Results for 'Yeslam%20Al-Saggaf'

13 found
Order:
  1. Chapter Two Exploring Political Online Forums in Saudi Arabia through Thematic Content Analysis Yeslam Al-Saggaf.Yeslam Al-Saggaf - 2007 - In Soraj Hongladarom (ed.), Computing and Philosophy in Asia. Cambridge Scholars Press. pp. 13.
     
    Export citation  
     
    Bookmark  
  2.  41
    Reasons behind unethical behaviour in the Australian ICT workplace.Yeslam Al-Saggaf, Oliver Burmeister & John Weckert - 2015 - Journal of Information, Communication and Ethics in Society 13 (3/4):235-255.
    Purpose – The purpose of this study is to investigate the reasons behind unethical behaviour in the Australian Information and Communications Technology workplace. Design/methodology/approach – The study employed a qualitative research methodology. A total of 43 ICT professionals were interviewed during the month of February 2014 in six Australian capital cities. All interviews were conducted face-to-face and followed a semi-structured interviewing format utilising open-end questions and further probing questions. The purposive sample represented ICT professionals from large and small organisations, government (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  3.  29
    Online communities versus offline communities in the Arab/Muslim world.Yeslam Al-Saggaf & Mohamed M. Begg - 2004 - Journal of Information, Communication and Ethics in Society 2 (1):41-54.
    There is a major transformation taking place in the Arab and Muslim worlds. People in these nations are poised on the edge of a significant new social landscape. Called the Internet, this new frontier not only includes the creation of new forms of private communication, like electronic mail and chat, but also webbased forums, which for the first time enables public discussion between males and females in conservative societies. This paper has been written as a result of an ethnographic study (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  4.  80
    Data Mining and Privacy of Social Network Sites’ Users: Implications of the Data Mining Problem.Yeslam Al-Saggaf & Md Zahidul Islam - 2015 - Science and Engineering Ethics 21 (4):941-966.
    This paper explores the potential of data mining as a technique that could be used by malicious data miners to threaten the privacy of social network sites users. It applies a data mining algorithm to a real dataset to provide empirically-based evidence of the ease with which characteristics about the SNS users can be discovered and used in a way that could invade their privacy. One major contribution of this article is the use of the decision forest data mining algorithm (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  19
    Males' trust and mistrust of females in Muslim matrimonial sites.Yeslam Al-Saggaf - 2013 - Journal of Information, Communication and Ethics in Society 11 (3):174-192.
    Purpose– The aim of this study is to examine interpersonal trust in Muslim matrimonial sites from a male perspective. Specifically how users perceive interpersonal trust in MMS; what are the signs of lack of trust in MMS ; and what strategies do users adopt to handle the lack of trust in MMS.Design/methodology/approach– This empirical qualitative study used ethnographic techniques to collect data. In addition to briefly observing five MMS, the study conducted semi-structured interviews with ten participants, who were all males, (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  6.  33
    Privacy from a Saudi Arabian Perspective.Yeslam Al-Saggaf & John Weckert - 2011 - Journal of Information Ethics 20 (1):34-53.
  7.  23
    Political online communities in Saudi Arabia: the major players.Yeslam Al-Saggaf, Kenneth Einar Himma & Radwan Kharabsheh - 2008 - Journal of Information, Communication and Ethics in Society 6 (2):127-140.
    PurposeThe purpose of this paper is to explore the major players operating on Al‐Saha Al‐Siyasia online community, which is by far the most widely spread political online community in Saudi Arabia receiving 20 million page views per month.Design/methodology/approachIn addition to using “focused” silent observation to observe Al‐Saha Al‐Siyasia over a period of three months and thematic content analysis to examine 2,000 topics posted to Al‐Saha Al‐Siyasia during the period of May‐June 2007, semi‐structured interviews were conducted with 15 key informants to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Political online forums in Saudi Arabia.Yeslam Al-Saggaf - 2007 - In Soraj Hongladarom (ed.), Computing and Philosophy in Asia. Cambridge Scholars Press. pp. 13--30.
     
    Export citation  
     
    Bookmark   1 citation  
  9.  28
    The Use of Data Mining by Private Health Insurance Companies and Customers’ Privacy.Yeslam Al-Saggaf - 2015 - Cambridge Quarterly of Healthcare Ethics 24 (3):281-292.
    :This article examines privacy threats arising from the use of data mining by private Australian health insurance companies. Qualitative interviews were conducted with key experts, and Australian governmental and nongovernmental websites relevant to private health insurance were searched. Using Rationale, a critical thinking tool, the themes and considerations elicited through this empirical approach were developed into an argument about the use of data mining by private health insurance companies. The argument is followed by an ethical analysis guided by classical philosophical (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10.  18
    Online cultural imperialism: Is it an ethical issue?John Weckert & Yeslam Al-Saggaf - 2003 - Journal of Information, Communication and Ethics in Society 1 (1):21-29.
    Recently two reports appeared in the press, each of which expressed a very different attitude towards intellectual property. One, in the Australian press, discusses a bill before the US House of Representatives that would “give American copyright holders freedom to hack PCs used to illicitly share files over peer‐to‐peer networks, without fear of prosecution or litigation”. That this represents a fairly strong view of the importance of intellectual property can be seen further as the report continues.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  40
    The Digital Divide in Asia.Tanveer Zia, Yeslam Al-Saggaf, Md Zahidul Islam, Lihong Zheng & John Weckert - 2009 - Journal of Information Ethics 18 (2):50-76.
  12.  24
    Contextual integrity’s decision heuristic and the tracking by social network sites.RathKanha Sar & Yeslam Al-Saggaf - 2014 - Ethics and Information Technology 16 (1):15-26.
    The findings of our experiments showed that social network sites such as Google Plus, Facebook, and Twitter, have the ability to acquire knowledge about their users’ movements not only within SNSs but also beyond SNS boundaries, particularly among websites that embedded SNS widgets such as Google’s Plus One button, Facebook’s Like button, and Twitter’s Tweet button. In this paper, we analysed the privacy implication of such a practice from a moral perspective by applying Helen Nissenbaum’s decision heuristic derived from her (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  13.  26
    Contextual integrity’s decision heuristic and the tracking by social network sites.Rath Kanha Sar & Yeslam Al-Saggaf - 2014 - Ethics and Information Technology 16 (1):15-26.
    The findings of our experiments showed that social network sites such as Google Plus, Facebook, and Twitter, have the ability to acquire knowledge about their users’ movements not only within SNSs but also beyond SNS boundaries, particularly among websites that embedded SNS widgets such as Google’s Plus One button, Facebook’s Like button, and Twitter’s Tweet button. In this paper, we analysed the privacy implication of such a practice from a moral perspective by applying Helen Nissenbaum’s decision heuristic derived from her (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations