SlideShare una empresa de Scribd logo
1 de 40
Descargar para leer sin conexión
Privacy and Self Presentation
in the Digital Age
Joan Vinall-Cox, Ph.D.
Who Are You?
• The Presentation of Self in Everyday Life
– sociologist Erving Goffman
• social rituals involved in self-presentation
• = “impression management”
• Different in the digital environment
• The meaning of avatars
Presenting Your Image
• “Impression management online and off is not
just an individual act; it’s a social process.”
– danahboyd - It’s Complicated
• http://www.createdimage.com.au/blog/index.phpm=05&y=11&entry=entry110525-160007
Audience?
Message?
Social Norm?
“Social media has introduced a new dimension
to the well-worn fights over private space and
personal expression.” – danahboyd
http://en.wikipedia.org/wiki/Paparazzi
Cultural Changes
• We feel entitled to know other’s business
• “civil inattention” – politely ignoring
embarrassing moments or information – no
longer in vogue
• Scandals get attention in information-
saturated world
• Celebrity gossip more and more popular
Civil Inattention – Not Looking
even though you can see!
Saving yourself and others from embarrassment
Civil Inattention Needed,
(as well as context awareness)
A metaphor for social media “drama”
Paparazzi and Celebrity Gossip
Have Increased Greatly in Our Culture
Do Media Portrayals of Out-of-Control
Behavior Affect Social Media Bullying?
Is the Cause Cultural or Technical?
In the Social Media Age
• “Four affordances, in particular, shape many of
the mediated environments that are created by
social media
– persistence
• *It doesn’t disappear+
– visibility
• [For anyone with a computer and URL]
– Spreadability
• [Extremely easy to forward / share]
– searchability”
• [Just google it!]
– danahboyd – It’s Complicated
We are Living in the Panopticon
• http://en.wikipedia.org/wiki/Panopticon
The Concept of Privacy is Changing
in the Digital Age
danahboyd:
• “Privacy … is a process by which people seek
to have control over a social situation by
managing
– impressions,
– information flows, and
– context.”
• “Privacy is valuable because it is critical for
personal development.”
Who Are You, Really?
• If you are always “managing impressions” of
yourself because you are always watched, if
you have no privacy, you can’t find out who
you truly are.
• http://en.wikipedia.org/wiki/Mask
When You Know Who / Where You Are
You Know How to Behave
• “Based on their understanding of the social
situation—including the context and the
audience—people make decisions about what to
share in order to act appropriately for the
situation and to be perceived in the best light.”
• But when you don’t know the context …
• “Contexts don’t just collapse accidentally; they
collapse because individuals have a different
sense of where the boundaries exist and how
their decisions affect others.”
– danahboyd – It’s Complicated
It FEELS Private and Safe to Reveal
Yourself or Attack Anonymously But …
Context Collapse
• Context collapse is our new reality
• "...Social media technologies
collapse multiple audiences
into single contexts,
making it difficult for people to use the same
techniques online that they do to handle
multiplicity in face-to-face conversation...”
– (Marwick & Boyd, 2011)
Excerpt:
http://hlwiki.slais.ubc.ca/index.php/Context_collapse_in_social_media
• According to [Michael] Wesch, in face-to-face
communication
• we assess the context of our interactions
• in order to decide
– how we will act,
– what we will say, and
– how we will construct (and present) ourselves.
Excerpt:
http://hlwiki.slais.ubc.ca/index.php/Context_collapse_in_social_media
As [Erving] Goffmansays,
• we continuously, unconsciously take note of our
surroundings,
• those present, and
• the overall tone and temperature of the scene
– to move through it.
• As social beings, we have become adept at
• sussingout and performing micro-calculations
• in the micro-second gaps of conversation
• in order to move through those situations.
When engaged in social interactions, we evaluate situations
and people as well as ourselves and how we fit into them
Excerpt:
http://hlwiki.slais.ubc.ca/index.php/Context_collapse_in_social_media
In social media,
• face work does not have the same currency or
value
• because we don't see the expressions of those
with whom we are communicating.
• Further, there is context collapse, or
homogenization of context,
• because all of the micro-calculations we used to
make by evaluating a situation are gone,
• removed and collapsed in social media.
Government and Businesses:
Attitudes Toward Privacy
• Privacy is pretty well non-existent in the wired
world
• Governments access ‘private’ communications
– American NSA, Canadian CSIS
– Edward Snowden -
http://en.wikipedia.org/wiki/Edward_Snowden
Our Vulnerable Computers
• Not just government agencies can invade our
privacy
• Agencies and hackers can invade our
computers and phones to learn our secrets
• Online businesses can delete what we bought
and paid for
• Business that we trust with our financial
information might not encrypt it securely
enough to prevent hacking
Your Stuff
• Cookies – your computer history doesn’t
disappear
• Most cloud email and storage is on servers in
the U.S. – Canadian gov’t trying to change that
for gov’t materials
– http://www.thestar.com/business/2014/03/07/ti
me_for_consumers_to_think_local_for_cloud_co
mputing_geist.html
Digital Rights Management
://www.theguardian.com/technology/2013/sep/05/how-internet-encryption-
works
Encryption and Your Data
http://www.theguardian.com/technology/2013/sep/05/how-internet-
encryption-works
Commercial Hacking
http://www.businessweek.com/articles/2014-03-13/target-missed-alarms-in-
epic-hack-of-credit-card-data
Our Privacy and Identities –
VERY Limited
• http://www.abine.com/blog/2013/9-easy-ways-to-beat-identity-
thieves/
• Pay close attention to your bank account.
• Ultra-personalize your credit card.
• Lock down your privacy settings on social
networks.
• Remove your information from data mining
websites that publicly post and sell it.
• Etc. … and not so easy
The New Public Square &Panopticon
You are Being Watched!
• In our digital culture, we now have audiences
– Mostly unknown by us
– Invisible to us
– From many different places and cultures
– From future times; (our information doesn’t
disappear)
• We are trying to learn how to behave in our
panoptic world
Growing Awareness
Sophisticated Tactics
• Different personas for different
sites/media, for example, Tumblr
• Controlling who gets to see what posts on
Facebook, using their tools
• Making Instagram private, and only allowing
people you actually know to follow
• On LinkedIn, networking with posts and
endorsements
• Understanding Twitter, especially Lists
Are You the Same Person on
All Your Social Media Sites?
• “*She (or he)+ represent[s] herself in different
ways on different sites with the expectation of
different audiences and different norms” –
danahboydIt’s Complicated
http://commons.wikimedia.org/wiki/File:Jack_Lemmon_-_1968.jpg
http://www.flickr.com/photos/andys93integra/6114180062/
Serious Journalist; Flippant Twitterer
Andrew Coyne, National Post, CBC
The Dark Entrepreneurial Side -
Retweeted by @socialnerdia
Social Media is Increasingly Being
‘Managed’
Designing for Attention
http://www.zephoria.org/thoughts/archives/2014/03/21/snapchat-
attention.html
• Developers are working to design apps that
make use of our current digital habits
• To combat multitasking, lack of attention, and
spreadability,
• Snapchat demands attention by the time limit
• And provides some privacy
The Printing Press Changed the World
• The internet and web are just beginning
• Profound impacts already on
– Communication – email, Skype, social media
– Politics – political messages, fund raising
– Relationships – Facebook, dating
– Education – Classroom content, MOOCs
– Publishing – decline of newspapers, rise of
ebooks, blogs
• Etcetera ad infinitum
Highly Recommended
http://www.openculture.com/2014/03/download-a-free-copy-of-danah-boyds-book-
its-complicated-the-social-lives-of-networked-teens.html
Works Cited
Images from Google Images /Search tools / Usage rights / Labeled for noncommercial reuse
9 easy ways to beat identity thieves. (n.d.). Online Privacy Abine RSS. Retrieved March 27, 2014, from
http://www.abine.com/blog/2013/9-easy-ways-to-beat-identity-thieves/
Arthur, C. (2013, September 6). How internet encryption works. The Guardian. Retrieved March 27, 2014, from
http://www.theguardian.com/technology/2013/sep/05/how-internet-encryption-works
boyd, d. (2014). It's complicated: the social lives of networked teens. Boston: Yale University Press.
danahboyd | apophenia. (n.d.). danahboydapophenia RSS. Retrieved March 27, 2014, from
http://www.zephoria.org/thoughts/archives/2014/03/21/snapchat-attention.html
Contreras, E. [@socialnerdia] (2014, March 26). $3,000 "social media wedding concierge" will come up with a #hashtag for you.
please stop. pic.twitter.com/EttzK0L8Vk [Retweet of Bosker, B. (@bbosker)] Retrieved from
https://twitter.com/bbosker/status/448468488898637824
Context collapse in social media. (n.d.). HLWIKI Canada. Retrieved March 27, 2014, from
http://hlwiki.slais.ubc.ca/index.php/Context_
Coyne, A. [@acoyne] (2014a, March 26). Ukraine had planned "to train the dolphins to attack enemy swimmers with knives or
pistols fixed to their heads." http://www.nationaljournal.com/defense/russia-has-taken-ukraine-s-fleet-of-dolphins-
20140326 … [Tweet]. Retrieved from https://twitter.com/acoyne/status/448874825759461376
Coyne, A. [@acoyne] (2014b, March 26). "Enemy swimmers?" [Tweet]. Retrieved from
https://twitter.com/acoyne/status/448874884072878080
Geist, M. (n.d.). Time for consumers to think local for cloud computing: Geist. thestar.com. Retrieved March 27, 2014, from
http://www.thestar.com/business/2014/03/
Goffman, E. (1959). The presentation of self in everyday life. Garden City, N.Y.: Doubleday.
Marwick, A. E., & Boyd, D. (2011). I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined
audience. New Media & Society, 13(1), 114–133. doi:10.1177/1461444810365313
Riley, M., Elgin, B., Lawrence, D., &Matlack, C. (2014, March 13). Missed Alarms and 40 Million Stolen Credit Card Numbers: How
Target Blew It. Bloomberg Business Week. Retrieved March 26, 2014, from http://www.businessweek.com/articles/2014-03-
13/target-missed-alarms-in-epic-hack-of-credit-card-data

Más contenido relacionado

Destacado

LSS'09 Keynote Making Sense Of The Networked Audience, Dr B Hogan
LSS'09 Keynote  Making  Sense Of The  Networked  Audience,  Dr  B  HoganLSS'09 Keynote  Making  Sense Of The  Networked  Audience,  Dr  B  Hogan
LSS'09 Keynote Making Sense Of The Networked Audience, Dr B HoganLocal Social Summit
 
I like it....whatever that means: The evolving relationship between disclosur...
I like it....whatever that means: The evolving relationship between disclosur...I like it....whatever that means: The evolving relationship between disclosur...
I like it....whatever that means: The evolving relationship between disclosur...Jessica Vitak
 
Social media presentation
Social media presentationSocial media presentation
Social media presentationmorganbrownlee
 
Cms 298 social media presentation
Cms 298 social media presentationCms 298 social media presentation
Cms 298 social media presentationSarah Mears
 
Media Life Alone Together ICMI 2015
Media Life Alone Together ICMI 2015Media Life Alone Together ICMI 2015
Media Life Alone Together ICMI 2015Mark Deuze
 
Second Life and Social Media: Networking Gold Mine or Time Sink?
Second Life and Social Media: Networking Gold Mine or Time Sink?Second Life and Social Media: Networking Gold Mine or Time Sink?
Second Life and Social Media: Networking Gold Mine or Time Sink?Jean-Claude Bradley
 
Alone Together (Monadology and Media Life)
Alone Together (Monadology and Media Life)Alone Together (Monadology and Media Life)
Alone Together (Monadology and Media Life)Mark Deuze
 
Goffman and the online world
Goffman and the online worldGoffman and the online world
Goffman and the online worldDuncan Chapple
 
Intimacy and Mobile Devices
Intimacy and Mobile DevicesIntimacy and Mobile Devices
Intimacy and Mobile DevicesJohn Rooksby
 
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...Michael Altendorf
 
Social Networking Effects Social Life
Social Networking Effects Social LifeSocial Networking Effects Social Life
Social Networking Effects Social LifeDivam Goyal
 
The effect of social interactions on the self serving bias presentation
The effect of social interactions on the self serving bias presentationThe effect of social interactions on the self serving bias presentation
The effect of social interactions on the self serving bias presentationJethro Elsden
 
The Net Impression: Social Networking and Your Personal Brand
The Net Impression: Social Networking and Your Personal BrandThe Net Impression: Social Networking and Your Personal Brand
The Net Impression: Social Networking and Your Personal BrandAnthony Juliano, MA, MBA
 
The Net Impression: Using Social Media to Grow Your Network
The Net Impression: Using Social Media to Grow Your NetworkThe Net Impression: Using Social Media to Grow Your Network
The Net Impression: Using Social Media to Grow Your NetworkAnthony Juliano, MA, MBA
 

Destacado (17)

LSS'09 Keynote Making Sense Of The Networked Audience, Dr B Hogan
LSS'09 Keynote  Making  Sense Of The  Networked  Audience,  Dr  B  HoganLSS'09 Keynote  Making  Sense Of The  Networked  Audience,  Dr  B  Hogan
LSS'09 Keynote Making Sense Of The Networked Audience, Dr B Hogan
 
I like it....whatever that means: The evolving relationship between disclosur...
I like it....whatever that means: The evolving relationship between disclosur...I like it....whatever that means: The evolving relationship between disclosur...
I like it....whatever that means: The evolving relationship between disclosur...
 
Social media presentation
Social media presentationSocial media presentation
Social media presentation
 
Cms 298 social media presentation
Cms 298 social media presentationCms 298 social media presentation
Cms 298 social media presentation
 
Media Life Alone Together ICMI 2015
Media Life Alone Together ICMI 2015Media Life Alone Together ICMI 2015
Media Life Alone Together ICMI 2015
 
Second Life and Social Media: Networking Gold Mine or Time Sink?
Second Life and Social Media: Networking Gold Mine or Time Sink?Second Life and Social Media: Networking Gold Mine or Time Sink?
Second Life and Social Media: Networking Gold Mine or Time Sink?
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Alone Together (Monadology and Media Life)
Alone Together (Monadology and Media Life)Alone Together (Monadology and Media Life)
Alone Together (Monadology and Media Life)
 
Goffman and the online world
Goffman and the online worldGoffman and the online world
Goffman and the online world
 
Alone together
Alone togetherAlone together
Alone together
 
Intimacy and Mobile Devices
Intimacy and Mobile DevicesIntimacy and Mobile Devices
Intimacy and Mobile Devices
 
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...
TEDx Rhein-Main Michael Altendorf February 2011 - Virtual Identity and the en...
 
Social Networking Effects Social Life
Social Networking Effects Social LifeSocial Networking Effects Social Life
Social Networking Effects Social Life
 
Thesis Defense
Thesis DefenseThesis Defense
Thesis Defense
 
The effect of social interactions on the self serving bias presentation
The effect of social interactions on the self serving bias presentationThe effect of social interactions on the self serving bias presentation
The effect of social interactions on the self serving bias presentation
 
The Net Impression: Social Networking and Your Personal Brand
The Net Impression: Social Networking and Your Personal BrandThe Net Impression: Social Networking and Your Personal Brand
The Net Impression: Social Networking and Your Personal Brand
 
The Net Impression: Using Social Media to Grow Your Network
The Net Impression: Using Social Media to Grow Your NetworkThe Net Impression: Using Social Media to Grow Your Network
The Net Impression: Using Social Media to Grow Your Network
 

Más de Joan Vinall-Cox

Podcasting Quick Start, 2015
Podcasting Quick Start, 2015Podcasting Quick Start, 2015
Podcasting Quick Start, 2015Joan Vinall-Cox
 
A Major Development in Communication: An add-on to Privacy and Self-Presentat...
A Major Development in Communication: An add-on to Privacy and Self-Presentat...A Major Development in Communication: An add-on to Privacy and Self-Presentat...
A Major Development in Communication: An add-on to Privacy and Self-Presentat...Joan Vinall-Cox
 
Types of Documentaries - For Audio
Types of Documentaries - For AudioTypes of Documentaries - For Audio
Types of Documentaries - For AudioJoan Vinall-Cox
 
2013 Autoethnographic, Arts-Based, and Narrative Inquiry Research
2013 Autoethnographic, Arts-Based, and Narrative Inquiry Research2013 Autoethnographic, Arts-Based, and Narrative Inquiry Research
2013 Autoethnographic, Arts-Based, and Narrative Inquiry ResearchJoan Vinall-Cox
 
Social Media Web Profile
Social Media Web ProfileSocial Media Web Profile
Social Media Web ProfileJoan Vinall-Cox
 
HPCA Interview with Deana Mercier
HPCA Interview with Deana MercierHPCA Interview with Deana Mercier
HPCA Interview with Deana MercierJoan Vinall-Cox
 
Beyond Google: New Technology for Research
Beyond Google: New Technology for ResearchBeyond Google: New Technology for Research
Beyond Google: New Technology for ResearchJoan Vinall-Cox
 
Finding My Font: A Grand Tale of Lucid Adaptation
Finding My Font: A Grand Tale of Lucid AdaptationFinding My Font: A Grand Tale of Lucid Adaptation
Finding My Font: A Grand Tale of Lucid AdaptationJoan Vinall-Cox
 
Blogs & Wikis for Education & Business
Blogs & Wikis for Education & BusinessBlogs & Wikis for Education & Business
Blogs & Wikis for Education & BusinessJoan Vinall-Cox
 

Más de Joan Vinall-Cox (20)

Podcasting Quick Start, 2015
Podcasting Quick Start, 2015Podcasting Quick Start, 2015
Podcasting Quick Start, 2015
 
A Major Development in Communication: An add-on to Privacy and Self-Presentat...
A Major Development in Communication: An add-on to Privacy and Self-Presentat...A Major Development in Communication: An add-on to Privacy and Self-Presentat...
A Major Development in Communication: An add-on to Privacy and Self-Presentat...
 
07 copyright
07 copyright07 copyright
07 copyright
 
Podcasting Quick Start
Podcasting Quick StartPodcasting Quick Start
Podcasting Quick Start
 
Web Essentials
Web EssentialsWeb Essentials
Web Essentials
 
Types of Documentaries - For Audio
Types of Documentaries - For AudioTypes of Documentaries - For Audio
Types of Documentaries - For Audio
 
Hearing happens
Hearing happensHearing happens
Hearing happens
 
Story Includes Plot
Story Includes PlotStory Includes Plot
Story Includes Plot
 
2013 Autoethnographic, Arts-Based, and Narrative Inquiry Research
2013 Autoethnographic, Arts-Based, and Narrative Inquiry Research2013 Autoethnographic, Arts-Based, and Narrative Inquiry Research
2013 Autoethnographic, Arts-Based, and Narrative Inquiry Research
 
Finding My Font
Finding My FontFinding My Font
Finding My Font
 
2013 speakliverecord
2013 speakliverecord2013 speakliverecord
2013 speakliverecord
 
1208 narrstructure
1208 narrstructure1208 narrstructure
1208 narrstructure
 
Huron Lake Rocks
Huron Lake RocksHuron Lake Rocks
Huron Lake Rocks
 
Social Media Web Profile
Social Media Web ProfileSocial Media Web Profile
Social Media Web Profile
 
HPCA Interview with Deana Mercier
HPCA Interview with Deana MercierHPCA Interview with Deana Mercier
HPCA Interview with Deana Mercier
 
0902 Presentppt Rules
0902 Presentppt Rules0902 Presentppt Rules
0902 Presentppt Rules
 
Beyond Google: New Technology for Research
Beyond Google: New Technology for ResearchBeyond Google: New Technology for Research
Beyond Google: New Technology for Research
 
Finding My Font: A Grand Tale of Lucid Adaptation
Finding My Font: A Grand Tale of Lucid AdaptationFinding My Font: A Grand Tale of Lucid Adaptation
Finding My Font: A Grand Tale of Lucid Adaptation
 
Blogs & Wikis for Education & Business
Blogs & Wikis for Education & BusinessBlogs & Wikis for Education & Business
Blogs & Wikis for Education & Business
 
Story and Meaning
Story and MeaningStory and Meaning
Story and Meaning
 

Último

Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...Nguyen Thanh Tu Collection
 
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Osopher
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
DBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfDBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfChristalin Nelson
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 

Último (20)

Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
 
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
DBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfDBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdf
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Spearman's correlation,Formula,Advantages,
Spearman's correlation,Formula,Advantages,Spearman's correlation,Formula,Advantages,
Spearman's correlation,Formula,Advantages,
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Chi-Square Test Non Parametric Test Categorical Variable
Chi-Square Test Non Parametric Test Categorical VariableChi-Square Test Non Parametric Test Categorical Variable
Chi-Square Test Non Parametric Test Categorical Variable
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 

Privacy and Self Presentation in the Digital Age

  • 1. Privacy and Self Presentation in the Digital Age Joan Vinall-Cox, Ph.D.
  • 2. Who Are You? • The Presentation of Self in Everyday Life – sociologist Erving Goffman • social rituals involved in self-presentation • = “impression management” • Different in the digital environment • The meaning of avatars
  • 3. Presenting Your Image • “Impression management online and off is not just an individual act; it’s a social process.” – danahboyd - It’s Complicated • http://www.createdimage.com.au/blog/index.phpm=05&y=11&entry=entry110525-160007 Audience? Message? Social Norm?
  • 4. “Social media has introduced a new dimension to the well-worn fights over private space and personal expression.” – danahboyd http://en.wikipedia.org/wiki/Paparazzi
  • 5. Cultural Changes • We feel entitled to know other’s business • “civil inattention” – politely ignoring embarrassing moments or information – no longer in vogue • Scandals get attention in information- saturated world • Celebrity gossip more and more popular
  • 6.
  • 7. Civil Inattention – Not Looking even though you can see! Saving yourself and others from embarrassment
  • 8. Civil Inattention Needed, (as well as context awareness) A metaphor for social media “drama”
  • 9. Paparazzi and Celebrity Gossip Have Increased Greatly in Our Culture
  • 10. Do Media Portrayals of Out-of-Control Behavior Affect Social Media Bullying? Is the Cause Cultural or Technical?
  • 11. In the Social Media Age • “Four affordances, in particular, shape many of the mediated environments that are created by social media – persistence • *It doesn’t disappear+ – visibility • [For anyone with a computer and URL] – Spreadability • [Extremely easy to forward / share] – searchability” • [Just google it!] – danahboyd – It’s Complicated
  • 12. We are Living in the Panopticon • http://en.wikipedia.org/wiki/Panopticon
  • 13. The Concept of Privacy is Changing in the Digital Age
  • 14. danahboyd: • “Privacy … is a process by which people seek to have control over a social situation by managing – impressions, – information flows, and – context.” • “Privacy is valuable because it is critical for personal development.”
  • 15. Who Are You, Really? • If you are always “managing impressions” of yourself because you are always watched, if you have no privacy, you can’t find out who you truly are. • http://en.wikipedia.org/wiki/Mask
  • 16. When You Know Who / Where You Are You Know How to Behave • “Based on their understanding of the social situation—including the context and the audience—people make decisions about what to share in order to act appropriately for the situation and to be perceived in the best light.” • But when you don’t know the context … • “Contexts don’t just collapse accidentally; they collapse because individuals have a different sense of where the boundaries exist and how their decisions affect others.” – danahboyd – It’s Complicated
  • 17. It FEELS Private and Safe to Reveal Yourself or Attack Anonymously But …
  • 18. Context Collapse • Context collapse is our new reality • "...Social media technologies collapse multiple audiences into single contexts, making it difficult for people to use the same techniques online that they do to handle multiplicity in face-to-face conversation...” – (Marwick & Boyd, 2011)
  • 19. Excerpt: http://hlwiki.slais.ubc.ca/index.php/Context_collapse_in_social_media • According to [Michael] Wesch, in face-to-face communication • we assess the context of our interactions • in order to decide – how we will act, – what we will say, and – how we will construct (and present) ourselves.
  • 20. Excerpt: http://hlwiki.slais.ubc.ca/index.php/Context_collapse_in_social_media As [Erving] Goffmansays, • we continuously, unconsciously take note of our surroundings, • those present, and • the overall tone and temperature of the scene – to move through it. • As social beings, we have become adept at • sussingout and performing micro-calculations • in the micro-second gaps of conversation • in order to move through those situations. When engaged in social interactions, we evaluate situations and people as well as ourselves and how we fit into them
  • 21. Excerpt: http://hlwiki.slais.ubc.ca/index.php/Context_collapse_in_social_media In social media, • face work does not have the same currency or value • because we don't see the expressions of those with whom we are communicating. • Further, there is context collapse, or homogenization of context, • because all of the micro-calculations we used to make by evaluating a situation are gone, • removed and collapsed in social media.
  • 22. Government and Businesses: Attitudes Toward Privacy • Privacy is pretty well non-existent in the wired world • Governments access ‘private’ communications – American NSA, Canadian CSIS – Edward Snowden - http://en.wikipedia.org/wiki/Edward_Snowden
  • 23. Our Vulnerable Computers • Not just government agencies can invade our privacy • Agencies and hackers can invade our computers and phones to learn our secrets • Online businesses can delete what we bought and paid for • Business that we trust with our financial information might not encrypt it securely enough to prevent hacking
  • 24. Your Stuff • Cookies – your computer history doesn’t disappear • Most cloud email and storage is on servers in the U.S. – Canadian gov’t trying to change that for gov’t materials – http://www.thestar.com/business/2014/03/07/ti me_for_consumers_to_think_local_for_cloud_co mputing_geist.html
  • 26. Encryption and Your Data http://www.theguardian.com/technology/2013/sep/05/how-internet- encryption-works
  • 28. Our Privacy and Identities – VERY Limited • http://www.abine.com/blog/2013/9-easy-ways-to-beat-identity- thieves/ • Pay close attention to your bank account. • Ultra-personalize your credit card. • Lock down your privacy settings on social networks. • Remove your information from data mining websites that publicly post and sell it. • Etc. … and not so easy
  • 29. The New Public Square &Panopticon
  • 30. You are Being Watched! • In our digital culture, we now have audiences – Mostly unknown by us – Invisible to us – From many different places and cultures – From future times; (our information doesn’t disappear) • We are trying to learn how to behave in our panoptic world
  • 32. Sophisticated Tactics • Different personas for different sites/media, for example, Tumblr • Controlling who gets to see what posts on Facebook, using their tools • Making Instagram private, and only allowing people you actually know to follow • On LinkedIn, networking with posts and endorsements • Understanding Twitter, especially Lists
  • 33. Are You the Same Person on All Your Social Media Sites? • “*She (or he)+ represent[s] herself in different ways on different sites with the expectation of different audiences and different norms” – danahboydIt’s Complicated http://commons.wikimedia.org/wiki/File:Jack_Lemmon_-_1968.jpg http://www.flickr.com/photos/andys93integra/6114180062/
  • 34. Serious Journalist; Flippant Twitterer Andrew Coyne, National Post, CBC
  • 35. The Dark Entrepreneurial Side - Retweeted by @socialnerdia
  • 36. Social Media is Increasingly Being ‘Managed’
  • 37. Designing for Attention http://www.zephoria.org/thoughts/archives/2014/03/21/snapchat- attention.html • Developers are working to design apps that make use of our current digital habits • To combat multitasking, lack of attention, and spreadability, • Snapchat demands attention by the time limit • And provides some privacy
  • 38. The Printing Press Changed the World • The internet and web are just beginning • Profound impacts already on – Communication – email, Skype, social media – Politics – political messages, fund raising – Relationships – Facebook, dating – Education – Classroom content, MOOCs – Publishing – decline of newspapers, rise of ebooks, blogs • Etcetera ad infinitum
  • 40. Works Cited Images from Google Images /Search tools / Usage rights / Labeled for noncommercial reuse 9 easy ways to beat identity thieves. (n.d.). Online Privacy Abine RSS. Retrieved March 27, 2014, from http://www.abine.com/blog/2013/9-easy-ways-to-beat-identity-thieves/ Arthur, C. (2013, September 6). How internet encryption works. The Guardian. Retrieved March 27, 2014, from http://www.theguardian.com/technology/2013/sep/05/how-internet-encryption-works boyd, d. (2014). It's complicated: the social lives of networked teens. Boston: Yale University Press. danahboyd | apophenia. (n.d.). danahboydapophenia RSS. Retrieved March 27, 2014, from http://www.zephoria.org/thoughts/archives/2014/03/21/snapchat-attention.html Contreras, E. [@socialnerdia] (2014, March 26). $3,000 "social media wedding concierge" will come up with a #hashtag for you. please stop. pic.twitter.com/EttzK0L8Vk [Retweet of Bosker, B. (@bbosker)] Retrieved from https://twitter.com/bbosker/status/448468488898637824 Context collapse in social media. (n.d.). HLWIKI Canada. Retrieved March 27, 2014, from http://hlwiki.slais.ubc.ca/index.php/Context_ Coyne, A. [@acoyne] (2014a, March 26). Ukraine had planned "to train the dolphins to attack enemy swimmers with knives or pistols fixed to their heads." http://www.nationaljournal.com/defense/russia-has-taken-ukraine-s-fleet-of-dolphins- 20140326 … [Tweet]. Retrieved from https://twitter.com/acoyne/status/448874825759461376 Coyne, A. [@acoyne] (2014b, March 26). "Enemy swimmers?" [Tweet]. Retrieved from https://twitter.com/acoyne/status/448874884072878080 Geist, M. (n.d.). Time for consumers to think local for cloud computing: Geist. thestar.com. Retrieved March 27, 2014, from http://www.thestar.com/business/2014/03/ Goffman, E. (1959). The presentation of self in everyday life. Garden City, N.Y.: Doubleday. Marwick, A. E., & Boyd, D. (2011). I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society, 13(1), 114–133. doi:10.1177/1461444810365313 Riley, M., Elgin, B., Lawrence, D., &Matlack, C. (2014, March 13). Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It. Bloomberg Business Week. Retrieved March 26, 2014, from http://www.businessweek.com/articles/2014-03- 13/target-missed-alarms-in-epic-hack-of-credit-card-data