SlideShare a Scribd company logo
1 of 16
Protecting Face:
Managing Privacy and Context
Collapse in the Facebook Age
Jessica Vitak (@jvitak)
PhD Candidate, Michigan State University
Assistant Professor, University of Maryland iSchool (August 2012)
                                                                    1
Theorizing the Web | April 14, 2012 | College Park, MD
How are Facebook users managing context collapse
and interacting with a diverse set of friends?




                                                   2
What is context collapse?
• We present different versions
  of the self depending on our
  audience
• Could include:
  • Style of dress
  • Speech                        Ego
  • Non-verbals


• Context collapse occurs when
  we “perform” for different
  audiences at same time                3
  • e.g., weddings
Context Collapse on Facebook




                               4
How context collapse might
impact Facebook use
1) Strength of weak ties (Granovetter, 1973): users distribute
   content (esp. resource requests) to entire network to
   increase likelihood that someone will see it and respond.

2) Privacy settings: users employ increasingly granular
   privacy settings to segment network into different
   audiences

3) Lowest common denominator (Hogan, 2010): users only
   distribute content appropriate for all “friends.”
                                                                 5
Privacy Online
     Privacy: “selective control of access to the self,” achieved by
     regulating social interactions (Altman, 1975)


                                                            Multiple
                  Stalkers                                  Accounts
     ID Theft                                  Friends                  Restricting
                                Private         Only                   Searchability
                                Content
Employers        Privacy                    Places /        Privacy         Friend
                                           Check-ins                         Lists
                Concerns                                    Settings
  Visibility                     Hacked                                      Limit
 of Content                      Account      Restricting                     Old
                Inappropriate                  Tagging                       Posts
                                                             Limited                   6
                   Content                                   Profile
Communications Privacy
 Management Theory (Petronio, 2002)
• Relationships managed by balancing privacy and disclosures

        Privacy (Concealing)            Disclosures (Revealing)




• Privacy and disclosures function in “incompatible” ways


• We create boundaries to

                                                  Collective
                                                  Boundary
                                     Person A’s                Person B’s
  demarcate both private and          Personal                  Personal
                                     Boundary                  Boundary
  shared information                                                        7
Boundary Management on Facebook
• Default settings emphasize revealing, not concealing
• Networks are increasingly large and diverse
• Most users maintain very permeable boundaries to personal
  information and shared content


Strategies for controlling access to private information:
  • Privacy Settings
  • Controlling Friend Requests/Defriending
  • Removing Content/Untagging
  • Not sharing content (lowest common denominator;           8
    deactivating)
Study & Analysis                          (Vitak, in preparation)



• Survey participants (see Vitak, 2012) volunteered for follow-up
  study
• Selection criteria: Use of Facebook’s advanced privacy
  settings/multiple accounts

• Interviews
  • 26 participants; length: 30-94 minutes
  • Primary topic: Boundary management strategies

• Analysis
  • Interviews transcribed, proofed, uploaded into Dedoose
  • Analyzed using textual microanalysis (Strauss & Corbin, 1998)   9
Findings: Friending/Defriending
• 24 participants (92%) set profile to Friends Only
• Most users reported a lot of Facebook Friends…
  • M = 500, Median = 433, SD = 361, range: 62 – 1600
• …and many were weak ties
  • 8% fell within circles with most overlap,                  2nd
    52% in circles with least overlap                          Tier

                                                        Weak
                                                        Ties    3rd
• Most users (73%) described defriending                       Tier
  practices to manage network
  • Many performed “friend purges”
  • Hesitation/concern for hurting people’s feelings
  • Hiding was an alternative practice to defriending                 10
Findings: Segregating Audiences
• 20 participants (77%) actively used Lists to restrict access to
  content to specific groups of Friends.
  • Maintaining power dynamics
  • Blocking family
  • Restricting content to close friends & family
  • Private Messages or Notes visible to small group of Friends


• 57% of Twitter users kept multiple accounts
  • Usually divided based on personal/professional identities

                                                                    11
Findings: Lowest Common Denominator
 • Even with heavy use of privacy settings, most users reported
   censoring posts
   • Focus on positive updates
   • Easier to not post than negotiate boundaries
   • Simplifying posts to make them more widely appealing
   • Privacy concerns

 • Conscious thought process about audience before posting:
    • Who will see this post?
    • How might it be misinterpreted?
                                                                      12
    • Will people find this post interesting/funny/worthwhile/etc.?
Implications
• Among those highly engaged in impression management
  online, concealing often outweighs revealing
  • Contrary to Zukerberg’s “new social norm” argument


• If true, this impacts:
  • Opportunities for social capital transactions
  • Relationship maintenance



           …but what about disconnecting completely?

                                                         13
Logging Off
Arguments For:            Arguments Against:

 • “Addiction” concerns    • Relationship
                             maintenance
 • More meaningful
   interactions            • Missing out
 • Less distractions       • Networking
 • More productivity       • New connections
 • Work/Life Balance       • Social capital exchanges
 • Context Collapse        • Information retrieval
                                                        14
Tools to Help You Log Off


                   “Productivity through disconnection”




                   “Turn off your friends…”


                                                              15

* Fred Stutzman, the creator of these apps, is a rock star.
Thanks!
                                                   Contact:
                                     vitakjes@msu.edu
                                       Twitter: @jvitak
                                 Website: vitak.wordpress.com




* Paper referenced in study:                                                                                        16
Vitak, J. (2012, May). The impact of context collapse and privacy on social network site disclosures. Paper to be
presented at the International Communication Association 62nd Annual Conference, Phoenix, AZ. (Also currently
under review at a Communication Journal)

More Related Content

Viewers also liked

LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social MediaLSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social MediaLocal Social Summit
 
Strata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy OfficerStrata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy OfficerJim Adler
 
Quantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksQuantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksMichael Bernstein
 
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...summersocialwebshop
 
Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...ACSM @ VU University Amsterdam
 
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToSocial Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToAgnese Vellar
 
Comunicare nell'era dei social media
Comunicare nell'era dei social mediaComunicare nell'era dei social media
Comunicare nell'era dei social mediaAgnese Vellar
 
Communication privacy management theory_day
Communication privacy management theory_dayCommunication privacy management theory_day
Communication privacy management theory_daykelseyday
 
Context Collapse on Social Networking Sites
Context Collapse on Social Networking SitesContext Collapse on Social Networking Sites
Context Collapse on Social Networking SitesStefanie Duguay
 
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...Jessica Vitak
 
Communication Privacy Management Theory
Communication Privacy Management TheoryCommunication Privacy Management Theory
Communication Privacy Management Theorymlodom
 
Digital Footprint
Digital FootprintDigital Footprint
Digital FootprintRobin Low
 
Using Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social MediaUsing Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social MediaPaul Brown
 
Communication Concepts, Theories And Models1
Communication Concepts, Theories And Models1Communication Concepts, Theories And Models1
Communication Concepts, Theories And Models1Suchitra Patnaik
 

Viewers also liked (17)

LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social MediaLSS@SMW:  Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
LSS@SMW: Bernie Hogan Rebuilding The Collapsed Contexts In Social Media
 
A private sphereslideshare
A private sphereslideshareA private sphereslideshare
A private sphereslideshare
 
Strata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy OfficerStrata Conference NY: The Accidental Chief Privacy Officer
Strata Conference NY: The Accidental Chief Privacy Officer
 
Quantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social NetworksQuantifying the Invisible Audience in Social Networks
Quantifying the Invisible Audience in Social Networks
 
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
Jessica Vitak, "When Contexts Collapse: Managing Self-Presentation Across Soc...
 
The Glass House: Anonymity Vs. Transparency on the Internet
The Glass House: Anonymity Vs. Transparency on the InternetThe Glass House: Anonymity Vs. Transparency on the Internet
The Glass House: Anonymity Vs. Transparency on the Internet
 
Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...Context collapse on social media: implications for interpersonal and marketin...
Context collapse on social media: implications for interpersonal and marketin...
 
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniToSocial Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
Social Media - Introduzione al Corso [a.a. 2014-2015] - UniTo
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Comunicare nell'era dei social media
Comunicare nell'era dei social mediaComunicare nell'era dei social media
Comunicare nell'era dei social media
 
Communication privacy management theory_day
Communication privacy management theory_dayCommunication privacy management theory_day
Communication privacy management theory_day
 
Context Collapse on Social Networking Sites
Context Collapse on Social Networking SitesContext Collapse on Social Networking Sites
Context Collapse on Social Networking Sites
 
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
Theorizing the Future of Computer-Mediated Communication: The Changing Role o...
 
Communication Privacy Management Theory
Communication Privacy Management TheoryCommunication Privacy Management Theory
Communication Privacy Management Theory
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprint
 
Using Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social MediaUsing Social Smarts to Engage Students on Social Media
Using Social Smarts to Engage Students on Social Media
 
Communication Concepts, Theories And Models1
Communication Concepts, Theories And Models1Communication Concepts, Theories And Models1
Communication Concepts, Theories And Models1
 

Similar to Managing Privacy and Context Collapse in the Facebook Age

Understanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesUnderstanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesJessica Vitak
 
Social Network Sites: An Overview
Social Network Sites: An OverviewSocial Network Sites: An Overview
Social Network Sites: An OverviewJessica Vitak
 
Socially-Aware Informal Learning Support: Potential and Challenges of the So...
Socially-Aware Informal Learning Support:Potential and Challenges of the So...Socially-Aware Informal Learning Support:Potential and Challenges of the So...
Socially-Aware Informal Learning Support: Potential and Challenges of the So...Simone Braun
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingMicah Altman
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social mediakmtj1979
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesMichael Zimmer
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Open University Australia
 
Privacy Codes of Practice for the Social Web:
Privacy Codes of Practice for the Social Web:Privacy Codes of Practice for the Social Web:
Privacy Codes of Practice for the Social Web:girmaenideg
 
Social data: what it is, who owns it, and why you should care
Social data: what it is, who owns it, and why you should careSocial data: what it is, who owns it, and why you should care
Social data: what it is, who owns it, and why you should careCornelius Puschmann
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social MediaPhysiopedia
 
Data protection and social networks
Data protection and social networksData protection and social networks
Data protection and social networksblogzilla
 
Problem statement-1-friend-affinity-finder
Problem statement-1-friend-affinity-finderProblem statement-1-friend-affinity-finder
Problem statement-1-friend-affinity-finderAmitabhDas22
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leadingHsuan-Ting Chen
 
SOCIAL NETWORKING FOR INTEGRATION.pptx
SOCIAL NETWORKING FOR INTEGRATION.pptxSOCIAL NETWORKING FOR INTEGRATION.pptx
SOCIAL NETWORKING FOR INTEGRATION.pptxFrancis Dave Mabborang
 
Dagens Välfärd's website - the Open Square
Dagens Välfärd's website - the Open SquareDagens Välfärd's website - the Open Square
Dagens Välfärd's website - the Open SquareTricia Rambharose
 
Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6jiahao84
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activityguest09fcd1
 
CSW2022_06_influence.pptx.pdf
CSW2022_06_influence.pptx.pdfCSW2022_06_influence.pptx.pdf
CSW2022_06_influence.pptx.pdfSaraJayneTerp
 
SocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for BusinessesSocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for BusinessesJulian Ranger
 

Similar to Managing Privacy and Context Collapse in the Facebook Age (20)

Understanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online SpacesUnderstanding Users' Privacy Motivations and Behaviors in Online Spaces
Understanding Users' Privacy Motivations and Behaviors in Online Spaces
 
Social Network Sites: An Overview
Social Network Sites: An OverviewSocial Network Sites: An Overview
Social Network Sites: An Overview
 
Socially-Aware Informal Learning Support: Potential and Challenges of the So...
Socially-Aware Informal Learning Support:Potential and Challenges of the So...Socially-Aware Informal Learning Support:Potential and Challenges of the So...
Socially-Aware Informal Learning Support: Potential and Challenges of the So...
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social media
 
Internet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United StatesInternet Ethics Issues and Action in the United States
Internet Ethics Issues and Action in the United States
 
Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?Facebook - How closely did you read the Terms Of Use?
Facebook - How closely did you read the Terms Of Use?
 
Privacy Codes of Practice for the Social Web:
Privacy Codes of Practice for the Social Web:Privacy Codes of Practice for the Social Web:
Privacy Codes of Practice for the Social Web:
 
Social data: what it is, who owns it, and why you should care
Social data: what it is, who owns it, and why you should careSocial data: what it is, who owns it, and why you should care
Social data: what it is, who owns it, and why you should care
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social Media
 
Data protection and social networks
Data protection and social networksData protection and social networks
Data protection and social networks
 
Problem statement-1-friend-affinity-finder
Problem statement-1-friend-affinity-finderProblem statement-1-friend-affinity-finder
Problem statement-1-friend-affinity-finder
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leading
 
SOCIAL NETWORKING FOR INTEGRATION.pptx
SOCIAL NETWORKING FOR INTEGRATION.pptxSOCIAL NETWORKING FOR INTEGRATION.pptx
SOCIAL NETWORKING FOR INTEGRATION.pptx
 
Going Social
Going SocialGoing Social
Going Social
 
Dagens Välfärd's website - the Open Square
Dagens Välfärd's website - the Open SquareDagens Välfärd's website - the Open Square
Dagens Välfärd's website - the Open Square
 
Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6Nm4881 a social network analysis week 6
Nm4881 a social network analysis week 6
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
 
CSW2022_06_influence.pptx.pdf
CSW2022_06_influence.pptx.pdfCSW2022_06_influence.pptx.pdf
CSW2022_06_influence.pptx.pdf
 
SocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for BusinessesSocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for Businesses
 

More from Jessica Vitak

CSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont PrinciplesCSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont PrinciplesJessica Vitak
 
I like it....whatever that means: The evolving relationship between disclosur...
I like it....whatever that means: The evolving relationship between disclosur...I like it....whatever that means: The evolving relationship between disclosur...
I like it....whatever that means: The evolving relationship between disclosur...Jessica Vitak
 
INFM600 Module 1 lecture
INFM600 Module 1 lectureINFM600 Module 1 lecture
INFM600 Module 1 lectureJessica Vitak
 
Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social MediaLeveraging Your Audience Through Social Media
Leveraging Your Audience Through Social MediaJessica Vitak
 
Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social Media Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social Media Jessica Vitak
 
Connecting in the Facebook Age: Development and Validation of a New Measure o...
Connecting in the Facebook Age: Development and Validation of a New Measure o...Connecting in the Facebook Age: Development and Validation of a New Measure o...
Connecting in the Facebook Age: Development and Validation of a New Measure o...Jessica Vitak
 
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...Jessica Vitak
 
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...Jessica Vitak
 
Social Media: Where We Stand, Where We’re Heading
Social Media: Where We Stand, Where We’re HeadingSocial Media: Where We Stand, Where We’re Heading
Social Media: Where We Stand, Where We’re HeadingJessica Vitak
 
Technology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word OutTechnology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word OutJessica Vitak
 
Social Support and Information-Sharing on Facebook by Adult Users
Social Support and Information-Sharing on Facebook by Adult UsersSocial Support and Information-Sharing on Facebook by Adult Users
Social Support and Information-Sharing on Facebook by Adult UsersJessica Vitak
 

More from Jessica Vitak (11)

CSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont PrinciplesCSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont Principles
 
I like it....whatever that means: The evolving relationship between disclosur...
I like it....whatever that means: The evolving relationship between disclosur...I like it....whatever that means: The evolving relationship between disclosur...
I like it....whatever that means: The evolving relationship between disclosur...
 
INFM600 Module 1 lecture
INFM600 Module 1 lectureINFM600 Module 1 lecture
INFM600 Module 1 lecture
 
Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social MediaLeveraging Your Audience Through Social Media
Leveraging Your Audience Through Social Media
 
Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social Media Leveraging Your Audience Through Social Media
Leveraging Your Audience Through Social Media
 
Connecting in the Facebook Age: Development and Validation of a New Measure o...
Connecting in the Facebook Age: Development and Validation of a New Measure o...Connecting in the Facebook Age: Development and Validation of a New Measure o...
Connecting in the Facebook Age: Development and Validation of a New Measure o...
 
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...
#cscw2014 -- Facebook Makes the Heart Grow Fonder: Relationship Maintenance S...
 
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...
Users and Nonusers: Interactions between Levels of Facebook Adoption and Soci...
 
Social Media: Where We Stand, Where We’re Heading
Social Media: Where We Stand, Where We’re HeadingSocial Media: Where We Stand, Where We’re Heading
Social Media: Where We Stand, Where We’re Heading
 
Technology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word OutTechnology and Social Media: How to Get the Word Out
Technology and Social Media: How to Get the Word Out
 
Social Support and Information-Sharing on Facebook by Adult Users
Social Support and Information-Sharing on Facebook by Adult UsersSocial Support and Information-Sharing on Facebook by Adult Users
Social Support and Information-Sharing on Facebook by Adult Users
 

Recently uploaded

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 

Recently uploaded (20)

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 

Managing Privacy and Context Collapse in the Facebook Age

  • 1. Protecting Face: Managing Privacy and Context Collapse in the Facebook Age Jessica Vitak (@jvitak) PhD Candidate, Michigan State University Assistant Professor, University of Maryland iSchool (August 2012) 1 Theorizing the Web | April 14, 2012 | College Park, MD
  • 2. How are Facebook users managing context collapse and interacting with a diverse set of friends? 2
  • 3. What is context collapse? • We present different versions of the self depending on our audience • Could include: • Style of dress • Speech Ego • Non-verbals • Context collapse occurs when we “perform” for different audiences at same time 3 • e.g., weddings
  • 4. Context Collapse on Facebook 4
  • 5. How context collapse might impact Facebook use 1) Strength of weak ties (Granovetter, 1973): users distribute content (esp. resource requests) to entire network to increase likelihood that someone will see it and respond. 2) Privacy settings: users employ increasingly granular privacy settings to segment network into different audiences 3) Lowest common denominator (Hogan, 2010): users only distribute content appropriate for all “friends.” 5
  • 6. Privacy Online Privacy: “selective control of access to the self,” achieved by regulating social interactions (Altman, 1975) Multiple Stalkers Accounts ID Theft Friends Restricting Private Only Searchability Content Employers Privacy Places / Privacy Friend Check-ins Lists Concerns Settings Visibility Hacked Limit of Content Account Restricting Old Inappropriate Tagging Posts Limited 6 Content Profile
  • 7. Communications Privacy Management Theory (Petronio, 2002) • Relationships managed by balancing privacy and disclosures Privacy (Concealing) Disclosures (Revealing) • Privacy and disclosures function in “incompatible” ways • We create boundaries to Collective Boundary Person A’s Person B’s demarcate both private and Personal Personal Boundary Boundary shared information 7
  • 8. Boundary Management on Facebook • Default settings emphasize revealing, not concealing • Networks are increasingly large and diverse • Most users maintain very permeable boundaries to personal information and shared content Strategies for controlling access to private information: • Privacy Settings • Controlling Friend Requests/Defriending • Removing Content/Untagging • Not sharing content (lowest common denominator; 8 deactivating)
  • 9. Study & Analysis (Vitak, in preparation) • Survey participants (see Vitak, 2012) volunteered for follow-up study • Selection criteria: Use of Facebook’s advanced privacy settings/multiple accounts • Interviews • 26 participants; length: 30-94 minutes • Primary topic: Boundary management strategies • Analysis • Interviews transcribed, proofed, uploaded into Dedoose • Analyzed using textual microanalysis (Strauss & Corbin, 1998) 9
  • 10. Findings: Friending/Defriending • 24 participants (92%) set profile to Friends Only • Most users reported a lot of Facebook Friends… • M = 500, Median = 433, SD = 361, range: 62 – 1600 • …and many were weak ties • 8% fell within circles with most overlap, 2nd 52% in circles with least overlap Tier Weak Ties 3rd • Most users (73%) described defriending Tier practices to manage network • Many performed “friend purges” • Hesitation/concern for hurting people’s feelings • Hiding was an alternative practice to defriending 10
  • 11. Findings: Segregating Audiences • 20 participants (77%) actively used Lists to restrict access to content to specific groups of Friends. • Maintaining power dynamics • Blocking family • Restricting content to close friends & family • Private Messages or Notes visible to small group of Friends • 57% of Twitter users kept multiple accounts • Usually divided based on personal/professional identities 11
  • 12. Findings: Lowest Common Denominator • Even with heavy use of privacy settings, most users reported censoring posts • Focus on positive updates • Easier to not post than negotiate boundaries • Simplifying posts to make them more widely appealing • Privacy concerns • Conscious thought process about audience before posting: • Who will see this post? • How might it be misinterpreted? 12 • Will people find this post interesting/funny/worthwhile/etc.?
  • 13. Implications • Among those highly engaged in impression management online, concealing often outweighs revealing • Contrary to Zukerberg’s “new social norm” argument • If true, this impacts: • Opportunities for social capital transactions • Relationship maintenance …but what about disconnecting completely? 13
  • 14. Logging Off Arguments For: Arguments Against: • “Addiction” concerns • Relationship maintenance • More meaningful interactions • Missing out • Less distractions • Networking • More productivity • New connections • Work/Life Balance • Social capital exchanges • Context Collapse • Information retrieval 14
  • 15. Tools to Help You Log Off “Productivity through disconnection” “Turn off your friends…” 15 * Fred Stutzman, the creator of these apps, is a rock star.
  • 16. Thanks! Contact: vitakjes@msu.edu Twitter: @jvitak Website: vitak.wordpress.com * Paper referenced in study: 16 Vitak, J. (2012, May). The impact of context collapse and privacy on social network site disclosures. Paper to be presented at the International Communication Association 62nd Annual Conference, Phoenix, AZ. (Also currently under review at a Communication Journal)