SlideShare une entreprise Scribd logo
1  sur  37
Télécharger pour lire hors ligne
Boundary Regulation
  in Social Media
(Lenhart 2009)
Context
 Privacy
Disclosure

      Fred Stutzman, fred.stutzman@unc.edu
Managing Contexts
• Friendster
 • “Burners, gay men
   and bloggers”
• Myspace
 • Teens and mirror
   profiles
   (boyd, 2006 & 2007)     http://www.flickr.com/photos/foxgrrl/3676857198/




                         Fred Stutzman, fred.stutzman@unc.edu
Managing Contexts
• Presence of multiple
  social groups
 • Behavioral
   Strategies
 • Mental Strategies
 • “Least Common                                 http://bit.ly/yS8yI
   Denominator”
                       (Lampinen et. al., 2009)
                            Fred Stutzman, fred.stutzman@unc.edu
Context Tension
                           • Connections across
                             status and power
                             boundaries
                            • Propriety, work/
                              family
                           • Inadvertent
                             disclosures leading
                             to harms
http://bit.ly/6HTDB




                        (Skeels and Grudin, 2009)
                             Fred Stutzman, fred.stutzman@unc.edu
Conceptions of Privacy

 • Privacy as selective control (Altman,
   1975)
 • Privacy as information practice
   (Dourish & Anderson, 2006)
 • Privacy as boundary management
   (Petronio, 2002)


                         Fred Stutzman, fred.stutzman@unc.edu
CPM
• Communications
  Privacy Management
 • Rule Development
 • Boundary
   Coordination
 • Boundary
   Turbulence
                  (Petronio, 2002)
                           Fred Stutzman, fred.stutzman@unc.edu
Study Goals

• Why are motives for using multiple
  profiles?
• What strategies to people employ in
  managing multiple profiles?
• Is this an effective strategy?



                        Fred Stutzman, fred.stutzman@unc.edu
Method
• Criteria: multiple profiles on one
  social media site
• Twenty in-depth interviews, Summer
  2009
• In-person/phone/Skype
• Analyzed using grounded theory


                        Fred Stutzman, fred.stutzman@unc.edu
Respondents
• Six in their 20’s, Seven
  in their 30’s, Six in their
  40’s, and one was 57
• Twelve females, eight
  males
• Respondents from US
  (NC, VA, GA, CA, FL)
  and UK

                                Fred Stutzman, fred.stutzman@unc.edu
Motives
• Privacy
• Identity
• Utility
• Propriety
               http://www.flickr.com/photos/gi/435888435/




                       Fred Stutzman, fred.stutzman@unc.edu
Privacy
• Control of access to the self;
  withdrawal from public domain
 • Safety
 • Confidentiality
“I know some young kids who tweeted ‘I’m
going to lunch at so and so’ and they came
back to their apartment and they had been
robbed...”

                        Fred Stutzman, fred.stutzman@unc.edu
Privacy

• For many respondents, multiple
  profiles:
 • Functioned as shield, protecting
   identifiable information
 • Enabled content production



                       Fred Stutzman, fred.stutzman@unc.edu
Identity
• Multiple profiles allowed for
  establishment of distinct identities
  (personal/professional)

  [Created second Facebook profile so] “I
  could be all about business” [On personal
  profile] “could be a place where I have
  opinions, where I express personal stuff.”

                           Fred Stutzman, fred.stutzman@unc.edu
Utility
• Multiple profiles enable:
 • Accomplishment of promotional and
   collaborative goals
 • Catering to specific audiences at
   specific times
  • Not having to apologize for off-topic
    posts


                        Fred Stutzman, fred.stutzman@unc.edu
Utility
• Segment volume of disclosure
• Offer differing information streams
  (topic/interest)
“If somebody on my personal Twitter says
‘oh gosh you are inundating me with too
many updates,’ I will tell them that they can
follow my public profile that I update
substantially less”

                          Fred Stutzman, fred.stutzman@unc.edu
Propriety
• Multiple profiles used to manage
  conformity to norms and customs
 • Befriending the boss or parent

[On the personal profile] “when my boss
pops up and Facebook tells me ‘we think
you should be friends,’ I don’t say yes
because she’s my boss.”


                        Fred Stutzman, fred.stutzman@unc.edu
Forms of Regulation
• Multiple identities in a
  single space
• Single account, highly
  segmented privacy controls
• Segmentation by site
 • Different social media for
   different audiences

                             Fred Stutzman, fred.stutzman@unc.edu
Axes of Regulation

• Regulation by
  linkage
• Regulation by
  concealment


                  http://www.flickr.com/photos/thosch66/270060125/



                        Fred Stutzman, fred.stutzman@unc.edu
Linkages
• Links to the identity
"I have two different identities, I have a
personal one. [and] one geared towards my
professional stuff, there's not much
personal information there. But, I do have a
separate Flickr account, I have separate
Twitter accounts, I have separate Myspace
pages”

                          Fred Stutzman, fred.stutzman@unc.edu
Linkages
• Regulation by linked interconnections

“But I don’t try and hide the fact that I’m
one or the other. You know in my [personal]
bio, I say something about [my business
twitter]. So its not like I’m trying to hide my
two different identities.”



                           Fred Stutzman, fred.stutzman@unc.edu
Concealment
• Three genres identified
 • Pseudonymity
 • Practical Obscurity
  • Obscure name variants, non-
    disclosure of identity
 • Transparent Separations

                         Fred Stutzman, fred.stutzman@unc.edu
Concealment




      Fred Stutzman, fred.stutzman@unc.edu
Evaluation
• Do these techniques provide privacy?
“The thing going into it is I don’t put
anything out there that I wouldn’t want
everybody to know”
“I have to be careful about - that I say
something that's generic enough”

“I’m very conscious of the fact I am
basically speaking to an open mic”

                          Fred Stutzman, fred.stutzman@unc.edu
Evaluation

• Is the process burdensome?
 • High burden: Number of accounts
   maintained, large number of
   contacts
 • High burden: Degree of linkage
   disassociation


                      Fred Stutzman, fred.stutzman@unc.edu
Evaluation

• Technical strategies
 • Most participants reported
   “bleedover”
 • Segmenting by device
 • Segmenting by time and location


                         Fred Stutzman, fred.stutzman@unc.edu
Implications
• Multiple profile maintenance
  consistent with the theoretical
  provisions of Altman and Petronio
• Process reduces potential harms, and
  encourages disclosures
• Represents a reaction to limitations
  inherent in sites

                       Fred Stutzman, fred.stutzman@unc.edu
Thank you!
Fred Stutzman:
  fred.stutzman@unc.edu
  @fstutzman
  http://fredstutzman.com

Woodrow Hartzog
 whartzog@email.unc.edu
 @hartzog
 http://ssrn.com/author=1107005




                                  Fred Stutzman, fred.stutzman@unc.edu
Axis of Linkages




          Fred Stutzman, fred.stutzman@unc.edu
Pseudonymity




        Fred Stutzman, fred.stutzman@unc.edu
Practical Obscurity




            Fred Stutzman, fred.stutzman@unc.edu
Transparent Separations




              Fred Stutzman, fred.stutzman@unc.edu

Contenu connexe

Tendances

Managing Your Own Learning
Managing Your Own LearningManaging Your Own Learning
Managing Your Own LearningBob Bertsch
 
Blogging basics
Blogging basicsBlogging basics
Blogging basicsktcole
 
Digital Identity & Social Networking for Researchers
Digital Identity & Social Networking for ResearchersDigital Identity & Social Networking for Researchers
Digital Identity & Social Networking for ResearchersFlea Palmer
 
Arming Students for a World of Incomprehensible Input
Arming Students for a World of Incomprehensible InputArming Students for a World of Incomprehensible Input
Arming Students for a World of Incomprehensible InputSara-Elizabeth Cottrell
 
Finding people-to-learn-from
Finding people-to-learn-fromFinding people-to-learn-from
Finding people-to-learn-fromBob Bertsch
 
Online Identity - Defining Personal from Professional
Online Identity - Defining Personal from ProfessionalOnline Identity - Defining Personal from Professional
Online Identity - Defining Personal from ProfessionalPCM creative
 
Basic Personal Branding for Indiana Association of Administrative Professionals
Basic Personal Branding for Indiana Association of Administrative ProfessionalsBasic Personal Branding for Indiana Association of Administrative Professionals
Basic Personal Branding for Indiana Association of Administrative ProfessionalsErik Deckers
 
Nonprofit Blogging Game
Nonprofit Blogging GameNonprofit Blogging Game
Nonprofit Blogging GameBeth Kanter
 
Curating Content with Scoop.it
Curating Content with Scoop.itCurating Content with Scoop.it
Curating Content with Scoop.itBob Bertsch
 
Andrew Blum Presentation
Andrew Blum PresentationAndrew Blum Presentation
Andrew Blum Presentationmshelley34
 
2010 leadership-ethics-social networking
2010   leadership-ethics-social networking2010   leadership-ethics-social networking
2010 leadership-ethics-social networkingSchoolTechPolicies.com
 
Balloons socialmediaandsocialpeopleweb
Balloons socialmediaandsocialpeoplewebBalloons socialmediaandsocialpeopleweb
Balloons socialmediaandsocialpeoplewebZizi Papacharissi
 

Tendances (14)

Managing Your Own Learning
Managing Your Own LearningManaging Your Own Learning
Managing Your Own Learning
 
Blogging basics
Blogging basicsBlogging basics
Blogging basics
 
Digital Identity & Social Networking for Researchers
Digital Identity & Social Networking for ResearchersDigital Identity & Social Networking for Researchers
Digital Identity & Social Networking for Researchers
 
Arming Students for a World of Incomprehensible Input
Arming Students for a World of Incomprehensible InputArming Students for a World of Incomprehensible Input
Arming Students for a World of Incomprehensible Input
 
Finding people-to-learn-from
Finding people-to-learn-fromFinding people-to-learn-from
Finding people-to-learn-from
 
Online Identity - Defining Personal from Professional
Online Identity - Defining Personal from ProfessionalOnline Identity - Defining Personal from Professional
Online Identity - Defining Personal from Professional
 
Basic Personal Branding for Indiana Association of Administrative Professionals
Basic Personal Branding for Indiana Association of Administrative ProfessionalsBasic Personal Branding for Indiana Association of Administrative Professionals
Basic Personal Branding for Indiana Association of Administrative Professionals
 
Nonprofit Blogging Game
Nonprofit Blogging GameNonprofit Blogging Game
Nonprofit Blogging Game
 
PhD Futures
PhD FuturesPhD Futures
PhD Futures
 
Curating Content with Scoop.it
Curating Content with Scoop.itCurating Content with Scoop.it
Curating Content with Scoop.it
 
Andrew Blum Presentation
Andrew Blum PresentationAndrew Blum Presentation
Andrew Blum Presentation
 
2010 leadership-ethics-social networking
2010   leadership-ethics-social networking2010   leadership-ethics-social networking
2010 leadership-ethics-social networking
 
Balloons socialmediaandsocialpeopleweb
Balloons socialmediaandsocialpeoplewebBalloons socialmediaandsocialpeopleweb
Balloons socialmediaandsocialpeopleweb
 
Anytime anywhere admin
Anytime anywhere adminAnytime anywhere admin
Anytime anywhere admin
 

En vedette

Social media, regulation and personal finance companies
Social media, regulation and personal finance companiesSocial media, regulation and personal finance companies
Social media, regulation and personal finance companiesFishburnHedges
 
User-Generated Content and SBS
User-Generated Content and SBSUser-Generated Content and SBS
User-Generated Content and SBSTerry Flew
 
Social Media Success Despite Regulation
Social Media Success Despite RegulationSocial Media Success Despite Regulation
Social Media Success Despite RegulationJaime Punishill
 
Bovill social media regulation workshop UKCFA Dec 14
Bovill social media regulation workshop UKCFA Dec 14Bovill social media regulation workshop UKCFA Dec 14
Bovill social media regulation workshop UKCFA Dec 14Bovill
 
SMX Paris 2014 : Convergence, SEO et effet de levier
SMX Paris 2014 : Convergence, SEO et effet de levierSMX Paris 2014 : Convergence, SEO et effet de levier
SMX Paris 2014 : Convergence, SEO et effet de levierCédric Tamboise
 
The Classification Challenge: Media Content Regulation in an Age of Converge...
The Classification Challenge: Media Content Regulation in an Age of  Converge...The Classification Challenge: Media Content Regulation in an Age of  Converge...
The Classification Challenge: Media Content Regulation in an Age of Converge...Terry Flew
 
Shanghai jiao tong keynote 12 june 2015
Shanghai jiao tong keynote 12 june 2015Shanghai jiao tong keynote 12 june 2015
Shanghai jiao tong keynote 12 june 2015Terry Flew
 

En vedette (7)

Social media, regulation and personal finance companies
Social media, regulation and personal finance companiesSocial media, regulation and personal finance companies
Social media, regulation and personal finance companies
 
User-Generated Content and SBS
User-Generated Content and SBSUser-Generated Content and SBS
User-Generated Content and SBS
 
Social Media Success Despite Regulation
Social Media Success Despite RegulationSocial Media Success Despite Regulation
Social Media Success Despite Regulation
 
Bovill social media regulation workshop UKCFA Dec 14
Bovill social media regulation workshop UKCFA Dec 14Bovill social media regulation workshop UKCFA Dec 14
Bovill social media regulation workshop UKCFA Dec 14
 
SMX Paris 2014 : Convergence, SEO et effet de levier
SMX Paris 2014 : Convergence, SEO et effet de levierSMX Paris 2014 : Convergence, SEO et effet de levier
SMX Paris 2014 : Convergence, SEO et effet de levier
 
The Classification Challenge: Media Content Regulation in an Age of Converge...
The Classification Challenge: Media Content Regulation in an Age of  Converge...The Classification Challenge: Media Content Regulation in an Age of  Converge...
The Classification Challenge: Media Content Regulation in an Age of Converge...
 
Shanghai jiao tong keynote 12 june 2015
Shanghai jiao tong keynote 12 june 2015Shanghai jiao tong keynote 12 june 2015
Shanghai jiao tong keynote 12 june 2015
 

Similaire à Boundary Regulation in Social Media

The Supportive Behaviors of Older Social Network Site Users
The Supportive Behaviors of Older Social Network Site UsersThe Supportive Behaviors of Older Social Network Site Users
The Supportive Behaviors of Older Social Network Site UsersFred Stutzman
 
The Good, The Bad and the Ugly of Web Residency (HEA V&R Event 2014)
The Good, The Bad and the Ugly of Web Residency (HEA V&R Event 2014)The Good, The Bad and the Ugly of Web Residency (HEA V&R Event 2014)
The Good, The Bad and the Ugly of Web Residency (HEA V&R Event 2014)Dr Elaine Garcia
 
Social Media final presentation risks
Social Media final presentation   risksSocial Media final presentation   risks
Social Media final presentation risksJAIRO SUAREZ
 
#CazSM U: The Role of Social Media on your Identity
#CazSM U: The Role of Social Media on your Identity#CazSM U: The Role of Social Media on your Identity
#CazSM U: The Role of Social Media on your IdentityDouglas Strahler
 
Social media for sceptics
Social media for scepticsSocial media for sceptics
Social media for scepticsHelen Webster
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leadingHsuan-Ting Chen
 
How journalists can use Facebook and Twitter
How journalists can use Facebook and TwitterHow journalists can use Facebook and Twitter
How journalists can use Facebook and TwitterSteve Buttry
 
Introduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingIntroduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingJason Hong
 
Spark Twitter fails Mar2023
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023David Strom
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaElizabeth T. "Eli" Edwards
 

Similaire à Boundary Regulation in Social Media (17)

The Supportive Behaviors of Older Social Network Site Users
The Supportive Behaviors of Older Social Network Site UsersThe Supportive Behaviors of Older Social Network Site Users
The Supportive Behaviors of Older Social Network Site Users
 
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]The FACEBOOK and TWITTER Phenomenon [9-28-2010]
The FACEBOOK and TWITTER Phenomenon [9-28-2010]
 
Social media 101
Social media 101Social media 101
Social media 101
 
Facebook
FacebookFacebook
Facebook
 
The Good, The Bad and the Ugly of Web Residency (HEA V&R Event 2014)
The Good, The Bad and the Ugly of Web Residency (HEA V&R Event 2014)The Good, The Bad and the Ugly of Web Residency (HEA V&R Event 2014)
The Good, The Bad and the Ugly of Web Residency (HEA V&R Event 2014)
 
Social Media final presentation risks
Social Media final presentation   risksSocial Media final presentation   risks
Social Media final presentation risks
 
Altman - Perfectly Anonymous Data is Perfectly Useless Data
Altman - Perfectly Anonymous Data is Perfectly Useless DataAltman - Perfectly Anonymous Data is Perfectly Useless Data
Altman - Perfectly Anonymous Data is Perfectly Useless Data
 
#CazSM U: The Role of Social Media on your Identity
#CazSM U: The Role of Social Media on your Identity#CazSM U: The Role of Social Media on your Identity
#CazSM U: The Role of Social Media on your Identity
 
Misty
MistyMisty
Misty
 
Social media for sceptics
Social media for scepticsSocial media for sceptics
Social media for sceptics
 
Group 4 discussion leading
Group 4 discussion leadingGroup 4 discussion leading
Group 4 discussion leading
 
Fired over Facebook?
Fired over Facebook?Fired over Facebook?
Fired over Facebook?
 
Fired over Facebook?
Fired over Facebook?Fired over Facebook?
Fired over Facebook?
 
How journalists can use Facebook and Twitter
How journalists can use Facebook and TwitterHow journalists can use Facebook and Twitter
How journalists can use Facebook and Twitter
 
Introduction to Privacy and Social Networking
Introduction to Privacy and Social NetworkingIntroduction to Privacy and Social Networking
Introduction to Privacy and Social Networking
 
Spark Twitter fails Mar2023
Spark Twitter fails Mar2023Spark Twitter fails Mar2023
Spark Twitter fails Mar2023
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 

Plus de Fred Stutzman

Identifying Social Capital in the Facebook Interface
Identifying Social Capital in the Facebook InterfaceIdentifying Social Capital in the Facebook Interface
Identifying Social Capital in the Facebook InterfaceFred Stutzman
 
Fred Stutzman Dissertation Defense
Fred Stutzman Dissertation DefenseFred Stutzman Dissertation Defense
Fred Stutzman Dissertation DefenseFred Stutzman
 
Networks presentation
Networks presentationNetworks presentation
Networks presentationFred Stutzman
 
Dissertation Proposal Defense
Dissertation Proposal DefenseDissertation Proposal Defense
Dissertation Proposal DefenseFred Stutzman
 
Friends Only: Examining a Privacy-Enhancing Behavior in Facebook
Friends Only: Examining a Privacy-Enhancing Behavior in FacebookFriends Only: Examining a Privacy-Enhancing Behavior in Facebook
Friends Only: Examining a Privacy-Enhancing Behavior in FacebookFred Stutzman
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network AnalysisFred Stutzman
 
What if we made weather more social?
What if we made weather more social?What if we made weather more social?
What if we made weather more social?Fred Stutzman
 

Plus de Fred Stutzman (7)

Identifying Social Capital in the Facebook Interface
Identifying Social Capital in the Facebook InterfaceIdentifying Social Capital in the Facebook Interface
Identifying Social Capital in the Facebook Interface
 
Fred Stutzman Dissertation Defense
Fred Stutzman Dissertation DefenseFred Stutzman Dissertation Defense
Fred Stutzman Dissertation Defense
 
Networks presentation
Networks presentationNetworks presentation
Networks presentation
 
Dissertation Proposal Defense
Dissertation Proposal DefenseDissertation Proposal Defense
Dissertation Proposal Defense
 
Friends Only: Examining a Privacy-Enhancing Behavior in Facebook
Friends Only: Examining a Privacy-Enhancing Behavior in FacebookFriends Only: Examining a Privacy-Enhancing Behavior in Facebook
Friends Only: Examining a Privacy-Enhancing Behavior in Facebook
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
What if we made weather more social?
What if we made weather more social?What if we made weather more social?
What if we made weather more social?
 

Dernier

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Dernier (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Boundary Regulation in Social Media

  • 1. Boundary Regulation in Social Media
  • 3.
  • 4.
  • 5. Context Privacy Disclosure Fred Stutzman, fred.stutzman@unc.edu
  • 6. Managing Contexts • Friendster • “Burners, gay men and bloggers” • Myspace • Teens and mirror profiles (boyd, 2006 & 2007) http://www.flickr.com/photos/foxgrrl/3676857198/ Fred Stutzman, fred.stutzman@unc.edu
  • 7. Managing Contexts • Presence of multiple social groups • Behavioral Strategies • Mental Strategies • “Least Common http://bit.ly/yS8yI Denominator” (Lampinen et. al., 2009) Fred Stutzman, fred.stutzman@unc.edu
  • 8. Context Tension • Connections across status and power boundaries • Propriety, work/ family • Inadvertent disclosures leading to harms http://bit.ly/6HTDB (Skeels and Grudin, 2009) Fred Stutzman, fred.stutzman@unc.edu
  • 9. Conceptions of Privacy • Privacy as selective control (Altman, 1975) • Privacy as information practice (Dourish & Anderson, 2006) • Privacy as boundary management (Petronio, 2002) Fred Stutzman, fred.stutzman@unc.edu
  • 10. CPM • Communications Privacy Management • Rule Development • Boundary Coordination • Boundary Turbulence (Petronio, 2002) Fred Stutzman, fred.stutzman@unc.edu
  • 11.
  • 12.
  • 13. Study Goals • Why are motives for using multiple profiles? • What strategies to people employ in managing multiple profiles? • Is this an effective strategy? Fred Stutzman, fred.stutzman@unc.edu
  • 14. Method • Criteria: multiple profiles on one social media site • Twenty in-depth interviews, Summer 2009 • In-person/phone/Skype • Analyzed using grounded theory Fred Stutzman, fred.stutzman@unc.edu
  • 15. Respondents • Six in their 20’s, Seven in their 30’s, Six in their 40’s, and one was 57 • Twelve females, eight males • Respondents from US (NC, VA, GA, CA, FL) and UK Fred Stutzman, fred.stutzman@unc.edu
  • 16. Motives • Privacy • Identity • Utility • Propriety http://www.flickr.com/photos/gi/435888435/ Fred Stutzman, fred.stutzman@unc.edu
  • 17. Privacy • Control of access to the self; withdrawal from public domain • Safety • Confidentiality “I know some young kids who tweeted ‘I’m going to lunch at so and so’ and they came back to their apartment and they had been robbed...” Fred Stutzman, fred.stutzman@unc.edu
  • 18. Privacy • For many respondents, multiple profiles: • Functioned as shield, protecting identifiable information • Enabled content production Fred Stutzman, fred.stutzman@unc.edu
  • 19. Identity • Multiple profiles allowed for establishment of distinct identities (personal/professional) [Created second Facebook profile so] “I could be all about business” [On personal profile] “could be a place where I have opinions, where I express personal stuff.” Fred Stutzman, fred.stutzman@unc.edu
  • 20. Utility • Multiple profiles enable: • Accomplishment of promotional and collaborative goals • Catering to specific audiences at specific times • Not having to apologize for off-topic posts Fred Stutzman, fred.stutzman@unc.edu
  • 21. Utility • Segment volume of disclosure • Offer differing information streams (topic/interest) “If somebody on my personal Twitter says ‘oh gosh you are inundating me with too many updates,’ I will tell them that they can follow my public profile that I update substantially less” Fred Stutzman, fred.stutzman@unc.edu
  • 22. Propriety • Multiple profiles used to manage conformity to norms and customs • Befriending the boss or parent [On the personal profile] “when my boss pops up and Facebook tells me ‘we think you should be friends,’ I don’t say yes because she’s my boss.” Fred Stutzman, fred.stutzman@unc.edu
  • 23. Forms of Regulation • Multiple identities in a single space • Single account, highly segmented privacy controls • Segmentation by site • Different social media for different audiences Fred Stutzman, fred.stutzman@unc.edu
  • 24. Axes of Regulation • Regulation by linkage • Regulation by concealment http://www.flickr.com/photos/thosch66/270060125/ Fred Stutzman, fred.stutzman@unc.edu
  • 25. Linkages • Links to the identity "I have two different identities, I have a personal one. [and] one geared towards my professional stuff, there's not much personal information there. But, I do have a separate Flickr account, I have separate Twitter accounts, I have separate Myspace pages” Fred Stutzman, fred.stutzman@unc.edu
  • 26. Linkages • Regulation by linked interconnections “But I don’t try and hide the fact that I’m one or the other. You know in my [personal] bio, I say something about [my business twitter]. So its not like I’m trying to hide my two different identities.” Fred Stutzman, fred.stutzman@unc.edu
  • 27. Concealment • Three genres identified • Pseudonymity • Practical Obscurity • Obscure name variants, non- disclosure of identity • Transparent Separations Fred Stutzman, fred.stutzman@unc.edu
  • 28. Concealment Fred Stutzman, fred.stutzman@unc.edu
  • 29. Evaluation • Do these techniques provide privacy? “The thing going into it is I don’t put anything out there that I wouldn’t want everybody to know” “I have to be careful about - that I say something that's generic enough” “I’m very conscious of the fact I am basically speaking to an open mic” Fred Stutzman, fred.stutzman@unc.edu
  • 30. Evaluation • Is the process burdensome? • High burden: Number of accounts maintained, large number of contacts • High burden: Degree of linkage disassociation Fred Stutzman, fred.stutzman@unc.edu
  • 31. Evaluation • Technical strategies • Most participants reported “bleedover” • Segmenting by device • Segmenting by time and location Fred Stutzman, fred.stutzman@unc.edu
  • 32. Implications • Multiple profile maintenance consistent with the theoretical provisions of Altman and Petronio • Process reduces potential harms, and encourages disclosures • Represents a reaction to limitations inherent in sites Fred Stutzman, fred.stutzman@unc.edu
  • 33. Thank you! Fred Stutzman: fred.stutzman@unc.edu @fstutzman http://fredstutzman.com Woodrow Hartzog whartzog@email.unc.edu @hartzog http://ssrn.com/author=1107005 Fred Stutzman, fred.stutzman@unc.edu
  • 34. Axis of Linkages Fred Stutzman, fred.stutzman@unc.edu
  • 35. Pseudonymity Fred Stutzman, fred.stutzman@unc.edu
  • 36. Practical Obscurity Fred Stutzman, fred.stutzman@unc.edu
  • 37. Transparent Separations Fred Stutzman, fred.stutzman@unc.edu