SlideShare a Scribd company logo
When we use social software...
                 
          like Twitter
         or Facebook
       or Google Reader
          or LinkedIn
         or Foursquare
          or Gowalla
       or Message boards
            or IM
             or ...
We want
But sometimes it's
"I posted my location
on Foursquare to tell my
friends to stop by–
but my ex showed up
too."




http://www.michellesblog.net/other-social-networks/why-i-cant-
get-as-excited-about-geolocation-as-scoble
Social:
The ex doesn't know or care that he's not invited.

Technological:
I shared my location publicly, but I didn't know he was
listening.
Or perhaps he's watching a mutual friend's updates to see
where I am (The friend posts "Hanging out with Katie
at Lucky Lab")
"I post pictures from
parties and vacations on
Flickr, to share with my
friends."
Social:
My friends enjoy seeing what I've been doing, and reliving
our shared experiences.

Technological:
My Flickr photos can be set to public, private, or shared with
a designated group of contacts.
"I used Facebook to invite
certain friends and family
members to a baby shower,
but it was re-posted to a
public local events calendar
via an iCalendar feed."




http://blog.jonudell.net/2010/04/30/surprise-your-facebook-
visibility-isnt-what-you-thought-it-was/
Social:
I only want to invite some people to the event, not
everyone in town, so I picked a privacy setting I thought
would do this.

Technological:
Facebook's iCalendar feed service used my privacy setting
choice in a different manner than I expected when I
selected it.
I talk to friends on Twitter
when we all have insomnia, and
wackiness (#electricblanket)
ensues.
Social:
Twitter is open at all hours, and anyone who doesn't like
what I post is free to unfollow me.

Technological:
Twitter shares a feed of what I post to all of my followers,
even if they're not online till tomorrow morning.
And if a group of us vote up a new trending topic while 
the rest of you sleep, well...
"I updated my resume
information on LinkedIn,
but it sent an email
notification to my boss and
coworkers."


                             awkward?
Social:
I use LinkedIn to post my resume information, and I'm
connected with current and former coworkers on the site.

Technological:
The site sends out periodic updates showing which users
you're connected to have added profile information, like
their job experience.
"I organized a surprise
birthday party for my
friend using Facebook."
Social:
I don't know how to reach all of my friend's friends directly,
but we're all connected on Facebook, so that's how I send
the invite.

Technological:
Facebook lets me send private (secret) event invites to a
selected group of users.
We probably can't change the
social problems with our software.

But we can make sure that the
technology enables fun or creepy
experiences in a deliberate manner.
How?
danah boyd writes,
"Over and over again, I find that people’s mental
model of who can see what doesn’t match up with
reality."




http://www.zephoria.org/thoughts/archives/2010/05/14/
facebook-and-radical-transparency-a-rant.html
We think we're sharing
with the people we want to
see it: friends, family,
friendly strangers.
But maybe we're also
sharing with people who
wish us harm, or family or
co-workers who aren't part
of our social life, or
marketing databases.
The software might even expose information we
didn't even know was there to be shared.
 
Like the amount of time we spend on a website.
 
Or that we've just qualified for the "douchebag"
badge.
Ways we can do it right:
 
Show the user the full context when information is shared.
 
Provide flexible controls for setting who has access.

Pick explicit over implicit.
Doing it right is hard.
Privacy settings on LiveJournal
Ways we can do it wrong:

Rely on implicit understandings of who should see what.

Make the controls and settings hard to find and use. Then
change how they work.

Assume that if you're okay with the information being
exposed, your users will be happy too.
Doing it wrong is easy.
A Graph on Navigating Facebook Privacy Settings,
       via New York Times, May 10 2010
But wait!
Is creepy always bad?
A better question:

Is exposure always bad? 
Don't we want to share with each other?

Different things are creepy for different people.
Your turn:
Questions?
The Fine Line Between Creepy and Fun

More Related Content

Similar to The Fine Line Between Creepy and Fun

Understanding College Student Life Online and What it Means for Social Media ...
Understanding College Student Life Online and What it Means for Social Media ...Understanding College Student Life Online and What it Means for Social Media ...
Understanding College Student Life Online and What it Means for Social Media ...
Paul Brown
 
Ost 284 emerging technologies final exam
Ost 284 emerging technologies final examOst 284 emerging technologies final exam
Ost 284 emerging technologies final exam
Kayla Wallace
 
Synthesis mobile personal learning
Synthesis mobile personal learningSynthesis mobile personal learning
Synthesis mobile personal learning
angel9915
 
Social media + privacy
Social media + privacySocial media + privacy
Social media + privacy
Shea Sylvia
 
Librarysocmed2
Librarysocmed2Librarysocmed2
Librarysocmed2
Imogen Bertin
 
#Digi foot12 week 1 final v ersion
#Digi foot12 week 1 final v ersion#Digi foot12 week 1 final v ersion
#Digi foot12 week 1 final v ersion
verenanz
 
John Blike Generation LikeJohn Blike III posted Feb 16, 2018 11.docx
John Blike Generation LikeJohn Blike III posted Feb 16, 2018 11.docxJohn Blike Generation LikeJohn Blike III posted Feb 16, 2018 11.docx
John Blike Generation LikeJohn Blike III posted Feb 16, 2018 11.docx
christiandean12115
 
Social work and social media presentation
Social work and social media presentationSocial work and social media presentation
Social work and social media presentation
comcareandy
 
Why dark social sharing isnt light years away
Why dark social sharing isnt light years awayWhy dark social sharing isnt light years away
Why dark social sharing isnt light years away
João Romão
 
digital-footprint.pptx
digital-footprint.pptxdigital-footprint.pptx
digital-footprint.pptx
Catherine Seo
 
Grasping Social Patterns
Grasping Social PatternsGrasping Social Patterns
Grasping Social Patterns
Christian Crumlish
 
Rethinking Information Literacy: Classroom Evidence for Incorporating Student...
Rethinking Information Literacy: Classroom Evidence for Incorporating Student...Rethinking Information Literacy: Classroom Evidence for Incorporating Student...
Rethinking Information Literacy: Classroom Evidence for Incorporating Student...
Donna Witek
 
My Social Media Resume - Shannon Gové
My Social Media Resume - Shannon GovéMy Social Media Resume - Shannon Gové
My Social Media Resume - Shannon Gové
shannonmarieog
 
Creativity And Computers Presentation
Creativity And Computers PresentationCreativity And Computers Presentation
Creativity And Computers Presentation
chiwawawa
 
Information Literacy and Social Media: How Facebook is Changing Students’ At...
Information Literacy and Social Media: How Facebook is Changing Students’  At...Information Literacy and Social Media: How Facebook is Changing Students’  At...
Information Literacy and Social Media: How Facebook is Changing Students’ At...
Donna Witek
 
Week 6: Digital Privacy
Week 6: Digital Privacy Week 6: Digital Privacy
Week 6: Digital Privacy
Ray Brannon
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking Presentation
Donna Spear
 
Social Media Playbook
Social Media PlaybookSocial Media Playbook
Social Media Playbook
Cecilia DiStefano
 
YNPN Detroit Social Media Presentation - May 2010
YNPN Detroit Social Media Presentation - May 2010YNPN Detroit Social Media Presentation - May 2010
YNPN Detroit Social Media Presentation - May 2010
sarahpercoulis
 
My personal learning environment
My personal learning environmentMy personal learning environment
My personal learning environment
behyta_24
 

Similar to The Fine Line Between Creepy and Fun (20)

Understanding College Student Life Online and What it Means for Social Media ...
Understanding College Student Life Online and What it Means for Social Media ...Understanding College Student Life Online and What it Means for Social Media ...
Understanding College Student Life Online and What it Means for Social Media ...
 
Ost 284 emerging technologies final exam
Ost 284 emerging technologies final examOst 284 emerging technologies final exam
Ost 284 emerging technologies final exam
 
Synthesis mobile personal learning
Synthesis mobile personal learningSynthesis mobile personal learning
Synthesis mobile personal learning
 
Social media + privacy
Social media + privacySocial media + privacy
Social media + privacy
 
Librarysocmed2
Librarysocmed2Librarysocmed2
Librarysocmed2
 
#Digi foot12 week 1 final v ersion
#Digi foot12 week 1 final v ersion#Digi foot12 week 1 final v ersion
#Digi foot12 week 1 final v ersion
 
John Blike Generation LikeJohn Blike III posted Feb 16, 2018 11.docx
John Blike Generation LikeJohn Blike III posted Feb 16, 2018 11.docxJohn Blike Generation LikeJohn Blike III posted Feb 16, 2018 11.docx
John Blike Generation LikeJohn Blike III posted Feb 16, 2018 11.docx
 
Social work and social media presentation
Social work and social media presentationSocial work and social media presentation
Social work and social media presentation
 
Why dark social sharing isnt light years away
Why dark social sharing isnt light years awayWhy dark social sharing isnt light years away
Why dark social sharing isnt light years away
 
digital-footprint.pptx
digital-footprint.pptxdigital-footprint.pptx
digital-footprint.pptx
 
Grasping Social Patterns
Grasping Social PatternsGrasping Social Patterns
Grasping Social Patterns
 
Rethinking Information Literacy: Classroom Evidence for Incorporating Student...
Rethinking Information Literacy: Classroom Evidence for Incorporating Student...Rethinking Information Literacy: Classroom Evidence for Incorporating Student...
Rethinking Information Literacy: Classroom Evidence for Incorporating Student...
 
My Social Media Resume - Shannon Gové
My Social Media Resume - Shannon GovéMy Social Media Resume - Shannon Gové
My Social Media Resume - Shannon Gové
 
Creativity And Computers Presentation
Creativity And Computers PresentationCreativity And Computers Presentation
Creativity And Computers Presentation
 
Information Literacy and Social Media: How Facebook is Changing Students’ At...
Information Literacy and Social Media: How Facebook is Changing Students’  At...Information Literacy and Social Media: How Facebook is Changing Students’  At...
Information Literacy and Social Media: How Facebook is Changing Students’ At...
 
Week 6: Digital Privacy
Week 6: Digital Privacy Week 6: Digital Privacy
Week 6: Digital Privacy
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking Presentation
 
Social Media Playbook
Social Media PlaybookSocial Media Playbook
Social Media Playbook
 
YNPN Detroit Social Media Presentation - May 2010
YNPN Detroit Social Media Presentation - May 2010YNPN Detroit Social Media Presentation - May 2010
YNPN Detroit Social Media Presentation - May 2010
 
My personal learning environment
My personal learning environmentMy personal learning environment
My personal learning environment
 

Recently uploaded

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

The Fine Line Between Creepy and Fun

  • 1.
  • 2. When we use social software...   like Twitter or Facebook or Google Reader or LinkedIn or Foursquare or Gowalla or Message boards or IM or ...
  • 5. "I posted my location on Foursquare to tell my friends to stop by– but my ex showed up too." http://www.michellesblog.net/other-social-networks/why-i-cant- get-as-excited-about-geolocation-as-scoble
  • 6. Social: The ex doesn't know or care that he's not invited. Technological: I shared my location publicly, but I didn't know he was listening. Or perhaps he's watching a mutual friend's updates to see where I am (The friend posts "Hanging out with Katie at Lucky Lab")
  • 7. "I post pictures from parties and vacations on Flickr, to share with my friends."
  • 8. Social: My friends enjoy seeing what I've been doing, and reliving our shared experiences. Technological: My Flickr photos can be set to public, private, or shared with a designated group of contacts.
  • 9. "I used Facebook to invite certain friends and family members to a baby shower, but it was re-posted to a public local events calendar via an iCalendar feed." http://blog.jonudell.net/2010/04/30/surprise-your-facebook- visibility-isnt-what-you-thought-it-was/
  • 10. Social: I only want to invite some people to the event, not everyone in town, so I picked a privacy setting I thought would do this. Technological: Facebook's iCalendar feed service used my privacy setting choice in a different manner than I expected when I selected it.
  • 11. I talk to friends on Twitter when we all have insomnia, and wackiness (#electricblanket) ensues.
  • 12. Social: Twitter is open at all hours, and anyone who doesn't like what I post is free to unfollow me. Technological: Twitter shares a feed of what I post to all of my followers, even if they're not online till tomorrow morning. And if a group of us vote up a new trending topic while  the rest of you sleep, well...
  • 13. "I updated my resume information on LinkedIn, but it sent an email notification to my boss and coworkers." awkward?
  • 14. Social: I use LinkedIn to post my resume information, and I'm connected with current and former coworkers on the site. Technological: The site sends out periodic updates showing which users you're connected to have added profile information, like their job experience.
  • 15. "I organized a surprise birthday party for my friend using Facebook."
  • 16. Social: I don't know how to reach all of my friend's friends directly, but we're all connected on Facebook, so that's how I send the invite. Technological: Facebook lets me send private (secret) event invites to a selected group of users.
  • 17. We probably can't change the social problems with our software. But we can make sure that the technology enables fun or creepy experiences in a deliberate manner.
  • 18. How?
  • 19. danah boyd writes, "Over and over again, I find that people’s mental model of who can see what doesn’t match up with reality." http://www.zephoria.org/thoughts/archives/2010/05/14/ facebook-and-radical-transparency-a-rant.html
  • 20. We think we're sharing with the people we want to see it: friends, family, friendly strangers.
  • 21. But maybe we're also sharing with people who wish us harm, or family or co-workers who aren't part of our social life, or marketing databases.
  • 22. The software might even expose information we didn't even know was there to be shared.   Like the amount of time we spend on a website.   Or that we've just qualified for the "douchebag" badge.
  • 23. Ways we can do it right:   Show the user the full context when information is shared.   Provide flexible controls for setting who has access. Pick explicit over implicit.
  • 24. Doing it right is hard.
  • 25. Privacy settings on LiveJournal
  • 26. Ways we can do it wrong: Rely on implicit understandings of who should see what. Make the controls and settings hard to find and use. Then change how they work. Assume that if you're okay with the information being exposed, your users will be happy too.
  • 27. Doing it wrong is easy.
  • 28. A Graph on Navigating Facebook Privacy Settings, via New York Times, May 10 2010
  • 29. But wait! Is creepy always bad?
  • 30. A better question: Is exposure always bad?  Don't we want to share with each other? Different things are creepy for different people.