SlideShare a Scribd company logo
Protecting Face:
Managing Privacy and Context
Collapse in the Facebook Age
Jessica Vitak (@jvitak)
PhD Candidate, Michigan State University
Assistant Professor, University of Maryland iSchool (August 2012)
                                                                    1
Theorizing the Web | April 14, 2012 | College Park, MD
How are Facebook users managing context collapse
and interacting with a diverse set of friends?




                                                   2
What is context collapse?
• We present different versions
  of the self depending on our
  audience
• Could include:
  • Style of dress
  • Speech                        Ego
  • Non-verbals


• Context collapse occurs when
  we “perform” for different
  audiences at same time                3
  • e.g., weddings
Context Collapse on Facebook




                               4
How context collapse might
impact Facebook use
1) Strength of weak ties (Granovetter, 1973): users distribute
   content (esp. resource requests) to entire network to
   increase likelihood that someone will see it and respond.

2) Privacy settings: users employ increasingly granular
   privacy settings to segment network into different
   audiences

3) Lowest common denominator (Hogan, 2010): users only
   distribute content appropriate for all “friends.”
                                                                 5
Privacy Online
     Privacy: “selective control of access to the self,” achieved by
     regulating social interactions (Altman, 1975)


                                                            Multiple
                  Stalkers                                  Accounts
     ID Theft                                  Friends                  Restricting
                                Private         Only                   Searchability
                                Content
Employers        Privacy                    Places /        Privacy         Friend
                                           Check-ins                         Lists
                Concerns                                    Settings
  Visibility                     Hacked                                      Limit
 of Content                      Account      Restricting                     Old
                Inappropriate                  Tagging                       Posts
                                                             Limited                   6
                   Content                                   Profile
Communications Privacy
 Management Theory (Petronio, 2002)
• Relationships managed by balancing privacy and disclosures

        Privacy (Concealing)            Disclosures (Revealing)




• Privacy and disclosures function in “incompatible” ways


• We create boundaries to

                                                  Collective
                                                  Boundary
                                     Person A’s                Person B’s
  demarcate both private and          Personal                  Personal
                                     Boundary                  Boundary
  shared information                                                        7
Boundary Management on Facebook
• Default settings emphasize revealing, not concealing
• Networks are increasingly large and diverse
• Most users maintain very permeable boundaries to personal
  information and shared content


Strategies for controlling access to private information:
  • Privacy Settings
  • Controlling Friend Requests/Defriending
  • Removing Content/Untagging
  • Not sharing content (lowest common denominator;           8
    deactivating)
Study & Analysis                          (Vitak, in preparation)



• Survey participants (see Vitak, 2012) volunteered for follow-up
  study
• Selection criteria: Use of Facebook’s advanced privacy
  settings/multiple accounts

• Interviews
  • 26 participants; length: 30-94 minutes
  • Primary topic: Boundary management strategies

• Analysis
  • Interviews transcribed, proofed, uploaded into Dedoose
  • Analyzed using textual microanalysis (Strauss & Corbin, 1998)   9
Findings: Friending/Defriending
• 24 participants (92%) set profile to Friends Only
• Most users reported a lot of Facebook Friends…
  • M = 500, Median = 433, SD = 361, range: 62 – 1600
• …and many were weak ties
  • 8% fell within circles with most overlap,                  2nd
    52% in circles with least overlap                          Tier

                                                        Weak
                                                        Ties    3rd
• Most users (73%) described defriending                       Tier
  practices to manage network
  • Many performed “friend purges”
  • Hesitation/concern for hurting people’s feelings
  • Hiding was an alternative practice to defriending                 10
Findings: Segregating Audiences
• 20 participants (77%) actively used Lists to restrict access to
  content to specific groups of Friends.
  • Maintaining power dynamics
  • Blocking family
  • Restricting content to close friends & family
  • Private Messages or Notes visible to small group of Friends


• 57% of Twitter users kept multiple accounts
  • Usually divided based on personal/professional identities

                                                                    11
Findings: Lowest Common Denominator
 • Even with heavy use of privacy settings, most users reported
   censoring posts
   • Focus on positive updates
   • Easier to not post than negotiate boundaries
   • Simplifying posts to make them more widely appealing
   • Privacy concerns

 • Conscious thought process about audience before posting:
    • Who will see this post?
    • How might it be misinterpreted?
                                                                      12
    • Will people find this post interesting/funny/worthwhile/etc.?
Implications
• Among those highly engaged in impression management
  online, concealing often outweighs revealing
  • Contrary to Zukerberg’s “new social norm” argument


• If true, this impacts:
  • Opportunities for social capital transactions
  • Relationship maintenance



           …but what about disconnecting completely?

                                                         13
Logging Off
Arguments For:            Arguments Against:

 • “Addiction” concerns    • Relationship
                             maintenance
 • More meaningful
   interactions            • Missing out
 • Less distractions       • Networking
 • More productivity       • New connections
 • Work/Life Balance       • Social capital exchanges
 • Context Collapse        • Information retrieval
                                                        14
Tools to Help You Log Off


                   “Productivity through disconnection”




                   “Turn off your friends…”


                                                              15

* Fred Stutzman, the creator of these apps, is a rock star.
Thanks!
                                                   Contact:
                                     vitakjes@msu.edu
                                       Twitter: @jvitak
                                 Website: vitak.wordpress.com




* Paper referenced in study:                                                                                        16
Vitak, J. (2012, May). The impact of context collapse and privacy on social network site disclosures. Paper to be
presented at the International Communication Association 62nd Annual Conference, Phoenix, AZ. (Also currently
under review at a Communication Journal)

More Related Content

Viewers also liked

LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social MediaLSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
Local Social Summit
 
Strata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy OfficerStrata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy Officer
Jim Adler
 
Quantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksQuantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social Networks
Michael Bernstein
 
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...summersocialwebshop
 
The Glass House: Anonymity Vs. Transparency on the Internet
The Glass House: Anonymity Vs. Transparency on the InternetThe Glass House: Anonymity Vs. Transparency on the Internet
The Glass House: Anonymity Vs. Transparency on the Internet
Center for Sustainable Journalism at Kennesaw State University
 
Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...
ACSM @ VU University Amsterdam
 
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToSocial Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Agnese Vellar
 
Comunicare nell'era dei social media
Comunicare nell'era dei social mediaComunicare nell'era dei social media
Comunicare nell'era dei social media
Agnese Vellar
 
Communication privacy management theory_day
Communication privacy management theory_dayCommunication privacy management theory_day
Communication privacy management theory_daykelseyday
 
Context Collapse on Social Networking Sites
Context Collapse on Social Networking SitesContext Collapse on Social Networking Sites
Context Collapse on Social Networking Sites
Stefanie Duguay
 
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Jessica Vitak
 
Communication Privacy Management Theory
Communication Privacy Management TheoryCommunication Privacy Management Theory
Communication Privacy Management Theory
mlodom
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprint
Robin Low
 
Using Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social MediaUsing Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social Media
Paul Brown
 
Communication Concepts, Theories And Models1
Communication Concepts, Theories And Models1Communication Concepts, Theories And Models1
Communication Concepts, Theories And Models1Suchitra Patnaik
 

Viewers also liked (17)

LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social MediaLSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
 
A private sphereslideshare
A private sphereslideshareA private sphereslideshare
A private sphereslideshare
 
Strata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy OfficerStrata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy Officer
 
Quantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksQuantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social Networks
 
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
 
The Glass House: Anonymity Vs. Transparency on the Internet
The Glass House: Anonymity Vs. Transparency on the InternetThe Glass House: Anonymity Vs. Transparency on the Internet
The Glass House: Anonymity Vs. Transparency on the Internet
 
Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...
 
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToSocial Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Comunicare nell'era dei social media
Comunicare nell'era dei social mediaComunicare nell'era dei social media
Comunicare nell'era dei social media
 
Communication privacy management theory_day
Communication privacy management theory_dayCommunication privacy management theory_day
Communication privacy management theory_day
 
Context Collapse on Social Networking Sites
Context Collapse on Social Networking SitesContext Collapse on Social Networking Sites
Context Collapse on Social Networking Sites
 
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
 
Communication Privacy Management Theory
Communication Privacy Management TheoryCommunication Privacy Management Theory
Communication Privacy Management Theory
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprint
 
Using Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social MediaUsing Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social Media
 
Communication Concepts, Theories And Models1
Communication Concepts, Theories And Models1Communication Concepts, Theories And Models1
Communication Concepts, Theories And Models1
 

Similar to Managing Privacy and Context Collapse in the Facebook Age

Understanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesUnderstanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
Jessica Vitak
 
Social Network Sites: An Overview
Social Network Sites: An OverviewSocial Network Sites: An Overview
Social Network Sites: An Overview
Jessica Vitak
 
Socially-Aware Informal Learning Support: Potential and Challenges of the So...
Socially-Aware Informal Learning Support:Potential and Challenges of the So...Socially-Aware Informal Learning Support:Potential and Challenges of the So...
Socially-Aware Informal Learning Support: Potential and Challenges of the So...
Simone Braun
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
Micah Altman
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social mediakmtj1979
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
Michael Zimmer
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Open University Australia
 
Privacy Codes of Practice for the Social Web:
Privacy Codes of Practice for the Social Web:Privacy Codes of Practice for the Social Web:
Privacy Codes of Practice for the Social Web:
girmaenideg
 
Social data: what it is, who owns it, and why you should care
Social data: what it is, who owns it, and why you should careSocial data: what it is, who owns it, and why you should care
Social data: what it is, who owns it, and why you should care
Cornelius Puschmann
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social Media
Physiopedia
 
Data protection and social networks
Data protection and social networksData protection and social networks
Data protection and social networks
blogzilla
 
Problem statement-1-friend-affinity-finder
Problem statement-1-friend-affinity-finderProblem statement-1-friend-affinity-finder
Problem statement-1-friend-affinity-finder
AmitabhDas22
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leading
Hsuan-Ting Chen
 
SOCIAL NETWORKING FOR INTEGRATION.pptx
SOCIAL NETWORKING FOR INTEGRATION.pptxSOCIAL NETWORKING FOR INTEGRATION.pptx
SOCIAL NETWORKING FOR INTEGRATION.pptx
Francis Dave Mabborang
 
Going Social
Going SocialGoing Social
Going Social
Thomas Vander Wal
 
Dagens Välfärd's website - the Open Square
Dagens Välfärd's website - the Open SquareDagens Välfärd's website - the Open Square
Dagens Välfärd's website - the Open Square
Tricia Rambharose
 
Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6jiahao84
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activityguest09fcd1
 
CSW2022_06_influence.pptx.pdf
CSW2022_06_influence.pptx.pdfCSW2022_06_influence.pptx.pdf
CSW2022_06_influence.pptx.pdf
SaraJayneTerp
 
SocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for BusinessesSocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for Businesses
Julian Ranger
 

Similar to Managing Privacy and Context Collapse in the Facebook Age (20)

Understanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesUnderstanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
 
Social Network Sites: An Overview
Social Network Sites: An OverviewSocial Network Sites: An Overview
Social Network Sites: An Overview
 
Socially-Aware Informal Learning Support: Potential and Challenges of the So...
Socially-Aware Informal Learning Support:Potential and Challenges of the So...Socially-Aware Informal Learning Support:Potential and Challenges of the So...
Socially-Aware Informal Learning Support: Potential and Challenges of the So...
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social media
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?
 
Privacy Codes of Practice for the Social Web:
Privacy Codes of Practice for the Social Web:Privacy Codes of Practice for the Social Web:
Privacy Codes of Practice for the Social Web:
 
Social data: what it is, who owns it, and why you should care
Social data: what it is, who owns it, and why you should careSocial data: what it is, who owns it, and why you should care
Social data: what it is, who owns it, and why you should care
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social Media
 
Data protection and social networks
Data protection and social networksData protection and social networks
Data protection and social networks
 
Problem statement-1-friend-affinity-finder
Problem statement-1-friend-affinity-finderProblem statement-1-friend-affinity-finder
Problem statement-1-friend-affinity-finder
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leading
 
SOCIAL NETWORKING FOR INTEGRATION.pptx
SOCIAL NETWORKING FOR INTEGRATION.pptxSOCIAL NETWORKING FOR INTEGRATION.pptx
SOCIAL NETWORKING FOR INTEGRATION.pptx
 
Going Social
Going SocialGoing Social
Going Social
 
Dagens Välfärd's website - the Open Square
Dagens Välfärd's website - the Open SquareDagens Välfärd's website - the Open Square
Dagens Välfärd's website - the Open Square
 
Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
 
CSW2022_06_influence.pptx.pdf
CSW2022_06_influence.pptx.pdfCSW2022_06_influence.pptx.pdf
CSW2022_06_influence.pptx.pdf
 
SocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for BusinessesSocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for Businesses
 

More from Jessica Vitak

CSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont PrinciplesCSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont Principles
Jessica Vitak
 
I like it....whatever that means: The evolving relationship between disclosur...
I like it....whatever that means: The evolving relationship between disclosur...I like it....whatever that means: The evolving relationship between disclosur...
I like it....whatever that means: The evolving relationship between disclosur...Jessica Vitak
 
INFM600 Module 1 lecture
INFM600 Module 1 lectureINFM600 Module 1 lecture
INFM600 Module 1 lecture
Jessica Vitak
 
Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social MediaLeveraging Your Audience Through Social Media
Leveraging Your Audience Through Social Media
Jessica Vitak
 
Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social Media Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social Media
Jessica Vitak
 
Connecting in the Facebook Age: Development and Validation of a New Measure o...
Connecting in the Facebook Age: Development and Validation of a New Measure o...Connecting in the Facebook Age: Development and Validation of a New Measure o...
Connecting in the Facebook Age: Development and Validation of a New Measure o...
Jessica Vitak
 
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...
Jessica Vitak
 
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...
Jessica Vitak
 
Social Media: Where We Stand, Where We’re Heading
Social Media: Where We Stand, Where We’re HeadingSocial Media: Where We Stand, Where We’re Heading
Social Media: Where We Stand, Where We’re Heading
Jessica Vitak
 
Technology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word OutTechnology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word Out
Jessica Vitak
 
Social Support and Information-Sharing on Facebook by Adult Users
Social Support and Information-Sharing on Facebook by Adult UsersSocial Support and Information-Sharing on Facebook by Adult Users
Social Support and Information-Sharing on Facebook by Adult Users
Jessica Vitak
 

More from Jessica Vitak (11)

CSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont PrinciplesCSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont Principles
 
I like it....whatever that means: The evolving relationship between disclosur...
I like it....whatever that means: The evolving relationship between disclosur...I like it....whatever that means: The evolving relationship between disclosur...
I like it....whatever that means: The evolving relationship between disclosur...
 
INFM600 Module 1 lecture
INFM600 Module 1 lectureINFM600 Module 1 lecture
INFM600 Module 1 lecture
 
Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social MediaLeveraging Your Audience Through Social Media
Leveraging Your Audience Through Social Media
 
Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social Media Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social Media
 
Connecting in the Facebook Age: Development and Validation of a New Measure o...
Connecting in the Facebook Age: Development and Validation of a New Measure o...Connecting in the Facebook Age: Development and Validation of a New Measure o...
Connecting in the Facebook Age: Development and Validation of a New Measure o...
 
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...
 
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...
 
Social Media: Where We Stand, Where We’re Heading
Social Media: Where We Stand, Where We’re HeadingSocial Media: Where We Stand, Where We’re Heading
Social Media: Where We Stand, Where We’re Heading
 
Technology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word OutTechnology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word Out
 
Social Support and Information-Sharing on Facebook by Adult Users
Social Support and Information-Sharing on Facebook by Adult UsersSocial Support and Information-Sharing on Facebook by Adult Users
Social Support and Information-Sharing on Facebook by Adult Users
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 

Managing Privacy and Context Collapse in the Facebook Age

  • 1. Protecting Face: Managing Privacy and Context Collapse in the Facebook Age Jessica Vitak (@jvitak) PhD Candidate, Michigan State University Assistant Professor, University of Maryland iSchool (August 2012) 1 Theorizing the Web | April 14, 2012 | College Park, MD
  • 2. How are Facebook users managing context collapse and interacting with a diverse set of friends? 2
  • 3. What is context collapse? • We present different versions of the self depending on our audience • Could include: • Style of dress • Speech Ego • Non-verbals • Context collapse occurs when we “perform” for different audiences at same time 3 • e.g., weddings
  • 4. Context Collapse on Facebook 4
  • 5. How context collapse might impact Facebook use 1) Strength of weak ties (Granovetter, 1973): users distribute content (esp. resource requests) to entire network to increase likelihood that someone will see it and respond. 2) Privacy settings: users employ increasingly granular privacy settings to segment network into different audiences 3) Lowest common denominator (Hogan, 2010): users only distribute content appropriate for all “friends.” 5
  • 6. Privacy Online Privacy: “selective control of access to the self,” achieved by regulating social interactions (Altman, 1975) Multiple Stalkers Accounts ID Theft Friends Restricting Private Only Searchability Content Employers Privacy Places / Privacy Friend Check-ins Lists Concerns Settings Visibility Hacked Limit of Content Account Restricting Old Inappropriate Tagging Posts Limited 6 Content Profile
  • 7. Communications Privacy Management Theory (Petronio, 2002) • Relationships managed by balancing privacy and disclosures Privacy (Concealing) Disclosures (Revealing) • Privacy and disclosures function in “incompatible” ways • We create boundaries to Collective Boundary Person A’s Person B’s demarcate both private and Personal Personal Boundary Boundary shared information 7
  • 8. Boundary Management on Facebook • Default settings emphasize revealing, not concealing • Networks are increasingly large and diverse • Most users maintain very permeable boundaries to personal information and shared content Strategies for controlling access to private information: • Privacy Settings • Controlling Friend Requests/Defriending • Removing Content/Untagging • Not sharing content (lowest common denominator; 8 deactivating)
  • 9. Study & Analysis (Vitak, in preparation) • Survey participants (see Vitak, 2012) volunteered for follow-up study • Selection criteria: Use of Facebook’s advanced privacy settings/multiple accounts • Interviews • 26 participants; length: 30-94 minutes • Primary topic: Boundary management strategies • Analysis • Interviews transcribed, proofed, uploaded into Dedoose • Analyzed using textual microanalysis (Strauss & Corbin, 1998) 9
  • 10. Findings: Friending/Defriending • 24 participants (92%) set profile to Friends Only • Most users reported a lot of Facebook Friends… • M = 500, Median = 433, SD = 361, range: 62 – 1600 • …and many were weak ties • 8% fell within circles with most overlap, 2nd 52% in circles with least overlap Tier Weak Ties 3rd • Most users (73%) described defriending Tier practices to manage network • Many performed “friend purges” • Hesitation/concern for hurting people’s feelings • Hiding was an alternative practice to defriending 10
  • 11. Findings: Segregating Audiences • 20 participants (77%) actively used Lists to restrict access to content to specific groups of Friends. • Maintaining power dynamics • Blocking family • Restricting content to close friends & family • Private Messages or Notes visible to small group of Friends • 57% of Twitter users kept multiple accounts • Usually divided based on personal/professional identities 11
  • 12. Findings: Lowest Common Denominator • Even with heavy use of privacy settings, most users reported censoring posts • Focus on positive updates • Easier to not post than negotiate boundaries • Simplifying posts to make them more widely appealing • Privacy concerns • Conscious thought process about audience before posting: • Who will see this post? • How might it be misinterpreted? 12 • Will people find this post interesting/funny/worthwhile/etc.?
  • 13. Implications • Among those highly engaged in impression management online, concealing often outweighs revealing • Contrary to Zukerberg’s “new social norm” argument • If true, this impacts: • Opportunities for social capital transactions • Relationship maintenance …but what about disconnecting completely? 13
  • 14. Logging Off Arguments For: Arguments Against: • “Addiction” concerns • Relationship maintenance • More meaningful interactions • Missing out • Less distractions • Networking • More productivity • New connections • Work/Life Balance • Social capital exchanges • Context Collapse • Information retrieval 14
  • 15. Tools to Help You Log Off “Productivity through disconnection” “Turn off your friends…” 15 * Fred Stutzman, the creator of these apps, is a rock star.
  • 16. Thanks! Contact: vitakjes@msu.edu Twitter: @jvitak Website: vitak.wordpress.com * Paper referenced in study: 16 Vitak, J. (2012, May). The impact of context collapse and privacy on social network site disclosures. Paper to be presented at the International Communication Association 62nd Annual Conference, Phoenix, AZ. (Also currently under review at a Communication Journal)