SlideShare a Scribd company logo
1 of 5
Download to read offline
Social Media & Self-presentation

Thesis I
Prof. Tom Klinkowstein
Student. Yue Li
Design Problems

Hypothesis

Books

Before social networking, people can present different personal
image among different group of people according to different
relations. In this way, people can play different roles in different
situations.
But after social networking, the stress of needing to manage their
reputation on social media, in some degree, force them to present
one personal image to everyone.
According to paper named “Teens, Social Media, and Privacy” by
Pew Research Center, Teens shows waning enthusiasm for
facebook. Users of sites other than Facebook express greater
enthusiasm for their choice.

Thesis I

Student: Yue Li Professor: Tom Klinkowstein
Design Problems

Hypothesis

Thesis I

Books

Student: Yue Li Professor: Tom Klinkowstein
Design Problems

Hypothesis

Books

I want to study how private concerns affect on behavior
subsequent information exposure among young generation?
In order to find out how young generations manage their reputation
when they share their personal information on social media.
In order to find out a new information sharing environment for the
young generation better expressing themselves.

Thesis I

Student: Yue Li Professor: Tom Klinkowstein
Design Problems

Hypothesis

Books

Youth, Privacy and Reputation (Berkman Center)
Reasonable Expectations of Privacy for Youth in a Digital Age (Mary Graw Leary)
Teens, Social Media, and Privacy (Pew Research Center)
Information revelation and Privacy in online social networks (Ralph Gross and Alessandro Acquisti)
Reflections on friendster, trust and intimacy (Danah Boyd)
Friendster and publicly articulated social networking (Danah Boyd)
Public displays of connection (J Donath and d boyd)
Interestmap: Harvesting social network profiles for recommendations
(Hugo Liu & Pattie Maes)

Thesis I

Student: Yue Li Professor: Tom Klinkowstein

More Related Content

What's hot

David gauntlett’s ’10 things wrong with the media 'effects' model
David gauntlett’s ’10 things wrong with the media 'effects' modelDavid gauntlett’s ’10 things wrong with the media 'effects' model
David gauntlett’s ’10 things wrong with the media 'effects' modelannie7069
 
Nobody cites your work: copyright licensing and public engagement
Nobody cites your work: copyright licensing and public engagementNobody cites your work: copyright licensing and public engagement
Nobody cites your work: copyright licensing and public engagementMathias Klang
 
Uses and gratifications
Uses and gratificationsUses and gratifications
Uses and gratificationsMs Walters
 
Reynolds High School Journalism Institute
Reynolds High School Journalism InstituteReynolds High School Journalism Institute
Reynolds High School Journalism InstituteDonica Mensing
 
Bachelor's Thesis - ALPHA Version
Bachelor's Thesis - ALPHA VersionBachelor's Thesis - ALPHA Version
Bachelor's Thesis - ALPHA VersionN. Hayden Winther
 
Critically Analyzing Conspiracy Theories
Critically Analyzing Conspiracy TheoriesCritically Analyzing Conspiracy Theories
Critically Analyzing Conspiracy TheoriesRenee Hobbs
 
1 October 2012
1 October 20121 October 2012
1 October 2012renabivens
 
Final feedback and exam prep
Final feedback and exam prepFinal feedback and exam prep
Final feedback and exam prepCHSGmedia
 
Uses and gratifications
Uses and gratificationsUses and gratifications
Uses and gratificationsHannah Gibbons
 
Uses and gratifications theory
Uses and gratifications theoryUses and gratifications theory
Uses and gratifications theoryedenantoniawhite
 
Using Social Media and Intersectional Feminism for Transformative Education a...
Using Social Media and Intersectional Feminism for Transformative Education a...Using Social Media and Intersectional Feminism for Transformative Education a...
Using Social Media and Intersectional Feminism for Transformative Education a...Julius Narciso
 
Media studies collective identiy version 2
Media studies  collective identiy version 2Media studies  collective identiy version 2
Media studies collective identiy version 2tcasman
 

What's hot (17)

U&G Theory
U&G TheoryU&G Theory
U&G Theory
 
David gauntlett’s ’10 things wrong with the media 'effects' model
David gauntlett’s ’10 things wrong with the media 'effects' modelDavid gauntlett’s ’10 things wrong with the media 'effects' model
David gauntlett’s ’10 things wrong with the media 'effects' model
 
Nobody cites your work: copyright licensing and public engagement
Nobody cites your work: copyright licensing and public engagementNobody cites your work: copyright licensing and public engagement
Nobody cites your work: copyright licensing and public engagement
 
Uses and gratifications
Uses and gratificationsUses and gratifications
Uses and gratifications
 
Facebook psychology
Facebook psychologyFacebook psychology
Facebook psychology
 
Reynolds High School Journalism Institute
Reynolds High School Journalism InstituteReynolds High School Journalism Institute
Reynolds High School Journalism Institute
 
Bachelor's Thesis - ALPHA Version
Bachelor's Thesis - ALPHA VersionBachelor's Thesis - ALPHA Version
Bachelor's Thesis - ALPHA Version
 
Critically Analyzing Conspiracy Theories
Critically Analyzing Conspiracy TheoriesCritically Analyzing Conspiracy Theories
Critically Analyzing Conspiracy Theories
 
1 October 2012
1 October 20121 October 2012
1 October 2012
 
Final feedback and exam prep
Final feedback and exam prepFinal feedback and exam prep
Final feedback and exam prep
 
Uses and gratifications
Uses and gratificationsUses and gratifications
Uses and gratifications
 
Uses and gratifications theory
Uses and gratifications theoryUses and gratifications theory
Uses and gratifications theory
 
Audience theories
Audience theoriesAudience theories
Audience theories
 
Using Social Media and Intersectional Feminism for Transformative Education a...
Using Social Media and Intersectional Feminism for Transformative Education a...Using Social Media and Intersectional Feminism for Transformative Education a...
Using Social Media and Intersectional Feminism for Transformative Education a...
 
Audience theorists
Audience theoristsAudience theorists
Audience theorists
 
Media studies collective identiy version 2
Media studies  collective identiy version 2Media studies  collective identiy version 2
Media studies collective identiy version 2
 
How to Communicate, Connect and Collaborate
How to Communicate, Connect and Collaborate How to Communicate, Connect and Collaborate
How to Communicate, Connect and Collaborate
 

Similar to Thesis i presentation(10.14)

interpersonal bib
interpersonal bibinterpersonal bib
interpersonal bibLoic Youth
 
Socialmedia from a psychological perspective
Socialmedia from a psychological perspectiveSocialmedia from a psychological perspective
Socialmedia from a psychological perspectiveMosskin Produktion
 
Social Interaction In Social Life
Social Interaction In Social LifeSocial Interaction In Social Life
Social Interaction In Social LifeDenise Miller
 
Stereotypes That Influence Me
Stereotypes That Influence MeStereotypes That Influence Me
Stereotypes That Influence MeDonna Gallegos
 
Importance Of Primary And Secondary Socialisation
Importance Of Primary And Secondary SocialisationImportance Of Primary And Secondary Socialisation
Importance Of Primary And Secondary SocialisationJulie Medina
 
Research Paper OutlineResearch Topic Negative effects of .docx
Research Paper OutlineResearch Topic Negative effects of .docxResearch Paper OutlineResearch Topic Negative effects of .docx
Research Paper OutlineResearch Topic Negative effects of .docxaudeleypearl
 
The Effects Of Media Violence In The Media
The Effects Of Media Violence In The MediaThe Effects Of Media Violence In The Media
The Effects Of Media Violence In The MediaKatie Parker
 
The Digital Possession Of Human Since The 19Th Century
The Digital Possession Of Human Since The 19Th CenturyThe Digital Possession Of Human Since The 19Th Century
The Digital Possession Of Human Since The 19Th CenturyAmber Voisine
 
Social Learning Theory Report
Social Learning Theory ReportSocial Learning Theory Report
Social Learning Theory ReportLori Bowie
 
Social Developmental Theory
Social Developmental TheorySocial Developmental Theory
Social Developmental Theorykrystalanne929
 
Social Developmental Theory
Social Developmental TheorySocial Developmental Theory
Social Developmental Theorykrystalanne929
 
Texting Social Interaction
Texting Social InteractionTexting Social Interaction
Texting Social InteractionMichele Johnson
 
The Positive Effects Of Facebook
The Positive Effects Of FacebookThe Positive Effects Of Facebook
The Positive Effects Of FacebookDonna Kuhns
 
The Cositive And Cons And Positive Effects Of Social Media
The Cositive And Cons And Positive Effects Of Social MediaThe Cositive And Cons And Positive Effects Of Social Media
The Cositive And Cons And Positive Effects Of Social MediaKristen Stacey
 
The True State Of Loneliness
The True State Of LonelinessThe True State Of Loneliness
The True State Of LonelinessSandy Grasso
 
Social media in education
Social media in educationSocial media in education
Social media in educationUdeniA
 

Similar to Thesis i presentation(10.14) (20)

interpersonal bib
interpersonal bibinterpersonal bib
interpersonal bib
 
Socialmedia from a psychological perspective
Socialmedia from a psychological perspectiveSocialmedia from a psychological perspective
Socialmedia from a psychological perspective
 
Social Interaction In Social Life
Social Interaction In Social LifeSocial Interaction In Social Life
Social Interaction In Social Life
 
Stereotypes That Influence Me
Stereotypes That Influence MeStereotypes That Influence Me
Stereotypes That Influence Me
 
Importance Of Primary And Secondary Socialisation
Importance Of Primary And Secondary SocialisationImportance Of Primary And Secondary Socialisation
Importance Of Primary And Secondary Socialisation
 
Research Paper OutlineResearch Topic Negative effects of .docx
Research Paper OutlineResearch Topic Negative effects of .docxResearch Paper OutlineResearch Topic Negative effects of .docx
Research Paper OutlineResearch Topic Negative effects of .docx
 
Youth Development
Youth DevelopmentYouth Development
Youth Development
 
The Effects Of Media Violence In The Media
The Effects Of Media Violence In The MediaThe Effects Of Media Violence In The Media
The Effects Of Media Violence In The Media
 
The Digital Possession Of Human Since The 19Th Century
The Digital Possession Of Human Since The 19Th CenturyThe Digital Possession Of Human Since The 19Th Century
The Digital Possession Of Human Since The 19Th Century
 
Social Learning Theory Report
Social Learning Theory ReportSocial Learning Theory Report
Social Learning Theory Report
 
RP2 PSY390
RP2 PSY390RP2 PSY390
RP2 PSY390
 
Social Developmental Theory
Social Developmental TheorySocial Developmental Theory
Social Developmental Theory
 
Social Developmental Theory
Social Developmental TheorySocial Developmental Theory
Social Developmental Theory
 
Texting Social Interaction
Texting Social InteractionTexting Social Interaction
Texting Social Interaction
 
The Positive Effects Of Facebook
The Positive Effects Of FacebookThe Positive Effects Of Facebook
The Positive Effects Of Facebook
 
The Cositive And Cons And Positive Effects Of Social Media
The Cositive And Cons And Positive Effects Of Social MediaThe Cositive And Cons And Positive Effects Of Social Media
The Cositive And Cons And Positive Effects Of Social Media
 
The True State Of Loneliness
The True State Of LonelinessThe True State Of Loneliness
The True State Of Loneliness
 
Sociological Essays
Sociological EssaysSociological Essays
Sociological Essays
 
Body Image Essay
Body Image EssayBody Image Essay
Body Image Essay
 
Social media in education
Social media in educationSocial media in education
Social media in education
 

More from Hannah Li

Thesis i presentation
Thesis i presentationThesis i presentation
Thesis i presentationHannah Li
 
Presentation (11.11)
Presentation (11.11)Presentation (11.11)
Presentation (11.11)Hannah Li
 
Presentation (11.11)
Presentation (11.11)Presentation (11.11)
Presentation (11.11)Hannah Li
 
Thesis topic & research methodology (draft 1)
Thesis topic & research methodology (draft 1)Thesis topic & research methodology (draft 1)
Thesis topic & research methodology (draft 1)Hannah Li
 
Design methodologies & research topics
Design methodologies & research topicsDesign methodologies & research topics
Design methodologies & research topicsHannah Li
 
Design Methodologies & Research Topics
Design Methodologies & Research TopicsDesign Methodologies & Research Topics
Design Methodologies & Research TopicsHannah Li
 
Research titles
Research titlesResearch titles
Research titlesHannah Li
 
Design Methodologies (3rd Draft)
Design Methodologies (3rd Draft)Design Methodologies (3rd Draft)
Design Methodologies (3rd Draft)Hannah Li
 
Three methodologies
Three methodologiesThree methodologies
Three methodologiesHannah Li
 

More from Hannah Li (9)

Thesis i presentation
Thesis i presentationThesis i presentation
Thesis i presentation
 
Presentation (11.11)
Presentation (11.11)Presentation (11.11)
Presentation (11.11)
 
Presentation (11.11)
Presentation (11.11)Presentation (11.11)
Presentation (11.11)
 
Thesis topic & research methodology (draft 1)
Thesis topic & research methodology (draft 1)Thesis topic & research methodology (draft 1)
Thesis topic & research methodology (draft 1)
 
Design methodologies & research topics
Design methodologies & research topicsDesign methodologies & research topics
Design methodologies & research topics
 
Design Methodologies & Research Topics
Design Methodologies & Research TopicsDesign Methodologies & Research Topics
Design Methodologies & Research Topics
 
Research titles
Research titlesResearch titles
Research titles
 
Design Methodologies (3rd Draft)
Design Methodologies (3rd Draft)Design Methodologies (3rd Draft)
Design Methodologies (3rd Draft)
 
Three methodologies
Three methodologiesThree methodologies
Three methodologies
 

Recently uploaded

The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 

Recently uploaded (20)

The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 

Thesis i presentation(10.14)

  • 1. Social Media & Self-presentation Thesis I Prof. Tom Klinkowstein Student. Yue Li
  • 2. Design Problems Hypothesis Books Before social networking, people can present different personal image among different group of people according to different relations. In this way, people can play different roles in different situations. But after social networking, the stress of needing to manage their reputation on social media, in some degree, force them to present one personal image to everyone. According to paper named “Teens, Social Media, and Privacy” by Pew Research Center, Teens shows waning enthusiasm for facebook. Users of sites other than Facebook express greater enthusiasm for their choice. Thesis I Student: Yue Li Professor: Tom Klinkowstein
  • 3. Design Problems Hypothesis Thesis I Books Student: Yue Li Professor: Tom Klinkowstein
  • 4. Design Problems Hypothesis Books I want to study how private concerns affect on behavior subsequent information exposure among young generation? In order to find out how young generations manage their reputation when they share their personal information on social media. In order to find out a new information sharing environment for the young generation better expressing themselves. Thesis I Student: Yue Li Professor: Tom Klinkowstein
  • 5. Design Problems Hypothesis Books Youth, Privacy and Reputation (Berkman Center) Reasonable Expectations of Privacy for Youth in a Digital Age (Mary Graw Leary) Teens, Social Media, and Privacy (Pew Research Center) Information revelation and Privacy in online social networks (Ralph Gross and Alessandro Acquisti) Reflections on friendster, trust and intimacy (Danah Boyd) Friendster and publicly articulated social networking (Danah Boyd) Public displays of connection (J Donath and d boyd) Interestmap: Harvesting social network profiles for recommendations (Hugo Liu & Pattie Maes) Thesis I Student: Yue Li Professor: Tom Klinkowstein