[
[1] D.C. Edelman, “Branding in the digital age”, Harvard Business Review, vol. 88, no. 12, p. 62, 2010.
]Search in Google Scholar
[
[2] M. Bruhn, V. Schoenmueller, and D. B. Schäfer, “Are social media replacing traditional media in terms of brand equity creation?”, Management Research Review, vol. 35, no. 9, pp. 770-790, 2012, doi: 10.1108/01409171211255948.10.1108/01409171211255948
]Search in Google Scholar
[
[3] As Social Media Matures, Branded Communities Will Make A Comeback in 2015. (2014). Forrester.
]Search in Google Scholar
[
[4] T.R. Cosenza, M.R. Solomon, and W. Kwon, “Credibility in the blogosphere: A study of measurement and influence of wine blogs as an information source”, J. Consumer Behav., vol. 14, no. 2, pp. 71-91, 2015, doi: 10.1002/cb.1496.10.1002/cb.1496
]Search in Google Scholar
[
[5] M.T. Adjei, “Enhancing relationships with customers through online brand communities”, MIT Sloan Management Review, vol. 53, no. 4, p. 22, 2012.
]Search in Google Scholar
[
[6] A. Marmor, “Privacy in Social Media”, in The Oxford Handbook of Digital Ethics, C. Véliz and A. Marmor, Eds.: Oxford University Press, 2021.10.1093/oxfordhb/9780198857815.013.31
]Search in Google Scholar
[
[7] M. Laroche, M.R. Habibi, M.-O. Richard, and R. Sankaranarayanan, “The effects of social media based brand communities on brand community markers, value creation practices, brand trust and brand loyalty”, Computers in Human Behavior, vol. 28, no. 5, pp. 1755-1767, 2012, doi: 10.1016/j.chb.2012.04.016.10.1016/j.chb.2012.04.016
]Search in Google Scholar
[
[8] I.R. Management Association, Ed., Brand Culture and Identity: IGI Global, 2019.10.4018/978-1-5225-7116-2
]Search in Google Scholar
[
[9] L.L.E. Muinonen and A. Kumar, “Building City Brand Through Social Media”, in Brand Culture and Identity, I. R. Management Association, Ed.: IGI Global, 2019, pp. 674-694.10.4018/978-1-5225-7116-2.ch037
]Search in Google Scholar
[
[10] M. Phan, R. Thomas, and K. Heine, “Social Media and Luxury Brand Management: The Case of Burberry”, Journal of Global Fashion Marketing, vol. 2, no. 4, pp. 213-222, 2011, doi: 10.1080/20932685.2011.10593099.10.1080/20932685.2011.10593099
]Search in Google Scholar
[
[11] B. Rishi and S. Bandyopadhyay, Eds., Contemporary Issues in Social Media Marketing. 1 Edition. New York: Routledge, 2017.: Routledge, 2017.
]Search in Google Scholar
[
[12] D. Rosen, Ed., The Social Media Debate. New York: Routledge, 2022.10.4324/9781003171270
]Search in Google Scholar
[
[13] R. Rishika, A. Kumar, R. Janakiraman, and R. Bezawada, “The Effect of Customers’ Social Media Participation on Customer Visit Frequency and Profitability: An Empirical Investigation”, Information Systems Research, vol. 24, no. 1, pp. 108-127, 2013, doi: 10.1287/isre.1120.0460.10.1287/isre.1120.0460
]Search in Google Scholar
[
[14] A. Sadh, “Role of Brand Jealousy in Brand Communities on Social Networking Media”, IAJBM, vol. 06, no. 01, pp. 1-7, 2019, doi: 10.9756/IAJBM/V6I1/1910001.10.9756/IAJBM/V6I1/1910001
]Search in Google Scholar
[
[15] F. Simon and V. Tossan, “Does brand-consumer social sharing matter? A relational framework of customer engagement to brand-hosted social media”, Journal of Business Research, vol. 85, pp. 175-184, 2018, doi: 10.1016/j.jbusres.2017.12.050.10.1016/j.jbusres.2017.12.050
]Search in Google Scholar
[
[16] H. J. Schau, A. M. Muñiz, and E. J. Arnould, “How Brand Community Practices Create Value”, Journal of Marketing, vol. 73, no. 5, pp. 30-51, 2009, doi: 10.1509/jmkg.73.5.30.10.1509/jmkg.73.5.30
]Search in Google Scholar
[
[17] S. Nandan, “An exploration of the brand identity–brand image linkage: A communications perspective”, J Brand Manag, vol. 12, no. 4, pp. 264-278, 2005, doi: 10.1057/palgrave.bm.2540222.10.1057/palgrave.bm.2540222
]Search in Google Scholar
[
[18] S. Fournier, “Getting brand communities right”, Harvard Business Review, vol. 87, no. 4, p. 105, 2009.
]Search in Google Scholar
[
[19] S. Papathanassopoulos, “Privacy 2.0”, Social Media + Society, vol. 1, no. 1, 205630511557814, 2015, doi: 10.1177/2056305115578141.10.1177/2056305115578141
]Search in Google Scholar
[
[20] S. Singh and S. Sonnenburg, “Brand Performances in Social Media”, Journal of Interactive Marketing, vol. 26, no. 4, pp. 189-197, 2012, doi: 10.1016/j.intmar.2012.04.001.10.1016/j.intmar.2012.04.001
]Search in Google Scholar
[
[21] L. de Vries, S. Gensler, and P.S. Leeflang, “Popularity of Brand Posts on Brand Fan Pages: An Investigation of the Effects of Social Media Marketing”, Journal of Interactive Marketing, vol. 26, no. 2, pp. 83-91, 2012, doi: 10.1016/j.intmar.2012.01.003.10.1016/j.intmar.2012.01.003
]Search in Google Scholar
[
[22] S.M. West, “Social Media as Social Infrastructures”, in The Social Media Debate, D. Rosen, Ed., New York: Routledge, 2022, pp. 5-19.10.4324/9781003171270-2
]Search in Google Scholar
[
[23] J. Żywiołek, J. Rosak-Szyrocka, and B. Jereb, “Barriers to Knowledge Sharing in the Field of Information Security”, Management Systems in Production Engineering, vol. 29, no. 2, pp. 114-119, 2021, doi: 10.2478/mspe-2021-0015.10.2478/mspe-2021-0015
]Search in Google Scholar
[
[24] D. Godes et al., “The Firm’s Management of Social Interactions”, Market Lett, vol. 16, 3-4, pp. 415-428, 2005, doi: 10.1007/s11002-005-5902-4.10.1007/s11002-005-5902-4
]Search in Google Scholar
[
[25] S.K. N, S.K, and D.K, “On Privacy and Security in Social Media – A Comprehensive Study”, Procedia Computer Science, vol. 78, pp. 114-119, 2016, doi: 10.1016/j.procs.2016.02.019.10.1016/j.procs.2016.02.019
]Search in Google Scholar
[
[26] S. Narayanan and A. Richa, “Privacy and information trading on social media applications”, in Contemporary Issues in Social Media Marketing, B. Rishi and S. Bandyopadhyay, Eds., 1 Edition. New York: Routledge, 2017.: Routledge, 2017, pp. 308-319.
]Search in Google Scholar
[
[27] K. L. Keller and D. R. Lehmann, “Brands and Branding: Research Findings and Future Priorities”, Marketing Science, vol. 25, no. 6, pp. 740-759, 2006, doi: 10.1287/mksc.1050.0153.10.1287/mksc.1050.0153
]Search in Google Scholar
[
[28] H. Fussell Sisco and T. McCorkindale, “Communicating pink”: an analysis of the communication strategies, transparency, and credibility of breast cancer social media sites”, Int. J. Nonprofit Volunt. Sect. Mark., vol. 18, no. 4, pp. 287-301, 2013, doi: 10.1002/nvsm.1474.10.1002/nvsm.1474
]Search in Google Scholar
[
[29] N. Ind, O. Iglesias, and M. Schultz, “Building Brands Together: Emergence and Outcomes of Co-Creation”, California Management Review, vol. 55, no. 3, pp. 5-26, 2013, doi: 10.1525/cmr.2013.55.3.5.10.1525/cmr.2013.55.3.5
]Search in Google Scholar
[
[30] M.Z. Iqbal, “Unhiding the Effect of Social Media Marketing Activities & Benefits and Brand Experience on Consumer Based Brand Equity”, IJSSE, vol. 2, no. 1, 2021, doi: 10.46745/ilma.ijsse.2021.02.01.03.10.46745/ilma.ijsse.2021.02.01.03
]Search in Google Scholar
[
[31] A. Seetharaman, Azlan Bin Mohd Nadzir, Zainal, and S. Gunalan, “A conceptual study on brand valuation”, Journal of Product & Brand Management, vol. 10, no. 4, pp. 243-256, 2001, doi: 10.1108/EUM0000000005674.10.1108/EUM0000000005674
]Search in Google Scholar
[
[32] J. Żywiołek, J. Rosak-Szyrocka, and M. Mrowiec, “Knowledge Management in Households about Energy Saving as Part of the Awareness of Sustainable Development”, Energies, vol. 14, no. 24, p. 8207, 2021, doi: 10.3390/en14248207.10.3390/en14248207
]Search in Google Scholar
[
[33] T. Sakaki, M. Okazaki, and Y. Matsuo, “Earthquake shakes Twitter users”, in 2010.10.1145/1772690.1772777
]Search in Google Scholar
[
[34] N. Park, K.F. Kee, and S. Valenzuela, “Being immersed in social networking environment: Facebook groups, uses and gratifications, and social outcomes”, CyberPsychology & Behavior, vol. 12, no. 6, pp. 729-733, 2009, doi: 10.1089/cpb.2009.0003.10.1089/cpb.2009.000319619037
]Search in Google Scholar
[
[35] M. Trusov, R.E. Bucklin, and K. Pauwels, “Effects of Word-of-Mouth versus Traditional Marketing: Findings from an Internet Social Networking Site”, Journal of Marketing, vol. 73, no. 5, pp. 90-102, 2009, doi: 10.1509/jmkg.73.5.90.10.1509/jmkg.73.5.90
]Search in Google Scholar
[
[36] J. Westwood, Ed., Social Media in Social Work Practice. 1 Oliver’s Yard, 55 City Road London EC1Y 1SP: SAGE Publications, Inc, 2019.10.4135/9781529714555
]Search in Google Scholar
[
[37] M. Zimdars, “Mis/Disinformation and Social Media”, in The Social Media Debate, D. Rosen, Ed., New York: Routledge, 2022, pp. 120-136.10.4324/9781003171270-8
]Search in Google Scholar
[
[38] S.L. Vargo and R.F. Lusch, “Evolving to a New Dominant Logic for Marketing”, Journal of Marketing, vol. 68, no. 1, pp. 1-17, 2004, doi: 10.1509/jmkg.68.1.1.24036.10.1509/jmkg.68.1.1.24036
]Search in Google Scholar
[
[39] M. E. Zaglia, “Brand communities embedded in social networks”, Journal of Business Research, vol. 66, 2-2, pp. 216-223, 2013, doi: 10.1016/j.jbusres.2012.07.015.10.1016/j.jbusres.2012.07.015361760223564989
]Search in Google Scholar
[
[40] Social Media Security: Elsevier, 2014.
]Search in Google Scholar
[
[41] S. Aral, C. Dellarocas, and D. Godes, “Introduction to the Special Issue – Social Media and Business Transformation: A Framework for Research”, Information Systems Research, vol. 24, no. 1, pp. 3-13, 2013, doi: 10.1287/isre.1120.0470.10.1287/isre.1120.0470
]Search in Google Scholar
[
[42] B.D. Carlson, T.A. Suter, and T.J. Brown, “Social versus psychological brand community: The role of psychological sense of brand community”, Journal of Business Research, vol. 61, no. 4, pp. 284-291, 2008, doi: 10.1016/j.jbusres.2007.06.022.10.1016/j.jbusres.2007.06.022
]Search in Google Scholar
[
[43] “The Role of Social Media to Gain Social Security among Citizens in Sulaimani City”, JALHSS, vol. 38, pp. 77-101, 2019, doi: 10.33193/JALHSS.38.5.10.33193/JALHSS.38.5
]Search in Google Scholar
[
[44] Knowledge Management, Trust and Communication in the Era of Social Media: MDPI, 2020.
]Search in Google Scholar
[
[45] P. Borzymek and M. Sydow, Trust and Distrust Prediction in Social Network with Combined Graphical and Review-Based Attributes, Agent and Multi-Agent Systems: Technologies and Applications: Springer Berlin Heidelberg, vol. 6070.
]Search in Google Scholar
[
[46] C. Au Yeung and T. Iwata, “Strength of social influence in trust networks in product review sites”, in 2011.10.1145/1935826.1935899
]Search in Google Scholar
[
[47] P. Agrawal, Proceedings of the Twenty-ird International Joint Conference on Artificial Intelligence, 2013.
]Search in Google Scholar
[
[48] Boshrooyeh, “PPAD: Privacy preserving group-based advertising in online social networks”, p. 1, 2018.10.23919/IFIPNetworking.2018.8696817
]Search in Google Scholar
[
[49] S.T. Boshrooyeh, A. Küpçü, and Ö. Özkasap, “Privado”, ACM Trans. Priv. Secur., vol. 23, no. 3, pp. 1-36, 2020, doi: 10.1145/3386154.10.1145/3386154
]Search in Google Scholar
[
[50] J. Leskovec, D. Huttenlocher, and J. Kleinberg, “Predicting positive and negative links in online social networks”, in 2010.10.1145/1772690.1772756
]Search in Google Scholar
[
[51] R.N. Lichtenwalter, J.T. Lussier, and N.V. Chawla, “New perspectives and methods in link prediction”, in 2010.10.1145/1835804.1835837
]Search in Google Scholar
[
[52] D. Marquardt, B. Filipczyk, J. Gołuchowski, and J. Paliszkiewicz, “Building Public Trust in Social Media”, in Managing Public Trust, B. Kożuch, S. J. Magala, and J. Paliszkiewicz, Eds., Cham: Springer International Publishing, 2018, pp. 135-152.10.1007/978-3-319-70485-2_9
]Search in Google Scholar
[
[53] Cohen, “Early detection of spamming accounts in large-Scale service provider networks”, Knowledge-Based Systems, 2017.10.1016/j.knosys.2017.11.040
]Search in Google Scholar
[
[54] C. Castillo, M. Mendoza, and B. Poblete, “Information credibility on twitter”, in 2011.10.1145/1963405.1963500
]Search in Google Scholar
[
[55] G. Cai, J. Tang, and Y. Wen, Trust Prediction with Temporal Dynamics, Web-Age Information Management: Springer International Publishing, vol. 8485.
]Search in Google Scholar
[
[56] Das, “Anonymizing weighted social network graphs”, p. 904, 2010.10.1109/ICDE.2010.5447915
]Search in Google Scholar
[
[57] M. de Cock and P.P. Da Silva, A Many Valued Representation and Propagation of Trust and Distrust, Fuzzy Logic and Applications: Springer Berlin Heidelberg, vol. 3849.
]Search in Google Scholar
[
[58] R.I.M. Dunbar, “Do online social media cut through the constraints that limit the size of offline social networks?”, Royal Society Open Science, vol. 3, no. 1, p. 150292, 2016, doi: 10.1098/rsos.150292.10.1098/rsos.150292473691826909163
]Search in Google Scholar
[
[59] C.-J. Hsieh, K.-Y. Chiang, and I. S. Dhillon, “Low rank modeling of signed networks”, in 2012.10.1145/2339530.2339612
]Search in Google Scholar
[
[60] Hirschprung, “Analyzing and optimizing access control choice architectures in online social networks”, ACM Transactions on Intelligent Systems and Technology (TIST), vol. 8, no. 4, p. 57, 2017.10.1145/3046676
]Search in Google Scholar
[
[61] Gudes, “An Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength Factors”, p. 55, 2018.10.1007/978-3-319-94147-9_5
]Search in Google Scholar
[
[62] G.V. Johar, “How to save your brand in the face of crisis”, Image, 2012.
]Search in Google Scholar
[
[63] R. Forsati, M. Mahdavi, M. Shamsfard, and M. Sarwat, “Matrix Factorization with Explicit Trust and Distrust Side Information for Improved Social Recommendation”, ACM Trans. Inf. Syst., vol. 32, no. 4, pp. 1-38, 2014, doi: 10.1145/2641564.10.1145/2641564
]Search in Google Scholar
[
[64] I. Kayes and A. Iamnitchi, “Privacy and security in online social networks: A survey”, Online Social Networks and Media, 3-4, pp. 1-21, 2017, doi: 10.1016/j.osnem.2017.09.001.10.1016/j.osnem.2017.09.001
]Search in Google Scholar
[
[65] C. E. Kampf, “Connecting Corporate and Consumer Social Responsibility Through Social Media Activism”, Social Media + Society, vol. 4, no. 1, 205630511774635, 2018, doi: 10.1177/2056305117746357.10.1177/2056305117746357
]Search in Google Scholar
[
[66] I. Khajuria “Social Media Marketing in Creating Brand Awareness and Brand Trust”, Manthan, no. 1, 2019, doi: 10.17492/manthan.spl19.1.10.17492/manthan.spl19.1
]Search in Google Scholar
[
[67] Kumar, “Relationship Strength Based Access Control in Online Social Networks”, p. 197, 2016.10.1007/978-3-319-30927-9_20
]Search in Google Scholar
[
[68] K.M. Khan and Q. Malluhi, “Establishing Trust in Cloud Computing”, IT Prof., vol. 12, no. 5, pp. 20-27, 2010, doi: 10.1109/MITP.2010.128.10.1109/MITP.2010.128
]Search in Google Scholar
[
[69] A.C. Squicciarini, F. Paci, and S. Sundareswaran, “PriMa: a comprehensive approach to privacy protection in social network sites”, Ann. Telecommun., vol. 69, 1-2, pp. 21-36, 2014, doi: 10.1007/s12243-013-0371-x.10.1007/s12243-013-0371-x
]Search in Google Scholar
[
[70] A. Mukherjee, B. Liu, J. Wang, N. Glance, and N. Jindal, “Detecting group review spam”, in 2011.10.1145/1963192.1963240
]Search in Google Scholar
[
[71] Misra, “IMPROVE-Identifying Minimal PROfile VEctors for similarity-based access control”, p. 868, 2016.10.1109/TrustCom.2016.0150
]Search in Google Scholar
[
[72] A. Mishra and A. Bhattacharya, “Finding the bias and prestige of nodes in networks based on trust scores”, in 2011.10.1145/1963405.1963485
]Search in Google Scholar
[
[73] Milo, “Boosting SimRank with Semantics”, p. 1, 2019.
]Search in Google Scholar
[
[74] G. Misra and J. M. Such, “How Socially Aware Are Social Media Privacy Controls?”, Computer, vol. 49, no. 3, pp. 96-99, 2016, doi: 10.1109/MC.2016.83.10.1109/MC.2016.83
]Search in Google Scholar
[
[75] A. Squicciarini, S. Karumanchi, D. Lin, and N. DeSisto, “Identifying hidden social circles for advanced privacy configuration”, Computers & Security, vol. 41, pp. 40-51, 2014, doi: 10.1016/j.cose.2013.07.007.10.1016/j.cose.2013.07.007
]Search in Google Scholar
[
[76] H. Rahman and M. Ebrahimi, Eds., Information Manipulation and Its Impact Across All Industries: IGI Global, 2022.10.4018/978-1-7998-8235-0
]Search in Google Scholar
[
[77] A. Oxley, “Security threats to social media technologies”, in Security Risks in Social Media Technologies: Elsevier, 2013, pp. 89-115.10.1016/B978-1-84334-714-9.50003-6
]Search in Google Scholar
[
[78] J. Tang, Y. Chang, and H. Liu, “Mining social media with social theories”, SIGKDD Explor. Newsl., vol. 15, no. 2, pp. 20-29, 2014, doi: 10.1145/2641190.2641195.10.1145/2641190.2641195
]Search in Google Scholar
[
[79] Taheri-Boshrooyeh, “Security and privacy of distributed online social networks”, p. 112, 2015.10.1109/ICDCSW.2015.30
]Search in Google Scholar
[
[80] H. Tennakoon, “Information Security and Privacy in Social Media”, in Advances in Social Networking and Online Communities, Information Manipulation and Its Impact Across All Industries, H. Rahman and M. Ebrahimi, Eds.: IGI Global, 2022, pp. 73-101.
]Search in Google Scholar
[
[81] J. Tang, X. Hu, and H. Liu, “Social recommendation: a review”, Social Network Analysis and Mining, vol. 3, no. 4, pp. 1113-1133, 2013, doi: 10.1007/s13278-013-0141-9.10.1007/s13278-013-0141-9
]Search in Google Scholar
[
[82] N. Voloch, N. Gal-Oz, and E. Gudes, “A Trust based Privacy Providing Model for Online Social Networks”, Online Social Networks and Media, vol. 24, p. 100138, 2021, doi: 10.1016/j.osnem.2021.100138.10.1016/j.osnem.2021.100138
]Search in Google Scholar
[
[83] Yu, “My friend leaks my privacy: Modeling and analyzing privacy in social networks”, p. 93, 2018.10.1145/3205977.3205981
]Search in Google Scholar
[
[84] M. Yarchi, “Security issues as mirrored in the digital social media”, in Routledge Handbook on Israeli Security, S. A. Cohen and A. Klieman, Eds., Milton Park, Abingdon, Oxon, New York, NY: Routledge, 2019.: Routledge, 2018, pp. 65-75.
]Search in Google Scholar
[
[85] Voloch, “An MST-based information flow model for security in Online Social Networks”, 2019.10.1109/ICUFN.2019.8806160
]Search in Google Scholar