skip to main content
10.1145/2145204.2145320acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article

Boundary regulation in social media

Published:11 February 2012Publication History

ABSTRACT

The management of group context in socially mediating technologies is an important challenge for the design community. To better understand how users manage group context, we explored the practice of multiple profile management in social media. In doing so, we observed creative and opportunistic strategies for group context management. We found that multiple profile maintenance is motivated by four factors: privacy, identity, utility, and propriety. Drawing on these motives, we observe a continuum of boundary regulation behaviors: pseudonymity, practical obscurity, and transparent separation. Based on these findings, we encourage designers of group context management systems to more broadly consider motives and practices of group separations in social media. Group context management systems should be privacy-enhancing, but a singular focus on privacy overlooks a range of other group context management practices.

References

  1. Acquisti, A. and Gross, R. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. Proc. PET 2006, Springer (2006), 36--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Adu-Oppong, F., Gardiner, C. K., Kapadia, A., and Tsang, P. P. Social Circles: Tackling Privacy in Social Networks. Proc. SOUPS 2008.Google ScholarGoogle Scholar
  3. Ahern, S., Eckles, D., Good, N. S., King, S., Naaman, M., and Nair, R. Over-exposed?: Privacy Patterns and Considerations in Online and Mobile Photo Sharing. Proc. CHI 2007, ACM Press (2007), 357--366. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Altman, I. The Environment and Social Behavior. Brooks/Cole, Monterey, CA, 1975.Google ScholarGoogle Scholar
  5. Baden, R., Bender, A., Spring, N., Bhattacharjee, B., and Starin, D. Persona: An Online Social Network with User-Defined Privacy. ACM SIGCOMM Computer Communication Review 39, 4 (2009), 135--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. boyd, d. Why Youth (heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life. In Buckingham, D. (Ed.), The John D. and Catherine T. MacArthur Foundation Series on Digital Media and Learning. MIT Press, Cambridge, MA, 2007, 119--142.Google ScholarGoogle Scholar
  7. boyd, d. and Ellison, N.B. Social Network Sites: Definition, History, and Scholarship. JCMC 13, 1 (2007).Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Chai, S., Bagchi-Sen, S., Morrell, C., Rao, H. R., and Upadhyaya, S. J. Internet and Online Information Privacy: An Exploratory Study of Preteens and Early Teens. IEEE Transactions on Professional Communication 52, 2 (2009), 167--182.Google ScholarGoogle ScholarCross RefCross Ref
  9. DiMicco, J. M. and Millen, D. R. Identity Management: Multiple Presentations of Self in Facebook. Proc. GROUP 2007, ACM Press (2007), 383--386. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Egelman, S., Oates, A., and Krishnamurthi, S. Oops, I did it Again: Mitigating Repeated Access Control Errors on Facebook. Proc. CHI 2011, ACM Press (2011), 2295--2304. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Fang, L. and LeFevre, K. Privacy Wizards for Social Networking Sites. Proc. WWW 2010, ACM Press (2010), 351--360. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Farnham, S. D. and Churchill, E. F. Faceted Identity, Faceted Lives: Social and Technical Issues with Being Yourself Online. Proc. CHI 2011, ACM Press (2011), 359--368. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Fong, P., Anwar, M., and Zhao, Z. A Privacy Preservation Model for Facebook-Style Social Network Systems. Proc. ESORICS 2009, Springer (2009), 303--320. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Glaser, B. G. and Strauss, A. L. The Discovery of Grounded Theory: Strategies for Qualitative Research. Aldine de Gruyter, Hawthorne, NY, 1967.Google ScholarGoogle Scholar
  15. Goffman, E. The Presentation of Self in Everyday Life. Anchor Books, New York, 1959.Google ScholarGoogle Scholar
  16. Guha, S., Tang, K., and Francis, P. NOYB: Privacy in Online Social Networks. Proc. WOSN 2008, ACM Press (2008), 49--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Jones, S. and O'Neill, E. Feasibility of Structural Network Clustering for Group-Based Privacy Control in Social Networks. Proc. SOUPS 2010, ACM Press (2010), 9:1--9:13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Lampe, C., Ellison, N.B., and Steinfield, C. Changes in Use and Perception of Facebook, Proc. CSCW 2008, ACM Press (2008), 721--730. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Lampinen, A., Tamminen, S., and Oulasvirta, A. All My People Right Here, Right Now: Management of Group Co-Presence on a Social Networking Site. Proc. GROUP 2009, ACM Press (2009), 281--290. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Lenhart, A. Adults and Social Network Websites. Pew Internet and American Life Project, Washington DC (2009).Google ScholarGoogle Scholar
  21. Lenhart, A., Purcell, K., Smith, A., and Zickuhr, K. Social Media and Young Adults. Pew Internet and American Life Project, Washington, DC (2010).Google ScholarGoogle Scholar
  22. Lipford, H. R., Hull, G., Latulipe, C., Besmer, A., and Watson, J. Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites. Proc. CSE 2009, ACM Press (2009), 985--989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Nippert-Eng, C. E. Islands of Privacy. University Of Chicago Press, Chicago, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  24. Ozenc, F. K. and Farnham, S. D. (2011). Life "Modes" in Social Media. Proc. CHI 2011, ACM Press (2011), 561--570. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Palen, L. and Dourish, P. Unpacking "Privacy" for a Networked World. Proc. CHI 2003, ACM Press (2003), 129--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Patil, S., Page, X., and Kobsa, A. With a Little Help from My Friends: Can Social Navigation Inform Interpersonal Privacy Preferences? Proc. CSCW 2011, ACM Press (2011), 391--394. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Petronio, S. Boundaries of Privacy: Dialectics of Disclosure. State University of New York Press, Albany, NY, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  28. Shakimov, A., Lim, H., Cáceres, R., Cox, L. P., Li, K., Liu, D., and Varshavsky, A. Vis-a-Vis: Privacy-Preserving Online Social Networking via Virtual Individual Servers. Proc. COMSNETS 2011, IEEE Press (2011), 1--10.Google ScholarGoogle Scholar
  29. Skeels, M. M. and Grudin, J. When Social Networks Cross Boundaries: A Case Study of Workplace Use of Facebook and LinkedIn. Proc. GROUP 2009, ACM Press (2009), 95--104. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Strauss, A. L. and Corbin, J. M. Basics of Qualitative Research. Thousand Oaks, CA, Sage, 1990.Google ScholarGoogle Scholar
  31. Stutzman, F. and Kramer-Duffield, J. (2010). Friends Only: Examining a Privacy-Enhancing Behavior in Facebook. Proc. CHI 2010, ACM Press (2010), 1553--1562. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Terveen, L. and McDonald, D. W. Social matching: A Framework and Research Agenda. ACM ToCHI 12 (2005), 401--434. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Watson, J., Whitney, M., and Lipford, H. R. (2009). Configuring Audience-Oriented Privacy Policies. Proc. AUSC 2009, ACM Press (2009), 71--78. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Westin, A. F. Privacy and Freedom. Athenaeum, New York, 1967Google ScholarGoogle Scholar
  35. Zheleva, E. and Getoor, L. (2009). To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles. Proc. WWW 2009, ACM Press (2009), 531--540. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Boundary regulation in social media

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CSCW '12: Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work
      February 2012
      1460 pages
      ISBN:9781450310864
      DOI:10.1145/2145204

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 February 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CSCW '12 Paper Acceptance Rate164of415submissions,40%Overall Acceptance Rate2,235of8,521submissions,26%

      Upcoming Conference

      CSCW '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader