Skip to main content
Log in

Why some people do not use Facebook?

  • Original Article
  • Published:
Social Network Analysis and Mining Aims and scope Submit manuscript

Abstract

Facebook is the most pervasive social network in the world. While, we would commonly expect everyone who has access to the Internet to use Facebook, some people have chosen not to join or to opt-out of its services. This qualitative study is an effort to understand the justifications that drive their decision. Based on in-depth semi-structured interviews, several recurring reasons were identified for Facebook non-use. Some results obtained are truly consistent with previous research. These include perceived security issues and safety risks, absence of trust, privacy concerns, influence of important others, lack of control, uselessness, availability of alternatives, lack of interest, and inappropriate content. However, some findings, such as one’s attitude toward the Facebook company and online social connectedness, diverge from previously published work. There is also enough evidence in the results to support the existence of additional contributing reasons for the rejection of Facebook that have not been directly reported before. These include religious beliefs, influence of culture, and a concern toward one’s information being available online: a point that we do put forward for further inquiry.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • Acar A, Nishimuta A, Takamuea D, Sakamoto K, Muraki Y (2012) Qualitative analysis of Facebook quitters in Japan. In: Proceedings of the eight international conference on eLearning for knowledge-based society, pp 23–24

  • Ajzen I (1991) The theory of planned behavior. Organ Behav Hum Decis Process 50:179–211

    Article  Google Scholar 

  • Amor A (2009) Study on freedom of religion or belief and the status of women in light of religion and traditions. United Nations: Geneva. http://www.wunrn.com/un_study/english.pdf. Accessed 05 May 2017

  • Asher J (1999) Small business: suddenly everyone wants a piece of it. ABA Bank J 91:28–31

    Google Scholar 

  • Baker RK, White KM (2011) In their own words: why teenagers don’t use social networking sites. Cyberpsychol Behav Soc Netw 14:395–398

    Article  Google Scholar 

  • Barnes SB (2006) A privacy paradox: social networking in the United States. First Monday 11:1–14

    Article  Google Scholar 

  • Barrick MR, Mount MK (1996) Effects of impression management and self-deception on the predictive validity of personality constructs. J Appl Psychol 81:261–272

    Article  Google Scholar 

  • Bauman Z, Bigo D, Esteves P, Guild E, Jabri V, Lyon D, Walker RBJ (2014) After snowden: rethinking the impact of surveillance. Int Political Sociol 8:121–144. https://doi.org/10.1111/ips.12048

    Article  Google Scholar 

  • Baumer EPS, Adams P, Khovanskaya VD, Liao TC, Smith ME, Sosik VS, Williams K (2013) Limiting, leaving, and (re)lapsing: an exploration of Facebook non-use practices and experiences. Paper presented at the proceedings of the SIGCHI conference on human factors in computing systems, Paris, France

  • Berg BL (2009) Qualitative research methods for the social sciences, 7th edn. Allyn & Bacon, Boston

    Google Scholar 

  • Bilge L, Strufe T, Balzarotti D, Kirda E (2009) All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th international conference on World Wide Web. ACM, pp 551–560

  • Blank G, Bolsover G, Dubois E (2014) A new privacy paradox: young people and privacy on social network sites. Global Cyber Security Capacity Centre and Oxford Internet Institute: Draft Working Paper. University of Oxford, Oxford, UK

  • Boismenu G, Beaudry G (2004) Scholarly journals in the new digital world, 1st edn. University of Calgary Press, Calgary

    Book  Google Scholar 

  • Brown DJ (2005) Conversations on the edge of the apocalypse: contemplating the future with Noam Chomsky, George Carlin, Deepak Chopra, Rupert Sheldrake, and others, 1st edn. Palgrave Macmillan, New York

    Google Scholar 

  • Buchmann JA (2013) Privacy threats and their impact on the core values. In: Buchmann JA (ed) Internet privacy: options for adequate realisation, 1st edn. Springer, Berlin, pp 61–71. https://doi.org/10.1007/978-3-642-37913-0_5

    Chapter  Google Scholar 

  • Buckman R (2005) Too much information? Colleges fear student postings on popular ‘Facebook’ Site could pose security risks, 8 December 2005. The Wall Street Journal. https://www.wsj.com/articles/SB113400519172816925. Accessed 02 March 2017

  • Butler K (2010) Tweeting your own horn. Dist Adm 46:41–44

    Google Scholar 

  • Campbell AJ, Cumming SR, Hughes I (2006) Internet use by the socially fearful: addiction or therapy? Cyberpsychol Behav 9:69–81

    Article  Google Scholar 

  • Caplan SE (2006) Relations among loneliness, social anxiety, and problematic Internet use. Cyberpsychol Behav 10:234–242

    Article  Google Scholar 

  • Cassell J, Cramer M (2008) High tech or high risk: moral panics about girls online. In: McPherson T (ed) Digital youth, innovation, and the unexpected. The John D. and Catherine T. MacArthur Foundation Series on Digital Media and Learning, 1st edn. MIT Press, Cambridge, MA, pp 53–76

    Google Scholar 

  • Catanzaro MF (2011) Indirect aggression, bullying and female teen victimization: a literature review. Pastor Care Educ 29:83–101

    Article  Google Scholar 

  • Chen Y-J, Chen P-C (2007) Effects of online interaction on adult students’ satisfaction and learning. J Hum Resource Adult Learn 3:78–89

    Google Scholar 

  • Christofides E, Muise A, Desmarais S (2009) Information disclosure and control on Facebook: are they two sides of the same coin or two different processes? Cyberpsychol Behav 12:341–345

    Article  Google Scholar 

  • Chu S-C, Choi SM (2010) Social capital and self-presentation on social networking sites: a comparative study of Chinese and American young generations. Chin J Commun 3:402–420. https://doi.org/10.1080/17544750.2010.516575

    Article  Google Scholar 

  • Creswell JW (2009) Research design: qualitative, quantitative, and mixed methods approaches, 3rd edn. Sage Publications Inc, Thousand Oaks, California

    Google Scholar 

  • De Sousa R (1988) Emotion and self-deception. In: McLaughlin BP, Rorty AO (eds) Perspectives on self-deception, 1st edn. University of California Press, Berkeley, pp 324–341

    Google Scholar 

  • Deibert R (2014) Foreword. In: Ratto M, Boler M (eds) DIY citizenship: critical making and social media, 1st edn. MIT Press, Cambridge, MA

    Google Scholar 

  • Deuker A (2012) Friend-to-friend privacy protection on social networking sites: a grounded theory study. In: Proceedings of the eighteenth Americas conference on information systems (AMCIS2012), paper 5, pp 1–7

  • Dholakiaa UM, Bagozzia RP, Pearo LK (2004) A social influence model of consumer participation in network- and small-group-based virtual communities. Int J Res Mark 21:241–263

    Article  Google Scholar 

  • Dindar M, Akbulut Y (2014) Why do pre-service teachers quit Facebook? An investigation on ‘quitters forever’ and ‘quitters for a while’. Comput Hum Behav 39:170–176

    Article  Google Scholar 

  • Ellison NB, Vitak J, Steinfield C, Gray R, Lampe C (2011) Negotiating privacy concerns and social capital needs in a social media environment. In: Trepte S, Reinecke L (eds) Privacy online: perspectives on privacy and self-disclosure in the social web, 1st edn. Springer, Berlin, pp 19–32. https://doi.org/10.1007/978-3-642-21521-6_3

    Chapter  Google Scholar 

  • Emmett L (2011) WikiLeaks revelations only tip of iceberg—Assange. Autonomous Nonprofit Organization. https://www.rt.com/news/wikileaks-revelations-assange-interview/. Accessed 07 April 2017

  • Facebook (2017) Company info. https://newsroom.fb.com/company-info/. Accessed 14 Oct 2017

  • Farwell JP (2014) The media strategy of ISIS. Survival 56:49–55. https://doi.org/10.1080/00396338.2014.985436

    Article  Google Scholar 

  • Fox J, Moreland JJ (2015) The dark side of social networking sites: an exploration of the relational and psychological stressors associated with Facebook use and affordances. Comput Hum Behav 45:168–176. https://doi.org/10.1016/j.chb.2014.11.083

    Article  Google Scholar 

  • Freitas D (2017) The happiness effect: how social media is driving a generation to appear perfect at any cost, 1st edn. Oxford University Press, New York, NY

    Google Scholar 

  • Frier S (2014) Facebook $22 billion WhatsApp deal buys $10 million in sales. Bloomberg. https://www.forbes.com/sites/parmyolson/2014/10/06/facebook-closes-19-billion-whatsapp-deal/#4a5dcf7b5c66. Accessed 02 May 2017

  • Fusco SJ, Michael K, Roba A, Aloudat A (2012) Location-based social networking: impact on trust in relationships. IEEE Technol Soc Mag 31:39–50

    Article  Google Scholar 

  • Gerbaudo P (2012) Tweets and the streets: social media and contemporary activism, 1st edn. Pluto Press, London

    Google Scholar 

  • Gilbert E, Karahalios K (2009) Predicting the future with social media. In: SIGCHI conference on human factors in computing systems (CHI ‘09), Boston, MA, USA, 4–9 April 2009, pp 492–499. https://doi.org/10.1109/wi-iat.2010.63

  • Goodrich K, de Mooij M (2014) How ‘social’ are social media? A cross-cultural comparison of online and offline purchase decision influences. J Mark Commun 20:103–116. https://doi.org/10.1080/13527266.2013.797773

    Article  Google Scholar 

  • Grieve R, Indian M, Witteveen K, Anne Tolan G, Marrington J (2013) Face-to-face or Facebook: can social connectedness be derived online? Comput Hum Behav 29:604–609. https://doi.org/10.1016/j.chb.2012.11.017

    Article  Google Scholar 

  • Gross R, Acquisti A (2005) Information revelation and privacy in online social networks (the Facebook case). In: ACM workshop on privacy in the electronic society (WPES), Alexandria, VA, USA, 7 Nov 2005

  • Halpern S (2018) Cambridge Analytica, Facebook, and the revelations of open secrets. The New Yorker, New York

    Google Scholar 

  • Hannigan R (2014) The web is a terrorist’s command-and-control network of choice. The Financial Times Ltd. http://www.ft.com/cms/s/2/c89b6c58-6342-11e4-8a63-00144feabdc0.html. Accessed 14 May 2017

  • Hill K (2012) 10 Reasons why Facebook bought Instagram. Forbes. https://www.forbes.com/sites/kashmirhill/2012/04/11/ten-reasons-why-facebook-bought-instagram/#6f4edec5d1b1. Accessed 02 May 2017

  • Hoadley CM, Xu H, Lee JJ, Rosson MB (2010) Privacy as information access and illusory control: the case of the Facebook News Feed privacy outcry. Electron Commer Res Appl 9:50–60

    Article  Google Scholar 

  • Howard PN, Hussain MM (2013) Democracy’s fourth wave? Digital media and the Arab Spring, 1st edn. Oxford University Press, Oxford

    Book  Google Scholar 

  • Howard PN, Duffy A, Freelon D, Hussain M, Mari W, Mazaid M (2011) Opening closed regimes: what was the role of social media during the Arab Spring? Working paper. The Project on Information Technology and Political Islam, Center for Communication and Civic Engagement, University of Washington

  • Indian M, Grieve R (2014) When Facebook is easier than face-to-face: social support derived from Facebook in socially anxious individuals. Personal Individ Differ 59:102–106. https://doi.org/10.1016/j.paid.2013.11.016

    Article  Google Scholar 

  • Inkster N (2015) Cyber attacks in La-La Land. Survival 57:105–116. https://doi.org/10.1080/00396338.2015.1008301

    Article  Google Scholar 

  • Johnson JM (2001) In-depth interviewing. In: Gubrium J, Holstein J (eds) Handbook of interview research: context and method, 1st edn. SAGE Publications, Thousand Oaks, CA, pp 103–119. https://doi.org/10.4135/9781412973588.n8

    Chapter  Google Scholar 

  • Johnson B (2010) Privacy no longer a social norm, says Facebook founder. https://www.theguardian.com/technology/2010/jan/11/facebook-privacy. Accessed 18 May 2017

  • Jones H, Soltren JH (2005) Facebook: threats to privacy [working paper]. MIT Press, Cambridge, MA

    Google Scholar 

  • Joseph N, Stone B (2005) Diagnosis: internet phobia. Newsweek 145:74

    Google Scholar 

  • Kaba B, Osei-Bryson K-M (2013) Examining influence of national culture on individuals’ attitude and use of information and communication technology: assessment of moderating effect of culture through cross countries study. Int J Inf Manag 33:441–452. https://doi.org/10.1016/j.ijinfomgt.2013.01.010

    Article  Google Scholar 

  • Kay AC, Gaucher D, Peach JM, Laurin K, Friesen J, Zanna MP, Spencer SJ (2009) Inequality, discrimination, and the power of the status quo: direct evidence for a motivation to see the way things are as the way they should be. J Pers Soc Psychol 97:421–434. https://doi.org/10.1037/a0015997

    Article  Google Scholar 

  • Khondker HH (2011) Role of the new media in the Arab Spring. Globalizations 8:675–679. https://doi.org/10.1080/14747731.2011.621287

    Article  Google Scholar 

  • Kierkegaard P (2008) Fear of e-shopping? Anxiety or phobia? Int J Technol Transf Commer 7:83–90. https://doi.org/10.1504/ijttc.2008.018804

    Article  Google Scholar 

  • Lee N (2012) Facebook nation: total information awareness, 1st edn. Springer, New York

    Google Scholar 

  • Lee-Won RJ, Shim M, Joo YK, Park SG (2014) Who puts the best “face” forward on Facebook?: positive self-presentation in online social networking and the role of self-consciousness, actual-to-total friends ratio, and culture. Comput Hum Behav 39:413–423. https://doi.org/10.1016/j.chb.2014.08.007

    Article  Google Scholar 

  • Lim M (2012) Clicks, cabs, and coffee houses: social media and oppositional movements in Egypt, 2004–2011. J Commun 62:231–248. https://doi.org/10.1111/j.1460-2466.2012.01628.x

    Article  Google Scholar 

  • Lyon D (2014) Surveillance, snowden, and big data: capacities, consequences, critique. Big Data Soc 1:1–13. https://doi.org/10.1177/2053951714541861

    Article  Google Scholar 

  • Mandl T (2010) Cultural and international aspects of social media. In: Papadopoulou P, Kanellis P, Martakos D (eds) Social computing theory and practice: interdisciplinary approaches, 1st edn. IGI Global, Hershey, pp 54–66

    Chapter  Google Scholar 

  • Marshall C, Rossman GB (1999) Designing qualitative research, 3rd edn. Sage, Thousand Oaks, California

    Google Scholar 

  • Marshall B, Cardon P, Poddar A, Fontenot R (2013) Does sample size matter in qualitative research?: a review of qualitative interviews in IS research. J Comput Inf Syst 54:11–22

    Google Scholar 

  • Mayer RC, Davis JH, Schoorman FD (1995) An integrative model of organizational trust. Acad Manag Rev 20:709–734

    Article  Google Scholar 

  • Michael M, Michael K (2009) Uberveillance: microchipping people and the assault on privacy. Quadrant 53:85–89

    Google Scholar 

  • Miles MB, Huberman AM (1994) Qualitative data analysis: an expanded sourcebook, 2nd edn. SAGE Publications Inc, Thousand Oaks, CA

    Google Scholar 

  • Miniwatts Marketing Group (2017) The internet big picture world internet users and 2017 population stats. http://www.internetworldstats.com/stats.htm. Accessed 14 Oct 2017

  • Montermini F (2005) Facebook raises privacy concerns, 29 November 2005. The Trinity Tripod. www.trinitytripod.com/news/facebook-raises-privacy-concerns-1.2171322%23.UiOwU33LfK4. Accessed 02 March 2017

  • Nissen TE (2014) Terror.com—IS’s social media warfare in Syria and Iraq. Mil Stud Mag 2:1–8

    Google Scholar 

  • Park J, Baek YM, Cha M (2014) Cross-cultural comparison of nonverbal cues in emoticons on twitter: evidence from big data analysis. J Commun 64:333–354. https://doi.org/10.1111/jcom.12086

    Article  Google Scholar 

  • Patton MQ (2015) Qualitative research & evaluation methods, 4th edn. SAGE Publications Inc, Thousand Oaks, CA

    Google Scholar 

  • Paulhus DL (1984) Two-component models of socially desirable responding. J Pers Soc Psychol 46:598–609

    Article  Google Scholar 

  • Paulhus DL, Reid DB (1991) Enhancement and denial in socially desirable responding. J Pers Soc Psychol 60:307–371

    Article  Google Scholar 

  • Phillips S (2007) A brief history of Facebook, 25 July. The Guardian. https://www.theguardian.com/technology/2007/jul/25/media.newmedia. Accessed 02 March 2017

  • Rainie L, Smith A, Duggan M (2013) Coming and going on Facebook. Pew Research Center on Internet and American Life Project. www.pewinternet.org/files/old-media/…/PIP_Coming_and_going_on_facebook.pdf. Accessed 02 Feb 2017

  • Reisenwitz T, Iyer R, Kuhlmeier DB, Eastman JK (2007) The elderly’s internet usage: an updated look. J Consum Mark 24:406–418. https://doi.org/10.1108/07363760710834825

    Article  Google Scholar 

  • Rogers CR (1964) Toward a modern approach to values: the valuing process in the mature person. J Abnorm Soc Psychol 68:160–167

    Article  Google Scholar 

  • Ross CE, Mirowsky J (2006) Social structure and psychological functioning. In: Delamater J (ed) Handbook of social psychology, 1st edn. Springer, Boston, MA, pp 411–447. https://doi.org/10.1007/0-387-36921-x_17

    Chapter  Google Scholar 

  • Ryan T, Xenos S (2011) Who uses Facebook? An investigation into the relationship between the Big Five, shyness, narcissism, loneliness, and Facebook usage. Comput Hum Behav 27:1658–1664. https://doi.org/10.1016/j.chb.2011.02.004

    Article  Google Scholar 

  • Saranow J (2004) Consumer technology: memo to web sites: grow up! As more older consumers go online, online operators would do well to stop thinking so young. Wall Street J 15:14–25

    Google Scholar 

  • Satu J-P, Teija V (2012) Framing the context of use for mobile HCI. In: Joanna L (ed) Social and organizational impacts of emerging mobile devices: evaluating use. IGI Global, Hershey, PA, pp 217–248. https://doi.org/10.4018/978-1-4666-0194-9.ch013

    Chapter  Google Scholar 

  • Sealy W (2005) What Facebook doesn’t tell you. https://digitalarchive.wm.edu/bitstream/10288/92/2/fh20051104.pdf. Accessed 02 March 2017

  • Seeman M (1983) Alienation motifs in contemporary theorizing: the hidden continuity of the classic themes. Soc Psychol Q 46:171–184. https://doi.org/10.2307/3033789

    Article  Google Scholar 

  • Senarath A, Arachchilage NAG, Slay J (2017) Designing privacy for you: a user centric approach for privacy. In: 19th international conference on human–computer interaction, Vancouver, Canada, 12–14 July 2017

  • Sharma R, Jain A, Rastogi R (2013) A new face to photo security of Facebook. In: 2013 sixth international conference on contemporary computing (IC3), Noida, India, 8–10 August 2013. IEEEXplore, pp 415–420. https://doi.org/10.1109/ic3.2013.6612231

  • Sheldon P (2012) Profiling the non-users: examination of life-position indicators, sensation seeking, shyness, and loneliness among users and non-users of social network sites. Comput Hum Behav 28:1960–1965. https://doi.org/10.1016/j.chb.2012.05.016

    Article  Google Scholar 

  • Shelton AK, Skalski P (2014) Blinded by the light: illuminating the dark side of social network use through content analysis. Comput Hum Behav 33:339–348

    Article  Google Scholar 

  • Silverman D (2006) Interpreting qualitative data: methods for analysing talk, text and interaction, 3rd edn. Sage Publications Ltd., London

    Google Scholar 

  • Smith HJ, Milberg SJ, Burke SJ (1996) Information privacy: measuring individuals’ concerns about organizational practices. MIS Q 20:167–196

    Article  Google Scholar 

  • Spector PE, O’Connell BJ (1994) The contribution of personality traits, negative affectivity, locus of control and Type A to the subsequent reports of job stressors and job strains. J Occup Organ Psychol 67:1–12

    Article  Google Scholar 

  • Stampler L (2017) How ISIS uses social media to their advantage: it’s easier than you think. TeenVogue. http://www.teenvogue.com/story/how-isis-uses-social-media-to-their-advantage. Accessed 14 May 2017

  • Stieger S, Burger C, Bohn M, Voracek M (2013) Who commits virtual identity suicide? Differences in privacy concerns, internet addiction, and personality between Facebook users and quitters. Cyberpsychol Behav Soc Netw 16:629–634

    Article  Google Scholar 

  • Suzuki S, Takemura K (2013) Culture and social media: exploration of differences between the United States and Japan. In: Olivas-Luján MR, Bondarouk T (eds) Social media in strategic management—advanced series in management, vol 11, 1st edn. Emerald Group Publishing Limited, Bingley, pp 245–258. https://doi.org/10.1108/s1877-6361(2013)0000011016

    Chapter  Google Scholar 

  • Taddicken M (2014) The ‘Privacy Paradox’ in the social web: the impact of privacy concerns, individual characteristics, and the perceived social relevance on different forms of self-disclosure. J Comput-Mediated Commun 19:248–273

    Article  Google Scholar 

  • Tan X, Qin L, Kim Y, Hsu J (2012) Impact of privacy concern in social networking web sites. Internet Res 22:211–233. https://doi.org/10.1108/10662241211214575

    Article  Google Scholar 

  • Trifu A (2012) A modern microeconomic approach of commerce. Bus Excell Manag 2:31–38

    Google Scholar 

  • Turan Z (2013) The reasons for non-use of social networking websites by university students/Razones por las que los alumnos universitarios no utilizan las redes sociales. Comunicar 21:137–145 (English edition)

    Article  Google Scholar 

  • van Dijck J (2014) Datafication, dataism and dataveillance: big data between scientific paradigm and ideology. Surveill Soc 12:97–208

    Google Scholar 

  • van Houtum H (2011) The mask of the border. In: Wastl-Walter D (ed) The Ashgate research companion to border studies, 1st edn. Routledge, Abingdon-on-Thames, pp 49–62

    Google Scholar 

  • Venkatesh V, Morris MG, Davis FD, Davis GB (2003) User acceptance of information technology: toward a unified view. MIS Q 27:425–478

    Article  Google Scholar 

  • Waiyahong N (2014) The use of “Facebook” to build an LIS student learning community. Procedia Soc Behav Sci 147:98–103. https://doi.org/10.1016/j.sbspro.2014.07.124

    Article  Google Scholar 

  • Weir GRS, Toolan F, Smeed D (2011) The threats of social networking: old wine in new bottles? Inf Secur Tech Rep 16:38–43. https://doi.org/10.1016/j.istr.2011.09.008

    Article  Google Scholar 

  • Wischenbart M et al (2012) User profile integration made easy: model-driven extraction and transformation of social network schemas. In: Proceedings of the 21st international conference on World Wide Web—WWW ‘12 Companion Lyon, France, 16–20 April 2012. ACM Digital Library, pp 939–948

  • Witte DS (2013) Bleeding data in a pool of sharks: the anathema of privacy in a world of digital sharing and electronic discovery. S C Law Rev 64:717

    Google Scholar 

  • Wolfsfeld G, Segev E, Sheafer T (2013) Social media and the Arab spring: politics comes first. Int J Press/Politics 18:115–137. https://doi.org/10.1177/1940161212471716

    Article  Google Scholar 

  • Wong D, Loh C, Yap K, Bak R (2009) The moderating role of perceived risk on trust in E-banking. Working paper series, School of Marketing, Curtin University of Technology, pp 1–24

  • Woollaston V (2013) Facebook users are committing ‘virtual identity suicide’ in droves and quitting the site over privacy and addiction fears. Associated Newspapers Ltd., London

    Google Scholar 

  • Zheleva E, Getoor L (2009) To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of the 18th international conference on World Wide Web, Madrid, Spain, 20–24 April 2009, pp 531–540

  • Zolkepli IA, Kamarulzaman Y (2015) Social media adoption: the role of media needs and innovation characteristics. Comput Hum Behav 43:189–209. https://doi.org/10.1016/j.chb.2014.10.050

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anas Aloudat.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Aloudat, A., Al-Shamaileh, O. & Michael, K. Why some people do not use Facebook?. Soc. Netw. Anal. Min. 9, 19 (2019). https://doi.org/10.1007/s13278-019-0564-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13278-019-0564-z

Keywords

Navigation