Download presentation
Presentation is loading. Please wait.
0
Computer-Mediated Communication
Social Privacy in a Networked World
1
Cheshire & King - CMC i216 Fall 2016
Quick Review Personal disclosure is a fundamental human activity Disclosure in CMCs is a reflection of this activity What looks like a “Privacy Paradox” can be unpacked into more nuance that contextualizes disclosure Disclosure is motivated by: Different aspects of privacy (psych, social, info) The need/desire to build social capital Lack of privacy “literacy” (people are unaware of info gathering by CMC platforms, or they don’t care) On Tuesday we talked about why people disclose; two primary theories of privacy that inform research in this area; the privacy paradox and how behavior that is characterized as paradoxical can be explained with more nuance. 9/22/16 Cheshire & King - CMC i216 Fall 2016
2
Today: Implications of Disclosure
Social Consequences Turbulence: interpersonal consequences, such as embarrassment, loss of friendship, loss of privacy Objective harms: loss of job, discrimination, reputational harms 9/22/16 Cheshire & King - CMC i216 Fall 2016
3
What’s happening on the ground?
All sorts of social malfeasance occurring from what people disclose publicly. Here’s one of the early examples: would that happen today? Why: Context collapse, (mis)imagined audience, poor grasp of privacy controls? 9/22/16 Cheshire & King - CMC i216 Fall 2016
4
Info harvesting/reuse/predictions
Jernigan & Mistree’s 2009 Gaydar study It’s not just what you make explicit, it’s also what you can infer Other examples of inferences (correct or not)? Walk through the four studies assigned today; each one presents a different aspect of the conflicts we observe between disclosure and privacy in CMC spaces (all but one are focused on FB, sorry) 9/22/16 Cheshire & King - CMC i216 Fall 2016
5
Cheshire & King - CMC i216 Fall 2016
Circa 2010 9/22/16 Cheshire & King - CMC i216 Fall 2016
6
Cheshire & King - CMC i216 Fall 2016
Here’s a recent example from our reading. This is an interesting case of the marriage of data (likely your phone number) + your social relationships (friend graph) 9/22/16 Cheshire & King - CMC i216 Fall 2016
7
Michal Kosinski et al. PNAS 2013;110:5802-5805
Prediction accuracy of classification for dichotomous/dichotomized attributes expressed by the AUC. This is a slide from another study, more recent than Gaydar (2013), that used FB profile info to predict certain profile attributes from (public data? Check!) Prediction accuracy of classification for dichotomous/dichotomized attributes expressed by the AUC. Michal Kosinski et al. PNAS 2013;110: Private traits and attributes are predictable from digital records of human behavior 9/22/16 Cheshire & King - CMC i216 Fall 2016 ©2013 by National Academy of Sciences
8
Cheshire & King - CMC i216 Fall 2016
Turn an Address into a Social Profile. When all you have is an address, Flowtown can give you a name, age, gender, occupation, location and all the social networks that person is on. This is a now defunct example of a commercial service that was harvesting SNS profile information for ad purposes – not necessarily above board. 9/22/16 Cheshire & King - CMC i216 Fall 2016
9
User Misunderstandings
How come I’m allowing strangers to go through my phone? Key finding: people didn’t entirely grasp what apps were, unaware of smartphone architecture, didn’t realize the extent to which data could be shared unaware 9/22/16 Cheshire & King - CMC i216 Fall 2016
10
Cheshire & King - CMC i216 Fall 2016
Privacy: Is there an app for that? Similarly, we found that people didn’t understand what Facebook apps were, that they weren’t part of FB, that they had access to profile and their social graph, and that by adding apps they were in effect exposing their friends. 9/22/16 Cheshire & King - CMC i216 Fall 2016
11
Cheshire & King - CMC i216 Fall 2016
9/22/16 Cheshire & King - CMC i216 Fall 2016
12
Silent Listeners (Stutzman et al.)
Facebook users over time became more privacy seeking by progressively limiting data shared publicly with strangers Facebook’s 2009 changes reversed this amount of info users revealed to connected friends increased, as well as to third party apps; often occurred w/o explicit consent or awareness; the network remains an “imagined” community that does not map to actual audiences Included this one because it’s one of the only longitudinal studies out there on privacy, and our perceptions of our information privacy over time is an area that many of us are curious about 9/22/16 Cheshire & King - CMC i216 Fall 2016
13
Cheshire & King - CMC i216 Fall 2016
Facebook privacy settings circa Dec 2009 9/22/16 Cheshire & King - CMC i216 Fall 2016
14
Cheshire & King - CMC i216 Fall 2016
Facebook privacy settings circa July 2010 9/22/16 Cheshire & King - CMC i216 Fall 2016
15
Cheshire & King - CMC i216 Fall 2016
9/22/16 Cheshire & King - CMC i216 Fall 2016
16
Cheshire & King - CMC i216 Fall 2016
9/22/16 Cheshire & King - CMC i216 Fall 2016
17
Cheshire & King - CMC i216 Fall 2016
9/22/16 Cheshire & King - CMC i216 Fall 2016
18
Cheshire & King - CMC i216 Fall 2016
9/22/16 Cheshire & King - CMC i216 Fall 2016
19
Implications of “Silent Listeners”
How much is our expectation of privacy bound to the platform we are using? “Power of the environment in affecting individual choices: the entity that controls the structure Ultimately remains able to affect how actors make choices in that environment.” Privacy by overexposure? How much of this study is just specific to FB? Riyana & Bret 9/22/16 Cheshire & King - CMC i216 Fall 2016
20
Cheshire & King - CMC i216 Fall 2016
Boundary Management Litt & Hargittai’s paper Incorporates the work of Sandra Petronio (using an updated version of Altman’s theory: Communication Privacy Management) Privacy == individuals’ information boundary (rule) management w/r/t others Turbulence == breakdown in expectations when personal info goes beyond a person’s desired boundaries 9/22/16 Cheshire & King - CMC i216 Fall 2016
21
Cheshire & King - CMC i216 Fall 2016
Key findings Skill is a key concern in Hargittai’s work – found those with more Internet skills less likely to experience negative outcomes Self monitoring: “ability & motivation to pick up on social cues and modify their self-presentations” Higher self-monitoring skills & privacy behaviors == more turbulence Context collapse, or perceived vs. actual privacy misaligned, also control paradox Higher self monitors might be more sensitive, more aware negatives exist, better at ID’ing it, not necessarily more likely to experience Prior negative experiences may also contribute While we can cause our own turbulence, more often generated by what others share about us – how do we design for this? Privacy literacy: skills still independent of one’s experience of turbulence Andrew commented on this portion Eszter has a new article focusing on youth, skills, and the privacy paradox: participants were apathetic because they felt there was a loss of control, privacy violations were inevitable, no opt out Privacy as a group process in CMC, not as only an individual responsibility 9/22/16 Cheshire & King - CMC i216 Fall 2016
22
Misplaced Confidences – Control Paradox
Individuals’ perceived control over release and access of private info increases willingness to disclose Questions assumptions about rational, informed choice Part of a larger body of research by Acquisti questioning decision-making models; role of heuristics Posits that privacy preferences are contextual and subject to manipulation This is one of their most important papers – it questions the heart of the entire model of notice and choice Return to Bret’s comment about privacy incoherence 9/22/16 Cheshire & King - CMC i216 Fall 2016
23
Cheshire & King - CMC i216 Fall 2016
Design solutions? Better (re)designed privacy controls Privacy “nudges” Predictive privacy preferences Incorporating longitudinal aspects How do we design for social privacy? 9/22/16 Cheshire & King - CMC i216 Fall 2016
24
Cheshire & King - CMC i216 Fall 2016
9/22/16 Cheshire & King - CMC i216 Fall 2016
25
Cheshire & King - CMC i216 Fall 2016
9/22/16 Cheshire & King - CMC i216 Fall 2016
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.