SlideShare a Scribd company logo
1 of 32
When we use social software...
                 
          like Twitter
         or Facebook
       or Google Reader
          or LinkedIn
         or Foursquare
          or Gowalla
       or Message boards
            or IM
             or ...
We want
But sometimes it's
"I posted my location
on Foursquare to tell my
friends to stop by–
but my ex showed up
too."




http://www.michellesblog.net/other-social-networks/why-i-cant-
get-as-excited-about-geolocation-as-scoble
Social:
The ex doesn't know or care that he's not invited.

Technological:
I shared my location publicly, but I didn't know he was
listening.
Or perhaps he's watching a mutual friend's updates to see
where I am (The friend posts "Hanging out with Katie
at Lucky Lab")
"I post pictures from
parties and vacations on
Flickr, to share with my
friends."
Social:
My friends enjoy seeing what I've been doing, and reliving
our shared experiences.

Technological:
My Flickr photos can be set to public, private, or shared with
a designated group of contacts.
"I used Facebook to invite
certain friends and family
members to a baby shower,
but it was re-posted to a
public local events calendar
via an iCalendar feed."




http://blog.jonudell.net/2010/04/30/surprise-your-facebook-
visibility-isnt-what-you-thought-it-was/
Social:
I only want to invite some people to the event, not
everyone in town, so I picked a privacy setting I thought
would do this.

Technological:
Facebook's iCalendar feed service used my privacy setting
choice in a different manner than I expected when I
selected it.
I talk to friends on Twitter
when we all have insomnia, and
wackiness (#electricblanket)
ensues.
Social:
Twitter is open at all hours, and anyone who doesn't like
what I post is free to unfollow me.

Technological:
Twitter shares a feed of what I post to all of my followers,
even if they're not online till tomorrow morning.
And if a group of us vote up a new trending topic while 
the rest of you sleep, well...
"I updated my resume
information on LinkedIn,
but it sent an email
notification to my boss and
coworkers."


                             awkward?
Social:
I use LinkedIn to post my resume information, and I'm
connected with current and former coworkers on the site.

Technological:
The site sends out periodic updates showing which users
you're connected to have added profile information, like
their job experience.
"I organized a surprise
birthday party for my
friend using Facebook."
Social:
I don't know how to reach all of my friend's friends directly,
but we're all connected on Facebook, so that's how I send
the invite.

Technological:
Facebook lets me send private (secret) event invites to a
selected group of users.
We probably can't change the
social problems with our software.

But we can make sure that the
technology enables fun or creepy
experiences in a deliberate manner.
How?
danah boyd writes,
"Over and over again, I find that people’s mental
model of who can see what doesn’t match up with
reality."




http://www.zephoria.org/thoughts/archives/2010/05/14/
facebook-and-radical-transparency-a-rant.html
We think we're sharing
with the people we want to
see it: friends, family,
friendly strangers.
But maybe we're also
sharing with people who
wish us harm, or family or
co-workers who aren't part
of our social life, or
marketing databases.
The software might even expose information we
didn't even know was there to be shared.
 
Like the amount of time we spend on a website.
 
Or that we've just qualified for the "douchebag"
badge.
Ways we can do it right:
 
Show the user the full context when information is shared.
 
Provide flexible controls for setting who has access.

Pick explicit over implicit.
Doing it right is hard.
Privacy settings on LiveJournal
Ways we can do it wrong:

Rely on implicit understandings of who should see what.

Make the controls and settings hard to find and use. Then
change how they work.

Assume that if you're okay with the information being
exposed, your users will be happy too.
Doing it wrong is easy.
A Graph on Navigating Facebook Privacy Settings,
       via New York Times, May 10 2010
But wait!
Is creepy always bad?
A better question:

Is exposure always bad? 
Don't we want to share with each other?

Different things are creepy for different people.
Your turn:
Questions?
Understanding the Gap Between User Expectations and Reality in Social Software

More Related Content

Similar to Understanding the Gap Between User Expectations and Reality in Social Software

Understanding College Student Life Online and What it Means for Social Media ...
Understanding College Student Life Online and What it Means for Social Media ...Understanding College Student Life Online and What it Means for Social Media ...
Understanding College Student Life Online and What it Means for Social Media ...Paul Brown
 
Ost 284 emerging technologies final exam
Ost 284 emerging technologies final examOst 284 emerging technologies final exam
Ost 284 emerging technologies final examKayla Wallace
 
Synthesis mobile personal learning
Synthesis mobile personal learningSynthesis mobile personal learning
Synthesis mobile personal learningangel9915
 
Social media + privacy
Social media + privacySocial media + privacy
Social media + privacyShea Sylvia
 
#Digi foot12 week 1 final v ersion
#Digi foot12 week 1 final v ersion#Digi foot12 week 1 final v ersion
#Digi foot12 week 1 final v ersionverenanz
 
John Blike Generation LikeJohn Blike III posted Feb 16, 2018 11.docx
John Blike Generation LikeJohn Blike III posted Feb 16, 2018 11.docxJohn Blike Generation LikeJohn Blike III posted Feb 16, 2018 11.docx
John Blike Generation LikeJohn Blike III posted Feb 16, 2018 11.docxchristiandean12115
 
Social work and social media presentation
Social work and social media presentationSocial work and social media presentation
Social work and social media presentationcomcareandy
 
Why dark social sharing isnt light years away
Why dark social sharing isnt light years awayWhy dark social sharing isnt light years away
Why dark social sharing isnt light years awayJoão Romão
 
digital-footprint.pptx
digital-footprint.pptxdigital-footprint.pptx
digital-footprint.pptxCatherine Seo
 
Rethinking Information Literacy: Classroom Evidence for Incorporating Student...
Rethinking Information Literacy: Classroom Evidence for Incorporating Student...Rethinking Information Literacy: Classroom Evidence for Incorporating Student...
Rethinking Information Literacy: Classroom Evidence for Incorporating Student...Donna Witek
 
My Social Media Resume - Shannon Gové
My Social Media Resume - Shannon GovéMy Social Media Resume - Shannon Gové
My Social Media Resume - Shannon Govéshannonmarieog
 
Creativity And Computers Presentation
Creativity And Computers PresentationCreativity And Computers Presentation
Creativity And Computers Presentationchiwawawa
 
Information Literacy and Social Media: How Facebook is Changing Students’ At...
Information Literacy and Social Media: How Facebook is Changing Students’  At...Information Literacy and Social Media: How Facebook is Changing Students’  At...
Information Literacy and Social Media: How Facebook is Changing Students’ At...Donna Witek
 
Week 6: Digital Privacy
Week 6: Digital Privacy Week 6: Digital Privacy
Week 6: Digital Privacy Ray Brannon
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking PresentationDonna Spear
 
YNPN Detroit Social Media Presentation - May 2010
YNPN Detroit Social Media Presentation - May 2010YNPN Detroit Social Media Presentation - May 2010
YNPN Detroit Social Media Presentation - May 2010sarahpercoulis
 
My personal learning environment
My personal learning environmentMy personal learning environment
My personal learning environmentbehyta_24
 

Similar to Understanding the Gap Between User Expectations and Reality in Social Software (20)

Understanding College Student Life Online and What it Means for Social Media ...
Understanding College Student Life Online and What it Means for Social Media ...Understanding College Student Life Online and What it Means for Social Media ...
Understanding College Student Life Online and What it Means for Social Media ...
 
Ost 284 emerging technologies final exam
Ost 284 emerging technologies final examOst 284 emerging technologies final exam
Ost 284 emerging technologies final exam
 
Synthesis mobile personal learning
Synthesis mobile personal learningSynthesis mobile personal learning
Synthesis mobile personal learning
 
Social media + privacy
Social media + privacySocial media + privacy
Social media + privacy
 
Librarysocmed2
Librarysocmed2Librarysocmed2
Librarysocmed2
 
#Digi foot12 week 1 final v ersion
#Digi foot12 week 1 final v ersion#Digi foot12 week 1 final v ersion
#Digi foot12 week 1 final v ersion
 
John Blike Generation LikeJohn Blike III posted Feb 16, 2018 11.docx
John Blike Generation LikeJohn Blike III posted Feb 16, 2018 11.docxJohn Blike Generation LikeJohn Blike III posted Feb 16, 2018 11.docx
John Blike Generation LikeJohn Blike III posted Feb 16, 2018 11.docx
 
Social work and social media presentation
Social work and social media presentationSocial work and social media presentation
Social work and social media presentation
 
Why dark social sharing isnt light years away
Why dark social sharing isnt light years awayWhy dark social sharing isnt light years away
Why dark social sharing isnt light years away
 
digital-footprint.pptx
digital-footprint.pptxdigital-footprint.pptx
digital-footprint.pptx
 
Grasping Social Patterns
Grasping Social PatternsGrasping Social Patterns
Grasping Social Patterns
 
Rethinking Information Literacy: Classroom Evidence for Incorporating Student...
Rethinking Information Literacy: Classroom Evidence for Incorporating Student...Rethinking Information Literacy: Classroom Evidence for Incorporating Student...
Rethinking Information Literacy: Classroom Evidence for Incorporating Student...
 
My Social Media Resume - Shannon Gové
My Social Media Resume - Shannon GovéMy Social Media Resume - Shannon Gové
My Social Media Resume - Shannon Gové
 
Creativity And Computers Presentation
Creativity And Computers PresentationCreativity And Computers Presentation
Creativity And Computers Presentation
 
Information Literacy and Social Media: How Facebook is Changing Students’ At...
Information Literacy and Social Media: How Facebook is Changing Students’  At...Information Literacy and Social Media: How Facebook is Changing Students’  At...
Information Literacy and Social Media: How Facebook is Changing Students’ At...
 
Week 6: Digital Privacy
Week 6: Digital Privacy Week 6: Digital Privacy
Week 6: Digital Privacy
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking Presentation
 
Social Media Playbook
Social Media PlaybookSocial Media Playbook
Social Media Playbook
 
YNPN Detroit Social Media Presentation - May 2010
YNPN Detroit Social Media Presentation - May 2010YNPN Detroit Social Media Presentation - May 2010
YNPN Detroit Social Media Presentation - May 2010
 
My personal learning environment
My personal learning environmentMy personal learning environment
My personal learning environment
 

Recently uploaded

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Understanding the Gap Between User Expectations and Reality in Social Software

  • 1.
  • 2. When we use social software...   like Twitter or Facebook or Google Reader or LinkedIn or Foursquare or Gowalla or Message boards or IM or ...
  • 5. "I posted my location on Foursquare to tell my friends to stop by– but my ex showed up too." http://www.michellesblog.net/other-social-networks/why-i-cant- get-as-excited-about-geolocation-as-scoble
  • 6. Social: The ex doesn't know or care that he's not invited. Technological: I shared my location publicly, but I didn't know he was listening. Or perhaps he's watching a mutual friend's updates to see where I am (The friend posts "Hanging out with Katie at Lucky Lab")
  • 7. "I post pictures from parties and vacations on Flickr, to share with my friends."
  • 8. Social: My friends enjoy seeing what I've been doing, and reliving our shared experiences. Technological: My Flickr photos can be set to public, private, or shared with a designated group of contacts.
  • 9. "I used Facebook to invite certain friends and family members to a baby shower, but it was re-posted to a public local events calendar via an iCalendar feed." http://blog.jonudell.net/2010/04/30/surprise-your-facebook- visibility-isnt-what-you-thought-it-was/
  • 10. Social: I only want to invite some people to the event, not everyone in town, so I picked a privacy setting I thought would do this. Technological: Facebook's iCalendar feed service used my privacy setting choice in a different manner than I expected when I selected it.
  • 11. I talk to friends on Twitter when we all have insomnia, and wackiness (#electricblanket) ensues.
  • 12. Social: Twitter is open at all hours, and anyone who doesn't like what I post is free to unfollow me. Technological: Twitter shares a feed of what I post to all of my followers, even if they're not online till tomorrow morning. And if a group of us vote up a new trending topic while  the rest of you sleep, well...
  • 13. "I updated my resume information on LinkedIn, but it sent an email notification to my boss and coworkers." awkward?
  • 14. Social: I use LinkedIn to post my resume information, and I'm connected with current and former coworkers on the site. Technological: The site sends out periodic updates showing which users you're connected to have added profile information, like their job experience.
  • 15. "I organized a surprise birthday party for my friend using Facebook."
  • 16. Social: I don't know how to reach all of my friend's friends directly, but we're all connected on Facebook, so that's how I send the invite. Technological: Facebook lets me send private (secret) event invites to a selected group of users.
  • 17. We probably can't change the social problems with our software. But we can make sure that the technology enables fun or creepy experiences in a deliberate manner.
  • 18. How?
  • 19. danah boyd writes, "Over and over again, I find that people’s mental model of who can see what doesn’t match up with reality." http://www.zephoria.org/thoughts/archives/2010/05/14/ facebook-and-radical-transparency-a-rant.html
  • 20. We think we're sharing with the people we want to see it: friends, family, friendly strangers.
  • 21. But maybe we're also sharing with people who wish us harm, or family or co-workers who aren't part of our social life, or marketing databases.
  • 22. The software might even expose information we didn't even know was there to be shared.   Like the amount of time we spend on a website.   Or that we've just qualified for the "douchebag" badge.
  • 23. Ways we can do it right:   Show the user the full context when information is shared.   Provide flexible controls for setting who has access. Pick explicit over implicit.
  • 24. Doing it right is hard.
  • 25. Privacy settings on LiveJournal
  • 26. Ways we can do it wrong: Rely on implicit understandings of who should see what. Make the controls and settings hard to find and use. Then change how they work. Assume that if you're okay with the information being exposed, your users will be happy too.
  • 27. Doing it wrong is easy.
  • 28. A Graph on Navigating Facebook Privacy Settings, via New York Times, May 10 2010
  • 29. But wait! Is creepy always bad?
  • 30. A better question: Is exposure always bad?  Don't we want to share with each other? Different things are creepy for different people.