Managing Privacy and Context Collapse in the Facebook Age
-
Upload
jessica-vitak -
Category
Technology
-
view
2.333 -
download
3
description
Transcript of Managing Privacy and Context Collapse in the Facebook Age
Protecting Face: Managing Privacy and Context Collapse in the Facebook Age
Jessica Vitak (@jvitak)PhD Candidate, Michigan State UniversityAssistant Professor, University of Maryland iSchool (August 2012)
Theorizing the Web | April 14, 2012 | College Park, MD1
How are Facebook users managing context collapse and interacting with a diverse set of friends?
2
What is context collapse?
• We present different versions of the self depending on our audience• Could include:• Style of dress• Speech• Non-verbals
• Context collapse occurs when we “perform” for different audiences at same time• e.g., weddings 3
Ego
Context Collapse on Facebook
4
How context collapse might impact Facebook use1) Strength of weak ties (Granovetter, 1973): users distribute
content (esp. resource requests) to entire network to increase likelihood that someone will see it and respond.
2) Privacy settings: users employ increasingly granular privacy settings to segment network into different audiences
3) Lowest common denominator (Hogan, 2010): users only distribute content appropriate for all “friends.”
5
Privacy Online
Privacy: “selective control of access to the self,” achieved by regulating social interactions (Altman, 1975)
6
Privacy Concerns
ID TheftStalkers
Inappropriate Content
Employers
Hacked Account
Private Content
Visibility of Content
Friends Only
Limited Profile
Friend Lists
Multiple Accounts
Restricting Searchability
Places / Check-ins
Restricting Tagging
Limit Old
Posts
Privacy Settings
Communications Privacy Management Theory (Petronio, 2002)
• Relationships managed by balancing privacy and disclosures
• Privacy and disclosures function in “incompatible” ways
• We create boundaries to demarcate both private and shared information 7
Person A’s Personal
Boundary
Person B’s Personal
Boundary Colle
ctive
Bo
unda
ry
Privacy (Concealing) Disclosures (Revealing)
Boundary Management on Facebook
• Default settings emphasize revealing, not concealing
• Networks are increasingly large and diverse
• Most users maintain very permeable boundaries to personal information and shared content
Strategies for controlling access to private information:• Privacy Settings
• Controlling Friend Requests/Defriending
• Removing Content/Untagging
• Not sharing content (lowest common denominator; deactivating)
8
Study & Analysis• Survey participants (see Vitak, 2012) volunteered for follow-up
study• Selection criteria: Use of Facebook’s advanced privacy
settings/multiple accounts
• Interviews • 26 participants; length: 30-94 minutes• Primary topic: Boundary management strategies
• Analysis• Interviews transcribed, proofed, uploaded into Dedoose
• Analyzed using textual microanalysis (Strauss & Corbin, 1998) 9
(Vitak, in preparation)
Findings: Friending/Defriending • 24 participants (92%) set profile to Friends Only• Most users reported a lot of Facebook Friends…• M = 500, Median = 433, SD = 361, range: 62 – 1600
• …and many were weak ties• 8% fell within circles with most overlap,
52% in circles with least overlap
• Most users (73%) described defriendingpractices to manage network• Many performed “friend purges”• Hesitation/concern for hurting people’s feelings• Hiding was an alternative practice to defriending 10
Weak Ties 3rd
Tier
2nd TierSt
rong
Tie
s
Findings: Segregating Audiences
• 20 participants (77%) actively used Lists to restrict access to content to specific groups of Friends. • Maintaining power dynamics
• Blocking family
• Restricting content to close friends & family
• Private Messages or Notes visible to small group of Friends
• 57% of Twitter users kept multiple accounts • Usually divided based on personal/professional identities
11
Findings: Lowest Common Denominator
• Even with heavy use of privacy settings, most users reported censoring posts
• Focus on positive updates
• Easier to not post than negotiate boundaries
• Simplifying posts to make them more widely appealing
• Privacy concerns
• Conscious thought process about audience before posting:
• Who will see this post?
• How might it be misinterpreted?
• Will people find this post interesting/funny/worthwhile/etc.?12
Implications• Among those highly engaged in impression management
online, concealing often outweighs revealing• Contrary to Zukerberg’s “new social norm” argument
• If true, this impacts:• Opportunities for social capital transactions• Relationship maintenance
…but what about disconnecting completely?
13
Logging Off
Arguments For:
• “Addiction” concerns
• More meaningful interactions
• Less distractions
• More productivity
• Work/Life Balance
• Context Collapse
Arguments Against:
• Relationship maintenance
• Missing out
• Networking
• New connections
• Social capital exchanges
• Information retrieval
14
Tools to Help You Log Off
15
“Productivity through disconnection”
“Turn off your friends…”
* Fred Stutzman, the creator of these apps, is a rock star.
Thanks!
Contact:[email protected]
Twitter: @jvitakWebsite: vitak.wordpress.com
* Paper referenced in study:Vitak, J. (2012, May). The impact of context collapse and privacy on social network site disclosures. Paper to be presented at the International Communication Association 62nd Annual Conference, Phoenix, AZ. (Also currently under review at a Communication Journal)
16