SlideShare una empresa de Scribd logo
1 de 37
Descargar para leer sin conexión
Boundary Regulation
  in Social Media
(Lenhart 2009)
Context
 Privacy
Disclosure

      Fred Stutzman, fred.stutzman@unc.edu
Managing Contexts
• Friendster
 • “Burners, gay men
   and bloggers”
• Myspace
 • Teens and mirror
   profiles
   (boyd, 2006 & 2007)     http://www.flickr.com/photos/foxgrrl/3676857198/




                         Fred Stutzman, fred.stutzman@unc.edu
Managing Contexts
• Presence of multiple
  social groups
 • Behavioral
   Strategies
 • Mental Strategies
 • “Least Common                                 http://bit.ly/yS8yI
   Denominator”
                       (Lampinen et. al., 2009)
                            Fred Stutzman, fred.stutzman@unc.edu
Context Tension
                           • Connections across
                             status and power
                             boundaries
                            • Propriety, work/
                              family
                           • Inadvertent
                             disclosures leading
                             to harms
http://bit.ly/6HTDB




                        (Skeels and Grudin, 2009)
                             Fred Stutzman, fred.stutzman@unc.edu
Conceptions of Privacy

 • Privacy as selective control (Altman,
   1975)
 • Privacy as information practice
   (Dourish & Anderson, 2006)
 • Privacy as boundary management
   (Petronio, 2002)


                         Fred Stutzman, fred.stutzman@unc.edu
CPM
• Communications
  Privacy Management
 • Rule Development
 • Boundary
   Coordination
 • Boundary
   Turbulence
                  (Petronio, 2002)
                           Fred Stutzman, fred.stutzman@unc.edu
Study Goals

• Why are motives for using multiple
  profiles?
• What strategies to people employ in
  managing multiple profiles?
• Is this an effective strategy?



                        Fred Stutzman, fred.stutzman@unc.edu
Method
• Criteria: multiple profiles on one
  social media site
• Twenty in-depth interviews, Summer
  2009
• In-person/phone/Skype
• Analyzed using grounded theory


                        Fred Stutzman, fred.stutzman@unc.edu
Respondents
• Six in their 20’s, Seven
  in their 30’s, Six in their
  40’s, and one was 57
• Twelve females, eight
  males
• Respondents from US
  (NC, VA, GA, CA, FL)
  and UK

                                Fred Stutzman, fred.stutzman@unc.edu
Motives
• Privacy
• Identity
• Utility
• Propriety
               http://www.flickr.com/photos/gi/435888435/




                       Fred Stutzman, fred.stutzman@unc.edu
Privacy
• Control of access to the self;
  withdrawal from public domain
 • Safety
 • Confidentiality
“I know some young kids who tweeted ‘I’m
going to lunch at so and so’ and they came
back to their apartment and they had been
robbed...”

                        Fred Stutzman, fred.stutzman@unc.edu
Privacy

• For many respondents, multiple
  profiles:
 • Functioned as shield, protecting
   identifiable information
 • Enabled content production



                       Fred Stutzman, fred.stutzman@unc.edu
Identity
• Multiple profiles allowed for
  establishment of distinct identities
  (personal/professional)

  [Created second Facebook profile so] “I
  could be all about business” [On personal
  profile] “could be a place where I have
  opinions, where I express personal stuff.”

                           Fred Stutzman, fred.stutzman@unc.edu
Utility
• Multiple profiles enable:
 • Accomplishment of promotional and
   collaborative goals
 • Catering to specific audiences at
   specific times
  • Not having to apologize for off-topic
    posts


                        Fred Stutzman, fred.stutzman@unc.edu
Utility
• Segment volume of disclosure
• Offer differing information streams
  (topic/interest)
“If somebody on my personal Twitter says
‘oh gosh you are inundating me with too
many updates,’ I will tell them that they can
follow my public profile that I update
substantially less”

                          Fred Stutzman, fred.stutzman@unc.edu
Propriety
• Multiple profiles used to manage
  conformity to norms and customs
 • Befriending the boss or parent

[On the personal profile] “when my boss
pops up and Facebook tells me ‘we think
you should be friends,’ I don’t say yes
because she’s my boss.”


                        Fred Stutzman, fred.stutzman@unc.edu
Forms of Regulation
• Multiple identities in a
  single space
• Single account, highly
  segmented privacy controls
• Segmentation by site
 • Different social media for
   different audiences

                             Fred Stutzman, fred.stutzman@unc.edu
Axes of Regulation

• Regulation by
  linkage
• Regulation by
  concealment


                  http://www.flickr.com/photos/thosch66/270060125/



                        Fred Stutzman, fred.stutzman@unc.edu
Linkages
• Links to the identity
"I have two different identities, I have a
personal one. [and] one geared towards my
professional stuff, there's not much
personal information there. But, I do have a
separate Flickr account, I have separate
Twitter accounts, I have separate Myspace
pages”

                          Fred Stutzman, fred.stutzman@unc.edu
Linkages
• Regulation by linked interconnections

“But I don’t try and hide the fact that I’m
one or the other. You know in my [personal]
bio, I say something about [my business
twitter]. So its not like I’m trying to hide my
two different identities.”



                           Fred Stutzman, fred.stutzman@unc.edu
Concealment
• Three genres identified
 • Pseudonymity
 • Practical Obscurity
  • Obscure name variants, non-
    disclosure of identity
 • Transparent Separations

                         Fred Stutzman, fred.stutzman@unc.edu
Concealment




      Fred Stutzman, fred.stutzman@unc.edu
Evaluation
• Do these techniques provide privacy?
“The thing going into it is I don’t put
anything out there that I wouldn’t want
everybody to know”
“I have to be careful about - that I say
something that's generic enough”

“I’m very conscious of the fact I am
basically speaking to an open mic”

                          Fred Stutzman, fred.stutzman@unc.edu
Evaluation

• Is the process burdensome?
 • High burden: Number of accounts
   maintained, large number of
   contacts
 • High burden: Degree of linkage
   disassociation


                      Fred Stutzman, fred.stutzman@unc.edu
Evaluation

• Technical strategies
 • Most participants reported
   “bleedover”
 • Segmenting by device
 • Segmenting by time and location


                         Fred Stutzman, fred.stutzman@unc.edu
Implications
• Multiple profile maintenance
  consistent with the theoretical
  provisions of Altman and Petronio
• Process reduces potential harms, and
  encourages disclosures
• Represents a reaction to limitations
  inherent in sites

                       Fred Stutzman, fred.stutzman@unc.edu
Thank you!
Fred Stutzman:
  fred.stutzman@unc.edu
  @fstutzman
  http://fredstutzman.com

Woodrow Hartzog
 whartzog@email.unc.edu
 @hartzog
 http://ssrn.com/author=1107005




                                  Fred Stutzman, fred.stutzman@unc.edu
Axis of Linkages




          Fred Stutzman, fred.stutzman@unc.edu
Pseudonymity




        Fred Stutzman, fred.stutzman@unc.edu
Practical Obscurity




            Fred Stutzman, fred.stutzman@unc.edu
Transparent Separations




              Fred Stutzman, fred.stutzman@unc.edu

Más contenido relacionado

La actualidad más candente

Managing Your Own Learning
Managing Your Own LearningManaging Your Own Learning
Managing Your Own LearningBob Bertsch
 
Blogging basics
Blogging basicsBlogging basics
Blogging basicsktcole
 
Digital Identity & Social Networking for Researchers
Digital Identity & Social Networking for ResearchersDigital Identity & Social Networking for Researchers
Digital Identity & Social Networking for ResearchersFlea Palmer
 
Arming Students for a World of Incomprehensible Input
Arming Students for a World of Incomprehensible InputArming Students for a World of Incomprehensible Input
Arming Students for a World of Incomprehensible InputSara-Elizabeth Cottrell
 
Finding people-to-learn-from
Finding people-to-learn-fromFinding people-to-learn-from
Finding people-to-learn-fromBob Bertsch
 
Online Identity - Defining Personal from Professional
Online Identity - Defining Personal from ProfessionalOnline Identity - Defining Personal from Professional
Online Identity - Defining Personal from ProfessionalPCM creative
 
Basic Personal Branding for Indiana Association of Administrative Professionals
Basic Personal Branding for Indiana Association of Administrative ProfessionalsBasic Personal Branding for Indiana Association of Administrative Professionals
Basic Personal Branding for Indiana Association of Administrative ProfessionalsErik Deckers
 
Nonprofit Blogging Game
Nonprofit Blogging GameNonprofit Blogging Game
Nonprofit Blogging GameBeth Kanter
 
Curating Content with Scoop.it
Curating Content with Scoop.itCurating Content with Scoop.it
Curating Content with Scoop.itBob Bertsch
 
Andrew Blum Presentation
Andrew Blum PresentationAndrew Blum Presentation
Andrew Blum Presentationmshelley34
 
2010 leadership-ethics-social networking
2010   leadership-ethics-social networking2010   leadership-ethics-social networking
2010 leadership-ethics-social networkingSchoolTechPolicies.com
 
Balloons socialmediaandsocialpeopleweb
Balloons socialmediaandsocialpeoplewebBalloons socialmediaandsocialpeopleweb
Balloons socialmediaandsocialpeoplewebZizi Papacharissi
 

La actualidad más candente (14)

Managing Your Own Learning
Managing Your Own LearningManaging Your Own Learning
Managing Your Own Learning
 
Blogging basics
Blogging basicsBlogging basics
Blogging basics
 
Digital Identity & Social Networking for Researchers
Digital Identity & Social Networking for ResearchersDigital Identity & Social Networking for Researchers
Digital Identity & Social Networking for Researchers
 
Arming Students for a World of Incomprehensible Input
Arming Students for a World of Incomprehensible InputArming Students for a World of Incomprehensible Input
Arming Students for a World of Incomprehensible Input
 
Finding people-to-learn-from
Finding people-to-learn-fromFinding people-to-learn-from
Finding people-to-learn-from
 
Online Identity - Defining Personal from Professional
Online Identity - Defining Personal from ProfessionalOnline Identity - Defining Personal from Professional
Online Identity - Defining Personal from Professional
 
Basic Personal Branding for Indiana Association of Administrative Professionals
Basic Personal Branding for Indiana Association of Administrative ProfessionalsBasic Personal Branding for Indiana Association of Administrative Professionals
Basic Personal Branding for Indiana Association of Administrative Professionals
 
Nonprofit Blogging Game
Nonprofit Blogging GameNonprofit Blogging Game
Nonprofit Blogging Game
 
PhD Futures
PhD FuturesPhD Futures
PhD Futures
 
Curating Content with Scoop.it
Curating Content with Scoop.itCurating Content with Scoop.it
Curating Content with Scoop.it
 
Andrew Blum Presentation
Andrew Blum PresentationAndrew Blum Presentation
Andrew Blum Presentation
 
2010 leadership-ethics-social networking
2010   leadership-ethics-social networking2010   leadership-ethics-social networking
2010 leadership-ethics-social networking
 
Balloons socialmediaandsocialpeopleweb
Balloons socialmediaandsocialpeoplewebBalloons socialmediaandsocialpeopleweb
Balloons socialmediaandsocialpeopleweb
 
Anytime anywhere admin
Anytime anywhere adminAnytime anywhere admin
Anytime anywhere admin
 

Destacado

Social media, regulation and personal finance companies
Social media, regulation and personal finance companiesSocial media, regulation and personal finance companies
Social media, regulation and personal finance companiesFishburnHedges
 
User-Generated Content and SBS
User-Generated Content and SBSUser-Generated Content and SBS
User-Generated Content and SBSTerry Flew
 
Social Media Success Despite Regulation
Social Media Success Despite RegulationSocial Media Success Despite Regulation
Social Media Success Despite RegulationJaime Punishill
 
Bovill social media regulation workshop UKCFA Dec 14
Bovill social media regulation workshop UKCFA Dec 14Bovill social media regulation workshop UKCFA Dec 14
Bovill social media regulation workshop UKCFA Dec 14Bovill
 
SMX Paris 2014 : Convergence, SEO et effet de levier
SMX Paris 2014 : Convergence, SEO et effet de levierSMX Paris 2014 : Convergence, SEO et effet de levier
SMX Paris 2014 : Convergence, SEO et effet de levierCédric Tamboise
 
The Classification Challenge: Media Content Regulation in an Age of Converge...
The Classification Challenge: Media Content Regulation in an Age of  Converge...The Classification Challenge: Media Content Regulation in an Age of  Converge...
The Classification Challenge: Media Content Regulation in an Age of Converge...Terry Flew
 
Shanghai jiao tong keynote 12 june 2015
Shanghai jiao tong keynote 12 june 2015Shanghai jiao tong keynote 12 june 2015
Shanghai jiao tong keynote 12 june 2015Terry Flew
 

Destacado (7)

Social media, regulation and personal finance companies
Social media, regulation and personal finance companiesSocial media, regulation and personal finance companies
Social media, regulation and personal finance companies
 
User-Generated Content and SBS
User-Generated Content and SBSUser-Generated Content and SBS
User-Generated Content and SBS
 
Social Media Success Despite Regulation
Social Media Success Despite RegulationSocial Media Success Despite Regulation
Social Media Success Despite Regulation
 
Bovill social media regulation workshop UKCFA Dec 14
Bovill social media regulation workshop UKCFA Dec 14Bovill social media regulation workshop UKCFA Dec 14
Bovill social media regulation workshop UKCFA Dec 14
 
SMX Paris 2014 : Convergence, SEO et effet de levier
SMX Paris 2014 : Convergence, SEO et effet de levierSMX Paris 2014 : Convergence, SEO et effet de levier
SMX Paris 2014 : Convergence, SEO et effet de levier
 
The Classification Challenge: Media Content Regulation in an Age of Converge...
The Classification Challenge: Media Content Regulation in an Age of  Converge...The Classification Challenge: Media Content Regulation in an Age of  Converge...
The Classification Challenge: Media Content Regulation in an Age of Converge...
 
Shanghai jiao tong keynote 12 june 2015
Shanghai jiao tong keynote 12 june 2015Shanghai jiao tong keynote 12 june 2015
Shanghai jiao tong keynote 12 june 2015
 

Similar a Boundary Regulation in Social Media

The Supportive Behaviors of Older Social Network Site Users
The Supportive Behaviors of Older Social Network Site UsersThe Supportive Behaviors of Older Social Network Site Users
The Supportive Behaviors of Older Social Network Site UsersFred Stutzman
 
The Good, The Bad and the Ugly of Web Residency (HEA V&R Event 2014)
The Good, The Bad and the Ugly of Web Residency (HEA V&R Event 2014)The Good, The Bad and the Ugly of Web Residency (HEA V&R Event 2014)
The Good, The Bad and the Ugly of Web Residency (HEA V&R Event 2014)Dr Elaine Garcia
 
Social Media final presentation risks
Social Media final presentation   risksSocial Media final presentation   risks
Social Media final presentation risksJAIRO SUAREZ
 
#CazSM U: The Role of Social Media on your Identity
#CazSM U: The Role of Social Media on your Identity#CazSM U: The Role of Social Media on your Identity
#CazSM U: The Role of Social Media on your IdentityDouglas Strahler
 
Social media for sceptics
Social media for scepticsSocial media for sceptics
Social media for scepticsHelen Webster
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leadingHsuan-Ting Chen
 
How journalists can use Facebook and Twitter
How journalists can use Facebook and TwitterHow journalists can use Facebook and Twitter
How journalists can use Facebook and TwitterSteve Buttry
 
Introduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingIntroduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingJason Hong
 
Spark Twitter fails Mar2023
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023David Strom
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaElizabeth T. "Eli" Edwards
 

Similar a Boundary Regulation in Social Media (17)

The Supportive Behaviors of Older Social Network Site Users
The Supportive Behaviors of Older Social Network Site UsersThe Supportive Behaviors of Older Social Network Site Users
The Supportive Behaviors of Older Social Network Site Users
 
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
 
Social media 101
Social media 101Social media 101
Social media 101
 
Facebook
FacebookFacebook
Facebook
 
The Good, The Bad and the Ugly of Web Residency (HEA V&R Event 2014)
The Good, The Bad and the Ugly of Web Residency (HEA V&R Event 2014)The Good, The Bad and the Ugly of Web Residency (HEA V&R Event 2014)
The Good, The Bad and the Ugly of Web Residency (HEA V&R Event 2014)
 
Social Media final presentation risks
Social Media final presentation   risksSocial Media final presentation   risks
Social Media final presentation risks
 
Altman - Perfectly Anonymous Data is Perfectly Useless Data
Altman - Perfectly Anonymous Data is Perfectly Useless DataAltman - Perfectly Anonymous Data is Perfectly Useless Data
Altman - Perfectly Anonymous Data is Perfectly Useless Data
 
#CazSM U: The Role of Social Media on your Identity
#CazSM U: The Role of Social Media on your Identity#CazSM U: The Role of Social Media on your Identity
#CazSM U: The Role of Social Media on your Identity
 
Misty
MistyMisty
Misty
 
Social media for sceptics
Social media for scepticsSocial media for sceptics
Social media for sceptics
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leading
 
Fired over Facebook?
Fired over Facebook?Fired over Facebook?
Fired over Facebook?
 
Fired over Facebook?
Fired over Facebook?Fired over Facebook?
Fired over Facebook?
 
How journalists can use Facebook and Twitter
How journalists can use Facebook and TwitterHow journalists can use Facebook and Twitter
How journalists can use Facebook and Twitter
 
Introduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingIntroduction to Privacy and Social Networking
Introduction to Privacy and Social Networking
 
Spark Twitter fails Mar2023
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 

Más de Fred Stutzman

Identifying Social Capital in the Facebook Interface
Identifying Social Capital in the Facebook InterfaceIdentifying Social Capital in the Facebook Interface
Identifying Social Capital in the Facebook InterfaceFred Stutzman
 
Fred Stutzman Dissertation Defense
Fred Stutzman Dissertation DefenseFred Stutzman Dissertation Defense
Fred Stutzman Dissertation DefenseFred Stutzman
 
Networks presentation
Networks presentationNetworks presentation
Networks presentationFred Stutzman
 
Dissertation Proposal Defense
Dissertation Proposal DefenseDissertation Proposal Defense
Dissertation Proposal DefenseFred Stutzman
 
Friends Only: Examining a Privacy-Enhancing Behavior in Facebook
Friends Only: Examining a Privacy-Enhancing Behavior in FacebookFriends Only: Examining a Privacy-Enhancing Behavior in Facebook
Friends Only: Examining a Privacy-Enhancing Behavior in FacebookFred Stutzman
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network AnalysisFred Stutzman
 
What if we made weather more social?
What if we made weather more social?What if we made weather more social?
What if we made weather more social?Fred Stutzman
 

Más de Fred Stutzman (7)

Identifying Social Capital in the Facebook Interface
Identifying Social Capital in the Facebook InterfaceIdentifying Social Capital in the Facebook Interface
Identifying Social Capital in the Facebook Interface
 
Fred Stutzman Dissertation Defense
Fred Stutzman Dissertation DefenseFred Stutzman Dissertation Defense
Fred Stutzman Dissertation Defense
 
Networks presentation
Networks presentationNetworks presentation
Networks presentation
 
Dissertation Proposal Defense
Dissertation Proposal DefenseDissertation Proposal Defense
Dissertation Proposal Defense
 
Friends Only: Examining a Privacy-Enhancing Behavior in Facebook
Friends Only: Examining a Privacy-Enhancing Behavior in FacebookFriends Only: Examining a Privacy-Enhancing Behavior in Facebook
Friends Only: Examining a Privacy-Enhancing Behavior in Facebook
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
What if we made weather more social?
What if we made weather more social?What if we made weather more social?
What if we made weather more social?
 

Último

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Último (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Boundary Regulation in Social Media

  • 1. Boundary Regulation in Social Media
  • 3.
  • 4.
  • 5. Context Privacy Disclosure Fred Stutzman, fred.stutzman@unc.edu
  • 6. Managing Contexts • Friendster • “Burners, gay men and bloggers” • Myspace • Teens and mirror profiles (boyd, 2006 & 2007) http://www.flickr.com/photos/foxgrrl/3676857198/ Fred Stutzman, fred.stutzman@unc.edu
  • 7. Managing Contexts • Presence of multiple social groups • Behavioral Strategies • Mental Strategies • “Least Common http://bit.ly/yS8yI Denominator” (Lampinen et. al., 2009) Fred Stutzman, fred.stutzman@unc.edu
  • 8. Context Tension • Connections across status and power boundaries • Propriety, work/ family • Inadvertent disclosures leading to harms http://bit.ly/6HTDB (Skeels and Grudin, 2009) Fred Stutzman, fred.stutzman@unc.edu
  • 9. Conceptions of Privacy • Privacy as selective control (Altman, 1975) • Privacy as information practice (Dourish & Anderson, 2006) • Privacy as boundary management (Petronio, 2002) Fred Stutzman, fred.stutzman@unc.edu
  • 10. CPM • Communications Privacy Management • Rule Development • Boundary Coordination • Boundary Turbulence (Petronio, 2002) Fred Stutzman, fred.stutzman@unc.edu
  • 11.
  • 12.
  • 13. Study Goals • Why are motives for using multiple profiles? • What strategies to people employ in managing multiple profiles? • Is this an effective strategy? Fred Stutzman, fred.stutzman@unc.edu
  • 14. Method • Criteria: multiple profiles on one social media site • Twenty in-depth interviews, Summer 2009 • In-person/phone/Skype • Analyzed using grounded theory Fred Stutzman, fred.stutzman@unc.edu
  • 15. Respondents • Six in their 20’s, Seven in their 30’s, Six in their 40’s, and one was 57 • Twelve females, eight males • Respondents from US (NC, VA, GA, CA, FL) and UK Fred Stutzman, fred.stutzman@unc.edu
  • 16. Motives • Privacy • Identity • Utility • Propriety http://www.flickr.com/photos/gi/435888435/ Fred Stutzman, fred.stutzman@unc.edu
  • 17. Privacy • Control of access to the self; withdrawal from public domain • Safety • Confidentiality “I know some young kids who tweeted ‘I’m going to lunch at so and so’ and they came back to their apartment and they had been robbed...” Fred Stutzman, fred.stutzman@unc.edu
  • 18. Privacy • For many respondents, multiple profiles: • Functioned as shield, protecting identifiable information • Enabled content production Fred Stutzman, fred.stutzman@unc.edu
  • 19. Identity • Multiple profiles allowed for establishment of distinct identities (personal/professional) [Created second Facebook profile so] “I could be all about business” [On personal profile] “could be a place where I have opinions, where I express personal stuff.” Fred Stutzman, fred.stutzman@unc.edu
  • 20. Utility • Multiple profiles enable: • Accomplishment of promotional and collaborative goals • Catering to specific audiences at specific times • Not having to apologize for off-topic posts Fred Stutzman, fred.stutzman@unc.edu
  • 21. Utility • Segment volume of disclosure • Offer differing information streams (topic/interest) “If somebody on my personal Twitter says ‘oh gosh you are inundating me with too many updates,’ I will tell them that they can follow my public profile that I update substantially less” Fred Stutzman, fred.stutzman@unc.edu
  • 22. Propriety • Multiple profiles used to manage conformity to norms and customs • Befriending the boss or parent [On the personal profile] “when my boss pops up and Facebook tells me ‘we think you should be friends,’ I don’t say yes because she’s my boss.” Fred Stutzman, fred.stutzman@unc.edu
  • 23. Forms of Regulation • Multiple identities in a single space • Single account, highly segmented privacy controls • Segmentation by site • Different social media for different audiences Fred Stutzman, fred.stutzman@unc.edu
  • 24. Axes of Regulation • Regulation by linkage • Regulation by concealment http://www.flickr.com/photos/thosch66/270060125/ Fred Stutzman, fred.stutzman@unc.edu
  • 25. Linkages • Links to the identity "I have two different identities, I have a personal one. [and] one geared towards my professional stuff, there's not much personal information there. But, I do have a separate Flickr account, I have separate Twitter accounts, I have separate Myspace pages” Fred Stutzman, fred.stutzman@unc.edu
  • 26. Linkages • Regulation by linked interconnections “But I don’t try and hide the fact that I’m one or the other. You know in my [personal] bio, I say something about [my business twitter]. So its not like I’m trying to hide my two different identities.” Fred Stutzman, fred.stutzman@unc.edu
  • 27. Concealment • Three genres identified • Pseudonymity • Practical Obscurity • Obscure name variants, non- disclosure of identity • Transparent Separations Fred Stutzman, fred.stutzman@unc.edu
  • 28. Concealment Fred Stutzman, fred.stutzman@unc.edu
  • 29. Evaluation • Do these techniques provide privacy? “The thing going into it is I don’t put anything out there that I wouldn’t want everybody to know” “I have to be careful about - that I say something that's generic enough” “I’m very conscious of the fact I am basically speaking to an open mic” Fred Stutzman, fred.stutzman@unc.edu
  • 30. Evaluation • Is the process burdensome? • High burden: Number of accounts maintained, large number of contacts • High burden: Degree of linkage disassociation Fred Stutzman, fred.stutzman@unc.edu
  • 31. Evaluation • Technical strategies • Most participants reported “bleedover” • Segmenting by device • Segmenting by time and location Fred Stutzman, fred.stutzman@unc.edu
  • 32. Implications • Multiple profile maintenance consistent with the theoretical provisions of Altman and Petronio • Process reduces potential harms, and encourages disclosures • Represents a reaction to limitations inherent in sites Fred Stutzman, fred.stutzman@unc.edu
  • 33. Thank you! Fred Stutzman: fred.stutzman@unc.edu @fstutzman http://fredstutzman.com Woodrow Hartzog whartzog@email.unc.edu @hartzog http://ssrn.com/author=1107005 Fred Stutzman, fred.stutzman@unc.edu
  • 34. Axis of Linkages Fred Stutzman, fred.stutzman@unc.edu
  • 35. Pseudonymity Fred Stutzman, fred.stutzman@unc.edu
  • 36. Practical Obscurity Fred Stutzman, fred.stutzman@unc.edu
  • 37. Transparent Separations Fred Stutzman, fred.stutzman@unc.edu