SlideShare a Scribd company logo
1 of 3
11.08.10 Thesis Proposal
Laura Janet Rodriguez
Researchable Question
How could a cognitive artifact1
for reflective cognition 2
be integrated into the profile management
process 3
of 18-24 4
year old participants of social networking sites?
Sub Questions
How could a cognitive artifact...
...encourage a synergistic relationship 5
with participants?
...reveal a participant’s pattern of online behavior that puts them at risk?
...communicate the permanence of online information?
...expose the susceptibility of the future self?
Areas of Investigation
1
Cognitive Artifact: According to Donald Norman, an expert of cognitive science, cognitive artifacts are “those artificial devices that maintain,
display, or operate upon information in order to serve a representational function and that affect human cognitive performance.”
2
Reflective Cognition: According to Donald Norman, “the reflective mode is that of comparison and contrast, of thought, of decision making.”
3
Profile Management Process: The input of information within the boundaries of one’s personal profile page—via text or photo—that can be viewed
by approved outsiders.
4
18-24: There is empirical evidence that the 15-24 year old age group have similar perspectives on online privacy and similar online behaviors within
the realm of social networking. I narrowed down the age group further to 18-24 in an effort to exploit the affordances of participants that are not
under parental supervision.
5
Synergistic Relationship: The interaction of two or more agents or forces so that their combined effect is greater than the sum of their individual effects.
social networking
18-24 year olds
participants
cognitive artifact
cognitive artifact
reflective cogntion
synergistic relationship online
patterns
permanence
of online info
susceptibility
of future self
11.08.10 Thesis Assumptions, Justification, & Limitations
Laura Janet Rodriguez
Assumptions
	 While there are many different kinds of social networking services, this thesis will focus on personal networks,
like Facebook, Friendster and MySpace. These social networking services are designed to give viewers a sense of the
participant’s true self, making their virtual identities similar to who they are in the real world. Most of the people in these
networks are not hiding behind facades, since socially connecting with existing friendships is the main objective. Paul
DiMaggio, et al writes in “Social Implications Of The Internet”, that “Online communities come in very different shapes
and sizes, ranging from virtual communities that connect geographically distant people with no prior acquaintance who
share similar interests, to settings that facilitate interactions among friendship networks or family members, to community
networks that focus on issues relevant to a geographically defined neighborhood. Research on “online community” should
distinguish among these forms, lest results appear contradictory and confusing“ (DiMaggio).
	 Personal networks allow participants to create detailed online profiles and connect with other participants, with an
emphasis on social relationships. They often involve the sharing of information with other approved participants, such as
gender, age, interests, educational background and employment. These platforms may also share selected information with
individuals and applications that are not authorized contacts (Fact Sheet 35).
Justification
	 The legalities on information privacy are currently fuzzy, so it is difficult to determine where the government is
allowed to intervene. Our new ‘age of information’ is proliferating the exchange of private data without concise regulations
on how collected information can be used. Participants of personal networks need to be cautious whenever inputting
information, but caution and safety seem to dissipate within the framework of personal networks due to skewed perceptions
on what is safe and trustworthy. Many participants of online social networks do not know the terms of use of the interface
they interact and contribute to on a daily basis and they have no idea what role third party applications play or who truly has
access to their information.
	 The use of social networking sites is growing in popularity, and participants are not always aware of the lack of
privacy in even a semi-public online environment. Although the 18-24 year old group only makes up 9% of social networking
participants in the United States (Google Ad Planner: United States demographics data), they are proven to consistently
post more information at a higher percentage than any other age group (Williams, Kaven, 2009). The amount of information
participants post in their profiles could present risks to their privacy and safety; including identity theft, phishing scams,
cyber harassment, cyber stalking, and cyber bullying. There should also be concern over the 18-24 age group because they
soon will be entering the workforce with habits formed from long term risky behaviors online that could impact the security
policy of their future workplace.
Limitations
	 Although there are many touchpoints where information privacy is at risk within the realm of online social
networking, this study will focus solely on the profile management process where participants are confronted with specific
motivations and prompts for sharing information. Although people aged 35-44 are the majority of social networking
participants (Google Ad Planner: United States demographics data), older users are more concerned with information
privacy than younger internet users ( I. Brown T. Zukowski, 2007). The 18-24 year old demographic, as whole, have similar
online behaviors and attitudes toward privacy that place them at risk and will guide my design investigation’s purpose and
outcome.
Literature Review
 started reading
reflection
participants
18-24 years
cognitive artifact
social networking
Protect Your Digital Privacy:
Survival Skills for the Information Age
Glee Harrah & Cady McGregor
 Things That Make Us Smart
Donald Norman
Grown Up Digital
Don Tapscott
Imagination and play
in the electronic age
Singer, Dorothy G.
Privacy Nudges
Lorrie Faith Cranor, director of the Carnegie Mellon Usable
Privacy and Security Laboratory at Carnegie Mellon University
Visceral Nudges
Ryan Calo, fellow at the Center for Internet and Society at
Stanford Law School
 Cyberpsychology
Kent L. Norman
 Privacy as a Behavioral Phenomenon
Journal of Science Issues
 World Without Secrets
Richard Hunter
Designing Interaction: Psychology at
the Human-Computer Interface
John M. Carroll
The second self : computers
and the human spirit
Sherry Turkle
The Cognitive Artifacts of Designing
Willemien Visser
Relevant
Projects
11.08.10 Thesis References
Laura Janet Rodriguez

More Related Content

What's hot

Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Anil Dhami
 
Network Theory: A Brief Introduction june 2012
Network Theory: A Brief Introduction june 2012Network Theory: A Brief Introduction june 2012
Network Theory: A Brief Introduction june 2012Michael Netzley, Ph.D.
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineBrenden Brown
 
Chapter 2
Chapter 2Chapter 2
Chapter 2jfurey
 
Summary of my Doctoral Research, Interests
Summary of my Doctoral Research, InterestsSummary of my Doctoral Research, Interests
Summary of my Doctoral Research, InterestsMeena Nagarajan
 
Network Theory
Network TheoryNetwork Theory
Network TheorySon Maroon
 
Preproc 03
Preproc 03Preproc 03
Preproc 03naeyam
 
Suazo, martínez & elgueta english version
Suazo, martínez & elgueta english versionSuazo, martínez & elgueta english version
Suazo, martínez & elgueta english version2011990
 
Online persuasion and compliance
Online persuasion and complianceOnline persuasion and compliance
Online persuasion and complianceKrishna De
 
Social surveillance aoife shona
Social surveillance aoife shonaSocial surveillance aoife shona
Social surveillance aoife shonaAoife Brown
 
Social Network Structures in Online Communities
Social Network Structures in Online CommunitiesSocial Network Structures in Online Communities
Social Network Structures in Online CommunitiesSreyoshi Dey
 
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Connie White
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementConnie White
 
Netnography in online dating services
Netnography in online dating servicesNetnography in online dating services
Netnography in online dating servicesDanish Ilyas
 
New Media Activism Presentation
New Media Activism Presentation New Media Activism Presentation
New Media Activism Presentation NewMediaActivism
 

What's hot (20)

Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
 
Network Theory: A Brief Introduction june 2012
Network Theory: A Brief Introduction june 2012Network Theory: A Brief Introduction june 2012
Network Theory: A Brief Introduction june 2012
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Summary of my Doctoral Research, Interests
Summary of my Doctoral Research, InterestsSummary of my Doctoral Research, Interests
Summary of my Doctoral Research, Interests
 
Network Theory
Network TheoryNetwork Theory
Network Theory
 
Preproc 03
Preproc 03Preproc 03
Preproc 03
 
Suazo, martínez & elgueta english version
Suazo, martínez & elgueta english versionSuazo, martínez & elgueta english version
Suazo, martínez & elgueta english version
 
Online persuasion and compliance
Online persuasion and complianceOnline persuasion and compliance
Online persuasion and compliance
 
Social surveillance aoife shona
Social surveillance aoife shonaSocial surveillance aoife shona
Social surveillance aoife shona
 
Social Network Theory
Social Network Theory Social Network Theory
Social Network Theory
 
critere de peerce
critere de peercecritere de peerce
critere de peerce
 
Social Network Structures in Online Communities
Social Network Structures in Online CommunitiesSocial Network Structures in Online Communities
Social Network Structures in Online Communities
 
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
 
Netnography in online dating services
Netnography in online dating servicesNetnography in online dating services
Netnography in online dating services
 
Conference Report Final 11.18
Conference Report Final 11.18Conference Report Final 11.18
Conference Report Final 11.18
 
New Media Activism Presentation
New Media Activism Presentation New Media Activism Presentation
New Media Activism Presentation
 

Similar to Thesis proposal v3

Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxtodd521
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
 
The International Encyclopedia of Digital Communication and Society - 2014 - ...
The International Encyclopedia of Digital Communication and Society - 2014 - ...The International Encyclopedia of Digital Communication and Society - 2014 - ...
The International Encyclopedia of Digital Communication and Society - 2014 - ...WindaDwiAstutiZebua
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social mediakmtj1979
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social MediaPhysiopedia
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a baneAbhishek Sharma
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyRay Brannon
 
The Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its AnalysisThe Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its AnalysisIJMER
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrains2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrainsDustianne North
 
assignment1_PatrickRiley.docx
assignment1_PatrickRiley.docxassignment1_PatrickRiley.docx
assignment1_PatrickRiley.docxPatRiley16
 
Social media and Missing workshop
Social media and Missing workshopSocial media and Missing workshop
Social media and Missing workshopRay Brannon
 
FSU FAME Conference Presentation Slides
FSU FAME Conference Presentation SlidesFSU FAME Conference Presentation Slides
FSU FAME Conference Presentation SlidesFSUlibIT
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerHubert Moik
 
Privacy study Mobile and online Dating
Privacy study Mobile and online DatingPrivacy study Mobile and online Dating
Privacy study Mobile and online DatingMobiDigger
 
Social networking .ppt
Social networking .pptSocial networking .ppt
Social networking .pptPRANJAL SAIKIA
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftHeather Dionne
 
A Survey on the Social Impacts of On-line Social Networking Sites
A Survey on the Social Impacts of On-line Social Networking SitesA Survey on the Social Impacts of On-line Social Networking Sites
A Survey on the Social Impacts of On-line Social Networking SitesIOSR Journals
 

Similar to Thesis proposal v3 (20)

Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
The International Encyclopedia of Digital Communication and Society - 2014 - ...
The International Encyclopedia of Digital Communication and Society - 2014 - ...The International Encyclopedia of Digital Communication and Society - 2014 - ...
The International Encyclopedia of Digital Communication and Society - 2014 - ...
 
Ethics and social media
Ethics and social mediaEthics and social media
Ethics and social media
 
204
204204
204
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social Media
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 
PDFPortfolioAmyHendrickson
PDFPortfolioAmyHendricksonPDFPortfolioAmyHendrickson
PDFPortfolioAmyHendrickson
 
Hum 140: Social Media: Privacy
Hum 140: Social Media: PrivacyHum 140: Social Media: Privacy
Hum 140: Social Media: Privacy
 
The Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its AnalysisThe Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its Analysis
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrains2012 pip futureof internetyoungbrains
2012 pip futureof internetyoungbrains
 
assignment1_PatrickRiley.docx
assignment1_PatrickRiley.docxassignment1_PatrickRiley.docx
assignment1_PatrickRiley.docx
 
Social media and Missing workshop
Social media and Missing workshopSocial media and Missing workshop
Social media and Missing workshop
 
FSU FAME Conference Presentation Slides
FSU FAME Conference Presentation SlidesFSU FAME Conference Presentation Slides
FSU FAME Conference Presentation Slides
 
Mobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by MobidiggerMobile Privacy and Security - Study by Mobidigger
Mobile Privacy and Security - Study by Mobidigger
 
Privacy study Mobile and online Dating
Privacy study Mobile and online DatingPrivacy study Mobile and online Dating
Privacy study Mobile and online Dating
 
Social networking .ppt
Social networking .pptSocial networking .ppt
Social networking .ppt
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
 
A Survey on the Social Impacts of On-line Social Networking Sites
A Survey on the Social Impacts of On-line Social Networking SitesA Survey on the Social Impacts of On-line Social Networking Sites
A Survey on the Social Impacts of On-line Social Networking Sites
 

Recently uploaded

ab-initio-training basics and architecture
ab-initio-training basics and architectureab-initio-training basics and architecture
ab-initio-training basics and architecturesaipriyacoool
 
Top profile Call Girls In Mysore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Mysore [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Mysore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Mysore [ 7014168258 ] Call Me For Genuine Models We...gajnagarg
 
Gamestore case study UI UX by Amgad Ibrahim
Gamestore case study UI UX by Amgad IbrahimGamestore case study UI UX by Amgad Ibrahim
Gamestore case study UI UX by Amgad Ibrahimamgadibrahim92
 
TRose UXPA Experience Design Concord .pptx
TRose UXPA Experience Design Concord .pptxTRose UXPA Experience Design Concord .pptx
TRose UXPA Experience Design Concord .pptxtrose8
 
Top profile Call Girls In Meerut [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Meerut [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Meerut [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Meerut [ 7014168258 ] Call Me For Genuine Models We...gajnagarg
 
Abortion pills in Kuwait 🚚+966505195917 but home delivery available in Kuwait...
Abortion pills in Kuwait 🚚+966505195917 but home delivery available in Kuwait...Abortion pills in Kuwait 🚚+966505195917 but home delivery available in Kuwait...
Abortion pills in Kuwait 🚚+966505195917 but home delivery available in Kuwait...drmarathore
 
Raebareli Girl Whatsapp Number 📞 8617370543 | Girls Number for Friendship
Raebareli Girl Whatsapp Number 📞 8617370543 | Girls Number for FriendshipRaebareli Girl Whatsapp Number 📞 8617370543 | Girls Number for Friendship
Raebareli Girl Whatsapp Number 📞 8617370543 | Girls Number for FriendshipNitya salvi
 
一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样
一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样
一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样awasv46j
 
Abortion pill for sale in Muscat (+918761049707)) Get Cytotec Cash on deliver...
Abortion pill for sale in Muscat (+918761049707)) Get Cytotec Cash on deliver...Abortion pill for sale in Muscat (+918761049707)) Get Cytotec Cash on deliver...
Abortion pill for sale in Muscat (+918761049707)) Get Cytotec Cash on deliver...instagramfab782445
 
Call Girls Jalaun Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Jalaun Just Call 8617370543 Top Class Call Girl Service AvailableCall Girls Jalaun Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Jalaun Just Call 8617370543 Top Class Call Girl Service AvailableNitya salvi
 
LANDSCAPE ARCHITECTURE PORTFOLIO - MAREK MITACEK
LANDSCAPE ARCHITECTURE PORTFOLIO - MAREK MITACEKLANDSCAPE ARCHITECTURE PORTFOLIO - MAREK MITACEK
LANDSCAPE ARCHITECTURE PORTFOLIO - MAREK MITACEKMarekMitek1
 
Eye-Catching Web Design Crafting User Interfaces .docx
Eye-Catching Web Design Crafting User Interfaces .docxEye-Catching Web Design Crafting User Interfaces .docx
Eye-Catching Web Design Crafting User Interfaces .docxMdBokhtiyarHossainNi
 
Jual Obat Aborsi Bandung ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan ...
Jual Obat Aborsi Bandung ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan ...Jual Obat Aborsi Bandung ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan ...
Jual Obat Aborsi Bandung ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan ...ZurliaSoop
 
Abortion pills in Riyadh +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Riyadh +966572737505 <> buy cytotec <> unwanted kit Saudi A...Abortion pills in Riyadh +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Riyadh +966572737505 <> buy cytotec <> unwanted kit Saudi A...samsungultra782445
 
Just Call Vip call girls Fatehpur Escorts ☎️8617370543 Two shot with one girl...
Just Call Vip call girls Fatehpur Escorts ☎️8617370543 Two shot with one girl...Just Call Vip call girls Fatehpur Escorts ☎️8617370543 Two shot with one girl...
Just Call Vip call girls Fatehpur Escorts ☎️8617370543 Two shot with one girl...Nitya salvi
 
怎样办理伦敦国王学院毕业证(KCL毕业证书)成绩单留信认证
怎样办理伦敦国王学院毕业证(KCL毕业证书)成绩单留信认证怎样办理伦敦国王学院毕业证(KCL毕业证书)成绩单留信认证
怎样办理伦敦国王学院毕业证(KCL毕业证书)成绩单留信认证eeanqy
 
一比一定(购)西悉尼大学毕业证(WSU毕业证)成绩单学位证
一比一定(购)西悉尼大学毕业证(WSU毕业证)成绩单学位证一比一定(购)西悉尼大学毕业证(WSU毕业证)成绩单学位证
一比一定(购)西悉尼大学毕业证(WSU毕业证)成绩单学位证eqaqen
 
Design-System - FinTech - Isadora Agency
Design-System - FinTech - Isadora AgencyDesign-System - FinTech - Isadora Agency
Design-System - FinTech - Isadora AgencyIsadora Agency
 
怎样办理莫纳什大学毕业证(Monash毕业证书)成绩单留信认证
怎样办理莫纳什大学毕业证(Monash毕业证书)成绩单留信认证怎样办理莫纳什大学毕业证(Monash毕业证书)成绩单留信认证
怎样办理莫纳什大学毕业证(Monash毕业证书)成绩单留信认证ehyxf
 
Madhyamgram \ (Genuine) Escort Service Kolkata | Service-oriented sexy call g...
Madhyamgram \ (Genuine) Escort Service Kolkata | Service-oriented sexy call g...Madhyamgram \ (Genuine) Escort Service Kolkata | Service-oriented sexy call g...
Madhyamgram \ (Genuine) Escort Service Kolkata | Service-oriented sexy call g...HyderabadDolls
 

Recently uploaded (20)

ab-initio-training basics and architecture
ab-initio-training basics and architectureab-initio-training basics and architecture
ab-initio-training basics and architecture
 
Top profile Call Girls In Mysore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Mysore [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Mysore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Mysore [ 7014168258 ] Call Me For Genuine Models We...
 
Gamestore case study UI UX by Amgad Ibrahim
Gamestore case study UI UX by Amgad IbrahimGamestore case study UI UX by Amgad Ibrahim
Gamestore case study UI UX by Amgad Ibrahim
 
TRose UXPA Experience Design Concord .pptx
TRose UXPA Experience Design Concord .pptxTRose UXPA Experience Design Concord .pptx
TRose UXPA Experience Design Concord .pptx
 
Top profile Call Girls In Meerut [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Meerut [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Meerut [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Meerut [ 7014168258 ] Call Me For Genuine Models We...
 
Abortion pills in Kuwait 🚚+966505195917 but home delivery available in Kuwait...
Abortion pills in Kuwait 🚚+966505195917 but home delivery available in Kuwait...Abortion pills in Kuwait 🚚+966505195917 but home delivery available in Kuwait...
Abortion pills in Kuwait 🚚+966505195917 but home delivery available in Kuwait...
 
Raebareli Girl Whatsapp Number 📞 8617370543 | Girls Number for Friendship
Raebareli Girl Whatsapp Number 📞 8617370543 | Girls Number for FriendshipRaebareli Girl Whatsapp Number 📞 8617370543 | Girls Number for Friendship
Raebareli Girl Whatsapp Number 📞 8617370543 | Girls Number for Friendship
 
一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样
一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样
一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样
 
Abortion pill for sale in Muscat (+918761049707)) Get Cytotec Cash on deliver...
Abortion pill for sale in Muscat (+918761049707)) Get Cytotec Cash on deliver...Abortion pill for sale in Muscat (+918761049707)) Get Cytotec Cash on deliver...
Abortion pill for sale in Muscat (+918761049707)) Get Cytotec Cash on deliver...
 
Call Girls Jalaun Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Jalaun Just Call 8617370543 Top Class Call Girl Service AvailableCall Girls Jalaun Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Jalaun Just Call 8617370543 Top Class Call Girl Service Available
 
LANDSCAPE ARCHITECTURE PORTFOLIO - MAREK MITACEK
LANDSCAPE ARCHITECTURE PORTFOLIO - MAREK MITACEKLANDSCAPE ARCHITECTURE PORTFOLIO - MAREK MITACEK
LANDSCAPE ARCHITECTURE PORTFOLIO - MAREK MITACEK
 
Eye-Catching Web Design Crafting User Interfaces .docx
Eye-Catching Web Design Crafting User Interfaces .docxEye-Catching Web Design Crafting User Interfaces .docx
Eye-Catching Web Design Crafting User Interfaces .docx
 
Jual Obat Aborsi Bandung ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan ...
Jual Obat Aborsi Bandung ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan ...Jual Obat Aborsi Bandung ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan ...
Jual Obat Aborsi Bandung ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan ...
 
Abortion pills in Riyadh +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Riyadh +966572737505 <> buy cytotec <> unwanted kit Saudi A...Abortion pills in Riyadh +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Riyadh +966572737505 <> buy cytotec <> unwanted kit Saudi A...
 
Just Call Vip call girls Fatehpur Escorts ☎️8617370543 Two shot with one girl...
Just Call Vip call girls Fatehpur Escorts ☎️8617370543 Two shot with one girl...Just Call Vip call girls Fatehpur Escorts ☎️8617370543 Two shot with one girl...
Just Call Vip call girls Fatehpur Escorts ☎️8617370543 Two shot with one girl...
 
怎样办理伦敦国王学院毕业证(KCL毕业证书)成绩单留信认证
怎样办理伦敦国王学院毕业证(KCL毕业证书)成绩单留信认证怎样办理伦敦国王学院毕业证(KCL毕业证书)成绩单留信认证
怎样办理伦敦国王学院毕业证(KCL毕业证书)成绩单留信认证
 
一比一定(购)西悉尼大学毕业证(WSU毕业证)成绩单学位证
一比一定(购)西悉尼大学毕业证(WSU毕业证)成绩单学位证一比一定(购)西悉尼大学毕业证(WSU毕业证)成绩单学位证
一比一定(购)西悉尼大学毕业证(WSU毕业证)成绩单学位证
 
Design-System - FinTech - Isadora Agency
Design-System - FinTech - Isadora AgencyDesign-System - FinTech - Isadora Agency
Design-System - FinTech - Isadora Agency
 
怎样办理莫纳什大学毕业证(Monash毕业证书)成绩单留信认证
怎样办理莫纳什大学毕业证(Monash毕业证书)成绩单留信认证怎样办理莫纳什大学毕业证(Monash毕业证书)成绩单留信认证
怎样办理莫纳什大学毕业证(Monash毕业证书)成绩单留信认证
 
Madhyamgram \ (Genuine) Escort Service Kolkata | Service-oriented sexy call g...
Madhyamgram \ (Genuine) Escort Service Kolkata | Service-oriented sexy call g...Madhyamgram \ (Genuine) Escort Service Kolkata | Service-oriented sexy call g...
Madhyamgram \ (Genuine) Escort Service Kolkata | Service-oriented sexy call g...
 

Thesis proposal v3

  • 1. 11.08.10 Thesis Proposal Laura Janet Rodriguez Researchable Question How could a cognitive artifact1 for reflective cognition 2 be integrated into the profile management process 3 of 18-24 4 year old participants of social networking sites? Sub Questions How could a cognitive artifact... ...encourage a synergistic relationship 5 with participants? ...reveal a participant’s pattern of online behavior that puts them at risk? ...communicate the permanence of online information? ...expose the susceptibility of the future self? Areas of Investigation 1 Cognitive Artifact: According to Donald Norman, an expert of cognitive science, cognitive artifacts are “those artificial devices that maintain, display, or operate upon information in order to serve a representational function and that affect human cognitive performance.” 2 Reflective Cognition: According to Donald Norman, “the reflective mode is that of comparison and contrast, of thought, of decision making.” 3 Profile Management Process: The input of information within the boundaries of one’s personal profile page—via text or photo—that can be viewed by approved outsiders. 4 18-24: There is empirical evidence that the 15-24 year old age group have similar perspectives on online privacy and similar online behaviors within the realm of social networking. I narrowed down the age group further to 18-24 in an effort to exploit the affordances of participants that are not under parental supervision. 5 Synergistic Relationship: The interaction of two or more agents or forces so that their combined effect is greater than the sum of their individual effects. social networking 18-24 year olds participants cognitive artifact cognitive artifact reflective cogntion synergistic relationship online patterns permanence of online info susceptibility of future self
  • 2. 11.08.10 Thesis Assumptions, Justification, & Limitations Laura Janet Rodriguez Assumptions While there are many different kinds of social networking services, this thesis will focus on personal networks, like Facebook, Friendster and MySpace. These social networking services are designed to give viewers a sense of the participant’s true self, making their virtual identities similar to who they are in the real world. Most of the people in these networks are not hiding behind facades, since socially connecting with existing friendships is the main objective. Paul DiMaggio, et al writes in “Social Implications Of The Internet”, that “Online communities come in very different shapes and sizes, ranging from virtual communities that connect geographically distant people with no prior acquaintance who share similar interests, to settings that facilitate interactions among friendship networks or family members, to community networks that focus on issues relevant to a geographically defined neighborhood. Research on “online community” should distinguish among these forms, lest results appear contradictory and confusing“ (DiMaggio). Personal networks allow participants to create detailed online profiles and connect with other participants, with an emphasis on social relationships. They often involve the sharing of information with other approved participants, such as gender, age, interests, educational background and employment. These platforms may also share selected information with individuals and applications that are not authorized contacts (Fact Sheet 35). Justification The legalities on information privacy are currently fuzzy, so it is difficult to determine where the government is allowed to intervene. Our new ‘age of information’ is proliferating the exchange of private data without concise regulations on how collected information can be used. Participants of personal networks need to be cautious whenever inputting information, but caution and safety seem to dissipate within the framework of personal networks due to skewed perceptions on what is safe and trustworthy. Many participants of online social networks do not know the terms of use of the interface they interact and contribute to on a daily basis and they have no idea what role third party applications play or who truly has access to their information. The use of social networking sites is growing in popularity, and participants are not always aware of the lack of privacy in even a semi-public online environment. Although the 18-24 year old group only makes up 9% of social networking participants in the United States (Google Ad Planner: United States demographics data), they are proven to consistently post more information at a higher percentage than any other age group (Williams, Kaven, 2009). The amount of information participants post in their profiles could present risks to their privacy and safety; including identity theft, phishing scams, cyber harassment, cyber stalking, and cyber bullying. There should also be concern over the 18-24 age group because they soon will be entering the workforce with habits formed from long term risky behaviors online that could impact the security policy of their future workplace. Limitations Although there are many touchpoints where information privacy is at risk within the realm of online social networking, this study will focus solely on the profile management process where participants are confronted with specific motivations and prompts for sharing information. Although people aged 35-44 are the majority of social networking participants (Google Ad Planner: United States demographics data), older users are more concerned with information privacy than younger internet users ( I. Brown T. Zukowski, 2007). The 18-24 year old demographic, as whole, have similar online behaviors and attitudes toward privacy that place them at risk and will guide my design investigation’s purpose and outcome.
  • 3. Literature Review  started reading reflection participants 18-24 years cognitive artifact social networking Protect Your Digital Privacy: Survival Skills for the Information Age Glee Harrah & Cady McGregor  Things That Make Us Smart Donald Norman Grown Up Digital Don Tapscott Imagination and play in the electronic age Singer, Dorothy G. Privacy Nudges Lorrie Faith Cranor, director of the Carnegie Mellon Usable Privacy and Security Laboratory at Carnegie Mellon University Visceral Nudges Ryan Calo, fellow at the Center for Internet and Society at Stanford Law School  Cyberpsychology Kent L. Norman  Privacy as a Behavioral Phenomenon Journal of Science Issues  World Without Secrets Richard Hunter Designing Interaction: Psychology at the Human-Computer Interface John M. Carroll The second self : computers and the human spirit Sherry Turkle The Cognitive Artifacts of Designing Willemien Visser Relevant Projects 11.08.10 Thesis References Laura Janet Rodriguez