Cheshire & King - CMC i216 Fall 2016

Slides:



Advertisements
Similar presentations
Seeing and Organizing Identity Online thoughts on digital context, perception of self and identity management.
Advertisements

Key Stage Three Resources
HRM-755 PERFORMANCE MANAGEMENT
Privacy and Dignity 7 Standard.
1 Social Perceptions Inter-Act, 13 th Edition Chapter 2.
Coaching and Providing Feedback for Improved Performance
Team 2 Andrew Boyd Kaven Williams.  Privacy, Security and Compliance Issues  Current State of Research  Implications  Areas of Research Opportunity.
Margaret J. Cox King’s College London
The Self and Messages Relationship Development
Privacy concerns and information disclosure: An illusion of control hypothesis Laura Brandimarte and Alessandro Acquisti – Carnegie Mellon University Motivation.
Amanda Lenhart, Senior Researcher, Director of Teens & Technology Mary Madden, Senior Researcher Pew Research Center Family Online Safety Institute November.
Interpersonal Privacy Nudge for Promoting Privacy Protective Behaviors on Social Network Sites Haiyan Jia & Heng Xu College of Information Sciences and.
Misplaced Confidences: Privacy and the Control Paradox L. Brandimarte, A. Acquisti, and G. Loewenstein,"Misplaced Confidences: Privacy and the control.
Social Reading and Privacy Norms: The Aesthetic of Simplicity, Online Reading, and Interface Confusion J. Richard Stevens.
>>0 >>1 >> 2 >> 3 >> 4 >> Privacy and SNS in China Comundus-European Master of Arts in Media, Communication and Cultural Study Jin PENG the case of xiaonei.com.
Planning the Effort May 22, 2011 RISK COMMUNICATION.
What Parents Should Know About Social Networking.
Copyright © 2017 Pearson Education, Inc.. Excellence in Business Communication Chapter 3 Communication Challenges in a Diverse, Global Marketplace Copyright.
Jim Loter Director of Information Technology
Surf smart training.
Introduction to Privacy
Interpersonal Skills Practicum in LPSCS.
Student Privacy in an Ever-Changing Digital World
Intrapersonal Communication
Communication and Identity
The Millennial Generation and Technology
Reflective essay.
Mass Communication Theories
Social CONSUMERS RTV 453 cell phones off and put away
DSS & Warehousing Systems
COM 200 Slingshot Academy / ashcom200.com
Think about the skill you picked for this semester
Summary of Bret Victor’s Paper
Chapter 14 Family Perspectives on Occupation, Health and Disability
Chapter 13 Interpersonal Communication: A Theoretical Foundation.
Organization and Knowledge Management
Chapter 7: Interpersonal Relationships
Sarah K. Petty, Marian M. Morry, & Tamara A. Sucharyna Introduction
Key-words: Social networks, social technologies, youth, interaction
Intercultural Communication
Determining Access.
Perception Chapter topics The Perception Process
UTAs Roles’ in Learning & Mentoring
MGT 210 CHAPTER 13: MANAGING TEAMS
Decision Making Process
COM 200 Education for Service-- tutorialrank.com
Teaching with Instructional Software
Computer-Mediated Communication
Chapter Three Needs Assessment.
Engaging Families in Special Education
Student-Centered Planning
Computer-Mediated Communication
Target Setting for Student Progress
BTEC Level 3 Health and Social Care
Work in the 21st Century: It’s a Whole New World
Lesson Planning: Activating Core and Curricular Competencies
CS6501 Embedded Operating Systems for the IoT
UTAs Roles’ in Learning & Mentoring
Personalization & Privacy: Flow of Information
Introduction to Health Privacy
Computer-Mediated Communication
Chapter 6 Learning and Performance Management
Personal profiles in VLE forums: do students use them?
Privacy Protection for Social Network Services
Privacy and Dignity 7 Standard.
YAB 101: Strategic Sharing
Putting a face to a name: students’ use of profiles in VLE forums
Social Media in Careers
Customer Service Strategies
Interpersonal Communications in the Workplace
Presentation transcript:

Computer-Mediated Communication Social Privacy in a Networked World

Cheshire & King - CMC i216 Fall 2016 Quick Review Personal disclosure is a fundamental human activity Disclosure in CMCs is a reflection of this activity What looks like a “Privacy Paradox” can be unpacked into more nuance that contextualizes disclosure Disclosure is motivated by: Different aspects of privacy (psych, social, info) The need/desire to build social capital Lack of privacy “literacy” (people are unaware of info gathering by CMC platforms, or they don’t care) On Tuesday we talked about why people disclose; two primary theories of privacy that inform research in this area; the privacy paradox and how behavior that is characterized as paradoxical can be explained with more nuance. 9/22/16 Cheshire & King - CMC i216 Fall 2016

Today: Implications of Disclosure Social Consequences Turbulence: interpersonal consequences, such as embarrassment, loss of friendship, loss of privacy Objective harms: loss of job, discrimination, reputational harms http://www.forbes.com/sites/kashmirhill/2009/12/10/either-mark-zuckerberg-got-a-whole-lot-less-private-or-facebooks-ceo-doesnt-understand-the-companys-new-privacy-settings/#7f3f4b721c61 9/22/16 Cheshire & King - CMC i216 Fall 2016

What’s happening on the ground? All sorts of social malfeasance occurring from what people disclose publicly. Here’s one of the early examples: would that happen today? Why: Context collapse, (mis)imagined audience, poor grasp of privacy controls? 9/22/16 Cheshire & King - CMC i216 Fall 2016

Info harvesting/reuse/predictions Jernigan & Mistree’s 2009 Gaydar study It’s not just what you make explicit, it’s also what you can infer Other examples of inferences (correct or not)? Walk through the four studies assigned today; each one presents a different aspect of the conflicts we observe between disclosure and privacy in CMC spaces (all but one are focused on FB, sorry) http://immediatefuture.co.uk/blog/new-software-can-predict-personality-traits-what-does-your-facebook-profile-say-about-you/ 9/22/16 Cheshire & King - CMC i216 Fall 2016

Cheshire & King - CMC i216 Fall 2016 Circa 2010 9/22/16 Cheshire & King - CMC i216 Fall 2016

Cheshire & King - CMC i216 Fall 2016 Here’s a recent example from our reading. This is an interesting case of the marriage of data (likely your phone number) + your social relationships (friend graph) 9/22/16 Cheshire & King - CMC i216 Fall 2016

Michal Kosinski et al. PNAS 2013;110:5802-5805 Prediction accuracy of classification for dichotomous/dichotomized attributes expressed by the AUC. This is a slide from another study, more recent than Gaydar (2013), that used FB profile info to predict certain profile attributes from (public data? Check!) Prediction accuracy of classification for dichotomous/dichotomized attributes expressed by the AUC. Michal Kosinski et al. PNAS 2013;110:5802-5805 Private traits and attributes are predictable from digital records of human behavior 9/22/16 Cheshire & King - CMC i216 Fall 2016 ©2013 by National Academy of Sciences

Cheshire & King - CMC i216 Fall 2016 Turn an Email Address into a Social Profile. When all you have is an email address, Flowtown can give you a name, age, gender, occupation, location and all the social networks that person is on. This is a now defunct example of a commercial service that was harvesting SNS profile information for ad purposes – not necessarily above board. 9/22/16 Cheshire & King - CMC i216 Fall 2016

User Misunderstandings How come I’m allowing strangers to go through my phone? Key finding: people didn’t entirely grasp what apps were, unaware of smartphone architecture, didn’t realize the extent to which data could be shared unaware 9/22/16 Cheshire & King - CMC i216 Fall 2016

Cheshire & King - CMC i216 Fall 2016 Privacy: Is there an app for that? Similarly, we found that people didn’t understand what Facebook apps were, that they weren’t part of FB, that they had access to profile and their social graph, and that by adding apps they were in effect exposing their friends. 9/22/16 Cheshire & King - CMC i216 Fall 2016

Cheshire & King - CMC i216 Fall 2016 9/22/16 Cheshire & King - CMC i216 Fall 2016

Silent Listeners (Stutzman et al.) Facebook users over time became more privacy seeking by progressively limiting data shared publicly with strangers Facebook’s 2009 changes reversed this amount of info users revealed to connected friends increased, as well as to third party apps; often occurred w/o explicit consent or awareness; the network remains an “imagined” community that does not map to actual audiences Included this one because it’s one of the only longitudinal studies out there on privacy, and our perceptions of our information privacy over time is an area that many of us are curious about 9/22/16 Cheshire & King - CMC i216 Fall 2016

Cheshire & King - CMC i216 Fall 2016 Facebook privacy settings circa Dec 2009 9/22/16 Cheshire & King - CMC i216 Fall 2016

Cheshire & King - CMC i216 Fall 2016 Facebook privacy settings circa July 2010 9/22/16 Cheshire & King - CMC i216 Fall 2016

Cheshire & King - CMC i216 Fall 2016 http://mattmckeon.com/facebook-privacy/ 9/22/16 Cheshire & King - CMC i216 Fall 2016

Cheshire & King - CMC i216 Fall 2016 http://mattmckeon.com/facebook-privacy/ 9/22/16 Cheshire & King - CMC i216 Fall 2016

Cheshire & King - CMC i216 Fall 2016 http://mattmckeon.com/facebook-privacy/ 9/22/16 Cheshire & King - CMC i216 Fall 2016

Cheshire & King - CMC i216 Fall 2016 http://mattmckeon.com/facebook-privacy/ 9/22/16 Cheshire & King - CMC i216 Fall 2016

Implications of “Silent Listeners” How much is our expectation of privacy bound to the platform we are using? “Power of the environment in affecting individual choices: the entity that controls the structure . . . Ultimately remains able to affect how actors make choices in that environment.” Privacy by overexposure? How much of this study is just specific to FB? Riyana & Bret 9/22/16 Cheshire & King - CMC i216 Fall 2016

Cheshire & King - CMC i216 Fall 2016 Boundary Management Litt & Hargittai’s paper Incorporates the work of Sandra Petronio (using an updated version of Altman’s theory: Communication Privacy Management) Privacy == individuals’ information boundary (rule) management w/r/t others Turbulence == breakdown in expectations when personal info goes beyond a person’s desired boundaries 9/22/16 Cheshire & King - CMC i216 Fall 2016

Cheshire & King - CMC i216 Fall 2016 Key findings Skill is a key concern in Hargittai’s work – found those with more Internet skills less likely to experience negative outcomes Self monitoring: “ability & motivation to pick up on social cues and modify their self-presentations” Higher self-monitoring skills & privacy behaviors == more turbulence Context collapse, or perceived vs. actual privacy misaligned, also control paradox Higher self monitors might be more sensitive, more aware negatives exist, better at ID’ing it, not necessarily more likely to experience Prior negative experiences may also contribute While we can cause our own turbulence, more often generated by what others share about us – how do we design for this? Privacy literacy: skills still independent of one’s experience of turbulence Andrew commented on this portion Eszter has a new article focusing on youth, skills, and the privacy paradox: participants were apathetic because they felt there was a loss of control, privacy violations were inevitable, no opt out Privacy as a group process in CMC, not as only an individual responsibility 9/22/16 Cheshire & King - CMC i216 Fall 2016

Misplaced Confidences – Control Paradox Individuals’ perceived control over release and access of private info increases willingness to disclose Questions assumptions about rational, informed choice Part of a larger body of research by Acquisti questioning decision-making models; role of heuristics Posits that privacy preferences are contextual and subject to manipulation This is one of their most important papers – it questions the heart of the entire model of notice and choice Return to Bret’s comment about privacy incoherence 9/22/16 Cheshire & King - CMC i216 Fall 2016

Cheshire & King - CMC i216 Fall 2016 Design solutions? Better (re)designed privacy controls Privacy “nudges” Predictive privacy preferences Incorporating longitudinal aspects How do we design for social privacy? 9/22/16 Cheshire & King - CMC i216 Fall 2016

Cheshire & King - CMC i216 Fall 2016 9/22/16 Cheshire & King - CMC i216 Fall 2016

Cheshire & King - CMC i216 Fall 2016 9/22/16 Cheshire & King - CMC i216 Fall 2016