Spelling suggestions: "subject:"cocial media -- saudi arabia."" "subject:"cocial media -- saudi sarabia.""
1 |
An investigation of Facebook usage by university students in Saudi ArabiaAljasir, Shuaa Abdulrahman January 2015 (has links)
Compared with face-to-face communication, Facebook use may provide opportunities for greater interaction in a relatively uncensored environment. This research aimed to critically investigate how Saudi university students are using these opportunities. It employs a theoretical framework drawn from uses and gratifications theory, social penetration theory, and social role theory. A mixed methods approach was used over three sequential phases. The research began with a quantitative questionnaire completed by 372 Saudi university students to investigate the gratifications they obtained from using Facebook and to identify a typology of Facebook users. This was followed by thematic and quantitative content analyses of profiles of a sub-sample of 50 students to explore the status updates they generated and the types of information they disclosed. To investigate in greater depth the themes that emerged from the previous phases, a final qualitative interview was conducted with 20 of the students. The results revealed that, Saudi students used Facebook as a virtual space within which they engaged in several activities. It allowed for cross-cultural and cross-gender communication. Facebook also enabled them to be citizen journalists, sharing, discussing, and analysing current affairs. They as well used Facebook to defend their religious beliefs and advocate Islamic values. Saudi university students showed that they are willing to jeopardise the privacy of their personal information to maximise the rewards they obtain from using Facebook as long as these rewards outweigh the expected costs from such disclosure. Despite belonging to a gender-segregated society, analysis of gender differences conducted across all three research phases revealed that the gap between genders in their Facebook usage is narrower than in offline settings.
|
2 |
The Use of Social Media in Informal Scientific Communication Among Scholars: Modeling the Modern Invisible CollegeAlgarni, Mohammed Ayedh 05 1900 (has links)
The concept of the invisible college is a key focus of scientific communication research with many studies on this topic in the literature. However, while such studies have contributed to an understanding of the invisible college, they have not adequately explained the interaction of social and structural processes in this phenomenon. As a consequence, past research has described the invisible college differently based on researchers’ perspectives, resulting in misinterpretations or inconsistent definitions of the relevant social and structural processes. Information science and related disciplines have focused on the structural processes that lead to scholarly products or works while placing less emphasis on the social processes. To advance understanding of the invisible college and its dimensions (including both social processes and structural processes), a proposed model (Modern Invisible College Model, MICM) has been built based on the history of the invisible college and Lievrouw’s (1989) distinction between social and structural processes. The present study focuses on the social processes of informal communication between scholars via social media, rather than on the structural processes that lead to scholarly products or works. A developed survey and an employed quantitative research method were applied for data collection. The research population involved 77 scholars from the Institute of Public Administration (IPA), in Saudi Arabia. Descriptive statistics, frequency and percentage were conducted for each statement. Means and standard deviations were calculated. The results indicate that the majority of participants heavily use social media for scientific communication purposes. Also, the results confirm that scholars consider social media to be an effective and appropriate tool for scientific communication. Seven factors were found in the findings to have positive correlations with uses and gratifications theory and the use of social media. This research contributes to and benefits scholars, reference groups (i.e., the invisible college itself), and institutions, and provides insight about the systematic development of indices for the use of informal communication channels.
|
3 |
Development of an Instrument to Measure the Level of Acceptability and Tolerability of Cyber Aggression: Mixed-Methods Research on Saudi Arabian Social Media UsersAlbar, Ali Aldroos 05 1900 (has links)
Cyber aggression came about as a result of advances in information communication technology and the aggressive usage of the technology in real life. Cyber aggression can take on many forms and facets. However, the main focus of this study is cyberbullying and cyberstalking through information sharing practices that might constitute digital aggressive acts. Human aggression has been extensively investigated. Studies focusing on understanding the causes and effects that can lead to physical and digital aggression have shown the prevalence of cyber aggression in different settings. Moreover, these studies have shown strong relationship between cyber aggression and the physiological and physical trauma on both perpetrators and their victims. Nevertheless, the literature shows a lack of studies that could measure the level of acceptance and tolerance of these dangerous digital acts.
This study is divided into two main stages; Stage one is a qualitative pilot study carried out to explore the concept of cyber aggression and its existence in Saudi Arabia. In-depth interviews were conducted with 14 Saudi social media users to collect understanding and meanings of cyber aggression. The researcher followed the Colaizzi’s methods to analyze the descriptive data. A proposed model was generated to describe cyber aggression in social media applications. The results showed that there is a level of acceptance to some cyber aggression acts due to a number of factors.
The second stage of the study is focused on developing scales with reliable items that could determine acceptability and tolerability of cyber aggression. In this second stage, the researcher used the factors discovered during the first stage as source to create the scales’ items.
The proposed methods and scales were analyzed and tested to increase reliability as indicated by the Cronbach’s Alpha value. The scales were designed to measure how acceptable and tolerable is cyber-bullying, cyber-stalking in Saudi Arabia and the sharing of some information in social media applications. The results show a strong tolerance level of those activities. This study is a valuable resource for advanced-level students, educators, and researchers who focus on cyber security, cyber psychology, and cyber aggression in social network sites.
|
Page generated in 0.077 seconds