ABSTRACT
The management of group context in socially mediating technologies is an important challenge for the design community. To better understand how users manage group context, we explored the practice of multiple profile management in social media. In doing so, we observed creative and opportunistic strategies for group context management. We found that multiple profile maintenance is motivated by four factors: privacy, identity, utility, and propriety. Drawing on these motives, we observe a continuum of boundary regulation behaviors: pseudonymity, practical obscurity, and transparent separation. Based on these findings, we encourage designers of group context management systems to more broadly consider motives and practices of group separations in social media. Group context management systems should be privacy-enhancing, but a singular focus on privacy overlooks a range of other group context management practices.
- Acquisti, A. and Gross, R. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. Proc. PET 2006, Springer (2006), 36--56. Google ScholarDigital Library
- Adu-Oppong, F., Gardiner, C. K., Kapadia, A., and Tsang, P. P. Social Circles: Tackling Privacy in Social Networks. Proc. SOUPS 2008.Google Scholar
- Ahern, S., Eckles, D., Good, N. S., King, S., Naaman, M., and Nair, R. Over-exposed?: Privacy Patterns and Considerations in Online and Mobile Photo Sharing. Proc. CHI 2007, ACM Press (2007), 357--366. Google ScholarDigital Library
- Altman, I. The Environment and Social Behavior. Brooks/Cole, Monterey, CA, 1975.Google Scholar
- Baden, R., Bender, A., Spring, N., Bhattacharjee, B., and Starin, D. Persona: An Online Social Network with User-Defined Privacy. ACM SIGCOMM Computer Communication Review 39, 4 (2009), 135--146. Google ScholarDigital Library
- boyd, d. Why Youth (heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life. In Buckingham, D. (Ed.), The John D. and Catherine T. MacArthur Foundation Series on Digital Media and Learning. MIT Press, Cambridge, MA, 2007, 119--142.Google Scholar
- boyd, d. and Ellison, N.B. Social Network Sites: Definition, History, and Scholarship. JCMC 13, 1 (2007).Google ScholarDigital Library
- Chai, S., Bagchi-Sen, S., Morrell, C., Rao, H. R., and Upadhyaya, S. J. Internet and Online Information Privacy: An Exploratory Study of Preteens and Early Teens. IEEE Transactions on Professional Communication 52, 2 (2009), 167--182.Google ScholarCross Ref
- DiMicco, J. M. and Millen, D. R. Identity Management: Multiple Presentations of Self in Facebook. Proc. GROUP 2007, ACM Press (2007), 383--386. Google ScholarDigital Library
- Egelman, S., Oates, A., and Krishnamurthi, S. Oops, I did it Again: Mitigating Repeated Access Control Errors on Facebook. Proc. CHI 2011, ACM Press (2011), 2295--2304. Google ScholarDigital Library
- Fang, L. and LeFevre, K. Privacy Wizards for Social Networking Sites. Proc. WWW 2010, ACM Press (2010), 351--360. Google ScholarDigital Library
- Farnham, S. D. and Churchill, E. F. Faceted Identity, Faceted Lives: Social and Technical Issues with Being Yourself Online. Proc. CHI 2011, ACM Press (2011), 359--368. Google ScholarDigital Library
- Fong, P., Anwar, M., and Zhao, Z. A Privacy Preservation Model for Facebook-Style Social Network Systems. Proc. ESORICS 2009, Springer (2009), 303--320. Google ScholarDigital Library
- Glaser, B. G. and Strauss, A. L. The Discovery of Grounded Theory: Strategies for Qualitative Research. Aldine de Gruyter, Hawthorne, NY, 1967.Google Scholar
- Goffman, E. The Presentation of Self in Everyday Life. Anchor Books, New York, 1959.Google Scholar
- Guha, S., Tang, K., and Francis, P. NOYB: Privacy in Online Social Networks. Proc. WOSN 2008, ACM Press (2008), 49--54. Google ScholarDigital Library
- Jones, S. and O'Neill, E. Feasibility of Structural Network Clustering for Group-Based Privacy Control in Social Networks. Proc. SOUPS 2010, ACM Press (2010), 9:1--9:13. Google ScholarDigital Library
- Lampe, C., Ellison, N.B., and Steinfield, C. Changes in Use and Perception of Facebook, Proc. CSCW 2008, ACM Press (2008), 721--730. Google ScholarDigital Library
- Lampinen, A., Tamminen, S., and Oulasvirta, A. All My People Right Here, Right Now: Management of Group Co-Presence on a Social Networking Site. Proc. GROUP 2009, ACM Press (2009), 281--290. Google ScholarDigital Library
- Lenhart, A. Adults and Social Network Websites. Pew Internet and American Life Project, Washington DC (2009).Google Scholar
- Lenhart, A., Purcell, K., Smith, A., and Zickuhr, K. Social Media and Young Adults. Pew Internet and American Life Project, Washington, DC (2010).Google Scholar
- Lipford, H. R., Hull, G., Latulipe, C., Besmer, A., and Watson, J. Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites. Proc. CSE 2009, ACM Press (2009), 985--989. Google ScholarDigital Library
- Nippert-Eng, C. E. Islands of Privacy. University Of Chicago Press, Chicago, 2010.Google ScholarCross Ref
- Ozenc, F. K. and Farnham, S. D. (2011). Life "Modes" in Social Media. Proc. CHI 2011, ACM Press (2011), 561--570. Google ScholarDigital Library
- Palen, L. and Dourish, P. Unpacking "Privacy" for a Networked World. Proc. CHI 2003, ACM Press (2003), 129--136. Google ScholarDigital Library
- Patil, S., Page, X., and Kobsa, A. With a Little Help from My Friends: Can Social Navigation Inform Interpersonal Privacy Preferences? Proc. CSCW 2011, ACM Press (2011), 391--394. Google ScholarDigital Library
- Petronio, S. Boundaries of Privacy: Dialectics of Disclosure. State University of New York Press, Albany, NY, 2002.Google ScholarCross Ref
- Shakimov, A., Lim, H., Cáceres, R., Cox, L. P., Li, K., Liu, D., and Varshavsky, A. Vis-a-Vis: Privacy-Preserving Online Social Networking via Virtual Individual Servers. Proc. COMSNETS 2011, IEEE Press (2011), 1--10.Google Scholar
- Skeels, M. M. and Grudin, J. When Social Networks Cross Boundaries: A Case Study of Workplace Use of Facebook and LinkedIn. Proc. GROUP 2009, ACM Press (2009), 95--104. Google ScholarDigital Library
- Strauss, A. L. and Corbin, J. M. Basics of Qualitative Research. Thousand Oaks, CA, Sage, 1990.Google Scholar
- Stutzman, F. and Kramer-Duffield, J. (2010). Friends Only: Examining a Privacy-Enhancing Behavior in Facebook. Proc. CHI 2010, ACM Press (2010), 1553--1562. Google ScholarDigital Library
- Terveen, L. and McDonald, D. W. Social matching: A Framework and Research Agenda. ACM ToCHI 12 (2005), 401--434. Google ScholarDigital Library
- Watson, J., Whitney, M., and Lipford, H. R. (2009). Configuring Audience-Oriented Privacy Policies. Proc. AUSC 2009, ACM Press (2009), 71--78. Google ScholarDigital Library
- Westin, A. F. Privacy and Freedom. Athenaeum, New York, 1967Google Scholar
- Zheleva, E. and Getoor, L. (2009). To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles. Proc. WWW 2009, ACM Press (2009), 531--540. Google ScholarDigital Library
Index Terms
- Boundary regulation in social media
Recommendations
Anonymity, Intimacy and Self-Disclosure in Social Media
CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing SystemsSelf-disclosure is rewarding and provides significant benefits for individuals, but it also involves risks, especially in social media settings. We conducted an online experiment to study the relationship between content intimacy and willingness to self-...
Uses and gratifications of social networking sites for bridging and bonding social capital
Applying uses and gratifications theory (UGT) and social capital theory, our study examined users of four social networking sites (SNSs) (Facebook, Twitter, Instagram, and Snapchat), and their influence on online bridging and bonding social capital. ...
Self-disclosure in social media
CHI EA '11: CHI '11 Extended Abstracts on Human Factors in Computing SystemsComputer mediated communication tools have multiplied the possibilities to stay in touch and interact with the people in our social network. The dynamics of use for these tools suggest changes in the context of self-disclosure. Although research has ...
Comments