A Project Report
Submitted in partial fulfillment of the requirements
For the Course of Research Method to
Dr. Irfan Hameed
At the Iqra University, Main Campus
Karachi, Pakistan.
DECEMBER 16, 2015
ii
Acknowledgements
We are thankful to Almighty Allah that through our prayers to him, our report is
Alhamdulillah completed.
We are very blessed to have our respected Sir Dr. Irfan Hameed as our Course
Instructor, without him we couldn’t have completed this report. It’s all because of his
research on our topic “Impact of Social Media on User’s Privacy” which helped in
evaluate and interpret the result. And we would also like to thank him for giving us
We are extremely thankful and would like to express our gratitude to our respected
SIR Dr. IRFAN HAMEED for guiding, encouraging and supporting us through this
course.
2
Abstract
The purpose of this study is to identify the impact of social media networks upon user
privacy. The social privacy have different sources that are used by social web sites to
collect their user personal information. The source used are cookies files,
Datavelliance, terms and conditions and the information disclosure. The hypotheses
that were develop were that cookies files, Datavelliance, and information disclosure
have negative relationship with the user privacy and terms and conditions have
positive relationship with user privacy. The findings generated were that cookies
files, Datavelliance and terms and conditions had positive relationship with the user
privacy and Information Disclosure had negative relationship with user privacy.
The data were collected from a sample of 100 students of IQRA University
which were selected by using the sampling method of Convenience Sampling. The
data was collected by self administed closed end questionnaire. As conclude the
cookies files and dataviellances have don’t affect the user privacy. It also concluded
that term and conditions and information disclosure affects on user privacy.
2
TABLES OF CONTENT
S.No. DESCRIPTION PAGE
NO.
1 Acknowledgements ii
2 Abstract iii
3 List of Tables v
4 List of Figures vi
5 Chapter 1: Introduction
1.1 Overview
1.2 Problem statement
1.3 Background
1.3.1 Objective
1.3.2 Significance of the study
1.4 Outline of the study
1.5 Definitions
6 Chapter 2: Literature Review
7 Chapter 3: Research Methods
3.1 Method of Data Collection
3.2 Sampling Technique
3.3 Sample size
3.4 Instrument of data collection
3.5 Research Model Develop
3.6 Statistical Technique
8 Chapter 4: Results
4.1 Findings and Interpretation of the results
4.2 Hypotheses Assessment Summary
9 Chapter 5: Discussions, Conclusion, Policy Implications and Future Research
5.1 Discussion
5.2 Conclusion
5.3 Policy Implications
5.4 Future Research
10 References
11 Appendix
2
LIST OF TABLES
S. DESCRIPTION PAGE
NO. NO.
1. 4.1.1 Regression Model Summary
2. 4.1.2 Analysis of Variance
3. 4.1.3 Co-efficient of Regression Equation
4. 4.2 Hypotheses Assessment
2
LIST OF FIGURE
S. DESCRIPTION PAGE
NO. NO.
1. 3.5 Research Model Developed 11
2
Chapter 1: Introduction
1.1 Overview:
This research report is about showing the relationship between User Privacy
and the social media. We are living in era where internet is used as a major source of
communication and data. The usage of social media is growing at a rapid pace and
each day millions of users and signing in different social networks. The increasing
eyes balls on social media, there is an extreme threat of privacy rights violation. In
this research report we are trying to figure out different sources that are used to gather
information from user. Such sources include cookies files, that are tiny files that a
shored by web sites in user computers and can access our browsing history
another source used by social network, to put clauses in terms and conditions
statements, that will protect social network for any kind of sue from user side
.information disclosure, the social media to gather maximum information and forces
letters delivered by hand from one person to another. The earliest form of postal
service dates back to 550 B.C., and this primitive delivery system would become
2
In 1792, the telegraph was invented. This allowed messages to be delivered over a
long distance far faster than a horse and rider could carry them. Although telegraph
messages were short, they were a revolutionary way to convey news and information.
Innovation started to change quickly in the twentieth Century. After the first
super PCs were made in the 1940s, researchers and architects started to create
approaches to make systems between those PCs, and this would later prompt the
conception of the Internet. But there was protection issue to utilizing the online
networking. Complex issues frequently have profound roots and regularly create
different supposition and various translation of past practices. Such is valid for client
security. With the onset of the Revolution and the resulting change in examples,
issues that were once barely viewed as, similar to client security, soon pulled in some
peril to security for individuals who live in free equitable social orders in the digital
age originates from inside of the private division, not the administration." It was
The most punctual types of the Internet, for example, CompuServe, were produced in
the 1960s. Primitive types of email were additionally created amid this time. By the
70s, organizing innovation had enhanced, and 1979's UseNet permitted clients to
impart through a virtual pamphlet. By the 1980s, home PCs were turning out to be
more normal and online networking was turning out to be more modern. Web hand-
off visits, or IRCs, were initially utilized as a part of 1988 and kept on being
2
Numerous individuals progressively use social organizations, for example, Facebook,
MySpace, Twitter, Orkut, Linked in and so forth. These systems permit clients to
distribute insights about themselves and their lives furthermore join with their
systems ought to stay private and not distributed by any stretch of the imagination.
scope of information about their clients (FB, Google, Twitter, MySpace and so forth.),
both to customize the administrations for the clients, however more pertinent as far as
Destinations like MySpace and LinkedIn picked up unmistakable quality in the mid-
2000s, and locales like Photo bucket and Flickr encouraged online photograph
sharing. YouTube turned out in 2005, making a totally new route for individuals to
speak and impart to one another crosswise over incredible separations. By 2006,
Facebook and Twitter both got to be accessible to clients all through the world.
locales, and large portions of them can be connected to permit cross-posting. This
makes a domain where clients can achieve the greatest number of individuals without
hypothesize about what the fate of informal communication may look in the following
decade or even quite a while from now, however it appears to be clear that it will exist
in some structure for whatever length of time that people are alive.
In spite of the fact that the Issues of online protection has been an issue for the overall
population for quite a while it has begun to become quickly because of innovation, to
2
mobile phones that effectively empowers anybody to make substance and offer it with
only a single tick of a catch. Because of high entrance of cell phones with photograph
and video creation and sharing open doors, the measure of individual substance
accessible online is has been expanding quickly in the most recent years.
study, and definitions. chapter 2 present a literature review which has the
research. Chapter 3 describes the Research Methods, which includes methods of data
and Reliability test, research model development and statistical technique. Chapter 4
1.5 Definitions
User privacy is the term which means privacy of users, a person or user is worried
about his/her confidential information which he doesn’t want to get leaked. And in
order to protect themselves, they have to follow precaution steps to hide their
confidential or personal information. User Privacy means that user don’t want to get
2
1.5.2 Cookies Files:
Cookies file are small files stored in your PC, these cookies files contain user
information like video game save data, filled forms etc. these cookies are used by
websites later.
1.5.3 Datavelliance:
Terms and condition are formalities which has to be commanded and supervised
Information Disclosure means revealing information to others, and it can cause attack
2
Chapter 2: Literature Review
complete control upon oneself, individual autonomy upon the information about
oneself, not been followed the others, loneliness at one’s home, individual reputation
and respect has been secured and free from investigation(Solove, 2002). Many
scholars has debated over the concept of individual privacy and came to conclusion
that privacy is essential for individual significance and emotional stability, for
With the begin of the internet age, a large number of user were attracted to
online social networks such as Facebook, Twitter, Orkut, MySpace and LinkedIn etc.
Users around the world signed up on such social networks to share personal
information and to discover other individuals with similar interests like their (Zhou,
2011). According to recent surveys, social media is the largest source of information
and social media information is keep on increasing day by day on a repaid speed(Ma,
Meng & Wang, 2012). Millions of social network users publish information and data
online and ever disclose personal information just to get some discount on online
stuffs. Why are people doing so, what about their privacy? We have different
concepts regarding user privacy, researcher have presented different theories related
to user privacy (Spector, 2003). According to Tavani (1999) controlling the privacy
hazards is difficult in the era where information is easy available and there are little
2
Due to advancement of technologies and development of smart devices, there is
emergence of issues that violates the privacy rights and governments and other
organizations has started to develop laws and practices to address this arising
two ways, firstly the user information is provided access to their friends, family or
peers and secondly the information is given access to third parties for the purpose of
Users of social networks share personal pictures of their friends and upon some web
sites like Facebook, Twitter, MySpace etc. family without been concerned about
privacy, but they will get little privacy concerned to share information on a unknown
websites. People have different level of standards regarding their privacy and their
The user privacy concepts that separates private and public information is vague and
unclear to common population online .the smart devices have sensors functions that
records the data individual generates, like places they went, the shops they stopped at
, the web sites they visited regularly, user used software etc. (Zimmer, 2010;
because the social media is world- wide phenomenon and the laws developed to
protect privacy are often in state of conflicts due to multi-national borders. Many
studies have shown that online user are majority times unaware of this phenomenon
that their personal information is been used and their privacy rights are been violated.
As the usage of internet is rapidly growing and becoming the most depended source
vulnerable. They main reason after such privacy violation is the lack of laws from
2
governments to protect user information to be exploited for the cybercrimes (Kruck,
example, web journals/ micro blogs, content sharing, wikis, social media, forums,
social gaming and social bookmarking (Tsimonis & Dimitriadis, 2014). Social media
(Web 2.0) is a platform which facility online applications that provide its user with
social processes. Social media applications provide its user to create networks that
facilitate flow of information and data, sharing of knowledge and generating contents
(Tsimonis.etal, 2014).
Now the social media is completely the internet activity it considered as primary
source of human interaction, news and their opinions. Lamdan discus that if face book
would be a country and users were the citizen, it would be third popular country of the
world on the other side of only India and china (lamdon 2015).due the insufficient
protection of the social media privacy the user keep out of sight all the information,
even they clear the history from browse (lamdan etal). Social media transformation
quickly .it’s now applicable knowledge but difficult to trust on new technologies
(Espinosa 2014).
Held a library survey that effectiveness of the social media presence so its mostly
in two form face book and instragram plus website so respondents are satisfied and
Basically there are two defined problem linked with conceptualize with social media.
1)the extensive ranging of the social media have been, in a developing process ,
2
and change level of public familiarity; 2)soial media have capable forms and well
being of communication process Obar, Zube & Lampe(2012). Dreyer and Ziebarth
Effect of social media may be positive and negative because of the lack of safety of
user’s privacy. Information through website and add of the users he fell to insecure in
throughout the process. They get irritate to the emails and add gain and again Ithel
Jones and A. D. Pellegrini(1996). Most of the people want to join social media in any
In the united state there are two most known social networking websites works
In article about generation Y (age 1981-1999) are considered highly socio economical
Another research Social networking has good effect in college and school levels
Felix (2013).some eduation institution are using this media to reach out their
learners. McKeown(2013).indivitual donot are about privacy also the proess which
Ali Altaf
Many of the authors and writers are of the opinion that one’s privacy keep a
high weightage for him or her. Leakage of privacy put a big impact on the behavior of
general human being (Lior Jacob Strahilevitz) Cookies are very small data structures
that are used by browser to store in our computer and it gives information to the
website owner (Darren Charters, 2015) those cookies are stored in our PC’s which
2
contains our activities, even our login username and password. These info inside
cookies can only be accessed by website who created that cookie on our computer.
But the main problem is our data is no more personal and can be used by advertising
or research companies that’s why you are warned and asked by Google search engine
that do you trust this website? Because google might have got complaints about
notorious activity of that websites. If you check your e-mail address even if it’s newly
created you will notice that e-mail that comes in your Inbox or Junk are mostly from
those e-mail address that you don’t know and have no idea about it. This happens
because when you enter your personal information and e-mail address, it may be
possible that the particular site doesn’t keep your confidential information to
themselves. This has been done many times by sites to get data for their research to
know information about buying and purchasing behavior, and this is all done with the
help of cookies which can track information in your computer, even if this data file is
very small but it has potential to control your PC data through your browser. Data is
being gathered by cookies through different ways such as Flash Cookies (also known
as Local Shared Objects, Etag, userData, Html5 and Html5 web storage (Ayenson,
M., Wambach, D.J., Soltani, A., Good, N., & Hoofnagle, C.J. 2011). Sometime we
face situation in which we have to provide information on certain pro forma and
accordingly we fill the forms and give our personal information by filling the form
and formats. We do know that these type of information is stored in the cookies and
can be hazardous. Adobe Flash did not have option of deleting its cookies before 2006
September which could pose threat to user’s privacy. Also the one of the most
important feature of cookies is that it has to remove itself when date of expiry comes,
but unfortunately until now Flash still do not have ability to set expiry date for flash
cookies. (Jo Pierson Rob Heyman, 2011) However Cookies are actually not that much
2
harmful the main purpose as explained before is that it is a very small text type file
which is stored in your computer and it’s not necessary that it always violates user’s
privacy or any law. For instance, when you buy something from Online Shopping
Centre such as Amazon or homeshopping.pk, the product that you selected is placed
in shopping carts and this information of placing your order in shopping cart is stored
in cookies, Shopping websites usually use form to collect information about their
customer and provide services according to their requirement of customers thus they
(Chapman and Dhillon, 2002) However, it’s been observed that people are very
Networking websites have given permission to use their user’s profile information to
be used for target marketing purpose purposes (Lavin 2006; Raghu, Rao, and
Whinston 2001). According to Anton, He, and Baumer, Chapman and Dhillon &
Hemphill. Companies like Comcast and Double Click are always been criticized for
examining users data for their marketing purpose, they engaged in tracking all users’
data and also without permission of users they tracked them (Chapman and Dhillon,
2002). It’s been believed when a research and investigation on websites was done by
FTC that one of the most hectic country i.e. USA has permitted 78% of its websites to
do cookie monitoring by third party websites (Martin, Wu, & Alsaid, 2003), As the
things evolves and we see many advancement in things like we have seen from
PlayStation 1 graphics to PlayStation 4 graphics, from Pentium 1 to Core i7, from the
unmovable telephone to extremely slim and portable mobile phones. We have seen
technological advancement throughout our life and like these advancement cookies
has also taken new forms although their goals are same i.e. to save information in
little file, such new form of cookies are “clear gifs”, these clear gifs are 1x1 pixels in
2
size which means that it’s concealed, unseen and unnoticeable to the users of websites
especially users of social media sites (Hoofnagle 2005; Martin,Wu, and Alsaid 2003).
Not only that, Social media sites like Yahoo has also been seen using their customer’s
data monitoring and revealing their information up to third party websites. The main
cookies. For instance, when users founds that cookies can track you information, they
get afraid of invasion of their privacy. They are scared of that how cookies work and
they also have no idea that how they can deal with cookies placed by websites they
have visited. Another disadvantage is that cookies can be used for research purpose
without consent of the users of that websites (Anthony D. Miyazaki, 2008; Ha et al.
2006; Hoofnagle 2005). a number of users apprehend that sharing of information can
cause threat to user’s privacy and can also harm their computers. Cookies do not have
any personal information in them, but when a user puts all information in website, this
information is transferred to cookies and stored there. But problem this information
can be used for tracking users. (Weihong PengJennifer Cisna, 2000) A user can avoid
cookies tracing by removing them every week or month, because having cookies on
your pc for long time can make your personal information vulnerable.
2.4 Dataveillance,
Zahida Brohi
newspapers. But if someone is using social media for online reading, listening or
2
viewing something, are required to enter into “term and conditions” contract. Area of
intellectual Property rights and privacy can be affected because of these ubiquitous
agreements. These agreements are generally unfavorable for user. The restricted terms
often restrict user’s behavior and their ability to do any changes in the website.
At the point when viewers turn on the TV, they are not legitimately bound to parley,
as opposed to prosecute in court, any debate they may have with the system. The
basic demonstration of turning on the radio does not preclude audience members from
singing to a companion the tunes they listened. By acquiring a daily paper, a per user
is not consenting to let the distributer offer individual data. Yet as media join
digitally, pursuers, viewers and audience members are required to go into contracts.
commonly include commitments in regards to how the gatherings will settle question,
and warnings in regards to how the client's close to home data can be utilized
(Hartzog, 2010).
In these days, many of companies have decided to go online, however, some of them
are giving any serious regard to the legal implications of their online presence.in
generally if a company decide to have Terms and Conditions on their website in the
first place, the company decide to add those Terms and Conditions to the site as part
of the general layout of the website, but not as a Legal protection for its activities.
Now the question is that: Are these Terms and Conditions enforceable? If we say in
other words would the company be bound by the Terms and Conditions posted on a
web page by simply clicking on the button “I Accept", or "I Agree" (Qudah , 2003).
2
According to Barua, Anitesh, Pinnell, Shutter and whinston (1999) privacy as a key
issue that Internet marketers need to recognize and address. Consumer privacy in
primarily in respect to credit card security and consumer privacy. The interactive
nature of the Internet, which allows for two-way exchange of information between
In the Internet age, where most data is looked for not in paper volumes but rather
through electronic means, curators must extend their conventional security tenets to
online networking stages. Scholarly flexibility, the privilege of people to look for and
get data, depends on security to ensure data seekers (Lamdan, 2015).As Edwards
(1993) notes, individuals are regularly reluctant to talk about their protection concerns
Shaheen and Hoy (2000) find that the FTC's center standards address a significant
number of online purchasers' protection concerns. Then again, two components not
Essa Khan
In the modern world Organizations and individuals are dependent on the different
social networking sites to sharing their information and communicate with rest of the
world.
The basic purpose of this research paper is to highlight the privacy and information
disclosure problems which arise through the use of social media. Because of the
2
different social networking sites people are disclosing their personal information by
Such type of actions raise questions about the privacy of the people. Technological
(Clarke, 2001).
explanations about the information disclosure like Belanger and Crossler (2011)
interpreted that information security and information privacy are interconnected with
each other. Privacy and information disclosure are always dependent on some factors
like on the online context, people and some other factors, in the social media.
(Nguyen, 2012).Some of the researchers argued that in the modern era of technology
individuals and it is shifting in the hands of organizations (Conger, 2013). While other
researchers have claimed that there should be some extended and secondary control
On the other hand online advertisers are using the social networking sites for the
advertisement but the social site users widely criticize it because of their privacy.
Online service providers are not providing the users free service but in return they are
tracking users and sharing their information to the third parties, without the consent of
users. That’s why Kuehn ( 2013) has blamed the internet service providers as they are
great threat to the users privacy, social network users were not aware of these security
breaches and information disclosure for a long time but when they saw different posts
and other activities on their social network feeds, they started protesting and
2
concept emerged which included the information providers, information collectors or
illegal entities, after that they introduced different degrees of management and control
Some researchers argue that when more data is demanded from the individuals, the
individuals become more fearful about their data and their trust level decreases
(Boulding, 2005).
Consumers are more concerned about the information which is being collected by the
organizations and they lack control over the information and how the organization
will protect their data from errors and unauthorized users (Smith, Milberg, &Burke,
1996). These type of privacy concerns leads consumers to design information sharing
Wirtz, &Williams,2007).
networking sites found that there are many researchers who believe that so much trust
their researches that a threat to a person’s social identity is basically a threat to his
Hugl (2011) studied the behavior of students regarding the cautions for information
disclosure at Carnegie Mellon University he used famous social networking sites and
to observe the different kind of behaviors from various dimensions of the privacy.
Moreover they used a sample of 4540 Facebook id’s and concluded that only a few no
of users change the default setting of privacy on their feeds to protect their personal
data.
Many times consumers know that information about them is being collected by the
social site which they are using like, a site may asks that to access this site provide the
2
following information and then you can continue, many times user accept the terms of
that site and provide them the information at that time users is not worried about the
Sometimes users become aware that their information has been collected, only when
they receive some kind of marketing ads or communication from any other site that
has collected information about them. At that time users realize that a third party has
somehow assembled their information and the user feels that now he has lost his
control over the information and he does not want the marketers to sell their
information (Sheehan et al, 2000). Recently the Information security standards have
been defined and various international and national, rules exists which provide
guidelines, encourage best practices and information privacy is treated through legal
The method of data collection is primary. A sample of 100 people was taken
group members.
UNIVERSITY.
2
3.3 Sample Size
The sample size for the research consists of 100 respondents. Respondents’ are
Self-developed model
Independent Variable
Cookies -ive
Dependent Variable
-ive
Dataveillance
User’s Privacy
+ive
Terms and
Conditions
-ive
Information
Disclosure
consist of frequencies and averages. Through which, we obtain results and come up to
the conclusion.
2
Chapter 4: Results
This chapter covers the research findings and interpretation of the results for
the sample size of 100 observations, taken to analyze the privacy concern of user’s
regarding to Social Media. For this purpose we used privacy concern as independent
variable, user’s privacy as dependent variable to see user’s privacy in Cookies Files,
variables. Regression test have been used as statistical techniques to examine that
whether there is positive or negative impact on user’s privacy, spss software is used
independent variable regression analysis was used. The result of regressions analysis
Table: 1
Model Summary
Table 1 shows relationship between dependent variable and independent variable. The
value of R Square lies between the range of 0.2 to 0.4 which shows that dependent
variable and independent variable have weak relationship.
2
Analysis of variance: (ANOVA)
Table:2
ANOVAb
Total 58.066 99
Coefficientsa
Unstandardized Standardized
Coefficients Coefficients
Table 3 shows the coefficient regression equation for variables with significance
level. In this table the significance value of Terms and conditions variable is .013 and
information disclosure is .000 is less than .005 which mean this research hypothesis is
accepted. Cookies files variable is .326 and Dataveillance variable is .136, hence
rejected because their is greater than .005.
2
Hypotheses Assessment Summary:
Table 4
2
Chapter 5: Discussions, Conclusion, Policy Implications and
Future Research
5.1 Discussions
The research was based on user’s privacy concern regarding social media.
cookies files on social media which results in disclosure of our information, the
users information).it is very rare that a social network user reads the terms and
5.2 Conclusion
the pre-determined hypothesis and results were processed using SPSS software by
using frequency distribution tables based on the results of the questionnaire and its
analysis various conclusions derived and recommendations were given that the
impact of social media on user’s privacy at IQRA University . Data was collected
from a sample of 100 respondents which summarizes the data. As a result, findings
generated that cookies files, Datavelliance and terms and conditions had positive
relationship with the user privacy and Information Disclosure had negative
So the data collected from respondents shows that cookies files Datavelliance
terms and conditions have absolute impact on user privacy. People are not affected by
2
cookies file by means of unwanted ads on social media and datavelliance does not
disclose their information instead secured ethically, similarly terms and condition
condition don’t harm them but information disclosure impact on them in respect of
Cookies Files, terms and conditions and Datavelliance and user privacy, but there is a
negative relationship of information disclosure and user privacy.to deal with such user
privacy hazards, government should establish laws and regulation that protect user
personal information. Policies should be develop to limit the cybercrimes .the social
network should develop policies to restrict information misuse and should provide
2
References
http://plato.stanford.edu/archives/fall2006/entries/privacy/.
Ma, R., Meng, X., & Wang, Z. (2012).Preserving Privacy on the searchable internet.
Spector, L. (2003).Guide to online photo album sites: here’s how to post and share
Children’s Use, Risk and Safety Online, . Retrieved November 2, 2015, from
http://eprints.lse.ac.uk/35849/
2
Clarke, R. (1988).Information technology and Dataveillance. Communications of the
Fuchs, C. (2011). New media, Web 2.0 and surveillance. Sociology Compass, 5(2),
134-147.
Gandy, O.H.(2003). Data mining and surveillance in the post-9.11 environment. The
Solove, D.J. (2001).Privacy and power: computer databases and metaphors for
Zimmer, M. (2010). But the data is already public: on the ethics of research in
Kruck, S, E,. Gottovi, D,. Moghadami, F,. Broom, R ,and Forcht, K, A,. 2002).
Ali Altaf
The Ethics of the DoubleClick Experience. Journal of Business Ethics, 35(4), 243-
254.
2
Ayenson, M., Wambach, D.J., Soltani, A., Good, N., & Hoofnagle, C.J. (2011) Flash
cookies and privacy II: Now with HTML5 and Etag respawning. World Wide Web
Heyman, J.P.R. (2011), Social media and cookies: challenges for online privacy. Info
- The journal of policy, regulation and strategy for telecommunications, 13(6), 30-42.
Chapman, S. & Dhillon, S.D. (2002), Privacy and the Internet: The Case of
Lavin, M. (2006), Cookies: What Do Consumers Know and What Can They Learn?
Palgrave Macmillan.
Raghu, T.S., Kannan P.K., Rao H.R., & Whinston A.B. (2001), Dynamic Profiling of
Consumers for Customized Offerings over the Internet: A Model and Analysis,
Anton, A.I., He, Q. & Baumer, D.L. (2004), Inside JetBlue's Privacy Policy
ESSA KHAN
2
Kuehn.A.(2013). clashing tracking technologies and online privacy.info,15,6,19 – 31
Zahida Brohi
Hartzog,W.(2010). The New Price to Play: Are Passive Online Media Users
Bound By Terms of Use. Communication Law and Policy, 15(4).405,-105.
Qudah,S.(2003). Terms and Conditions and UAE Law. Arab Law Quarterly,
18(2). 209-211.
Barua., Anitesh., Jon., Pinnel,J., Shutter,J.& Whinston,A,B. (1999), Measuring the
Internet Economy, An Exploratory Study,10(3).105,-122.
2
Shaheen.K.B; & Hoy,M.G.(2000).Dimensions of Privacy Concern among Online
Consumers,Journal of Public Policy & Marketing,19(1).62,-73.