SlideShare uma empresa Scribd logo
1 de 16
Protecting Face:
Managing Privacy and Context
Collapse in the Facebook Age
Jessica Vitak (@jvitak)
PhD Candidate, Michigan State University
Assistant Professor, University of Maryland iSchool (August 2012)
                                                                    1
Theorizing the Web | April 14, 2012 | College Park, MD
How are Facebook users managing context collapse
and interacting with a diverse set of friends?




                                                   2
What is context collapse?
• We present different versions
  of the self depending on our
  audience
• Could include:
  • Style of dress
  • Speech                        Ego
  • Non-verbals


• Context collapse occurs when
  we “perform” for different
  audiences at same time                3
  • e.g., weddings
Context Collapse on Facebook




                               4
How context collapse might
impact Facebook use
1) Strength of weak ties (Granovetter, 1973): users distribute
   content (esp. resource requests) to entire network to
   increase likelihood that someone will see it and respond.

2) Privacy settings: users employ increasingly granular
   privacy settings to segment network into different
   audiences

3) Lowest common denominator (Hogan, 2010): users only
   distribute content appropriate for all “friends.”
                                                                 5
Privacy Online
     Privacy: “selective control of access to the self,” achieved by
     regulating social interactions (Altman, 1975)


                                                            Multiple
                  Stalkers                                  Accounts
     ID Theft                                  Friends                  Restricting
                                Private         Only                   Searchability
                                Content
Employers        Privacy                    Places /        Privacy         Friend
                                           Check-ins                         Lists
                Concerns                                    Settings
  Visibility                     Hacked                                      Limit
 of Content                      Account      Restricting                     Old
                Inappropriate                  Tagging                       Posts
                                                             Limited                   6
                   Content                                   Profile
Communications Privacy
 Management Theory (Petronio, 2002)
• Relationships managed by balancing privacy and disclosures

        Privacy (Concealing)            Disclosures (Revealing)




• Privacy and disclosures function in “incompatible” ways


• We create boundaries to

                                                  Collective
                                                  Boundary
                                     Person A’s                Person B’s
  demarcate both private and          Personal                  Personal
                                     Boundary                  Boundary
  shared information                                                        7
Boundary Management on Facebook
• Default settings emphasize revealing, not concealing
• Networks are increasingly large and diverse
• Most users maintain very permeable boundaries to personal
  information and shared content


Strategies for controlling access to private information:
  • Privacy Settings
  • Controlling Friend Requests/Defriending
  • Removing Content/Untagging
  • Not sharing content (lowest common denominator;           8
    deactivating)
Study & Analysis                          (Vitak, in preparation)



• Survey participants (see Vitak, 2012) volunteered for follow-up
  study
• Selection criteria: Use of Facebook’s advanced privacy
  settings/multiple accounts

• Interviews
  • 26 participants; length: 30-94 minutes
  • Primary topic: Boundary management strategies

• Analysis
  • Interviews transcribed, proofed, uploaded into Dedoose
  • Analyzed using textual microanalysis (Strauss & Corbin, 1998)   9
Findings: Friending/Defriending
• 24 participants (92%) set profile to Friends Only
• Most users reported a lot of Facebook Friends…
  • M = 500, Median = 433, SD = 361, range: 62 – 1600
• …and many were weak ties
  • 8% fell within circles with most overlap,                  2nd
    52% in circles with least overlap                          Tier

                                                        Weak
                                                        Ties    3rd
• Most users (73%) described defriending                       Tier
  practices to manage network
  • Many performed “friend purges”
  • Hesitation/concern for hurting people’s feelings
  • Hiding was an alternative practice to defriending                 10
Findings: Segregating Audiences
• 20 participants (77%) actively used Lists to restrict access to
  content to specific groups of Friends.
  • Maintaining power dynamics
  • Blocking family
  • Restricting content to close friends & family
  • Private Messages or Notes visible to small group of Friends


• 57% of Twitter users kept multiple accounts
  • Usually divided based on personal/professional identities

                                                                    11
Findings: Lowest Common Denominator
 • Even with heavy use of privacy settings, most users reported
   censoring posts
   • Focus on positive updates
   • Easier to not post than negotiate boundaries
   • Simplifying posts to make them more widely appealing
   • Privacy concerns

 • Conscious thought process about audience before posting:
    • Who will see this post?
    • How might it be misinterpreted?
                                                                      12
    • Will people find this post interesting/funny/worthwhile/etc.?
Implications
• Among those highly engaged in impression management
  online, concealing often outweighs revealing
  • Contrary to Zukerberg’s “new social norm” argument


• If true, this impacts:
  • Opportunities for social capital transactions
  • Relationship maintenance



           …but what about disconnecting completely?

                                                         13
Logging Off
Arguments For:            Arguments Against:

 • “Addiction” concerns    • Relationship
                             maintenance
 • More meaningful
   interactions            • Missing out
 • Less distractions       • Networking
 • More productivity       • New connections
 • Work/Life Balance       • Social capital exchanges
 • Context Collapse        • Information retrieval
                                                        14
Tools to Help You Log Off


                   “Productivity through disconnection”




                   “Turn off your friends…”


                                                              15

* Fred Stutzman, the creator of these apps, is a rock star.
Thanks!
                                                   Contact:
                                     vitakjes@msu.edu
                                       Twitter: @jvitak
                                 Website: vitak.wordpress.com




* Paper referenced in study:                                                                                        16
Vitak, J. (2012, May). The impact of context collapse and privacy on social network site disclosures. Paper to be
presented at the International Communication Association 62nd Annual Conference, Phoenix, AZ. (Also currently
under review at a Communication Journal)

Mais conteúdo relacionado

Destaque

LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social MediaLSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social MediaLocal Social Summit
 
Strata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy OfficerStrata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy OfficerJim Adler
 
Quantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksQuantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksMichael Bernstein
 
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...summersocialwebshop
 
Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...ACSM @ VU University Amsterdam
 
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToSocial Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToAgnese Vellar
 
Comunicare nell'era dei social media
Comunicare nell'era dei social mediaComunicare nell'era dei social media
Comunicare nell'era dei social mediaAgnese Vellar
 
Communication privacy management theory_day
Communication privacy management theory_dayCommunication privacy management theory_day
Communication privacy management theory_daykelseyday
 
Context Collapse on Social Networking Sites
Context Collapse on Social Networking SitesContext Collapse on Social Networking Sites
Context Collapse on Social Networking SitesStefanie Duguay
 
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...Jessica Vitak
 
Communication Privacy Management Theory
Communication Privacy Management TheoryCommunication Privacy Management Theory
Communication Privacy Management Theorymlodom
 
Digital Footprint
Digital FootprintDigital Footprint
Digital FootprintRobin Low
 
Using Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social MediaUsing Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social MediaPaul Brown
 
Communication Concepts, Theories And Models1
Communication Concepts, Theories And Models1Communication Concepts, Theories And Models1
Communication Concepts, Theories And Models1Suchitra Patnaik
 

Destaque (17)

LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social MediaLSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
 
A private sphereslideshare
A private sphereslideshareA private sphereslideshare
A private sphereslideshare
 
Strata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy OfficerStrata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy Officer
 
Quantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksQuantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social Networks
 
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
 
The Glass House: Anonymity Vs. Transparency on the Internet
The Glass House: Anonymity Vs. Transparency on the InternetThe Glass House: Anonymity Vs. Transparency on the Internet
The Glass House: Anonymity Vs. Transparency on the Internet
 
Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...
 
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToSocial Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Comunicare nell'era dei social media
Comunicare nell'era dei social mediaComunicare nell'era dei social media
Comunicare nell'era dei social media
 
Communication privacy management theory_day
Communication privacy management theory_dayCommunication privacy management theory_day
Communication privacy management theory_day
 
Context Collapse on Social Networking Sites
Context Collapse on Social Networking SitesContext Collapse on Social Networking Sites
Context Collapse on Social Networking Sites
 
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
 
Communication Privacy Management Theory
Communication Privacy Management TheoryCommunication Privacy Management Theory
Communication Privacy Management Theory
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprint
 
Using Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social MediaUsing Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social Media
 
Communication Concepts, Theories And Models1
Communication Concepts, Theories And Models1Communication Concepts, Theories And Models1
Communication Concepts, Theories And Models1
 

Semelhante a Managing Privacy and Context Collapse in the Facebook Age

Understanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesUnderstanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesJessica Vitak
 
Social Network Sites: An Overview
Social Network Sites: An OverviewSocial Network Sites: An Overview
Social Network Sites: An OverviewJessica Vitak
 
Socially-Aware Informal Learning Support: Potential and Challenges of the So...
Socially-Aware Informal Learning Support:Potential and Challenges of the So...Socially-Aware Informal Learning Support:Potential and Challenges of the So...
Socially-Aware Informal Learning Support: Potential and Challenges of the So...Simone Braun
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingMicah Altman
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social mediakmtj1979
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesMichael Zimmer
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Open University Australia
 
Privacy Codes of Practice for the Social Web:
Privacy Codes of Practice for the Social Web:Privacy Codes of Practice for the Social Web:
Privacy Codes of Practice for the Social Web:girmaenideg
 
Social data: what it is, who owns it, and why you should care
Social data: what it is, who owns it, and why you should careSocial data: what it is, who owns it, and why you should care
Social data: what it is, who owns it, and why you should careCornelius Puschmann
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social MediaPhysiopedia
 
Data protection and social networks
Data protection and social networksData protection and social networks
Data protection and social networksblogzilla
 
Problem statement-1-friend-affinity-finder
Problem statement-1-friend-affinity-finderProblem statement-1-friend-affinity-finder
Problem statement-1-friend-affinity-finderAmitabhDas22
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leadingHsuan-Ting Chen
 
SOCIAL NETWORKING FOR INTEGRATION.pptx
SOCIAL NETWORKING FOR INTEGRATION.pptxSOCIAL NETWORKING FOR INTEGRATION.pptx
SOCIAL NETWORKING FOR INTEGRATION.pptxFrancis Dave Mabborang
 
Dagens Välfärd's website - the Open Square
Dagens Välfärd's website - the Open SquareDagens Välfärd's website - the Open Square
Dagens Välfärd's website - the Open SquareTricia Rambharose
 
Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6jiahao84
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activityguest09fcd1
 
CSW2022_06_influence.pptx.pdf
CSW2022_06_influence.pptx.pdfCSW2022_06_influence.pptx.pdf
CSW2022_06_influence.pptx.pdfSaraJayneTerp
 
SocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for BusinessesSocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for BusinessesJulian Ranger
 

Semelhante a Managing Privacy and Context Collapse in the Facebook Age (20)

Understanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesUnderstanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
 
Social Network Sites: An Overview
Social Network Sites: An OverviewSocial Network Sites: An Overview
Social Network Sites: An Overview
 
Socially-Aware Informal Learning Support: Potential and Challenges of the So...
Socially-Aware Informal Learning Support:Potential and Challenges of the So...Socially-Aware Informal Learning Support:Potential and Challenges of the So...
Socially-Aware Informal Learning Support: Potential and Challenges of the So...
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social media
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?
 
Privacy Codes of Practice for the Social Web:
Privacy Codes of Practice for the Social Web:Privacy Codes of Practice for the Social Web:
Privacy Codes of Practice for the Social Web:
 
Social data: what it is, who owns it, and why you should care
Social data: what it is, who owns it, and why you should careSocial data: what it is, who owns it, and why you should care
Social data: what it is, who owns it, and why you should care
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social Media
 
Data protection and social networks
Data protection and social networksData protection and social networks
Data protection and social networks
 
Problem statement-1-friend-affinity-finder
Problem statement-1-friend-affinity-finderProblem statement-1-friend-affinity-finder
Problem statement-1-friend-affinity-finder
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leading
 
SOCIAL NETWORKING FOR INTEGRATION.pptx
SOCIAL NETWORKING FOR INTEGRATION.pptxSOCIAL NETWORKING FOR INTEGRATION.pptx
SOCIAL NETWORKING FOR INTEGRATION.pptx
 
Going Social
Going SocialGoing Social
Going Social
 
Dagens Välfärd's website - the Open Square
Dagens Välfärd's website - the Open SquareDagens Välfärd's website - the Open Square
Dagens Välfärd's website - the Open Square
 
Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
 
CSW2022_06_influence.pptx.pdf
CSW2022_06_influence.pptx.pdfCSW2022_06_influence.pptx.pdf
CSW2022_06_influence.pptx.pdf
 
SocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for BusinessesSocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for Businesses
 

Mais de Jessica Vitak

CSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont PrinciplesCSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont PrinciplesJessica Vitak
 
I like it....whatever that means: The evolving relationship between disclosur...
I like it....whatever that means: The evolving relationship between disclosur...I like it....whatever that means: The evolving relationship between disclosur...
I like it....whatever that means: The evolving relationship between disclosur...Jessica Vitak
 
INFM600 Module 1 lecture
INFM600 Module 1 lectureINFM600 Module 1 lecture
INFM600 Module 1 lectureJessica Vitak
 
Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social MediaLeveraging Your Audience Through Social Media
Leveraging Your Audience Through Social MediaJessica Vitak
 
Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social Media Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social Media Jessica Vitak
 
Connecting in the Facebook Age: Development and Validation of a New Measure o...
Connecting in the Facebook Age: Development and Validation of a New Measure o...Connecting in the Facebook Age: Development and Validation of a New Measure o...
Connecting in the Facebook Age: Development and Validation of a New Measure o...Jessica Vitak
 
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...Jessica Vitak
 
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...Jessica Vitak
 
Social Media: Where We Stand, Where We’re Heading
Social Media: Where We Stand, Where We’re HeadingSocial Media: Where We Stand, Where We’re Heading
Social Media: Where We Stand, Where We’re HeadingJessica Vitak
 
Technology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word OutTechnology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word OutJessica Vitak
 
Social Support and Information-Sharing on Facebook by Adult Users
Social Support and Information-Sharing on Facebook by Adult UsersSocial Support and Information-Sharing on Facebook by Adult Users
Social Support and Information-Sharing on Facebook by Adult UsersJessica Vitak
 

Mais de Jessica Vitak (11)

CSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont PrinciplesCSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont Principles
 
I like it....whatever that means: The evolving relationship between disclosur...
I like it....whatever that means: The evolving relationship between disclosur...I like it....whatever that means: The evolving relationship between disclosur...
I like it....whatever that means: The evolving relationship between disclosur...
 
INFM600 Module 1 lecture
INFM600 Module 1 lectureINFM600 Module 1 lecture
INFM600 Module 1 lecture
 
Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social MediaLeveraging Your Audience Through Social Media
Leveraging Your Audience Through Social Media
 
Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social Media Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social Media
 
Connecting in the Facebook Age: Development and Validation of a New Measure o...
Connecting in the Facebook Age: Development and Validation of a New Measure o...Connecting in the Facebook Age: Development and Validation of a New Measure o...
Connecting in the Facebook Age: Development and Validation of a New Measure o...
 
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...
 
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...
 
Social Media: Where We Stand, Where We’re Heading
Social Media: Where We Stand, Where We’re HeadingSocial Media: Where We Stand, Where We’re Heading
Social Media: Where We Stand, Where We’re Heading
 
Technology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word OutTechnology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word Out
 
Social Support and Information-Sharing on Facebook by Adult Users
Social Support and Information-Sharing on Facebook by Adult UsersSocial Support and Information-Sharing on Facebook by Adult Users
Social Support and Information-Sharing on Facebook by Adult Users
 

Último

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Último (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Managing Privacy and Context Collapse in the Facebook Age

  • 1. Protecting Face: Managing Privacy and Context Collapse in the Facebook Age Jessica Vitak (@jvitak) PhD Candidate, Michigan State University Assistant Professor, University of Maryland iSchool (August 2012) 1 Theorizing the Web | April 14, 2012 | College Park, MD
  • 2. How are Facebook users managing context collapse and interacting with a diverse set of friends? 2
  • 3. What is context collapse? • We present different versions of the self depending on our audience • Could include: • Style of dress • Speech Ego • Non-verbals • Context collapse occurs when we “perform” for different audiences at same time 3 • e.g., weddings
  • 4. Context Collapse on Facebook 4
  • 5. How context collapse might impact Facebook use 1) Strength of weak ties (Granovetter, 1973): users distribute content (esp. resource requests) to entire network to increase likelihood that someone will see it and respond. 2) Privacy settings: users employ increasingly granular privacy settings to segment network into different audiences 3) Lowest common denominator (Hogan, 2010): users only distribute content appropriate for all “friends.” 5
  • 6. Privacy Online Privacy: “selective control of access to the self,” achieved by regulating social interactions (Altman, 1975) Multiple Stalkers Accounts ID Theft Friends Restricting Private Only Searchability Content Employers Privacy Places / Privacy Friend Check-ins Lists Concerns Settings Visibility Hacked Limit of Content Account Restricting Old Inappropriate Tagging Posts Limited 6 Content Profile
  • 7. Communications Privacy Management Theory (Petronio, 2002) • Relationships managed by balancing privacy and disclosures Privacy (Concealing) Disclosures (Revealing) • Privacy and disclosures function in “incompatible” ways • We create boundaries to Collective Boundary Person A’s Person B’s demarcate both private and Personal Personal Boundary Boundary shared information 7
  • 8. Boundary Management on Facebook • Default settings emphasize revealing, not concealing • Networks are increasingly large and diverse • Most users maintain very permeable boundaries to personal information and shared content Strategies for controlling access to private information: • Privacy Settings • Controlling Friend Requests/Defriending • Removing Content/Untagging • Not sharing content (lowest common denominator; 8 deactivating)
  • 9. Study & Analysis (Vitak, in preparation) • Survey participants (see Vitak, 2012) volunteered for follow-up study • Selection criteria: Use of Facebook’s advanced privacy settings/multiple accounts • Interviews • 26 participants; length: 30-94 minutes • Primary topic: Boundary management strategies • Analysis • Interviews transcribed, proofed, uploaded into Dedoose • Analyzed using textual microanalysis (Strauss & Corbin, 1998) 9
  • 10. Findings: Friending/Defriending • 24 participants (92%) set profile to Friends Only • Most users reported a lot of Facebook Friends… • M = 500, Median = 433, SD = 361, range: 62 – 1600 • …and many were weak ties • 8% fell within circles with most overlap, 2nd 52% in circles with least overlap Tier Weak Ties 3rd • Most users (73%) described defriending Tier practices to manage network • Many performed “friend purges” • Hesitation/concern for hurting people’s feelings • Hiding was an alternative practice to defriending 10
  • 11. Findings: Segregating Audiences • 20 participants (77%) actively used Lists to restrict access to content to specific groups of Friends. • Maintaining power dynamics • Blocking family • Restricting content to close friends & family • Private Messages or Notes visible to small group of Friends • 57% of Twitter users kept multiple accounts • Usually divided based on personal/professional identities 11
  • 12. Findings: Lowest Common Denominator • Even with heavy use of privacy settings, most users reported censoring posts • Focus on positive updates • Easier to not post than negotiate boundaries • Simplifying posts to make them more widely appealing • Privacy concerns • Conscious thought process about audience before posting: • Who will see this post? • How might it be misinterpreted? 12 • Will people find this post interesting/funny/worthwhile/etc.?
  • 13. Implications • Among those highly engaged in impression management online, concealing often outweighs revealing • Contrary to Zukerberg’s “new social norm” argument • If true, this impacts: • Opportunities for social capital transactions • Relationship maintenance …but what about disconnecting completely? 13
  • 14. Logging Off Arguments For: Arguments Against: • “Addiction” concerns • Relationship maintenance • More meaningful interactions • Missing out • Less distractions • Networking • More productivity • New connections • Work/Life Balance • Social capital exchanges • Context Collapse • Information retrieval 14
  • 15. Tools to Help You Log Off “Productivity through disconnection” “Turn off your friends…” 15 * Fred Stutzman, the creator of these apps, is a rock star.
  • 16. Thanks! Contact: vitakjes@msu.edu Twitter: @jvitak Website: vitak.wordpress.com * Paper referenced in study: 16 Vitak, J. (2012, May). The impact of context collapse and privacy on social network site disclosures. Paper to be presented at the International Communication Association 62nd Annual Conference, Phoenix, AZ. (Also currently under review at a Communication Journal)