“I regretted the minute I pressed share”: A Qualitative Study of Regrets on Facebook Presenter: Arvie Carpio Y. Wang, S. Komanduri, P.G. Leon, G. Norcie,

Slides:



Advertisements
Similar presentations
To Identify and Change Mindsets: The Challenge of Nurturing Resilience and Motivation in Students and Staff
Advertisements

Working with the Customer!!
HISD Becoming #GreatAllOver. How many hours per day does the average child between the ages of 8 and 18 spend with media and technology? (this includes.
1 5 steps to enjoying a safer internet experience SID 2013 presentation for adults who work/volunteer with children, young people and vulnerable adults.
Face To Face vs. Mediated Interaction Joseph Miller Michael Osborn Jaclyn Duket Ohn’Jay Walker.
Lathrop Intermediate School Cyber Savvy Week December 1 – December 5, 2014 Be RespectfulBe ResponsibleBe Safe ELA & Reading Intervention Classrooms Monday,
1 Disclosure and Privacy 10: Inter-Act, 13 th Edition 10: Inter-Act, 13 th Edition.
C MU U sable P rivacy and S ecurity Laboratory Anti-Phishing Phil The Design and Evaluation of a Game That Teaches People Not to.
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
Social media threats. Warning! May contain mild peril.
INFORMATION REVELATION AND PRIVACY IN ONLINE SOCIAL NETWORKS (THE FACEBOOK CASE) Rachid Hamcha IMM.
St St Stephen’s School Cyberwellness - Safety Tips & Netiquette Online.
Students’ online profiles for employability and community Frances Chetwynd, Karen Kear, Helen Jefferis and John Woodthorpe The Open University.
WHAT IS INTERACTION DESIGN?
Research Methodology Class. Contents: Concepts of research The need for research Types of research Steps in conducting research.
Adjusting your Facebook Privacy Settings Privacy, please!
Privacy By Russell Andrews, Emily Gavin, Stephanie Engel, Su Kyung Jeon, and Sugene Park.
Blurbs The Wiki All About You. The Need  Express oneself  Learn more about a friend or acquaintance  Organize information  Express oneself  Learn.
Computers and Society Carnegie Mellon University Spring 2007 Cranor/Tongia 1 Regulating Online Speech / Privacy.
Evaluation of Project Engage - Staff Side Team RENEU - Anran Ye - Aalap Doshi - Gaurav Pimprikar - Yung-Ju Chang.
Usable Privacy and Security Carnegie Mellon University Spring 2007 Cranor/Hong 1 Course Overview January 16, 2007.
By Kelvin Canela FACIAL RECOGNITION. Facebook Online social networking site. Launched on February 2004 and founded by Mark Zuckerberg, Eduardo Saverin,
Holt High School _48889_ ,00.html.
By Hope Gallaway Social Networks. What is a Social Network? A social network is a social structure made up of individuals called “nodes”, which are tied.
Ethics in Business Research
10 Privacy Settings Every Facebook User Should Know.
SOCIAL MEDIA: FROM GOALS TO RESULTS JENNIFER THOMÉ ASSISTANT DIRECTOR OF STUDENT MEDIA MSU DENVER.
What does it mean to be a good digital citizen?. Think before you post or text : Before you press the "send" button, imagine the last person in the world.
HISD Becoming #GreatAllOver. How many hours per day does the average child between the ages of 8 and 18 spend with media and technology? (this includes.
Aims and Objectives.
The Teen Years Chapter 22. Changes During the Teen Years The basis of healthy relationships with others rests on how you feel about yourself. Self-image.
Interview skills: How to present yourself with confidence Career Development Centre University of Ulster.
How To Drive Traffic To Your Website With Facebook - Growing Your Online Business With Facebook- and Much More - The Facebook Experts Handbook 1 This book.
 Job Hunting Independent Living. Places to job hunt…  School career center/office  Jobs posted  Mock interviews  Real interviews  Online resources.
METHODOLOGY AND ASSESSMENT TOOLS FOR MEDICAL STUDENTS’ ACHIEVEMENTS ON THE BASIS OF COMPETENCE APPROACH OMSK STATE MEDICAL ACADEMY DEPARTMENT OF PEDAGOGY.
Air Products Internal Use Only.  Today we are going to discuss cyber safety.  What is Cyber Safety?  Cyber Safety refers to the things you do online.
Module 3 – Security and Privacy SOCIAL MEDIA IN BUSINESS.
CITIZENSHIP IN A DIGITAL AGE ACCESS, PARTICIPATION AND RIGHTS TED TALK.
Pitfalls and Mistakes. Agenda Who We Are Social Media Today Pitfalls and Mistakes –Policies –Poor Decisions Online Reputation Accepting Random People.
By Deborah Miriam Leshinsky ( PHD Candidate – currently doing research at Monash University)- Melbourne Australia Certified practicing Valuer Australian.
Establishing boundaries where there appear to be none.
An Investigation of Facebook Grouping Robin Brewer Yael Mayer Lorrie Cranor Patrick Kelley facebook Home Profile Account Search.
What do you know about the following… 1.Self Esteem 2.3 Areas of Health 3.Decision Making 4.Peer Pressure/Communication 5.Human Body Systems 6.Stress 7.Smoking/Tobacco.
A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks S. Creese, M. Goldsmith, J. Nurse, E.
Panther Forum Activity Week 9. Things to remember when you are using social media to communicate with others.
Facebook is a social website which helps you connect with your friends and people from around the world. You make a profile for yourself and add your friends.
Review of: All You Can Eat or Breaking a Real-World Contactless Payment System Timo Kasper, Michael Silbermann, and Christof Paar Financial Cryptography.
C MU U sable P rivacy and S ecurity Laboratory Protecting People from Phishing: The Design and Evaluation of an Embedded Training.
Building Your Personal Brand Philip Goodwin, OSU Career Services Associate Director.
USING TECHNOLOGY WISELY Module 5 Information, Media, and Technology Literacy Session 2.
E-Safety, CSE and Prevent. THINK you know about ONLINE & SOCIAL MEDIA SAFETY?
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
Aim: How do sociologists do research?
Security Debate Why cracking should be criminalized.
Internet Social Networking Etiquette. What is meant by it? Internet social networking network etiquette is a understanding of how it is appropriate to.
SOCIAL MEDIA’S IMPACT ON PERSONAL BRANDING WHY YOUR DIGITAL FOOTPRINT MATTERS Image retrieved from socialmediatoday.com Created by Nicole Gennarelli.
The Presentation of Self: Performance Distinction between LinkedIn & an E-portfolio Folayemi Akinbolaji Writing with New Media.
Health Education HECMA Program Health & Wellness 1 Chapter 2/ Lesson 8 Positive Thinking Done by : Najwan Fares.
E-Safety. When using computers, we need to keep our data safe. We also need to keep ourselves safe online. Data security is about making sure that data.
Presented By: Sambaran Basu & Ankita Ghosh. Social NetworkING.
  Entrepreneur.com   Name That Brand  The Game Changer.
SELF GLORIFICATION AND EXHIBITIONISM IN FACEBOOK Anusuah.R Research scholar, Department of Communication, Manonmaniam Sundaranar University, Tirunelveli.
Amy Randolph-Chernis. Blogging Facebook LinkedIn Twitter YouTube Social Networking!
Maximize Confidence 2. Each of us comes to this world for a purpose. What is your life purpose or mission statement? Are you (the true you, deep inside.
Creating your online identity
Design for Security Pepper.
Warrior Wednesday DIGITAL CITIZENSHIP.
WHAT IS INTERACTION DESIGN?
INTERACTIVE IMAGES, VIDEOS AND 360 CONTENT IN MINUTES
Presentation transcript:

“I regretted the minute I pressed share”: A Qualitative Study of Regrets on Facebook Presenter: Arvie Carpio Y. Wang, S. Komanduri, P.G. Leon, G. Norcie, A. Acquisti, and L.F. Cranor. Symposium on Usable Privacy and Security (SOUPS) 2011, p

Summary Investigates users’ regrets with their Facebook posts done with 569 American Facebook users. Mainly discussed their methodology used (interviews, user diaries, online surveys) and presented results obtained. Presented suggestions of possible implementations to help users avoid regrets in Facebook.

Appreciation Protection of personal assets revealed online: self image, photos, things we say, our likes and dislikes, emotion at certain points in time, etc. Identified as posts in Facebook. Attacker is our own self. Different states (has intended purpose or in a highly emotional state) of a person were identified which makes us possible to perform an attack against ourselves. If attack is successful, damage done is quantified through regrets and effects on our real lives (losing a job, broken relationships).

Criticism Regrets was the only analytic lens which was used to identify negative Facebook experience. They did not show the basis of this decision.  Was regret the only negative experience possible in Facebook? Was it the most common negative experience in Facebook? They only asked about users’ posts which they regretted. There are also other sources of regrets on Facebook such as tagged photos of yourself by others, “like”-ing other people’s posts, Facebook games, and many more which could also be main avenues for regrets.  Why did they only consider posts? Were posts the main Facebook feature as a mechanism for users’ regrets?

Question If an ‘anti-regret’ feature is developed to help protect personal assets on Social Networking System such as Facebook, how likely is it that users would be protected if the authorized users still has the ability to attack themselves?