, Benbasat I (1991) Development of an instrument to measure the perceptions of adopting an information technology innovation. Inf Syst Res 2:192–220

    Article  Google Scholar 

  • Nosko A, Wood E, Molema S (2010) All about me: disclosure in online social networking profiles: the case of Facebook. Comput Hum Behav 26(3):406–418. https://doi.org/10.1016/j.chb.2009.11.012

    Article  Google Scholar 

  • Nunnally J, Bernstein I (1994) Psychometric theory, 3rd edn, 1994, vol 3. McGraw-Hill, New York, p 701

    Google Scholar 

  • Opinion 5/2009 on online social networking. EU, Adopted on 12 June 2009, Article 29 data protection working party. http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2009/wp163_en.pdf

  • Page L, Brin S, Motwani R, Winograd T (1998) The PageRank citation ranking: bringing order to the web. World Wide Web Internet Web Inf Syst 54(1999–66):1–17

    Google Scholar 

  • Paulhus DL, Williams KM (2002) The dark triad of personality: narcissism, Machiavellianism, and psychopathy. J Res Pers 36(6):556–563

    Article  Google Scholar 

  • Pempek TA, Yermolayeva YA, Calvert SL (2009) College students’ social networking experiences on Facebook. J Appl Dev Psychol 30(3):227–238

    Article  Google Scholar 

  • Raskin R, Terry H (1988) A principal-components analysis of the narcissistic personality inventory and further evidence of its construct validity. J Pers Soc Psychol 54(5):890–902

    Article  Google Scholar 

  • Rauthmann JF, Kolar GP (2012) How ‘dark’ are the dark triad traits? Examining the perceived darkness of narcissism, Machiavellianism, and psychopathy. Pers Individ Dif 53(7):884–889

    Article  Google Scholar 

  • Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (2016) Regulation (EU) 2016/679 of the European parliament and of the ouncil of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General data protection regulation). European Union, pp 1–88

    Google Scholar 

  • Rosenblum D (2007) What anyone can know: the privacy risks of social networking sites. IEEE Secur Priv Mag 5(3):40–49. https://doi.org/10.1109/MSP.2007.75

    Article  Google Scholar 

  • Ryan R, Deci E (2000) Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being. Am Psychol 55(1):68–78

    Article  Google Scholar 

  • Schultz U, Vandenbosch B (1998) Information overload in a groupware environment: now you see it, now you don’t. J Organ Comput Electron Commer 8(2):127–148

    Google Scholar 

  • Smith PK, Mahdavi J, Carvalho M, Fisher S, Russell S, Tippett N (2008) Cyberbullying: its nature and impact in secondary school pupils. J Child Psychol Psychiatry Allied Discip 49(4):376–385

    Article  Google Scholar 

  • de Sola Pool I, Kochen M (1978) Contacts and influence. Soc Networks 1(1):5–51

    Article  MathSciNet  Google Scholar 

  • Tarafdar M, Tu Q, Ragu-Nathan TS (2011) Impact of technostress on end-user satisfaction and performance. J Manag Inf Syst 27(3):303–334

    Article  Google Scholar 

  • Tarafdar M, Gupta A, Turel O (2013) The dark side of information technology use. Inf Syst J 23(3):269–275

    Article  Google Scholar 

  • Tarafdar M, Gupta A, Turel O (2015a) Special issue on ‘dark side of information technology use’: an introduction and a framework for research. Inf Syst J 25(3):161–170

    Article  Google Scholar 

  • Tarafdar M, Pullins EB, Ragunathan TS (2015b) Technostress: negative effect on performance and possible. Inf Syst J 25(2):103–132

    Article  Google Scholar 

  • Thomas K, Nicol DM (2010) The Koobface Botnet and the rise of social malware? In Proceedings of the 5th IEEE International Conference on Malicious and Unwanted Software, Malware 2010, pp. 63–70

    Google Scholar 

  • Travers J, Milgram S (1969) An experimental study of the small world problem. Sociometry 32(4):425–443

    Article  Google Scholar 

  • Tufekci Z (2008) Can you see me now? Audience and disclosure regulation in online social network sites. Bull Sci Technol Soc 28(1):20–36. https://doi.org/10.1177/0270467607311484

    Article  Google Scholar 

  • Turel O (2015) An empirical examination of the vicious cycle of Facebook addiction. J Comput Inf Syst 55(3):83–91

    Google Scholar 

  • Turel O, Qahri-Saremi H (2016) Problematic use of social networking sites: antecedents and consequence from a dual-system theory perspective. J Manag Inf Syst 33(4):1087–1116

    Article  Google Scholar 

  • Turel O, Serenko A, Giles P (2011) Integrating technology addiction and use: an empirical investigation of online auction users. MIS Q 35(4):1043–1061

    Article  Google Scholar 

  • Venkatesh V (2000) Determinants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance model. Inf Syst Res 11(4):342–365

    Article  Google Scholar 

  • Viswanath Venkatesh FDD, Morris MG, Davis GB, Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 27(3):425–478

    Article  Google Scholar 

  • Wang C, Lee MKO, Hua Z (2015) A theory of social media dependence: evidence from microblog users. Decis Support Syst 69:40–49

    Article  Google Scholar 

  • Young KS (1998) Internet addiction: the emergence of a new clinical disorder. CyberPsychology Behav 1(3):237–244

    Article  Google Scholar 

  • Zhang S, Yu L, Wakefield RL, Leidner DE (2016) Friend or Foe. ACM Sigmis Database 47(1):51–71

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hajer Kefi .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Kefi, H., Perez, C. (2018). Dark Side of Online Social Networks: Technical, Managerial, and Behavioral Perspectives. In: Alhajj, R., Rokne, J. (eds) Encyclopedia of Social Network Analysis and Mining. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-7131-2_110217

Download citation

Publish with us

Policies and ethics