Skip to main content

Showing 1–7 of 7 results for author: Abokhodair, N

.
  1. Holy Tweets: Exploring the Sharing of Quran on Twitter

    Authors: Norah Abokhodair, Abdelrahim Elmadany, Walid Magdy

    Abstract: While social media offer users a platform for self-expression, identity exploration, and community management, among other functions, they also offer space for religious practice and expression. In this paper, we explore social media spaces as they subtend new forms of religious experiences and rituals. We present a mixed-method study to understand the practice of sharing Quran verses on Arabic Tw… ▽ More

    Submitted 19 August, 2020; originally announced August 2020.

    Comments: Paper accepted to The 23rd ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW) 2020

  2. Against Marrying a Stranger Marital Matchmaking Technologies in Saudi Arabia

    Authors: Adel Al-Dawood, Norah Abokhodair, Houda El Mimouni, Svetlana Yarosh

    Abstract: Websites and applications that match and connect individuals for romantic purposes are commonly used in the Western world. However, there have not been many previous investigations focusing on cultural factors that affect the adoption of similar technologies in religiously conservative non-Western cultures. In this study, we examine the socio-technical and cultural factors that influence the perce… ▽ More

    Submitted 8 August, 2018; originally announced August 2018.

    Comments: 11 pages, 1 table, DIS 2017

    Journal ref: In Proceedings of the 2017 Conference on Designing Interactive Systems (DIS '17). ACM, New York, NY, USA, 1013-1024

  3. arXiv:1605.01741  [pdf

    cs.SI cs.CY

    Privacy and Twitter in Qatar: Traditional Values in the Digital World

    Authors: Norah Abokhodair, Sofiane Abbar, Sarah Vieweg, Yelena Mejova

    Abstract: We explore the meaning of privacy from the perspective of Qatari nationals as it manifests in digital environments. Although privacy is an essential and widely respected value in many cultures, the way in which it is understood and enacted depends on context. It is especially vital to understand user behaviors regarding privacy in the digital sphere, where individuals increasingly publish personal… ▽ More

    Submitted 5 May, 2016; originally announced May 2016.

    Comments: 10 pages, Conference paper published at WebSci

  4. arXiv:1604.03627  [pdf

    cs.CY cs.CL cs.SI

    Dissecting a Social Botnet: Growth, Content and Influence in Twitter

    Authors: Norah Abokhodair, Daisy Yoo, David W. McDonald

    Abstract: Social botnets have become an important phenomenon on social media. There are many ways in which social bots can disrupt or influence online discourse, such as, spam hashtags, scam twitter users, and astroturfing. In this paper we considered one specific social botnet in Twitter to understand how it grows over time, how the content of tweets by the social botnet differ from regular users in the sa… ▽ More

    Submitted 12 April, 2016; originally announced April 2016.

    Comments: 13 pages, 4 figures, Presented at the ACM conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2016)

  5. Privacy & Social Media in the Context of the Arab Gulf

    Authors: Norah Abokhodair, Sarah Vieweg

    Abstract: Theories of privacy and how it relates to the use of Information Communication Technology (ICT) have been a topic of research for decades. However, little attention has been paid to the perception of privacy from the perspective of technology users in the Middle East. In this paper, we delve into interpretations of privacy from the approach of Arab Gulf citizens. We consider how privacy is practic… ▽ More

    Submitted 12 April, 2016; originally announced April 2016.

    Comments: 12 pages, 1 figure

  6. arXiv:1604.00737  [pdf

    cs.CY

    Heading for the Clouds: Implications for Cloud Computing Adopters

    Authors: Norah Abokhodair, Hazel Taylor, Surry Jones Mowery, Jitsuko Hasegawa

    Abstract: Cloud computing projects have many implications, including issues such as security, compliance, funding, cohesion with existing systems, operational resource requirements, and number of employees involved. In order to gain a better understanding of why businesses are interested in adopting cloud services in spite of these potential difficulties, we interviewed senior IT personnel at five different… ▽ More

    Submitted 12 April, 2016; v1 submitted 4 April, 2016; originally announced April 2016.

    Comments: 10 pages, 3 tables

  7. arXiv:1512.04570  [pdf, other

    cs.SI

    Quantifying Public Response towards Islam on Twitter after Paris Attacks

    Authors: Walid Magdy, Kareem Darwish, Norah Abokhodair

    Abstract: The Paris terrorist attacks occurred on November 13, 2015 prompted a massive response on social media including Twitter, with millions of posted tweets in the first few hours after the attacks. Most of the tweets were condemning the attacks and showing support to Parisians. One of the trending debates related to the attacks concerned possible association between terrorism and Islam and Muslims in… ▽ More

    Submitted 14 December, 2015; originally announced December 2015.

    Comments: 9 pages, 5 figures

    ACM Class: J.4; K.4.2