SlideShare une entreprise Scribd logo
1  sur  25
seeking support
in secret
a tangled web
Sonja Vivienne
Post-Doctoral Research Fellow
CfCSC, UQ
how can stigmatised people
navigate privacy
in order to
seek support?
1

2

3

contex
t

case
studies

questions
1
context
is

pseudonymity
enough?
Deti-404
broader significance
identity

belonging

INTIMACY

CITIZENSHIP

private

public
negotiated

NETWORKS
mediated
digital dualism
surveillance &
self-exposure
case
studies

2
queer russian youth
Chelsea Manning
manning-lamo chat transcript
analysis
• socially stigmatised identities
• seeking support in secret
• expectation of privacy betrayed
• poorly managed pseudonyms
• punitive consequences
research
questions

3
platforms + policy
or
social context + expectations?
identity

belonging

INTIMACY

CITIZENSHIP

private

public
negotiated

NETWORKS
mediated
networked
individualism
intimate publics

private spheres
networked + intimate
+ citizenship
privacy & publicness
Q&A?
sonja vivienne
+61(0) 418 660 908

s.vivienne@uq.edu.au
Skype: sonjavi
Twitter: @sonjaviv
www.incitestories.com.au
www.rainbowfamilytree.com
References:
Berlant, L. (2008). The Female Complaint: the unfinished business of sentimentality in American Culture. Durham & London: Duke University
Press.
boyd, danah. (2008, Fall). Taken Out of Context: American Teen Sociality in Networked Publics (PHD in Information Management and
Systems). University of California, Berkeley.
boyd, danah. (2012, August). The politics of “real names.” Communications of the ACM, 55(8), 29–31.
Fraser, N. (1990). Rethinking the Public Sphere: A Contribution to the Critique of Actually Existing Democracy. Social Text, (25/26), 56–80.
Giddens, A. (1992). The Transformation of Intimacy: Sexuality, Love and Eroticism in Modern Societies. Stanford, California: Stanford
University Press.
Goffman, E. (1963). Stigma: Notes on the Management of Spoiled Identity. New York: Simon & Schuster.
Hogan, B. (2010). The Presentation of Self in the Age of Social Media: Distinguishing Performances and Exhibitions Online. Bulletin of Science,
Technology & Society, 30(6), 377 –386. doi:10.1177/0270467610385893
Jurgenson, N. (2011, February 24). Digital Dualism versus Augmented Reality  » Cyborgology. Cyborgology. Retrieved November 20, 2013,
from http://thesocietypages.org/cyborgology/2011/02/24/digital-dualism-versus-augmented-reality/
Lange, P. (2008). Publicly Private and Privately Public: Social Networking on YouTube. Journal of Computer-Mediated Communication, 13,
361–380. doi:doi:10.1111/j.1083-6101.2007.00400.x
Livingstone, S. M. (2005). Audiences and publics: when cultural engagement matters for the public sphere. Bristol: Intellect.
Papacharissi, Z. A. (2010). A Private Sphere: Democracy in a Digital Age. Cambridge: Polity.
Plummer, K. (2003). Intimate Citizenship: Private Decisions and Public Dialogues. University of Washington Press.
Rainie, H., Rainie, L., & Wellman, B. (2012). Networked: The New Social Operating System. MIT Press.
Vivienne, S. (2009). Rainbow Family Tree. Retrieved from www.rainbowfamilytree.com
Vivienne, S. (2013). Digital Storytelling as Everyday Activism: Queer Identity, Voice and Networked Publics. Queensland University of
Technology, Brisbane.
Weintraub, J. A., & Kumar, K. (1997). Public and Private in Thought and Practice: Perspectives on a Grand Dichotomy. Chicago: University of
Chicago Press.
Young, I. M. (1997). Intersecting Voices: Dilemmas of Gender, Political Philosophy, and Policy. Princeton: Princeton University Press.
Young, I. M. (2011). Justice and the Politics of Difference. Princeton: Princeton University Press.
Attributions:
Pseudonymity
http://compfight.com/search/pseudonym/1-3-1-1
Anonymity
http://compfight.com/search/anonymity/1-3-1-1
404 support
http://s3-ec.buzzfed.com/static/enhanced/webdr01/2013/7/29/19/grid-cell-1149-1375140183-29.jpg
Lena 404
http://www.buzzfeed.com/katiezavadski/in-russia-breaking-the-law-to-tell-gay-teens-it-gets-better?sub=2474697_1435183
Nym wars
http://shockwaveplasma.blogspot.com.au/2011/08/nymwars-and-propaganda-of-botgirl.html
SMC blog:
http://socialmediacollective.org/2013/09/24/monitoring-youth/
‘Cyberbullying Law and the New School Year’ by CT Senate Democrats: http://www.flickr.com/photos/44616579@N05/6124355293
via Compfight - cc - by-nc-nd
‘Privacy, health, fears over airport X-ray’ by publik16 http://www.flickr.com/photos/22941790@N02/2904857669 via Compfight - cc
- by-nc-nd
‘From Music to microfluidics’ by Steve Jurvetson http://www.flickr.com/photos/44124348109@N01/6884784313 via Compfight - cc by-nc-nd
Russia’s neo-nazi sport:
http://www.theverge.com/2013/8/7/4595246/russia-anti-gay-neo-nazis-bully-teens-on-social-media-occupy-pedofilyay
http://en.wikipedia.org/wiki/File:Chelsea_Manning_with_wig.jpg
http://www.privatemanning.org/learn-more/in-his-own-words
Email from Manning to Lim, U.S. Army Records Management and Declassification Agency, April 24, 2010.
Barbie low angle:
http://keepingupwiththeholsbys.files.wordpress.com/2012/07/barbie.jpg?w=490&h=367
‘Networked’ Cover:
http://ecx.images-amazon.com/images/I/413hdpXZ2IL.jpg
‘The Female Complaint’ Cover:
http://www.dukeupress.edu/Assets/Books/978-0-8223-4202-1_pr.jpg
‘A Private Sphere’ Cover:
http://www.polity.co.uk/digitalmediaandsociety/images/covers/large/private_sphere.jpg
‘Intimate Citizenship’ Cover:
http://www.mqup.ca/filebin/images/products/zoom/9780773526570.jpg
‘2nd Anoniversary 13’ by Anonymous9000 http://www.flickr.com/photos/25414324@N02/4280254856 via Compfight - cc - by-nc-nd

Contenu connexe

Tendances

Mobile Social Media in Social Internations FINAL PAPER
Mobile Social Media in Social Internations FINAL PAPERMobile Social Media in Social Internations FINAL PAPER
Mobile Social Media in Social Internations FINAL PAPERKelsey Harris
 
Effect of technology on personal communication
Effect of technology on personal communicationEffect of technology on personal communication
Effect of technology on personal communicationAbid Momand
 
Esten OAH18: Digital Public Humanities for Historians
Esten OAH18: Digital Public Humanities for HistoriansEsten OAH18: Digital Public Humanities for Historians
Esten OAH18: Digital Public Humanities for HistoriansEmilyEsten
 
Journal of social and personal relationships 2004-chan-305-20
Journal of social and personal relationships 2004-chan-305-20Journal of social and personal relationships 2004-chan-305-20
Journal of social and personal relationships 2004-chan-305-20Raluca Vas
 
Social media Group 1 Chapter 2
Social media Group 1  Chapter 2Social media Group 1  Chapter 2
Social media Group 1 Chapter 2Julian Arias
 
ICWSM-12 Awards and Closing Remarks
ICWSM-12 Awards and Closing RemarksICWSM-12 Awards and Closing Remarks
ICWSM-12 Awards and Closing RemarksJohn Breslin
 
Social media, group 1 chapter 2
Social media, group 1  chapter 2Social media, group 1  chapter 2
Social media, group 1 chapter 2hollajan
 
Internet & Social Life Zineb Boukili
Internet & Social Life Zineb BoukiliInternet & Social Life Zineb Boukili
Internet & Social Life Zineb Boukilizinebboukili
 
Exploring addiction to social networking service among young Chinese adults
Exploring addiction to social networking service among young Chinese adultsExploring addiction to social networking service among young Chinese adults
Exploring addiction to social networking service among young Chinese adultsDigital Society
 
In search of a better understanding of social presence: An investigation into...
In search of a better understanding of social presence: An investigation into...In search of a better understanding of social presence: An investigation into...
In search of a better understanding of social presence: An investigation into...Patrick Lowenthal
 
4.0 social network analysis
4.0 social network analysis4.0 social network analysis
4.0 social network analysisjilung hsieh
 
Exploring Addiction to Social Networking Service among Young Chinese Adults
Exploring Addiction to Social Networking Service among Young Chinese AdultsExploring Addiction to Social Networking Service among Young Chinese Adults
Exploring Addiction to Social Networking Service among Young Chinese AdultsDigital Society
 
The demographics of social media users
The demographics of social media usersThe demographics of social media users
The demographics of social media usersThomas Roe
 
To Comment Or Not To Comment
To Comment Or Not To CommentTo Comment Or Not To Comment
To Comment Or Not To CommentMarie K. Shanahan
 
Issn 2039 2117 (online) issn 2039-9340 (print) mediterra
Issn 2039 2117 (online) issn 2039-9340 (print) mediterraIssn 2039 2117 (online) issn 2039-9340 (print) mediterra
Issn 2039 2117 (online) issn 2039-9340 (print) mediterraniraj57
 
Research Proposal : Political Representation of Different types of voters on ...
Research Proposal : Political Representation of Different types of voters on ...Research Proposal : Political Representation of Different types of voters on ...
Research Proposal : Political Representation of Different types of voters on ...Joshua Wong
 

Tendances (20)

Mobile Social Media in Social Internations FINAL PAPER
Mobile Social Media in Social Internations FINAL PAPERMobile Social Media in Social Internations FINAL PAPER
Mobile Social Media in Social Internations FINAL PAPER
 
Effect of technology on personal communication
Effect of technology on personal communicationEffect of technology on personal communication
Effect of technology on personal communication
 
Cyberfemm
CyberfemmCyberfemm
Cyberfemm
 
Esten OAH18: Digital Public Humanities for Historians
Esten OAH18: Digital Public Humanities for HistoriansEsten OAH18: Digital Public Humanities for Historians
Esten OAH18: Digital Public Humanities for Historians
 
Nca2006
Nca2006Nca2006
Nca2006
 
Journal of social and personal relationships 2004-chan-305-20
Journal of social and personal relationships 2004-chan-305-20Journal of social and personal relationships 2004-chan-305-20
Journal of social and personal relationships 2004-chan-305-20
 
Social media Group 1 Chapter 2
Social media Group 1  Chapter 2Social media Group 1  Chapter 2
Social media Group 1 Chapter 2
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
ICWSM-12 Awards and Closing Remarks
ICWSM-12 Awards and Closing RemarksICWSM-12 Awards and Closing Remarks
ICWSM-12 Awards and Closing Remarks
 
Social media, group 1 chapter 2
Social media, group 1  chapter 2Social media, group 1  chapter 2
Social media, group 1 chapter 2
 
Internet & Social Life Zineb Boukili
Internet & Social Life Zineb BoukiliInternet & Social Life Zineb Boukili
Internet & Social Life Zineb Boukili
 
Exploring addiction to social networking service among young Chinese adults
Exploring addiction to social networking service among young Chinese adultsExploring addiction to social networking service among young Chinese adults
Exploring addiction to social networking service among young Chinese adults
 
In search of a better understanding of social presence: An investigation into...
In search of a better understanding of social presence: An investigation into...In search of a better understanding of social presence: An investigation into...
In search of a better understanding of social presence: An investigation into...
 
QualBlogPresentation
QualBlogPresentationQualBlogPresentation
QualBlogPresentation
 
4.0 social network analysis
4.0 social network analysis4.0 social network analysis
4.0 social network analysis
 
Exploring Addiction to Social Networking Service among Young Chinese Adults
Exploring Addiction to Social Networking Service among Young Chinese AdultsExploring Addiction to Social Networking Service among Young Chinese Adults
Exploring Addiction to Social Networking Service among Young Chinese Adults
 
The demographics of social media users
The demographics of social media usersThe demographics of social media users
The demographics of social media users
 
To Comment Or Not To Comment
To Comment Or Not To CommentTo Comment Or Not To Comment
To Comment Or Not To Comment
 
Issn 2039 2117 (online) issn 2039-9340 (print) mediterra
Issn 2039 2117 (online) issn 2039-9340 (print) mediterraIssn 2039 2117 (online) issn 2039-9340 (print) mediterra
Issn 2039 2117 (online) issn 2039-9340 (print) mediterra
 
Research Proposal : Political Representation of Different types of voters on ...
Research Proposal : Political Representation of Different types of voters on ...Research Proposal : Political Representation of Different types of voters on ...
Research Proposal : Political Representation of Different types of voters on ...
 

En vedette

From Mass Media to the Networked Public Sphere
From Mass Media to the Networked Public SphereFrom Mass Media to the Networked Public Sphere
From Mass Media to the Networked Public SphereMsifry
 
Toward Networked Literacies
Toward Networked LiteraciesToward Networked Literacies
Toward Networked LiteraciesAlec Couros
 
Boundary Between Pseudonymity and Anonymity
Boundary Between Pseudonymity and AnonymityBoundary Between Pseudonymity and Anonymity
Boundary Between Pseudonymity and AnonymityHiroshi Nakagawa
 
プライバシー保護の法制と技術課題(2014年時点)
プライバシー保護の法制と技術課題(2014年時点)プライバシー保護の法制と技術課題(2014年時点)
プライバシー保護の法制と技術課題(2014年時点)Hiroshi Nakagawa
 
ScholarlHKES SVP DEGREE COLLEGE, SADASHIVANAGAR, BANGALORE-560080. IQAC ORGA...
ScholarlHKES SVP DEGREE COLLEGE, SADASHIVANAGAR, BANGALORE-560080.  IQAC ORGA...ScholarlHKES SVP DEGREE COLLEGE, SADASHIVANAGAR, BANGALORE-560080.  IQAC ORGA...
ScholarlHKES SVP DEGREE COLLEGE, SADASHIVANAGAR, BANGALORE-560080. IQAC ORGA...Harish Bramhaver
 
Forensics for IT, final attempt
Forensics for IT, final attemptForensics for IT, final attempt
Forensics for IT, final attemptj9lai
 
Строение и функции вомероназального органа
Строение и функции вомероназального органаСтроение и функции вомероназального органа
Строение и функции вомероназального органаcrasgmu
 
Mathematical modelling of extractive distillation
Mathematical modelling of extractive distillationMathematical modelling of extractive distillation
Mathematical modelling of extractive distillationerdete23
 
MBA724 s6 w1 experimental design
MBA724 s6 w1 experimental designMBA724 s6 w1 experimental design
MBA724 s6 w1 experimental designRachel Chung
 
AÇÃO CAUTELAR 4.174 DISTRITO FEDERAL
AÇÃO CAUTELAR 4.174 DISTRITO FEDERALAÇÃO CAUTELAR 4.174 DISTRITO FEDERAL
AÇÃO CAUTELAR 4.174 DISTRITO FEDERALMiguel Rosario
 

En vedette (20)

From Mass Media to the Networked Public Sphere
From Mass Media to the Networked Public SphereFrom Mass Media to the Networked Public Sphere
From Mass Media to the Networked Public Sphere
 
Toward Networked Literacies
Toward Networked LiteraciesToward Networked Literacies
Toward Networked Literacies
 
19. Reti sociali
19. Reti sociali19. Reti sociali
19. Reti sociali
 
Avatar
AvatarAvatar
Avatar
 
Boundary Between Pseudonymity and Anonymity
Boundary Between Pseudonymity and AnonymityBoundary Between Pseudonymity and Anonymity
Boundary Between Pseudonymity and Anonymity
 
プライバシー保護の法制と技術課題(2014年時点)
プライバシー保護の法制と技術課題(2014年時点)プライバシー保護の法制と技術課題(2014年時点)
プライバシー保護の法制と技術課題(2014年時点)
 
Kudavi 2.4.2016
Kudavi 2.4.2016Kudavi 2.4.2016
Kudavi 2.4.2016
 
ScholarlHKES SVP DEGREE COLLEGE, SADASHIVANAGAR, BANGALORE-560080. IQAC ORGA...
ScholarlHKES SVP DEGREE COLLEGE, SADASHIVANAGAR, BANGALORE-560080.  IQAC ORGA...ScholarlHKES SVP DEGREE COLLEGE, SADASHIVANAGAR, BANGALORE-560080.  IQAC ORGA...
ScholarlHKES SVP DEGREE COLLEGE, SADASHIVANAGAR, BANGALORE-560080. IQAC ORGA...
 
Forensics for IT, final attempt
Forensics for IT, final attemptForensics for IT, final attempt
Forensics for IT, final attempt
 
E Rate
E RateE Rate
E Rate
 
SMDMS'13
SMDMS'13SMDMS'13
SMDMS'13
 
Строение и функции вомероназального органа
Строение и функции вомероназального органаСтроение и функции вомероназального органа
Строение и функции вомероназального органа
 
Sambo
Sambo Sambo
Sambo
 
Pl@g!@r!$m
Pl@g!@r!$mPl@g!@r!$m
Pl@g!@r!$m
 
Mathematical modelling of extractive distillation
Mathematical modelling of extractive distillationMathematical modelling of extractive distillation
Mathematical modelling of extractive distillation
 
Accesspro3
Accesspro3Accesspro3
Accesspro3
 
MBA724 s6 w1 experimental design
MBA724 s6 w1 experimental designMBA724 s6 w1 experimental design
MBA724 s6 w1 experimental design
 
กิจกรรมการเรียนรู้ที่ 5 2
กิจกรรมการเรียนรู้ที่ 5 2กิจกรรมการเรียนรู้ที่ 5 2
กิจกรรมการเรียนรู้ที่ 5 2
 
AÇÃO CAUTELAR 4.174 DISTRITO FEDERAL
AÇÃO CAUTELAR 4.174 DISTRITO FEDERALAÇÃO CAUTELAR 4.174 DISTRITO FEDERAL
AÇÃO CAUTELAR 4.174 DISTRITO FEDERAL
 
Tabla de materiales y precios de colciencias (1)
Tabla de materiales y precios de colciencias (1)Tabla de materiales y precios de colciencias (1)
Tabla de materiales y precios de colciencias (1)
 

Similaire à Seeking Support in Secret

The ethics of privacy in sharing culture 2016
The ethics of privacy in sharing culture 2016The ethics of privacy in sharing culture 2016
The ethics of privacy in sharing culture 2016Zoetanya Sujon
 
Networked Intimate Citizenship: mediated social change?
Networked Intimate Citizenship: mediated social change?Networked Intimate Citizenship: mediated social change?
Networked Intimate Citizenship: mediated social change?Son Vivienne
 
Nadia naffi-Learning About Oneself an Essential Process to Confront Social Me...
Nadia naffi-Learning About Oneself an Essential Process to Confront Social Me...Nadia naffi-Learning About Oneself an Essential Process to Confront Social Me...
Nadia naffi-Learning About Oneself an Essential Process to Confront Social Me...Nadia Naffi, Ph.D.
 
Social Media and Anonymity
Social Media and AnonymitySocial Media and Anonymity
Social Media and AnonymityPaul Honke
 
Bikini selfies and suggestive lip dubs: Examining queer women’s performances...
Bikini selfies and suggestive lip dubs: Examining queer women’s performances...Bikini selfies and suggestive lip dubs: Examining queer women’s performances...
Bikini selfies and suggestive lip dubs: Examining queer women’s performances...Stefanie Duguay
 
Social Media Trends and Topics
Social Media Trends and TopicsSocial Media Trends and Topics
Social Media Trends and TopicsCliff Lampe
 
Koh Representing Race Opening Remarks MLA 2013
Koh Representing Race Opening Remarks MLA 2013Koh Representing Race Opening Remarks MLA 2013
Koh Representing Race Opening Remarks MLA 2013Adeline Koh
 
The View from Here and Here: Making the Invisible Visible in the Hypertextual...
The View from Here and Here: Making the Invisible Visible in the Hypertextual...The View from Here and Here: Making the Invisible Visible in the Hypertextual...
The View from Here and Here: Making the Invisible Visible in the Hypertextual...Michelle Ferrier
 
Is being #instagay different from an #lgbttakeover?
Is being #instagay different from an #lgbttakeover?Is being #instagay different from an #lgbttakeover?
Is being #instagay different from an #lgbttakeover?Stefanie Duguay
 
Digital Media & Youth Safety - Ricky Lewis & Jacqueline Vickery
Digital Media & Youth Safety - Ricky Lewis & Jacqueline VickeryDigital Media & Youth Safety - Ricky Lewis & Jacqueline Vickery
Digital Media & Youth Safety - Ricky Lewis & Jacqueline VickeryJacqueline Vickery
 
Addicted To Passion
Addicted To PassionAddicted To Passion
Addicted To Passionguest32a8fe
 
Libraries as a Bridge: The Role of Libraries in Closing the Digital Skills ...
Libraries as a Bridge: The Role of Libraries in Closing the Digital Skills ...Libraries as a Bridge: The Role of Libraries in Closing the Digital Skills ...
Libraries as a Bridge: The Role of Libraries in Closing the Digital Skills ...Bobbi Newman
 

Similaire à Seeking Support in Secret (20)

The ethics of privacy in sharing culture 2016
The ethics of privacy in sharing culture 2016The ethics of privacy in sharing culture 2016
The ethics of privacy in sharing culture 2016
 
Networked Intimate Citizenship: mediated social change?
Networked Intimate Citizenship: mediated social change?Networked Intimate Citizenship: mediated social change?
Networked Intimate Citizenship: mediated social change?
 
Nadia naffi-Learning About Oneself an Essential Process to Confront Social Me...
Nadia naffi-Learning About Oneself an Essential Process to Confront Social Me...Nadia naffi-Learning About Oneself an Essential Process to Confront Social Me...
Nadia naffi-Learning About Oneself an Essential Process to Confront Social Me...
 
Privacy: why we should care
Privacy: why we should carePrivacy: why we should care
Privacy: why we should care
 
TMSP Nation of Neigbors-feb14-v8
TMSP Nation of Neigbors-feb14-v8TMSP Nation of Neigbors-feb14-v8
TMSP Nation of Neigbors-feb14-v8
 
Social Media and Anonymity
Social Media and AnonymitySocial Media and Anonymity
Social Media and Anonymity
 
Bikini selfies and suggestive lip dubs: Examining queer women’s performances...
Bikini selfies and suggestive lip dubs: Examining queer women’s performances...Bikini selfies and suggestive lip dubs: Examining queer women’s performances...
Bikini selfies and suggestive lip dubs: Examining queer women’s performances...
 
Social Media Trends and Topics
Social Media Trends and TopicsSocial Media Trends and Topics
Social Media Trends and Topics
 
Microcelebrity and The Tenure Track
Microcelebrity and The Tenure TrackMicrocelebrity and The Tenure Track
Microcelebrity and The Tenure Track
 
Koh Representing Race Opening Remarks MLA 2013
Koh Representing Race Opening Remarks MLA 2013Koh Representing Race Opening Remarks MLA 2013
Koh Representing Race Opening Remarks MLA 2013
 
Online anonymity
Online anonymityOnline anonymity
Online anonymity
 
The View from Here and Here: Making the Invisible Visible in the Hypertextual...
The View from Here and Here: Making the Invisible Visible in the Hypertextual...The View from Here and Here: Making the Invisible Visible in the Hypertextual...
The View from Here and Here: Making the Invisible Visible in the Hypertextual...
 
Is being #instagay different from an #lgbttakeover?
Is being #instagay different from an #lgbttakeover?Is being #instagay different from an #lgbttakeover?
Is being #instagay different from an #lgbttakeover?
 
The Fifth Estate and Its Future
The Fifth Estate and Its FutureThe Fifth Estate and Its Future
The Fifth Estate and Its Future
 
Week2
Week2Week2
Week2
 
Lis580 seminargroup3
Lis580 seminargroup3Lis580 seminargroup3
Lis580 seminargroup3
 
Digital Media & Youth Safety - Ricky Lewis & Jacqueline Vickery
Digital Media & Youth Safety - Ricky Lewis & Jacqueline VickeryDigital Media & Youth Safety - Ricky Lewis & Jacqueline Vickery
Digital Media & Youth Safety - Ricky Lewis & Jacqueline Vickery
 
Addicted To Passion
Addicted To PassionAddicted To Passion
Addicted To Passion
 
Explorations From My Social Media Generation
Explorations From My Social Media GenerationExplorations From My Social Media Generation
Explorations From My Social Media Generation
 
Libraries as a Bridge: The Role of Libraries in Closing the Digital Skills ...
Libraries as a Bridge: The Role of Libraries in Closing the Digital Skills ...Libraries as a Bridge: The Role of Libraries in Closing the Digital Skills ...
Libraries as a Bridge: The Role of Libraries in Closing the Digital Skills ...
 

Dernier

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 

Dernier (20)

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 

Seeking Support in Secret

  • 1. seeking support in secret a tangled web Sonja Vivienne Post-Doctoral Research Fellow CfCSC, UQ
  • 2. how can stigmatised people navigate privacy in order to seek support?
  • 5.
  • 16. analysis • socially stigmatised identities • seeking support in secret • expectation of privacy betrayed • poorly managed pseudonyms • punitive consequences
  • 18. platforms + policy or social context + expectations?
  • 21. networked + intimate + citizenship
  • 23. Q&A? sonja vivienne +61(0) 418 660 908 s.vivienne@uq.edu.au Skype: sonjavi Twitter: @sonjaviv www.incitestories.com.au www.rainbowfamilytree.com
  • 24. References: Berlant, L. (2008). The Female Complaint: the unfinished business of sentimentality in American Culture. Durham & London: Duke University Press. boyd, danah. (2008, Fall). Taken Out of Context: American Teen Sociality in Networked Publics (PHD in Information Management and Systems). University of California, Berkeley. boyd, danah. (2012, August). The politics of “real names.” Communications of the ACM, 55(8), 29–31. Fraser, N. (1990). Rethinking the Public Sphere: A Contribution to the Critique of Actually Existing Democracy. Social Text, (25/26), 56–80. Giddens, A. (1992). The Transformation of Intimacy: Sexuality, Love and Eroticism in Modern Societies. Stanford, California: Stanford University Press. Goffman, E. (1963). Stigma: Notes on the Management of Spoiled Identity. New York: Simon & Schuster. Hogan, B. (2010). The Presentation of Self in the Age of Social Media: Distinguishing Performances and Exhibitions Online. Bulletin of Science, Technology & Society, 30(6), 377 –386. doi:10.1177/0270467610385893 Jurgenson, N. (2011, February 24). Digital Dualism versus Augmented Reality  » Cyborgology. Cyborgology. Retrieved November 20, 2013, from http://thesocietypages.org/cyborgology/2011/02/24/digital-dualism-versus-augmented-reality/ Lange, P. (2008). Publicly Private and Privately Public: Social Networking on YouTube. Journal of Computer-Mediated Communication, 13, 361–380. doi:doi:10.1111/j.1083-6101.2007.00400.x Livingstone, S. M. (2005). Audiences and publics: when cultural engagement matters for the public sphere. Bristol: Intellect. Papacharissi, Z. A. (2010). A Private Sphere: Democracy in a Digital Age. Cambridge: Polity. Plummer, K. (2003). Intimate Citizenship: Private Decisions and Public Dialogues. University of Washington Press. Rainie, H., Rainie, L., & Wellman, B. (2012). Networked: The New Social Operating System. MIT Press. Vivienne, S. (2009). Rainbow Family Tree. Retrieved from www.rainbowfamilytree.com Vivienne, S. (2013). Digital Storytelling as Everyday Activism: Queer Identity, Voice and Networked Publics. Queensland University of Technology, Brisbane. Weintraub, J. A., & Kumar, K. (1997). Public and Private in Thought and Practice: Perspectives on a Grand Dichotomy. Chicago: University of Chicago Press. Young, I. M. (1997). Intersecting Voices: Dilemmas of Gender, Political Philosophy, and Policy. Princeton: Princeton University Press. Young, I. M. (2011). Justice and the Politics of Difference. Princeton: Princeton University Press.
  • 25. Attributions: Pseudonymity http://compfight.com/search/pseudonym/1-3-1-1 Anonymity http://compfight.com/search/anonymity/1-3-1-1 404 support http://s3-ec.buzzfed.com/static/enhanced/webdr01/2013/7/29/19/grid-cell-1149-1375140183-29.jpg Lena 404 http://www.buzzfeed.com/katiezavadski/in-russia-breaking-the-law-to-tell-gay-teens-it-gets-better?sub=2474697_1435183 Nym wars http://shockwaveplasma.blogspot.com.au/2011/08/nymwars-and-propaganda-of-botgirl.html SMC blog: http://socialmediacollective.org/2013/09/24/monitoring-youth/ ‘Cyberbullying Law and the New School Year’ by CT Senate Democrats: http://www.flickr.com/photos/44616579@N05/6124355293 via Compfight - cc - by-nc-nd ‘Privacy, health, fears over airport X-ray’ by publik16 http://www.flickr.com/photos/22941790@N02/2904857669 via Compfight - cc - by-nc-nd ‘From Music to microfluidics’ by Steve Jurvetson http://www.flickr.com/photos/44124348109@N01/6884784313 via Compfight - cc by-nc-nd Russia’s neo-nazi sport: http://www.theverge.com/2013/8/7/4595246/russia-anti-gay-neo-nazis-bully-teens-on-social-media-occupy-pedofilyay http://en.wikipedia.org/wiki/File:Chelsea_Manning_with_wig.jpg http://www.privatemanning.org/learn-more/in-his-own-words Email from Manning to Lim, U.S. Army Records Management and Declassification Agency, April 24, 2010. Barbie low angle: http://keepingupwiththeholsbys.files.wordpress.com/2012/07/barbie.jpg?w=490&h=367 ‘Networked’ Cover: http://ecx.images-amazon.com/images/I/413hdpXZ2IL.jpg ‘The Female Complaint’ Cover: http://www.dukeupress.edu/Assets/Books/978-0-8223-4202-1_pr.jpg ‘A Private Sphere’ Cover: http://www.polity.co.uk/digitalmediaandsociety/images/covers/large/private_sphere.jpg ‘Intimate Citizenship’ Cover: http://www.mqup.ca/filebin/images/products/zoom/9780773526570.jpg ‘2nd Anoniversary 13’ by Anonymous9000 http://www.flickr.com/photos/25414324@N02/4280254856 via Compfight - cc - by-nc-nd

Notes de l'éditeur

  1. Thanks for coming – today I’m presenting on behalf of Sonja Vivienne, a post-doc researcher at the Centre for Communication and Social Change at University of Queensland. While she can’t be with us… she’d like to welcome any feedback via email, twitter or me… and she’d like to thank me very much for my generosity of spirit and intellectual camaraderie… and hopes to one day repay the favour!   This paper draws on current case studies in order to explore shifting understandings of privacy and publicness…
  2. …in particular, in cultures where public expression of queer sexuality and non-normative gender performance are socially maligned and risky.   Sonja proposes a framework of ‘networked intimate citizenship’ that might support stigmatised people, and others, in navigating privacy…   Since what have become know as the ‘nymwars’ in 2011, in which Google + insisted on use of legal names as profiles, there has been increased debate about a ‘right to privacy’.   So, why do we need privacy? What are the strengths and weaknesses of pseudonymity?   Building on the ‘online dis-inhibition effect’ some people maintain the use of ‘real’ names reduces flaming and vitriol.   On the other hand, others believe that anonymity, or at the very least pseudonymity, is necessary in order to facilitate safe and genuine engagement of diverse voices.
  3. So – a quick roadmap… First I’m going to outline a theoretical and social landscape for this presentation, then describe and analyse 2 particular case studies… before raising some research questions for further discussion and investigation…
  4. Let’s start ‘context’ with a brief exploration of understandings of pseudonymity and anonymity… The distinction may be clear to this audience, however to many internet users it is not…
  5. While a pseudonym is a fictitious substitute for a legal name, it does not guarantee anonymity.   Images that are partially obscured may confound facial recognition software and render their subjects unidentifiable to an unknown audience, however, to anyone who has even minimal knowledge of the subject, they are recognisable – and this thread can lead to them then being identified and located.   Anonymity, on the other hand, assumes no threads link physical identity with its representation. Anonymity is extremely difficult to achieve when sharing personal stories – arguably impossible. Even untraceable ISPs are useless if an anecdote is specific in its nature…   Imagine that you identify as ‘gay’ or that you see yourself as an ‘ally of same sex attracted people’ and that you live in Russia…
  6. As you probably know, in 2013 a federal bill banned the distribution of "propaganda of non-traditional sexual relations" to minors. In Russia, homophobia thrives, not just at legal and political levels, but is widespread among the general population… according to a 2013 survey, 74% believe that homosexuality should not be accepted by society.   In numerous well-documented examples gay or sympathetic people, have lost their jobs for offering empathy and affirmation in supposedly ‘private’ online groups, like Deti-404.
  7. Deti-404 translates as ‘Children-404’ and plays on the ‘error 404 – page not found’ warning. It was established by 17 year old Lena Klimova, in March 3013 on VKontakte, which is the second biggest social network service in Europe following Facebook, and has the motto ‘Children-404. LGBT teens. We exist!’.   Presumably, group moderators must approve membership of the group, however, while pseudonyms are available to all, it is not difficult to infiltrate a closed group in order to gather information about other members.
  8. The association between a perceived degree of privacy and a degree of safety has broader social significance – for people, young and old, wealthy, privileged… or not – out of date or poorly negotiated expectations of privacy and publicness can cost jobs, relationships and, in some cases, lives…   Can the so-called ‘darknet’ or ‘deep’ web provide an alternative? If you wish to conceal illegal activity it might be useful to employ multiple ISPs to hide locations of engagement, but ill-conceived pseudonyms or accidental half-revelations can still be traced to source…   For those who wish to find a secret space in which to seek support… it is, unfortunately, likely that others can find them there too…
  9. Drawing on work by boyd, Papacharissi, Hogan, Warner and Lange… and my doctoral research with queer digital storytellers, I have started employing a theoretical construct that I call ‘Networked Intimate Citizenship’.   This is an attempt to acknowledge the labour involved in… negotiating identity simultaneously in face to face and online environments with publics who are both familiar and unknown, now and in the future…   It involves… building bridges across difference while maintaining personal congruence… In other words having… agency and ownership of the production and distribution of identity on one’s own terms…
  10. This frame requires moving beyond simplistic digital dualisms – comparisons between face to face interactions, and online self-representations.   Like this photo – an airport scanner – the vast majority of people simultaneously inhabit a body and maintain connection to a digital trace of that identity.   Who controls how that identity is represented and where that representation travels, is a more complex issue… and worthy of lengthy exploration.
  11. Bernie Hogan argues that, unlike Goffman’s ‘front and back stage’, digital self-representation is an ‘exhibition’ - curated by platforms like Facebook...   Building on this argument, and taking into account the mediating influence of platforms, digitally literate users at least have POTENTIAL to seize agency (over the process of self-representation) and ownership (of it’s distributed and evolving form)
  12. Control over self-representation – or if you like ‘curation of your personal online exhibition’ - is central in many arguments about surveillance, however, in the examples I’m about to describe, it is the unanticipated consequences of self-exposure or a lack of digital literacy in managing the boundaries of that exposure that are proving increasingly problematic for marginalised people.   In the last year or so there have been numerous international examples of the tangled complications of online privacy and publicness, and I’ll now briefly explore 2 of those – the case of queer youth in Russia and that of Chelsea (formerly Bradley) Manning…
  13. This image was picked up in late 2013 by online tech/science/art/culture news aggregator ‘The Verge’. It depicts representatives from a loose collective of neo-Nazis and Russian nationalists known as ‘Occupy Pedophilia’ who use social media in 2 ways: luring gay people (sometimes by posing as prospective dates) into violent face to face encounters and then distributing triumphant images of those encounters   There are hundreds of active homophobic VKontakte (VK) groups and the largest has 75,000 followers. The leader of ‘Occupy Pedophilia’ regularly publishes stylized videos of ‘sting operations’ or ‘safaris’ and holds regional seminars to help build their following.   Among varied reports of attacks in May last year, a gay man was burned to death in Volgograd after his assailants sodomized him with beer bottles and, weeks later, 3 men killed a gay man by stabbing and trampling him to death. Incidents like these are notable for the absence of police intervention. While groups like Deti-404 have lobbied VK to close down group pages with some success, many others flourish in their place and, anecdotally, VK appears to be taking a ‘hands off’ approach to the widespread circulation of visual evidence of the homophobe group activities.   Obviously, social network platforms can be utilised for any political and moral affiliation, and in this case have facilitated growth of both ‘Occupy Pedophilia’ and ‘Deti-404’ – however the expectation of privacy and security they offer is largely an illusion…
  14. Meanwhile, Chelsea Manning, at the centre of the WikiLeaks scandal in 2010, has come out as transgender and has requested that ‘starting today you refer to me by my new name and use the feminine pronoun’ (press release, Aug 22, 2013). During the trial, Manning's lawyers presented an email Manning wrote to a former supervisor: "This is my problem. I've had signs of it for a very long time," the email reads. "I thought a career in the military would get rid of it. It's not something I seek out for attention and I've been trying very very hard to get rid of it by placing myself in situations where it would be impossible."
  15. Since Manning came out, transcripts of conversations with notorious hacker, Adrian Lamo, the person who eventually revealed his/her identity, have also been leaked… and as you can see, they read like a personal confession… Some of Manning’s friends say they wonder whether his desperation for acceptance may have inadvertently led him to disclose the large trove of government secrets that he had access to. Of course the irony of this lies in the fact that, while hacking and Wikileaks have come to mean a lot of different things, at core, is the philosophy that information should be free and accessible to all…
  16.  In both these case studies there are some striking similarities… the people involved are both living in environments in which their chosen identities must be concealed to preserve personal safety arguably, this leads them to seek affirmation in closed or private spaces online… in both cases vulnerable people had (not unreasonable) expectations that they were speaking in a safe place in both instances their pseudonyms, or the personal information they disclosed, linked directly to their physical, locatable identity and finally… the consequences were dramatic and violent   Of course there are distinct points of difference too – Manning was clearly digitally literate and possibly should have known that his pseudonym – ‘bradass87’ - was fragile… also, the punitive consequences he experienced were not directly linked to his transgressive identity, so much as his violation of military codes of secrecy…   But the transcripts also clearly link his understandings of ‘transparency of information’ and his desire to live his identity visibly and in the open…
  17. The similarities in these case studies lead me to a preliminary hypothesis – firstly – that the privacy strategies employed by those most at risk and with the greatest desire to see social and cultural change – offer some insights that can be mapped onto a much broader population of vulnerable identities…
  18. And secondly – that – privacy is not purely an issue that can be addressed with regulation of platforms or progressive social policy… individuals also need to understand the nuances and potential consequences of sharing personal information in dangerous, or inhospitable, social contexts… this does not necessarily mean that individuals should be blamed for unintentional self-exposure… rather that our shifting and varied cultural understandings of privacy need greater investigation…
  19. To return to the complex intersections between sharing intimate aspects of identity, mediated networks of self-representation and the way we regard ourselves as citizens… both ‘apart of’ and ‘apart from’ the numerous publics we engage with…   How might better understanding of privacy and publicness change our approach to education, policy, advertising and platform regulation? Does existing scholarship provide any clues to a path forward?
  20. Wellman & Rainie (2012) tell us that 'Networked Individualism' in daily life is ‘perpetual connectedness’, thanks to the 'triple revolution' of: social networking, internet capacity to facilitate voice, always on connectivity of mobile devices   Berlant (1997) tells that ‘Intimate Publics’ equate, not to chest-baring autobiographical confession (although some of it is), rather participants sharing a worldview - shaping both the content they consume, their experience of belonging, and their self-representation…   Livingstone (2005) & Papacharissi (2010) tell us that, in order to participate publicly, we draw on private lived experiences & constraints and… Fraser (1990) and Young (1997, 2011) tell us that a public sphere should accommodate diverse speaking styles & narrative modalities along with capacity to listen across difference…
  21. Meanwhile, Plummer (2003) argues that ‘Intimate Citizenship’ involves ‘asserting the right to choose what we do with ‘our bodies, our feelings, our identities, our relationships, our genders, our eroticisms and our representations’ (Plummer, 2002, p17).   …and boyd uses ‘social convergence’ (2008) to illustrate the fact that what may formerly have been isolated audiences are increasingly brought together to witness inconsistencies in our self-presentations… She points out that our digital traces are both persistent and searchable… meaning that the future ramifications of incidental over-sharing now are difficult to anticipate…   In the gaps between, and intersections among, these bodies of scholarship, I offer… Networked Intimate Citizenship the individual capacity to speak across differences in values, capabilities, social capital, locative time & space it requires digital agency, and ownership of fluid but congruent self-representation, and negotiation of shifting terrains of privacy and publicness and an understanding of self-exposure in the face of surveillance and risks of retribution
  22. Privacy and publicness is a shifting socio-cultural terrain, as different people decide what is appropriate to share on Facebook or VK, and what information they are happy or unhappy to share with government or advertisers…   Networked Intimate Citizenship, in the case of queer Russian youth or even Chelsea Manning, might have looked something like this – Individuals understand that the identities that they are sharing are socially maligned, And that online self-representation, even pseudonymous, carries risks, even if they are different to face to face risks Caution in building trust with divergent publics (both online AND face to face) Awareness of balance between risk and reward – connoting ownership of congruent identity and agency in it’s production Meticulous management of pseudonymity AND anonymity – enabling speaking across differences, affirming trust and, gradually, hopefully, bringing about cultural change…   …like this photograph privacy and publicness also have many layers and meanings… while ‘don’t worry we’re from the internet’ is a popular meme, the guy fawkes masks worn by members of ‘anonymous’ also conceal their identity in public... And enable an activist voice...
  23. So, to conclude… and in response to the questions I raised earlier -   No, I don’t think our concept of pseudonymity is enough… and we, all of us, stigmatised or not, need to better understand the navigation of privacy and publicness in order to seek support… while this does not wholly liberate socially maligned people from the burden of stigma the concept of ‘networked intimate citizenship’ supports individual, agentive development of a safe engaged presence and voice in public, on an individual’s own terms…   Thank you very much for listening… and please don’t hesitate to email if you have further thoughts to discuss…