37,285 research outputs found

    Appropriation of privacy management within social networking sites

    Get PDF
    Social networking sites have emerged as one of the most widely used types of interactive systems, with memberships numbering in the hundreds of millions around the globe. By providing tools for their members to manage an ever-changing set of relationships, social networking sites push a constant expansion of social boundaries. These sites place less emphasis on tools that limit social boundaries to enable privacy. The rapid expansion of online social boundaries has caused privacy shockwaves. Privacy offline is enabled by constraints of time and space. Online, powerful search engines and long term digital storage means private data have no expiration date. Within an online culture of anonymity and fluid self-presentation of identity, social networking sites can be turned into places of perceived safety but with privacy risks that actually extend indefinitely. While these sites do deploy privacy management features, it is not understood how people use social networking sites, how they use privacy management features, and how these two are related. In order to create better privacy mechanisms for social software, designers must first understand how members manage their privacy in the current environment. This dissertation introduces The Social Software Performance Model, which describes relevant factors and their interaction in order to explain patterns of privacy management. The Model is a synthesis of Adaptive Structuration Theory, the Fit Appropriation Model and socio-technical systems theory. Adaptive Structuration Theory attempts to explain appropriation, defined as the process by which people integrate technology into their daily tasks and activities. A central premise of this research is that the appropriation perspective is a valuable lens for teasing apart how members of these sites adopt and adapt privacy management features. Using Adaptive Structuration Theory, this dissertation developed and validated new measures that capture appropriation patterns related to privacy management within social networking sites. The research introduces three independent constructs that measure privacy management appropriation. They are the Use appropriation move, which measures actual use of privacy management features; the Familiarity appropriation move, which measure knowledge of privacy management features; and the Restricted Scope appropriation move, which measures the extent to which members independently limit the scope of their online social network to protect their privacy. Survey data was collected from subjects in two different social networking sites, Facebook and MySpace, and used to evaluate hypotheses developed from The Social Software Performance Model. Using a partial least squares analysis, the research model explained 28.5% of the variance with respect to appropriation of privacy management features. This is a strong result for exploratory research. This research makes a contribution by extending theories to a new context, by applying both the Adaptive Structuration Theory and the Fit Appropriation Model to the use of privacy management in social networking sites. Using types and sub-types of appropriation moves from Adaptive Structuration Theory, new measures were developed and validated. These new measures, with further efforts to establish validity and reliability, can be adapted to understand appropriations for other forms of social software. The main finding of the research is a method to evaluate the effectiveness of different implementations of privacy management within social networking sites. While information system theory has been primarily concerned with systems used in an organizational context, the results of this research shows these theories are relevant to new systems based on social interaction. These new types of social software, generically labeled as Web 2.0, are among the most popular on the Internet. Besides Facebook and MySpace, examples of Web 2.0 include the video sharing site YouTube.com, and the photo sharing site Flickr.com. These sites thrive on intensive social interaction, and are growing in scope and importance. There has been little consensus among researchers as to how to measure the effectiveness of Web 2.0 systems. This lack of consensus presents a strategic opportunity for information systems theory, which has made determinations of effectiveness an important focus. This research has adapted information systems theory to study the effectiveness of privacy management. The development of privacy management has proven to be a difficult problem, and a deeper understanding of its effectiveness is expected to improve the overall design of these systems. By adapting information systems theory to the use of privacy management within social networking sites, this research shows that information systems theory can also be used applied to Web 2.0 applications. This provides a foundation for the further development of methods to measure the effectiveness of additional components within social software

    An Exploratory Study of a User\u27s Facebook Security and Privacy Settings

    Get PDF
    There are many potential security risks with social networking sites and the individuals who use them. These sites have been adopted by people of all ages worldwide, empowering new opportunities for the presentation of the self-learning, construction of a wide circle of relationships, and the management of privacy and intimacy. This study analyses the effect of social networking security practices, more specifically Facebook and its security and privacy settings. We identify four hypotheses: The more important Facebook users believe security is an important factor in choosing a social network, the more often they will change their security settings, the more important protection against ID theft is for Facebook users, the more frequently they will change their privacy settings, Facebook users who have left their security on a default setting have more frequently fallen victim to a virus or malware attack, and users of Facebook who have their privacy set to a custom setting are less likely to receive an attack on their profile

    Protection, Not Barriers: Using Social Software Policies to Guide and Safeguard Students and Employees

    Get PDF
    Academic librarians have been using social software and networking sites for public services since they appeared on the Internet. While issues of privacy, identity management, and self-disclosure when using such technologies have been written about, very little critical attention has been paid to establishing policies or guidelines related to their use. This article is based on the authors’ experience creating a social software policy and internal service guidelines at Georgia State University and on the results of an informal survey study that gauged academic librarians’ need for and awareness of such documents. It provides both reasoning and assistance for developing social software guidelines that will protect service providers from violating the First Amendment and guide patron comment postings. Although the study was aimed at academic librarians, the findings and suggestions are relevant to any institution that offers services via social software

    Linked Into a Job?: the Ethical Considerations of Recruiting Through LinkedIn

    Get PDF
    LinkedIn’s goal is to help business professionals meet, make business deals, inquire about jobs, and find careers through connections with people that members already know. This research study will investigate the ethical practices of LinkedIn recruitment. Students’ awareness of the methods for effective use, as well as the damaging elements of a LinkedIn profile will be examined. LinkedIn is an effective, helpful tool for recruiting candidates and for job searching; however, the best results will come to those who use LinkedIn professionally and with caution. Our findings indicate that despite its risks, jobseekers and employers can benefit from using LinkedIn

    Where teens seek online privacy advice

    Get PDF
    OverviewMany teens ages 12-17 report that they usually figure out how to manage content sharing and privacy settings on their own. Focus group interviews with teens suggest that for their day-to-day privacy management, teens are guided through their choices in the app or platform when they sign up, or find answers through their own searching and use of their preferred platform.At the same time, though, a nationally representative survey of teen internet users shows that, at some point, 70% of them have sought advice from someone else about how to manage their privacy online. When they do seek outside help, teens most often turn to friends, parents or other close family members.About the survey These findings are based on a nationally representative phone survey of 802 parents and their 802 teens ages 12-17. It was conducted between July 26 and September 30, 2012. Interviews were conducted in English and Spanish and on landline and cell phones. The margin of error for the full sample is ± 4.5 percentage points. In collaboration with the Berkman Center for Internet & Society at Harvard, this report also includes insights and quotes gathered through a series of in-person focus group interviews about privacy and digital media, with a focus on social networking sites (in particular Facebook), conducted by the Berkman Center’s Youth and Media Project between February and April 2013. The team conducted 24 focus group interviews with a total of 156 participants across the greater Boston area, Los Angeles, Santa Barbara (California), and Greensboro (North Carolina).Authored by Amanda Lenhart, Mary Madden, Sandra Cortesi, Urs Gasser, Aaron Smith
    • …
    corecore